SPEECH AND FACSIMILE SCRAMBLING AND DECODING
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP10T02279R000100180001-2
Release Decision:
RIFPUB
Original Classification:
S
Document Page Count:
141
Document Creation Date:
December 23, 2016
Document Release Date:
December 11, 2013
Sequence Number:
1
Case Number:
Publication Date:
January 1, 1946
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP10T02279R000100180001-2.pdf | 19.6 MB |
Body:
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100186601-2
130510
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
.
11144 t s i; t* *It
o
0
o
:0
!CD
C\1
C\1
0
vOrwelf
0
I 0_
a
<
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
SUMMARY TECHNICAL REPORT
OF THE
NATIONAL DEFENSE RESEARCH COMMITTEE
This document contains information affecting the national defense of
the United States within the meaning of the Espionage Act, 50 U. S. C.,
31 and 32, as amended. Its transmission or the revelation of its contents
in any manner to an unauthorized person is prohibited by law.
This volume is classified SECRET in accordance with security regula-
tions of the War and Navy Departments because certain chapters
contain material which was SECRET at the date of printing. Other
chapters may have had a lower classii.fication or none. The reader is
advised to consult the War and Navy agencies listed on the reverse of
this page for the current classification of any material.
eclassitiea ana pprove or e ease
SECRET
6c0-0(2&as)-4)
Ds+-r
. -
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Manuscript and illustrations for this volume were prepared
for publlication by the Summary Reports Group of the
Columbia University Division of War Research under con-
tract OEMsr-1131 with the Office of Scientific Research and
Development. This volume was printed and bound by the
Columbia University Press.
Distribution of the Summary Technical Report of NDRC has
been made by the War and Navy Departments. Inquiries
concerniing the availability and distribution of the Summary
Technical Report volumes and microfilmed and other refer-
ence material should be addressed to the War Department
Library,. _Room 1A-522, The Pentagon, Washington 25, D. C.,
or to the Office of Naval Research, Navy Department, Atten-
tion.: Reports and Documents Section, Washington 25, D. C.
Copy No.
149
This volume, hUie the seventy others of the Summary Tech-
nical Report of NDRC, has been written, edited, and printed
under great pressure. Inevitably there are errors which have
slipped past Division readers and proofreaders. There may
be errors of fact not known at time of printing. The author
has not been able to follow through his writing to the final
page proof.
Please report errors to:
JOINT RESEARCH AND DEVELOPMENT BOARD
PROGRAMS DIVISION (STR ERRATA)
WASHINGTON 25, D. C.
A master errata sheet will be compiled from these reports
and sent to recipients of the volume. Your help will make this
book more useful to other readers and will be of great value
in preparing any revisions.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
SUMMARY TECHNICAL REPORT OF DIVISION 13, NDRC
VOLUME 3
SPEECH AND FACSIMILE
SCRAMBLING AND DECODING
OFFICE OF SCIENTIFIC RESEARCH AND DEVELOPMENT
VANNEVAR BUSH, DIRECTOR
NATIONAL DEFENSE RESEARCH COMMITTEE
JAMES B. CONANT, CHAIRMAN
DIVISION 13
HARADEN PRATT, CHIEF
WASHINGTON, D. C., 1946
SECRET
N. C. A. RESEARCH LIBRARY
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
NATIONAL DEFENSE RESEARCH COMMITTEE
James B. Conant, Chairman
Richard C. Tolman., Vice Chairman
Roger Adams
Frank B. Jewett
Karl T. Compton
Army Representative'
Navy Representative2
Commissioner of Patents3
Irvin Stewart, Executive Secretary
nArmy representatives in order of service:
Maj. Gen. G. V.. Strong
Maj. Gen. R. C. Moore
Maj. Gen. C. C. 'Williams
Brig. Gen. W. A. Wood, Jr. Col. M. M. Irvine
Col. E. A. Routheau
Col. L. A. Denson
Col. P. R. Faymonville
Brig. Gen. E. A. Regnier
Wavy representatives in order of service:
!ear Adm. H. G. Bowen Rear Adm. J. A. Furer
Capt. Lybrand P. Smith Rear Adm. A. H. Van Keuren
Commodore H. A. Schade
3Comninissioners of Patents in order of service:
Conway P. Coe Casper W. Ooms
NOTES ON THE ORGANIZATION OF NDRC
The duties of the National Defense Research Committee
were (X) to recommend to the Director of OSRD snit-
able projects amd research programs on the instrumen-
talities ,of warfare, together with contract facilities for
carrying out these projects and programs, and (2) to
administer the technical and scientific work of the con-
tracts. More specifically, NDRC functioned by initiating
researcfri projects an requests from the Army or the
Navy, or on reqpiests from an allied government trans-
mitted through the Liaison Office of OSRD, or on its own
considered initiative as a result of the experience of its
members. Proposals prepared by the Division, Panel, or
Committee for research contracts for performance of
the won't involved in such projects were first reviewed
by NDECC, and if approved, recommended to the Director
of OSRID. Upon, approval of a proposal by the Director,
a contract pernnitting maximum flexibility of scientific
effort ,;was arranged. The business aspects of the con-
tract, including such matters as materials, clearances,
vouchere, patents, priorities, legal matters, and admin-
istration of patent matters were handled by the Execu-
tive Secretary off OSRD.
Originally NIDRC administered its work through five
divisions, each }headed by one of the NDRC members.
These were:
Division A?Armor and Ordnance
Division B?Bombs, Fuels, Gases, & Chemical Problems
DivishonC?Ccommunications and Transportation
Division D?Detection, Controls, and Instruments
Division E?Ptatests and Inventions
iv
In a reorganization in the fall of 1942, twenty-three
administrative divisions, panels, or committees were
created, each with a chief selected on the basis of his
outstanding work in the particular field. The NDRC
members then became a reviewing and advisory group
to the Director of OSRD. The final organization was as
follows:
Division 1?Ballistic Research
Division 2?Effects of Impact and Explosion
Division 3?Rocket Ordnance
Division 4?Ordnance Accessories
Division 5?New Missiles
Division 6?Sub-Surface Warfare
Division 7?Fire Control
Division 8?Explosives
Division 9?Chemistry
Division 10?Absorbents and Aerosols
Division 11?Chemical Engineering
Division 12?Transportation
Division 13?Electrical Communication
Division 14?Radar
Division 15?Radio Coordination
Division 16?Optics and Camouflage
Division 17?Physics
Division 18?War Metallurgy
Division 19?Miscellaneous
Applied Mathematics Panel
Applied Psychology Panel
Committee on Propagation
Tropical Deterioration Administrative Committee
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
1
0
NDRC FOREWORD
AS EVENTS of the years preceding 1940 re-
vealed more and more clearly the serious-
ness of the world situation, many scientists in
this country came to realize the need of organ-
izing scientific research for service in a na-
tional emergency. Recommendations which they
made to the White House were given careful
amd sympathetic attention, and as a result the
National Defense Research Committee [NDRC]
was formed by Executive Order of the Presi-
demt in the summer of 1940. The members of
NIDRC, appointed by the President, were in-
structed to supplement the work of the Army
and the Navy in the development of the instru-
mentalities of war. A year later, upon the
esttablishment of the Office of Scientific Re-
search and Development [OSRD], NDRC be-
came one of its units.
The Summary Technical Report of NDRC is
a (conscientious effort on the part of NDRC to
summarize and evaluate its work and to present
it in a useful and permanent form.. It comprises
sonne seventy volumes broken into groups cor-
responding to the NDRC Divisions, Panels, and
Committees.
The Summary Technical Report of each Di-
vision, Panel, or Committee is an integral sur-
vey of the work of that group. The first volume
of each group's report contains a summary of
thre report, stating the problems presented and
tine philosophy of attacking them, and summar-
iziing the results of the research, development,
anid training activities undertaken. Some vol-
umes may be "state of the art" treatises cover-
ing subjects to which various research groups
have contributed information. Others may con-
tain descriptions of devices developed in the
lalboratories. A master index of all these di-
viional, panel, and committee reports which
together constitute the Summary Technical Re-
port of NDRC is contained in a separate vol-
ume, which also includes the index of a
microfilm record of pertinent technical labora-
tory reports and reference material.
Some of the NDRC-sponsored researches
vvlhich had been declassified by the end of 1945
were of sufficient popular interest that it was
found desirable to report them in the form of
nronographs, such as the series on radar by Di-
vision 14 and the monograph on sampling
inspection by the Applied Mathematics Panel.
Since the material treated in them is not dupli-
cated in the Summary Technical Report of
NDRC, the monographs are an important part
of the story of these aspects of NDRC research.
In contrast to the information on radar,
which is of widespread interest and much of
which is released to the public, the research on
subsurface warfare is largely classified and is
of general interest to a more restricted group.
As a consequence, the report of Division 6 is
found almost entirely in its Summary Technical
Report, which runs to over twenty volumes. The
extent of the work of a Division cannot there-
fore be judged solely by the number of volumes
devoted to it in the Summary Technical Report
of NDRC; account must be taken of the mono-
graphs and available reports published else-
where.
Of all the NDRC Divisions, few were larger
or charged with more diverse responsibilities
than Division 13. Under the urgent pressure of
wartime requirements, the staff of the Division
developed navigation and communications de-
vices and systems which not only contributed to
the successful Allied war effort, but which will
continue to be of value in time of peace in the
fields of transportation and communications.
The work of the Division, under the direction
first of C. B. Jolliffe and later of Haraden Pratt,
furnishes a foundation for what promises to be
even more radical developments than those of
the war?for one example, direction finders
which will operate at all elevations and azimuth
angles, in other words, hemispherically.
The Summary Technical Report of Division
13 was prepared under the direction of the Di-
vision Chief and authorized by him for publica-
tion. The report presents the methods and
results of the widely varied research and de-
velopment program, and, in the case of work
with speech scrambling and decoding, it pre-
sents for the first time a comprehensive review
of the state of the art. The report is also a
notable record of the skill and integrity of the
scientists and engineers, who, with the coopera-
tion of the Army and Navy and Division con-
tractors, contributed brilliantly to the defense
of the nation. To all of these we express our
sincere appreciation.
VANNEVAR BUSH, Director
Offi-ce of Scientific Research and Development
SECRET
J. B. CONANT, Chairman
National Defense Research Committee
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FOREWORD
FiARLY IN OCTOIRER 1940 a subcommittee on
speech secrecy was set up in the Communi-
cations Division of the National Defense Re-
search Committee [NDRC], later known as
Division 13 of NURC. This group was to con-
sider both the scrambling and unscrambling of
telephone signals. It was soon recognized that
the decoding problem was of primary impor-
tance both as a means of evaluating privacy
systems for possible use by the Services and for
decoding possible enemy signals. Thus the work
under Division 13 on speech privacy took on two
aspects, that of providing "secure" means of
voice, code, and picture communication, and
that of decoding transmissions for the dual
purpose of learning how useful were our own
secrecy systems and for learning what the
enemy might be saying in his scrambled mes-
sages.
Numerous projects were carried forward
under the guidaince of the Division, some of
them with the object of developing scrambling
or secrecy methods, others dealing entirely with
code cracking methods_ In this way the work
accomplished on methods of secrecy could be
tested at every phase by the decoding groups
which were also busy on other aspects of the
decoding problem. The summaries to follow will
disclose the objects and accomplishments of the
individual projects.
Work on speech secrecy problems went on in
the Division from 1940 quite to the end of the
war, the final report on Project 13-106 being
issued on August 18, 1945. Thus, this volume
summarizes the results of about five years' ex-
perience in developing secrecy systems and in
diagnosing, decoding, and evaluating these and
other systems submitted for study by the Army,
the Navy, and NDRC.
All these stuctiies are reported in detail in the
preliminary andl final reports on the projects
and are only stummarized here. The sum of
these reports, tlherefore, provides a record of
accumulated experience, much of which has
never been reported in any other way. In toto,
the reports make available information both
positive and negative which would have to be
accumulated by another group if they were to
embark on a similar project.
The immediate pressure behind these studies
was caused, of course, by the war. The work
summarized in this volume, therefore, should
serve as a guide to the individual reports and
should aid a newcomer to the field in becoming
properly oriented to the state of the art so far
as the NDRC project reports are concerned.
Other work, carried out in other government
groups, is not believed to duplicate this material.
In passing, it is worth noting that, in con-
trast to a rather extensive literature on code
and cipher systems, and on cryptanalysis and
cryptography, which apply to telegraphic types
of communication, very little has been written
on speech privacy systems or decoding methods
applying to them. Two moderately comprehen-
sive articles have been published. One appeared
in the Post Office Engineers Journal, October
1933; the other, in the Brown Boveri Review
for December 1941. The latter report is repro-
duced and discussed in Preliminary Report No.
5, Project C-43. It covers a number of basic
types of scrambling systems and, in addition,
discloses one that was new at the time. This is a
modification of the "time division scrambling"
or TDS system, and several of the Division 13
projects were concerned with this useful
privacy method.
Without any doubt, one of the major accom-
plishments of the Division's work and certainly
the high point in its efforts within the subject
matter of this volume was the development of
the sound spectrograph by Mr. R. K. Potter and
his co-workers at the Bell Telephone Labora-
tories. The efficacy of this instrument in ana-
lyzing scrambled speech will be revealed in the
chapters to follow.
SECRET
HARADEN PRATT
Chief, Division 13
vii
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
PREFACE
I N SUMMARIZING the several hundred reports
of contractors on the hundred-odd research
projects sponsored by Division 13 of the Na-
tional Defense Research Committee, the editor
has had to settle in his own mind how much or
how little of each project report should be in-
cluded; in ether words, how far the boiling-
down process should go.
The editor has an abhorrence for seeing good
scientific or technical material go unpublished.
Only by publication can the facts or methods
developed lay a few researchers become avail-
able for all researchers. On this basis, substan-
tially all of Division 13's program should be
included in the volumes, of which this is one,
summarizing the work of the Division. On the
other hand, time moves forward inexorably so
that it is qu4e likely that, by the day of publica-
tion, 'much 4of the data would already be out
of date. Furthermore, time and human energy
are always scarce. On these bases, all that might
be required -would be a paragraph or two sum-
mariiing flue aims of the project and its accom-
plishments.
A middle c ourse was steered, a course between
the easiest Solution of publishing practically all
cf each report and the more difficult job of
really digesting the project purpose and results.
The editor, however, deliberately chose to pub-
lish too much rather than too little. In most
cases it will be unnecessary for the reader to
search out the original source material unless
he wishes to dig deep into the subject. In those
cases where fundamental information was as-
sembled and printed in the project report, that
is, information on which future research might
be based, the summaries have been permitted to
take as much space as required.
The plan followed in this volume is briefly
as follows: After a comprehensive descrip-
tion of the several scrambling methods, brief
summaries are given of the work carried out in
the several projects dealing with scrambling.
Then follows a comprehensive description of
decoding or cracking methods employed, after
which are summaries of the projects dealing
mainly with decoding or code cracking. In other
words, most of the space is devoted to basic ma-
terial and the least space to details of the actual
work carried out. Thus this volume might be
considered as a basic text on speech scrambling
and descramhling.
The material is not arranged chronologically
with respect to the order of the work in the Di-
vision but, rather, in an arrangement which
appeared to the editor as giving the reader the
easiest and quickest approach to the whole sub-
ject of speech privacy and code cracking. Thus,
parts of the individual project reports will be
found in several places in this volume.
KEITH HEN NEY
Editor
SECRET
ix
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CONTENTS
CHI A PTER PAGE
1 Speech Scrambling Methods
.2 Time Division Scrambling Systems 13
3 Speech Privacy System Development 25
4 Unscrambling and Decoding Methods 35
.5 Decoding Projects ? 100
6 Facsimile Privacy Systems 105
7 Miscellaneous Projects . 120
Bibliography 125 -0.SRD Appointees 127
Contract Numbers 128
Service Project Numbers 129
Index . 131
SECRET xi
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Chapter 1
SPEECH SCRAMBLING METHODS
AWIDE VARIETY of speech scrambling methods
will be examined in this chapter, taken
from Part I of the final report' of Project
C-43, in order to become familiar with the
devices which might be used alone or in combi-
nation to make up speech privacy systems.
Some. of these systems are in commercial or
military use, others exist only on paper, mostly
in the form of patents or patent applications.
It is not intended to include all the variations
of all the different methods but rather to cover
basic scrambling methods, with their most im-
portant variations, in which the original speech
is transmitted With its parts modified, dis-
placed, or interchanged.
The two main dimensions of speech which are
operated upon to make it unintelligible are the
frequency dimension and the time dimension.
Scrambling systems usually depend on re-
arranging the components of speech in either
or both of these dimensions. In general it may
be said that those that operate on the frequency
dimension alone are capable of the best quality
in the reproduced speech. A complete list of
the systems covered in the discussion is given
in Table 1 of Chapter 4, together with other
data concerning them.
1.1
SYSTEMS INVOLVING SINGLE
MODULATION
A basic device in privacy systems is the
modulator. One form of modulator, shown in
the coils as shown. In some cases the coils can
be omitted as shown in Figure 1B.
Figure 2 shows the method of producing
simple inversion. In this and in succeeding
illustrations the numerical values are not neces-
sarily the best values for practical operation,
but they serve to illustrate the manner in which
the device operates.
In the system shown in Figure 2 the speech
band ?is limited to 3 kc by a low-pass filter. It
is then modulated with a frequency of 3 kc.
This produces an upper and a lower sideband of
which only the latter is passed by the output
filter. The system is called inversion, because
the high frequencies in the original speech
appear as low frequencies in the output and
the low frequencies in the original speech
appear as high frequencies. At the receiving
end the inverted signal, in passing through an
identical system in the same direction, is re-
inverted back to normal speech.
A very commonly proposed variation of this
system involves using a variable frequency in-
stead of the steady 3-kc carrier. We might vary
the frequency continuously or in discrete steps.
It should be noted, however, that the cutoff of
the low-pass output filter is fixed, which limits
the variation permissible in the carrier fre-
quency. A wide variation would either permit
too much of the upper sideband to get through
or would cut off some of the lower sideband.
If the modulator in Figure 2 is of the type
shown in Figure 1A, speech can be scrambled
by introducing instead of the 3-kc carrier a
IN
CARRIER
OUT
8
FIGURE 1. Use of copper oxide varistors as modulators. In A, balanced coils are necessary; in B, coils are
not required.
Figure 1A, consists of four copper oxide
varistor units between two balanced coils. The
carrier frequency is fed into the midpoints of
square wave whose changes from positive to
negative value are irregular in time. Each one
of the reversals in the carrier wave causes a
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
4
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
2
SPEECH SCRAMBLING METHODS
reversal of phase in the speech wave. The pat-
tern of these? irregular reversals may be ar-
ranged so that the speech becomes unintel-
ligible. At the receiving end a coding wave must
be introduced: which is exactly in step with the
consists of the speech band right side up but
displaced from its normal position by 2 kc. If
the 16-kc value is used the output consists of
the 3-kc speech band inverted and displaced by
3 kc. We might use these two values alternately
at short intervals, or we might have the carrier
LP
30 00
MOD
LP
3000,m
7.10-1
D
LP
3 KC
3000 rti
FIGURE 2. Simple inversion produced by single
modulation.
one at the receiving end with proper alloWance
for any delay- there may be in the transmitting
channel.
A two-chamnel system using one modulator
for each chamnel is shown in Figure 3. In this
system the carrier fed into both modulators
is the same im frequency but differs 90 degrees
in phase. Twco separate speech channels can he
transmitted by this method without substantial
mutual interfeerence, but both sidebands as well
as the carrier- must be transmitted. At the re-
ceiving end tthe carrier must be split into two
components with the proper phases. Each com-
ponent will diemodulate its own portion of the
signal and dhereby separate the two speech
channels. On of the channels may consist of
noise or spurious speech from a recording or
the like, whical tends to mask the real message
if the signal ds demodulated with an ordinary
set. This scheme was originally proposed as a
multiplex sysltem, but an obvious variation is
to divide a siingle speech band into two halves
with filters amd then transmit the two halves
on carriers diiffering by 90 degrees in phase.
1.2 SYSTEMS INVOLVING DOUBLE
MODULATION
Figure 4 shiows a much more flexible systern.
Here the signial is modulated twice, with a
band-pass flitter between the two modulators.
With this arrrangement the carrier frequency
fed into the szecond modulator can be varied in
several ways._ In the illustration two carrier
frequencies aire shown for the second modu-
lator. If the 8-kc value is used the output
3LC
MOD
OSCILL 3 KC
PHASE SHIFTER
FIGURE 3. Split-phase multiplex used as two-
channel system.
vary continuously back and forth, say between
13 and 16 kc. Another variation is to use a
multiplicity of values, for example, 500 or 1,000
cycles apart, (not between 10 and 13 kc for
this illustration) and switch between these
values in a regular or irregular sequence. A
MOO
10% KC
MOD'
LP
6 KC
CI) 10 PLC (1318 TO 16 KC
FIGURE 4. System in which signal is modulated
twice, requiring wider frequency band than is
usually provided by radio sets or telephone lines.
disadvantage of these systems is that the trans-
mission channel needs to be wider than that
usually afforded by radio sets or telephone
lines. In all these systems, the speech is restored
by passing through identical equipment in the
opposite direction.
3-3 TRIPLE MODULATION?RE-ENTRANT
BAND SHIFT
Going back to Figure 2, suppose the carrier
frequency were made 4 instead of 3 kc, but
the 3-kc input and output filters were retained.
The output would then be an inverted sideband
ranging from 1 to 3 kc; that portion of the
sideband above 3 kc would be cut off by the
output filter. Since, however, there is a 1-kc
gap at the lower edge of the transmitted band,
the portion which would be cut off by the filter
might be modulated down and sent along with
the rest of the signal in this lower part of the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
4,
BAND-SPLUTTING SYSTEMS
3
spectrum. In other words the portion of the
sideband which would otherwise disappear
above the upper edge of the transrmitted band
might be made to reappear at the bottom.
L P
3 KC
P.
output low-pass filter. A variation of this
arrangement is to allow the 7-kc carrier to vary
in discrete steps according to some regular or
irregular program or vary it continuously be-
MOD
NIP
31, KC
MOD
CID 7 KC
GD3 KC
Be
3-6 KC
MOD
FIGURE 5. System iinvolving re-entrant
Figure 5 shows ,a system of moduilators and
filters for accomplishing this kind of hand shift.
The first modulator is followed by at high-pass
filter which selects the upper sidefband from
3 to 6 kc. This is combined -with some of the
original signal which ranges from zero to 1 kc.
The second modulator is fed with a carrier
frequency of, for example, 7 kc which inverts
the whole band. This is followed by a band-pass
filter passing the range from 3 to 6 ic. A third
modulator with its carrier frequency placed
INPUT
inversion.
LP
3 KC
tween the limits of 6 to 9 kc. This provides a
variable band-shifting arrangement without
using more than the normal 3-kc transmission
channel.
1.4 BAND-SPLITTING SYSTEMS
A privacy system in wide commercial use,
known as the split-band system, involves split-
ting up the whole speech band into a number
SWITCH
6100".
OUTPUT
MOD
e 00 OR
650.
5550,4
MOD
5550 OR
1200,0
5000
MOD
5000 OR
1750.
4450",
3900"...
MOO
3900 OR
2650 r?,
* op FIALTERS ALL ALIKE ?3100 TO 3650 "4
FIGURE 6. One form of split-band system in commercial use.
at the lower edge of the 3- to 6-ke input band
moves the whole band, still inverted, down to
the usual range of zero to 3 kc. The upper side-
band of this modulation step is removed by the
of subbands and shifting these around out of
their normal positions in the frequency spec-
trum. Figure 6 shows one manner in which
this can be accomplished. The numerical values
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
4
SPEECH SCRAMBLING METHODS
are chosen so that the band from 250 to 3,000
cycles is divided into five subbands each 550
cycles wide..
The speech band is fed to five modulators
in parallel. The five band filters following the
modulators are all alike, passing the band from
3,100 to 3,650 cycles. It will be seen that the
uppermost modulator in Figure 6 with its
carrier of 6.1 kc will invert the speech band
and displace it by such an amount that the
frequency band which originally occupied the
space from 2,450 to 3,000 cycles will pass
through the filter. In other words, this modula-
tor in combination with its band filter selects
MOD
5800,u
MOD
5200"
BP*
An additional set of frequencies is indicated
in the drawing for the second set of modu-
lators. These frequencies will cause the output
subbands to be inverted instead of right side
up. One or all of these alternate frequencies
may be used as desired.
The "switch" may be changed as often as
desired. On an experimental basis the codes
have been changed as often as 25 times per
second without appreciable distortion in the
quality of the received speech, showing that it
is possible to shift bands as wide as 550 cycles
at a rapid rate without generating appreciable
distortion products.
MOD
4600,,
BP*
MOD
3600,,
MOD
4000'.
BP*
MOD
3500,u
BP*
MOD
MOD
3600'.
* BP FILTERS ALL ALIKE -3000 TO 3600,??
FIGURE 7. Time division multiplex in which N separate signals are sent over line, each signal being
transmitted only 1/Nth of time.
the uppermost of the five subbands from the
input signal. Similarly the lowest modulator
in combination with its band filter selects the
lowest subband from the input signal. The out-
puts of the band filters all occupy the same
frequency range, but they all came originally
from different frequency ranges. Similarly the
output modulators are so designed that each
one accepts the band from 3,100 to 3,650 cycles
and shifts it to a particular band location in
the output. The five leads going into the box
labeled "switch" may, therefore, be cross-
connected in any desired manner with the five
output leads. The resulting output will always
cover the complete range from 250 to 3,000
cycles and there will be no overlapping sub-
bands.
1.5
TIME DIVISION MULTIPLEX
Time division multiplex [TDM] is a system
in which N separate signals occupying the same
frequency range are sent over a single line,
each signal being transmitted only 1/Nth of
the time. This might be illustrated by showing
the N signals connected to the N segments of
a commutator. A rapidly rotating brush picks
up the N signals one after the other. For
acceptable quality, however, the brush must
make at least as many rotations per second as
the highest frequency in the transmitted signal.
This means that a mechanical brush is out of
the question and is used simply for illustration.
This kind of switching, however, can be
accomplished with electronic ring circuits.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Afformermemssmos- -
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
TIME DIVISION SCRAMBLING 5
Sirnce we are interested here in privacy sys-
tems rather than multiplex systems, we will
confirne ourselves to the use of TDM for trans-
mittirng a single speech channel. This can be
acconnplished by dividing the speech band into
a nurniber of subbands all occupying the same
frequency range, and connecting these to the
segments of our hypothetical commutator.. Re-
ferrimg to Figure 7, which is similar to Figure
6, thiis can be accomplished by feeding all the
outpult modulators with the same carrier, and
connecting each modulator to a commutator
segment. In this illustration, there are four
600-czyc1e subbands, oovering the range from
400 to 2,800 cycles. It has been shown mathe-
matically that the output of this system
consists of sidebands around a frequency oorre-
spondling to the rotation of the brush and also
sidelmands around frequencies corresponding to
odd Inarmonics of the rotation frequency. Each
sidebland, hovkver, contains components from
each of the subbands.. It has also been shown
that the total channel width required for good
transmissitm need be no greater than that of
the orriginal signal.
To, increase the privacy of this system one
of the subbands may be replaced by a band of
noise._ This can be filtered out at the receiving
end. Obviously this system requires a high
degree of synchronism between the two ends.
" SYSTEMS USING TAPE RECORDING
Leraving the frequency substitution systems
for tine time being, we will introduce a device
which permits operating on the time scale.. The
most versatile device for this purpose is the
magmetic tape recording and reproducing sys-
tem. This takes the form of a tape of magnetic
alloy a few mils thick either run as a loop over
pulleycs or attached firmly to the perimeter of
a dislk. The recording is done by means of small
electromagnetic pole-pieces. The signal is
picked up by similar pole-pieces which may be
placed at a distance from the recording pole-
piece depending on the amount of delay desired.
The outstanding advantage of the magnetic
tape system for this type of application is that
the Signal may be erased and the recording
medium be used over and over again. The
quality of this type of transmission can be made
very good with proper design.
Figure 8 shows a rather simple privacy sys-
tem using magnetic tape. The input signal is
passed through a 3-way pad, whereby it is
impressed on a band filter, and also recorded
FIGURE 8. Variable subband delay system using
magmetie tape.
on the rnagnetic tape. It is picked up by equally
spaced pole-pieces each associated with a dif-
ferent band filter. With the arrangement shown
in Figure 8 the band from 0 to 1 kc is trans-
mitted without delay. The band from 1 to 2 kc
is transmitted with 100 msec (0.1 sec) delay
and the band from 2 to 3 kc is delayed 200 msec.
At the receiving end the scrambled signal is
passed through an identical system in the same
way except that the two extreme band filters
are interchanged. In this way the band which
received no delay in transmission is given
maximum delay in the receiving machine, and
the band which received maximum delay in
transmission is given zero delay in the receiver.
In this way all the bands are delayed the same
amount and the speech is restored to normal.
This system alone does not provide any high
degree of privacy, but it can be combined with
other systems, as we shall see.
1.7
TIME DIVISION SCRAMBLING
An important class of scrambles involving
magnetic tape is known as time division
scrambling [TDS]. A simplified diagram of this
system is shown in Figure 9. There are a re-
cording pole-piece and a number of pickup pole-
pieces. There is also a commutator driven in
synchronism with the tape. The length (in
time) of each segment of the commutator is,
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
6
SPEECH SCRAMBLING METHODS
in general, equal to the delay between succes-
sive pickup pole-pieces. However, the number
of segments need not be the same as the number
of pole-pieces. A switch is provided whereby
any segment may be connected to any pole-
piece.
TAPE
Co)
4E RASE
FIGURE 9. One form? of time division scrambling
[TDS].
With this system the speech is cut up into
time elements corresponding in length to the
spacing of the pole-pieces. These time elements
are transmitted in a scrambled order. For
instance, six successive time elements which we
might label 1, 2, 3, 4, 5, 6 might be transmitted
in the order 2, 4, 1, 3, 6, 5. The possibilities
of TDS coding are far too complex to cover
here. The general requirements for all TDS
systems may be stated as follows: (1) Each
element of the original speech must be trans-
mitted once and only once. (2) The sum of
the delay in the transmitting machine plus
the delay in the receiving machine must be
equal for all elements. With these two require-
ments fulfilled it is obvious that the speech
comes out of the receiving machine in its
normal order. It is delayed, however, by an
amount equal to the sum of the transmitting
and receiving delay.
At the receiving end there are several ways
of handling the scrambled signal. (1) The pick-
up pole-pieces can be used as ?recording pole-
pieces and the signal picked up by an additional
pole-piece shown at the right in Figure 9.
With this arrangement the connections between
the commutator and the pole-pieces are the
same in the transmitting and receiving ma-
chines. (2) The signal can be recorded with
the same pole-piece used in the transmitting
machine and the connections between the pole-
pieces and the segments rearranged for re-
ceiving by a push-to-talk relay. (3) The codes
can be restricted to a particular class called
self-converse codes. These have the property of
being self-decoding, that is, the same code
which scrambles the speech in the transmitter
restores it in the receiver.
1.8
INTERLACE
An important variation of this system is
called "interlace." In this system the number
of segments on the commutator is doubled.
The odd segments are connected to the pole-
pieces according to one code and the even
segthents are connected according to a com-
pletely independent code. The reason for this
device is to increase the difficulty encountered
by the enemy in trying one code after the
other to find the right one, particularly if the
total number of codes available is small. With
the interlace system the total number of com-
binations possible is equal to the square of the
number of codes.
IN
TAPE
WHEEL
FLEXIBLE LEAD
OUT
FIGURE 10. Speed wobble in which speech time
scale is alternately compressed and expanded.
The rotating commutator shown in Figure
9 results in a repeated code, that is, each rota-
tion produces the same scramble. It is possible
to substitute for the commutator and switch
arrangement, shown in Figure 9, a more com-
plex arrangement whereby the speech is
scrambled in a never repeating manner. There
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
COMBINATIONS OF TIME AND FREQUENCY SCRAMBLING
7
are several ways of accomplishing this. Perhaps
the simplest way to represent it is as a punched
tape which permits the pole-pieces to be con-
nected to the output, one at a time, in any
desired order permissible under the restrictions
outlined above.
Another way of utilizing magnetic tape to
scramble speech is shown in Figure 10. Here
the pickup pole-piece is oscillated back and
forth along the tape mechanically. With this
arrangement, or other variations equivalent to
speech changes, the speech time scale is alter-
nately compressed and expanded. The fre-
quency scale is correspondingly expanded and
compressed, respectively.
With the arrangement shown in Figure 11,
speech is broken up into time segments each
s44E DIRECTION -AS TAPE
BUT TWICE AS FAST
FIGURE 11. Time inversion in which speech is
broken up into time segments, each of which is
transmitted backwards.
of which is transmitted backwards. The motion
of the pickup pole-pieces is twice as great as
the motion of the tape and is in the same
direction. Therefore, the relative motion of the
tape and the pole-pieces is the reverse of that
used in recording. This is the same as running
the tape backwards for reproduction.
1.9
COMBINATIONS OF TIME AND
FREQUENCY SCRAMBLING
Obviously the two kinds of systems described
in the previous sections can be used together.
For instance, some of the time elements of a
TDS system might be inverted according to
a regular or irregular program. The next more
complex step is to combine the band-splitting
system of Figure 6 with the TDS system. The
codes of the band-splitting system might be
fixed or might be switched in synchronism with
SPEECH(S)
MULTIPLIER
SVC S XC
CODE WAVE
(C)
MULTIPLIER
FIGURE 12. Multiplication system in which speech
wave is multiplied by coding wave.
the TDS elements, the time scale of the
scrambled speech not being further broken up.
If they are switched nonsynchronously, how-
ever, the time dimensions will be further broken
up, as will be seen subsequently. Combinations
of nonrepeated code TDS and rapidly switched
split-band coding can be made to afford a very
high degree of privacy. The two kinds of
coding, of course, must not be so interrelated
that one furnishes clues for the other. If, for
instance, a certain pole-piece were syste-
matically associated with a certain split-band
code the total privacy of the combination might
be impaired rather than enhanced. A coding
method for avoiding this difficulty is described
in Preliminary Report2 No. 21 of Project C-43.
A very special kind of scramble is produced
by a system which consists functionally of
Figure 6 (rapidly switched) in tandem with
Figure 8 (with five bands) followed by an
additional Figure 6: This is not the simplest
form of the system, but it serves to illustrate
the principle. Two frequency scrambles with
a time shift in between produce a particular
kind of two-dimensional scramble in which the
speech is broken up into both time and fre-
quency elements. Each of these elements may
be shifted both in time and in frequency so
as to be out of proximity with other elements
with which they were originally associated
either in time or in frequency. Another way
of accomplishing this kind of scramble would
be a combination of rapidly switched split band
with a separate TDS system in each subband.
A two-dimensional system was described in
the Brown Boveri article3 reproduced in Pre-
liminary Report No. 54 and analyzed in Pre-
liminary Report No. 93 of Project C-43.
For the sake of completeness two other sys-
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
8
SPEECH SCRAMBLING METHODS
tems involving time and frequency shifting will
be mentioned, although as far as is known they
exist only on paper. Suppose a sample of speech
were recorded on tape and then reproduced
at twice the normal speed. It would occupy only
half the time it took to speak the words, but
I I
I I i
CODE WAVE eK)
I I 1
I I
I I
CODED SIGNAL p(S)
LILA 1641II
Pg 11
DECODING WAVE! ( )
KS
DECODED SIGNAL ( ?)
FIGURE 13. Example of multiplication system.
its frequency range would be twice the normal
range. Let the upper half of the expanded
frequency range be separated by a filter and
modulated down to the normal range and used
to fill up the unused time. The directly opposite
but analogous system would involve reproduc-
ing recorded speech at half its normal speed;
the frequency range would then be only half the
normal range. Alternate sections, therefore,
could be modulated up to fill the unused fre-
quency space, thereby keeping the total trans-
mitting time substantially unchanged. In both
of these systems, there would be a delay equal
to the length of one time element.
1.10 WAVE FORM MODIFICATION
1:21us far we have considered systems in
which frequency bands were shifted around
or time elements were rearranged. There are
a few privacy systems which make speech
unintelligible by a direct modification of the
wave form. One of these is shown diagram-
matically in Figure 12. It depends upon a
process whereby two waves are multiplied
together, that is, the instantaneous amplitude
of the resulting wave is the product of the
amplitudes of the two input waves (not the
sum or the difference as is the case in the simple
inversion methods described above). One of
the input waves to the multiplier is speech.
The other is a complex coding wave. If the
coding wave is sufficiently complex the result-
ing scramble is unintelligible. At the receiving
end a reciprocal of the coding wave is derived
and used as a multiplier, thereby restoring the
original speech. Naturally, the coding waves
at the two ends of the system must be in close
agreement, otherwise there will be considerable
VARIABLE GAIN AMP
CONTROL
CKT
FIGURE 14. Level modulation; form of wave form
alteration in which drastic changes in speech
levels occur.
background noise in the decoded speech. An
example of the multiplication system is shown
in Figure 13.
Another method for changing the wave form
is shown in Figure 14. The essential feature
of this system is an amplifier whose gain can
be varied rapidly with time. Drastic changes
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
MASKING SYSTEMS
9
in the level of speech, if they occur rapidly
enough, will make the speech unintelligible. The
level changes might be made according to some
program or they might be made to follow the
CONTROL CKTS
FIGURE 15. Level modulation system in which
speech is first divided into subbands, each of
which is subjected to level changes.
speech wave itself. For instance, extreme com-
pression or expansion could be used. Corre-
sponding gain changes, of course, must be made
at the receiving end.
A variation of this system is shown in Figure
15. Here the speech band is first divided into
subbands, and these are individually subjected
to level changes according to separate pro-
grams.
/N
MIXING
PAD
NOISE
GENERATOR
use very high levels of masking signals to hide
the intelligibility. This makes it difficult to
subtract out satisfactorily: the difficulties are
such that masking systems are more likely to
be found on wire lines than on radio. A few
speculative masking systems are outlined in
the following paragraphs.
One form of masking system is shown in
Figure 16. In this system, two telephone lines
are usNd. At the sending end, noise is added
to the speech in a mixing pad and the combina-
tion is sent over line 1. The noise alone is sent
over a second line and is used at the receiving
end to cancel the noise transmitted with the
speech by simple subtraction. This system has
the advantage that the noise can be completely
random. However, since the enemy might tap
both lines and thereby be able to make the
same subtraction, a variation of this system
consists in distorting the noise in some pre-
determined manner before sending it over the
second line. At the receiving end, this distor-
tion is first nullified so that the noise may be
subtracted. Naturally, the form of distortion
must be unknown to the enemy. It can, of
course, be varied from moment to moment.
Another masking system is shown in Figure
17, which uses only one line. In this system,
noise is added to the line at the receiving end
instead of at the sending end. Again, the noise
can be perfectly random. Since the noise is
generated at the receiving end, the process of
DISTORTION
FIGURE 16. Noise
MASKING SYSTEMS
LINE I
LINE 2
MIXING OUT
PAD
RECIPROCAL
DISTORTION
masking requiring use of two telephone lines.
cancellation can, theoretically, be made very
exact. This system, however, cannot be used for
radio at all because the level of the noise de-
creases with distance from the receiver, while
the level of the signal increases. The inter-
ceptor, therefore, will get good speech signals
if close to the transmitter. With telephone lines
this differential can be kept small.
One of the first schemes which is likely to
occur to a person considering how to make
speech private is to add noise or other disturb-
ing signal to the speech and remove it at the
other end, in other words, to mask the speech.
He will find, however, that it is necessary to
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
10 SPEECH SCRAMBLING METHODS
Another simple masking system is to have
a sequence of tones superposed on the signal
at the transmitting end. At the receiving end,
SPEECH ?D.
LINE
NOISE
MIXING
PAD
MIXING
PAD
NOISE
GENERATOR
FIGURE 17. Method of applying masking noise at
receiving end of communication circuit.
sharply tuned band elimination networks can
be synchronously switched so as to remove the The Vocoder system6, 7 may be made the
tones from the listener's ear. Similarly, short basis for privacy systems of various kinds. The
can be made to occur at irregular intervals
according to a never repeating program. Both
of these systems involve the loss of small por-
tions of the speech, either in the time scale or
the frequency scale.
A system described in Preliminary Report
No. 4 of Project C-43 might be classified as
a masking system, although it might be better
classified as a means of communicating without
the snemy's knowledge.
1.12
VOCODER SYSTEMS
1
BF .
m
1:>-
--
SF
C>.?????
BF
^
BF
,111.???
,-
BF
LINE
BF
SPEECH
TRANSMITS
INPUT
MODULATED
CARRIERS
BF"
????=???
BF
BF
..amen.?
BE
???????.
?????????
mim??>--
BE
BF
BF
BE
>
BF H
SF
BE
BE
BE
BF
I ?
BF
BE
????????
BF
BE
???.-?
BE
BF
.>'". SYNTI-..- . !C
BF
^
BE
BE
BE
di!
BUZZ.
BF
BF
SPEECH
OUTPUT
FIGURE 18. Vocoder system which may be made basis of privacy systems of various kinds.
spurts of noise covering the whole frequency system is shown schematically in Figure 18.
band can be applied at the transmitting end At the transmitting end the speech is passed
and shorted out at the receiving end. The spurts through a series of band filters, the outputs
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CHANNEL-MIXING SYSTEMS 11
of which are individually rectified to form a
fluctuating d-c signal. These signals are indi-
vidually modulated in such a way that they can
all be sent over a single transmission path.
At the receiving end synthetic speech is
manufactured in accordance with the signals
transmitted over the line. A source of noise
which covers the whole frequency range is
passed through a set of band filters similar to
those at the transmitting end. The output of
each of these filters is controlled so that it is
the same level as the level of the speech in the
corresponding band at the transmitting end.
This is accomplished by separating the signals
in the various channels, detecting them and
using the resulting fluctuating direct current
to control the variable gain amplifiers in their
respective channels.
The noise is of two types, depending on
whether a voiced or unvoiced sound is to be
simulated. For an unvoiced sound, it is a hiss-
like thermal noise. For a voiced sound it is
a buzz which consists of a series of harmonics
covering the whole frequency range. A separate
carrier is used to transmit information for
operating this part of the system. At the trans-
mitting end the pitch used by the talker is
measured and this information is used to
control the pitch of the buzz sound. The absence
of a pitch signal switches the hiss sound into
the system.
This system by itself, of course, is not pri-
vate, since the enemy can build a similar system
and use the signals to regenerate speech.
Privacy must be achieved by operating on the
channel signals. One method is to permute the
channels at short intervals according to a
prearranged program. Another method is to
put a TDS system into the line, or into each
channel separately. A still more effective
method of this type is to apply a two-dimen-
sional scramble, such as was described earlier,
to the channels so that signal elements are
displaced in both time and frequency.
1.13
CHANNEL-MIXING SYSTEMS
Thus far, the methods we have examined
apply to a single transmission path. There is
another class of privacy system which depends
on using a multiplicity of paths. This is, of
course, inefficient if only a single message is
to be transmitted. However, the method can
be applied to cases where a number of channels
exist between two points and a number of mes-
sages would normally be transmitted over these
channels simultaneously.
CHANNEL 3
3, 4,I
FIGURE 19. Channel mixing in which multiplicity
of paths is involved.
Figure 19 shows one form of channel-mixing
system. Here three channels are shown
connected to the three segments of a com-
mutator. Three brushes on this commutator are
BF I
CHANNEL I
BF2
BF 3
BF I
CHANNEL 2
BF 2
BF 3
BF I
CHANNEL 3
BF 2
BF 3
SWITCH
FIGURE 20. Subband channel mixing.
connected to the outgoing channels which are
thereby caused to pick up one channel after the
other on a time division basis. Each channel
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
12
SPEECH SCRAMBLING METHODS
contains parts of messages from all three
channels. The commutator, of course, is too
simple to be very effective and would, in prac-
tice, be replaced by a permuting switch capable
of switching according to a more complex pro-
gram. One or more of the channels may be
filled up with the noise or spurious speech from
a recording or other similar source.
An analogous system which divides the mes-
sages on a frequency basis is shown in Figure
20. Here each channel is passed through three
band filters which divide the speech into sub-
bands. Each of the outgoing channels contains
subbands from each of the incoming channels.
To increase the privacy, a permuting switch
is shown which rearranges the subbands on a
time division basis. If only one message is to
be transmitted the other channels can be filled
in with noise or spurious speech.
1.14
SUMMARY
The above examples cover fairly completely
the range of schemes that might be used to
scramble speech at audio frequencies. In subse-
quent chapters we will examine each system
from the decoding standpoint. To facilitate
reference to the various systems, they are
summarized in Chapter 4, Table 1.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and A proved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Chapter 2
TIME DIVISION SCRAMBLING SYSTEMS
2.1 INTRODUCTION
THE TWO MAIN DIVISIONS or characteristics
of speech are the frequency dimension and
the time dimension. Either or both of these
components of speech may be rearranged or
altered before or during transmission to insure
privacy. At the receiver, the order of scram-
bling is reversed so that the original sense is
recovered.
A privacy system developed to a high order
during the war, known as time division scram-
bling [TDS], operates on the time character-
istics of speech. In this system successive
sections of speech, each m seconds long, are
divided into n short time elements, and these
n elements are sent in a scrambled time
sequence. The elements are much shorter than
a syllable, so that each word is cut up and
received as short bursts of energy in the wrong
order.
All the summaries which follow deal with
TDS systems.
4'2 PORTABLE TDS SYSTEMS?PROJECTS
C-1 AND C-1A
While several forms of speech scramblers
had been in use on radio circuits before 1940,
there was none which was small and light
enough to be suitable for mobile warfare. Work
done in the summer of 1940 at the Bell Tele-
phone Laboratories indicated that the need
might be met in the form of time division
scrambling by a small magnetic-tape recorder.
The purpose of Projects C-1 and C-1A, there-
fore, was to investigate the possibilities of pro-
ducing such a lightweight and effective privacy
unit based. on the TDS principle.
The fundamentals of this scheme were not
new. It was known that such privacy should
be very effective without appreciable expansion
of the original frequency band, but the idea
had not been developed for two reasons. First,
it could not be used for commercial telephony
because scrambling in time requires that the
speech be stored for a certain time which
introduced more delay than can be tolerated
by inexperienced users. Secondly, there were
several difficult technical problems - that had
not been solved.
Design ideas were collected by discussions
with various specialists and a particular ar-
rangement was visualized before the work was
started. This set an objective and helped in
segregating several problems that could be
handled more or less individually and simul-
taneously. The more important of these in-
cluded:
1. Development of a way to mount magnetic
tape on the edge of a disk without introducing
serious magnetic irregularities.
2. Development of a start-stop commutating
arrangement for rapidly switching magnetic
tape recorders and reproducers.
3. Development of a much more stable 24-
volt motor drive than was then available.
4. Development of a compact amplifier unit
to meet the special requirements of this system.
5. Development of a suitable switching ar-
rangement for setting up scrambled combina-
tions.
As the project progressed, the original de-
sign was changed where advisable and details
were added. The five months set for completion
of the project made it necessary to avoid any
suggested changes that would appreciably
delay the construction of models.
While development of experimental equip-
ment was in progress, a separate group was
investigating how various design factors would
affect possible requirements for future equip-
ment. These investigations were of two sorts.
The first was concerned with the degree of
privacy afforded by the equipment, and the
second with factors affecting the final quality
of the speech.
The degree of privacy was investigated as
a function of the number of scrambling inter-
vals within a cycle and the length of a cycle.
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
13
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
*
14
TIME DIVISION SCRAMBLING SYSTEMS
In this connection a rather thorough study was
made of methods to "crack" the TDS privacy
under conditions ranging from limited facilities
and personnel to extensive laboratory equip-
ment handled by experts. The conclusions were
that cracking was rather unlikely unless
attempted by experts with special equipment,
and in this latter case the five-unit design
developed for experimental use might be
elements associated with the scrambling and
reconstruction process affected the final quality
of the speech. The most important conclusion
here was that the degree of stability afforded
by the special motor designed for the experi-
mental TDS unit met the requirements very
satisfactorily. The indications were that it
would not be difficult to provide a final design
which would introduce little degradation.
FIGURE 1. General view of TDS system developed under Project C-1.
cracked within minutes. In spite of this, it was
believed that the five-unit design would be very
effective when used on radio telephone circuits
for the direction of maneuvers that are com-
pleted within minutes. This would suggest use
for such links as plape-to-plane, .plane-to-
ground, and tank-to-tank.
The investigations concerned with speech
quality included such things as the way in
which accuracy of synchronism, start-stop
brush operation, and the position of various
With the experimental TDS unit produced
during the project about fifty useful combina-
tions could be set up on the five front-panel dial
switches. When used in association with radio-
telephone equipment, connections were required
to the transmitter, receiver, and power supply.
The system used 100 watts at 24 volts, but
would operate over a voltage range of approxi-
mately 22 to 30. The weight was about 40 lb
and the dimensions were 73/4 in. high, 9 in.
deep, and 20 in. long.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
PORTABLE TDS SYSTEMS?PROJECTS C-1 AND C-1A 15
2.2.1
Demonstrations
In March and April 1941, four experimental
TDS units were demonstrated in Washington
before members of the National Defense Re-
search Committee [NDRC] and representatives
of the Army and Navy. The units were set up
of a drum or wheel on the periphery of which
is mounted a wide magnetic tape alloy. Around
the wheel and in contact with the tape are
eleven pole-pieces, mounted so that all traverse
the same narrow band of the tape. The pole-
pieces comprise one eraser supplied with direct
current for magnetically saturating the tape to
FIGURE 2. Tape wheel of C-1 TDS unit showing placement of individual reproducers, etc.
first in separate rooms at the Carnegie Insti-
tution and later one unit was set up in the Navy
Building and another in the Munitions Building
with connections to telephone extensions in
both places. The equipment was demonstrated
to representatives of the Army and Navy as
well as to members of the British Military
Mission and the Canadian Air Ministry.
2.2.2 The TDS Units
The essential part of the TDS units consists
of the magnetic recorder-reproducer made up
obliterate previous recordings, one recorder
supplied with speech current, and a 1-ma d-c
depolarizing current and nine reproducer pole-
pieces spaced 36 degrees apart.
Associated with each reproducer pole-piece is
a segment of a commutator and a contact to a
switching system so that the order in which
the recorded speech culirents are taken off for
transmission by radio or wire can be changed
from the order in which the recording was
made.
The intervals of speech each 0.30 sec long
are divided into five sections of 0.06 sec dura-
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
16
TIME DIVISION SCRAMBLING SYSTEMS
FIGURE 3. Commutator details.
tion. The instrument is described in consider-
able detail in the final reports of the project.
The final reports, 9 of Project C-1A, a con-
tinuation of Project C-1, describes methods of
cracking the TDS system, gives an estimate of
the time required to crack it, an evaluation of
the privacy secured by it, and recommendations
concerning future developments, some of which
resulted in Projects C-50 and C-65.
2.2.3
Conclusions
The project demonstrated that TDS could
provide a useful degree of privacy in a portable
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CONTINUOUSLY CODED TDS?PROJECT C-50 17
device of reasonably small dimensions and
weight. Further developments to meet military
needs were pursued by the Services themselves.
The problem of speech privacy was attacked
in other NDRC projects along many other lines,
as evidenced by summaries of other Division 13
projects in this volume, but to the end of the
war TDS remained the only small and portable
PRESS TO TALK SWITCH
_
equipment by provisions for automatic code
changing every code cycle. In the winter of
1942 means for doing this were suggested and
Project C-501? was set up to develop these
means. The specific object was to provide Imodel
equipment so that the privacy obtained by
elaborating the TDS principle to its practical
limit could be studied.
?3
LATCH
BRUSHES
AMLLIFIER
2
RT
RT RT
..S11111.f.0.0315'
'
0 z
Cr 0 0?
Om
ct,
POWER
N I- SWITCH
m 0
Oz-
CODE
\ SWITCHES
- 7_
PULSING
CAM
RT
11T
TO RADIO TRANS
RELAY CIRCUIT
TO
FILAMENTS
00
MOTOR
2050
+ 250 V
0 0_
MOTOR
GENERATOR
FIGURE 4. Simplified circuit diagram of C-1 TDS system.
device for scrambling speech that was in fac-
tory production.
2.3 CONTINUOUSLY CODED TDS?
PROJECT C-50
The report on Project C-1A suggested an
improvement of security provided by TDS
VOLUME
CONTROL
HEAD SET
o
-z
o
CC
In the manually operated TDS system, the
nine pole-pieces which "take off" the recorded
segments of speech are connected to a commu-
tator and switch by which the operator can
change the order in which the successive ele-
ments are transmitted to the lines or to a radio
transmitter. The object in using different ones
of the various pole-pieces is to retard or delay
successive elements of the recorded message or
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
18
TIME DIVISION SCRAMBLING SYSTEMS
speech by different amounts. When two speech
elements which were originally in succession
are delayed by different amounts they are dis-
placed in time with respect to each other. They
may be merely interchanged with respect to
each other or they may be separated widely by
inserting other speech elements between them.
The scrambled speech elements are returned
to their proper order in the unscrambling proc-
42-t tIt]
Ft titi1111 LINE
0
0
og
of
08
0
Oc
00
IL
3 4 5 6 7 8 9 10
if /
COMMUTATOR
CODE
CONNECTOR
Code used is:
Commutator bars
Speech units
Coils
cording pole-piece, and an erasing pole-piece.
In the C-50 TDS system, each pole-piece is
capable of recording, of erasing, and of repro-
ducing. Such a system is known as a ten-ele-
ment system because ten speech elements are
scrambled in each code cycle. In the C-50 sys-
tem, two interlaced ten-element codes are em-
ployed in each code cycle.
If the interconnection of pole-pieces and
abc de 19h,
0-1. 1 I I 11111
1 2 3
4 2 1
beg
of
-x
X
X
oe
0 d
0
X
0 bX
a
X
X
4
6
5
8
6 7
3 10
h b
(I 234567891
8 9 10
5 7 9
h g f
CODE
CONNECTOR
COMMUTATOR
FIGURE 5. TDS coding connections. Transmit machine codes on "reproduce," while receive machine decodes
on "record."
ess by delaying each one in a selective manner
so that the total delay contributed by scram-
bling and unscrambling is the same for each
element. Elements scrambled with minimum
delay are unscrambled with maximum delay,
and vice versa. The speech, when reassembled,
has been delayed by the sum of the minimum
and maximum delays. In the C-50 TDS system
this total delay is 700 msec.
2.3.1
The C-50 TDS System
In the TDS units developed under Project
C-1, there were nine take-off pole-pieces, a re-
commutator segments remains fixed, the code
or key is fixed and the transposition scheme is
repeated with each revolution of the brush over
the twenty commutator segments. This takes
place in 750 msec. By means of punched code
cards, the C-50 TDS system can be operated in
this manner, if desired.
2.3.2 Continuous Coding
The continuous coding equipment makes two
changes in the interconnection of pole-pieces to
segments in each revolution. The connections
to odd-numbered segments remain fixed until
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CONTINUOUSLY CODED TDS?PROJECT C-50 . 19
the commutator brush leaves the nineteenth
segment;? when the brush starts on segment
No. 1 an entirely different set of interconnec-
tions is used in the next revolution by the odd-
numbered segments. The pattern for the even-
numbered segments begins with the twelfth
segment and extends around the commutator
through the tenth segment; when the brush
required for the magnetic tape to move from
one reproducing pole-piece to the next. The
portions of speech available for reproduction
when the brush is on odd segments are, there-
fore, never available when the brush is on even
segments.
The patterns of interconnection between pole-
pieces and commutator segments must follow
FIGURE 6. Details of C-50 TDS Machine.
reaches the twelfth segment again a new pat-
tern is ready for the even segments. In this way
the coding for alternate segments constitutes
two independent systems of transpositions, each
changing every 750 msec but displaced from
each other by 375 msec.
The odd-numbered and the even-numbered
commutator segments can be treated separately
because the time taken for the brush to cover
one segment, 37.5 msec, is exactly half the time
certain rules in order that the TDS generate a
transposition which is valid, in the sense that
each speech element is transmitted once and
only once. Since speech on the magnetic tape
remains there as it goes past all nine reproduc-
ing pole-pieces, a random choice of reproducing
pole-pieces might pick up the same element of
speech twice or more, and some other element
would be omitted for each repetition.
The kinds of interconnections which give
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
20 TIME DIVISION SCRAMBLING SYSTEMS
useful codes are discussed in Appendix A of
the project final report. The rules worked out
in that appendix are basic in the design of the
automatic coding apparatus which must be so
arranged that the semirandom series of choices
called for in one part of the coding equipment
is scrutinized in another part and revised until
the interconnection finally set up is a valid
transposition.
2.3.3 Number of Codes Available
The complexity of the coding systems gen-
erated by the automatic coding equipment in
the C-50 TDS may be illustrated by the fact
that there are 1,625,702,400 different sequences
of codes for each of the two interlaced systems
or the square of this figure for the combination.
The choice of the particular sequence to be
used is governed by four punched cards. The
initial settings of ten selector switches then
determine the point in the sequence at which
the sequence will start. There are (3,282,972)2
such starting points for each sequence.
From the point of view of those operating
the equipment, the four punched cards and the
ten selector switch settings constitute the key,
since these choices must be agreed upon at both
ends of the circuit.
When the cards and initial settings have been
chosen, the equipment can be started, after
which it provides in each of the interlaced sys-
tems, an irregular order of valid codes from
a possible number of 60,316 codes. In a single
message, or even in a whole day's use with the
same initial settings, only an extremely small
fraction of any code cycle would ever be used.
Each particular sequence runs so long that it
would not begin to repeat before 6,400,000
years.
2.3.4 C-50 TDS Plus Frequency-Band
Switching
Although to the end of the project, decoding
methods developed under other Division 13
projects failed' to crack the C-50 system, it was
found that some trained individuals under fa-
vorable circumstances were able to understand
some of the scrambled speech. Less is under-
stood with fast talkers than with slow talkers
but the amount understood by such trained ob-
servers at normal speech rates leads one to the
conclusion that in a system intended to provide
long-term privacy the TDS principle should not
be used singly but in combination with other
principles.
A combined system should be so devised that
direct listening is of no value and should be
arranged so that an intercepter can not dis-
entangle the two types of scramble and obtain
intelligence by listening directly to one of them.
Such a system is provided by the C-50 TDS
combined with and controlling a rapidly
switched frequency-band shift system (A3) so
arranged that the C-50 TDS coding equipment
controls the sequence of A3 codes. In this ar-
rangement the A3 codes may be switched as
often as every 37.5 msec. No useful intelligence
had been extracted from the resultant scramble
in direct listening tests up to the time the final
report on Project C-50 was written. Further-
more the difficulty of decoding the scrambled
speech by other methods was expected to be
materially increased. Although the combined
C-50 TDS and A3 systems weighed about 2,200
lb and required a power of 1,500 watts, its
probable privacy and its availability were such
as to be recommended for use in corps-to-
division communications and in similar Navy
situations. This double scramble system is de-
scribed in Appendix F of the final report of
Project C-50. Actual work on such a system was
carried out under Project C-66.
2.3.5 Appendices to Report of Project C-50
The following titles of the several appendices
to the final report of Project C-50 give an indi-
cation of the material to be found in the report
itself but not summarized here.
Appendix A Basic TDS Principles
Appendix B Automatic Code Generating
Appendix C Number of Codes and Code Se-
quences
Appendix D Detailed Description of C-50
Equipment
Appendix E Operating Instructions
Appendix F C-50 and A3 Systems Combined
Appendix G Project C-50 Drawings
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FREQUENCY-TIME DIVISION SYSTEM?PROJECT C-66 21
2-4 FREQUENCY-TIME DIVISION SYSTEM?
PROJECT C-66
In 1942 it was known that the speech security
provided by the TDS units developed under
Project C-1 was short unless automatic coding
was used as developed in Project C-50. It was
known, too, that only short-time security was
provided by the A3 scramble based on permuta-
tions of frequency bands. There was reason to
believe that A3 in tandem with TDS might pro-
vide a much higher order of security and
Project C-66n was set up to study this.
2.4.1 Accomplishments of the Project
It was found that A3, switched even as often
as every 60 msec, in tandem with the portable
fixed-code TDS, gave an increase in privacy in-
commensurate with the circuit complexity.
When rapidly switched A3 was combined with
the continuously recoded TDS of Project C-50,
however, the degree of security attained ap-
peared to justify recommendation of the devel-
opment of the combination for truck-mounted
use in corps-to-division communication. So far
as is known, this recommendation was not acted
upon.
The actual security and the transmission
features of the combined systems may be sum-
marized as follows:
1. Although it is possible under some circum-
stances for trained observers to obtain some
intelligence from listening directly to the scram-
bled speech from either A3 or C-50 systems
alone, when these are combined practically no
intelligence can be obtained from the scram-
bled speech in this manner.
2. The unauthorized agent would require spe-
cial and complex analyzing equipment to restore
the scrambled speech from the combined sys-
tems. The cracking time had not been deter-
mined on the date of the final report (May 29,
1943). The C-50 TDS alone using nonrepeating
codes had been found very difficult to crack in a
form permitting reproduction of the message,
and it was the opinion of the personnel of
Project C-43 (which was largely concerned with
cracking methods and which became expert in
this technique) that the cracking of this TDS in
combination with and controlling the A3 would
be much more difficult, since the A3 codes ob-
scure the matching of the speech elements.
Even if this can be done successfully there ap-
pears to be a major development problem with
respect to reproducing the message from the
reassembled photographic traces.
3. The c-50 TDS plus AS provides transmis-
sion quality of a useful grade. Under limiting
conditions, however, the signal-to-noise ratio
must be about 7.5 db greater than that required
when the privacy system is not used. Under
average conditions articulation tests showed
that the C-50 TDS plus A3 system was equiva-
lent to a reference circuit without privacy hav-
ing a bandwidth from 250 to 3,000 cycles and a
signal-to-noise ratio of about 14 db.
2.4.2 Other Studies under Project C-66
The transmission quality of devices combin-
ing frequency scrambling with time delays pro-
vided by means of magnetic tape was found in
this investigation to depend upon control of the
following factors:
1. Modulation products giving rise to non-
linearity.
2. Flutter from speed variation in magnetic
tapes.
3. The signal-to-noise ratio of the overall sys-
tem.
4. The transmission frequency characteris-
tics.
5. Switching effects.
Detailed analyses of these controlling factors
are found in the final report of the project.
Among other systems and schemes for ob-
taining privacy by time and frequency scram-
bling considered in the course of Project C-66,
the following deserve mention:
1. A re-entrant frequency band shifter.
2. A two-dimensional scrambler employing
frequency band delay plus a re-entrant fre-
quency band shifter plus frequency band delays.
3. A two-dimensional scrambler employing a
re-entrant frequency band shifter plus fre-
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
22 TIME DIVISION SCRAMBLING SYSTEMS
quency band delays plus a re-entrant band
shifter.
4. A two-dimensional scrambler employing
A3 privacy and five magnetic-tape delay circuits
of different delay values.
tion expires. If a mission of mobile units takes a
greater time than this protected period, changes
in the code should be made during the mission.
Only enough codes should be available to afford
the desired protection. More codes than neces-
FIGURE 7. Exterior view of Model B code-changing unit attached to D-150285 TDS unit.
2'5 CODE-CHANGING ATTACHMENT
FOR THE C-1 TDS UNIT?PROJECT C-65
The final report of Project C-1A" suggested
that the security of the TDS speech scramblers
would be improved by frequent changes of code
cards. In 1942 a variety of means had been sug-
gested for accomplishing this by an attachment
to the TDS unit (D-150285) then being pro-
duced for Army and Navy. Project C-65'2 had
as its purpose the development of such an at-
tachment. The background for this work is as
follows:
Since the security afforded by fixed-code pri-
vacy systems cannot be relied upon beyond the
period required by an unauthorized intercepter
to work out the code, it is desirable to change
the code before this minimum period of protec-
sary would provide the enemy with too much
information if a unit were captured.
Under the stress of the circumstances at-
tending an actual mission, the changing of codes
might be neglected unless the operation is fully
or partially automatic. If only partially auto-
matic, the operation should require only simple
and positive motions, such as pushing buttons
or pulling levers, to be carried out on command.
Two designs were selected from the many
considered and two units each of these designs
have been constructed. One design provides for
electrical operation under control of a timer,
though manual operation is possible; the other
design is arranged for manual operation but
could be converted to automatic operation by
further development. The correctness of the
operating principles has been checked by tests
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
s a
;-es
on.
3rd
es-
ch
at-
les
Ily
31e
ns ns
id.
fly
ns
or
Ler
nt
by
he
;ts
TELEGRAPHY APPLIED TO TDS?PROJECT C-55 23
on TDS units. Choice between the two will de-
pend on military requirements and manufactur-
ing considerations.
The two models are functionally equivalent
since each provides a choice of twenty double
codes, and the particular sets of twenty from
the several hundred available may be changed
between missions. In the automatic model, codes
are set up by means of ninety small relays, con-
trolled by contacts made through two perforated
FIGURE 8. Model C code-changing unit with case
removed; back and top view.
volume and, for comparable materials, about
half the weight of the TDS unit. Both models
could be operated by a single motion of a gloved
hand.
2.6 TELEGRAPHY APPLIED TO TDS--
PROJECT C-55
4 Project C-5513 was undertaken at the request
of the Signal Corps early in 1942 to determine
the advantages and disadvantages (if any) of
incorporating means for tone telegraphy in con-
nection with TDS equipment which had been
developed for the Services. At the same time
the question was raised as to whether the use of
telegraph might not jeopardize the privacy of
the device for speech. This was based on the
idea that the TDS code might be recovered more
quickly from scrambled telegraph signals than
from scrambled speech signals. It was impor-
tant to answer this question to determine
whether restrictions would be needed on the
use of telegraph.
The questions to be answered may be sum-
marized as follows.
1. Is TDS privacy less for telegraph than for
speech? That is, will the use of telegraph
sheets, similar to player-piano rolls, with twenty
codes per sheet. In the manually operated model,
a mechanism pushes two code cards, out of two
groups of twenty contained in loading boxes, to
close two sets of spring contacts according to
the arrangement of perforations in the code
cards.
The automatic model operates on 24 volts,
drawing 0.8 amp between changes and 1.5 amp
during changes.
The automatic model is about 10 per cent
less than the TDS unit in cubic contents, and,
for comparable materials, of about the same
weight. The manual model has about half the
FIGURE 9. Model B die for punching code masks.
through TDS tend to expose the code and thus
reduce the privacy for subsequent telephone
use?
2. Is TDS privacy for telegraph critically de-
pendent upon rates of hand sending and lengths
of TDS time elements?
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
24 TIME DIVISION SCRAMBLING SYSTEMS
3. What impairment to telegraph transmis-
sion is caused by TDS?
4. Is it feasible to apply machine telegraph
sending to TDS?
With regard to the relative privack of tele-
graph and speech, the data if taken literally
indicate a slightly greater privacy for telegraph
than for speech. The differences in the average
solving times are so small as to be negligible,
however. The solving times both for telegraph
and speech vary from sample to sample, so that
some telegraph samples were solved more
quickly than some speech samples, but the oppo-
site was likewise true, and the range of varia-
tion was about the same for telegraph and
speech.
However, there is a difference of another
nature which is inherent. The two main steps in
the restoration of scrambled speech are, first,
that the code be found and, second, that the
scrambled speech be reproduced through TDS
equipment arranged for the unscrambling code.
These steps also can be used for unscrambling
telegraph, and if they are used there is no dif-
ference in the degree of privacy for speech and
telegraph, since the times taken to ascertain the
codes were the same. But another method might
also be used for telegraph. If an oscillogram or a
paper trace were made of the entire scram-
bled message, then solution of the code would
supply the formula according to which trace
should be cut up and reassembled. If this were
done for speech, the result would still be un-
readable without fairly elaborate equipment;
but a reassembled telegraph trace could be read
by visual inspection of the dots and dashes.
As a practical matter this difference appears
to be of little importance, as the following cal-
culation indicates:
At 25 words per minute, a 100-word message
takes 4 min, or 240 sec. At 0.75 sec per TDS
cycle, this would cover 4/3 x 240 = 320 TDS
cycles, or supply 20 X 320 = 6,400 TDS ele-
ments for manipulation. If the trace were run
so as to allow I/4 in. to each element, or 48 ele-
ments to the foot, which would be extremely
compressed, the trace would need to be 6400/48
133 ft long. Even with practice and concen-
tration probably at least a minute would be
needed to reassemble each cycle, what with the
manual labor of cutting and pasting, or 320 min
in all; that is, it would take about 5 hr for one
person to recover a 4-min message. Additional
people or supplementary equipment would, of
course, reduce this time.
Thus, while the sense of the telegraph mes-
sage can be recovered with less elaborate equip-
ment than is needed for speech, the amount of
clerical work involved would "constitute a pro-
tection lasting longer than the privacy time
which ?should normally be associated with a
fixed-code system.
The answers to the questions posed above
were found to be about as follows.
1. Scrambled hand-sent telegraph signals re-
quire at least as much time to decode as scram-
bled speech; there is therefore no reason to be-
lieve that the application of manual tone tele-
graph to TDS will jeopardize its value for
speech.
2. The privacy of TDS for telegraph is not
critically dependent on rates of hand sending
and lengths of TDS time elements.
3. The limits of telegraph transmission are
reached with about 5 db less thermal (random)
noise with the TDS than without; this means
that the range is reduced unless the signal
strength is increased. The impairment is less
for short elements than for long TDS time ele-
ments.
4. Machine telegraph, both Boehme and tele-
typewriter, give generally legible, though not
letter-perfect, results with single-tone transmis-
sion, if care is used. Better results, though still
not perfect, may be obtained with two-tone
transmission.
The final report" of Project C-55 covers the
individual points raised in the above questions
in considerable detail and includes additional
material, not summarized here, on the question
of the quality of hand or machine sending as
affected by TDS.
SECRET
neclassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Chapter 3
SPEECH PRIVACY SYSTEM DEVELOPMENT
3.1 RCA-BEDFORD SPEECH PRIVACY
SYSTEM
I N THE RCA-BEDFORD speech privacy system,a
a portable system having short-term secu-
rity, the speech wave is coded by multiplying
it by an audio-frequency coding wave. A con-
necting circuit between transmitter and re-
ceiver having essentially faithful reproduction
over a band of 100 to 4,000 cycles furnishes
the required intelligibility and reliability.
3.1-1 Basic Principles
At the sending end a sound wave So is first
"compressed" to a uniform average amplitude
SPEECH
CODING
WAVE
CODED
SPEECH
5K
DECODING
WAVE
1/K
DECODED
SPEECH
SI
FIGURE 1. Coding and decoding processes involved
in RCA-Bedford multiplication privacy system.
level by a special compandor circuit to form a
signal S. The signal S is then multiplied by
a suitable audio-frequency coding wave K to
form a coded wave SK which is unintelligible.
The expression "multiplied," as herein used,
a Project C-54, Contract No. OEMsr-592, Radio Cor-
poration of America.?
means that the product wave SK has instan-
taneous ordinates measured from its a-c axis
which are proportional to the corresponding
products of the original waves S and K. This
is illustrated by waves S, K, and SK, Figure 1.
At the seceiving end the coded wave SK is
multiplied by the "reciprocal" wave 1/K (which
is derived from the locally generated code wave
K) to produce the restored speech wave S',
which is ideally like S.
1
SK X ?K = S or S'.
As shown in Figure 1, the reciprocal wave 1/K
has instantaneous ordinates which are propor-
tional to the reciprocal of the corresponding
coding K.
The ordinates of the coded wave SK become
zero each time the coding wave becomes zero.
For these instants the reciprocal wave 1/K
ideally should become infinite. Since this is
impossible in practice, a narrow gap must occur
in the restored wave 5' as shown in the figure,
at each time the wave K passes through zero.
This amounts to an introduction of spurious
signal components, which are largely removed
by a low-pass filter.
The decoded wave 5', which is still com-
pressed, is "expanded" to its original level by
the receiving end of the compandor. The ex-
panded signal So', which is like So except for
losses, is heard in the phones.
The various treatments of the signal are in-
dicated in the block diagram, Figure 2.
3.1.2 Wave Multiplier
The wave multiplier used to multiply audio-
frequency waves S by K and SK by 1/K is really
a balanced modulator which is completely "bal-
anced" in the sense that only the instantaneous
product terms are produced. This balanced con-
dition can also be described by saying that the
output contains only the sideband frequencies
SECRET
25
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
- -
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
26 SPEECH PRIVACY SYSTEM DEVELOPMENT
of modulation; namely, those frequencies which
are the sums or the differences of the frequen-
cies of S and K. Ideally, no harmonics of either
S or K are present in the output. This is an
SEND
MICROPHONE
3 - KC
LOW PASS
FILTER
COMPRESSOR
lator followed by filters to suppress the unde-
sired frequencies. The present multiplication
process could not be carried out in this manner
because the frequencies it is desired to suppress
RECEIVE
RADIO
RECEIVER
So
SK
I- KC
REJECTOR
MIXER
VARIABLE
Isr
MU
TUBES
SK
MULTIPU ER
PILOT
TONE -\
-VARIABLE
WAS
I-K C
DETECTOR
DETECTOR
SOURCE
AND
OF
OSCILLATOR
FILTER
K-WAV
MULTIPLIER
IK
RECIPROCAL
CIRCUIT
SOURCE
OF
K- WAVE
E XPA NDOR
VARIABLE
MU
TUBES
PILOT TONE
I-KG
SELECTOR
DETECTOR
AND
FILTER
I-KC
REJECTOR
RADIO
TRANSMITTER
3-KC
LOW- PASS `?
FILTER
FIGURE 2. Block diagram showing compandor in RCA-Bedford privacy system.
important fact from the standpoint of security.
This process would correspond to modulation
as commonly used in radio transmission, except
that in the privacy system, both the carrier and
the speech waves are suppressed. In radio this
can be accomplished in an unbalanced modu-
s'o
PHONES
occupy the same frequency range as the desired
modulation sidebands.
The special wave multiplier developed for the
speech privacy system employs four small oxide
rectifiers (known commercially as varistors)
operating in their square law range.
SECRET
DeClassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
RCA-BEDFORD SPEECH PRIVACY SYSTEM 27
3.1.3
Compandor
The name "compandor" is derived from the
words "compress" and "expand." It is an old
device designed to improve the signal-to-noise
ratio in communication by raising the level of
transmission of the weaker sections of the
speech signal with respect to the strong sections
of the signal. This is equivalent to compressing
the higher sections. At the receiving end the
various sections of the signal are restored to
their original relative levels.
In the present case the compandor is used,
primarily, to destroy the cadence (or loudness
variation) of the coded signal, and thereby
improve the security. To further this end, a
special compandor circuit was developed, in
which a pilot tone is used to fill the space be-
tween words, and to provide control for the
expanding process at the receiver.
The curve So in Figure 3 represents the am-
plitude, or envelope, of a word of speech. This
is fed into the compressor (i.e., the sending part
of the compandor) as shown in Figure 2. A
filter removes any 1,000-cycle speech compo-
nents, and then the output of a 1,000-cycle
oscillator is added in the mixer. This gives the
combined envelope shown as "So ? tone" in
Figure 3. The amplitude of the tone is about
10 per cent of that of the loudest section of the
speech. The output of the mixer is detected,
filtered to remove the audio frequencies, and
then used to vary the bias of a pair of push-pull
variable-mu tubes which amplify the mixed
signal. This bias control is such as to make the
combined signal S have a substantially constant
loudness as shown at S in Figure 3. Note that
the lower speech levels are raised. This signal
contains a variable amplitude of 1,000-cycle
tone, as shown at T. The signal S is then coded
by multiplying by the code wave K, and trans-
mitted.
At the receiver, as shown in Figure 2, the
received signal SK is decoded to S'. In the ex-
pander, the 1,000-cycle tone is selected by a
filter, and then detected to control the gain of
a pair of variable-mu tubes. The variation in
gain is such as to restore the amplitude of the
tone component of the output to a constant
value, and simultaneously restore the speech
level to its original proportions. A filter then
removes the control tone, and a 3,000-cycle low-
pass filter removes the high-frequency distor-
tion components from the phone circuit.
So
TONE
50+ TONE
SPEECH
ist
\mialfth.
#.
,
'TONE
SPEECH
LOUDNESS OF CONTROL TONE
TRANSMITTED
\
FIGURE 3. Envelopes of speech and tone in
compandor.
When the signal transmitted in this manner
is received on a privacy unit, operating with
a code wave that differs substantially from the
code wave at the sending end, the pilot (1,000-
cycle) tone is spread irregularly over the audio
spectrum so that a filter cannot isolate it for
operating the expander to restore cadence.
Neither can a filter be used to remove it from
the phone circuit. The result is an unintelligible
mass of coded speech and noise. Tests show that
to get intelligibility from the decoded signal,
the sending code wave and the receiving code
wave must have a higher degree of similarity
than when the compandor is not used.
Inspection of Figure 2 shows that most of
the parts of the privacy unit, used in sending,
are the same as used in receiving. Therefore, in
a send-receive unit, the use of suitable switches
or a relay avoids duplicating these parts.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
28
SPEECH PRIVACY SYSTEM DEVELOPMENT
3.1.4 Generating Code Wave by Delay
Network
The coding wave K in the system is generated
by combining with different changeable polari-
ties the outputs from taps along a delay network
which is fed with narrow pulses from a fixed-
frequency multivibrator, illustrated in Figure 4.
The network contains 80 sections of series in-
ductance and shunt capacitance. A repeater and
an equalizer (not shown in the figure) are in-
serted at 16-section intervals to make up for
attenuation along the network.
f.S1(
SYNCH
A
Is
/
FIGURE 4. Generation of coding wave K.
The multivibrator [MV] supplies repeating
pulses to the input A of the delay network, as
shown by wave A in the figure. The frequency
of wave A is such that immediately after a
pulse has reached the far end of the network,
another pulse is fed into the near end. Then,
neglecting distortion for the present, the volt-
ages at tap points B, C, D, etc., are like A ex-
cept delayed various amounts in time, as shown.
Each tap is shown here with a SPDT switch
so that it can be connected through suitable
buffer resistors to point P, either directly or
through a polarity-reversing amplifier [RA].
(Actually, the switching arrangements are
more complicated than shown here, as will be
explained, but Figure 4 suffices for an ele-
mentary explanation.) The voltage at point P.
therefore, consists of the sums of the various
voltages along the network taken either posi-
tively or negatively, depending upon the switch
potions. Wave H illustrates various pulses
which would combine to form a wave such as I,
which has a variety of widths of lobes. From
this simple illustration, it is clear that a variety
of complex waves, having a repetition rate of
100 times per second, could be produced by
various switch settings.
Actually, the multivibrator tends to produce
a very narrow repeating pulse, as shown at J,
instead of a smooth, wide pulse, as shown at A.
However, the multivibrator shock excites the
first section of the network, resulting in an
oscillatory voltage wave, as shown at L, to
occur at tap A. As the pulse progresses along
the network, the phase distortion of the net-
work (which is very pronounced shortly below
cutoff frequency) causes the pulse to have an
extended oscillatory "tail" as shown by wave M.
The voltage at point P then is the sum of many
waves which are, themselves, quite complex in
shape, and may have lobes with a large variety
of amplitude, as well as widths as shown ,at K
in the figure.
In this privacy system, the instantaneous
voltage of the transmitted signal SK is propor-
tional to the instantaneous value of wave K.
Then, if the coding wave K were allowed to
have peak amplitudes far in excess of its aver-
age amplitude, the average utilization of the
available transmitter power would be very low.
Accordingly, to improve the power efficiency
of speech transmission, the high peaks of wave
K of Figure 4 are limited to amplitudes consid-
erably lower than the original amplitudes,
shown by the dotted peaks. The limiting action ?
is gradual in order to retain some amplitude
variation in the code wave. After the limiter,
a small shunt capacitor serves to smooth over
the discontinuities in the wave caused by lim-
--
iting.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
RCA-BEDFORD SPEECH PRIVACY
-
3.1.5 c,
Synchronization
of the Delay Network
Consideration of the decoding process shows
that it is necessary for the receiving code wave
K to have the same timing as the code wave at
the sending apparatus (after making suitable
allowances for the time of transmission of the
signal). To maintain this condition, a syn-
chronizing pulse is transmitted along with the
signal SK, to control the multivibrator pulsing
the network of Figure 4 when receiving.
Briefly the coded speech signal is inter-
rupted for about 0.001 sec each 0.01 sec and a
synchronizing pulse is inserted. At the receiver
this pulse is selected by virtue of the regularity
of its occurrence (as compared to any lobe of
the coded speech) and used to trigger the re-
ceiving multivibrator which pulses the delay
network which, in turn, generates the code
wave.
3.1.6
Code-Changing Method
The eight code disks which are part of a
rotary code-changing switch may be seen in the
FIGURE 5. Front view of Model RCAL-1 privacy
equipment.
photograph of Figure Each code disk has
twenty insulated silver segments, of three dif-
ferent types, which are located in irregular
5.
ocorddeerdiinskas; .tll
so
of Dthree switchb re ull
tive depending
under the brush
controls two tali's,
two buffer resisia
between the 80
f switches is If
:TI:he drum eiglitheyodee igtis
o
each disk can be 0,
twen*y possible posit.,1
the disks is rotatabl
solenoid in steps
d s of
energized at
controlled by a
fixed to to the right-band e
brated in 100 equal divis
3.1.7
each originalbot speech frecitleASocsoiwo701N
Auxiliary Cornpan?t)r 4 -i'
h upwar alld ? ir p a i
each frequericY. j, 000st of (11' AtiL
t
A Oila Efill 1
cOo theertt Al..4
iji MOd
icq.Ueerlr
csodifeteCe
wave. This Method , clifiti oite thtte?'
Therefore,
igibility obtained bY"
Ydforbey of the sPeee"
dwave SK is due to the
, it is believed tba,,. a to th?ti
Oderice ech to NI.
iistenill;f
the be q41
the til bled
the cadence of the sffe
ginning of
special
and therefore to irriPrevtpriefly seetN-
this suonnarY W3? - -cl,
p.ecial compandor described cievelopi,.:1 t
In the coding process used y c el
3.1.8 Ott oeVeati4
Weakness of Sil
thepliIend F
by a section of sPeeediled wave e; toilltilt,
codediguwreav6e, sac:. dTeb::: e:wc:rvoessilses7c:.?,,,u
Code Wave5 ._
each time the code W9' e 45. Si-
crossovers prodUced IV -1"-
d by the same sectiori .
when ,5,, crosses itS
corr ill thi-
-rn tiOS Wa 4v-kiti. '1..
Pend e) it"--
ti,_
41-1
different section of speech vi?V -xe
a e Sp whila},4, ..i;
axis
results in coded wave Sb-157: ""-- es v
tiplie of code t)
and. also
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
30 SPEECH PRIVACY SYSTEM DEVELOPMENT
with crossovers in wave SaK, but other cross-
overs do not agree.
At SK are superimposed several sections of
speech wave coded by identical sections of code
wave, such as would occur with the repeating
code wave of Model RCAL-1. This is substan-
tially the image seen in an oscilloscope picture
of the coded signal when properly synchronized
by the transmitted synchronizing pulses. In-
spection of this image readily reveals the prob-
FIGURE 6. Wave forms demonstrating weakness
of short repeating code wave.
able location of the crossovers of the code wave,
and also indicates the shape of the coding wave.
This is particularly true if a large number of
waves are superimposed, as seen on an oscillo-
scope with a long-retentivity screen. It has
been demonstrated that a rectangular wave, as
shown at can be used effectively to decode
a message transmitted by the code wave K.
Hence, it is only necessary to determine, and
make suitable use of, the location of the cross-
overs of the code wave to crack the message.
The code wave of Model RCAL-1 has (by
count), on the average, about 25 crossovers
which repeat at intervals of 0.01 sec. The cross-
overs are spaced at irregular intervals, depend-
ing upon the settings of the code switches. The
wave is composed of the various harmonics of
the 100-cycle fundamental from about 300 to
2,500 cycles per second. The harmonics have
various phases and amplitudes. This code wave
is changed, in part, each 11/2 sec through a
5-mhzr cycle by the clock-driven rotary switch
which contains the eight code disks mentioned
above. Ten of these small partial changes, oc-
curring in 15 sec, may cause a complete change
of all contacts. Therefore, only sections of about
5 sec of the message would be cracked by a
single code wave.
Although considerable apparatus of a very
special character would be needed to actually
crack a message coded with such a repeating
code wave by making use of the repeating pat-
tern of crossovers in the coded wave, as deter-
mined by statistical observation, nevertheless
it must be appreciated that a suitable accurately
calibrated oscilloscope could be used to observe
the coded wave and determine the timing of the
crossovers of the code wave, and that a suitable
special apparatus could then be adjusted to
produce a decoding wave such as K' of Figure 6
to crack the message. Furthermore, there is a
feasible plan for an apparatus to do the entire
job automatically. Hence, no coding wave which
repeats in a reasonable time can provide a high
degree of security against an able enemy.
For the sake of completeness of this discus-
sion, it should be pointed out that a message
coded by a code wave such as K, in Figure 6,
can be decoded by using a receiving code wave,
such as K", which differs considerably from K.
From observation, it is estimated that if most
of the crossovers of the receiving code wave
occur within 20 or 30 per cent of the time of
occurrence of the crossovers of the sending code
wave, the message can be cracked even when
the compandor is used. (The per cent value used
here is based upon the intervals between ad-
jacent crossovers in the sending code wave
being 100 per cent.) Also, a few extra cross-
overs in either code wave, having no corre-
sponding crossovers in the other wave, may be
tolerated. With such a wide tolerance in the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
RCA-BEDFORD SPEECH PRIVACY SYSTEM
31
cracking code wave, it is not surprising that in
Model RCAL-1, which uses a repeating code
wave having an average of only 25 crossovers,
a short message can be cracked in a short time
by "playing" with the code disks, or switches,
at random.
Since all limitations of security of Model
RCAL-1 with the compandor arise directly, or
indirectly, from the repetitive character of the
coding wave, the use of a nonrepeating code
wave would appear desirable.
3-1.9 Dual Delay Networks for Generating
Long Code Wave
In a system providing longer security, the
period of the code wave could be made 0.4 sec
(as compared to 0.01 sec) by using two delay
networks operating at slightly different pulse
frequencies to generate the code wave. This is a
purely electrical device. Then the mechanical
apparatus for changing taps on the networks
can operate at the relatively low speed which
causes a substantially complete change in each
0.4-sec interval, and thereby prevent the code
wave from repeating itself until the .mechanical
system has run through its complete cycle. The
time for this is over an hour.
The dual delay network appears to be a very
economical electrical device for generating a
code wave with a period as long as 0.4 sec. To
generate a wave of this period and maximum
frequency directly by a single delay network,
would require about 3,000 LC sections.
3.1.10 Motor-Driven Tap Switch with
One-Hour Period
In,the dual delay system, it is required that a
critical number of taps on the dual delay net-
works be changed each 0.4 sec to prevent a repe-
tition of the code wave 2.5 times a second, which
would allow a statistical study of the coded
wave SK to reveal information as to the loca-
tion of crossovers in the code wave K. This is
accomplished by a three-speed motor-driven
rotary switch.
The switch, designed for the proposed long-
security system has nine code disks and brush
holders instead of the eight in Model RCAL-1.
The 45 SPDT switches provided are connected
in irregular order to control the 84 taps in the
dual delay networks. These nine code disks are
rotatably mounted with individual detents in
groups of three on three separate drums. The
three drums are geared to run at slightly differ-
ent speeds, which are, respectively:
iSi = 6 rpm,
82 20
= 6 X ?21 = 5.71 rpm,
20
Ss = 6 X ?19 = 6.31 rpm.
To the left of each group of code disks is a
timing disk which is fixed to the drum so that it
controls all three code disks in its group. Each
of three 40-tooth gears is rotatably mounted on
a counter shaft, but is restrained from relative
rotation by an eight-position detent. These
three detents allow the three timing disks to be
independently adjusted to their proper starting
positions by hand. The timing disks are cali-
brated, and numbered in 20, 21, and 19 equal
divisions, respectively, to agree with the detent
positions on the counter shaft acting through
the three different gear ratios. All code disks
have twenty positions on the drums, indicated
by letters.
The speeds of the three groups of code disks
are such that the system requires about 1 hr
6 min to run through a complete cycle, so that
all groups reach their starting position simul-
taneously. Therefore, by resetting the individ-
ual code disks to a new code each hour, a non-
repeating code wave is provided. Any two
groups of the disks go through a cycle in about
3 min. Then, if the effect of the other group of
three disks upon the code, wave were suffi-
ciently small, the code wave would effectively
repeat about twenty times each hour, and be-
come accessible to the enemy.
Tests, however, made with Model RCAL-1,
operating with the compandor and with a tem-
porary motor-drive for the disks, showed that
with three of the eight disks off code only 6 per
cent of words were understood. (Each word was
repeated three times.) With two of eight disks
"off," 25 per cent were correctly understood.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
32 SPEECH PRIVACY SYSTEM DEVELOPMENT
To keep the motor in the receiving apparatus
in synchronization with the motor at the send-
ing station, both synchronous motors are driven
by 60-cycle power whose frequency is controlled
by a 145-kc crystal.
Probable Security of the System
Based on tests made on the Model RCAL-1
with compandor and a temporary motor-drive,
it is concluded that, to obtain from a captured
machine adequate intelligibility to crack a mes-
sage, the enemy would have to have at least six
of the nine code disks in the correct position.
The probability of this condition being obtained
in a single trial, at random, is 1/889,000.
It is estimated that at least 3 sec would be
needed to set up and try each of the many pos-
sible code disk positions, even if elaborate spe-
cial means were built to allow orderly adjust-
ment of the relative positions of the disks while
running. (The time for trying each code setting
is made longer because of having to make a
short exploration for correct phase of the entire
disk assembly.) Hence, the average time for
reaching the condition for six code disks right
is:
3 X 889'000
Time ? ? 370 hr.
2 X 60 X 60
(The use of more cracking setups would shorten
this time.)
If this time is deemed inadequate to provide
the desired security, it could be greatly ex-
tended by adding a few more code disks. An
alternative method would use a selector switch
of the radio-band-selector type for manually
changing the connections between the motor-
driven switch and the taps on the delay net-
work. The setting of this switch would be part
of the code.
No reasonable method of cracking messages
sent by this system, other than the trial method
above, occurred to the RCA engineers. Bell
Laboratories' engineers (Project C-43) and
others were given complete verbal descriptions
of the proposed system, and invited to find some
property of the coded wave by which it might be
decoded. No likely property was revealed.27 Of
course, it cannot be known with certainty that
the signal could not be cracked eventually by a
shorter method.
By contrast, the basic weakness of the Model
RCAL-1, with its repeating code wave, was
known and reported very early, that is, well
before design was begun. The clock-driven code
switch was included with the expectation that
it would only make cracking a more laborious
prows. (After the model was built, it was
found that a message could be cracked by "play-
ing" with the code disks somewhat quicker than
originally expected. This was because it had not
been appreciated how different the receiving
code wave could be from the sending code wave
and still give appreciable intelligibility.)
In studying the probable security of the pro-
posed system, it should be remembered that the
signal S (which is coded to form SK) usually
contains a very substantial amount of the 1,000-
cycle compandor control tone. Offhand, this
fact would seem to offer the most likely ap-
proach to a reasonable method of cracking. If
this were found to be so, it would be necessary
to use some other apparatus to replace the corn-
pandor. Two different devices are available but
they are not attractive.
3.1.12 Present Status of the Development
Part I of the final report" of the project gives
an assessment of the speech quality transmitted
by the system and indicates that radio trans-
mitters and receivers somewhat better than
actually used during the war would be required
to deliver good intelligibility. Weights and di-
mensions are to be found in the final report.
At the close of the project most of the new
circuits required in the proposed high-security
system had been developed. Some of these de-
veloped and used in Model RCAL-1 are: the
wave multiplier, the reciprocal circuit, delay
network and tap switching circuits, synchroniz-
ing circuits, synchronizing blanking circuits,
and the compandor.
The following additional circuits were devel-
oped, or tested specifically to be used in the
proposed high-security units: the "clip, multi-
ply, and phase-distort" method for blending the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
HAZELTINE BAND DISPLACEMENT SYSTEM 33
outputs of two delay networks was tested and verse direction for unscrambling and at the
shown to produce a coding wave with more
crossovers and with the initial crossovers ade-
quately "smeared." A synchronous motor suit-
able for driving the code disks had been driven
by an amplifier from a chain of frequency-
dividing multivibrators.
The rotary code switch had been designed,
but not detailed. It included code disks, brushes,
brush holders, and detents, which are very
lar to parts in Model RCAL-1.
3.1.13
Conclusion
It was concluded that the speech privacy unit
proposed would probably have a relatively high
degree of security, that it would have dimen-
sions and power requirements which allow it to
be portable, and that it could be developed with
reasonable expenditure of time and money.
3'2 HAZELTINE BAND DISPLACEMENT
SYSTEM
The Hazeltine speech secrecy systemb is of
the band displacement type in which the speech
is inverted and displaced in frequency to seven
successive positions in an extended a-f band, in
a sequence determined by a coding switch and
punched cards.
3.2.1 General Description of the System
In transmitting, speech is first passed
through a frequency selective network in which
the frequency spectrum is tipped up at the rate
of 6 db per octave. It is then modulated with a
13-kc carrier and the upper sideband extending
from 13 to 16 kc selected in a band-pass filter.
This is again modulated by a selected sequence
of seven displacement carriers, 1 kc apart from
17 to 23 kc. The lower sideband is then selected,
resulting in inverted speech in a sequence of
bands in a range from 1-4 to 7-10 kc. Amplifiers
are employed in the carrier channel to maintain
the output at the same level as the input.
In receiving, the same apparatus is used. The
speech is passed through the system in the re-
b Project C-15, Contract No. NDCrc-139, Hazeltine
Corporation.
normal speech end of the channel the frequency
spectrum is tipped down by 6 db per octave to
restore the original frequency characteristic.
An electronic switch for keying on the 17-
to 23-kc displacement carriers for 50-msec in-
tervals in a selected sequence comprises a chain
of seven switching tubes. Each of these is ar-
ranged to generate a 50-msec pulse. The termi-
nation of this pulse initiates operation of the
succeeding switching tube. In transmitting, the
pulse from the last of the switching tubes is
returned to the first to make the operation con-
tinuous. The pulses derived from the switching
tubes are delivered to the seven carrier fre-
quency oscillators as selected by the coding
switch and serve to key-on the oscillators.
To synchronize the receiver and the trans-
mitter, the pulse derived from the last of the
switching tubes in transmitting is suitably am-
plified, limited, and filtered to eliminate com-
ponents above 1 kc and then added to the scram-
bled speech at the end of the carrier channel.
In receiving, this synchronizing pulse is sepa-
rated from the scrambled speech and, after am-
plification and limiting, is applied to the first of
the switching tubes. The connection between
the last switching tube and the first is elimi-
nated in the receiver so that operation of the
electronic switch in receiving is initiated by re-
ceived synchronizing pulses only.
To reduce the possibility of actuation of the
electronic switch by spurious pulses, a barrier
circuit in the form of a pulse generator having
slightly less than a 350-msec period, is placed
ahead of the first switching tube. Once a syn-
chronizing pulse actuates the barrier circuit
(and simultaneously the first switching tube)
the barrier circuit becomes immune to further
pulses during its cycle. This prevents any pulses
from reaching the first switching tube until al-
most the entire cycle of the seven switching
tubes has been completed.
3.2.2 Performance of First Two Models
Two models embodying such a system were
completed, tested, and demonstrated to mem-
bers of Division 13. Although it was possible to
obtain speech of reasonably understandable
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
11
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
34
SPEECH PRIVACY SYSTEM DEVELOPMENT
quality after a complete cycle of scrambling
and unscrambling, it was felt that the perform-
ance could be appreciably improved in several
ways.
It was felt desirable to reduce the degrada-
tion of speech quality obtained with the equip-
ment. This degradation was probably caused by
the following factors. The oscillators did not
respond immediately to the keying pulses so
that intervals of several milliseconds were left
at the transition points for the displacement
carriers. This resulted in blanks in the speech
and in transient clicks. The frequency stability
of the oscillators was poor with the result that
synchronization between oscillators in the
transmitter and those in the receiver could not
be held. This resulted in slight changes in pitch
of the speech as the displacement carrier fre-
quency changed. There was also some nonline-
arity present in some of the amplifiers.
It was also found that when as little as 10 db
attenuation was inserted in the line between
the transmitter and the receiver, the receiver
had a tendency to drop out of synchronization
with the transmitter. It was felt that the equip-
ment should be designed to tolerate an attenu-
ation of at least 25 db below the normal level.
No experience had been obtained on the effect
of noise and code interference on the synchro-
nization of the two units. It was felt that rea-
sonable immunity to such interference was an
important requirement of the equipment.
3.2.3 Construction of Third Model
With the experience gained in the operation
of the first two models, the construction of a
third model was undertaken. The objectives
sought in this third model were as follows:
1. Improved oscillator frequency stability.
2. Fast keying on and off of oscillator.
3. Elimination of nonlinearity in amplifiers
in the carrier channel.
4. Substantially flat overall frequency char-
acteristic from 300 to 3,000 cycles per second.
5. Improved immunity to changes of level
and noise in the synchronization of the receiver.
6. Incorporation of a storage battery oper-
ated power supply.
7. Improved isolation and shielding of com-
ponents to avoid carrier leakages and cross
modulation.
8. 4ncorporation of a code switch suitable for
operation with a punched card.
9. Closer approximation to a production de-
sign.
The third model, completed in the latter part
of September 1941, met the above objectives
very well. Speech quality was materially im-
proved over that obtained with earlier models.
Switching transients between successive dis-
placement carriers could not be detected in the
output. The prominence of the sync pulse in the
output was greatly reduced. Measurements in-
dicated that the distortion of the system was
reasonably low. The input to the receiver could
be reduced more than 25 db below normal level
before the receiver dropped out of synchronism.
With high noise levels the receiver remained in
synchronism at least up to the point where the
noise was equal to the signal.
3.2.4 Apparatus Details
The final report15 on the project gives details
of the transmitting and receiving circuits,
means for providing nonscrambled speech when
desired, method of setting up the desired code
by means of punched code cards, an analysis
of the inherent secrecy of the system plus the
chances of cracking it, and suggested improve-
ments.
The equipment weighed 45 lb, required ap-
proximately 1.14 cu ft of space, operated from
6.3 volts and needed 10 amp at this voltage.
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
4.1
Chapter 4
UNSCRAMBLING AND DECODING METHODS
HISTORY
LONG WITH PROJECTS and work primarily
concerned with the development of scram-
bling methods for speech, code telegraph, or
facsimile, projects concerned with unscram-
bling or code-cracking methods engaged a large
part of the time and energy of those associated
with this portion of Division 13 activity. In this
manner the effectiveness of the privacy methods
developed could be tested constantly.
Realizing early in the privacy research con-
ducted under the sponsorship of Division 13
that the ear had very limited capabilities for
analyzing scrambled speech, the sound spectro-
graph was developed by the Bell Telephone
Laboratories to provide speech patterns which
could be interpreted by the eye. In effect this
valuable instrument divided scrambled speech
into its three important dimensions of fre-
quency, amplitude, and time. By its means, any
alterations to the original speech in either fre-
quency or time could be detected and analyzed
with the object of adjusting unscrambling ap-
paratus so that the original speech could be
recovered.
Early in 1941 a rough laboratory model of
the sound spectrograph was demonstrated to
the National Defense Research Committee
[NDRC] and as a result Project C-32 was or-
ganized with the immediate object of producing
such a device in a form that would be useful
for diagnosing and decoding speech scrambling
systems. Such a model was produced and suc-
cessfully demonstrated to representatives of
NDRC, Army, and Navy.
Upon the termination of Project C-32 on
February 1, 1942, it was decided that the work
initiated under that project should be continued.
Accordingly Project C-43, "Continuation of
Decoding Speech Codes," was authorized. The
project anticipated some routine decoding, the
production of duplicate equipment to be used
by the Army and Navy intelligence services,
and further studies of decoding tools and meth-
ods. At that time the Army and Navy were
relying almost entirely upon this project to
furnish the above services until they could be
provided with suitable equipment and could
obtain trained personnel. Based on the needs
of the military, this project was thrice ex-
tended.
.4.
Under the guidance of NDRC Division 13,
the emphasis was placed at any given time on
what was deemed to be most urgent. This is
reflected in the subject matter of the prelim-
inary reports of Project C-43 which were issued
from time to time and which form the appendix
to the final report of that project. In addition
to the specific investigations covered by these
preliminary reports much work was carried on
as the basis for more general coverage of the
field of interception, diagnosis, decoding, and
evaluation of speech privacy systems.
In addition to the general studies mentioned
above, decoding equipment was developed and
models furnished to the Army and Navy. This
decoding equipment included (1) two models of
the sound spectograph, (2) a variable-area pat-
tern machine, and (3) equipment for decoding
two new enemy privacy systems intercepted by
the project personnel at Point Reyes, California.
In each case Army and Navy personnel were
instructed in the operation and maintenance of
these equipments.
Intercept activities of the Project C-43 per-
sonnel included (1) the study of recordings sub-
mitted early in the project by the Federal Com-
munications Commission, (2) exploratory work
at the Bell Telephone Laboratories experimental
radio receiving station at Holmdel, New Jersey,
and (3) exploratory work and routine intercep-
tion of radio telephone transmissions at the
American Telephone and Telegraph Co. radio
receiving station at Point Reyes, California. Re-
ports of the results of the above studies and
recordings of intercepted material were sub-
mitted directly to the interested military au-
thorities.
Many speech privacy schemes were submitted
through NDRC during the course of this proj-
ect. These were studied and evaluated. This
SECRET
35
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
36 UNSCRAMBLING AND DECODING METHODS
work led directly to the continued improvements
of the sound spectrograph and the development
of supplementary decoding tools and techniques.
As the Army and Navy became able to carry
on decoding activities themselves with the aid
of equipment and information furnished by
NDRC as the result of work outlined above, the
activity on Project C-43 gradually decreased.
The final reports on the several projects cover
all phases of the work on the general subject
and constitute a reference work for future
studies of speech privacy systems.
In this chapter will be found, first, some gen-
eral observations on the intercept problem and
on methods of cracking scrambled speech, a
general description of the sound spectrograph
and examples of its applications, and some ma-
terial on the practical evaluation of privacy
systems, all taken from the final report on
Project C-43.1 Then follows a summary of the
work accomplished in the several decoding proj-
ects working under Division 13 sponsorship.
4.2
INTERCEPTION
Speech privacy systems may be used in con-
nection with radio telephone systems or with
wire systems. The unauthorized interception of
wire communications in wartime, however, was
beyond the scope of the work done for Division
13. These notes therefore are confined to radio
interception problems and expands the material
in Preliminary Report No. 25.45 The decoding
techniques to be described subsequently, of
course, apply to wire as well as radio communi-
cations.
TYPES OF RADIO SYSTEMS
Radio telephone systems range in size and
complexity from high-power point-to-point sta-
tions operating over great distances to the low-
power, short-range sets carried by individual
soldiers. The high-power systems are usually
designed to operate between specific points,
using specific assigned frequencies. They are
equipped with elaborate fixed antennas, which
are usually of the directive type. Privacy equip-
ment associated with such terminals may be as
large and complex as desired to achieve virtual
secrecy. A major consideration in such systems,
of course, which adds to size and complexity,
is that the privacy must not degrade the quality
of the received speech to any appreciable extent.
On the other hand, anyone can intercept these
high-power signals at great distances, where he
can have a well-equipped centralized decoding
laboratory, with no limitation on the size and
complexity of the decoding equipment he might
bring to bear. This laboratory can be adequately
manned by a relatively few highly trained de-
coding specialists not necessarily members of
the Armed Services.
In contrast with this situation, the low-power,
short-range radio sets used in military opera-
tions are severely restricted as to size and
weight, and these restrictions also apply to
privacy equipment. The smallest privacy set
submitted to Project C-43 for study was roughly
a 10-in, cube, and was designed for mobile ap-
plications like tanks, planes, and command cars.
While it is difficult to achieve a high degree of
inherent privacy in mobile equipment, it should
be noted that the very mobility of such systems
adds to the security, because the signals can
not generally be picked up at great distances,
and whatever equipment an intercepter might
use to crack the privacy must also be mobile.
Furthermore, the decoding equipment must be
operated by military personnel, a large number
of whom may be required if the enemy is making
extensive use of mobile privacy.
Intermediate types of radio systems are used
for the higher echelons of command. For such
applications, the radio equipment is semimobile.
It can be transported in trucks and set up very
rapidly, and may have a considerable range.
For such applications, a high degree of privacy
is required, and a truckload of equipment might
be justified, because the enemy could afford to
devote considerable time, personnel, and equip-
ment to decoding the kind of messages which
would be transmitted over such systems.
INTERCEPTED SIGNAL QUALITY
Since most of this chapter deals with decod-
ing, the material from this point on will be
written from the point of view of the unau-
thorized rather than the authorized listener. It
is first of all desirable to get a good signal, as
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
INTERCEPTION
37
free as possible from interference. There are
several reasons for this. First, the process
which unscrambles the speech also scrambles
any noise such as static which has been super-
posed on the scrambled signal. This changes the
time or frequency distribution of the noise,
breaks up harmonic relationships, etc., thereby
increasing the interfering effect of the noise.
Second, the decoding is apt to be less perfectly
accomplished than at the authorized terminals,
which tends to make the speech harder to un-
derstand. Finally, there are usually language
differences which still further add to the diffi-
culty of understanding the message. Conversa-
tions can be carried on under extremely un-
favorable conditions by people speaking their
own language, but noise and poor quality rap-
idly degrade the intelligibility of a language
foreign to the listener.
In this connection it might be noted that it is
very desirable to be able to hear both sides of
the conversation without interruptions, in order
to follow the context. In the case of the point-
to-point systems, this will in general require
two receivers because the two directions are
transmitted over separate channels at different
frequencies. If the two outputs are mixed for
listening or recording, however, it should be
kept in mind that the noise on the weaker signal
will be superposed on the stronger signal and
may seriously degrade it. Putting the two sig-
nals on two headphones will improve this situa-
tion, because noise in one ear does not seriously
affect the intelligibility of a signal in the other
ear. This problem does not arise in the case of
the smaller radio systems, because these are
generally operated on the basis of switching
between transmitting and receiving conditions
on the same carrier frequency.
Methods of obtaining a good signal are the
same for the interceptor as for the intended re-
ceiver. A few of the important considerations
are listed here; further information on any or
all of them can be had from radio reference
works. (1) Point-to-point systems usually em-
ploy directive antennas; the intercept station
should therefore be located along or near the
line of the radio beam. (2) In locating stations
to intercept radio transmissions in the h-f range,
account should be taken of the skip distances
of the frequencies involved. Better signals will
sometimes be obtained by moving farther away
from the transmitter rather than closer. (3)
The use of directive antennas, directed towards
the transmitter being monitored, will improve
the signal-to-noise ratio by discriminating
against noise which is nondirectional. These
antennas of course should be designed for the
frequency and polarization of the signal, and
propeitly coupled to the receiving set. (4)
Stronger radio signals will be received if the
antennas are located in the open, with no trees
or other obstructions in the foreground. This is
particularly important in the v-h-f range. (5)
Radio signals increase in intensity as the height
of the antenna above the immediate foreground
is increased, particularly for v-h-f transmission.
Thus better results are obtained with the an-
tennas located on high masts or on hills over-
looking the foreground in the direction from
which the signal is arriving. If the signal is in
the v-h-f range and other measures are inade-
quate, it may even be desirable to consider
receiving the signal in an airplane and record-
ing it or retransmitting it for decoding. (6)
Noise improvement can generally be obtained
by keeping the receiving equipment away from
sources of man-made noise, such as ignition
systems and power lines.
RECEIVING SETS
With regard to the receiving sets, a distinc-
tion must be made _between the various ac-
tivities of an intercept station. One important
activity is searching for possible enemy trans-
mission channels. The object is to determine all
the channels in use, the location of their ter-
minals, the type of business transacted, and,
most of all, whether any special form of pri-
vacy is used on the channel. Some preliminary
searches of this type are described in Pre-
liminary Reports No. 246 and 23.47 If no privacy
is used, other than the usual commercial types,
it is unlikely that information of military im-
portance is transmitted over the channel, and
it may not be necessary to monitor it continu-
ously. If a new privacy system is located, how-
ever, it is very likely to be worth monitoring
and decoding continuously.
For the searching and scanning activities, the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
38 UNSCRAMBLING AND DECODING METHODS
ordinary commercial sets of the "communica-
tions" type, equipped with a beat-frequency
oscillator, will serve very well for all types of
transmission. Even the suppressed carrier type
can be handled very well provided the signal
is fairly strong. It may require continual
manual adjustment of the local oscillator, but
sufficiently good reception can be obtained to
determine the nature of the channel. Cases of
extreme spread-band transmission can also be
handled in this manner.
If a particular channel employing suppressed
carrier is determined to be worth monitoring
continuously, then a single-sideband receiver
will give improved reception. These receivers
are equipped to amplify the partly suppressed
carrier, or supply a new one with great stability,
and they may provide as much as 15-db improve-
ment in signal-to-noise ratio in some cases.
They also permit selecting either the upper or
the lower sideband of double-sideband systems,
which may be of advantage in cases where in-
terference occurs on one or the other sideband
of such systems. However, these receivers are
not suitable for searching.
TYPES OF RADIO TRANSMISSION
A knowledge of the types of radio transmis-
sion which may be encountered is very im-
portant to the personnel of an intercept station.
Experience has shown that without such knowl-
edge, the nature of intercepted signals may be
completely misinterpreted. It is possible to mis-
take certain normal types of transmission for
new systems, or conversely to fail to recognize
new systems which should be monitored at once.
Double-Skleband. The commonest type of
transmission is the double-sideband type in
which the carrier is transmitted along with the
sidebands, which are usually about 3 kc in
width, and are located immediately adjacent to
the carrier. These are readily demodulated by
the ordinary receiver. This is true even if the
carrier is rapidly wobbled, provided the wobble
does not cover too great a frequency range.
Such wobbles are sometimes used in combina-
tion with simple inversion, to prevent reinvert-
ing with a locally supplied carrier at the edge
of one sideband.
Spread-Band. In this system, some or all of
the sidebands are displaced from the carrier.
Demodulated signals of 'this type will cover an
a-f range greater than 3 kc, usually as high as
6 kc. It is essential, therefore, that the receiver
be capable of handling such a band. To obtain
the intelligence, the signals must be further
demodulated (B1 in Table 1, page 47).
Suppressed Carrier. In the ordinary trans-
missions described above, the carrier level is
high compared to the speech sidebands. To
avoid loading up the transmitter with carrier,
and thereby permit radiating a higher sideband
level, many channels operate on the "sup-
pressed carrier" basis. In this system the carrier
is either eliminated completely, or transmitted
with greatly reduced level. To demodulate such
signals properly, the weak carrier must first be
greatly amplified, or a new one supplied locally.
If this is not done the signals will demodulate
themselves around whichever component in the
sideband happens to be predominant, produc-
ing thoroughly scrambled speech which can
thereafter not be restored. This condition can
be recognized by its characteristic sound to the
ear, together with wide syllabic fluctuations of
the meter which ordinarily indicates the carrier
level.
Twin Channels. With suppressed carrier sys-
tems, usually only one of the speech sidebands
is transmitted. However, a second sideband,
transmitting a second speech channel, is some-
times added, usually displaced from the carrier
by about 3 kc, to avoid crosstalk between the
channels. This is called "twin-channel" opera-
tion, and gives on demodulation an audio signal
covering about 6 kc. The two channels must be
separated and placed in their normal positions
by the methods cited under spread-band sys-
tems.
The above systems are the main types of
radio transmission used commercially with am-
plitude modulation. In addition, in the v-h-f
range and above, there are frequency-modula-
tion systems, and also pulse-modulation sys-
tems, both of which require receivers specially
designed to handle their particular types of
signals. This is too large a subject to cover
here, and reference must again be made to the
radio literature.
Finally it should be mentioned that in addi-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
INTERCEPTION
39
tion to speech a great deal of telegraph trans-
mission will be found. There are several types
of telegraph signals, including hand-keyed,
such as Morse code, or machine-keyed such as
Boehme and teletype. Any of these types may
be transmitted by keying the carrier, or by key-
ing a tone modulated on the carrier. The marks
and spaces may be represented by changing the
amplitude (on-off) or by changing the fre-
quency (two-tone). Finally, since telegraph re-
quires a much smaller band than speech, it is
often operated on a multichannel basis, that is,
a voice channel will be divided into a number of
telegraph channels. In addition, there are fac-
simile transmission systems, which also may
be operated on an a-m or f-m basis. If a new
signal is encountered whose nature is in doubt,
these possibilities should be kept in mind for
further investigation when the need arises.
RECORDING
The same considerations which make it de-
sirable to obtain a good intercepted signal, apply
also to recording and reproducing scrambled
speech. In addition to the requirements as to
quality and noise, there is an even more serious
one concerning speed regulation. In general,
systems designed for a high degree of privacy
require a high degree of synchronization, and
in many cases ordinary recording methods are
not good enough, not only in long-time average
speed r,Fulation, but also in the steadiness of
the instantaneous speed. In the case of some of
the systems the requirements are so severe that
even the best commercial recorders will not
meet them.
The best solution of this problem is to decode
before recording. This will be possible in many
cases, although it may sometimes entail the
loss of parts of the message while adjustments
are being made or the code is being deter-
mined. It happens that some systems which im-
pose the severest requirements on speed regu-
lation (B3 in Table 1), can be handled in this
way. When this method is feasible, even poor
quality recorders, such as those designed to
record a great deal of material in a small area,
may be good enough.
In some of the systems it will not be possible
to decode before recording. It happens, however,
that in the case of the only known system for
which this is true (F3 in Table 1), the require-
ments as to quality and speed can easily be met
by good commercial type recordings.
The matter of convenience or ease of use of
the reproducing system is very important in
decoding work. In this respect also, the require-
ments are different for different privacy sys-
tems. The recording systems using the emboss-
ing pr4cess, for instance, are convenient
because they produce no thread, and they re-
quire little attention. However, they all suffer
from poor tracking during reproduction, which
can be exceedingly burdensome, especially
where the material must be reproduced many
times over. Recording magnetically on wire is
attractive from the standpoint of convenience
and also quality, but back-tracking is very time-
consuming and laborious.
The best solution, at the present writing, ap-
pears to be disk recording on acetate, with a
machine capable of recording at various speeds.
Low speeds can be used where quality need not
be too good, and a long record is desired. Higher
speeds can be used where better quality is
needed. Such recording systems are commer-
cially available.
DECODING TOOLS
In addition to the facilities discussed above,
an intercept station, if it is to be prepared to
diagnose and decode intercepted enemy signals,
must be equipped with a considerable variety of
special tools. These should include such well-
known devices as oscilloscopes, amplifiers, oscil-
lators, modulators, rectifiers, fixed and variable
filters, and a supply of components for con-
structing special circuits that may be required.
Some of the less well-known devices include
magnetic tape or wire recording and reproduc-
ing equipment in the form of loops with mul-
tiple pickups, commutators for sweep or timing
circuits, variable-speed drive mechanisms, chan-
nel shifters, the variable-area pattern machine,
and the sound spectrograph. There should also
be models of the more important types of exist-
ing speech privacy systems. Finally, and per-
haps most important of all, there should be sta-
tioned at the intercept location a group of
highly trained technicians, who should be thor-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
40
UNSCRAMBLING AND DECODING METHODS
oughly familiar with radio transmission prob-
lems, radio facilities, cryptanalytic procedures,
and diagnosing and decoding methods. If these
technicians are not conversant with the lan-
guage encountered in intercepted communica-
tions, interpreters should be continuously avail-
able.
Even with all the special tools and personnel,
decoding in many instances will be a difficult
problem, and patience and painstaking effort
will be required to obtain useful information
from scrambled speech. Unless the needs have
been anticipated the enemy may have secret
communication for a considerable period of time
as a direct result of unpreparedness.
4.3
NONCRYPTOGRAPHIC TOOLS AND
METHODS
Beginners in the study of privacy systems
never fail to be amazed at the difficulty of
scrambling speech sufficiently to destroy the in-
telligence. The ear can tolerate or even ignore
surprising amounts of noise, nonlinearity, fre-
quency distortion, misplaced components, gaps,
superpositions, and other forms of interference.
Very often partial or even complete intelligence
can be obtained from a privacy system by par-
tial or imperfect decoding, and this in turn can
often be accomplished by operating on the
scramble in some way which the designer did
not contemplate.
The fact that the ear is such a good decoding
tool in combination with noncryptographic
methods makes the production of privacy sys-
tems very difficult. Scrambling systems which
look very effective on paper sometimes turn out
on trial to degrade the intelligibility very little,
although the scrambled speech usually sounds
unpleasant. Most methods pushed to the point
where they succeed in hiding the intelligibility
so distort the speech that it is impossible to
restore the speech with good quality. In fact,
there are very few speech privacy systems
which achieve a high degree of privacy with
acceptable quality.
Noncryptographic methods are very impor-
tant, because they may reduce the delay in ob-
taining the intelligence substantially to zero.
Furthermore, they may render completely futile
the most elaborately irregular code changing
systems which could be handled only with the
greatest difficulty by straight cryptographic
methods. A number of noncryptographic meth-
ods are given below. Some of them, of course,
result in poor quality, but the saving of time,
labor, and equipment may be very great.
CAPTURED SET OR FUNCTIONAL EQUIVALENT
With many privacy systems all that we need
to listen in is a captured set or its functional
equivalent built from knowledge of the scram-
bling method. An extreme example of this is
simple inversion. In this case the scrambled
speech is quite unintelligible to direct listening,
but if we know it is inversion, we can find the
inversion frequency very quickly by trial. An-
other example is the split-phase system (A5).
The phase-shifting network in the captured set
could readily be adjusted to demodulate either
of the two overlapping sidebands.
Slightly more complicated systems are those
with a simple program. Again with a captured
set or its equivalent it is usually easy to find the
program by trial. The only possible difficulty is
in keeping step with the sending end, particu-
larly if there is no synchronizing pulse. An
example of this is a wobble band displacement
(B3). If, for instance, the wobble is sinusoidal,
with the frequency and the sweep limits known,
the problem is to keep in synchronism. In this
ADJUSTING CHANGE
jHANDLE
POSITION
CHANGE
ROTATING
SWEEP
GENERATOR
DIFFERENTIAL
GEARING
FREQUENCY
VARIABLE
OSCILLATOR
YNCHRONOUS,
MOTOR
FIGURE 1. Method of aided tracking.
connection "aided tracking" might be men-
tioned, a device which is familiar in gunfire
control circles. With this system changes in
both frequency and phase are made simultane-
ously. This is illustrated in Figure 1. Suppose we
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
"
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
NONCRYPTOGRAPHIC TOOLS AND METHODS
41
find ourselves slightly out of step with the sig-
nal. By rotating the adjusting handle forwards
or backwards we can get back into step. Suppose
this adjustment was in the forward direction.
The fact that we had to catch up is an indica-
tion that the motor is slow. Therefore, some of
the motion of the handle required for catching
up is used by means of gearing to change the
frequency driving the motor. The gear ratios
are chosen to suit the particular problem. With
this method it is possible to get into step with
and stay in step with systems such as alternate
displacements and regular wobbles.
COMPROMISE DECODING METHODS
All the methods outlined in this section have
been tried, at least in the laboratory. Their suc-
cess, however, naturally depends to some extent
on the switching rates and similar variables. It
is possible, therefore, that a method might
MOD
1 . 13 TO 16 KC 10 TO I6KC
FIGURE 2. Band-shift filter; an important decod-
ing tool.
BP FILTER
UPPER CUTOFF 13 KC
LOWER CUTOFF 11.5 TO 12..0_ KC
MOD
prove unsuccessful against a scrambling system
which seems to be in the same general class as
the one that was tried in the laboratory.
Consider, for example, a system (A2) which
involves inversion about a number of frequen-
cies in succession. If these frequencies are not
too far apart we can choose a single frequency
somewhere in the middle range and demodulate
the whole signal with this one frequency. The
resulting band will be right side up, but dis-
placed by varying amounts not exceeding half
the total range. This has been found to be quite
intelligible, provided the switching rate is not
too high or the range of frequencies too wide.
With some systems it is expedient to listen
to only a portion of the frequency range rather
than the whole range. An outstanding example
of this is the system in which the subbands are
variously delayed (F1). Conceivably, these de-
lays could constantly be changed with time ac-
cording to a never repeating program. This,
however, would be futile because with a band
filter we need listen to only one of the bands;
disregarding the others. Unless this band is
very narrow the intelligibility may be practi-
cally complete. Similarly in band-splitting sys-
tems if the switching is not rapid (DI) we can
follow one of the bands around the frequency
range. The lowest or second lowest band is usu-
ally the best. Another example is the tone se-
q4ence (J3) ; instead of trying to filter out one
tone at a time as it occurs, we can leave all the
filters in all of the time and still have enough
speech coming through to yield the intelligence.
A special case in which the rejection of a
part of the frequency band of the scramble
makes decoding easier concerns those systems
such as A5 which depend on carrier phase to
mix and then separate components. There is no
phase requirement imposed on the demodulat-
ing carrier unless both sidebands are trans-
mitted. Therefore, either sideband of such a
system may be suppressed with a filter, and the
remaining sideband demodulated with a carrier
of any phase. The two signals in the sideband
will then be simply superposed.
For purposes such as those outlined a valu-
able tool is the band-shift filter illustrated in
Figure 2. With this device a band of adjustable
width can be taken from any portion of the
signal frequency range (0 to 3 kc) and relocated
in any other portion of the same frequency
range either straight or inverted. One form of
band-shift filter is described in Preliminary Re-
port No. II of Project C-43.36 It consists essen-
AIR CONDENSERS
FIGURE 3. Band-pass filter in which pass band is
variable.
tially of a double modulator, but with a band
filter of variable width. If the frequency loca-
tion of the band is not to be changed, the switch
in Figure 2 should be in the left-hand position.
One form of variable band filter is shown in
Figure 3. This tool has also proved useful in
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
42 UNSCRAMBLING AND DECODING METHODS
certain other systems such as the multiplica-
tion system (HI) and the time division multi-
plex [TDM] system (El).
Sometimes it is expedient to listen to a scram-
ble only part of the time. Some of the simpler
coding programs can sometimes be broken down
in this manner by trial. For instance, if a cod-
ing cycle has N elements we can listen to every
Nth element and make whatever adjustments
are needed to make this sound natural. We can
then listen to the next adjacent element and
adjust the system so that these elements blend
A
PEAK CHOPPERS
COMPRESSOR
FIGURE 4. Elementary circuits of peak choppers
and compressor.
properly. This attack applies to a system in
which several different displacements are used
(B2). A captured set, of course, is the easiest
way of selecting every Nth element because it
is usually easy to make the other time elements
inoperative.
Another useful device is the limiter, or peak
chopper. In this same class is the compressor.
These are illustrated in Figures 4A, B, C. They
all tend to equalize the successive lobes of a
complex wave. The peak chopper simply chops
off any peak which exceeds a certain instan-
taneous voltage. The compressor operates more
gradually and leaves the waves well rounded.
If straight speech is put through any of these
devices, distortion products are generated be-
cause the wave form is radically modified. It is
found, however, that this kind of distortion
damages the intelligibility very little. These de-
vices should be useful against any privacy sys-
tem in which sudden changes of level occur. A
good example is the subband level modulation
system (H3). A separate limiter or compressor
in each of the subbands will tend to smooth
out the level variations and make the speech
intelligible.
Another nonlinear device is the rectifier. Two
forms are shown in Figures 5A and B. The
rectifiea? as used here should not be confused
with the detector. The latter device also recti-
fies, but it then has a time constant incorporated
in the output circuit which tends to smooth the
output and give the envelope wave. The rectify-
ing action which is wanted here simply takes
all the negatives lobes of the signal and turns
them over. As in the case of the limiter, straight
speech put through a rectifier of this type is
about 95 per cent intelligible.
In the privacy system designated A4 the
phase of the speech signal is reversed at short
irregular intervals. If this signal is now recti-
fied, all the negative lobes will be made positive
and the resulting wave will be indistinguishable
from rectified straight speech except for slight
discontinuities at the points where the reversals
PAD
MOD
A
FIGURE 5. Two forms of rectifier circuits.
occurred in the privacy system. This is illus-
trated in Figure 6. Therefore, a simple phase-
reversal system, no matter how irregular,
should yield to rectification except that distor-
tion in the transmission process tends to change
the wave form and thereby degrade the quality
of the resulting speech. It should be noted that
the multiplication process (111) also results in a
phase reversal every time the coding wave
passes through zero. It has been found that rec-
tification tends to make this kind of scramble
more intelligible also.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
NONCRYPTOGRAPHIC TOOLS AND METHODS
43
A very useful noncryptographic device is
suiSerposition. For instance, with a three-
channel mixing system such as Li or L2, if
all three channels are listened to simultaneously,
three conversations will be heard at once, or
possibly one conversation with two noises super-
posed. Experience has shown that under such
conditions it is usually easy to concentrate on
the desired channel and ignore the others.
Another form of superposition is illustrated
by the following: Consider a split-band system
ORIGINAL SIGNAL
PHASE REVERSED
RECTIFIED
ORIGINAL RECTIFIED
FIGURE 6. Action of rectifier, useful in breaking
down multiplication scrambles.
(D2) in which six different codes are used in a
never repeating sequence. This would be rather
difficult to handle by cryptographic means. Sup-
pose, however, we had six separate decoding
units, each set to decode one of the six codes. If
the scrambled signal were fed into all six of
these decoders simultaneously, one of them
would always have straight speech in its output.
The other five would be scrambled. If these six
outputs are all superposed, we will hear straight
speech with five scrambled superposed. This
straight speech can be understood quite easily.
It will be noted that the unwanted components
in this kind of suDerposition are derived from
the wanted omponents, and always vary in
level simultaneously with the wanted compo-
nents; it appears that under these conditions
they do not do much damage.
The split-band equipment illustrated in Fig-
ure 6 of Chapter 1 is adapted for this kind of
superposition. A multiplicity of cross connec-
tions is made from each of the band-pass filters
to the output modulators whereby each of the
bands in the signal is placed in the desired bands
in the output. Steps should be taken to see that
these cross connections do not interfere with
each other. An amplifier after each band filter,
for instance, will perform this function. Figure 7
illustrates a simpler case of superposition ap-
plied to a system using two band shifts (B2).
4 It may be noted here that superposing time
displaced elements does not appear to be suc-
cessful. For instance, if all the segments of the
commutator jn a time ,division scrambling
[TDS] machine are connected to all the pole-
pieces, the output will be straight speech with
several scrambles superposed. This has been
found to be completely unintelligible.
In certain cases which have been met in
Project C-43 the privacy sets are equipped with
dials or similar means which were intended to
provide an easy method for obtaining a large
number of different codes. In some cases the
different codes may not be sufficiently different
to be mutually private. That is, while there may
be literally millions of different combinations,
it sometimes happens that there are thousands
FIGURE 7. One form of superposition decoding.
of combinations which will decode material
scrambled with one of the combinations. Vari-
ous degrees of quality will result from these
partial or incorrect decoding operations. How-
ever, as long as intelligibility can be extracted
the codes cannot be considered mutually private.
In such cases it is possible with a captured
machine simply to manipulate the dials sys-
tematically or unsystematically and listen to
the result. When the speech begins to sound
somewhat natural, systematic trials of each dial
in turn will sometimes steadily improve the
quality. Something of this sort could be done
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
44 UNSCRAMBLING AND DECODING METHODS
with simple TDS systems also, except that the
use of interlaced codes makes this somewhat
more difficult.
In certain cases where there are a large
number of codes possible but only a few of these
codes are good codes from the standpoint of
direct listening, it would seem reasonable that
any code applied to the scrambled signal should
turn the good code into a poor code. In the five-
band split-band system for instance, there
are some 3,840 possible codes but only twelve
or so are considered really good. Any code in
SPEECH
NOISE
4-- SPEECH
ONLY
FIGURE 8. Use of directional discrimination
against noise.
the decoding machine, therefore, should de-
crease the privacy for direct listening. This has
been tried in the laboratory but has not been
pushed to the point of determining whether it
could compete with the superposition method.
The idea may possibly apply to other systems
which may be encountered.
A very specialized device, which applies to
wire line communication only, should be men-
tioned here because it is not very well known.
It distinguishes between the two directions of
FIGURE 9. Use of relay to disconnect receiver
from line during heavy bursts of noise.
transmission over wires. In the masking pri-
vacy system J2, for instance, the clear signal
in one direction is masked by noise sent in the
other direction. The device illustrated in Fig-
ure 8, however, discriminates against the noise,
allowing the speech to be heard. It requires a
small series resistance, which is built up by a
step-up transformer to the line impedance. The
secondary is connected to the other side of the
line. The direction of discrimination depends on
the phasing of the transformer windings.
AUTOMATIC DECODING
Whether speech is intelligible or unintelli-
gible is purely a subjective matter. However,
the method of making speech unintelligible in-
volves making physical changes in the speech
wave. Certain kinds of physical changes can
be detected quite readily by objective means
and utilized to undo the scramble automatically.
The most elaborately irregular code program
is completely futile if this kind of decoding can
be applied.
A very simple example of this is shown in
Figure 9. Suppose the system consists of short
spurts of noise applied in an irregular manner.
The noise must be high in level compared to the
speech in order to mask the speech. Therefore,
if the signal is applied to an amplifier-detector,
connected to a relay (or electronic switch) the
relay can be so biased that it operates only on the
noise spurts. The receiver is momentarily dis-
connected from the line whenever a noise spurt
occurs. The same method can be used for level
modulation systems (H2 and H3). Instead of
disconnecting the receiver, the high-level por-
tions of the signal cause the receiver to be con-
nected to a parallel path containing the required
amount of loss to equalize the levels. In the case
of subband level modulation (H3), a separate
device of this type must be used in each sub-
band.
The system just described operates on a total
energy basis. Sometimes it is possible to obtain
a switching signal on the basis of energy fre-
quency distribution. Consider, for instance, the
system using two different displacements (B2).
The alternate positions of the speech band are
illustrated in Figure 10. In one position, the
band is right side up and occupies the range
from 2 to 5 kc. The alternate position is in-
verted occupying the range from 3 to 6 kc.
Since most of the energy in the speech band
is concentrated in the low-frequency part of the
original spectrum most of the time, the system
illustrated in Figure 11 can be used to decode
this material automatically. The signal is ap-
plied to two band filters, one covering the range
2 to 3 kc, the other passing 5 to 6 kc. The out-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
NONCRYPTOGRAPHIC TOOLS AND METHODS
45
puts of these band filters are rectified individu-
ally and fed to the two windings of a polar
relay. The relative energy in the two band
filters will be different for the two displace-
ments and the relay in Figure 11 will be oper-
ated alternately in the two directions, thereby
automatically connecting the proper carrier to
the input modulator in Figure 7 to put the
speech band in its normal position. This will
not be infallible, but with displacements as
different as the ones used in the illustration, it
should operate sufficiently well to yield most of
the intelligence of the message. Naturally, the
smaller the physical difference between the two
positions being distinguished, the more false
operations there will be. However, this method
is instantaneous even with an irregularly
switched system, whereas cryl?A9a-a-phic-metti--------d.e
un
ods would be very time-consuming.
Another variation of this general technique
might be mentioned for the sake of complete-
ness although it is somewhat more speculative.
Consider a privacy system which depends on
speed changes (F4). Changes in speed cause
changes in the pitch of the voice. Suppose we
apply this signal to a circuit which measures
the voice pitch. This technique has been worked
out in connection with the Vocoder. The output
of this circuit, which is a varying frequency,
is used to change the speed of a motor. The
motor is part of the drive of a magnetic tape
recording and reproducing system through
which the signal is passed. As the motor speed
is made to change, the tape speed changes in
such a direction as to tend to keep the derived
frequency constant. This takes out not only the
speed variations, but also the voice inflections.
However, a monotone is quite intelligible.
The following method, which has not yet
been tried out, is intended to apply to irregular
band displacements or wobbles (B4), which
would be exceedingly difficult to handle any
other way. Consider a system in which the band
is kept right side up, but is wobbled over a
range sufficient so that demodulation with some
intermediate carrier frequency will not give an
intelligible signal. Suppose the wobble follows
an irregular, nonrepeating program. The fol-
lowing decoding method is proposed.
The signal is impressed on a network having
a very steeply rising loss characteristic. If the
speech band were not wobbled, this network
would simply tend to make the lowest harmonie
of all voiced sounds the strongest component.
With the wobble, the same thing will be true
except that the level of this component will
TIME
4
I
5 KC
0
FIGURE 10.
10 KC
FREQUENCY
Sidebands in two-position displace-
ment system.
suiting
o severe fluctuations. Therefore, the re-
nal is subjected to some form of
automatic vIume control and also a limiting
action, tending to derive a single frequency.
Forgetting voice inflections for the moment,
this derived frequency would fluctuate up and
down (in frequency) in step with the band
wobble. In fact, it could be used as a subcarrier
in a double modulation decoder to demodulate
the signal to approximately the correct position
in the frequency range. It will be in error,
TO INPUT
-0 MOD IN
(I)FIG 7
16 KC
POLAR RELAY
FIGURE 11. Automatic decoding system depend-
ing upon energy-frequency distribution.
however, by an amount equal to the instantane-
ous voice pitch. Possibly this amount of error
will not prevent the signal from being intelli-
gible (we know that this amount of displace-
ment does not destroy the intelligence of other-
wise normal speech).
If it is desired to correct for this error, two
methods suggest themselves. One possible
method is to subtract from the derived fre-
quency, by a modulation process, an amount
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
46 UNSCRAMBLING AND DECODING METHODS
equal to the average pitch of the voice being
monitored. This will leave a small fluctuating
error. Another possibility is to derive the actual
instantaneous voice pitch, by difference tone
methods, and subtract this amount from the
derived subcarrier frequency.
If the displaced band is inverted instead of
right side up, a similar procedure can be used,
with a network of opposite loss characteristics.
In either case this method will correctly demod-
ulate only the voiced sounds, but experience
suggests that this is sufficient. If not, some kind
of carry-over effect might be incorporated in
the system to prevent sudden changes in the
subcarrier frequency, thereby tending to hold
over correct demodulation for short unvoiced
sounds also. This method has not been tried,
but is felt to be worth recording because of the
great difficulty of handling irregularly wobbled
systems by any other method.
Another rather speculative automatic method
might be mentioned because some form of it
might prove useful against certain multiplica-
tion systems such as H1. The code wave in the
particular case encountered was repeated many
times per second, and there was a synchroniz-
ing pulse ahead of each cycle. If the signal is
applied to a synchronized cathode-ray oscillo-
scope with a highly persistent screen, a definite
pattern appears because the coding wave al-
ways passes through zero at the same time.
Also, the speech energy tends to average out
after a few cycles so that the pattern reflects
the amplitude of the coding wave. It is quite
conceivable that this pattern on the screen
could be scanned optically and used to generate
a decoding wave for automatically unscram-
bling the signal. Obviously, if the coding wave
is changed periodically, a new decoding wave is
automatically produced. The only requirement
is that the coding wave persist long enough to
form an average pattern on the screen.
Another variation of automatic decoding
methods might be termed "parallel-automatic"
because two or more complete decoding units
are used in parallel but only the correct one is
applied to the listening receiver. To emphasize
the difference between this method and the one
previously discussed, we will use the same ex-
ample, namely, the system with two band dis-
placements. Referring to Figure 7, suppose
instead of the parallel modulators, there were
two complete units in parallel including the
band filter, the second modulator, and the out-
put filter. One of the waits is fed with the8-kc
carrier, the other with the 16-kc carrier. Each
unit will have straight speech in its output half
the time, and the other half the time will have
inverted speech displaced by 1 kc. A 1-kc low-
pass filter can then be used in a device similar
to Figure 11 to switch the listener to whichever
one of the decoding units has the straight
speech. For the particular system used in the
illustration, there does not appear to be any
particular advantage of one method over the
other. However, the latter system can be ap-
plied in cases where the other method might
not be feasible.
The parallel-automatic method can be made
to give a different type of switching signal. For
instance, use might be made of the harmonic
relationship between the components of speech
when the speech band is in its normal position.
If the voice pitch happens to be 100 cycles, then
all the harmonics will be multiples of 100 cycles.
If this speech is put through a suitable non-
linear system such as a rectifier or limiter,
difference tones will be generated which will
also be multiples of 100 cycles. If, however, the
speech band is displaced from its normal posi-
tion in any way, the difference tones' will not
coincide with the speech components. If, for
instance, the whole band has been displaced by
50 cycles, then the speech components will be
150, 250, 350 cycles, etc. The difference tones
generated by a nonlinear system will be 100,
200, 300 cycles, etc. If we now take a second
difference between the output of the nonlinear
system and the original components, there will
be generated multiples of 50 cycles. The lowest
component of this series will be lower than the
pitch of the voice. This will be true regardless
of how far the original band has been shifted,
except for the special case where the shift
happens to be an exact multiple of the voice
pitch. Since, however, the pitch is constantly
varying, this coincidence is of very brief dura-
tion. Theoretically, at least, a low-pass filter
with a cutoff lower than the normal range of
voice pitch can be used as a clue to determine
whether a speech band is in its proper location.
The method then would consist in having sev-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
NONCRYPTOGRAPHIC TOOLS AND METHODS 47
eral decoders in parallel, listening only to the
one which did not generate a component in the
low-pass filter.
The above illustrations will serve to show
the possibilities of noncryptographic types of
attack on privacy systems. When a new system
is encountered, this type of attack should be
given serious consideration because of the
saving in time and equipment. Naturally, as
pointed out above, straightforward crypto-
graphic attack can be made to yield a bet-
ter quality signal. However, experience has
shown that the ear can become familiar with
certain kinds of distortion and learn to extract
the intelligence more and more readily with
practice.
TABLE 1. Summary of scrambling systems.
Noncrypto-
graphic
attacks
(Table 2)
Capable of
crypto-
graphic
attacks
Noncrypto-
graphic
attacks
(Table 2)
Capable of
crypto-
graphic
attacks
A. Single modulation
1. Inversion
2. Variable frequency
version
3. Alternate inversion
4. Phase reversal
5. Split phase
B. Double modulation
I. Fixed displacement la
2. Stepped displacement lb, 2a, 2f, 3b, 3f
3. Wobbled displacement,
regular lb, 2a
4. Wobbled displacement,
irregular 3d
C. Triple modulation
1. Re-entrant inversion,
steps
2. Re-entrant inversion,
continuous
D. Band splitting
1. Slowly switched
2. Rapidly switched
E. Time division multiplex
I. 4-band system lb, 2b
2. With noise channel lb, 2b
F. Magnetic tape
1. Delayed subbands 2b
2. TDS, repeated code 2c, 2g, 2h
3. TDS, nonrepeated code
4. Speed variations lb, 2a, 3c
5. Backwards trans-
mission lb
6. Alternate backwards
and forwards lb, 2c
la
in-
lb, 2a, 2f
lb, 2f
Ib, 2e, 2g, 3e
la -
lb, 2c, 21
lb, 2a
Ib, 2b, 2f, 2g, 2h
2c, 2f, 2h
?
G. Tape plus modulation
1. TDS and inversion
2. TDS and split band,
synchronous
3. TDS and split band,
nonsynchronous
4. Two-dimensional
5. Double-speed split lb
6. Half-speed split lb, 2c
21, 2g, 2h
H. Wave form distortion
1. Multiplication 2b, 2e, 2g, 3e
2. Level modulation 2d, 3a
3. Subband level modula-
tion 2d, 3a
J. Masking methods
1. Signal plus inoise, same
dixection '
2. Signal plus noise,
opposite direction 2i
3. Tone sequence lb, 2b, 3a, 3b
4. Noise spurts 2c, 2d, 3a -
5. Nonlinear distortion la
K. Vocoder methods
1. Permute channels
2. Invert channels lb, 2g
3. TDS, channels lb, 2g
4. Two-dimensional
scramble lb, 2g
5. Time division multiplex lb
L. Channel mixing
1. Time division mixing
2c, 21
2. Subband mixing
2b
3. Combination
2c, 21
TABLE 2. Noncryptographic decoding methods.
1. Captured set or functional equivalent
a. Fixed condition?find by trial
b. Simple program?get into step
2. Compromise decoding methods
a. Intermediate condition
b. Listen to portion of frequency band
c. Listen part time
d. Limiter, peak chopper, compressor
e. Rectifier
f. Superposition
g. Approximate Code by trial
2. (Continued)
h. "Spoil" good code by recoding
i. Directional discriminator
3. Automatic decoding
a. Total energy
b. Energy frequency distribution
c. Pitch-change corrector
d. Wobble corrector
e. Code wave generator
f. Parallel automatic
g. Inharmonic detector
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
48 UNSCRAMBLING AND DECODING METHODS
In general, noncryptographic methods re-
quire that the signal, as received, be of fairly
good quality. In some cases, the saving in time,
labor, and equipment would be so great that if
the signal, as received, is too poor to permit
noncryptographic attack, the most reasonable
thing to do is to move the intercept station to
get a better signal.
In Table 1, there is listed for each privacy
system, the type of noncryptographic attack
which might apply. It should be emphasized
once more, however, that the method which
succeeds at one switching speed may fail at
another. The list, therefore, should be taken
only as a recommendation of systems which
should be considered. The noncryptographic de-
coding methods are summarized in Table 2.
4.4
CRYPTOGRAPHIC TOOLS AND
METHODS
A cryptographic decoding method' involves
(1) actually determining a code which will
undo the scramble, and (2) restoring the
speech by means of this code. In the case of
repeated codes, this can sometimes be done
rather quickly. An example is the repeated-code
TDS system. The actual codes used can be
found in about 15 min. Having found the code,
we can set it into our receiving machine and
thereafter listen to the speech directly. In the
case of nonrepeated codes, every bit of the
message must be handled individually. It may
take a thousand or even a hundred thousand
times as long to decode as it did to speak the
words. It may take hours or even days to obtain
the intelligence from a short message; mean-
while other messages will have been sent and we
get farther and farther behind. The only way
this could be avoided would be to have approxi-
mately as many teams working in parallel as the
ratio of decoding time to message time, which,
of course, is impractical if the ratio is large.
As stated previously, the sound spectrograph
?described in detail later?is of tremendous
assistance in recognizing the nature of an un-
known scrambling system. The ear can usually
recognize the presence of time discontinuities.
It can also recognize the peculiar quality which
results from band-shifting systems. The exact
nature of the scramble, however, is usually
impossible to establish with the ear. Even
scrutiny of the wave form may yield no clue.
The strikingly graphic analysis provided by
the spectrograph, however, usually takes the
mystery out of the scrambling method immedi-
ately.
For example, speech privacy systems having
frequency subbands will show horizontal dis-
continuities or boundaries in their spectro-
grams.4Similarly, systems employing time
division will show vertical boundaries. A con-
siderable variety, of systems display both hori-
zontal and vertical boundaries. Methods of
telling these systems apart are described in the
final report on Project C-32.44
PROGRAM DETERMINATION
The simplest cases to handle are those in-
volving a program which can be determined
directly from spectrograms by inspection or
measurements. The re-entrant inversion system
(Cl). might be used as an example. Suppose a
multiplicity of displacements were used in some
irregular sequence. Discontinuities marking the
inversion frequencies appear in. the spectro-
grams and mice they have been determined by
measurements on a large number of spectro-
grams, the program can thereafter be deter-
mined quite readily by using a template. This
template can be marked directly with the set-
tings of the decoding machine which will restore
the speech to its normal position.
Another example involving a program would
be one like B2, in which two different displace-
ments are used alternately, with the intervals
irregular in duration. Here the time boundaries
will be quite apparent and they can be measured
with a suitable time scale.
In all likelihood changes of the above types
will occur in discrete steps for practical reasons.
The use of a program involving continuous
changes with time presents formidable tech-
nical difficulties at the authorized as well as the
unauthorized terminals.
MATCHING SPECTROGRAMS
In cases where the scrambling system in-
volves rearrangement of the speech elements
in time or in both time and frequency, the basic
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CRYPTOGRAPHIC TOOLS AND METHODS 49
method for determining the codes involves cut-
ting up spectrograms along the element bound-
aries and rearranging the elements so as to
restore the straight speech. An example is
shown in Figure 12. The criterion for rear-
ranging the elements is that there should be
continuity at the boundaries. This continuity
includes the position and direction of the indi-
means for making a mechanically inverted pat-
tern as well as a normal pattern. The spectro-
gram at the top of Figure 13 shows a normal
pattern. Directly below it is an inverted pat-
tern of the same material. A mechanically in-
verted pattern is indistinguishable from a
pattern produced by electrical inversion of the
speech. Similarly, if the whole inverted spectro-
FIGURE 12. Method of matching spectrograph patterns of nonrepeated code TDS.
vidual harmonics, the position and direction of
the resonance areas, and, in general, the ampli-
tude as represented by the darkness or lightness
of the patterns. The pieces are numbered before
the matching process begins and when the
matching has been completed, the numbers on
the pieces determining the code.
If the scrambling process involves inversion
of the time or frequency scales, straight speech
can be restored for matching purposes by mak-
ing two spectrograms as shown in Figure 13.
Present models of the spectrograph include
gram is turned through 180 degrees, so that the
base line is at the bottom and towards the ob-
server, the result is indistinguishable from the
case in which the speech is transmitted back-
wards. Therefore, if an element in the scram-
ble is inverted, it may be recovered as straight
speech for matching purposes by cutting the
element from the mechanically inverted pat-
tern. If an element has been transmitted back-
wards, it can be restored to normal by cutting
it from the inverted pattern and rotating it 180
degrees as described above. If it is both back-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
50 UNSCRAMBLING AND DECODING METHODS
wards and inverted, it may be restored by cut-
ting it from the regular pattern and turning it
around.
It has been found from experience that
matching is facilitated by enlarging the spectro-
grams by a factor of about two to one. Not only
is the increased size easier to handle, but the
heavy photographic paper is much better to
handle than the facsimile paper employed in the
poses regularly, then it may pay to adopt the
technique described in Preliminary Report No.
1317 (Project C-43) for producing large spectro-
grams photographically.
To facilitate matching, appropriate means
should be used for handling the elements. It
has been found that a slightly adhesive surface
is advantageous. In the illustration of Figure 12
this surface was provided by coating the boards
FIGURE 13. Inversion of time and frequency scales in spectrograms. If scramble contains inverted ele-
ments, these will appear right side up in mechanically inverted spectrogram. Time scale may be inverted
by rotating elements 180 degrees. Note position of base lines in examples.
spectrograph. The latter is delicate in texture
and its surface is easily stained. In this con-
nection it should be noted that the process of
enlarging the spectrograms does not appreci-
ably affect the decoding time in the case of
nonrepeated code systems. There will, of course,
be an initial delay, but in general, the matching
time will be controlling. Spectrograms can be
made, enlarged, and cut up faster than they
can be matched. If it is found necessary, how-
ever, to use spectrograms for matching pur-
and also the backs of the elements with ordi-
nary rubber cement. This is also the case in
Figure 14. This latter example shows a two-
dimensional scramble. Horizontal strips of rub-
berized Bristol board were provided for match-
ing along the time axis.
Once a system has been thoroughly diagnosed
certain numerical properties of the coding proc-
ess will be known. Advantage should be taken
of this knowledge to supplement and check the
matching process. Examples are given in Pre-
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CRYPTOGRAPHIC TOOLS AND METHODS
51
liminary Reports No. 10," 14," 22,20 and 2621 of
Project C-43.
EFFECT OF TRANSIENTS
The two examples thus far cited of spectro-
gram matching were artificially produced by
cutting up spectrograms of straight speech, and
the boundaries are therefore clear and sharp. In
practice the time and frequency boundaries will
be obscured by- transients. Frequency bound-
aries are filter cutoffs, and they are marred by
overlap or underlap and by phase distortion.
embodiment of this improvement in a spectro-
graph has not been accomplished because the
need was not sufficiently pressing in Project
C-43.
The basic idea for avoiding the obscuring
effects of spillover is to permit the spillover to
take place in such a way as to be subsequently
removable. For instance, suppose a sample of
TDS were recorded on the magnetic tape and
suppose0 the spectrograph were equipped with
a suitable switching arrangement such that
only every alternate element was reproduced.
FIGURE 14. Matching spectrograph patterns of two-dimensional scramble.
This, however, is not as serious as the transients
occurring at the time boundaries. There is a
basic difficulty here, arising from the desire to
obtain a high degree of frequency resolution,
which entails the use of a narrow scanning
filter. The response and decay time of such a
filter is appreciable in comparison with the ele-
ment length in many scrambling systems. The
decay time produces the more serious of the two
effects. It causes energy from a strong element
to spill over into the adjacent following element
in the spectrogram. This difficulty is unlikely to
cause trouble in any application of the spectro-
graph except decoding. Therefore, it is felt that
means for alleviating this difficulty should be
recorded here. A small amount of exploratory
work has been done along these lines, but the
The spillover from each element would then
occur in a blank area, and it could subsequently
be trimmed off, leaving a sharp, clear boundary.
A second spectrogram could then be made of the
alternate elements, again trimming off the spill-
over.
USE OF TWO SCANNING FILTERS
A logical extension of this idea, which would
save some time, would be to have two scanning
filters and use them alternately by suitable
switching means. Both the inputs and the out-
puts of the filters would have to be switched,
and the two switches should be separated by the
appropriate time delay to take account of the
transmission time through the filter.
A third variation of this idea which requires
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
52 UNSCRAMBLING AND DECODING METHODS
less equipment, is to make one spectrogram in
the usual manner and then make a second spec-
trogram with the machine running backwards.
The spillover always occurs into the leading
edges of the elements in spectrograms. Cutting
the first spectrogram in the proper places will
result in clear, sharp right-hand edges on each
element, but each left-hand edge will be ob-
scured by spillover. Cutting the second spectro-
gram in the proper places will give clear
left-hand edges on each element. Matches could
then be made between elements from the nor-
course, might be aggravated intentionally as
part of the privacy feature of the system. On
the whole, however, it looks as though ampli-
tude representation should be an improvement
in decoding work.
MATCHING VARIABLE-AREA PATTERNS
For some purposes it has been found that
wave form patterns offer certain advantages
ove4 spectrograms. They can be made more
rapidly and they can be played back directly to
reproduce the original speech. Intrinsically,
........VyftrIRMOIMI movaidonatavreiv
Rwitvvra eviwnworwifireftweramamilm
444gat4Alciwaviagag .4,0=ialooraism gamma
0~4VVP f4144V,W
ME= nAkel.,,un
021.0,1.1.
Ramona sereaseemargammagresseamerearmeassmare gaessamessa
101,411=11, 1.6001Vram reoroaraor
tZVX14
alblAtdivia
FIGURE 15. Matching variable-area patterns of nonrepeated code TDS.
mal and backwards spectrograms, in such a way
as to utilize the good edges of the elements.
In other respects it is to be expected that the
patterns produced by the spectrograph can be
improved. For instance, studies have been made
which show that amplitudes can be represented
in such a way that they can be interpreted
quantitatively. This is an improvement over the
rather indefinite shades of gray in the usual
spectrograms. It would provide another criter-
ion for matching. In some cases, however, this
might be a handicap. For instance, in TDS sys-
tems the pole pieces are not all of equal effi-
ciency. The amplitudes of adjacent speech
elements are affected by this change in effi-
ciency and they might not appear to match
when they really should. This condition, of
wave form patterns are not as good as spectro-
grams for diagnosing frequency shifts and the
like. However, they present the time scales more
graphically and they are not subject to tran-
sients at time discontinuities such as the spill-
over effects previously discussed.
The particular type of wave form pattern
found most useful was a variable-area pattern
similar to the sound track used in moving pic-
tures. Variable-area patterns are more distinc-
tive to the eye than oscillographic traces. They
form geometric designs that catch the eye and
facilitate matching. The manner of producing
and playing back these patterns is described in
Preliminary Reports No. 1,22 7,23 and 1224 of
Project C-43. An example of variable-area pat-
terns in process of matching is shown in Figure
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
I
.q.
CRYPTOGRAPHIC TOOLS AND METHODS 53 111
;
15 taken from Preliminary Report No. 2621 of
Project C-43.
? Variable-area patterns of this type have been
found particularly good for decoding TDS sys-
tems, especially repeated-code systems. Ampli-
tudes are clearly represented in these patterns.
By matching a multiplicity of cycles of a re-
peating-code system simultaneously, it is pos-
sible to take advantage of this amplitude
representation even though the wave form itself
band. Changes in the split-band code will then
have no effect on the wave form of patterns pro-
duced in this manner.
It was also proposed at one time that the use
of a whisper or monotone instead of normally
inflected speech would increase the privacy of
TDS systems. Again this is true in terms of
spectrograms, but it was found that variable-
area patterns could be matched almost as easily
for whispered speech as for normal speech, and
4
FIGURE 16. Oscillographic traces of Vocoder channel signals.
might be obscured by other features of the
privacy system. For instance, the use of split-
band coding was once proposed to increase the
privacy of TDS systems. This combination
would be much more private than plain TDS if
judged on the basis of matching spectrograms,
particularly if the split-band codes were rapidly
switched at intervals not simply related to the
TDS elements. No difficulty, however, was found
in matching the variable-area patterns to find
the TDS code. This is described in Preliminary
Report No. 1925 which also describes a scheme
for nullifying the effect of split-band coding on
the wave form. This consists of modulating all
the frequency bands down into one frequency
with the monotone it was actually easier. This
is described in Preliminary Report No. 1626 of
Project 0-43.
Another feature of the variable-area patterns
which might be useful is that the patterns have
characteristic shapes. Usually they look like a
series of damped oscillations with the highest
amplitude at the beginning of each fundamental
period. This should enable the recognition of
cases in which speech is transmitted backwards.
The characteristic periodicity of the patterns
might also be used to recognize whether a fre-
quency band is in its proper location.
Toward the end of Project 0-43 it came to be
recognized that there would be considerable ad-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
54
UNSCRAMBLING AND DECODING METHODS
vantage in using a compressor in the produc-
tion of variable-area patterns. This tends to
bring out low-level sounds. The distortion of the
wave forms resulting from instantaneous com-
pression is immaterial if they are to be used
only for matching. This kind of compression,
however, should be sharply distinguished from
automatic volume control action. The latter is
relatively slow acting and it is obvious that in
TDS systems, for instance, it would alter the
amplitudes of certain elements in such a way as
to make matches impossible.
MATCHING OSCILLOGRAMS
Oscillographic traces can be used instead of
variable-area patterns, although in general
permuted at short intervals provides a rather
difficult privacy system to decode.
It has been found that compression enhances
the value of oscillographic traces of this type.
Without compression the lower amplitudes are
obscured by the width of ?the traces. Instan-
taneous compression makes changes in the
magnitude or direction of the traces apparent
in the lower level sounds. The patterns shown
in Figure 16 were produced in this manner.
4
INDICATOR METHODS
In the following methods a visual indication
is obtained denoting which of several possible
choices puts the speech elements in their proper
order. These methods are applicable only to
FIGURE 17. Time division scrambling [TDS].
there will be a disadvantage. For Vocoder
privacy systems, however, oscillographic traces
are required. The signals in Vocoder channels
are essentially fluctuating d-c signals after they
are modulated down to their normal frequency
location. They can best be examined in the
form of oscillographic traces. Figure 16 shows
a set of undistorted Vocoder channel signals.
It will be noted that there is a tendency for
the amplitudes to vary simultaneously in the
several tracks. It has been found that if the
signals in the various channels are permuted,
even with the sharp edges resulting from arti-
ficially produced scrambles, the number of
mismatches tends to be about 40 per cent. This
means that a Vocoder system with its channels
cases where the possible number of choices is
not overwhelmingly great. A natural example
of a visual indication occurs in the illustration
of TDS in Figure 17. Whenever two originally
adjacent speech elements remain adjacent in
the scramble the two elements are not separated
by a time boundary in the spectrogram. Ele-
ments which do not belong in adjacent positions
have a boundary resulting from discontinuities
in the harmonics and from spillover effects.
The absence of a time boundary can be taken
as an indication that the two adjacent elements
belong together. To make use of this effect the
following procedure is suggested. Record a
sample of the scramble on a loop of tape. Re-
produce this sample through a TDS machine
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CRYPTOGRAPHIC TOOLS AND METHODS
55
and make a spectrogram, noting any adjacen-
cies which occur. Change the code in the TDS
machine and make another spectrogram again
noting adjacencies. A systematic set of codes
should be worked out in advance which explore
all the possible combinations of elements. At
the end of such a cycle of operations it should
occur at the boundaries of elements which do
not belong together. These will generate fre-
quencies higher than the cutoff of the high-pass
filter and will appear as pulses on the scope.
The absence of a transient will indicate either
that the elements belong together or that no
energy was present. Again a systematic cycle
FIGURE 18. Effect of rectification on normal and band-shifted speech. A, straight speech rectified; B, six-
code split-band scramble; C, effect of rectifying six-code split-band scramble.
be possible to place a large percentage of the
elements correctly. This can be applied to non-
repeated or repeated code TDS.
A variation of this method, which was sug-
gested but not tried and which should be much
faster, is as follows: Reproduce the recorded
sample through a low-pass filter, say 2,500
cycles. Pass it through a TDS machine and then
through a high-pass filter with the same cutoff.
View the output of the high-pass filter on a
cathode-ray oscilloscope whose sweep is syn-
chronized with the TDS cycle. Transients will
of codes should place most of the elements cor-
rectly.
Another example of the indicator method
is the following: Suppose in a split-band D2
system six known codes are used in an irregular
sequence, and it is desired to determine the
sequence. The following procedure is sug-
gested: Record a sample and reproduce it
through a decoding machine equipped with one
of the proper decodes, and make a spectro-
gram. Certain elements in the spectrogram will
be seen to be normal speech. These elements,
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
56 UNSCRAMBLING AND DECODING METHODS
of course, are the ones to which the particular
code applies. It is much easier to determine
whether a particular element consists of
straight or scrambled speech, than to deter-
mine which particular code was used. Repeat
this procedure with each of the other five
codes. Each element can thereby be identified
with a particular code.
USE OF RECTIFICATION
A variation of this procedure, which should
give more positive results, is as follows: The
NON-LINEAR DEVICE 1
OR DEVICES
LP FILTER
100
BASIC METHOD
SCRAMBLED
INPUT
MODULATOR
Fl
11.11
OSCILLATOR
5 FREQUENCIES
BAND FILTER
550 WIDE
TO INDICATING
DEVICE OR
RELAY
A
MODULATOR
TO
FIG. A
INPUT
11111
F2
1111
OSCILLATOR
10 FREQUENCIES
APPLICATION TO SPLIT BAND DECODING
FIGURE 19. Band-shift detector.
output of the decoding machine used as above
is rectified before making the spectrogram.
Rectifying normal speech does not add inhar-
monic components, whereas rectifying speech
which contains band shifts results in inhar-
monic components. This is illustrated in Figure
18. The upper spectrogram shows rectified
straight speech. This looks perfectly normal
,except that the frequency range is somewhat
more completely covered with harmonics than
is the case in normal speech. The second specto-
gram shows a sequence of split-band scrambles.
The third spectrogram shows a similar sample
rectified, with none of the elements decoded.
Rectifying the undecoded elements results in
a complete smear in the spectrogram compared
to the rectified straight speech. Properly de-
coded elements will stand out more clearly
? against the background of rectified scrambled
speech.
Another variation of the indicator method
consists in subjecting the scrambled speech to
a nonlinear device or devices in such a way as
to obtain difference tones between the compo-
nents. In normal speech, in which all com-
ponents are harmonically related, there will be
no difference tone lower than the pitch of the
voice. In scrambled speech the components are
not harmonically related and there will be dif-
ference tones lower than the pitch of the
44.
voice. The output of a 100-cycle low-pass filter
therefore, can be used to indicate whether a
band of speech is in its proper frequency loca-
tion or not. This is illustrated in Figure 19A. The
importance of this method lies in the fact that
each frequency band can be examined sepa-
rately. It might therefore be used to determine
for each element in a two-dimensional scramble
which frequency band it came from.
Figure 19B shows how each band can be
lifted out of the scramble and placed in each of
the five possible positions either straight or in-
verted. The spectrograph might be used to
speed up the analysis process as illustrated in
Figure 20. The output of the low-pass filter is
fed to the marking amplifier. Whenever the
output of the low-pass filter is zero there will
be no mark produced. Whenever there is an
output a mark will be produced. The procedure
would then be as follows: Set oscillatbr Fl at
one value and then set oscillator F2 succes-
sively at each of its ten values (or five if
inversion is not required). Repeat with oscilla-
tor Fl at each of its other five values. For each
of these 50 settings allow the spectrograph
drum to rotate two or three times with a few
blank rotations between each setting. The
traces on the drum will then look something
like the drawing. The time axis is as usual
disposed lengthwise. If all the traces in a
given time interval are blank it is presumed
that this represents a silent interval. Single
blank intervals in otherwise continuous marks
indicate that these settings were the correct
ones. If none of the marks for a particular
element are blank the indications are that at
that particular moment a consonant occurred
which of course is composed of inharmonic
components. This system was not actually tried
in this complete form but enough work was
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CRYPTOGRAPHIC TOOLS AND METHODS 57
done to show that it is possible to make use
of the presence of inharmonic components in
some such manner. It appears therefore that
a substantial fraction of the elements in a two-
dimensional scramble might be identified as
to frequency location.
One other possibility of this type might be
mentioned. Variable-area patterns of vowel
sounds have characteristic configurations.
These configurations depend on their harmonic
structure, and a disturbance of this structure
SAMPLE OF SCRAMBLED
SPEECH ON TAPE
FROM TO
2
2
1 4
4;
RESULTING PATTERN
CODE SWITCHING POINTS
I I I I I I I I I I I I 1111
\-INDICATES
SILENT
INTERVAL
INDICATES
TRUE
POSITION
FIGURE 20. Adaptation of spectrograph for de-
coding switched split-band scramble.
should change these patterns in a recognizable
manner. For instance, if the components are
inharmonic there will be no periodicity at the
fundamental pitch rate. It might therefore be
possible to use variable-area patterns, which
can be produced much more rapidly than spec-
trograms, as indicators along the lines of the
above discussion.
APPLICATION TO TABLE 1
In this section we will examine the applica-
tion of cryptographic methods to the specific
scrambling systems listed in Table 1. In this
table the systems which might require crypto-
graphic attack are indicated. The following
paragraph numbers refer to privacy systems in
Table 1.
A4. Among the systems listed under single
modulation the only one that might require
cryptographic treatment is the phase-reversal
system. This system is a special case of the
multiplication system which will be treated
later.
B4, C2,4 Among the double and triple mod-
ulation systems, the irregular continuous
displacements were not handled by noncrypto-
graphic methods. It might be necessary to make
a continuous series of spectrograms to deter-
mine the displacements as a function of time.
This might someday be done continuously and
instantaneously, in which case compensating
frequency changes might be made continuously
by hand to decode the material.
DL D2. Among the band-splitting systems,
the fixed or slowly switched codes can be solved
by inspection. If the code is rapidly switched,
however, single elements seldom contain suffi-
cient information to determine the codes. If
the switching sequence is a repeated sequence,
it may be worthwhile for the sake of quality to
determine the sequence and get in step with it.
In this case the methods described under the
heading "Indicator Methods" should be of
assistance. If the switching sequence is never
FIGURE 21. Repeated code multiplication system.
repeated the indicated noncryptographic meth-
ods appear most reasonable.
F2, F3. TDS systems yield very poorly to
noncryptographic attack. For repeated-code
systems, however, the code can readily be de-
termined by matching either spectrograms or
SECRET
neclassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
1
1111
1111
!
II
1,11
58 UNSCRAMBLING AND DECODING METHODS
variable-area patterns, taking advantage of the
numerical properties of the codes. These meth-
ods are covered in Preliminary Report No. 1415
of Project C-43. Nonrepeated-code systems,
however, have thus far been found exceedingly
difficult to handle, although the methods of
spectrogram matching, matching variable-area
patterns, and indicator methods apply. Efforts
in this direction are described in Preliminary
Report No. 2621 of Project C-43.
F4. Speed variations, according to some pre-
liminary laboratory tests, are rather ineffective
in masking the intelligence of speech unless
the variations are exceedingly wide and rapid.
Technical difficulties then become so great that
this appears to be an unlikely privacy system
by itself. Small variations in speed, however,
might be used to make spectrograms of TDS
systems more difficult to match. In this case,
however, it will be unnecessary to determine
the speed variation program if the TDS
scramble can be removed.
Gl, G2, G3. Combinations of TDS and fre-
quency scrambles are interesting from the
cryptographic standpoint. Since repeated-code
TDS systems were found easy to break, it was
proposed to add various forms of split-band
scrambles. It was argued that the continuously
changing frequency scrambles would alter the
shapes of variable-area patterns so that
they could not be matched. Furthermore the
changing frequency scrambles would make
spectrograms unsuitable for matching, espe-
cially if the split-band codes were switched
nonsynchronously compared with the TDS
boundaries. Each time the frequency code was
switched a new vertical boundary would appear
in the spectrogram, and in combination with
the TDS boundaries the spectrograms would
be very severely broken up in the time scale.
It was found, however, as discussed in Pre-
liminary Report No. 1925 of Project C-43, that
if the TDS code is a repeated code the fre-
quency scrambles can be practically ignored in
matching variable-area patterns. Having found
and removed the TDS code the remaining fre-
quency scramble can be solved by noncrypto-
graphic methods.
In the case of nonrepeated TDS, however,
the addition of split-band coding would increase
the difficulty considerably, provided that the
two coding systems do not provide clues to each
other. The most promising method for handling
this system appears to be to determine the split-
band codes first by the indicator methods
previously discussed. If the split-band codes are
then removed the remaining scramble can be
handled as straight TDS. Another possible
method is to make variable-area patterns with
all,Athe decodes superposed. The resulting pat-
terns, however, will not be as satisfactory for
matching as patterns of straight speech.
G4. The two-dimensional scramble can be
handled by matching spectrograms if a re-
peated code is used. Experiments along these
lines are described in Preliminary Report No.
2220 of Project C-43. If the code is nonrepeated,
however, it would be exceedingly difficult and
time consuming to handle by unaided match-
ing. It would help considerably if the original
frequency location of each element in the
scramble could be determined. This might be
accomplished by the methods described under
the heading "Indicator Methods."
Hl. Determining the code for multiplication
or phase-reversal systems can be accomplished
quite readily if the code is repeated at suffi-
ciently short intervals. In the one system which
was met in Project C-43 (Preliminary Report
No. 1827) the code wave was repeated 100 times
per second. In this case the scrambled signal
could be applied to the vertical plates of an
oscilloscope with the horizontal sweep syn-
chronized with the code cycle. It is obvious that
every time the coding wave passes through
zero the scrambled signal also passes through
zero regardless of the value of speech signal
at the moment. If several cycles of scrambled
speech material are superposed, therefore, they
have the appearance shown in the photograph,
Figure 21. The superposed traces show a defi-
nite pattern, with regions of high and low
amplitude, and also sharp indentations. These
latter are the crossover points of the code wave.
There is also a marked tendency for the peaks
to occur alternately above and below the center
line, but the amplitudes of the peaks are not all
alike. Since the speech amplitudes tend to aver-
age out over a number of cycles, the amplitudes
of the superposed peaks reflect pretty accu-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CRYPTOGRAPHIC TOOLS AND METHODS 59
rately the amplitudes of the coding wave at
those points. The probable shape of the coding
wave based on this evidence, has been partly
traced ins
It has been found experimentally that if
only the crossovers of the coding wave are
reproduced the speech will be intelligibly de-
coded: The decoding wave need not be the
reciprocal of the coding wave. It can be like
the one drawn in at the right in the photograph.
It is only necessary, therefore, to generate a
wave having its crossovers at the indicated
points, and reverse the phase of the scrambled
signal of these points.
112, 113. Level modulations by themselves are
not private, but they might very well be used in
combination with other systems in an attempt
to foil the matching of speech patterns. The
level modulations themselves, however, need
not be solved cryptographically.
J1. There appears to be no method either
cryptographic or noncryptographic for break-
ing the noise-masking method if the noise is
predistorted, random, and sufficiently high in
level to really mask the speech. These require-
ments, however, make the technical difficulties
for system operation very great and it is un-
likely that this method can be used over radio
channels. Cracking this system therefore be-
comes a matter of solving the noise-distorting
system. Project C-43 had no experience along
these lines.
K1, K2, K3, K4. Scrambled Vocoder channels
can theoretically be solved by matching oscillo-
grams. Actually as mentioned under the head-
ing "Matching Oscillograms" this procedure is
very difficult because the channels look so much
alike.
L1, L2, L3. Channel-mixing systems would
be exceedingly difficult to handle crypto-
graphically if a sufficient number of channels
were involved so that noncryptographic meth-
ods were inapplicable. The only possible method
of attack appears to be matching spectrograms.
Since, however, about 25 per cent of normal
speech consists of pauses, many of the switch
points will occur in these pauses and it will
therefore be difficult to establish continuity
by matching.
DETERMINATION OF THE MESSAGE
The objective of decoding work is usually not
to determine the codes used, but to learn the
intelligence which was transmitted under these
codes. In the case of repeated-code systems,
the procedure for obtaining intelligence is
obvious once the code has been determined
by the methods outlined above. It is only neces-
sary to set this code into a machine similar
to that ttsed at the receiving end of the system
being monitored, and listen directly to the
transmitted speech. If the material has been
recorded while the code was being determined,
the recorded material can in general be de-
coded in the same way.
In the case of nonrepeated-code systems, the
determination of the code sequence leaves us in
general a long way from the determination of
the message. All the material must first be
recorded in scrambled form. It is necessary
during this process to establish time reference
points in the scramble, perhaps by superposing
clicks or spurts of tone during the recording
process, and referring the code sequences to
these points. A decoding machine must be
available, such as the one described in Pre-
liminary Report No. 1528 of Project C-43, which
is adaptable to a variety of coding systems.
The code sequence must be set into this ma-
chine, perhaps in the form of a punched tape.
The scrambled material must then be repro-
duced and fed into the machine, maintaining
proper synchronism between the reproducing
and decoding systems. This is a formidable job.
There are some alternative possibilities
which may apply in special cases. In the case
of nonrepeated-code TDS, for instance, the
process of matching variable-area patterns has
actually restored the speech in reproducible
form. Variable-area patterns can be played
back just like the sound tracks used with
motion pictures.
USE OF PLAYBACK
A playback machine of this type is described
in Preliminary Report No. 1224 of Project C-43.
The rearranged elements are mounted on a
strip of adhesive, and scanned with a light slit
and photocell. Considerable noise is caused by
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
10;
!1'
1
UNSCRAMBLING AND DECODING METHODS
RECORDER UNIT
AMPLIFIER ANALYZER UNIT
' 6
RECTIFIER UNIT
FIGURE 22. Sound spectrograph (D-165529) on a "push-around."
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH 61
the joints between the separate elements, but
this could be largely eliminated by a specially
designed squelch circuit, perhaps controlled by
a separate light beam and photocell to cut off
the output wherever a joint is passing under
the scanning beam. The first attempt to use
this decoding method was unsuccessful, as dis-
cussed in Preliminary Report No. 2621 of Proj-
ect 0-43. However, there is nothing basically
wrong with the method; it simply needs better
execution than it received in the first attempt.
If the solution of the coding system requires
spectrograms rather than variable-area pat-
terns, it is still theoretically possible to play
back the rearranged pieces. A playback ma-
chine for spectrograms is described in Pre-
liminary Report No. 1729 of Project 0-43. This
first model requires a negative transparency
of the spectrograms, to be scanned by a light
slit and photocell, with a multifrequency light
chopper interposed ahead of the photocell.
Again the method is basically sound. The ex-
perimental machine described in the report
needs considerable improvement before it will
yield adequate quality for the purpose described
above, in order to overcome the degradation
of quality caused by the joints, by slight mis-
placements of the elements, by spillover at
the boundaries, etc. Furthermore, to get good
patterns for matching, the signal must be
subjected to a very high degree of compression,
which distorts both the time and the frequency
distribution of energy. It may be necessary
to make one kind of pattern for matching,
and another kind for playback, as was done
with the variable-area patterns described in
Preliminary Report No. 2621 of Project C-43.
As a final alternative, it is possible to learn
to read speech spectrograms by visual inspec-
tion. Theoretically, therefore, the rearranged
spectrograms might yield the message directly.
Here again, however, the boundary distortion
will increase the difficulty of reading the pat-
terns. It has also been found that the best
patterns for matching are not the best for
reading, and it' may be necessary to make two
sets of patterns. However, since spectrograms
have been continually improving, the possibility
of visually determining the intelligence from
rearranged spectrograms must be listed as a
distinct possibility, and one which, if it is
feasible, is the most general of all methods
since the basic procedure is the same for all
the scrambling methods which can be handled
in this manner.
4.5 THE SOUND SPECTROGRAPH
In the material to follow describing the sound
spectrograph developed in Project 0-32 and
used continuously in subsequent decoding and
evaluating projects, a brief and general
description will be followed by a more detailed
analysis of this important visual aid to the
study of privacy systems. The sound spectro-
graph analyzes speech (or other sounds) in
terms of its three basic dimensions of time,
frequency, and amplitude. Such analyses,
shown visually on a graph or chart, are helpful
in understanding the complexities of sound and
what various scrambling methods do to speech
to make it unintelligible.
In March 1941 an early laboratory model of
the sound spectrograph was demonstrated as
an instrument that with further development
might be useful in studies of telephone privacy.
It was appreciated at that time that the need
might arise for intercepting communications
in scrambled speech and decoding them. It was
also appreciated that new scrambling systems
might be encountered and that means would
be needed for diagnosing such systems. For
such a purpose the unaided ear has very limited
capabilities. Such things as oscillograms, which
show the wave form, provide few clues as to
the mechanism by which the wave form was
changed. Project C-32, the forerunner of Proj-
ect 0-43, was organized in the fall of 1941 to
product a sound spectrograph useful for
diagnosing and decoding speech scrambling
systems.
About a month before the attack on Pearl
Harbor, patterns that could be used for de-
coding work were being produced with a bread-
board model, and the first finished model of the
spectrograph was available by the end of that
year. Additional models of the spectrograph
were built for the Armed Services, incorporat-
ing improvements in operation and in rugged-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
62 UNSCRAMBLING AND DECODING METHODS
ness. The model, described in the final report
of the Project C-43 and shown in Figure 22,
has been used in studies of various privacy
systems submitted by the Army, Navy, and
NDRC for the purpose of evaluating the degree
of security which they afforded. Improvements
in the form of a calibrating circuit built into
the spectrograph and control circuits added in
the form of an appliqu?nit, were made as the
work progressed.
4'5.1 How the Sound Spectrograph Works
A schematic diagram of the sound spectro-
graph is shown in Figure 23. The signal to be
analyzed is recorded on a loop of magnetic tape
at a speed of 25 rpm permitting a sample 2.4
REPRODUCING
AND RECORDING
AMPLIFIER
MECHANICALLY
COUPLED
VARIABLE
CARRIER
OSCILLATO
12-23 KG
MODULATOR
FREQUENCY
RECORDING
DRUM
BAND
MANNING) -
FILTER AT 12 KG
MARKING
AMPLIFIER
FIGURE 23. Schematic diagram of sound spectro-
graph.
sec long to be recorded. The recorded material
is then reproduced at 78 rpm. Because of this
speedup, the original signals which may have
filled the frequency region between zero and
3.5 kc now extend to about 11 kc. The signal
is modulated with a carrier which gradually
changes in frequency from 23 to 12 kc as the
recorded material is reproduced repeatedly.
The lower sideband of the resulting signal is
passed through a band-pass filter with a center
frequency of about 12 kc.
The output of the filter is amplified and fed
to a stylus bearing on facsimile paper, making
a trace varying in density with the instan-
taneous energy passed by the filter. The paper
is mounted on a drum which is geared to the
turntable rotating the magnetic tape. As the
frequency of the modulating carrier changes,
the stylus moves along the drum laterally. The
resulting spectrogram is built up line by line.
In this manner a pattern is produced which
shows by its light and dark areas how the
intensity in the signal varies as a function of
time and frequency.
The change in frequency produced by modu-
lating the voice signal with a varying carrier
signal of suitable high frequency would not be
necessary if it were possible to make a band-
pass filter whose center frequency could be
shifted easily. In this case the actual voice fre-
que2cies could be scanned by the filter to de-
termine the characteristics in frequency with
time. It is easier, however, to accomplish the
same object by the method actually used in the
spectrograph.
4.5.2
Operation
It is the fact that both time and frequency
variations are simultaneously displayed which
makes spectrograms so valuable for decoding
work.
Scanning filters of various widths can be used
for different purposes. If the filter is wide, it
will give an analysis which is limited in the
amount of detail it can portray in the frequency
dimensions, but it will respond quickly to
changes in amplitude with time, and will there-
fore give sharp time resolution. The narrower
the filter the more frequency detail is shown in
the spectrograms, at the sacrifice, however, of
some of the time resolution. With all the filters
thus far used, the shift in frequency range
from line to line is only a fraction of the width
of the filter. Successive lines in the spectro-
gram, therefore, do not represent successive
frequency bands. They represent frequency
ranges which overlap by a large fraction of
their total width. The density of the patterns,
therefore, changes very gradually along the
frequency dimension.
The kind of patterns produced by this method
of analysis is illustrated in Figure 24. The
upper spectrogram in the figure was made with
a scanning filter about 300 cycles in width. The
separate words can be plainly distinguished.
The vowels are distinguished by dark bands
with vertical striations. The consonants are in
general less intense and show a different type
of structure. It will be noted that the dark
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH
bands are different in the different vowels, and
they change not only from one word to the next
but also within each word. Analyses of this
type, therefore, graphically portray changes in
the energy frequency distribution of a complex
signal with both time and frequency. It should
be emphasized, however, that the relative in-
tensities of the various components of this
particular sample of speech, notably the con-
sonants, differ to a far greater extent than
would be judged by the relative blackness of
their patterns. In other words, a very large
discrete harmonics causes the vertical stria-
tions in the patterns made with the wider filter.
Whenever the filter is wide enough to pass
several harmonics at once, these harmonics
beat with each other and form maxima and
minima in the output of the filter. The fre-
quency of the beats corresponds exactly to the
frequency of the voice pitch.
It will be noted in the 45-cycle spectrogram
that he harmonics rise and fall in frequency
from moment to moment. This reflects the
changing pitch of the voice known as inflection.
FIGURE 24. Spectrograms of normal speech, words being "one, two, three, four, five, six." In this case,
spectrograms are somewhat smaller than normal size due to photographic reduction and some trimming
at ends.
amount of level compression is incorporated
in these patterns.
The lower spectrogram in the figure shows
the same words analyzed with a filter only 45
cycles wide. This filter is narrow enough to
resolve the individual harmonics of which
vowel sounds are composed. The harmonics
consist of the fundamental voice pitch together
with both odd and even multiples of this fre-
quency. Some of the harmonics are stronger
than the others, because they are reinforced
by resonance in the oral cavities as the words
are formed. It will be noted that the dark
areas in these patterns correspond in frequency
and in trend with those in the upper spectro-
gram. The fact that vowel sounds consist of
Inflection is normally used in connected speech;
and this fact is of assistance in decoding work,
because the spacing and trend of the individual
harmonics in spectrograms provide important
clues in diagnosing privacy systems.
4.5.3 Level Compression
In normal speech there is a tremendous
change in level from moment to moment par-
ticularly in the level of consonants as compared
to vowels. There is also a considerable differ-
ence in the average level at low frequencies
as compared to high frequencies. This latter
difference can be corrected by predistortion,
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
UNSCRAMBLING AND DECODING METHODS
and present models of the spectrograph contain
shaping networks for this purpose. There are,
however, changes from moment to moment in
the relative levels of high and low frequencies
in different speech sounds which cannot be
corrected by shaping networks. The facsimile
paper on which spectrograms are made has a
range of between 10 and 15 db. The range of
levels in speech greatly exceeds this value. This
means that if the average level is adjusted
so that the highest components appear at maxi-
mum blackness, the lowest level components
will be invisible. Conversely if the level is so
adjusted that the low-level components appear
in the pattern, the high-level components will
severely overload the recording paper. To show
both the high- and low-level components occur-
ring in speech, therefore, it is necessary to corn-
pressl the instantaneous signal into a much
narrower range.
In the earliest models of the spectrograph the
marking amplifier shown in Figure 23 was
given a compressing action by means of a
thyrite varistor across the grid of the output
stage. Whenever the output of the scanning
filter was low the gain of the amplifier was
effectively raised from an average condition
and whenever the output was high the gain
was effectively lowered. This tended to equalize
changes in level with both frequency and time.
The compressor was replaced by devices which
can exercise certain types of discrimination in
controlling the instantaneous gain of the mark-
ing amplifier. These devices are known as con-
trol circuits. They provide patterns with better
resolution in both time and frequency than
can be obtained with the compressor. The pat-
terns shown in Figure 24 were made with these
control circuits in operation. The circuits are
described in Preliminary Report No. 27" of
Project C-43.
4.5.4
Possible Improvements
The spectrograph patterns underwent con-
tinual improvement in the course of this work,
but probably they can be still further improved.
The control circuits thus far produced are by
no means the final word. Circuits of this type
can be adapted to affect the patterns in various
ways, and it is conceivable that different con-
trol circuits could be developed for decoding
different types of scrambles.
One definite line of improvement concerns
the time resolution. Many scrambling methods
produce sharp discontinuities of the scrambled
speech in the time dimension. The process of
analyzing the scrambled signal in such a way
as4 to obtain high frequency resolution tends
to obscure the signal at these sharp boundaries.
This is a basic situation which affects not only
the spectrograph, but also all types of ana-
lyzers. To obtain a high degree of frequency
resolution, a narrow filter must be used. The
narrower the filter, however, the longer its
response and decay time, that is, the output of
the filter cannot be made to change as rapidly
in level as the instantaneous level of the signal.
This causes strong components to spill over
across the time boundaries. In general this
spillover does not interfere greatly with the
recognition of various privacy systems, but it
does interfere severely where spectrograms are
to be used for decoding work. Several possible
remedies for this situation have been devised
and are recorded in Chapter VI of Part I of the
final report of Project C-43.
4.5.5 Amplitude Representation
In the patterns thus far discussed the in-
stantaneous intensity of the signal is repre-
sented by the lightness or darkness of the trace
in the spectrograms. This representation is
inherently nonlinear and practically impossible
to make quantitative. For some types of work
it would be highly desirable if the amplitudes
could be represented in such a way that they
could be interpreted quantitatively.
Figure 25 shows a spectrogram which upon
close inspection will be seen to be made up of
discrete dots. The dots are close together in
the dark portions of the spectrogram and
farther apart in the light portions. The dots
themselves are all of equal blackness. The
spacing of the dots is in fact quantitatively
related to the instantaneous level of the signal.
The level at any point in the spectrogram can,
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
;
THE SOUND SPECTROGRAPH
65
therefore, be measured by measuring the dot
spacing with suitable equipment and comparing
it with a scale showing dot spacing vs level.
Another type of representation is shown in
Figure 26. Here the levels are represented by
the type of technique used in representing
topographical variations in contour maps. The
contour lines each represent regions in which
the signal reaches a particular fixed level. The
lines may be spaced so as to represent steps
of any desired number of decibels, or any
number of volts. In the lower spectrogram the
features designed for the specific purpose in
mind.
4.5.6 Spectrograph Details
As described in general terms above, the
output of the scanning filter of the sound
spectrograph is recorded continuously on fac-
siwile paper wrapped around a drum rotating
with the magnetic tape so that one revolution
of the tape corresponds to one rotation of the
FIGURE 25. Method of representing amplitudes in such a way that they can be interpreted quantitatively
by use of discrete dots all equally black. Dots are closely spaced in dark regions and widely spaced in
light regions. There is definite quantitative relation between dot spacings at any point and level of
signal at that point. Level could, therefore, be determined by measuring dot spacing.
spaces between the contour lines have been
filled in with various densities of dot spacing.
This permits instant recognition of equality
of level in different portions of the signal.
Quantitative amplitude representation may
or may not prove useful in decoding work. For
certain kinds of signal it should prove useful,
because it provides another dimension besides
time and frequency which can be used for
determining continuity or discontinuity in the
signal. In other cases, however, it may prove
useless, because changes in level have arbi-
trarily been introduced into the scramble.
The developments mentioned above empha-
size the fact that the sound spectrograph is a
highly flexible device and its capabilities along
any line can be greatly increased by adding
drum. The drum is moved laterally by a lead
screw as the modulating frequency is slowly
changed.
The analyzer circuit comprises a variable-
frequency oscillator, a balanced modulator in
which the output of the oscillator is mixed with
the voice frequencies, and the scanning filter.
The balanced modulator automatically prevents
any signals from getting into its output circuit
except the resultant sidebands produced by the
modulating or mixing process. Thus neither
the original voice frequencies nor the oscillator
frequencies appear in the output. Since the
band-pass scanning filter has a mid-band fre-
quency of about 12 kc it automatically selects
or passes the lower sideband produced by the
modulating process. The sidebands appearing
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
11
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
66
UNSCRAMBLING AND DECODING METHODS
in the output of the modulator have energy-
frequency distributions identical to the energy
of the modulating signal and occupy a position
in the frequency scale corresponding to the
carrier frequency. A change in the carrier or
modulated signal of, for example, ?200 cycles,
will cause the two modulator output sidebands
to shift to a position in the frequency scale
200 cycles lower.
The scanning filter has a mid-band frequency
subsequent extensions of this project, the spec-
trograms are slightly over 12 in. long normally
representing a recording of 2.4 sec making the
time scale approximately 200 msec to the inch.
The records are normally 2 in. wide covering
3.5 kc making the frequency scale about 1/16
in. per kilocycle. The frequency dimension can
be expanded if desired but this requires that
a longer time be available for making the
recyd.
FIGURE 26. Amplitude representation by contours, every point on any one line representing equal signal
level, and successive lines starting from blank background representing successively higher levels. In
upper spectrogram, it is not immediately apparent which regions are peaks and which are valleys. In
lower spectrogram, areas between successive lines have been filled in with patterns made up of discrete
dots. Closer dots indicate higher level, with regions of equal level in different parts having same dot
spacing.
such that when the carrier has one extreme
value, only the lowest frequency components of
the lower sideband will fall within the pass-
band of the filter. When the carrier has its
other extreme value, only the highest frequency
components of the same sideband will pass
through the filter. As the carrier frequency
is slowly changed, all frequencies of one side-
band (in this case the lower sideband) will be
scanned by the filter and the relative strengths
of the signals from moment to moment will be
impressed upon the recording facsimile paper.
The record is made on what is known as
Teledeltos paper whose light-colored surface is
blackened by the passage of an electric current
from the metal stylus through the paper to
the metal drum on which it is wrapped.
In the model emplqyed in Project C-43 and
4.5.7 Applications of the Spectrograph
Although the spectrograph was developed for
use in analyzing speech privacy systems and in
decoding scrambled speech records, it has more
general application. The spectrograms shown
here are characteristic of what the instrument
can do in analysis and illustrate the results
obtained with different filters, different scan-
ning rates, and different types of material. The
illustrations (taken from the October 1, 1943
report41 on Project C-43) are for the most part
familiar sounds selected to permit a mental
comparison of the sound and its time-frequency
pattern. These illustrations are followed by ex-
amples of the effects of various scrambles upon
speech.
Perhaps the most familiar example of a wave
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH
which is complex in both the frequency and
time dimensions is . speech, which therefore
provides excellent material for illustrating
what the spectrograph can do. Figure 27 shows
a spectrogram of the sentence, "We shall win
or we shall die," spoken in a normal manner by
a male voice and scanned with the narrow
filter. The time and frequency axes are indi-
67
lines, they are the separate harmonics of the
voice pitch, flowing up and down as the voice
is inflected. The unstriated sounds are unvoiced,
such as the "sh" in "shall."
Figure 28 shows spectrograms of the same
sentence made with three different filters. In
the one made with the widest filter, the separate
harmonics are no longer visible, but the areas
FIGURE 27. Spectrogram of "We shall win or we shall die," with "gray scale" below, showing intensity
variation relation.
cated by appropriate scales. The intensity
variations are indicated by variations in shade
as shown in the scale below the spectrogram.
It should be emphasized that there are about
400 horizontal scanning lines in this 4-in.
spectrogram; too close together to be seen
individually. The horizontal striations which do
appear in the spectrogram are not scanning
of resonance are brought out more clearly.
Figure 29 shows a comparison between normal
speech, a monotone, and a whisper, all by the
same voice. In the monotone the harmonics
are straight horizontal lines, and in the whisper
the harmonics disappear almost entirely, but
the dense regions by which the different sounds
are recognized still persist.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
II
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
68
UNSCRAMBLING AND DECODING METHODS
Figures 30 and 31 show some musical effects.
The soprano solo shows how the vibrato affects
both pitch and iptensity. The harmonics, it will
be noted, are much farther apart than in the
male voice. In the piano music, the notes show
tapering traces, as would be expected from
their nature. The other illustrations require
no special comment, except to note that the
kc. The lowest spectrogram shows an accelera-
tion measurement. It was desired to find how
long it took a phonograph record to come to
full speed after being released, the turntable
running at full speed all the time. This was
accomplished by simply recording an 8-kc tone
on a sample record, and capturing the output
of the reproducer during acceleration. The time
FIGURE 28. Same sentence as shown in Figure 27 recorded through filters of different bandwidths. A, with
45-cycle filter; B, with 90-cycle filter; C, with 300-cycle filter.
telephone bell was analyzed with the wide filter
to show the time pattern more clearly. It may
be seen that the clapper hits two bells alter-
nately, but somewhat irregularly.
Figure 32 shows some applications in which
the spectrograph provides a convenient method
of obtaining a graph of frequency versus time.
The upper spectrogram shows the output of a
particular slowly warbling oscillator, and the
second shows a more rapid sawtooth sweep
frequency, the latter spectrogram covering 11
consumed in acceleration, 130 msec in this case,
is directly indicated.
Figure 33 shows some more 11-kc spectro-
grams, illustrating the fact that some common
sounds cover a very wide frequency range.
Figures 34 and 35 return to the 3.5-kc range
to show longer samples. They require no special
comment.
pontrasting with these illustrations, Figure
36 shows an example of a steady wave, namely
thermal noise. Two different levels are shown,
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
IT
3
THE SOUND SPECTROGRAPH 69
one of them analyzed with both the "narrow"
and the "wide" filter. It will be noted that some
of the sounds in the previously discussed spec-
trograms have components which are of the
same nature as thermal noise, while some have
components of definite frequencies. The latter
can be recognized by their solid texture in the
spectrograms as compared to the characteristic
well as complex frequency structure because
the ability to show both at once is the unique
feature of the spectrograph.
SPEECH PRIVACY PROBLEMS
Even in a steady flow of speech, the distri-
bution of energy over the frequency range is
constantly changing. Voiced sounds have a
FIGURE 29. Spectrograms showing comparison of: A, normal speech; B, monotone; C, whisper.
texture of a random wave form exhibited by
thermal noise. The "sh" in "shall," and the
roar of the flame, are examples of random
sounds, while components of definite frequency
may be seen in the jingling of keys (Figure 33)
and the filing of metal.
These illustrations, which were chosen for
variety and for interesting features, show what
the spectrograph will do. Most of them, as
emphasized before, show time variations as
definite structure, consisting of a series of har-
monics of the fundamental voice pitch, the
harmonics being stronger in some frequency
regions than in others. Unvoiced sounds have
no such definite structure, but show a "smear"
of energy which may or may not be concen-
trated in definite frequency regions. Words and
sounds are recognized by their energy pattern
in both time and frequency. Different speakers
uttering the same sentence will produce pat-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
70 UNSCRAMBLING AND DECODING METHODS
terns which show, a distinct general resem-
blance, but also marked differences. The speech
pattern also may be considerably distorted by
artificial means before the ear fails to recognize
the speech, provided the distortion is not too
discontinuous in frequency or time. Since
privacy systems depend for their effectiveness
on distorting the speech pattern beyond the
possibility of recognition by the ear, it seems
? (I
?:1 401.4.1,0 '
?
speech than the low=frequency regions. In these
patterns, as before, the horizontal scale is time
(about 1.8 sec is represented in each example),
the vertical scale is frequency (the upper limit
is 3 kc), and the density or blackness represents
the intensity of the energy in a given regiion.
It should be noted that the resolution of the
process is sufficient to separate each harmonic
in the voiced sounds. This is important, as will
4
C..4,1 ?
jr**.mono.y..
?
?
izSitr3.04.
FIGURE 30. Musical effects. A, soprano voice unaccompanied; B, piano music ;r C, orchestra music.
reasonable that this distortion would also be
visible to the eye if the scrambled speech pat-
tern could be reduced to suitable graphic form.
Examples of such patterns are shown in the
attached photographs taken from the final
report" on Project C-32. Figure 37 shows some
normal speech, undistorted except that a slop-
ing network was introduced in the electrical
circuit to bring out the high-frequency struc-
ture, since this is always weaker in normal
be seen later, because normally the voice funda-
mental is constantly changing, that is, the voice
is inflected, and since the harmonics are mul-
tiples of the fundamental, the higher harmonics
show progressively more change than the
fundamental. For instance, if the fundamental
goes from 100 to 200 cycles the tenth harmonic
goes from 1,000 to 2,000 cycles, a difference of
1,000 cycles as compared to 100 cycles for the
fundamental. The traces of harmonics in the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH 0 71
visual speech patterns will, therefore, have
greater slopes at the high end of the pattern
than at the low end. This may be seen quite
clearly in the examples of Figure 37.
Figure 38 shows patterns of some vowel
sounds. In making these patterns, an attempt
was made to enunciate clearly, and also to keep
the pitch constant (monotone), so -,as to show
1
7777?--
?
showing transitions from one vowel to another.
These pairs were chosen because their time
characteristics are direct opposites.
SCRAMBLED SPEECH PATTERNS
Figure 40 shows the output of a privacy sys-
tem -which depends on simple inversion. In the
inverted speech, the slopes of the harmonic
?I
qoe.?,:_?0-., ,,..-tty':,31.'._ .?:4.*I-4!;:rA, ...,,,,r--,,--;
? . ' -45 . 4 ' ??? = 4 .
A.
FIGURE 31. Sound effects. A, whistling with warble or rising note; B, police whistle; C, telephone bell.
the difference in energy distribution for these
sounds. These are of interest because of the
possibility that the visual patterns themselves
might give clues as to the words they contain.
Figure 38 also shows the effect on the frequency
resolution of widening the band-pass scanning
filter. The wide filter gives much better reso-
lution in time, however, as will appear subse-
quently.
Figure 39 shows some diphthong patterns,
traces become greater towards the bottom of
the pattern, which is the direct opposite of
normal speech, and is therefore a definite sign
of inversion. The pattern also thins out at the
bottom, but this could be altered by a suitable
distorting network. No network, however, can
change the slopes of the harmonic traces. Inci-
dentally, the carrier' "leak" shows up in the
pattern, giving a direct indication of the fre-
quency about which the inversion was per-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
72 UNSCRAMBLING AND DECODING METHODS
FIGURE 32. Spectrograph applications in which frequency versus time curve is presented. A, output of
warbling oscillator; B, sawtooth generator output; C, acceleration of phonograph record on moving
turntable.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH
73
formed. If the carrier is completely suppressed,
however, its location may be determined by
trial.
A more complicated privacy system is the
split-band system, used in transatlantic radio-
telephony, in which the frequency range is
divided by filters into several bands, which are
then arranged in a different order, and some
are inverted. Figure 41 shows patterns of the
Looking at the inflected portions, it is quite
easy to find one which is either definitely in-
verted or definitely erect. The other bands can
then be immediately labeled inverted or erect
depending on whether they have the same
direction of curvature as the band previoUsly
identified. Now, the relative slopes of the har-
monic traces in the different bands indicate
their original position in the frequency scale;
4
A
. 44%,
. .
itft
0 , ' .?
=.F`'0 6 f
Si..
FIGURE 33. Spectrographs showing that sounds exist in high-frequency region. These are 11-kc, 1,000-
cycle filter records. A, sound of crumpling paper; B, sound of tearing cloth; C, jingling keys.
output of such a system with two different
codes. Both of these samples contain portions
in which the voice was quite markedly inflected.
The fact that the frequency range has been
divided into five bands is quite apparent from
discontinuities in the energy distribution, and
also from discontinuities in the harmonic
traces. It is also quite apparent that some of
the bands have been inverted because the voice
cannot be inflected both up and down at once.
the band showing the least slope (or curvature)
must originally have been the lowest band, and
the band with the greatest slope (or curvature)
must have been the top band.
The scrambling methods thus far illustrated
alter the frequency characteristics of the speech
patterns. The TDS privacy system, discussed
in detail in Chapter 2, operates on the time
characteristics of speech, dividing successive
sections of speech, each m seconds long, into n
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
74 UNSCRAMBLING AND DECODING METHODS
short time elements which are sent in a
scrambled time sequence. Each syllable is cut
up and received as short bursts of energy in
the wrong order. The number of scrambled
orders available increases very rapidly with n.
Systems have been developed in which m is as
short as 0.6 sec, and n is 20, making each
element 30 msec. A pulse of tone is sent every
known. Means must then be found for deter-
mining the code, and this decoding process
must be repeated every time the code is
changed. If the code is changed often enough,
the decoding will lag far behind the message.
It is essential, therefore, that every artifice be
employed to increase the speed of decoding.
Figure 42 shows some speech patterns scram-.
FIGURE 34. Common sounds recorded in 3.5-kc range, 300-cycle filter. A, striking match and flame; B, filing
on metal; C, machinery noise; inset is same with 45-cycle filter.
n-t seconds to keep the transmitter and receiver
in synchronism. In one such system over 60,000
codes are available, and they may be changed
quite readily.
DECODING THE TDS SPEECH
Obviously, if it is desired to decode such a
privacy system, it is necessary first to evaluate
m, and n. Presumably a machine could be built
to unscramble the speech if the code were
bled by a TDS system. It is apparent that the
speech has been chopped up on the time scale
rather than on the frequency scale. It is easy
to determine n by the length of the elements,
and since the synchronizing pulse shows in the
pattern, the most natural assumption is that
m is given by the distance between these pulses
or some multiple of it. In the illustration of
Figure 42, duplicate patterns were made, each
element was numbered, and one of the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH
75
scrambled patterns was then cut up and re-
assembled, giving the code. It should be noted
that in the scrambled patterns a few elements
within each code cycle immediately stand out
as probably belonging together, particularly
when voice inflection occurs. Usually the other
elements in a section cannot be positively
matched. It is of tremendous help, therefore, if
identical patterns are mounted on movable
slides, and viewed through a system of mirrors
which superposes the two, but all the upper
pattern to the right of a definite line is blocked
out, and all the lower pattern to the left of this
line is blocked out, so that effectively any two
elements may be juxtaposed to see whether
they look as though they were originally con-
FIGURE 35. Additional 3.5-kc sounds. A, splashing stream of water; B, air bubbles blown through water;
C, riffling stack of file cards.
the scrambling order is repeated over and over.
A doubtful match can be checked in another
section, and matches which are impossible to
spot in one section can be readily spotted in
another.
Rather than cut the pattern up as in the
illustration, an optical system has been built
for viewing two duplicate patterns simultane-
ously. This is shown in Figure 43. The two
secutive. If a match is discovered in one section,
the viewer may be shifted without moving the
slides, for an immediate check in other sections.
Instead of dividing the scrambled pattern with
lines and numbering them as in Figure 42,
suitable scales and numbers for a particular
TDS system can be incorporated in the slides.
Speech patterns have been shown to be useful
in decoding all systems of speech privacy known
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
76 UNSCRAMBLING AND DECODING METHODS
to be in use. This method, however, which is
quite general, may not necessarily be the speedi-
est in all cases.
SPECIAL METHODS FOR TDS
The TDS system appears to be the most diffi-
cult to decode of all the speech privacy systems
known to have been reduced to practice, par-
time characteristics have been scrambled, the
wave form itself provides evidence which can
be visuall interpreted. Various methods have
been tried, the first being the ordinary oscillo-
graph which discloses that there are discon-
tinuities in time more sudden and frequent than
occur in normal speech. It is possible to cut up
such traces and piece them together. Examples
FIGURE 36. Thermal noise as example of steady sound. Two upper records made with wide filter, two
levels, 12-db apart. Lower spectrograph made with narrow filter. These are 11-kc records.
ticularly if a large number of codes are avail-
able and if they are changed often. A great deal
of emphasis naturally was placed on TDS in
Division 13 work. The following sections dis-
cuss methods particularly applicable to TDS,
investigated in parallel with the speech pattern
development.
Wave Form Traces. Speech patterns of the
type thus far discussed are particularly de-
signed to display the frequency composition of
speech, so that distortion of the frequency scale
could be recognized visually. Where only the
of such records are given in the final report" of
Project C-32.
It was thought that a variable-area sound
track would provide more distinctive patterns
than oscillographic traces, and would have the
additional virtue that they could be played
back, and could, therefore, serve perhaps as the
primary record of the intercepted message.
This scheme has proved to be useful. Examples
of records made in this manner will be found
in the final report on Project C-32 and in sev-
eral of the preliminary reports of Project C-43.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH
77
? Partial Matching. The above methods would
' not serve if the TDS code were changed very
often, in the extreme case if it were changed
every cycle. One branch of the investigation
has, therefore, attacked TDS from a statistical
national Business Machine punched cards,
thereby enormously reducing the number of
codes remaining possible. The most complex
TDS system under consideration in Project
C-32 has twenty elements per code cycle with
ft
FIGURE 37. Normal undistorted speech with sloping network to bring out high-frequency structure.
angle. In a system with a sufficient number of
elements the total number of available codes
is very large. If, however, in a given code cycle
a few elements can be visually matched, the
others being inconclusive, it appears possible
to tabulate in advance all the codes which will
satisfy the observed matches, perhaps on Inter-
over 60,000 good codes available. This may be
reduced to only eight possible codes by match-
ing two groups of three elements. These eight
codes might conceivably be tested successively
by automatic means, the correct one being rec-
ognized by ear. Presumably, the message could
thus be decoded cycle by cycle. A cycle contain-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
78
UNSCRAMBLING AND DECODING METHODS
ing insufficient material for visual matching
may contain no indispensable portion of the
Message either.
FURTHER POSSIBILITIES
Assuming that the methods outlined apply to
all privacy systems which it is desired to crack,
further work would be directed toward speed-
ing up the processes. Improvements in speed
can, it appears, be made in all of the processes
Desirable sections could be stopped at any time.
This appears, however, to require considerable
equipment as well as considerable development,
and would be undertaken only if it appeared
quite certain that speech patterns afforded the
best means of keeping up with a rapidly chang-
ing code.
Large Variable-Area Patterns. The variable-
area pattern method discussed above did not
revire photographic film, but the patterns had
FIGURE 38. Patterns of vowel sounds showing effect of wide and narrow filters.
outlined previously. These improvements may
be summarized as follows:
? Instantaneous Speech Patterns. With the
sound spectrograph the selected sample of
speech is scanned at more than twice its normal
speed, the filters, etc., being designed for this
purpose. It appears quite feasible, by pushing
this process up into television frequencies, to
obtain speech patterns of the same type on .the
face of a cathode-ray tube, for instance, repre-
senting either a "still" or a "moving" picture
of, for example, 1 sec of speech. In the latter
case the picture would be running off one edge
of the screen and onto the other continuously.
to be photographically enlarged for easy in-
spection and handling, which is a slow process
at best. It does not appear impractical, particu-
larly if it. is not necessary to play the record
back, and if the high frequencies are going to
be modulated down, to develop a simple record-
ing system to produce patterns of the variable-
area type big enough to see and handle without
enlargement, thus providing instantaneous pat-
terns. For cases where the code is repeated, a
cylinder, revolving synchronously once per
code, with a corresponding lateral movement
would give a spiral record on which the sinu
larly located elements of each code cycle woul
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND SPECTROGRAPH 81
ime.
able
ent,
tred
the?
trig-
ble-
not
had
44T 5L-te, 44k. ;
?
in-
ess
cu-
ard
? to
rd-
out
.at-
, a
per
?nt,
ni-
ule
NUM5ER5 INDICATE ORI6iNAL ORDER.
INDICATES IA/VERTEX) 13AND.
FIGURE 41. Patterns from split-band privacy system.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
;
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
82
UNSCRAMBLING AND DECODING METHODS
I,3-SCRAMBLED
2,4-REARRANGED IN ORIGINAL ORDER
I MARKS SYNCHRONIZING PULSE
?
FIGURE 42. Examples of TDS speech with elements cut apart and reassembled.
SECRET
2
4
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
THE SOUND, SPECTROGRAPH
83:
be vertically arranged so that several matches
could be seen simultaneously.'. 22-24
Decoding by Automatic Trial. It appears
quite feasible to combine a modified irDs re-
ceiving machine with a crossbar switch system,
actuated by punched cards, perhaps, so as to
try successive codes until one unscrambles the
speech. This is particularly applicable to cases
where the code is changed often, but where the
number of possibilities can be greatly reduced
by visual means. It is also applicable to cases
where the total number of available codes is
small.
eral ways. First a visual inspection will tell
whether portions of the speech are inverted or
not and the discontinuities in frequency or time
Or pattern will reveal the coding system used
at the remote transmitter. The individual seg.,
ments of the spectrograph may be cut apart
with shears and reassembled so that the un-
scrambled pattern may become evident. Having
determined the nature of the scramble, equip-
ment can be assembled or existing equipment
caribe adjuited so that future samples of the
scrambled speech may be translated audibly as
they come in.
FIGURE 43. Optical system for comparing duplicate patterns simultaneously, avoiding necessity of cutting
up spectrograph.
Decoding Equipment. Equipment Might be
assembled for actually decoding scrambled
speech. For instance, a system of adjustable
filters and carriers might be built to take care
of all split-band systems. This includes shifting
and inverting frequency bands, introducing dif-
ferent delay into various bands, removing
bands of noise, wobbling the carrier, and what-
ever other frequency distortion may be in-
cluded. A TDS decoding system with adjustable
elements and codes also deserves consideration.
4.5.8
Additional Material in Project C-32
In actual use, the spectrograms made of rec-
ords of scrambled speech are analyzed in sev-
In the final report" on Project C-32^ will
be found a discussion of methods for making
beech patterns other than those described
here, and the results of using certain foreign
language records (Linguaphone) in an effort
to discover if the spectrograph was universally
usable without the necessity of having foreign
language experts on the decoding staff. It was
found that the fundamental characteristics of
speech are universal and that the means by
which a recorded sample of scrambled speech
was distorted could be worked out even if those
in charge of the equipment did not understand
the language employed.
a Project C-32, Contract No. OEMsr-230, Western
Electric Company, Inc.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
J
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
84 UNSCRAMBLING AND DECODING METHODS
4'6 PRACTICAL EVALUATION OF PRIVACY
SYSTEMS
? Experience has shown that there is a strong
tendency to underestimate the security or mili-
tary value of a given privacy system as soon
as laboratory studies have indicated that the
system can be . cracked. An attempt will be
made here to point out the great difference
between what might be termed theoretical or
laboratory evaluation and practical or field
evaluation, written from the standpoint, not of
the man interested in decoding a system, but
of the man interested in getting a practical
)
rivacy system into use in the field.
RACKING TIME
The objective of a laboratory study of a pri-
vacy system is to obtain some kind of quanti-
tative measure of the time or effort required
to decode the system. The questions are: "How
long does it take to determine the code, and
how much equipment and how many people are
required?" The coding and decoding processes
are studied in detail, possibly with the aid of
mathematical analysis, to determine whether
there are any weaknesses or any characteristics
of the coding process of which advantage might
be taken to assist in the cracking process. Pos-
sibly a noncryptographic method will be found
to apply. In this case the cracking time reduces
substantially to zero. If noncryptographic meth-
ods are not applicable, available cryptographic
tools and methods are brought to bear. Usually
a new scrambling system will require modifica-
tions or changes in the existing tools or tech-
niques. Possibly the basic methods can be im-
proved for use against this particular system,
or possibly new methods can be devised. Pre-
sumably after all this development work the
project personnel will have become skilled in
the art of decoding this particular system. The
cracking time can then be determined quanti-
tatively, perhaps with estimates as to how far
this may be reduced by further skill.
In the case of repeated-code systems, the
cracking time determined in the above way
substantially represents the total decoding time,
because, as mentioned previously, this code can
be set into a receiving machine and the message
obtained directly. Some additional time might
be added, however, for determining what was
said during the time that the code was being
determined.
The procedure outlined above is very well
illustrated in the series of preliminary reports
on Project C-43 covering the development of
cracking methods for the repeated code TDS
system. They include mathematical analysis,3?, 31
the development of a new decoding too1,22, 23 and
the reduction of the decoding technique to a
routine." In the case of the multiplication sys-
tem, the chronological steps are in one report.27
Too often the cracking time, as determined
above, is quoted without qualification to de-
scribe the security of a system. It is, of course,
usually understood that the use of this figure
involves the following assumptions: (1) that
the enemy knows all about the coding system,
(2) that he is equipped with an adequate supply
of the machines (our own models may still be
far from the production stage), (3) that he
has developed the same decoding tools and tech-
niques that we have (some of our tools may
be entirely new and secret), (4) that he is
equipped with an adequate supply of the de-
coding tools, (5) that he has men trained in
their use, and (6) that he is in a position to
receive a good signal free of interference. Such
assumptions certainly represent an extreme
possibility. Experience has shown that there is
a strong tendency to forget just how extreme
a condition such assumptions represent. Even
if the assumptions are valid there are still other
factors which affect the military value of a
privacy system.
NONREPEATED CODE SYSTEMS
If the code is changed periodically it may be
necessary to have several decoding teams work-
ing in parallel to keep up with the transmitted
material. The number of teams which will be
required depends on the relation between the
intervals of the code changes and the cracking
time. No particular difficulty presents itself in
expressing the decoding effort under these con-
ditions in terms of man-hours. The evaluation
is complicated, however, by the necessity for
additional equipment, not only for decoding but
for recording.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
PRACTICAL EVALUATION OF PRIVACY SYSTEMS
85
? In the case of nonrepeated code systems, the
cracking time for any given portion of a mes-
sage will, in general, be long compared to the
duration of that portion of the message. Every
portion of the message must be cracked indi-
vidually, and the decoding effort can be ex-
pressed as a ratio of decoding time to message
time. This ratio may be 1,000 or 100,000 to 1,
that is, each second of message will take 1,000
or 100,000 teams to keep up with the messages
as they are spoken.
This kind of evaluation is somewhat unsatis-
factory, because the length of time it will take
the enemy to determine the intelligence in a
particular sentence which might carry military
information will depend on whether or not he
I v
is at the mo nt working on this sentence or
whether he is asting his time decoding previ-
ous material which might contain no informa-
tion of value to him. In fact, it has been pro-
posed that the security of such high-privacy
systems could be materially enhanced by keep-
ing the circuit 100 per cent busy with all kinds
of material, possibly even from recordings,
-making certain that the enemy has no way of
determining when the circuit is being used for
passing important information. As in the case
of nonrepeated code systems, it seems a bit
unrealistic in evaluating such a system to as-
sume that the enemy will seize upon the few
seconds of message time which are important,
and to compute the length of time it will take
him to decode that portion of the message.
CODE ANALYSIS
Many schemes have been proposed for gen-
erating ever-changing codes by a combination
of short cycles geared together in such a way
that the number of elements in the cycle is the
product of the number of elements in the indi-
vidual cycles. One scheme is to use odd ratios,
such as 99 to 100, so that the code cycle will
not repeat until the smaller wheel has made
100 revolutions. In other words there are 9,900
steps in the code cycle before it repeats. Another
scheme is the cyclometer type in which one
wheel rotates one step for each revolution of
another wheel. Again the total cycle is the
product of the number of steps on the indi-
vidual wheels.
Such schemes should be distinguished from
truly nonrepeating codes, because wherever
cyclic processes are used, they are subject to
analysis. This is a matter pertinent to the field
of cryptanalysis and will not be discussed here.
In general, it may be said that the difficulty of
solving such long cycles is not determined by
the total length but rather by the length of the
individual subcycles.
Systems designed to produce a long code
setuence usually contain provision for read-
justing or realigning certain elements period-
ically or from day to day. Assuming that we
know all about the system except the momen-
tary settings, estimates can usually be made of
the length of time and the number of people
it would take to determine the unknown set-
tings by analyzing a given sample of the code
sequence. The analyst requires a knowledge of
the code for a long sequence of scrambled
speech before he can begin the work aimed at
determining the unknown settings. He must
obtain and solve a sufficiently long sample of
the scramble and then analyze this sequence
to obtain the settings. Too frequently the eval-
uation of a coding system is based on the
analyzing time alone whereas the time required
for solving or unscrambling a long sequence of
scrambled speech may be overwhelmingly
greater than the analyzing time. In fact if there
is no way of solving the code sequence from
the scramble alone, then the analyst can con-
tribute nothing, and the system is still secret
regardless of any inherent weakness of the
cyclic coding system.
FIELD EVALUATION
The continuously changing military situa-
tions of modern warfare require rapid means
of communication in order that the required
military actions can be taken. A perfectly secure
speech privacy system is of no military value if
it requires so much time for encoding and
decoding that it slows up the communication
system to the point where appropriate steps
cannot be taken when needed. Similarly, a
cracking system is of no value if it is too slow
to permit countermeasures to be taken accord-
ing to the intercepted intelligence. For certain
purposes 15 min or even 5 min cracking time
SECRET
neclassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
86 UNSCRAMBLING AND DECODING METHODS
is much too slow. Where this is true, a privacy
system giving 15 min or 5 min privacy is just
as good as one with an hour's security. This is
important because systems affording a few
minutes of privacy were developed in portable
form, whereas those providing longer privacy
were not.
Consider also the equipment and trained
personnel required for decoding intercepted
communications. As a specific example, the
small TDS unit required about 15 min for de-
coding but it required a van-load of highly
specialized equipment.32 Suppose the small port-
able TDS unit were used in many planes and
tanks and other mobile equipment that required
some privacy. Suppose also that different codes
were used within different groups of units and
that the codes were changed at some reasonable
interval. Would it be worth the enemy's while
to provide enough decoding equipment and
enough trained personnel to follow these units
around and decode their messages? If it is not
worth his while, then units rated as low in
privacy may provide high-grade privacy under
such conditions.
Obviously the foregoing does not apply if the
units are used to convey messages between the
higher echelons of command. In such cases
the messages have a longer term significance
to the enemy, and he can afford to devote con-
siderable time and equipment to intercepting
and decoding them.
Advantage might also be taken of the element
of surprise. Suppose we suddenly introduce in
the field a low-grade privacy system in large
quantities. How long would it take before the
enemy diagnosed the system, developed a de-
coding method, manufactured receiving sets of
..?\:ihe proper type and also decoding equipment,
istributed these where needed and organized
and trained personnel to use them? Until he
has done these things the units provide com-
plete secrecy. A different kind of system might
then be introduced which would again provide
secrecy for a time..
It is intended simply to point out that there
are other considerations in the evaluation of
privacy systems than the time it takes a highly
specialized group, such as the personnel of
Project C-43, to decode the system under the
ideal conditions of a laboratory. The decoding
time alone is often quoted, because it is the
only element which can be described quanti-
tatively. While there is always theoretical
agreement about the existence of the other
considerations, they cannot be pointed out too
often or too strongly.
4.7 DIAGNOSIS OF UNKNOWN SYSTEMS
Before discussing the diagnosis of speech
privacy systems it should be pointed out that
facts concerning the origin of unknown signals
are often very necessary to their correct in-
terpretation. Such things as the frequency,
strength, and direction of the signals, the loca-
tion and type of receiver, and the manner in
which the signals were recorded, can be very
important data. That is why interceptors should
be equipped with complete knowledge of the
various kinds of radio systems and transmis-
sions used by both sides, including jamming
and radar signals as well as telegraph and fac-
simile signals. Some of these signals, particu-
larly if transmitted with suppressed carrier,
can give extremely puzzling results if demodu-
lated with an ordinary radio set. These possi-
bilities should be taken into account if signals
are found which do not seem to fit into the
classes discussed below.
As stated before, the spectrograph is of tre-
mendous assistance in recognizing the nature
of an unknown scrambling system. The ear can
usually recognize the presence of time discon-
tinuities. It can also usually recognize the pe-
culiar quality which results from band-shifting
systems. The exact nature of the scramble, (--
however, is usually impossible to establish with
the ear. Even scrutiny of the wave form may
yield no clue. The strikingly graphic analysis
provided by the spectrograph, however, usually
takes the mystery out of the scrambling method
immediately.
Speech privacy systems having frequency
subbands will show horizontal discontinuities
or boundaries in their spectrograms. Similarly
systems employing time division will show ver-
tical boundaries. A considerable variety of sys-
tems display both horizontal and vertical bound-
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS 87
aries. How to tell these different scrambling
systems apart is the subject of the discussion
and illustrations to follow.
MEASUREMENTS ON SPECTROGRAMS
Since an important part of the diagnosis
procedure consists in determining the length
of time elements and the location of frequency
boundaries, let us first examine the procedures
whereby the time and frequency scales of the
The application of this method to 11-kc spec-
trograms is not explicitly stated in the figure.
A value of K for this condition can be found
by the same formulas. This establishes the time
scale for the 11-kc spectrograms. For the fre-
quency scale the same pattern is used as for
the 3.5-kc spectrograms. However, each hori-
zontal striation is labeled with a frequency
obtained by multiplying the normal frequencies
by the ratio of the two K's.
FIGURE 44. Calibration of spectrograph scales.
The upper spectrogram (narrow filter) shows all the odd har-
monics of the 60-cycle input to a special harmonic generator. In the
wide filter spectrogram (below) the striations represent a beat note
of 120 cycles.
At the left is a portion cut off and inverted. The fact that the
harmonics can be lined up in this as well as other shifted positions
illustrates the linearity of the frequency scale. At the right is a
portion cut off and shifted downward by one component. Since the
harmonics are odd, the base line will fall exactly between two har-
monics if it represents exactly zero frequency.
spectrograph can be established. The spectro-
graph is equipped with a calibrating device
which consists of means for producing a com-
plex wave rich in harmonics from the 60-cycle
power supply. Spectrograms of this wave made
with both the 45-cycle filter and the 300-cycle
filter are shown in Figure 44. If the power
frequency is known, the horizontal and vertical
striations in these patterns provide the time
and frequency scales. If the power frequency is
not known the scales may be established by the
formulas given in the figure. This involves ad-
ditional measurements with a stop watch.
If the power frequency is exactly known, both the time scale and
the frequency scale are determined by the two patterns above. If
the power frequency is not known, the time scale factor can be
determined by the equation K..= LR/T inches per second, and the
frequency by F= KS/N.
L -= Total length of the spectrogram (circumference of the re-
cording drum).
R = Number of rotations of the drum in T seconds.
S ---- Number of striations in N inches.
Figure 45 shows how these scales can be
used to measure the time and frequency bound-
aries in a scramble. It will be noted that for
measuring the time elements spectrograms
made with the 300-cycle filter are best because
they have sharper time boundaries. For meas-
uring frequency boundaries the same filter must
be used as was used in obtaining the scale. It
may be noted here that in present models of
the spectrograph, the wide filter has a different
absolute location than the narrow filter and
therefore should not be used to estimate the
frequency of components or boundaries.
SECRET
neclassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
88
UNSCRAMBLING AND DECODING METHODS
ILLUSTRATIONS OF SCRAMBLED SPEECH
SPectrograms illustrating a large number of
privacy system scrambles are shown in Figures
46 through 65. In so far as possible, these
spectrograms were obtained with actual work-
ing models or systems. In some cases they were
stroy the typical harmonic structure of speech
leaving structureless patterns which cannot be
interpreted. This indicates a distortion of the
wave form. One of these systems, which had a
repeating code and a synchronizing pulse, could
be resolved by the method shown in Figure 55.
FIGURE 45. Time and frequency measurements.
Upper spectrogram, 95-cycle filter; lower spectrogram, 300-cycle
filter. The frequency boundaries are determined by comparing them
with the harmonics of the calibrating wave. These are all 120 cycles
apart, but the lowest is only 60 cycles from the base line.
The element length is best determined by using the 300-cycle filter
made with a laboratory setup simulating the
systems under scrutiny. In a few cases also the
illustrations were made by cutting up spectro-
grams and rearranging the parts. It should be
noted in these latter cases that the boundaries
are unnaturally clear and sharp because in
practice any discontinuity causes a transient
which tends to obscure the true speech along
the boundaries.
It will be noted that some of the spectrograms
in the illustrations were made with the 45-cycle
filter and some with the 300-cycle filter depend-
ing on what features were to be brought out
most clearly.
In some cases the spectrograms alone are
not sufficient to determine the exact nature of
the scramble. Certain systems completely de-
which gives sharp time boundaries, comparing them with the stria-
tions obtained by making a spectrogram of the calibrating wave
with the 300-cycle filter. Each one represents 420 second. Ten of
the above elements cover 70 striations. The length of each element
is Mo x 7912o second.
No general rules, however, can be given for
diagnosing this type of system.
SYSTEMS NOT ILLUSTRATED
Examination of Table 1 shows that there are
a few scrambling systems which are not repre-
sented in the illustrations. These will be dis-
cussed in the following paragraphs. In most
cases, the appearance of the spectrogram pat-
tern which would result can be visualized by
analogy with other systems.
The phase-reversal system (A4) will produce
a scramble indistinguishable from the multipli-
cation system (Hi) provided the phase re-
versals occur at irregular intervals and about
as rapidly as the crossovers in the coding wave
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
89
involved in Hi. It is probable that they would
have to occur about that often to make speech
unintelligible.
The split-phase system (A5) involving car-
riers 90 degrees apart was tried out in the lab-
oratory. The output appears just as if two
speech channels, or a speech channel and an
interfering noise, were simply superposed and
then modulated with a single carrier.
The stepped displacement system (B2) is
rather easy to visualize. There will be time
boundaries, with two or more discrete condi-
tions of displacement. Obviously, there are a
great number of possible sequences, including
the possibility of some of the conditions con-
sisting of inverted displacement.
The irregular wobbled displacement (B4)
will be similar to B3 except that the wobble
pattern will not be as simple.
The continuously varied re-entrant displace-
ment (C2) is practically impossible to simulate
artificially, as was done with Cl. If Cl is thor-
oughly understood, however, the appearance of
a wobbled instead of stepped re-entrant condi-
tion is not difficult to visualize.
Nonrepeated-code TDS (F3) will have the
same general appearance as repeated-code TDS.
It may or may not have the synchronizing pulse.
There will of course be no regularity in the
patterns such as was pointed out in F2.
The spectrogram for TDS plus inversion
(G1) is not difficult to visualize. Some or all of
the elements might be inverted, as in A3.
The systems listed in both G5 and G6 will
show equally spaced time boundaries corre-
sponding to the length of the elements. In G5,
the harmonics would be spaced much farther
apart than in normal speech, and show greater
slopes and curvatures. Alternate elements
would show rather consistent differences in
frequency distribution and in the degree of
slope or curvature. In G6, the harmonics would
be spaced abnormally closely, and show very
little slope or curvature. Words and spaces
would be very long. There would be a horizontal
boundary in the middle of the band, and the
patterns in each half would appear like corn-
plete spectrograms, with vowel and consonant
structures apparent. In both of these systems,
if the elements were cut apart, they could be
rearranged to form continuous speech with the
time and frequency scales compressed or ex-
panded from the normal condition.
Level modulations (H2 and H3) would hardly
show up in spectrograms because of the level
compression incorporated in the spectrograph.
This has been verified experimentally.
In J1 alit J2, if the noise were sufficient to
mask the speech effectively, the speech could
not be seen in spectrograms. Patterns for J3
and-J4 are easy to visualize. If the noise spurts
are sufficiently close together, however, they
may produce a pattern like Hi. As far as is
known, J5 exists only on paper.
In Vocoder types of scrambling systems the
spectrograph would show only the channel sig-
nals, which might be either amplitude or fre-
quency modulated. For this type of scramble,
oscillograms of the wave form of each separate
channel signal provide the best means for diag-
nosis and for decoding. A sample of such oscil-
lograms, which was obtained from an actual
Vocoder system, is shown in Figure 50. The
various methods of scrambling such signals
(KI, K2, K3, K4) will produce discontinuities
in these traces which are easy to visualize. A
sample of K5 has not been available.
Channel mixing (L3) can be done in various
ways and at various speeds. It will not be easy
to recognize if done rapidly. No actual systems
are in use, as far as is known.
It is felt that the above illustrations and dis-
cussions cover the known scrambling methods
fairly thoroughly. It is hoped that with their
help any system which might be encountered in
the future can be recognized. Certain additional
spectrographic material appearing in Part I
of the final report on Project C-43b is useful
to anyone wanting all possible data on the sub-
ject. Part II 33 includes all the preliminary re-
ports dealing with specific phases of the work
carried out under the project.
b project C-43, Contract OEMsr-435, Western Elec-
tric Company, Inc.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
90
UNSCRAMBLING AND DECODING METHODS
FIGURE 46. Illustrating modulation sidebands.
The upper spectrogram shows speech modulated with a carrier of
2,000 cycles. Note the symmetry of the pattern around this frequency.
Each harmonic, and each resonance area, is duplicated on both sides
of the carrier. This clearly shows that the two sidebands are exactly
alike, except that one is inverted. The recording from which these
spectrograms were taken has somewhat attenuated the frequencies
near the base line.
The carrier itself is largely suppressed by the double balanced
modulator; high level sounds, however, occasionally unbalance it
sufficiently for the carrier to show through.
In the lower spectrogram, the carrier frequency has been wobbled
at a rather slow rate. Note that as the sidebands move up and down
with the carrier, the harmonics remain parallel, as at point a,
except when marked voice inflections occur, as at point b.
In the clear space at the left, the wobbling carrier can be seen,
together with its second harmonic. In the upper part of the spectro-
gram at point a, the second harmonic of the carrier can also be
seen, with its own set of sidebands.
When the carrier frequency is low, as at points c and d, the lower
sideband can be seen folding back; the folded back portion is right
side up and overlaps the regular sidebands.
4,040W. e
FIGURE 47. Simple inversion.
The upper spectrogram was made in the normal manner, showing
inverted speech: the lower one was made with reversed oscillator
sweep, producing a mechanically inverted spectrogram in which the
speech appears right side Ina.
This sample contains harmonics with marked curvatures. These
are voice inflections, and their occurrence can easily be recognized
by ear. In general, samples with such voice inflections should be
captured because they are most useful for diagnosing scrambling
systems.
In the upper spectrogram, at points a and d, note how the curva-
ture of the harmonics is least at the highest frequencies and pro-
gressively greater toward the lowest frequencies. Similarly, at points
-
b and c, the slopes of the harmonics are least at the top and greatest
at the bottom of the spectrogram. This is directly the reverse of
normal speech and definitely indicates inversion. The lower spectro-
gram illustrates the normal slopes and curvatures.
There is obviously a low-pass filter in the system, at about 3,000
cycles, as indicated by the rather abrupt change in intensity. Such a
filter is normally used to cut off the upper sideband. It is usually
also designed to cut off the carrier. In this case, its cutoff frequency
is lower than the carrier frequency. This shows up at points a and b
in the harmonics, fading out before they completely flatten out.
However, the inversion frequency is not far from 3,000 cycles, be-
cause the slopes are substantially zero as they approach this fre-
quency.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
FIGURE 48. Alternate inversion.
Here the speech is divided up into sections by sharp vertical
boundaries. When the individual elements are examined, a, b, and c
show unmistakable signs of inversion. Elements d, e, and I are
definitely not inverted.
The regularity of the dark areas in the lower spectrogram suggests
that only two conditions are involved. Note also that in general,
where slopes can be clearly discerned, the harmonics slope in oppo-
91
site directions in adjacent elements. These indications point to
alternate straight and inverted transmission.
This diagnosis could be confirmed by making a mechanically
inverted spectrogram and matching together alternate pieces from
the two spectrograms.
The switching intervals are irregular, with no repetition apparent
within the time covered by this spectrogram. Additional spectro-
grams, covering a longer period, might show a repeated cycle.
FIGURE 49. Fixed displacement.
In the upper spectrogram, the speech band has been displaced
from its normal location by 1,000 cycles; in the lower one, by 2,000
cycles. Recognition of this condition is aided by familiarity with the
appearance of normal speech in spectrograms. All vowels have
characteristic resonant areas close to what would be the base line
(zero frequency) in normal speech, and the glides such as occur at
a and b tend to start from this region.
At c, the harmonics look as though they could meet at a point if
extended to the right. This point would be the true base line.
A displacement of this type could be produced by modulating with
a carrier of 1,000 or 2,000 cycles, and suppressing the lower (in-
verted) sideband with a high-pass filter. In practice, however, a
double modulation process is used, because the displacement may be
changed at will without changing the filter cutoff.
In both spectrograms, a small amount of lower sideband can be
seen. This incompletely suppressed sideband would look the same
whether produced by single or double modulation.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
? -1
1;
?!?
92
UNSCRAMBLING AND DECODING METHODS
FIGURE 50. Wobbled displacement.
The upper spectrogram shows an example of wobbled inversion.
Note the occurrence of harmonics symmetrically disposed about a
suppressed carrier frequency which is varying between 2,500 and
3,500 cycles. Note how the harmonics remain essentially parallel.
At points a and S the sidebands appear to consist only of low-fre-
quency noise. The carrier wobble is irregular in shape but regularly
repeated in time.
If there is a low-pass filter in the system, its cutoff frequency is
higher than 3,500 cycles. Note that if it were lower, it would occa-
sionally cut off some of the wanted (lower) sideband.
The lower spectrogram shows a wobble covering a much wider
frequency range. The lower sideband dips below the 3,500-cycle
range of the spectrogram only part of the time. This would cer-
tainly be diagnosed as a band displacement system involving double
modulation. If it were encountered in practice, wide-band spectro-
grams would be used to determine the exact displacement.
???: ? A..
Itet*
FIGURE 51. Re-entrant inversion.
The upper spectrogram was artificially produced by cutting up
and rearranging a spectrogram of simple inversion.
There are vertical boundaries about 275 msec apart. There are
also horizontal boundaries, but these are not continuous.
Elements 3 and 6 show no horizontal boundaries, but they show
the signs of simple inversion. All the other elements show horizontal
boundaries, with higher slopes above the boundary than below. If
the two portions of each element were interchanged, the slopes would
be in the correct order (for inverted speech).
It can also be seen that if the elements were thus rearranged, the
harmonics of each element would match those of the preceding and
following elements. This, of course, should be confirmed in practice
by trial.
These configurations would be produced by re-entrant inversion.
In terms of these spectrograms, this process results in inverting
successive elements about frequencies of 1,000, 2,000, and 3,000 cycles,
respectively, removing the upper sideband, and replacing it with
that portion of the lower sideband extending below about 200 cycles.
The lower spectrogram is a duplicate of the one above. The
boundaries have been marked off to show that the elements rear-
ranged, as suggested above, would form continuous inverted speech.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Ap?roved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
93
FIGURE 52. Fixed split-band scramble.
These are two samples with the same code. Note the horizontal
discontinuities in the frequency distribution of energy, which can
best be seen by looking endwise along the patterns. These are the
filter boundaries. This system shows five bands, covering the range
from 250 to 3,000 cycles. In split-band systems, the subbands are
generally equally wide, for practical reasons.
There are no vertical discontinuities, other than the normal
sequence of words and spaces.
Note that the harmonics slope or curve in opposite directions
within a word or syllable. This indicates that some of the subbands
have been inverted. The first and fourth bands are clearly normal,
the others are inverted. This shows up clearly at point a.
Note that the fourth band shows the least slope or curvature;
this must have been the lowest band originally. The middle band
shows the most slope or curvature; this must have been the highest
originally. The others can be similarly located, combining the indi-
cations from all the indicated points. Any one point is sometimes
misleading due to the proximity of a harmonic to the filter bound-
ary, as in the top band at a.
At points d and e there is a double inflection. This can be mis-
leading, unless the slopes are estimated for simultaneous instants.
The vertical line was drawn as a guide.
The code is 4, 2', I, 5', 3', the primes denoting' inversion.
FIGURE 53. Rapidly switched split-band scramble, example 1.
These spectrograms show both horizontal and vertical boundaries.
However, the level of the elements as a whole shows a rather smooth
flow, as of words and spaces. Note the clear space ahead of the first
word. These indications suggest that the elements have not been
shuffled in time.
The presence of band shifts, however, is quite obvious. Harmonics
can be seen sloping in both directions within the elements, particu-
larly in the first word group.
The checkerboard effect in the lower spectrogram suggests that
only two codes were used alternately. This is corroborated by the
fact that the middle band shows no vertical discontinuities, indicating
that it was never switched.
SECRET
Declassified and Approved For Release 2013/12/11 CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
94
UNSCRAMBLING AND DECODING METHODS
FIGURE 54. Rapidly switched split-band scramble, example 2.
Here there are both horizontal and vertical boundaries. There is
no evidence, however, that the elements have been time shifted.
There are unbroken clear spaces as at a, the long word groups such
as b show no abrupt changes in level or in pitch, and elements
having different characteristic appearance, such as those at e and d,
are not intermingled.
There is abundant evidence of band shifts: harmonics sloping in
opposite directions, indications of inversion, and abrupt changes in
the resonance areas. Close scrutiny of long word groups such as b
shows that several codes are being used, although it would take
several samples to establish just how many.
This sample illustrates that if the codes are rapidly shifted, any
one element seldom contains enough clear information to determine
which code applies to it. However, if accumulated information about
the system can be brought to bear, two clear bands may sometimes
be sufficient to identify the code.
FIGURE 55. Time
At first glance these look like split-band scrambles. The horizontal
boundaries are quite evident. The bands are 600 cycles wide, begin-
ning at 400 cycles. It will be noted, however, that all four bands
look alike, except that alternate ones are inverted. Otherwise the
slopes and curvatures are alike in all bands. An outstanding example
is at point a. There is no gradation in slope.
The components are not uniformly spaced within a band, and
they frequently go in both directions within a band, as at b and c.
division multiplex.
These are the characteristics of TDM scrambling. In the particular
system illustrated, the frequency range was divided into four bands,
and all were modulated down to the lowest frequency. The switching
rate was 600 per second, but the entire band was then modulated
up 900 cycles, to avoid having the lowest sideband extend to fre-
quencies too low for transmission channels to handle.
It is characteristic of TDM to produce upper and lower sidebands
around the switching frequency and around its odd multiples. The
sidebands differ only in the phases of their components.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
95
FIGURE 56. Time division multiplex with noise channel.
This is the same TDM system as in Figure 55, but a band of noise
has been added to increase the privacy. One half of the highest of
the four frequency bands into which the speech channel was divided
has been filled with thermal noise. In the upper spectrogram of
the figure, this thermal noise was steady: in the lower spectrogram,
V?..` ? . -5.7.1.19" "t-j-r;"
the noise was turned on and off about four times per second.
Note that although the noise was introduced into only one sub-
band, it appears in each of the four sidebands in the above patteims.
This shows that in TDM, each sideband contains components from
each subband.
.z - 4 ;
4-2 - ? r,..41 .4.4',.;?:.; ? -41,1;.:V..-1;:?.4:4".
? },
? .
'
a.
180'MSEC
?
? 4.
: eV' '434 .; " 4 ? ' i1,80
MSEC-
FIGURE 57. Subbands variously delayed.
Here there are horizontal boundaries, but the filters apparently
do not cut off very sharply because the bands appear to overlap
occasionally.
Note the staircase effect in the upper spectrogram, each syllable
in the uppermost band appearing somewhat later in the middle
band, and still later in the lowest band. This condition has been
rectified in the lower spectrogram by cutting the frequency bands
apart and shifting them relative to each other, thereby restoring the
normal appearance of words and spaces.
There has been no shifting or inversion of the subbands. Note that
the filter crossovers have been made very deep, as evidenced by the
gaps between bands, and the lowest band has been severely cur-
tailed in width, probably in an effort to reduce the amount of
intelligence which may be gained by listening to any one band.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
r.;
96 UNSCRAMBLING AND DECODING METHODS
FIGURE 58. Combination of TDS and
In this sample the evidences of band shifting are clear enough.
That several different codes are used is suggested by the irregular
distribution of the resonant areas over the frequency range. It is
more conclusive, however, to examine the slopes of the harmonics
in the upper spectrogram. At a, for instance, the lowest band shows
more slope than either the second or fourth; at c, the opposite is
true. At a, the harmonics in the second and third band slope in the
same direction; at b, in opposite directions. To tell how many codes
are used would require additional samples.
rapidly switched split-band scramble.
Evidences of time shifting are also clear. Elements a and b, for
instance, are both strong, but are surrounded by gaps. At d, an
element with energy distributed over the whole frequency range is
surrounded by elements with entirely different distribution. There is
also a marked difference in pitch between el and the surrounding
elements. An even more marked change occurs at e.
This scramble, therefore, is the result of both band shifting and
time shifting. It differs from a complete two-dimensional scramble
in only one resPect, which is described in a separate illustration.
FIGURE 59. Nonsynchronous combinations of TDS and split-band scramble.
These are two combinations of TDS and rapidly switched split-
band scrambles. They differ from the previous illustration in that
the two switching systems are independent. The split-band code is
changed at intervals of about 90 msec, whereas the length of the
TDS elements is about 34 msec.
Each of these switching systems produces its own set of vertical
boundaries. The distance between successive boundaries in the
scramble, therefore, varies irregularly from a value corresponding
to 34 msec down to zero.
In the upper spectrogram, the speech was first subjected to TDS,
and then to the split-band scramble; in the lower spectrogram, the
two scrambles were applied in the reverse order.
Only two split-band codes were used, alternately. Since the second
scramble tends to hide the first, the upper spectrogram shows the
characteristic checkerboard effect noted in a previous illustration.
In the lower spectrogram, the checkerboard effect is broken up by
the TDS.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
97
FIGURE 60. Test for two-dimensional scramble.
Spectrograms which serve to illustrate how a two-dimensional
scramble might be recognized. The scramble contains both time
shifts (TDS) and band shifts (rapidly switched split band). Note,
however, that in either of these scrambling systems, and in the
combination of both, elements which are simultaneous in the scram-
ble (that is, subbands within any vertical section) were also
simultaneous in the original speech.
In this example, therefore, a decided tendency may be seen for
the character of a vertical section to remain constant over the
frequency range. That is, low level elements are low all over the
frequency range; high level elements tend to be high all over.
Furthermore, subbands from voiced sounds do.not occur in the
same vertical sections with subbands from unvoiced sounds. Voiced
sound may be recognized by the presence of harmonics in the
45-cycle spectrograms, and regular vertical striations in the 300-
cycle spectrograms.
The most conclusive test for a two-dimensional scramble, however,
is based on the fact that there will be differences in pitch within
a vertical section. This can easily be tested as illustrated above.
The spectrogram is cut down the middle of a vertical section, and
the pieces shifted by one harmonic in either direction. If there is
no change in pitch, the harmonics will still match all over, as above.
lf there is a change in pitch, the shift which is correct for one
subband will be wrong for another. TWo-dimensional scrambles,
therefore, will not pass the above test.
FIGURE 61. Speed wobble
The curvatures of the harmonics in the upper spectrogram look
like voice inflections, except that they are abnormally frequent and
rapid. The resonance areas, as shown best in the lower, also show
a marked degree of curvature. Also, marked correlation may be
noted between the resonance areas and the pitch, that is, they reach
their high and low points simultaneously. In normal speech, the
frequency and trend of the resonance areas are independent of the
pitch trend. Wobbling the speed of a phonograph record or magnetic
tape, however, multiplies the frequency of resonances as well as mul-
tiplying the pitch. These spectrograms were produced in this manner.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
98
UNSCRAMBLING AND DECODING METHODS
2
...-.._ _..._ ... _ -____?7_,. ., 774r.,.. ::_-_________m....,...,,_..: .?-re..-...-....,-L..
,__..........,07,,......,.......,? ? -----. .,,---,,.---.
. ,. k.?,4_711..t-s,iLT--?..,..iir.E... - J.,z4,,,, . ,.e6 ts...alk, ;.rell,..; 1,,C....P.*...4. ...:........?.., .....'..,7.,....774h,r7..,...2,..,:;rL . ,yt:. ..?.t.,.... ..,,:.,$.::::.;......, .;:.",;---.:,.
.:.,.:4.?-,s-1-_-- :.....-:_.--,4 .4::..-1.:0-01,-,..s.--: :4--72:411,;:rt'-1 v.--e . el ::::7-::::::::4,' ' 41.
"r? -i'-'4^:t7,. --."":74. '.':--71,At?- ..=...,,,' .-:.4.M4--'-'"e:,, '--- ""i, ,ky. ,t0?__.--,...."????-?
' ,;-..41., t".4,.;; ,'''- re.,.....,' ? --,:?:".,4?V-c"...4.-n :'.::: .......".^."--
,...,..4........=,,,,,_ ....:-. ,...:,. ,......4--,.. ............____,......4.--''''' ' ' --"" -
1,
Y , ',-4?It? 11.4....-6:44, -,,,I.-Tz4 c-7-2-'.: .......?: ,_, ,---.1-1,-....- ?,,4, ,
?,....,...,......?.....,. ...?..,.....1,4 . ,-....?.....- .,
E._
- ..=--e "--
. .-
?...? ......,....,....-.0....s....44,,,,, ,-;,......?........,,,,,,,?,,-,,- ........,?........,,,..-0
.....,..1.:..- .,..,.,..............?......,,,,.....-A..._,_ ..........----.................1-0:4---- -'464.-.r,--....""'",. ''.-""4"`-'",-?-??"......."-?,'7?
......C...-,_..., _.ce.,-__,a,... ..-...W.,_.,.........
...-...-.................--
Z. ,.__...._... -r, -....?,,,........- - --......--..,== ,.."..: -,..' ----..-.. -4......-, -...4.4....rov!.."4..., .............-- ..."-.....' ' ..- ..-.. - .
. 1..."?-,- ....N. G.....1....,, , ,.. ? . ..
l'KS ....., .. . ,..? L : . ,A7:?;fr.. ' t....'' . r 47,1k.-' 4...-C3V.; ,
,,,, ?....._ _ ..,?.,,?..%,....:...i.."3,_ . . 3 ''',71,?,,,,,)--",f _ ?.....6.,,,,?.4.?..(.17.:,,,?,-k.. ?.? . -??,7?.., --.... _2:2
..
....,.'f.,??_;::- -
w ?
e. .,,i,., .0,-..,..`,..1,....1.........41?, ........?,?41....4,, , ........e..0?4,-,........7,,,c.?.....1. 1:4....:,,, ? ,...,....:,..-?
'cjif'.
;..., .,,nr,...v....,...?,? ?WV ? .p.,,...': ?47,:fil:, di...-;.d.,,,,,.......'???-..-- ,....
''`. -44
...., ....
,.?.
-,-....,..
_ .._...,
...
,,
,,,......... '?......,......... - S'.'1.4S--..? ;17 ..t 1 Z"...1..........7.......,*?".. ....---i 44-- ....4,-..................... . ........:?:.1, . . ..- 170, r ..r...
ak.....- % . . . -.,......111,1110.A.4? E.--..,,,..:i;..t -.- ,.j...,, 4............,......-......e.. 5-,ver --..- ? -------..-? -.", e "'"`-' - ?? "'" .....? tr..* "ii'-'1,
..............,......zN...b.....--
? ......?:????,?........,....
,...t.4.....04.....................41....t... ........ .._=....-.2.7.7 ... .1.1........., .r -
- --- , . .. - ?-? ?" ..-. A01110_ ?ki.??????..............?
FIGURE 62.
The above spectrograms were produced artificially by cutting up
and rearranging spectrograms of normal speech.
The upper spectrogram shows the speech transmitted in sections
about 160 msec long, each section transmitted backwards. If the
sections are as long as this, the condition can be recognized by
familiarity with the normal speech formations, that is, by the way
words normally start and end, and by the trend of the 'resonant
areas. The slopes and curvatures of the harmonics, however, look
perfectly normal.
If the elements are cut apart and matched, it will be found that
Backwards.
the right-hand edge of each element matches the left-hand edge of
the preceding element. This can be seen by inspection of the above
example. The order of the pieces will be completely reversed after
matching. If all the pieces are inverted, however, they will be found
to match in their present order.
The lower spectrogram shows the same material, but in this case
alternate elements are transmitted forwards and backwards. It will
be found that none of the elements can be matched together at all.
To match, alternate elements must be taken from a mechanically
inverted spectrogram, as described in another illustration.
.7.---- --..T.?,---r.------?---?-.
' '....;;., i --,--:?;?.- .
' N, .....-... ,.
, -
, ''?-: ,.4 .4
4, : . ..
' . ,
? J W . ? C.,....'r:7.',,.
FIGURE 63. Multiplication.
The upper spectrogram shows a continuous noise, with several
words or syllables showing through. Counting the harmonics shows
that the fundamental of the noise is about 100 cycles.
Examination of the signal with an oscilloscope shows that the
noise consists of short ?pulses about 10 msec apart. These can be
removed by a blanking circuit.
The lower spectrogram shows a sample (not the same as the one
above) without the pulses. The outstanding characteristic, as in the
sample above, is an almost complete lack of the harmonic structure
of normal speech. Also, the energy is distributed more or less evenly
over the frequency range for each word or syllable. There are no
characteristic resonance areas.
There are no regular boundaries, either vertical or horizontal.
1=1.:
- , ? -
The sequence of words and spaces looks normal in the spectrogram,
and has the normal cadence of speech to the ear.
These characteristics are to be expected when the .scrambling
system operates on the wave form directly. In this particular system,
the speech wave was multiplied by a coding wave. The latter was
'repeated 100 times per second, with a pulse between each cycle. It
is obvious that a high degree of synchronism is required to remove
the coding wave at the receiving end, which accounts for the high
frequency of the synchronizing pulses.
It may be noted that phase reversal (at a sufficiently high and
irregular rate to achieve privacy) is also essentially a multiplication
process, except that the coding wave has no values other than plus
and minus unity. Spectrograms of such a system would be expected
to look like the above.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
:".01
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
DIAGNOSIS OF UNKNOWN SYSTEMS
FIGURE 64. Time division channel mixing.
Here two talking circuits have been switched between two trans-
mission channels on a time division basis, at 300-msec intervals. The
vertical discontinuities can usually be seen, but point a is an out-
standing example of, apparent continuity in pitch, inflection, and
resonance.
The ear can usually recognize the fact that two voices are present,
99
at least at this switching rate. If the voices are nearly alike, or if
recorded samples of the same voice are used, the nature of the
scramble can be determined by cutting the pieces apart and attempt-
ing to rearrange them into continuous speech. This, of course will
be found impossible in channel mixing. Another transmission channel
should be found with the complementary elements.
FIGURE 65. Subband channel mixing.
Here the harmonics occasionally curve in different directions, as
at point a. A horizontal discontinuity is quite apparent at the
indicated frequency, above which there are changes in pitch. These
are not always readily apparent to the eye, but can be established
by measurements.
In general the syllables seem to begin and end at different times
in the two bands. Formations such as c and d do not occur in
normal speech.
No vertical discontinuities are apparent in either band, which
indicates that if any time delays are involved, they apply to the
whole bands. Yet, by trial, the speech in the upper and lower bands
cannot be matched by shifting the bands relative to each other.
It is apparent that two talking circuits are being switched be-
tween two transmission channels. Another channel should be found
which will contain the complementary subbands. This was produced
by a laboratory setup. In practice, to obtain sufficient privacy, it
would probably be necessary to combine this subband channel mixing
with time division channel mixing illustrated elsewhere.
Point b, as a matter of interest, marks an outstanding example
of apparent continuity in both pitch and slope.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
5.1
Chapter 5
DECODING PROJECTS
SPEECH PRIVACY PROBLEMS
STUDIES AND ANALYSES of several privacy
systems of special interest to the Bureau
of Ships were made under Project 13-106,a,"
a continuation of the work carried forward
under Project C-43. In each problem the prin-
cipal objectives were the determination of the
security afforded by and the transmission per-
formance of the privacy system in question.
NATURE AND SCOPE OF THE WORK
The material submitted for study and analy-
sis under this project comprised working models
of two privacy systems, recordings of speech
scrambled by three privacy systems, and paper
proposals for two systems.
Security evaluations were made under favor-
able laboratory conditions. It was assumed that
the enemy (1) was thoroughly familiar with
the speech privacy system, (2) had the neces-
sary intercept, recording, and decoding equip-
ment, (3) had trained personnel, (4) was in a
position to receive adequate signals, and (5)
was completely organized so that no time would
be lost in obtaining and making use of intelli-
gence from the decoded message. The security
ratings assigned to the several systems evalu-
ated did not take into consideration any prac-
tical difficulties which might be encountered in
the field or under combat conditions where the
work of intercepting, diagnosing, decoding, and
obtaining intelligence from scrambled messages
must be carried on under stress.
The following assignments of Work on this
project were authorized by Division 13:
1. British Modulator Type 2C (manually
switched) working models.
2. British Two-Dimensional Privacy System,
recording.
3. British Modulator Type 2C (rapidly
switched), recording.
a Project 13-106, Contract OEMsr-1440, Western
Electric Company, Inc.
100
4. New Zealand Switched-Band PriVacy Sys-
tem, recording.
5. New Zealand Switched-Band Privacy Sys-
tem, working models.
6. Proposals of L. E. Gabrilovitch for pri-
vacy systems.
4
SUMMARY OF RESULTS
The results of the work done on the several
assigned problems are given in detail in Reports
1 to 5, inclusive, which form an appendix to
the final report of the project.34 These reports
cover the six assignments listed above with the
fourth and fifth assignments, relating to the
New Zealand switched-band system, being com-
bined in one report. All of the systems consid-
ered under this project were of the short-term
privacy variety. Of these, the British two-
dimensional system appeared to be the most
promising.
BRIEF REsumt OF SYSTEMS
British Modulator Type 2C (Manually
Switched), Working Models. This system pro-
vides four fixed speech scrambling conditions,
each involving either one or two simple modu-
lating processes; the choice of any one of the
four scrambling conditions or clear speech is
under the control of a manual switch.
When a receiving unit, or its equivalent, is
at hand, there is no difficulty whatever in dis-
covering the proper decoding condition in a
matter of seconds. The security afforded by the
system is, therefore, almost nil.
The fixed-code scrambles can be demodulated
satisfactorily by a single modulation process
without filters, it being necessary only to use
the appropriate frequency of the demodulating
carrier. For this reason it is possible to obtain
intelligence from radio transmissions of the
scrambled speech by means of an ordinary type
of radio receiver equipped with a beat-fre-
quency oscillator. The efficacy of this method
will, of course, depend upon having adequate
relative stability of the radio carrier and the
beat-frequency oscillator.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
SPEECH PRIVACY PROBLEMS
101
These units were well constructed and oper-
ated satisfactorily from the standpoint of over-
all speech quality.
British Two-Dimensional Privacy System,
Recording. This system utilizes both frequency-
and time-division scrambling. It employs three
frequency bands and ten time elements of 0.065-
sec duration in a repeated code. The time delay
in one direction of transmission (exclusive of
delay of the transmission path) is 0.65 sec.
The evaluation of this system was based on
the study of one recording bearing a single
sample of scrambled speech, together with sam-
ples of clear speech and speech which had been
coded and decoded for comparison. An evalu-
ation based on such limited data is necessarily
tentative and should be supplemented by tests
on working models.
The speech scrambled by this system appears
to be invulnerable to direct listening and to
other noncryptographic attacks. It is, however,
vulnerable to cryptographic attacks" and a
working solution of the code can probably be
obtained in a matter of 3 or 4 hours. With
a model of the receiving equipment at hand, it
is conceivable, although it was impossible actu-
ally to try it, that a substantial amount of
intelligence could be obtained in the order of
half an hour. This latter method would involve
the use of spectrograms from which sugges-
tions are obtained for setting up partial decodes
on the receiving unit.
The most noteworthy weakness in the British
two-dimensional system appears to be the use
of a fixed repeated code. The addition of code
changing means would increase the crypto-
graphic security very greatly.
The quality of the restored (or decoded)
speech presented on the recording compared
favorably with the clear (or uncoded) speech
on the same recording.
British Modulator Type 2C (Rapidly
Switched) Recording. This system is the same
as the Type 2C discussed above except that
means are provided for rapidly switching from
one scrambling condition to another and that
clear speech is used as a fifth scrambling condi-
tion. The order in which the scrambling con-
ditions are selected is predetermined according
to a code which repeats after a sequence of 20
such selections, each enduring for approxi-
mately 0.065 sec.
A code-switching mechanism for use with
this system was promised, but was never re-
ceived. This would have made it possible to
make a more positive evaluation of the system
than can be made from the recording of scram-
bled speech. In fact, the results obtained from
noncryptographic attacks on the recorded
ssramble are considerably at variance not only
with what could logically be expected, but also
with the results obtained with working models
of a very similar system.34
Repeated listenings directly and also through
a two-path superposition circuit to the recorded
scramble yielded several words and phrases but
very little intelligence. Similar tests on the New
Zealand system (working models) yielded, on
the average, 40 per cent intelligence to direct
listening and 80 per cent intelligence with the
two-path circuit.
Repeated listenings through an automatic
analyzer-decoder circuit yielded approximately
60 per cent of the intelligence from the recorded
scramble of the British Modulator Type 2C
rapidly switched system. This same procedure
yielded practically 100 per cent intelligence on
the New Zealand system.
A cryptographic solution of the repeated-
code sequence used in making the recorded
scramble can be determined by inspection of
two spectrograms in about 15 min.
The quality of restored speech on the record-
ing compared favorably with the clear speech
on the same recording.
New Zealand Switched-Band Privacy System,
Recording and Working Models. Fundamen-
tally, this system is very similar to the British
Modulator Type 2C, rapidly switched, and dif-
fers in what appears to be only minor details:
The inversion frequencies in the scrambling
circuits are somewhat different; the duration
of each of the rapidly switched scrambling
conditions is 0.043 sec (rather than 0.065 sec) ;
a sequence of 18 selections of scrambling con-
ditions (rather than 20) comprises the coding
cycle. The New Zealand system is equipped
with an appliqu?nit for automatically chang-
ing the code each cycle for a total of 625 cycles,
or for a period of about 8 min, before repeating.
SECRET
im,,,inecifiarl and Annroved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
102
DECODING PROJECTS
A recording of two samples of speech scram-
bled by this system (using repeated code) was
received for analysis and most of the intelli-
gence was obtained by noncryptographic meth-
ods. Somewhat later, the scrambling equipment
for two terminal units was received and was
set up for tests and demonstration as a two-
way privacy system.
The security afforded by this system is very
low for military purposes and is inconsistent
with its size and weight.
Repeated listenings directly to the scramble
yielded on the average about 40 per cent of the
intelligence to experienced observers; repeated
listenings to the scramble through a two-path
superposition circuit yielded about 80 per cent
of the intelligence. A repeated code can be
determined by an aural method, using the ter-
minal equipment, or its equivalent, in about
7 min. An automatic analyzer-decoder circuit
yielded at least 50 per cent of the intelligence
from either a repeated or a nonrepeated
(8-min) code sequence on the first listening
and practically all the intelligence with few
additional listenings.
By cryptographic methods, a repeated code
can be determined in about 20 min and a non-
repeated code (including the starting point of
the automatic code-changing unit) can be de-
termined in about 1 hr.
Mechanically and electrically the units oper-
ated satisfactorily; the intelligibility of the
restored speech was good but the quality,
though fairly good, was somewhat inferior to
what might be achieved with improvements in
design.
Proposals of L. E. Gabrilovitch for Privacy
Systems. Of two proposals by Gabrilovitch, the
first, described as a "Screen Secrecy Set with
Narrow Audio Band," appeared to require
considerable equipment to obtain only a very
limited degree of security with probably poor
transmission performance and a sacrifice of
operating range.
The second proposal, described as a "Phase
Varied Inverter-Distorter" (simplified secrecy
set), although similar in basic principle to the
RCA-Bedford system developed under Project
C-5414 offered, theoretically, some possibilities
of obtaining a fairly compact and lightweight
set having somewhat better restored speech
quality than the Bedford system. There were,
however, a number of questions regarding the
degree of security, coding possibilities, and
practicability of some of the electronic proc-
esses.
When, after study, it appeared fairly evident
that the development of the second proposal
would tend more and more to duplicate that of
the Bgiflford system and would offer few, if any,
advantages over the latter when completed, it
was recommended that further study of this
proposal be discontinued.
GENERAL CONCLUSIONS AND REMARKS
In the course of the work done under this
project, a number of conclusions were reached
regarding the systems under consideration and
their evaluation based on the use of working
models as contrasted with phonograph record-
ings.
Switched-Band Systems. Of the systems con-
sidered, vulnerability to repeated listenings
directly to the scramble is attributed to the
inherent lack of privacy in some of the five
speech-scrambling conditions. The average in-
telligence obtained in listening to the five fixed
scrambles is 40 per cent, which is approxi-
mately the same as obtained (on the average)
when the scrambling conditions were rapidly
switched. The need for scrambling conditions,
each having an adequate degree of privacy, is
obviously indicated.
The high yield of intelligence obtained from
superposition listening is attributed mainly to
the fact that some of the five scrambling con-
ditions are not mutually private and effectively
decode one another (Codes A and B in the New
Zealand system and Codes 1 and 3 in the British
system). This effectively reduces the available
number of scrambling conditions. Hence, the
five scrambling conditions should be not only
inherently private but also mutually private.
The vulnerability of the systems to either
direct or superposition listening is independent
of whether a repeated or nonrepeated code is
employed.
The use of a repeated code makes the system
very vulnerable to methods of cracking wherein
the code is to be determined. It is necessary to
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Ap roved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
SPEECH PRIVACY PROBLEMS 103
decode only one cycle when successive cycles
can be used to obtain confirmation.
When the system is not vulnerable to non-
cryptographic attack, the use of nonrepeated
coding increases privacy. If the coding is truly
random, it is necessary to decode each indi-
vidual cycle with no opportunity for confirma-
tion from successive cycles.
Two-Dimensional System. This type of sys-
tem involving both frequency and time division
scrambling affords more security than can be
obtained by using either method of scrambling
alone. In the case of the British system con-
sidered, the privacy would have been materially
increased by using a nonrepeating code, more
frequency bands, and shorter and more time
elements.
Masking Systems. Systems of this type em-
/ ploy a screen of noise overlaying the signal to
be masked. This is accomplished in one system
by modulating the masking and masked signals
on a split-phase subcarrier. The discrimination
between these two signals at the receiver re-
quires absolute synchronization and proper
phasing of the demodulating carrier. Since this
is difficult to achieve in practice, because of
the distortions appearing in the transmission
channel, the restored speech will be of poor
quality, being distorted and noisy.
The relatively large amount of power re-
quired for the masking signal reduces the effi-
ciency of the radio transmitter in that smaller
transmitting ranges are obtained for a given
amount of output power.
Bedford Type Systems. Systems of this type,
of which the phase-varied inverter-distorter
system proposed by Gabrilovitch is one, depend
upon the modulation of speech by a complex
coding wave to obtain privacy. Clear speech is
obtained at the receiver by demodulation of the
scramble with an accurately synchronized de-
coding wave which effectively is the reciprocal
of the coding wave.
To avoid the possibility of partially cracking
the scramble by demodulating it with a single
frequency, it appears to be necessary that the
complex coding wave have no predominant
frequency components but, instead, should have
a fairly uniform spectrum of at least several
hundred cycles width within the limits of the
speech band. The resulting band width of
the scrambled speech exceeds the width of the
speech band by an amount equal to the highest
frequency in the coding wave. It follows, then,
that either the band width of the channel con-
veying the scrambled speech must be wider
than for normal speech bands, or the original
speech band must be made narrower than nor-
mal if distortion is to be avoided.
S4ince an accurately synchronized decoding
wave of proper phase is required for deriving
clear speech at the receiver, this system is sen-
sitive to distortions in the transmission channel.
The restored speech should not, however, be as
noisy as that of the masking systems. In the
Bedford type systems, imperfect demodulation
yields unwanted products which are propor-
tional to the speech energy rather than to the
relatively large masking energy.
Synchronization by means of a continuous
modulated wave is believed to be superior to
synchronization by pulses as proposed in the
RCA-Bedford system. In the latter instance,
the wave form of the transmitted pulse is both
important to the proper operation of the system
and sensitive to distortions over a large part of
the band of the transmitting channel.
Evaluation of Security of Systems from Re-
cordings. Phonograph recordings of speech
scrambled by a privacy system provide a less
desirable means for evaluating the security of
a privacy system than do working models of
the system. The results of analyses based on
phonograph recordings can be used for deter-
mining the nature of the privacy system and
the code but even though the quality of the
recording is good, difficulty may be experienced
in direct or superposition listening tests.
Very often it is found that recordings, which
are considered iyoderately good for clear speech
are surprisingly inadequate for storing scram-
bled speech for subsequent analysis and res-
toration. This appears to be due to (1) har-
monic distortion, which, when not too great,
passes unnoticed in clear speech, and also to
(2) irregular speed variations (in either the
recording or reproducing systems) which pre-
vent precise synchronization necessary in some
privacy systems. However, the fact that a high
quality recording is required in cracking a
SECRET
anri Annroved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
104
DECODING PROJECTS
given privacy system, is in itself, of consider-
able practical importance in evaluating the
system.
The most effective cracking techniques often
involve the use of a receiving unit, Or its
equivalent. When only recordings are available
for analysis, it becomes necessary either to
build an equivalent receiver or merely to specu-
late on what might be done with a working
model. Neither of these alternatives is very
satisfactory. It is, therefore, highly desirable
whenever possible, that evaluations be made by
tests on working models.
3'2 FIELD DECODING EQUIPMENT
The experience gained with the sound spec-
trograph in Projects C-32 and C-43 resulted
in the recommendation that the device be re-
designed for field use and included in field
decoding kits at radio intercept stations. Under
Project 13.3-86b eight of the units were built,
three for the Signal Corps, three for the Navy,
and two for the British under Lend-Lease
requisition. Together with operating and main-
tenance instiuctions, these eight spectrographs
(D-165-529) were delivered between January
and Ma. 1, 1944.
The units had the following weights and
dimensions :35
Unit
Recorder
Amplifier-analyzer
Rectifier
Weight
68 lb
64 lb
56 lb
Dimensions
(Inches)
171hx161/2x113/4
2014 x1114x1414
201/1x111/4x1034
b Project 13.3-86, Contract OEMsr-1110, Western
Electric Company, Inc.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Chapter 6
FACSIMILE PRIVACY SYSTEMS
6.1 INTRODUCTION
THE SCRAMBLING SYSTEMS heretofore de-
scribed have related to the transmission of
speech. Another important form of communi-
cation, however, is graphic copy such as maps,
drawings, and photographs, where a facsimile
of the original subject copy is to be transmitted
to a remote point by wire or by radio. In war-
time, of course, it is as important that privacy
be attained in this form of communicated in-
telligence as in the transmission of the human
voice.
Two projects under Division 13 were con-
cerned with the general problem of scfambling
graphic copy, Project C-73a being a survey of
all existing and proposed systems and Project
13.3-97b describing a system for scrambling
the copy before scanning it for transmission by
radio or wire.
6.2
6.2.1
FACSIMILE PRIVACY
Statement of the Problem
At the time of this project, all concerned
agreed that facsimile had attractive possibil-
ities as communication means, but up to that
time it had been handicapped by lack of privacy
for military use. Considerable information on
the several phases of the subject existed in
various places but no attempt had been made
to consolidate it. Accordingly Division 13 au-
thorized Project C-73 which had as its object
the survey of the general field of facsimile pri-
vacy and the preparation of a report on the
subject.
The project was completed between December
1942 and July 1943. A final report36 was pre-
pared on June 7, 1943, and a much abridged
report of this final report on October 15, 1943.
The summary to follow is taken from the
a project C-73, Contract OEMsr-837, Radio Corpora-
tion of America.
b Project 13.3-97, Contract OEMsr-1202, Faximile,
Inc.
abridged report. Since it is the basis of any
further work in this subject, this abridged
report is summarized in some detail. The com-
plete final report gives essential details of non-
private systems and furnishes complete back-
grdtt nd
The directive covering Project C-73 called
for:
1.A brief summary of basic facsimile mech-
anisms and modes of transmission.
2. Investigation of the degree of privacy ob-
tainable.
3. Adaptability of telephonic privacy systems
then existing and those under development.
4. Evaluation of means for cryptanalysis of
various graphic privacy systems the enemy
may use.
5. Suggested design of the most useful type
of equipment for both privacy transmission
and cryptanalysis.
The contractor made contact with all known
individuals and organizations in the United
States who might be able to contribute sugges-
tions which would be useful in providing fac-
simile privacy. A complete report on these
contacts is given in the appendices of the final
report. At the time of the survey, telephonic
scrambling methods were under active study
by Division 13 contractors and by the Military
Services, but up to that time no attempt had
been made to use telephonic systems for fac-
simile privacy.
Laboratory tests were made to determine the
effectiveness of telephone systems as applied to
facsimile. Throughout the investigation of all
known and suggested methods of privacy for
graphic copy, the attempt was made to con-
solidate the acquired data on means of apply-
ing the systems studies, and on the effectiveness
and availability for production and other points
of interest to the Services.
6.2.2 Privacy Defined
A coded facsimile subject may be considered
to have been rendered secret when it is so coded
SECRET
105
narinqcifiRd and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
106
FACSIMILE PRIVACY SYSTEMS
that no means may be improvised to decode it,
other than use of the applied code and equip-
ment. This is the ideal condition, but one which
was unattainable in practice.
A coded facsimile subject may be considered
to have been rendered private, from a military
point of view, when at least 72 hr are required
to reproduce the essential intelligence of the
original subject copy. If the subject copy is a
map, the essential intelligence is obtained when
locations are disclosed. If the subject copy is
type, the essential intelligence is disclosed when
the characters become legible, regardless of de-
coded subject quality.
The relative degree of privacy of a coded
facsimile subject may consequently be estimated
by the number of hours required to decode its
essential intelligence. This time may sometimes
be reduced by subdivision of decoding opera-
tions among several members of a decoding
staff.
6.2.3 Facsimile Coding Methods
A facsimile signal is less vulnerable to unau-
thorized reception than ordinary voide or code
signals because it is unintelligible unless one
has a recorder. With a recorder available, how-
ever, which can be readily adjusted over a wide
range of drum speeds, it would be a matter of
less than a minute to establish the correct op-
erating conditions to receive a picture. It must
be assumed that the enemy has such apparatus
and that, therefore, additional privacy means
are essential for military transmission.
Unlike voice transmission, the sending of
intelligence by facsimile depends on two para-
meters. The first is the continuous envelope of
signals representing the shading of successive
picture elements. The second is the information
as to where each successive picture element
should be printed on the recording sheet in
order that a picture may be formed. This is
normally supplied by moving the scanning spot
through a fixed and simple scanning pattern
at a known rate of speed. Obviously, privacy
can be secured
1. By scrambling the signal transmission,
2. By confusing the scanning pattern,
3. By both scrambling the signal transmis-
sion and confusing the scanning pattern.
The facsimile picture signal is ordinarily a
modulation on a subcarrier and can be trans-
mitted through the same apparatus and circuits
as are used for voice signals. For low-speed
facsimile the channel width required is also
of the same order. Thus, already developed
methods of voice scrambling can be considered
for f2csimile privacy. There are three of these,
the first three in the following tabulation.
SIX BASIC METHODS
The assigned designations below are used
throughout the rest of the report.
1. [A] Transposition of frequency bands.
The spectrum of signal fre-
quencies is divided into five bands
and these are manipulated to
secure privacy.
2. [B] Frequency multiplication.
All signal frequencies are mul-
tiplied by a complex and change-
able coding wave to produce a
new pattern of frequencies within
the transmitted spectrum.14 (See
Chapter 3.)
3. [TDS] Time delay system.
The signal envelope is divided
into intervals of time, which in-
tervals are variously delayed and
then transmitted in a new order.
When these three speech scrambling systems
are applied to facsimile, the first two scramble
the signal; the last one, however, is equivalent
to a confusion of the scanning pattern and it
can be most clearly thought of in that way. It
is just as if the scanning spot traversed one
part of a line of the subject, then jumped to
another part, and so covered the whole area
in an irregular sequence of partial scanning
lines.
To these already developed and self-con-
tained coding means there may be added the
following:
4. [PR] Polarity reversal.
Parts of the scanning line are
reversed in polarity, from black
to white and vice versa, according
to a coding sequence.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY
107
5. [VS] Variable speed.
The scanning pattern is modi-
fied by changing the drum speed
by varying amounts according to
a coding sequence.
6. [PT] Pretransmission.
The subject copy is itself
scrambled bY optical or other
means before being placed on the
scanner.36 (See Section 6.3.)
Methods 4 and 5 involve special modifications
of the normal facsimile equipment. Method 4
can be thought of either as a distortion of the
signal envelope or a confusion of the scanning
pattern; Method 5 is obviously the latter.
Method 6 has grown out of the activity of this
project but is, of course, not limited to fac-
simile. It would be equally applicable to mes-
sages delivered by courier.
It should be emphasized that the very orderli-
ness of the normal facsimile process makes
difficult the successful application of privacy
methods to picture transmission. Any cyclic
switching operation will reveal its true time
sequence in the facsimile reproduction. Line
sections must be exactly fitted to avoid gaps
or overlap. Even the white picture background
may reveal coding changes due to slight ex-
posure variations. Long, straight lines normal
to the direction of scanning are particularly
revealing since they serve as time references,
and disclose periodicities. In fact, the repro-
duced facsimile copy is a permanent record of
all the optical and electrical operations which
have been performed on the subject copy. Un-
like the scrambled radio-telephone sound wave?
it is permanently captured to lure to the fullest
extent the ingenuity of the decipherer.
NOMENCLATURE FOR VARIOUS METHODS
To facilitate the designation of the various
secrecy methods, a nomenclature was adopted
in the final and abridged project reports in
which the basic systems are indicated by letter
combinations. In addition to the letters, a
numeral is appended to differentiate between
specific types of a basic system. If two basic
systems are operated in combination, the letter
group of each system will be used. These
designations are as follows.
Transposition of Frequency Bands [A]. The
method of subdividing the picture signal into
discrete frequency bands and interchanging
these bands in the frequency spectrum in ac-
cordance with a coding signal is designated by
the letter A. A modification of this method
includes the process of frequency inversion.
A-1 and A-2. These designations are left open
for experimental development.
A-3. This is the standard commercial system
of the Western Electric Company.
Frequency Multiplication [B]. The method
of transmission whereby a coding signal is
multiplied into an intelligence signal is desig-
nated by the letter B. Modifications of this basic
system are essentially modifications of either
the intelligence signal or the coding signal.
B-1. Straight multiplication without altera-
tion of the intelligence signal or the coding
signal.
B-2. An audio tone of fixed amplitude and
of a frequency outside of the picture signal
band has been added to the intelligence signal.
B-3. An audio tone of fixed amplitude and
of variable frequency outside of the picture
signal band has been added to the intelligence
signal.
B-4. The normal subcarrier frequency modu-
lation [SCFM] modulated with a 500-cycle
tone.
B-5. The normal SCFM picture signal is
limited; i.e., the sine wave of varying frequency
is converted to a square wave of varying fre-
quency before multiplication.
B-6. A very low frequency (less than 1 cycle
per second) has been added to the picture
before conversion to SCFM and subsequent
multiplication. This results in a slow shifting
of the picture signal band in the frequency
spectrum.
B-7. A method wherein the coding signal is
changed periodically. The equipment for this
system has been named "Myopia Mark I."
Time Delay System [T DS] . Essentially, this
method produces a continuous transmission of
coded signals by breaking down the normal
signal sequence into discrete time-signal inter-
vals and rearranging these intervals in a dif-
ferent chronological order. Modifications of this
system are made on the basis of the total
SECRET
npriacsified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
108
FACSIMILE PRIVACY SYSTEMS
number of signal intervals that can be switched.
TDS-1. This is the Model B magnetic-tape
system as developed by the Bell Telephone
Laboratories [BTL].
TDS-2. This is the D-Specification magnetic-
tape system as developed by BTL.
TDS-3. This is the C-50 magnetic-tape sys-
tem as developed by BTL under Project C-50."
TDS-4. This is a simple two-head magnetic-
tape system as used in the preliminary tests on
this project. The time delay between the two
heads was approximately 1/20 sec.
Polarity Reversals [PR]. This method is
designated by the letters PR. Basically, it is
a system which subdivides a continuously vary-
ing picture signal into time intervals and
determines the polarity of the transmitted
signal throughout these intervals. The process
can be visualized as a reversing switch con-
trolled by an auxiliary or coding signal which
PR-2. Polarity reversals in which the time
of transmission of one polarity is less than the
time of transmission of a scanning line. With
this arrangement, every scanning line of the
coded picture will resemble a chain whose alter-
nate links have reversed polarity.
PR-3. This method is similar to PR-2 except
that the duration of the switching polarity is
decreased until it approximates that of a pic-
ture elOment.
Variable Speed [VS] and [CVS]. In a
variable-speed transmission system, the linear
speed of scanning is varied in accordance with
a coding signal. In practice, this variation may
be in fixed steps [VS], or continuously variable
[CVS]. It represents a modulation of the scan-
ning rate, and may vary from a small per-
centage of the scanning rate to 15 per cent or
more.
Speed deviation classifications have been
FIGURE 1. Map uncoded (right), coded by frequency transposition (middle), arid decoded (left).
interchanges the black and white portions of
the picture. The degree of confusion will then
be directly proportional to the rate of switching.
Therefore, the applications of the basic method
are subdivided into the following forms.
PR-1. Polarity reversals in which the time
of transmission of one polarity is greater than
the time of transmission of a scanning line.
The coded picture will then be composed of
groups of scanning lines of alternate polarity
and the number of scanning lines in any group
will vary with the duration of the coding signal.
designated as indicated below:
VS-1. Speed change code of -?-1/2 per cent.
VS-2. Speed change code of ?-1 per cent.
VS-3. Speed change code greater than +1
per cent.
VS-4. Two dimensional VS scanning for
PT method.
CVS-1. Continuously variable speed change
code.
Pretransmission [PT]. Methods wherein the
subject copy is itself scrambled by optical or
other means before being placed on the scanner.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Si
Fi
de
sp
ti
fl
C(
ti
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY
109
TYPICAL SAMPLES OF CODING AND
DECODING BY VARIOUS
SINGLE PRIVACY METHODS
Transposition of Frequency Bands [A].
Figure 1 is a typical example of coding and
decoding with the existing Western Electric
speech privacy equipment A-3. The right por-
Frequency Multiplication [B]. Figure 2 is a
typical example of coding and decoding with
the Myopia Mark I equipment. The right sec-
tion shows the coded picture using 3-sec normal
code shift; the center section, the decoded copy;
and the left section, the normal uncoded subject
copy.
FIGURE 2. Copy coded by frequency multiplication (right) and decoded (middle).
tion of the recording is the uncoded subject
copy; the middle section, coding by five test
frequencies; and the left section, the decoded
copy.
Mathematical analysis indicates that method
B should be subject to decoding by means of a
filter placed at the frequency corresponding to
either white or black, by virtue of the differen-
FIGURE 3. Effect of passing coded signal of Figure 2 through narrow-band filter. Left half employed only
one coding wave; right half used 3-sec code shifts.
The coded section is seen to introduce a
background, without scrambling of the essen-
tial intelligence. The system has no privacy
when applied to facsimile transmission.
tiating action of the photocell at the boundary.
Figure 3 shows the effect of passing the coded
signal through a 100-cycle narrow-band filter
having a 1,445-cycle mid-frequency, which cor-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
110
FACSIMILE PRIVACY SYSTEMS
responds to white in the recording. The left
half of the recording utilized only one coding
wave, the right half employed 3-sec code shifts.
The essential intelligence of the subject copy
is seen to be revealed by filter decoding.
Figure 5 is the result of coding by polarity
reversals at the rate of approximately 50 per
scanning line. The left portion of the recording
is the result of applying a telegraphic signal
repeating every 80 bands, as an additional
FIGURE 4. Map scrambled by TDS system. Left portion is decoded version of map.
Time Delay System [TDS]. Figure 4 is a
typical example of coding and decoding by the
D-Specification TDS system. The right portion
of the picture shows a complete scramble with
little evidence of switching periodicities. The
left portion of the picture is the reconstructed
subject copy resulting from the decoding opera-
coding source. Boundary conditions are seen
to convey a considerable degree of intelligence
in both sections of the coded picture.
Figure 6 is the decoded version of the above
coded picture. It shows a reproduction of the
subject copy, with good quality.
The susceptibility of the PR method to de-
FIGURE 5. Appearance of copy scrambled by polarity reversal.
tion. D-Specification TDS is an immediately
available system, having a high degree of view-
ing privacy, and a considerable degree of de-
coding privacy.
Polarity Reversals [PR]. Figures 5 and 6
are typical samples utilizing the PR method.
coding by switching transients passed through
a narrow-band filter is shown in Figure 7.
In this recording the switch reverses polarity
at the rate of approximately 50 times per
scanning line. The left portion of the picture is
normal uncoded subject copy, the middle sec-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
tic
pa
a.
fri
to
as 11
re
Fi
of
oi
P(
rc
cc
st
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY
111
tion coded, and the right section decoded by
passing the 1.5- to 2-kc f-m signal through
a 100-cycle narrow-band filter having a mid-
frequency of 1,785 cycles. The recording is seen
to be completely decoded by the filter, as far
as essential intelligence is concerned.
drum at normal drum speed will be noted in
the coded section of the recording.
The CVS method, at the same maximum fre-
quency deviation of -?5 per cent, is illustrated
by Figure 9 made by Times Telephoto Equip-
ment, Inc., using continuously variable drum-
FIGURE 6. Decoded
Variable Speed [VS] and [CVS]. A typical
recording by the VS method is illustrated by
Figure 8. A speed deviation having a maximum
of .?5 per cent was applied for a fixed number
version of Figure 5.
speed shift, but with a random drum-speed
swing. The lower section of the picture is
normal uncoded, the middle section coded, and
the upper section synchronously decoded. The
FIGURE 7. Example showing susceptibility of PR system to decoding by passing coded signals through
narrow-band filter. Left portion, uncoded copy; middle portion, coded by PR; right portion, copy decoded
by use of filter.
of drum revolutions varying from 10 to 20
per frequency step. The lower section of the
recording is normal uncoded, the middle section
coded and the upper section decoded. A decoded
strip corresponding to ten revolutions of the
CVS method shows the highest degree of pri-
vacy of the single methods. No direct electrical
method has as yet been devised to break the
CVS code.
Pretransmission [PT]. The pretransmission
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY SYSTEMS
method PT has not been developed experi-
mentally to the stage in which coded and ,
decoded subject copy is available by facsimile
transmission. The possibility of the method for
coding purposes is shown in Eastman Kodak
Company samples, Figure 10, in which a double
shredding process was used. At the lower left
NO
bination is illustrated by Figure 12. Mixing
of the two methods produces a high degree
of privacy for the combination. Difficulty of
synchronization and phasing at the scanner
and recorder, unfortunately, renders the com-
bination less attractive for practical circuit
applications.
77r""*.errxr:"
-
?
t
'icEituAri
FIGURE 8. Recording by variable speed [VS] sys-
tem. Lower portion, normal uncoded; upper por-
tion, decoded material. .
of Figure 11 is shown a coding by the single
shredding process, and at the lower right a
second shredding at right angles to the first.
The method is limited as to its basic privacy
by the problem of registration and skew which
will determine the practical element size. The
method gives promise of being particularly
valuable as a combination method with TDS
or CVS.
CODING AND DECODING BY TANDEM
COMBINATIONS OF PRIVACY METHODS
Polarity Reversal [PR] and Time Delay
[TDS] in Combination. The PR and TDS com-
i 7
? t.._.? , A
?, ..,
-- -0--..-
'
--"--: -,". -- ---^-4-A
?--
- --
.?-,..., --4 -.:7"-----72:::,-- -.F.-'' .....--..., ?, _ ,j. ..,-.:?,-;;?,---_,,
-41
?...-v.r...
^ - .- ..., . ? ..:-. re.... ----, - ^4.---,..-7:?. ?'-'-'7'.." re*,,,--? *`
t=r,..r.....?:.V1."' ? .,..'';.t.,:;"Z 4-
i. i,- ,;*.;;6,r.
...le ..?. ', . '. ._,.1 . 7'...r;:-_'' tr?-.2:4:e...-V1442.
-
?;,,,,.. -'
6..7.. ? ..__.._,,_-? ,
- ,..,.._ . * ;?*. **._,*?.41,-21."' k::`,,?'"'- "' -.L.:,,i..7.1
??.,.,.----1,7.--..--. 7-i -...--'"- - - '7:74' ' - - -. - ? '. -. -.1-'1,- 4t. ''''-, 7 P - ' . ,7.--* - ' - ? - . 7 ' ?
-; '
-3....:.**....te . .. "-^'4 .4*' - , J.^ . '4 et
M Jr
'........... ......-*?---- ? '',.:A.,-...*7*-- '5''' ,.".L...... r
........'.=-Z, -*--',"-. -,... '--,* '
t'?4"
?^-
Art-Efti:KNEA cam
FIGURE 9. Scrambling by
drum speed.
Transposition of Frequency Bands [A] and
Time Delay [TDS] in Combination. The A a.nd
TDS combination is illustrated by Figure 13,
made by using the standard A-3 Western Elec-
tric speech privacy system with the BTL Model
B TDS system. The right section shows normal
recording without A or TDS; the middle sec-
tion is the coded picture utilizing the coders of
A and TDS in combination; and the left section
is the decoded copy resulting from passing the
coded signal through the tandem decoders.
Reference to the coded middle section shows
that a single system having no privacy by itself
may be raised, by combination with another
continuously varying
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY
113
single system, far above that of either compo-
nent system used singly.
Variable Speed [VS] and Time Delay [TDS]
in Combination. The TDS and VS combination
is illustrated by Figure 14. The single methods
used in this combination are D-Specification
TDS and a step-by-step variable speed VS at
the rate of ?-1/2 per cent. A remarkable in-
crease in visual scrambling is attained com-
pared to using the single method alone.
Frequency Multiplication [B] in Combina-
tion with Variable Speed [VS]. Figure 15 is
the result obtained with the B and VS combi-
and 'varying the drum speeds in synchronism;
and the left section, the uncoded subject copy.
The B and VS combination is less attractive
from an application viewpoint due to the rela-
tive ease with which B may be decoded by
a narrow-band filter intercepter.
PRACTICAL APPLICATIONS OF
PRIVACY METHODS
Transposition of frequency bands [A] is
represented by the Western Electric Type 3-A
speech privacy equipment. It is fixed station
equipment of large bulk and weight.
FIGURE 10. Example of pretransmission scrambling.
nation. The Myopia Mark I coder and decoder
was used in applying the B coding. SCFM
recording with a subcarrier frequency of 1,380
to 1,750 cycles was applied. The coder was
operated on a:?3-sec continuous-code shift with
constant amplitude into the unit. VS was
applied at the rate of ?? per cent speed
deviation.
The right portion of this illustration is the
coded subject; the middle section, decoded by
passing the coded signal through the decoder
The method depends upon fixed interchange
of frequency bands. There is. no automatic
synchronization or phasing problem. The
method has been shown to give no privacy
when applied to facsimile transmission.
Frequency multiplication [B] is represented
by Model RCAL-1" weighing 32 lb and having
a volume of approximately 3/4 cu ft. The code
is set up on numbered dials, with provision
for continuous change by means of a clock
mechanism.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
114
FACSIMILE PRIVACY SYSTEMS
FIGURE 11. Pretransmission coding by single shredding (left) and by double shredding process (right).
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
FACSIMILE PRIVACY
115
Phasing is obtained by starting the coding
dials at a given setting and time. Synchroniza-
tion between coding waves at sending and re-
ceiving points is obtained from reference pulses
transmitted over the circuit. These will require
precise frequency standardization.
_
code remains fixed until the cards are changed.
The receiving decoder is synchronized on a
start-stop basis with the commutator of the
sending coder by a regularly repeated pulse
signal. The code is repeated every 3/4 sec so
that no long time phasing is needed. The coder
FIGURE 12. Illustration of use of TDS
It is probable that multipath propagation will
destroy both the coded wave and the synchro-
nizing signal.
The unit as it stands can be used inde-
pendently for voice or facsimile transmission.
and polarity reversal in combination.
and decoder do not have to be started simul-
taneously. It is computed that the precision of
synchronization required is the same as now
obtains on facsimile apparatus. Any skew in
the received copy may be corrected by read-
FIGURE 13. Effect of using frequency band transposition [Al
security offered by either method.
Time delay system [TDS] is represented by
the BTL D-Specification model weighing 25 lb,
and having a volume of approximately 3/4 cu ft.
Codes are set up by inserting two perforated
cards in their appropriate boxes. A particular
and TDS in tandem, thus increasing
justment of the frequency standards between
pictures.
Distortion of the signal by multipath should
be the same on TDS as on straight uncoded
transmission. At the time of the project, D-Spec
SECRET
neclassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
!;
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
116 FACSIMILE PRIVACY SYSTEMS
TDS was available privacy equipment, an
independent unit, equally applicable to voice
or facsimile.
? Variable speed [VS] and continuously vari-
able speed [CVS] consists of deviating the
drum speed with respect to normal speed at a
be exactly the same at scanner and recorder.
This requires that the code sequence at the
two points should be started with an estimated
error of not more than 0.01 sec.
Radio circuit distortions will have no more
effect on VS and CVS than on normal facsimile.
FIGURE 19. Coded and decoded copy produced by combining VS and TDS.
coded rate, either in fixed steps or continuously
to a maximum of ?-15 per cent. The apparatus
added to a normal facsimile station will depend
upon the type of drum drive circuit being used.
It may, or may not, exceed in volume the 3/4
cu ft already mentioned for other methods.
They may, however, make it difficult to send
the timing signal at the start of each message
with the precision necessary to start the codes
in phase.
A special design of facsimile machine ap-
pears to be the most satisfactory solution for
FIGURE 15. Use of frequency multiplication (B) and variable speed (VS) in tandem. Right portion, coded
copy; middle portion, decoded copy.
A basic synchronization accuracy of 1 part
in 100,000 will be required. A differential be-
tween this standard and the scanner and
recorder must be taken to provide the required
percentages, slow Or fast. The critical condition
is that the sequence of speed variations must
the VS and CVS method. It is consequently not
an immediately available privacy system.
Pretransmission method [PT] is indicated
to be most useful as one of the basic methods
of a tandem combination. The application
greatly simplifies tandem transmission since
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
PRETRANSMISSIONTACSIMILE?PRIVATY?
111
the simultaneous use of more than one set of
coders and decoders is not required. The result-
ing privacy of TDS or VS transmission may
thereby be greatly enhanced.
The A-3 graphic method of Faximile, Inc.,
(Project 13.3-97)36 and the double shredding
method suggested by the Eastman Kodak Com-
pany are promising applications of the PT
method.
SUMMARY OF PRIVACY METHODS
Several kinds of coding units have been
tested which could be built in a volume of 1
Cu ft and in mechanical form suitable for
military service.
Synchronizing and phasing will be critical
problems in radio transmission.
The B system and combinations will not
function over radio circuits with severe multi-
path distortion.
Methods TDS, PR, and VS will not be seri-
ously affected by multipath distortion.
Methods A, B, and TDS can be used
ultimately for facsimile and voice coding.
Methods PR and VS are special to facsimile
and would be of questionable effectiveness for
voice coding.
CONCLUSIONS
In general, privacy systems which are useful
for speech may or may not be suitable for
facsimile. This is because the original facsimile
signal has a regular periodicity which tends to
reveal the code that has been applied.
Of the three existing speech privacy systems,
A-3 gives no privacy for facsimile transmission
whereas TDS and Myopia Mark I are reason-
ably effective.
The privacy of several variations and com-
binations of the six basic systems has been
estimated in terms of the time required to
decode them and will be found in the final
report37 together with proposed methods of
decoding and lists of the necessary apparatus.
Much greater privacy is obtained with a
tandem combination of two systems than with
either system alone.
The best single system so far evaluated (VS)
requires three hours for 80 per cent decoding
of the picture. It is continuously variable drum
speed wherein variations of not less than ?-5
per cent occur within each scanning line. ?
The most effective tandem combination of
two systems will apparently require 10 hours
to decode 80 per cent of the picture. This is
the combination of continuously variable drum
speed and D-Specification TDS. Application of
CVS with the continuously varying code TDS
(C-50) should still further increase the time
for decoding. This combination merits investi-
gation.4
Pretransmission systems have been proposed
during this survey, and have been evaluated.
Such systems include coding of the subject
copy prior to transmission by normal facsimile
means, and decoding of the record copy after
it has been received. In general, these methods
can effectively code the subject copy but there
appear to be technical difficulties in the decod-
ing process.
6.3 PRETRANSMISSION FACSIMILE
PRIVACY
Project 13.3-97 comprised an investigation
of the feasibility of automatically enciphering
and deciphering graphic material such as maps,
photographs, drawings, etc., by strobotronic
photography. The material is scrambled by
transposing elementary sections of the graphic
original before transmission.
BASIC METHOD UTILIZED
Basically the pretransmission scrambling
method investigated under this project is
equivalent to cutting the copy into vertical
strips which are transposed and remounted so
that although the information within the strips
is in proper order vertically, the picture is
mutilated horizontally. After remounting the
vertical strips, the resulting copy is cut into
strips horizontally and after transposition of
the elements, the copy is again assembled. Now,
of course, the original information is hidden
to a degree depending upon the smallness of
the individual elements and the manner in
which they are scrambled. Although the fea-
ture was not incorporated in the model pro-
duced under the instant contract, some of the
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
118
FACSIMILE PRIVACY SYSTEMS
elements might be upside down as well as out
of Order; it is also conceivable that some' of
the elements might be reversed.
The final product of the several transposi-
tions can be sent to the receiver by courier, by
mail, or by wire or radio facsimile or photo-
graphic transmission methods.
THE ACTUAL MECHANISM
In the machine developed and the model
produced, the following sequence of events
occurs. The copy to be scrambled is wrapped
upon a cylindrical drum and rotated by a
motor at a speed which is not critical. A single
strip of this copy is illuminated and its image
is projected upon a similarly mounted sheet
of photographic paper which rotates, not con-
tinuously, but in steps.
After the first portion or "frame" of the
photographic paper is exposed, the drum carry-
ing the sensitized paper moves one step bring-
ing another frame of the paper into readiness
for the second exposure. In the meantime the
subject has moved to a new location, according
to a key or code, and at the proper time this
new portion of the original is photographed
upon the sensitive paper. When all portions of
the subject strip have been photographed, a
new strip of the copy, adjacent to or otherwise
with respect to the first strip, would be photo-
graphed. In this manner all the copy would
be impressed upon the photographic paper but
with the elements out of order.
After development, the negative image with
vertical elements transposed would be used as
an original and a new print made, this time
with the scrambling performed in a direction
at right angles to the first encipherment. The
second print would be a positive like the
original material but with all elements out of
order.
Increased privacy could be secured by per-
forming another mutilation this time encipher-
ing the transposed copy which is placed on the
drum displaced, say, a half-strip in width.
The deciphering is electrically and mechani-
cally the inverse of the operation which
scrambles the copy. According to the proper
key, portions are photographed upon a sheet
of paper which is developed to a negative image.
As many copying operations must take place
as occurred in scrambling the material in the
first place and, of course, the proper key must
be used.
THEORY OF OPERATION
Optically it is possible to "stop" the motion
of a rapidly moving object at various points in
its line of travel if it is illuminated by flashes
of light of such short durati.on that for the
per4od of the flash no appreciable movement
of the object occurs.
In the case of the graphic privacy system
developed under this project, the moving object
is the message to be scrambled. The flashes of
light are furnished by the discharge of elec-
trically charged capacitors through gas-filled
strobotron tubes. Photographic means are used
to record the results.
The original material is scanned through
an aperture and by its means and that of a lens
system, 1/2x2-in. sections of the copy are photo-
graphed on the sensitive paper rotated by the
drum on which it is mounted.
Naturally, the flashes of light must be
properly timed in accordance with the relative
positions of the two drums and must have the
proper intensity. Timing is effected by elec-
tronic circuits described in the final report on
the project.
Sixteen exposures result in transferring a
column 2 in. wide by 8 in. high to the photo-
graphic paper in coded random 1/2x2-in. sec-
tions. Thereupon the optical assembly is moved
axially and another 2-in, strip is photographed.
Naturally, the consecutive sections of the
material are not photographed in consecutive
position on the sensitive paper, but in some
other order determined by the key.
The duration of the flash is about 40 Rsec
so that the continuously rotated copy is, in
effect, stationary during the photographic
exposure. The overall effect of two cycles of
scrambling is to produce a new positive picture
made up of 1/2-in, squares completely out of
place with respect to each other and with
respect to the original matter.
MECHANICAL DETAILS
The apparatus constructed under the project
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
PRETRANSMISSION FACSIMILE PRIVACY
119
was composed of the two drums approximately
4 in. in diameter and 9 in. long, one being
rotated at approximately 140 rpm by an electric
motor through a 25 to 1 reduction gear and
the other rotated in steps by a plunger-type
solenoid magnet through a ratchet and pawl
mechanism. The optical assembly was composed
of two strobotron tubes (Sylvania R-4215) and
a projection lens and moved along guide rails
between and parallel to the axis of the drums.
In the model, coding was accomplished by a
switchboard composed of 64 flexible electric
cords with phone tip plugs and a like number
of tip jacks. Eastman Kodak Aero Enlarging
Paper (mapping paper) single weight, No. 2,
was used since this material is specially treated
to minimize dimensional changes in processing.
The copy drum steps once for every two
revolutions of the subject drum. During the
alternate revolutions, switching and other
mechanical actions take place. In deciphering,
the enciphered copy is placed upon the stepping
drum, the optical assembly is reversed so that
the same key may be used to photographically
rearrange the elements in their original order.
CONCLUSIONS
Operating tests of the Model GPM-X1 ma-
chine proved the validity of the principles
involved and indicated: (1) that in a new model
much higher drum speeds could be employed,
(2) titat it would be advisable to complete the
encipherment in a single photographic opera-
tion to avoid cumulative errors, (3) that it
would be feasible to build a machine that would
automatically encipher a clear message* in a
two-dimensional randomized copy consisting of
squares at least as small as 0.2 in. on a side,
and (4) that a newly proposed plan for chang-
ing keys should be utilized. Such a new machine
would provide a substantial term of privacy
for graphic copy.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Chapter 7
MISCELLANEOUS PROJECTS
THE FINAL TWO PROJECTS considered in this
volume are related in a general way to the
subject matter that has gone before. Under
Project C-52,a Division 13 developed a crypto-
graphic rotor which had certain advantages
over the similar rotor in use at the time.
Project C-7P was set up to study the radio
transmissions of German submarines in an
endeavor to determine if frequency-modulation
were being used in addition to the normal
amplitude modulation. Methods were developed
for recording and studying these signals, the
recording apparatus being somewhat similar to
the schemes described in the earlier portions
of this volume.
7'1 ROTOR FOR CRYPTOGRAPHIC USE
Project C-52 was concerned with the design,
development, and test of a set of rotors for
multiple transposition coding when used on a
suitable printer typewriter. Decoding was
accomplished by use of a reversing switch.
STATE OF THE ART
At the time this project was started the
Signal Corps had in use a typewriter type of
coding and decoding machine which would
automatically perform a quadruple transposi-
tion ciphering each time a key was struck.
This was accomplished by means of four disks
(actually rotary switches), each disk having
input and output terminals for each letter of
the alphabet. The interconnecting wires be-
tween these terminals gave the particular
transposition for that disk. Four such disks
were used in series. After each letter was
coded, one or more of these disks was rotated
to change the code for the next letter. The
machines in use by the Signal Corps had two
disadvantages. First, it was quite difficult to
a Project C-52, Contract OEMsr-542, Fournier In-
stitute.
b Project C-71, Contract OEMsr-880, Western Elec-
tric Company, Inc.
120
rotate the _disks since heavy pressures had to
be kept on the contact fingers in order that
good electrical connections could be made.
Second, the construction of the contacts in the
disks was such that many troubles were en-
coui4ered with arcing and tracking across the
insulating sectors between contact points.
These two difficulties prevented the machines
from being used more widely.
OBJECT OF THE INVESTIGATION
The widespread use of codes and ciphers by
the military forces in time of war makes it
essential that the process of coding and decod-
ing messages be made as simple as possible.
This is usually accomplished by either 'Mechani-
cal or electrical devices or a combination of
both. An ideal solution of this problem is a
machine with a standard typewriter keyboard
upon which a message may be written in plain
language resulting in a printed version of this
message being coded automatically by the
machine and delivered instantaneously. The so-
called transposition cipher is most commonly
used, in which the letter "a" for instance, when
struck on the keyboard, causes some other letter
to replace it in the coded message. For purposes
of additional security, it is arranged so that
the next time the letter "a" is used a different
letter represents it than that one which was
originally used. A wide variety of multiple
transpositions may be used to obtain the neces-
sary security.
Such a transposition can be obtained by
having an electrical connection made when a
key on the keyboard is depressed. This electrical
connection is made to a contact finger which
touches one of twenty-six contacts on an insu-
lated rotary disk. On the other side of this
disk there are also twenty-six contacts, one for
each letter of the alphabet. An electrical con-
nection is permanently made by wires from
contacts on one side of the disk to contacts on
the other side in a predetermined manner to
give the alphabetical transposition which is
desired. Twenty-six outgoing contacts bear on
SECRET
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
to
at
e.
le
n-
s.
BS
it
3-
e.
a
-cl
in
is
ie
o-
ly
?s
Tt
ts
le
s-
)3.7
a
al
is
1-
)11
Lo
is
in
ROTOR FOR CRYPTOGRAPHIC USE
121
each of the rotor contacts and are connected
to a printer circuit which causes a letter to be
printed corresponding to the contacts through
which the electrical circuit was made. Such an
arrangement with one rotor disk gives a single
alphabetical transposition. A more secure code
can be obtained if several transposition disks
are used in series, and are rotated in some
predetermined fashion to make the breaking
of the coded messages even more difficult.
sary to use a rather strong spring on the con-
tact fingers. This made it very difficult to turn
the rotors, an operation which was necessary
for each new letter which was transmitted.
Since these devices were to be used in advanced
locations where electric power was not avail-
able, it was not possible always to provide some
strong solenoid action to force this rotation
against the necessary friction. To accomplish
tis by a straight mechanical linkage to the
FIGURE 1. General view of testing equipment for cryptographic rotor, rotors in place ready for use.
It is also possible to design an electrical
reversing mechanism which enables the same
machine to be used in decoding messages. The
coded message is transcribed on the keyboard
as it was originally received, and the plain test
version appears automatically decoded on the
printer tape from the machine.
Machines of this description were in use by
the Signal Corps at the time of the project,
but two difficulties had been encountered. The
first difficulty was that to make a reliable
contact with the existing designs, it was neces-
keyboard would have necessitated a very special
keyboard with a long distance of travel for
each key, and would have required the use of
considerable force when the key was struck.
A second difficulty was that the existing de-
signs used a bakelite disk in which were molded
brass inserts which were turned until they were
flush with the bakelite surface. As the disks
were rotated after each letter, the contact
finger rubbed across the bakelite in its travel
from one rotor contact to the adjacent one. This
resulted in a track being made across the bake-
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
122
MISCELLANEOUS PROJECTS
lite surface, and ultimately a low-resistance
path was built up, which led to electrical break-
down and sparking across this path. When this
happened the rotor had to be discarded and a
new one substituted.
? The object of ?this investigation was to
develop a rotor which could be used in such a
device without the difficulties of voltage break-
down between the contacts and excessive
design would be satisfactory. Two actual rotors
were designed and the second which was
smaller and less complex than the first was
actually constructed and submitted to the
Signal Corps. Most of the time and effort were
spent on test equipment. After rotors and test
equipment had been designed and constructed,
life tests were run and demonstrations were
made.
FIGURE 2. Back view showing details of eight rotor disks.
mechanical friction during rotation. It was
necessary that any proposed rotor be readily
manufacturable, and if possible, it was desired
to make the connection between the contacts
on each side of the rotor sufficiently flexible so
that they could be changed readily in the field.
PROCEDURE
There were two principal problems involved
in attacking the project, (1) to design and
construct the rotors and contact and (2) to
devise proper test equipment to insure that the
The coding disks and rotors constructed were
quite easy to rotate while still giving reliable
electrical contact as proved by the life tests.
Substantially complete freedom from leakage
and tracking between terminals and contacts
was achieved. The final model should be readily
and easily manufactured in large quantities.
So far as is known no use was made of the
designs or models.
The final report38 on the project gives com-
plete mechanical description including working
drawings.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
RADIO RECORDING
123
7.2
RADIO RECORDING
Project C-71 comprised an investigation of
the possible existence of frequency modulation
in certain telegraph transmissions and develop-
ment of means for recording the transmissions.
SUMMARY OF THE PROJECT
The work under this project was carried out
at the request of the Navy Department as a
means of identifying German naval vessels by
the characteristics of their telegraph trans-
mitters. Such identification, by recordings,
would supplement the direction-finder net set
up to watch for enemy signals.
Under the project more than a thousand
transmissions were recorded by means of
apparatus developed to detect the frequency-
modulation in the transmissions and were
transmitted to the Navy.
ale final report39 of the project gives the
means used and the results obtained.
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
BIBLIOGRAPHY
Numbers such as Div 13-302-M3 indicate that the document listed has been microfilmed and that its
title appears in the microfilm index printed in a separate volume. For access to the index volume and to
the microfilm, consult the Army or Navy agency listed on the reverse of the half-title page.
1. Speech Privacy Systems, Interception, Diagnosis,
Decoding, Evaluation, OSRD 4573A, Final Report
Project C-43, W. Koenig and C. H. G. Gray, BTL,
Oct. 12, 1944. Div. 13-302-M3
2. A Coding Arrangement for C-50 A-3 Privacy Sys-
tem, J. M. Fraser, OSRD 4573B, Preliminary Re-
port 21 of Part II, Final Report Project C-43,
BTL, July 31, 1943. Div. 13-302-M4
3. Methods for the Automatic Scrambling of Speech,
G. Guanella, OSRD 4573B, Preliminary Report 5
of Part II, Final Report Project C-43, December
1941. Div. 13-302-M4
4. Methods for the Automatic Scrambling of Speech,
W. Koenig and P. W. Blye, OSRD 4573B, Pre-
liminary Report 5 of Part II, Final Report
Project C-43, BTL, December 1941.
Div. 13-302-M4
5. Analysis of Brown Boveri Two-Dimensional Speech
Scrambling System, W. Koenig, OSRD 4573B,
Preliminary Report 9 of Part II, Final Report
Project C-43, BTL, Sept. 25, 1942. Div. 13-302-M4
6. "The Carrier Nature of Speech," Homer Dudley,
Bell System Technical Journal, Vol. 19, October
1940, p. 495.
7. "Remaking Speech," Homer Dudley, Journal
Acoustical Society of America, Vol. 11, October
1939, p. 169.
8. Speech Privacy Development, R. K. Potter,
OSRD 201, Final Report Project C-1, BTL, June
4, 1941. Div. 13-301.3-M2
9. Privacy Considerations in Connection with Present
and Future TDS Unit Designs and Recommenda-
tions for New Models of TDS Privacy Equipment,
R. K. Potter, OSRD 196, Final Report Project
C-IA, BTL, May 20, 1941. Div. 13-301.3-M1
10. Continuously Coded TDS, Speech Privacy Equip-
ment, Eugene B. Mechling, OSRD 2068, Final Re-
port Project C-50, BTL, Nov. 1, 1943.
Div. 13-301.31-M1
11. Frequency Time Division Speech Privacy System,
L. Schott, OSRD 1725, Final Report Project C-66,
BTL, May 29, 1943. Div. 13-301.3-M4
12. Code Changing Attachment for TDS Speech
PriVacy Units, C. W. Carter, OSRD 1541, Final
Report Project C-65, BTL, Apr. 30, 1943.
Div. 13-301.3-M3
13. Telegraphy Applied to TDS Speech Privacy Sys-
tems, C. W. Carter, OSRD 1047, Final Report
Project C-55, BTL, Oct. 3, 1942. Div. 13-304.3-M1
14. RCA Speech Secrecy Research, Project C-54, RCA
Laboratories.
Part I. Proposed Portable Speech Privacy Unit
with High Security, A. V. Bedford, OSRD 1882,
Feb. 2, 1943. Div. 13-301.1-M1
Part II. Description of Speech Privacy Unit
Model RCAL-1 and Related Information, A. V.
Bedford, OSRD 3107, Oct. 30, 1943.
Div. 13-301.1-M2
Part III. Modification of Speech Privacy Units,
4adio Tests and Conclusions, A. V. Bedford,
OSRD 3395, Feb. 25, 1944. Div. 13-301.1-M3
15. Speech Secrecy System Development, 0. M. Dun-
ning, OSRD 207, Final Report Project C-15,
Hazeltine Service Corp., Oct. 28, 1941.
Div. 13-301.2-M1
16. Variable Band Shift Filter, D. F. Hoth, OSRD
4573B, Preliminary Report 11 of Part II, Final
Report Project C-43; BTL, Nov. 25, 1942.
Div. 13-302-M4
17. Large Spectrograms Made on Variable Area
Pattern Machine, W. Koenig, OSRD 4573B, Pre-
liminary Report 13 of Part II, Final Report
Project C-43, BTL, Jan. 13, 1943. Div. 13-302-M4
18. Method of Finding the Decoding Permutations in
Brown Boveri Two-Dimensional Scrambling Sys-
tem, W. Koenig, OSRD 4573B, Preliminary Report
10 of Part II, Final Report Project C-43, BTL,
Oct. 31, 1942. Div. 13-302-M4
19. Mechanical and Numerical Aids for Cracking Re-
peated Code TDS, A. D. Fowler and W. Koenig,
OSRD 4573B, Preliminary Report 14 of Part II,
Final Report Project C-43, BTL, Jan. 25, 1943.
Div. 13-302-M4
20. Experiments in Cracking Two-Dimensional
Scrambles, W. Koenig, OSRD 4573B, Preliminary
Report 22 of Part II, Final Report Project C-43,
BTL, July 23, 1943. Div. 13-302-M4
21. Evaluation of the Privacy Afforded. for Non-
Repeated Code TDS Systems (C-50 TDS), W.
Koenig, OSRD 4573B, Preliminary Report 26 of
Part II, Final Report Project C-43, BTL, Nov.
30, 1943. Div. 13-302-M4
22. Variable Area Speech Patterns, W. Koenig, OSRD
4573B, Preliminary Report 1 of Part II, Final
Report Project C-43, BTL, May 21, 1942.
Div. 13-302-M4
23. Variable Area Pattern Machine, D. F. Hoth, OSRD
4573B, Preliminary Report 7 of Part II, Final
Report Project C-43, BTL, Sept. 14, 1942.
Div. 13-302-M4
24. Playback Machine for Variable Area Speech
Patterns, W. Koenig, OSRD 4573B, Preliminary
Report 12 of Part II, Final Report Project C-43,
BTL, Jan. 6, 1943. Div. 13-302-M4
25. Privacy Evaluation of Repeated Code TDS and
A-3 Privacy Equipment in Tandem, W. Koenig,
SECRET 125
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
126
BIBLIOGRAPHY
OSRD 4573B, Preliminary Report 19 of Part II, 34.
Final Report Project C-43, BTL, May 27, 1943.
Div. 13-302-M4
26. Use of Monotone or Whispered Speech on Privacy 35.
Systems, W. Koenig, OSRD 4573B, Preliminary
Report 16 of Part II, Final Report Project C-43,
BTL, Feb. 25, 1943. Div. 13-302-M4 36.
27. Evaluation of the Security Afforded by the RCA-
Bedford Speech Privacy System, W. Koenig, OSRD
4573B, Preliminary Report 18 of Part II, Final
Report Project C-43, BTL, May 26, 1943.
Div. 13-302-M4 37.
28. Decoding Equipment for TDS,0Split Band, and
Two-Dimensional Speech Scrambling System, W.
Koenig, OSRD 4573B, Preliminary Report 15 of
Part II, Final Report Project C-43, BTL, Jan. 25, 38.
1943. Div. 13-302-M4
29. Playback Devices for Spectrograms, L. Y. Lacy,
OSRD 4573B, Preliminary Report 17 of Part II,
Final Report Project C-43, BTL, Mar. 30, 1943. 39.
Div. 13-302-M4
30. Analysis of Generalized TDS Codes, A. D. Fowler, 40.
OSRD 4573B, Preliminary Report 3 of Part II,
Final Report Project C-43, BTL, June 16, 1942.
Div. 13-302-M4
31. Analysis of Self-Converse TDS Codes, A. D. 41.
Fowler, OSRD 4573B, Preliminary Report 6 of
Part II, Final Report Project C-43, BTL, Aug.
19, 1942. Div. 13-302-M4
32. TDS Field Decoding Test at Camp Coles, W. 42.
Koenig and A. E. Ruppel, OSRD 4573B, Pre-
liminary Report 24 of Part II, Final Report
Project C-43, BTL, Oct. 19, 1943. Div. 13-302-M4 43.
33. Part II, Final Report on Project C-43, containing
all the preliminary reports, most of which are in-
cluded in this bibliography. Those reports not so
included are: 44.
No. 2. Results of Experimental Intercept Work
at Holmdel, New Jersey and Point Reyes, Cali-
fornia, P. W. Blye and L. Y. Lacy, OSRD 4573B, 45.
BTL, May 29, 1942. Div. 13-302-M4
No. 4 Sonovox Secrecy System, L. Y. Lacy, OSRD
4573B, BTL, July 2, 1942. Div. 13-302-M4
No. 8. Speech Scrambling System Proposed by
Frank D. Lewis, W. Koenig and P. W. Blye, OSRD 46.
4573B, BTL, Aug. 29, 1942. Div. 13-302-M4
No. 20. Speech Privacy and Synchronizing Sys-
tem Devised by Captain Henry P. Hutchinson,
D. 0. Slater, OSRD 4573B, BTL, July 31, 1943.
Div. 13-302-M4 47.
No. 23. Intercept Work at Point Reyes, California,
H. Kahl, OSRD 4573B, BTL, July 26, 1944.
Div. 13-302-M4
No. 25. Interception of Enemy Radiotelephone 48.
Communications Employing Privacy Systems;
Problems, Procedures and Tools, W. Koenig, OSRD
4573B, BTL, Oct. 12, 1943. Div. 13-302-M4
SECRET
Speech Privacy Problems, A. D. Fowler, OSRD
5686, Final Report Project 13-106, BTL, Aug. 18,
1945. Div. 13-300-M1
Spectrographs for Field Decoding Work, C. H. G.
Gray, OSRD 3824, Final Report on Project 13.3-86,
BTL, May 31, 1944. Div. 13-302.1-M3
Facsimile Privacy, H. H. Beverage, OSRD 1881,
Final Report Project C-73, RCA Laboratories,
June 7, 1943. Div. 13-303-M1
Abridged Report, OSRD 2005, Oct. 15, 1943.
Div. 13-303-M2
Investigation of Pre-Transmission Facsimile
Privacy Methods, J. V. L. Hogan, OSRD 6346,
Final Report Project 13.3-97, Faximile, Inc., June
30, 1945. Div. 13-303-M3
Development of a Rotor for Cryptographic Use,
Harner Selvidge, OSRD 1607, Final Report Project
C-52, Fournier Institute, May 1, 1943.
Div. 13-304.1-M1
Radio Recording, A. M. Curtis, Final Report
Project C-71, BTL, June 15, 1943. Div. 13-304.2-M1
Control Circuits for the Sound Spectrograph, W.
Koenig, OSRD 4573B, Preliminary Report 27 of
Part II, Final Report Project C-43, BTL, Apr.
29, 1944. Div. 13-302-M4
The Sound Spectrograph, A Time-Frequency-
Intensity Analyzer, W. Koenig, Preliminary Re-
port Project C-43, BTL, Oct. 1, 1943.
Div. 13-302.1-M2
Operating Notes for Spectrograph Model Nos. 2
and 3, R. G. McCurdy, Project C-43, BTL, Jan.
30, 1943. Div. 13-302.1-M1
Notes on Description and Operation of Special
Speech Privacy Decoding Equipment Used at Point
Reyes, California, 0. M. Akey and H. Kahl,
Project C-43, BTL, June 30, 1944. Div. 13-302-M2
Speech Privacy Decoding, OSRD 386, Final Re-
port Project C-32, BTL, Jan. 31, 1942.
Div. 13-302-M1
Interception of Enemy Radiotelephone Cammuni-
cations Employing Privacy Systems; Problems,
Procedures and Tools, W. Koenig, OSRD 4573B,
Preliminary Report 25 of Part II, Final Report
Project C-43, BTL, Oct. 12, 1943. Div. 13-302-M4
Results of Experimental Intercept Work at
Holmdel, New Jersey and Point Reyes, California,
P. W. Blye and L. Y. Lacy, OSRD 4573B, Pre-
liminary Report 2 of Part II, Final Report Project
C-43, May 29, 1942. Div. 13-302-M4
Intercept Work at Point Reyes, California, H.
Kahl, OSRD 4573B, Preliminary Report 23 of
Part II, Final Report Project C-43, BTL, July 26,
1944. Div. 13-302-M4
Memo of Changes in Speech Privacy Units as Re-
leased to the Army by RCA Laboratories, A. V.
Bedford, Project C-54, RCA, Oct. 19, 1944.
Div. 13-301.1-M4
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
OSRD APPOINTEES
DIVISION 13
Chief
C. B. JOLLIFFE (December 1942 to May 1945)
HARADEN PRATT (May 1945 to May 1946)
J. L. ALLISON
C. F. DALZIEL
K. C. BLACK
0. E. BUCKLEY
J. H. DELLINGER
W. L. EVERITT
G. C. Floc
R. H. GEORGE
C. H. G. GRAY
A. HAZELTINE
Section 13.1
Section 13.2
Section 13.3
Section 13.4
Section 13.5
Section 13.6
4
Deputy Chief
K. C. BLACK
Technical Aides
Members
J. F. MCCLEAN
A. F. MURRAY
J. A. HUTCHINSoN
C. M. JANSKY
L. F. JONES
D. G. LITTLE
R. K. POTTER
H. PRATT
C. A. PRIEST
F. M. RYAN
Section Heads
Direction Finding
Radio Propagation Problems
Speech Secrecy
Special Communications Problems
Precipitation Static
Miscellaneous Projects
L. V. BERKNER
H. H. BEVERAGE
Consultants
R. K. POI'TER
L.
J.
R.
C.
D.
F. JONES
H. DELLINGER
K. POTTER
A. PRIEST
. PRATT
G. LITTLE
E. D. BLODGETT
D. G. LITTLE
Interference Reduction Committee
K. C. BLACK
H. D. DooLirrLE
R. G. FLUHARTY
A. HAZELTINE
0. W. TOWNER
SECRET
J. C. R. LICKLIDER
C. T. MORGAN
A. F. MURRAY
S. S. STEVENS
127
nedassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
CONTRACT NUMBERS, CONTRACTORS, AND SUBJECT OF CONTRACTS FOR DIVISION 13
Contract
Number
Name and Address of Contractor
Subject
Refer to
Chapters
NDCrc-125
NDCrc-196
NDCrc-139
OEMsr-230
OEMsr-435
OEMsr-490
OEMsr-542
OEMsr-592
OEM sr-628
OEMsr-782
OEMsr-795
OEMsr-880
OEMsr-837
OEMsr-1110
OEMsr-1202
0 EM sr-1440
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Hazeltine Service Corporation
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Fournier Institute
Lemont, III.
Radio Corporation of America
Camden, N. J.
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Radio Corporation of America
Camden, N. J.
Western Electric Company, Inc.
New York, N. Y.
Faximile, Inc.
New York, N. Y.
Western Electric Company, Inc.
New York, N. Y.
Speech secrecy system.
Continuation of speech secrecy system.
Hazeltine speech secrecy system.
Decoding speech Ves.
Continuation of decoding speech codes.
Improved speech secrecy.
Development of rotor for cryptographic use.
Speech secrecy research.
Telegraphy applied to TDS speech secrecy system.
Code changing attachment for TDS speech privacy
unit.
Frequency-time division speech analyzer.
Radio recording.
Facsimile secrecy.
Spectrographs for field decoding work.
Graphic privacy system.
Speech privacy problems.
2
2
3
4
1, 3, 4
2, 6
6
3, 5, 6
2
2
6
6
5
6
5
128
SECRET
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
SERVICE PROJECT NUMBERS
The projects listed below were transmitted to the Executive
Secretary, NDRC, from the War or Navy Department through
either the War Department Liaison Officer for NDRC or the
Office of Research and Inventions (formerly the Coordinator of
Research and Development), Navy Department.
Service
Project
Number
Subject
Refer to
Chapters
SC-12 Speech secrecy system. 2
SC-12 Continuation of speech secrecy system. 2
SC-12 Hazeltine speech secrecy system. 3
SC-12 Improved speech secrecy. 2, 6
SC-12 Speech secrecy research. 3, 5, 6
SC-12 Code changing attachment for TDS speech secrecy system. 2
SC-12 Frequency-time division speech analyzer. 2
SC-19 Telegraphy applied to TDS speech secrecy system. 2
SC-25 Development of rotor for cryptographic use. 6
SC-28 Decoding speech codes. 4
SC-28 Continuation of decoding speech codes. 1, 3, 4
SC-43 Facsimile secrecy. 6
NS-130 Radio recording. 6
NS-134 Graphic privacy system. 6
NS-349 Speech privacy problems. 5
SECRET
129
neclassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
INDEX
The subject indexes of all STR volumes are combined in a master index printed in a separate volume. For
access to the index volume consult the Army or Navy Agency listed on the reverse of the half-title page.
A2 speech scrambling system, 41
A3 facsimile privacy system, 107
A3 speech scrambling system, 21
A4 phase reversal system, speech
scrambling
cryptographic decoding, 57
noncryptographic decoding, 42
spectrograms, 88
A5 split-phase system, speech
scrambling, 41, 89
"Aided tracking" for interception
of speech privacy systems, 40
Amplitude representation for
spectrographic decoding of
speech, 64-65
Articulation tests for TDS speech
scrambling systems, 21
Audio frequency code-waves, RCA-
Bedford speech privacy sys-
tem, 25
Automatic code changing, 17-18
Automatic decoding of speech, 44-48
frequency band methods, 44
multiplication systems, 46
parallel-automatic method, 46
summary, 47
wobble band method, 45
Automatic trial systems for speech
decoding, 83
B1 facsimile privacy system, 107
B2 band displacement system,
speech scrambling, 44
B2 facsimile privacy system, 107
B3 facsimile privacy system, 107
B3 wobble band displacement sys-
tem, speech scrambling, 40
B4 double modulation system,
speech scrambling, 57
B4 facsimile privacy system, 107
B5 facsimile privacy system, 107
B6 facsimile privacy system, 107
B7 facsimile privacy system, 107
Band displacement speech scram-
bling systems
B2; 44
decoding, 42
Hazeltine, 33-34
spectrograms, 89
superposition, 43
Band splitting speech scrambling
systems
Dl; 41, 57
D2; 43, 57
description, 3-4, 73
Bedford type speech scrambling
systems
see RCA-Bedford speech privacy
system
Bell Telephone Laboratories
D-specification model, bacsimile
privacy system, 115
sound spectrograph, 35
TDS facsimile privacy systems,
107-108
British modulator type 2C speech
scrambling system, 100-101
British two-dimensional speech pri-
vacy system, 101, 103
Cl re-entrant inversion system,
speech scrambling, 48
C2 continuously varied re-entrant
displacement system, speech
scrambling, 89
C2 triple modulation system, speech
scrambling, 57
Channel mixing systems, speech
scrambling
Ll, L2, L3; 59, 89
multiple transmission paths, 11-
12
noncryptographic decoding, 43
Code waves, RCA-Bedford speech
privacy system, 28-31
Code-changing attachment for
portable TDS speech scram-
bling, 22-23
Code-changing method, RCA-Bed-
ford speech privacy system,
29
Coding systems
see Speech privacy systems
Compandor for RCA-Bedford
speech privacy system, 27, 29
Continuously coded TDS systems,
speech scrambling, 17-20
automatic code changing, 17-18
equipment, 19
frequency-band shift system, 20
number of sequences, 20
ten-element system, 18
Continuously varied re-entrant dis-
placement system, speech
scrambling, 88
"Cracking" speech scrambling sys-
tems
SECRET
frequency-TDS, 21
portable TDS, 14
RCA-Bedford, 32
time measurements, 84
Cryptographic decoding of speech,
48-61, 120-122
applications, 57-59
message, 59
oscillographic traces, 54
playback, 59-61
rectification, 56-57
"rotor," 120-122
spectrograms, 48-51
summary, 48
variable-area patterns, 52-54
visual, 54-56
CVS1 (continuously-variable), fac-
simile privacy system, 108,
112
Cyclic speech coding system, 85
D1 band splitting system, speech
scrambling, 41, 57
D2 band splitting system, speech
scrambling, 43, 57
Decoding methods, speech communi-
cation, 35-99, 104
automatic methods, 44-48, 83
cryptographic, 48-61
equipment, 104
evaluation, 84-86
history, 35-36
instantaneous speech patterns, 78
interception, 36-40
noncryptographic, 40-48
partial matching system, 76-78
sound spectrograph, 61-83
unknown signals, 86-89
Delay networks for speech privacy
system, 28-31
Directive antennas for intercepted
signals, 37
Double modulation speech scram-
bling system
automatic decoding, 45-46
B4; 57
spectrogram, 88
Double-sideband radio transmis-
sion, 38
Eastman Kodak Company, pre-
transmission facsimile pri-
vacy system, 112, 117
131
Declassified and Approved For Release 2013/12/11: CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
132
INDEX
Enemy privacy systems, captured
sets, 40
Equalizer unit for RCA-Bedford
speech privacy system, 29
Fl speech scrambling system, de-
layed subbands, 41
F2 TDS system, repeated code,
speech scrambling, 57
F3 TDS system, nonrepeated code,
speech scrambling, 57, 89
F4 speed variations system, speech
scrambling, 45, 58
Facsimile privacy systems, 105-119
see also under name of system
background, 105-106
CVS-1 system, 108, 111
frequency band
method, 106,
methods, 106-117
polarity reversal
108, 110-111
pretransmission, 107,
112, 116-119
RCAL-1 system, 113
TDS system, 106-108, 110, 115
variable speed system, 107, 108,
113, 116
Western Electric
107
Faximile, Inc., facsimile privacy
system, 117
Filters for spectrographs, 66-69
Fixed-code speech scrambling
tems, 100-101
Foreign language
speech decoding, 83
Frequency multiplication
simile privacy system
applications, 113
description, 106
Myopia Mark I; 109-110
nomenclature, 107-108
Frequency substitution
speech? scrambling
band-splitting, 3-4, 33-34, 73
double modulation, 2
single modulation, 1-2
time division multiplex
4-5
triple modulation, 2-3
Frequency-band shift speech scram-
bling systems, 7, 20, 44
Frequency-band transposition
facsimile privacy systems
Al, A2, A3; 107
applications, 113
description, 106
samples, 109
transposition
107, 109, 113
systems, 106,
108, 111-
system (A3),
records
in
sys-
for
fac-
systems,
(TDM),
in
Frequency-time division systems,
speech scrambling, 21-22
G1 tape plus modulation system,
speech scrambling, 58, 89
G2 tape plus modulation system,
speech scrambling, 58
G3 tape plus modulation system,
speech scrambling, 58
G4 tape plus modulation system,
speech scrambling, 58
G5 tape plus modulation ystem,
speech scrambling, 89
G6 tape plus modulation system,
speech scrambling, 89
Gabrilovitch, L. E., speech privacy
systems, 102
German vessel detection by tele-
graph transmitter identifica-
tion, 123
GPM-XI, pretransmission facsimile
privacy system, 119
Graphic copy, scrambling systems
see Facsimile privacy systems
Graphic patterns in spectrographic
speech decoding, 69-71
H1 wave form distortion system,
speech scrambling
automatic decoding, 46
cryptographic decoding, 58-59
spectrograms, 88
H2 wave form distortion system,
speech scrambling, 44, 59
H3 wave form distortion system,
/speech scrambling, 44, 59
Hazeltine band displacement sys-
tem, speech scrambling, 33-
34
High-power sig-nal interception, 36
High-security speech privacy sys-
tems, 32
Inflection effects in diagnosing pri-
vacy systems, 63
Interception of speech privacy sys-
tems, 36-40
decoding devices, 39-40
receiver sets, 37-38
recording methods, 39
signal quality, 36-37
types of radio systems, 36, 38
"Interlace," TDS speech scrambling
system, 6-7
Inversion systems, single modula-
tion speech scrambling, 1,
71, 73
J1 masking system, speech scram-
bling, 59
SECRET
J2 masking system, speech scram-
bling, 44
J3 tone sequence system, speech
scrambling, 41
K1 voeoder system,
bling, 59, 89
K2 vocoder system,
bling, 59, 89
K3 vocoder system,
bling, 59, 89
K4 vocoder system,
bling, 59, 89
speech
speech
speech
speech
scram-
scram-
scram-
scram-
L1 channel mixing system, speech
scrambling, 43, 59
L2 channel mixing system, speech
scrambling, 43, 59
L3 channel mixing system, speech
scrambling, 59, 89
Level compression in spectrographic
decoding of speech, 63-64
Level modulation systems, speech
scrambling, 42, 44
Limiter, speech decoding, 42
Linguaphone, speech decoding, 83
Low-power signal interception, 36
Magnetic tape speech recording
systems
see Time division speech scram-
bling (TDS) system
Masking systems, speech scram-
bling
J1; 59
J2; 44
summary, 9-10, 103
Military strategy, decoding speech,
85-86
Model RCAL-1, privacy unit, 29-31,
113
Modulation systems, speech scram-
bling, 1-3
double, 2
single, 1-2
triple, 2-3
Modulator Type 2C speech r.ecord-
ing, 100-101
Multiplication system (H1) speech
scrambling
automatic decoding, 46
cryptograph decoding, 58-59
spectrograms, 88
Multivibrator for RCA-Bedford
speech privacy system, 28
Musical effects in spectrographic
speech decoding, 68
"Myopia Mark I" for facsimile
privacy system, 107, 109
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
INDEX
133
Networks for code-waves of RCA-
Bedford speech privacy sys-
tem, 28, 31
New Zealand switched-band speech
privacy system, 101-102
Noncryptographic decoding of
speech, 40-48, 83
automatic, 44-48, 83
captured set, 40
compromise methods, 41-44
Nonrepeated code systems, speech
scrambling, 57, 84-85, 89
Nonscrambled speech, Hazeltine
band displacement system,
34
Oscillograms for cryptographic de-
coding of speech, 54
Parallel-automatic speech decoding
method, 46
Peak chopper for speech decoding,
42
Phase varied inverter-distorter
speech secrecy set, 102 :
Phase-reversal speech scrambling
system
cryptographic decoding, 57
noncryptographic decoding, 43
spectrograms, 88
Phonographic recordings for speech
scrambling systems, 103-104
Playback, cryptographic decoding
of speech, 59-61
Polarity reversal (PR) system,
facsimile privacy
description, 106, 108
samples, 110-111
Portable TDS systems speech
scrambling, 13-17/22-23
PR-1 facsimile privacy system, 108
PR-2 facsimile privacy system, 108
PR-3 facsimile privacy system, 108
Pretransmission facsimile privacy
system, 107, 108, 111-112
equipment, 118-119
evaluation, 119
method, 117-118
operation, 118-119
Privacy systems
see Facsimile privacy systems;
Speech privacy systems
"Private" coded facsimile subjects,
105
Radio recordings of telegraph
transmissions, 123
Radio transmission, interception
see Interception of speech pri-
vacy systems
RCA-Bedford speech privacy sys-
tem, 25-33, 103
code waves generated by delay
network, 28, 29-31
code-changing method, 29
compandor, 27
decoding, 32, 103
present status, 32-33
principles, 25
synchronization ?of delay net-
work, 29
wave multiplier, 25
RCAL-1 facsimile privasy system,
113
Receiving sets for code intercep-
tion, 37-38
Recording methods, speech scram-
bling systems, 39, 103
Rectification methods for speech de-
coding, 42, 56-57
Re-entrant inversion system, speech
scrambling, 48
Repeated code system, speech
scrambling, 57
Repeated code waves of RCA-Bed-
ford speech privacy system,
29-31
Rotating commutator for "inter-
lace" speech scrambling sys-
tem, 6
Rotors for cryptography, 120-122
Scanning filters for cryptographic
decoding of speech, 51-52,
66-69
Scrambling systems for speech
privacy
see Speech privacy systems
Secrecy systems
see Facsimile privacy systems;
Speech privacy systems
"Secret" coded facsimile subjects,
105
Self-decoding time division scram-
bling system, 6
Signal quality, interception meth-
ods, 36-37
Single modulation speech scram-
bling systems, 1-2
Sound spectrograms, 87-99
alternate inversion, 91
backwards, 98
channel-mixing, 99
fixed displacement, 91
modulation sidebands, 90
multiplication, 98
re-eiffrant inversion, 92
scrambled speech, 88
simple inversion, 90
SECRET
speed wobble, 97
split band scramble, 93, 94
subbands delayed, 95
TDS combined with split-band
scramble, 96
time and frequency measure-
ments, 88
time division multiplex, 94, 95
two dimensional scramble, 97
wobbled displacement, 92
Sound spectrograph, 61-83
amplitude, 64-65
applications, 66-83
description, 65-66
diagnosis, 88-89
history, 61
improvements, 64
level compression, 63-64
measurements, 87
operation, 62-63
Speech patterns for scrambling
systems, 71-74, 78
Speech privacy systems
see also under name of system
band displacements, 40, 42-44, 89
band-splitting, 3-4, 33-34, 73
British systems, 100-101, 103
channel-mixing, 11-12, 43, 59, 89
continuously coded, 17-20
diagnosis of unknown systems,
86-99
double modulation, 2, 45-46, 57,
89 ,
evaluation, 84-86
Hazeltine band displacement, 33-
34
interception, 36-40
inversion systems, 1, 48, 71, 73
masking, 9-10, 44, 59, 103
modulation systems, 1-3
multiplication systems, 42, 46, 88
phase reversal, 42, 57, 88
portable systems, 13-17, 22-23
RCA-Bedford, 25-33, 103
recording methods, 39, 103
repeated code, 57
single modulation, 1-2
speed variations, 45, 58
split phase, 41, 89
summary list, 47
switched band, 101-102
tape recording, 5-6, 13-24, 52-56,
74-78
time division multiplex (TDM),
4-5
time division scrambling (TDS),
5-6, 13-24, 52-56,34-78
tone sequence, 41
triple modulation, 2-3
two-dimensional, 101, 103
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
134
INDEX
unrepeated code, 57, 84-85, 89
vocoder, 10-11, 45, 54, 59, 89
wave for modification, 8, 58
Speed variations speech scrambling
system, 45, 5/8
Spill-over effects in cryptographic
decoding of speech, 51, 64
Split-band systems, speech scram-
bling
Dl; 41, 57
D2; 43, 57
description, 3-4, '73
Split-phase speech scrambling sys-
tem, 42, 88
Spread-band radio transmission, 38
Stepped displacement speech scram-
bling systems
B2; 45
decoding, 42
Hazeltine, 33-34
spectrograms, 89
superposition, 43
Subcarrier frequency modulation
systems, facsimile privacy,
108
Superposition for speech decoding,
43-44
"Suppressed carrier" radio trans-
mission, 38
Switched band speech privacy sys-
tem, 101-102
Synchronizing blanking circuits for
RCA-Bedford speech privacy
system, 29
Synthetic speech in Vocoder sys-
tems, 10-11
Tandem transmission in facsimile
privacy systems, 116, 117
Tape plus modulation systems,
speech scrambling, 58, 89
Tape recording systems
see Time diviyion speech scram-
bling system (TDS)
TDM (time division multiplex)
speech privacy system, 4-5
TDS facsimile privacy systems
see Time delay system (TDS),
facsimile privacy
TDS speech scrambling system
see Time division speech scram-
bling (TDS) system
Telegraphy transmission in speech
privacy systems, 23-24, 39
Ten-element TDS speech scram-
bling system, 18
Time delay system (TDS), fac-
simile privacy
applications, 113-116
description, 106
nomenclature, 107-108
samples, 110
Time division multiplex (TDM)
system, speech scrambling,
4-5
Time division
speech scrambling
(TDS) systems
code-changing attachment for
portable TDS, 22-23
continuously coded TDS, 17-20
decoding, 74-78
"interlace," 6-7
matching variable ? area pat-
terns, 52-54
portable TDS, 13-17, 22-23
summary, 5-6, 13
telegraphy, 23-24
visual methods, 54-56
Times Telephote Equipment, Inc.,
facsimile privacy methods,
111
Tone sequence system (J3) speech
scrambling, 41
Transposition coding of speech,
120-122
Transposition of frequency bands
in facsimile privacy sys-
tems, 107, 109
Triple modulation speech scram-
bling system, 2-3
"Twin-channel" radio transmission,
38
Two-channel speech privacy system,
2
SECRET
Two-dimensional speech privacy re-
cording system, 7, 100-101,
103
Unknown systems, diagnostic
methods, 86-89
illustrations, 88-89
introduction, 86-87
spectrograms, 87
Unscrambling methods, speech sys-
tems
see Decoding methods, speech
communication
Variable speed (VS) system, fac-
simile privacy
applications, 116-117
description, 107
nomenclature, 108
samples, 110-112
Variable-area patterns for crypto-
graphic decoding of speech,
52-54, 78
Visual methods, cryptographic de-
coding of speech, 54-56, 61
Vocoder speech scrambling sys-
tems, 10-11
automatic decoding, 45
description, 10-11
Ki, K2, K3 and K4 systems, 59
oscillographic traces, 54
spectrograms, 89
Voice scrambling systems
see Speech privacy systems
VS facsimile privacy systems
see Variable speed (VS) sys-
tem, facsimile privacy
Wave form modification systems,
speech scrambling, 8, 58
Wave form traces for decoding
TDS, 76
Wave multiplier for RCA-Bedford
speech privacy system, 25-26
Western Electric Company, A-3
facsimile privacy system, 107
Wobble band displacement system,
speech scrambling, 40, 45-46
Declassified and Approved For Release 2013/12/11 : CIA-RDP10T02279R000100180001-2
..1.4 ?
i..;!!!!-?
Declassified and Approved For Release 2013/12/11: dIA-RDP10T02279R06010.0180001-2 .
4101.121