STUDIES IN INTELLIGENCE [Vol. 12 No. 4, Fall 1968]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010004-8
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
125
Document Creation Date:
December 16, 2016
Document Release Date:
December 26, 2004
Sequence Number:
4
Case Number:
Publication Date:
January 1, 1968
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000300010004-8.pdf | 7.39 MB |
Body:
Approved For Releale 200510 1126 m - 94A000300010004-8 25X1
STUDIES
~n
INTELLIGENCE
FALL 1968
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
$CHIVAL RECORD
R M
_Sr
,ipr
IENCY ARCHIVES, BLDG.
! A-RD T0319 U0010004-8
Approved For Release 2005/01/?% C CIA-RDP78TO3194AO00300010004-8
RET
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
WARNING
This material contains information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Secs. 793 and 794, the transmission or revelation of which
to an unauthorized person is prohibited by law.
GROUP 1
Excluded from automatic
downgrading and
declassification
Approved For Release 2005/01/2 GE&A-RDP78T03194A000300010004-8
Approved For Releasl 2005/01/26 : CIA-RDP78T031*A000300010004-8 25X1
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may
be written on any theoretical, doctrinal, oper-
ational, or historical aspect of intelligence.
The final responsibility for accepting or
rejecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion of the Board, the article
makes a contribution to the literature of in-
telligence.
25X1
I
EDITORIAL BOARD
I OT E. SMITH, Chairman
Additional members of the Board are
drawn from other CIA components.
25X1
SECRET
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Approved For Relea
CONTENTS
Page
Mission to Birch Woods .............. Henry S. Lowenhaupt
The U-2 first spies Soviet atomic sites. SECRET
1
Identifying the Future Threat ....... Herbert C. Rothenberg
From scientific advance to new Soviet weapon system.
SECRET
13
Microtechnology ............. Donald Reiser & Harry Wood
Vanishing bulk and power drain of electronic devices.
SECRET
View from the Hot Shop
23
Averill T. Stewart & Joseph O. Matthews
The CIA Operations Center in the service of evaluative
judgments. SECRET
39
Singapore's People's Association .......... Walter B. Kimball
47
A gimmick linking leaders and grass roots promotes political
stability. OFFICIAL USE
The Vietnamese as Operational Target ...... Titus Leidesdorf
57
Psychological peculiarities for exploitation. SECRET
With Vandenberg as DCI: Part II ........ Arthur B. Darling
73
Attempts at community coordination.
Intelligence in Recent Public Literature
CONFIDENTIAL
Classic Soviet networks. CONFIDENTIAL ................
95
Industrial intelligence and espionage. OFFICIAL USE ....
114
Miscellaneous. OFFICIAL USE ........................
119
25X1
Approved For Release 2005/01/6 CIA-RDP78TO3194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Next 1 Page(s) In Document Exempt
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Approved For Release 2005/01/26: CIA-RDP78T03194A000jg8Rg9004-8
No Foreign Dissem
Targeting the first U-2 coverage
of Soviet nuclear facilities.
MISSION TO BIRCH WOODS
Via Seven Tents and New Siberia
Henry S. Lowenhaupt
I suppose I remember so distinctly working on nuclear targets for
the U-2 missions of late August 1957 because this was my first direct
experience with reconnaissance operations, and first impressions are
lasting. Besides, it .was a striking reminder of my 1944 mission from
a basic training camp in Alabama to a telephone number in Knoxville,
Tennessee, which turned out to be the secret atomic city of Oak
Ridge. Here in 1957 my prime target was a secret atomic city known
as the Post Box, Tomsk, in central Siberia.
There was also at the time an anticipatory feeling of self-vindication.
In 1945 I had been impressed with the accuracy of a wartime estimate
of the output from the famous Joachimsthal uranium mines of Czech-
oslovakia, an estimate based on aerial photographs taken a year apart.
So in 1949, after the first Soviet nuclear test, I had advocated photo-
reconnaissance of the nuclear production sites in the Urals. I actually
persuaded the Air Force member of the joint Atomic Energy Intelli-
gence Committee to submit a formal proposal for flying the Urals
in a B-25 which would take off from Iran and afterwards be ditched
beside an aircraft carrier in the Barents Sea off Novaya Zemlya.
We still have in the files Secretary of State Dean Acheson's reply,
through the DCI to the Chairman of JAEIC, denying as of 30
December 1949 permission to implement the scheme.
U-2 Against the Atom
I was convinced that satisfactory photographic coverage of a U-235
separation plant, or of a plutonium production reactor, would be
worth the proverbial thousand words, giving information "on electric
power consumption, cooling water consumption, plant arrangement
and size, new construction, and the physical details which, when
analyzed, should enable us to make a much better estimate of Soviet
critical material production." i I would have been shocked at the
Briefing of Joint Chiefs of Staff by General Charles P. Cabell, DDCI, MORI/HRP
28 August 1957.
from pg.
01-12
Appr 5 or Release 2005/01/26 : CIA-RDP78T03194A000300016004-8
Approve
Sary-Shagar
Tashkent CyP *~ ?zhan
LeniIbad.
Approved for Releaser 4a CIA-RDP T
r- AFGHANISTAN
1C2 DAL8TX A000300010004-8
KKJ F4E-TS K
NOVOS!BIRSKf, ,8A S I N
Dodonovo
Krasnoyarsk,,
Iglakova . B Ioboroiavo
TOMS~t~ /
Alma-Ata,
c -
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010004-8
Birch Woods SECRET
suggestion that it might take months of steady work by competent
photointerpreters aided by the best procurable consultants to work out
the real intelligence meaning of a picture. Yet this was to be the case.
The Russians, not being able to copy our atomic facilities, had had
to engineer and design their own from scratch. We were thus to
face a real cryptographic problem in trying to interpret the totally
foreign engineering shown in the U-2 photography.
The atomic sites near Tomsk, those to the east near Krasnoyarsk,
and the nuclear weapon proving ground known through seismic
measurements to be near Semipalatinsk had been selected on 27 May
1957 by interagency agreement in the Ad Hoc Requirements Com-
mittee as three prime objectives for flights over central Asia and
Siberia. Other major objectives than the atomic ones included what
is now the Tyura Tam missile test range east of the Aral Sea, the air-
craft industry in Omsk and Novosibirsk, and beyond the latter all of
Stalin's second industrial bastion, the Kuznetsk Basin. It was the
conjunction of all these targets with immediate bearing on weapon
systems that had persuaded first the ARC, and then eventually U-2
Project Director Richard M. Bissel and DCI Allen Dulles to cash in
the blue chips necessary to procure take-off bases along the southern
periphery of the USSR and China.
As an analyst in CIA's Office of Scientific Intelligence, I was there-
fore directed in July 1957 to work up target briefs, by priority, for
all atomic targets in the enormous geographical area of central Asia
and Siberia. The U-2 program was still being kept under extraordinary
security measures, and I did my targeting in the Blue Room, a small
centrally located secure area away from my normal desk. Psycho-
logically, we were prepared to be not only secure but devious: the
Blue Room was in fact painted light green.
The targets thus identified were to be used by the operational
side of the program in planning the actual flights or missions. The
procedure was to plan each specific mission around one or two of the
ARC's highest-priority targets but to cover as many lower-priority
targets as possible along the way. As targeteer, I became involved
in selecting the flight path because the best photography, that from
the vertical angle, covered a band only five miles wide: it was desirable
to orient this band lengthwise over an oblong target and adjust it in
Apprg&c8lor Release 2005/01/26 : CIA-RDP78T03194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
SECRET B,;rch Woods
other respects so as to counteract possible errors in target location
or in navigation.
Semipalatinsk had been so named because seven trading companies
had maintained residencies there when it was an important crossroads
on the caravan trails to China and the fabled cities of Samarkand
and Bukhara to the south. Twenty-odd nuclear tests had occurred
near there in the last eight years, but the exact location of any test
was not known closer than within thirty miles. I had no idea how
big the test area was. Our own atomic test site at Frenchman's Flats
in Nevada, measured against a five-mile-wide camera swath, was
of astronomical size.
I finally asked Doctor Donald Rock of the Air Force Technical Ap-
plications Center (then AFOAT-1) 2 to average for me the seismic
epicenters of the five largest nuclear detonations at Semipalatinsk.
The geographic coordinates for this "centroid" turned out to designate
a spot in the featureless desert some seventy miles due west of Semi-
palatinsk, about one-third of the way to Karaganda. It was south
of the old caravan trail, and the only names on the map in. the vicinity
were those of seasonally dry salt lakes. This was an arbitrary pin-point
for a highest-priority target whose location was so poorly known that
it ought to be represented as a hand-sized blur on a standard aero-
nautical chart -a hardly realistic target in operational terms.
This difficulty in locating the Semipalatinsk nuclear proving ground
pointed up the essence of our dilemma: we needed and wanted U-2
flights in central Asia and Siberia because we knew so little about
what was going on there; yet unless we had precise knowledge of an
activity and where it was located, we would stand little chance of
photographing it. General Philip G. Strong, director of scientific
collection in CIA, who had had much World War II reconnaissance
experience, was on the side of precision in targeting and of detailed
justification for the collection priority given each target. He questioned
the accuracy of maps and suggested that targets be located relative
to major features that could be identified visually rather than by
coordinate systems of longitude and latitude. That we could not do
in this case.
'For the early history of AFOAT-1 see Northrup and Rock's "The Detection
of Joe 1" in Studies X 4, p. 23 ff.
Approved For Release 2005/01/26 : CIA-RDP78T03194A0003BOBfB004-8
Appr v d For Release 2005/01/26 : CIA-RDP78T03194A000300010004-8
ircph Woos SECRET
Nearer Targets
Thus it was with renewed care that I assembled data on other
atomic targets in this area. I reviewed the atomic sites which had
been listed in 1955 for the Genetrix program, in which free balloons
bearing cameras were allowed to drift across the USSR on predeter-
mined paths. Lower-priority targets included the uranium concen-
tration plants of Combine 6 in the Fergana Valley, notably one just
south of Leninabad at Ispisar, one north of Leninabad near Taboshar,
and one a good many miles to the east near Andizhan. These had
already been located as well as possible: a 1947 Jewish refugee who
had driven a bread truck to each of them had been interrogated
exhaustively and then resettled with appreciation in Brazil. Inci-
dentally, there had been a curious problem with the maps he drew:
east of where the Syr Darya river turns north on its way to the Aral Sea
he had swapped north and south, but west of there his maps were
right side up. In several instances his reporting had been confirmed
by returned prisoners of war.
Other uranium concentration plants which belonged to Combine
8 lay east of these toward the Pamir Knot and south of Alma Ata,
but their locations were at best poorly known and targeting was
considered doubtful.
Krasnoyarsk
Ever since we had learned that Novosibirsk, Tomsk, and Krasnoyarsk,
deep in Siberia north and east from Semipalatinsk, were the location
of the second generation of Russian atomic sites fathered by those in
the Urals 3 we had maintained a special watch on these cities and the
countryside nearby. Krasnoyarsk had been made off limits to foreigners
by 1948, and information about the atomic site on the east bank of the
Yenisey river some 35 miles downstream (north) from the city had
been especially hard to come by. The defector Icarus reported in
early 1951 that many trainloads of mining equipment had been sent
there the year before from Wismut, A.G., the vast Russian uranium
mining enterprise in East Germany, so he believed the purpose of the
new enterprise at Krasnoyarsk to be the mining of uranium. By 1952
all administrative centers in the peninsula of land south of the con-
fluence of the Kan and Yenisey rivers and north of the Trans-Siberian
'For the Ural plants see the author's "The Decryption of a Picture" in Studies
XI 3, p. 41 if.
App i Tor Release 2005/01/26 : CIA-RDP78T03194A000300014004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
SECRET Birch Woods
Railroad had disappeared from the annual editions of "Deleniye,"
the published MVD listing of administrative centers in the USSR.
Then a German prisoner of war had been returned to West Germany,
who, despite all the Russian rules and regulations, had actually spent
several years as a construction worker at the Krasnoyarsk atomic site.
He reported hearsay information about many kilometers of tunnels all
lined with concrete. His name for the associated town was Kom-
somolsk na Yenisey. In early 1957 a Genetrix balloon was recovered
from the Aleutian Islands with a number of aerial photographs of
Dodonovo, as the Krasnoyarsk site came to be known after an old
village there. These photographs showed an enormous construction
effort-a new city of apartment houses, laboratories, warehouses, and
machine shops-and a vast mining enterprise. There was every
reason to believe that higher-resolution photography would clarify
the functions of the large, complex, and possibly underground
installation.
The uranium metal plant northeast of Novosibirsk had also first been
identified by the defector Icarus. In 1956 Doctor Nikolaus Riehl and
other German scientists formerly engaged at Elektrostal, near Moscow,
in research on uranium metal manufacture 4 confirmed and updated
Icarus' testimony. Attaches had photographed it from the Trans-
Siberian Railroad in 1952 and 1954 because of its evident size and
importance, and George Monk, now State Department representative
on JAEIC, had identified it by comparing these photographs with
material filed in the old Industrial Register under the name "Stalin
Auto Works," apparently the local cover name for the enterprise. It
could be located within half a mile of permanent map features.
A uranium metal manufacturing facility was basically of second
priority as a U-2 mission objective, but across the Trans-Siberian
Railroad was the Novosibirsk Airframe Plant, an additional reason for
the U-2 to visit this northeast suburb of Novosibirsk.
Post Box, Tomsk
The atomic site near Tomsk was a matter of more concern, though
the amount of information on its function and location was woefully
Approved For Release 2005/01/26: CIA-RDP78T03194A000SBa H004-8
Appr1pygl -op lease 2005/01/26: CIA-RDP78T03194A000?Pe%&004-8
sparse. Furthermore, it was at extreme range so that the aircraft could
not, in fact, spend time hunting for it even though we felt we could
justify such an effort as against a prime target. Our collection effort
against this site had been especially impeded by the 15 January 1952
Soviet order closing Tomsk, Novosibirsk, Omsk, and other specific
areas to foreigners because Tomsk was not accessible, like Novosibirsk,
to attache photography from the Trans-Siberian Railway.
There had been a number of remarks in reporting about something
atomic or about a special post box in connection with Tomsk. These
had led to the location and interrogation of a few prisoners of war
who had at one time or other been in the area before returning to
West Germany in 1954 and of a few ethnic Germans who had been
returned in 1956. By now in 1957, however, the resulting evidence of
a kind one could put one's finger on was all contained in just three
reports and the analysis of a fur hat.
The latest of these reports was from an ethnic German who claimed
to have been employed in Tomsk in 1955 as a blacksmith. He told
his Army interrogator that local inhabitants had facetiously suggested
"Atomsk" would be a better name for the town. He knew of no clearly
atomic installation in particular but had heard of an underground
secret plant and settlement called "Kolonne [Labor Brigade] 5"
located northeast of the Tomsk II railroad station.
Another returned ethnic German told his British interrogator he had
heard of an industrial enterprise engaged "in manufacturing fillings for
atomic weapons locally known as the Post Box." In Tomsk II he had
seen a large building with barred windows on all floors and a. large
sign saying "Information Office, Personnel Department, Post Box."
He knew of two relatively small sites belonging to the enterprise, one
east and the other northeast of Tomsk.
On reinterrogation this man mentioned traveling north from Tomsk
II on a bus belonging to the Post Box when going to visit a friend
of his in a lunatic asylum located on the southern fringe of a prohibited
area. He reported seeing railway trains running into the prohibited
area carrying coal, wood, and building materials. He had also heard
that persons employed there were well paid and received preferential
treatment in the distribution of foodstuffs, etc. He mentioned seeing
at a distance of six to eight kilometers north of Tomsk II three large
chimneys which emitted black smoke.
The interrogator noted that the source had a very poor memory,
seemed to be suffering from some kind of mental disorder, and was
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010004-8
Apprv?or Release 2005/01/26: CIA-RDP78T03194A00h0?0001,0004-8
irc ~'--''oodds
preoccupied with his plans to emigrate to Canada. Clearly, neither
of these two reports tended to inspire confidence in the existence of a
major atomic installation in the Tomsk area, let alone its precise
location.
The story of a returned German prisoner of war who had been em-
ployed in 1949 as a tailor in a small factory northwest of B eloborodovo,
some twelve kilometers north of Tomsk city, seemed much more per-
suasive. Interrogated by the Air Force, he reported that within eight
days in April or May 1949 some 12,000 penal workers passed through
the bathing and delousing facilities of the Beloborodovo penal camp
and were put to work in a secure area fenced off between his factory
and the village of Iglakovo, several kilometers north and west down
the Tom river. The tailor, clearly proud of his professional ability
and reputation, said that many military officers of the construction
staff in charge of this project came to his tailor shop to get their uni-
forms fitted properly.
This military construction outfit had arrived, complete with families,
from Tallin where they had just completed another large job. In charge
was a Soviet general who had arrived in April with his staff. Interest-
ingly, from the point of view of MVD responsibility for nuclear fa-
cilities, the guard force was of a different subordination and neither
lived nor mingled with the construction staff officers. The tailor's
Russian supervisor had told him that the fenced-off area was to be
an atomic energy plant.
In an application of environmental sampling, CIA scientific officer
John R. Craig had obtained in the summer of 1956 a fur hat from
one of the ethnic Germans who had recently lived in Tomsk. Its
analysis, done by AFTAC with the aid of AEC laboratories, was at
last conclusive: its exterior surface contained 50 parts per billion of
uranium that was slightly, but definitely, enriched in the U -235 isotope.
Since no U-236 was detectable, the uranium was not from fall-out, nor
had it been through a reactor. Additional analyses fo.r plutonium,
radio-iodine, and separated lithium isotopes were all negative.
The U-235 enrichment was evidence of U-235 separation in the
Tomsk area. The fabrication of nuclear warhead components was an
alternative possibility, but the size of this atomic operation seemed
much too great for that. The evidence was against its being a reactor
with associated chemical plant or a lithium isotope separator. I made
my target a U-235 separation plant and centered it on the spot where
Appived For Release 2005/01/26: CIA-RDP78T03194A000%%B 004-8
Appraved FooroRdeelease 2005/01/26: CIA-RDP78T03194A000 W04
-8
the German tailor had seen 12,000 prisoners go to work. The die was
cast.
Luck at the Proving Ground
In late August 1957 the missions were flown-rapidly to minimize
possible counteraction, and many of them to cover as much useful area
as possible. Here we cannot review all the results but will cite some
of the outstanding ones.
One flight was planned around Stalinsk in the Kuznetsk Bassin and
Alma Ata in the Kirgiz SSR as prime targets. In between, the Semi-
palatinsk proving ground was a prime target, but confidence in its
location was so low that the cities of Semipalatinsk and Karaganda
were made way-stations and the flight path between them adjusted
to hit the latitude and longitude of my seismic centroid. Mention
of the proving ground was dropped from the flight plan for security
reasons ("Why give away knowledge if you don't have to?"). I doubt
that anyone thought seriously about the danger of flying into a nuclear
test.
The coordinates turned out to be good. The U-2 passed directly
over the proving ground on 22 August 1957, and the pilot got a. thrill.
He had many times flown over our Frenchman's Flats, and he recog-
nized what he saw. Moreover, he saw that the shot-zone had been
cleared and they were ready to fire.
It was actually four hours later that Joe 36 was detonated; it was
airdropped and went half a megaton. The pilot had photographed
it and its carrier aircraft on the ground when he had flown over the
Semipalatinsk airfield and associated nuclear weapon assembly facility.
The nuclear weapon "cab" he apprehensively spotted on the shot-
tower at the proving ground was for a low-yield device that was not
to be detonated until 13 September.
Other Findings
The same mission photographed a well-planned, modern community
of 20,000 people not previously known of on the north shore of Lake
Balkhash. This turned out to be the headquarters of the Sary Shagan
antimissile test range, a real find. It also covered the uranium mill
at Kadzhi-Say near the west end (not the east end as I had thought)
of Lake Issyk Ku15 south of Alma Ata, proving that the Russians had
"`Warm Water," so named because its salinity kept it from freezing.
Apprg~Ncor Release 2005/01/26: CIA-RDP78T03194A000300010%04-8
App g~$c f or Release 2005/01/26 : CIA-RDP78TO31948A0003~00010004-8
large modem uranium mills. The uranium mines of Bystrovka were
covered but not found in the film for another year.
The flight that was to cover the Dodonovo mining site near Kras-
noyarsk failed with respect to this target because of heavy cloud cover,
an all too familiar occurrence in the reconnaissance business.
The uranium metal plant at Novosibirsk turned out to be quite a
large installation, including what is probably a large litFium isotope
separation plant then under construction between its raw uranium
ore facility and its thermal power plant.
The outstanding target, the Tomsk atomic site, was covered on 21
August in clear vertical photography. The tailor's location for it
proved correct. Allen Dulles is said to have exclaimed jubilantly,
when he heard the news, "You mean you really did know that some-
thing atomic was going on 'way out there in the wilds of Siberial"
As summarized in the mission report, the installation
covers an irregular shaped area of about 40 square miles on the right
bank of the Tom River. No single atomic energy complex in the western
world includes the range of processes taking place here. The villages of
Iglakovo and Beloborodovo are encompassed in the housing and adminis-
tration area along the river. On the west edge of the area, a large thermal
power plant with an estimated capacity of 400 megawatts is undergoing
further expansion. Further power is provided by Gres II in Tomsk and by
tie-ins to the Kuzbas Grid. East of this plant is located the feed and proc-
essing section and gaseous diffusion plants. One gaseous diffusion building
is uncompleted. On the east edge is located the reactor area. One of the
two reactors appears to be in the final stage of construction. A maintenance
and construction area is just north of these areas. On the northeast edge,
a plutonium chemical separation area is uncompleted. A mud lake dump
area is on the north edge of the complex outside of the fence which encom-
passes the whole installation. It is rail served by a spur line from Tomsk.
Actually, one reactor was already in operation, and two more were
under construction. These latter would eventually turn out by-product
electric power. The gaseous diffusion U-235 separation facility, with
its four operating buildings and a fifth under construction, was about
one-sixth the size of that at Oak Ridge, which drew about 2000 mega-
watts of electric power.
The photograph could not tell us, of course, for the purpose of pro-
duction estimates just how long each installation had been operating
or would begin, nor what the Russians called them. Fortunately, we
ApprlMved For Release 2005/01/26: CIA-RDP78T03194A000kb004-8
Approved ~ForrRelease 2005/01/26 : CIA-RDP78TO3194A000a000.t 004-8
SECRET 11
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300016004-8
Apprfor Release 2005/01/26: CIA-RDP78T03194A000 00010004-8
irch 'oods
were able in the spring of 1958 to talk to a defector who had been
a soldier in a military construction brigade working there from. July
1955 to February 1956. He solved many of our time schedule prob-
lems and supplied names and identities. The general address of the
whole installation was Post Box 5, Tomsk. The new city was named
Berezki, Birch Woods, and the birch forest was still preserved around
the city then, for the Russians love such forests. Beloborodovo had
apparently been expanded to become the construction workers' town
of Chekist (Tomsk 19), presumably in honor of their connection with
the MVD, and Iglakovo had become Kuzminka (Tomsk 17). The
man in charge was Major General Tzarevskiy, who had built the steel
town of Nizhniy Tagil in the Urals in the 1930's.
This was the important atomic installation that now took shape
out of mere indications and the vague rumors given substance by a fur
hat and location by a tailor.
12
oved For Release 2005/01/26 : CIA-RDP78T03194A006366Wi0004-8
Appr
Approved For Release 2005/01/26: CIA-RDP78T03194A0003 0 1 004-8
No Foreign Dissem
Patterns of basic research as indicators
of possible new enemy weapon systems.
IDENTIFYING THE FUTURE THREAT
Herbert C. Rothenberg
Although threats to the position or security of the United States
include all conditions disruptive of world peace, such as political
instability, hunger, and disease, we shall be concerned here only
with threats of a predominantly military nature which derive from
advances in the physical sciences and engineering, and we shall
analyze the problem of projecting such threats from the research
done to achieve the advances. Experience of the recent past with
complex modern weapon systems has shown that in general a period
of 10 to 15 years is required to bring a new system from the research
stage to utilization. This is then the outer limit in time of such
projection. At the near end, minor improvements which can be
effected in periods of 5 years or less can generally be predicted by
fairly straightforward extrapolation from current capabilities. The
critical period in our anticipation of new enemy weapon systems
therefore lies from 5 to 15 years ahead.
In order to be useful our projections must meet other criteria be-
sides that of the future time they span. The first and foremost
requirement is credibility: our data base and rationale must be sound
and open to independent verification. Another important require-
ment is for sufficient detail and specificity to meet the operational
needs of the consumer. At the highest levels of policy, details on
how the projected weapon system may operate are not so important
as its general characteristics and capabilities and a fairly precise time
scale. At a somewhat lower level of management, more detail is
required in order to make decisions concerning the allocation of
intelligence resources to confirm the threat and development re-
sources to counter it. At the research and development level, finally,
even greater detail is required to enable our scientists and engineers
to devise specific countermeasures.
Perhaps the most difficult constraint is the need to work with the
kinds of information that are obtainable. The availability of in-
formation during the development of a weapon system follows a
MORI/HRP
Approved-IRFCor Release 2005/01/26: CIA-RDP78T03194A000300040004-8 from pg.
13-21
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
SECRET The Future Threat
"bathtub" curve with time: during the early phases publication of
basic research in the open literature is quite common; then as the
applicability of this work to the weapon system becomes more
immediate, the publication rate drops until information is almost
nonexistent; finally, when the test and evaluation stage is reached,
information can again be obtained through observation and techni-
cal collection. By this latter stage, of course, the time available for
taking effective counteraction is short. It is in the early research
phase, when open publication is still permitted and when there are
still 10 to 15 years left in which to take counteraction, that an
accurate prediction of the resulting system is both vitally important
and extremely difficult.
An obvious approach to such prediction is by induction or syn-
thesis: one examines current R&D activities, identifies advances they
are likely to lead to in basic science and technology, and then
attempts to build up from these advances successively higher levels
of development leading to new weapons. In this way one goes from
new phenomena or properties of materials to new devices, compo-
nents, subsystems, and finally a complete new weapon system. This
is a logical and necessary method for the projection of future threats.
By itself, however, it is an extremely difficult one. While it may
be possible to guess at advances in the basic sciences that will be
made within a reasonable time ahead-say the next: 5 years-
the way these advances could be utilized in the construction of new
weapon systems is a matter of much greater difficulty. Each basic ad-
vance can proliferate into many different applications, and to identify
the most likely ones demands both knowledge of a vas: number of
applied scientific and technological fields and a great imagination
and inventiveness. This is not to say that the approach should be
discarded; the weapon systems that may emerge from new scientific
advances are precisely the ones most likely to surprise us. It re-
quires, however, that we learn how to handle problems having such
uncertainty in data and so many different possible directions of
development. Both the mathematical techniques and the intelligence
sources needed will have to have considerable more study than has
thus far been applied to them.
The second possible method of attack is the deductive. It proceeds
from the postulation of possible or desirable objectives, in the eyes
Apprldved For Release 2005/01/26: CIA-RDP78T03194A00T004-8
ApprofrldFFu?urReifaesset 2005/01/26 : CIA-RDP78TO3194A0003?~~1~~Q O4-8
of the enemy, to the weapon systems, subsystems, components, devices,
and basic R&D required to reach those objectives. This approach
has the advantage that once a potential system has been identified the
determination of its pyramid of required supporting activities is a
more easily soluble problem than the reverse. Problems of this na-
ture have been attacked with some success, notably for purposes of
industrial planning. The procedure requires that at each descending
level of complexity decisions be made as to the appropriateness of
each of the possible means of building up to that level. When there
are many different levels of complexity, as in a modern weapon system,
the number of decisions and appropriateness factors becomes exceed-
ingly large. They are manageable, however, by modem mathematical
techniques, and in principle this procedure can be used to identify
and label all the scientific and technological activities that would
be required to carry out the whole development program.
Since the number of potential threats that could be postulated
is very large, it is desirable to assign priorities among them in order
to concentrate analysis on the most likely. This can be done on
the basis of probable mission requirements as seen by the government
of the country in question, say the USSR. Most broadly, one must
determine first what the Soviet leaders believe the world locks like
now and will look like 10 to 20 years in the future, then project
missions which they might consider required to further their po-
litical, ideological, social, economic, and military objectives, then
derive systems for the accomplishment of these missions, including
weapon systems for military missions. This process provides a set
of reasonable criteria for an initial assignment of priorities. It does
not constitute a means of making final judgments as to the probability
that a threat will actually be developed.
An alternative means of identifying potential threats for deductive
purposes is to determine what the military posture and capabilities
of the United States will be in the period under consideration. One
may then propose that any Soviet system, defensive or offensive, ca-
pable of degrading our planned military capabilities would con-
stitute a threat. The assignment of priorities among the systems
so identified can now proceed on the basis of a priori probability or,
as above, according to how they appear to fit in with Soviet philosophy
or needs.
SECRET is
Approved For Release 2005/01/26: CIA-RDP78TO3194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78T. 3194A000. 00010004-8
SECRET he Future Threat
Problems of Induction
Let us return for a more detailed discussion and comparison of the
two proposed methods. In the inductive approach the starting point
was a large number of scientific and technological advances postu-
lated to have arisen out of essentially undirected research. At least
it is assumed that the reasons for engaging in this research are ir-
relevant to any weapon system that might.be based on the advances.
Addressing oneself to these advances with ingenuity, inventiveness,
and a broad familiarity with the state of the art, one attempts to
apply them through various levels of increasing complexity to create
a new weapon system. Four such levels can be distinguished: crea-
tion of new devices or materials capable of performing either new
functions or old ones significantly better; the combination of these
devices or materials into components which perform more complex
functions; the assembling of such components into subsystems, each
of which contributes some major independent activity to the overall
performance of the projected weapon system; finally this system itself,
performing the mission assigned to it.
Since we are presupposing that the initial scientific and technological
advances were made without the motivation of specific projected ap-
plications, there is no certain way of deciding in which of the many
possible ways they might actually be applied to create new devices.
Clearly, even inventing the various possible devices on the basis of
a scientific advance which has not yet occurred is a very difficult
step. Further, each of these possible devices might be used in
many different combinations with other new or old devices to yield
components with advanced or considerably different capabilities than
previously available. And these components, again, could be as-
sembled in various ways into subsystems with different capabilities.
The characteristics of the ultimate system can then vary enormously,
depending on the choices made all along this complex path.
There are various ways to try to thread this maze. One could
give each alternative an equal probability and use statistical pro-
cedures such as the "random walk" or "Monte Carlo" methods which
have proved useful in similar problems. Or one could use something
like the PERT technique which has been successfully applied to
systems development and management.' These approaches are being
'The Program Evaluation and Review Technique, developed for the Polaris
missile program, performs a probabilistic analysis on uncertain input data and
time relationships and calculates the probabilities for time or cos: factors in a
complete project.
AppF6ved For Release 2005/01/26: CIA-RDP78T03194A006,W(T0004-8
Appr OLFt9feRW ,e 2005/01/26: CIA-RDP78T03194A000?p@ft9004-8
examined, but it appears that a major simplification of the problem
would result from an initial exercise of judgment in assigning proba-
bility weightings to the various alternatives at each level in the
hierarchy.
Despite these major difficulties with the inductive approach, it can
provide one with a view of totally new weapon systems that might
arise from scientific and technological advances made during the
next several years-threats of which the present-day state of science
and technology is not an adequate base for prediction. The product
of the inductive approach would be a set of predictions of develop-
mental activities based on the probable uses of the postulated scien-
tific advances. A number of different templates of such developmen-
tal activities would be produced, and actual activities subsequently
observed would be compared with these templates in order to de-
termine which of the several possible paths through the systems de-
velopment maze the USSR had chosen.
We have passed rather casually over the matter of identifying
the scientific and technological advances likely to occur in the next
few years. Certainly precise identification of the details of an advance
would presuppose sufficient knowledge to effect the advance immedi-
ately, something of a self-contradiction. It appears, however, that
the general nature of the advances in any field of science can prob-
ably be foreseen through the use of such criteria as the current ac-
tivity in the field, the need for a solution to particular problems,
the absence of any fundamental laws prohibiting an advance, and
the like. Consultation with scientists and engineers active in the
various fields probably constitutes the best method of identifying the
likely advances. Several groups concerned with technological. fore-
casting have engaged in such consultations and manipulated the results
in various ways trying to achieve some degree of unanimity among the
expert consultants.
While this approach is the most promising one for the prediction
of scientific/technological advances, there is one major pitfall that must
be taken into account in using as one of the criteria for an area of
probable advance the level of activity in that area. Since scientific
research is largely supported by government funds, decisions by gov-
ernment administrators determine to a large extent the level of re-
search activity in any area; and the decisions of these administrators
are frequently weighted heavily toward areas considered important
to particular objectives rather than having intrinsic importance in
Approved For Release 2005/01/26 :CIA-RDP78T03194A000300010004-8
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010004-8
SECRET The Future Threat
the scientific field. The inductive approach is thus contaminated by
a priori decisions which must be analyzed deductively.
Problerw of Deduction
In contrast to the inductive approach which works its way up from
the simplest elements to the full complex system, the deductive ap-
proach requires the postulation of the full-blown weapon system and
then attempts to work down to the individual advances in science
or technology needed to achieve it. Although it is in principle pos-
sible to start with a list of all conceivable weapon systems and
analyze each of these into the required subassemblies and elementary
advances, this would require an enormous expenditure of manpower
and time. We pointed out above how the list can be narrowed by
giving first consideration to systems designed to perform various
alternative missions contributing to the achievement of Soviet goals.
Each of these systems can then be analyzed into progressively simpler
component levels until the elementary R&D requirements are iden-
tified.
At each level in this procedural sequence the various alternatives
must be examined and ranked in terms of desirability, feasibility, cost,
etc. In other words, a series of criteria for selection among the
alternatives must be established. One thus arrives at a matrix of al-
ternatives versus criteria for each of the levels. The over-all pro-
cedure, commonly and understandably referred to as a "decision tree,"
is fairly widely used for developmental planning. In adapting it
for use in the intelligence field, however, there are a number of prob-
lems to be solved.
The first problem is that the intelligence user is not planning a
development program for himself but attempting to determine what
the Soviets have done. Hence it becomes necessary for :him to think
at all times like a Soviet planner. This requires that the historical
and cultural backgrounds of the Soviet planners be incorporated into
the decision matrix; they will show up particularly in the criteria used
for evaluation.
A second problem is to determine the extent to which such a
logical and carefully worked out decision process is applicable to So-
viet planning. The primary reason for using the procedure in plan-
ning is that when the number of factors entering into a decision
becomes larger than 25 to 50 it is almost impossible for one individual
to make a knowledgeable decision. Since a major weapon system
Appd&ved For Release 2005/01/26: CIA-RDP78T03194A00( E IT0004-8
Approved For R lease 2005/01/26: CIA-RDP78T03194A000g~1J Q Q004-8
The Future Threat
contains some millions of such factors, knowledgeable decisions about
it are impossible unless assistance of some sort is provided. The de-
cision tree provides this assistance by breaking down the complex
problem into a number of decisions each small enough to be made
knowledgeably, keeping account of all such decisions, factoring in
their relative weight, and summing them all up. It is clear, however,
that many major decisions are not made in this country in this way,
and we have no real evidence that the Soviets make their major
decisions in such a manner. If they do not, then we must be pre-
pared for the decisions to show characteristics of illogic by the stand-
ards of the decision tree process. This is a problem not fully encom-
passed by the phrase, "Thinking like a Soviet."
Pattern Recognition
Assuming for the moment that these problems can be solved, our
analysis will have provided us with a list of R&D areas that need to
be emphasized in order to achieve a given weapon system. It will
also have told us the intensity of effort required in each area rela-
tive to other areas, so that we have a sort of spectrum or template
of needed R&D that will vary with time. This is the indicator which
the analyst will then seek to identify in the all-source information
available on current Soviet activities. The template might consist of
a single unique area of R&D which would be a dead giveaway;
alternatively it might be the over-all shape of the spectrum and its
time-dependence.
As long as only one weapon system is being considered, it might
not be especially difficult to identify the corresponding R&D pattern
in the available information. If two or more systems are concur-
rently under development, each will have generated requirements for
R&D and the spectra will then be superimposed. If these spectra
were totally independent of one another their identification, though
considerably more difficult than that of a single system, would still
be amenable to fairly straightforward procedures, especially since
the time element provides a useful filter. A complication is intro-
duced, however, by the "commonality" factor: if systems x and y both
require R&D in a certain area, it is reasonable to assume that the
total effort applied will be less than the sum of the two requirements,
allowing for a measure of efficiency in the combination. It therefore
becomes necessary to estimate the extent to which the R&D require-
ApprNetiFor Release 2005/01/26: CIA-RDP78TO3194A00030001V004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
SECRET The Future Threat
ments for any system are modified by the codevelopment of other
systems with similar needs.
Having predicted through this process the pattern of R&D needed
for the several high-priority weapon systems which it is estimated the
Soviets might logically wish to develop, the analyst will. look at the
information on their current activities and compare it with his pre-
dictions. This process, analogous to what is usually called "pattern
recognition," requires that the available information first be corrected
for various disturbances. First there is the background "noise" of
R&D that would be in process regardless of the needs of any par-
ticular system, the work being done for pure scientific o:r technologi-
cal purposes. Second, there may be deliberate distortion, as by sup-
pression through classification, although it is hoped that the early
research phases will not suffer significantly from suppression.
The comparison of predicted pattern with actuality then proceeds
and yields an estimate with the following kind of wording:
There is a q percent probability that the Soviets have made the decision
to develop weapon system x which will have such and such characteristics
and capability and could be completed by the year blank.
Note that this estimate addresses only the decision to develop and
does not attempt to wrestle with the decision to deploy or utilize.
Just as the inductive approach could not be totally stripped of
deductive elements, so is the converse true. In working our way
down a decision tree from the highest levels of national goals and
policy through missions, weapon systems, etc., to the required R&D,
we have thus far ignored any effect that research carried out for one
system may have on another, unrelated system. Yet it is clear that
scientific advances, no matter how generated or for what purpose,
may significantly affect any system. In other words, any scientific
advance acquires a life and influence of its own and can make pos-
sible new and different systems and capabilities which can be iden-
tified only by the application of inductive logic. At all times, then,
these two methodologies must be carefully examined for their inter-
relationships and the effect each can have on the other.
A question frequently asked with respect to prediction is "How
about the breakthrough?" The question points to a vulnerability in
all prediction but involves an inherent contradiction. If a break-
through is a major scientific achievement leading to totally new con-
cepts which could not have been anticipated, it is unpredictable by
definition and so cannot be factored into our projections in advance.
App ved For Release 2005/01/26 : CIA-RDP78TO3194AO06T0004-8
App ove~d For release 2005/01/26: CIA-RDP78T03194A00%ftJO004-8
e u for reg.
All one can hope to do is maintain a high state of awareness of ac-
tivities in all scientific fields so that immediately upon the occurrence
of such a breakthrough, or rather its recognition, steps can be taken
to evaluate and factor in its influence upon our entire threat analysis,
using the approaches which have been described above.
Over the past decade and more, various attempts have been made
to provide credible estimates of long-range threats, but without any
consistent success. Within the past year a formal long-term attack
on the problem has been mounted in CIA's scientific intelligence or-
ganization. Believing that a major impediment in the past has been
the failure to develop a sound methodology before trying to come
up with a quick answer, we have concentrated our principal efforts
thus far on method. The foregoing discussion reviewing the kinds
of approach that have been considered describes in particular, with
some generality, the deductive technique, the one that has been
selected for initial application. In spite of its acknowledged difficul-
ties and limitations, this method is believed to offer the greatest promise
of any thus far found. It is hoped that the difficulties can be over-
come although it is not yet certain just how.
During the methodological study support has been sought and
obtained from within the intelligence community and from external
sources. As time goes on and the methodology is refined to a point
where there is some confidence in its validity, the next step will be
to begin to apply it and produce specific projections. For this it will
be necessary to draw on the combined scientific and engineering
knowledge of the government and the industrial and academic worlds.
Large numbers of people will have to be consulted and vast amounts
of information and open literature screened and evaluated. Suitable
formats, computer programs, and data-handling capabilities will have
to be developed. Steps in these directions are already being taken.
It is hoped that such a program may one day provide U.S. planners
with credible predictions on the basis of which they can make maxi-
mum use of intelligence community findings to reach the decisions
necessary for the security of the nation.
Approved For Release 2005/01/26 : CIA-RDP78T03194A0003000'10004-8
Approved For Release 2005/01/26: CIA-RDP78T03194A00gJK%1.0004-8
No Foreign Dissem
Intelligence needs impel giant advances
in micropowered microelectronic systems.
MICROTECHNOLOGY
Donald Reiser
and
Harry Wood
It can be said that in general ideal intelligence collection systems
perform best when placed as close to the target as possible. This
certainly was the principle adopted by the ancients in their liberal use
of harlots as informers. But in the absence of a desire on the part
of the target to have it in close proximity, the collection system needs
a completely different set of qualifications. To list but a few of the
more obvious, it must operate in a hostile environment, be as undetect-
able as possible, have an extremely long life, and provide reliable,
high-quality information. These general requirements apply to audio,
video, optical, and electronic intelligence gathering systems. A com-
mon need among all such systems is for minimum size and weight.
And the satisfaction of this need often entails a requirement for micro-
power as well.
Micropower, as the term implies, is the operation of equipment with
greatly reduced power drain.' Minimizing power needs vastly sim-
plifies the size and weight problem by eliminating bulky power supply
components. It is also possible to turn the coin over and say that for
a given power supply a greatly enhanced capability and reliability can
be obtained from micropower operation; more functions can be per-
formed and redundancy provided by the same amount of energy.
Thus micropower operation will improve any system, whether airborne,
animal- or man-borne, or permanently installed, whether the power
source is a battery, a generator, or a solar cell.
Intelligence Initiative
In mid-1965 the authors made a survey of eighteen top U.S. micro-
electronic firms to determine the current status of micropower tech-
nology. The results were of sufficient interest to warrant a staff paper
on micropower and microelectronics in handbook form. The cover
'The prefix micro is appropriate both in its general sense of "very small" and
in its precise scientific usage as one of the series micro=a millionth, nano=a
thousandth of a millionth, and pico=a millionth of a millionth. Some have sug- MORI/H RP
from pg.
23-38
Appr%e ~or Release 2005/01/26 : CIA-RDP78T03194A0003000 004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
SECRET Microtechnology
MICROPONIER
ELECTRONICS
1965 1966 1967 1968 1969 1970
YEAR
SECRET
Figure 1.
Projected power drain of
VHF superheterodyne receiver
Appraded For Release 2005/01/26 : CIA-RDP78T03194A000004-8
AppR1vcg0dtfc%rn?Spse 2005/01/26 : CIA-RDP78T03194A000 ARdf004-8
of that handbook is reproduced in Figure 1. It shows the power
drain in milliwatts of a VHF superheterodyne receiver projected from
1965 to a date in 1970. The rapidly falling curve was based on esti-
mates of the improvement that could be made in industrial technology
over this span of time if the effort received sufficient emphasis. Up
to 1968 it indicated a reduction in the power required for this rep-
resentative complex receiver from as much as 50 mw to as little as
0.5 mw, two orders of magnitude. It is extremely gratifying to be able
to state that this. is in fact the nature of the progress that has been made.
On the basis of the 1965 findings CIA approached the Advanced
Research Projects Agency with a proposal to sponsor accelerated micro-
power development, and ARPA agreed to divert substantial funding
to the program. An arrangement was established with three selected
contractors under which the government would contribute fifty per-
cent of the costs. Calculations at that time showed that power effi-
ciency could theoretically be improved by seven or eight orders of
magnitude, while only three to five were necessary for the results
desired in many advanced intelligence devices. Improvement by
five orders of magnitude would permit important systems to operate
on ambient power, that is on the light, heat, radiation at radio fre-
quencies, etc. available in the environment.
One of the keys to microtechnology is the practice of building elec-
tronic devices and circuits with thin deposits or diffusions of conduct-
ing or semiconducting material on the surface of wafers, but progress
in minimizing the size of these requires a corresponding maximizing
of precision in the fabrication. We shall not treat here the details
of improvements in the industrial processes-photo-etching, controlled
deposition, surface cleanliness control, etc.-that are being achieved.
Broadly, the requirement is for advances in the following fields of
solid-state technology:
Fabrication of very small active devices (notably transistors)
through improved topography, masking, etc.
Low-parasitic isolation and interconnection (the elimination of un-
wanted by-product frequencies in the circuits)
Surface characteristics
Structure control
Ultimately, development of new materials.
Micro Transistors
The field of microelectronics was born with the advent of the
transistor in the early 1950's. Operating voltages dropped, the size of
devices became significantly smaller, and there was motivation to re-
duce the over-all size of most passive electronic components also.
ApprovCe VIor Release 2005/01/26 : CIA-RDP78TO3194A000300030004-8
App g For Release 2005/01/26 :CIA-RDP78T03M9cr cR30p0g1y 004-8
26
ved For Release 2005/01/26 : CIA-RDP78T03194A00W0004-8
Appro
Apps Iyp cgASVse 2005/01/26 : CIA-RDP78T03194A000A 8004-8
tartu~~; with very modest beginnings by researchers at 13(11 Labs,
transistor technology progressed from the crude audio-fre quen y de-
vices of that era to the high-frequency transistors of the early D's.
Along with this growth in transistor technology, an industric com-
piex based on a concept of ,ail-solid-state electronics came into Wing.
A I 'mi'ner of electronic components were redesigned, the ne c ? liffer-
ing radically from the old primarily in size. See Figure 2. y,, mber
/I .,ire (20 thousandths of an inch in diameter) gave war ti one
,(!if ine alization (a metal layer one thousandth of an inch tlri, ) for
nterconnection het sccn devices. One no longer manipulates reuits
rv hand but packaged then complete in containers such as t i "flat
pack" and the "TO-18 can." Figure 3 illustrates such pacL=tc,ng.
iqure 3. Various packages each holding a complete electronic: circni Flat
packs are at upper left, the TO-18 at upper right.
his new technology had immediate applications in intellgence;
izc reduction obviously satisfied. a pressing need to make survs Ilance
rlcvii:~es much more unobtrusive.. As solid-state, technology 1>0z,vided
circuit Junctions which could be packaged in increasingly high ~Icnsity
microminiature form, the projection of a million components pi cubic
inch was not out of the question from a size point of view But if
cea.ch oiF these components used a milliwatt of power there vvould be
(I ,jp:oed a. kilowatt of heat in that same cubic inch--a :iiiation
Jaia(lcsirablc to say the lead. Heat dissipation per unit vohaurc was
what limited the useful application of microminiaturizatio't Thus
the development of microelectronics led directly to that et micro-
SEC
Approvedor Release 2005/01/26: CIA-RDP78T03194A000300010004-8
Apprr for Release 2005/01/26: CIA-RDP78T03194A00030g010004-8
~cro ec no ogy
Figure 4. Early measurement shows micropower transistor performing as
well at less than 100 nanoamperes as its commercial counterpart at about
12 milliamps.
power-or, to group the two together under a single designation, to
microtechnology.
The development of micropower systems was approached by work-
ing first on their basic components, above all the transistors. Figure
4, which appeared in the orginal micropower handbook, foreshadowed
the drop in power consumption that might be achieved in advanced
transistors. These early results were obtained only at very low fre-
z 100
M
r-7-C i1L
SMT 807
2N3493
Figure 5. Performance of micropower transistor at 100 microamperes equals
that of commercial counterpart at 2,milliamps.
Approved For Release 2005/01/26 : CIA-RDP78T03194A00636Bf10004-8
ApprQVed Fort Re~Iease 2005/01/26 : CIA-RDP78TO3194A000300010004-8
icror'ec no o,gy SECRET
Figure 6. Micro-T packages compared with TO-18 can.
I )ISP7.ACEMENT VOLUME
(cu. in.)
Excluding Including
leads leads
Micro- I' Package ...... .00030 .00033
'CO-18 package ....... _ .0058 .0063
Ratio: '1'0-18 to Micro-1, 19:1 19:1.
PLAN AREA
(Sq. ill.)
Excluding Including
leads Icxds
.0057 .a 107
.044 .044
8:1 4 I
quency, but constant development efforts over the past two years have
now produced a high-performance high-frequency micropower tran-
sistor. Figure 5 shows its gain-bandwidth product-a measure of per-
formance-versus bias current (a function of power) compared with
that of a commercially available counterpart. The special micropower
device:; are already available in quantity to the intelligence community.
T110 reduction in operating power and increase in frequency brought
a further reduction in size. Figure 6 shows a half dozen of the
Micro-T packages surrounding a TO-18 can. The reduction in size
and power is not limited to a particular type of transistor but applies
Appr~va1or Release 2005/01/26: CIA-RDP78TO3194A0003000 O04-8
App @Lipg1For Release 2005/01/26: CIA-RDP78T0N9j&gpRR9%%004-8
in general to an entire family. Four complementary devices suitable
for both digital and analog applications. are presently available.
Transistors, though the key active elements, are not the whole story,
and progress with them led to further, and continuing, developmental
work in circuit design and fabrication. Circuits of progressively in-
creasing complexity were chosen to challenge the developing tech-
nology. Results in this area have also been quite dramatic.
M
N
VO= -LOV
Pp = 100 p W (one
hundred microwa A 11).
Figure 7. Performance of micropower RF amplifier.
Approved For Release 2005/01/26: CIA-RDP78T03194A0053& T0004-8
Approved For Release 2005/01/26 : CIA-RDP78TO3194A000300010004-8
Microtethnology SECRET
(A) E ICHED INTERCONNECT
PATTERN ON EPOXY
LAMINATE BASE BOARL,
(B) MICRODISCRETE ACTIVE
AND PASSIVE COMPON-N -S
ASSEMBLED ON BASE HeARD
(D) FULLY ASSEMBLED AML..IFIER
WI--H INPUT & OIJTPU"r
CONNECTION PINS
I )using the first year the efforts of the program were devoted to
designing and fabricating two representative circuits, a radio-ire r.fuency
aruliliiicr and a digital logic function. In the amplifier a redo ltion in
power drain of two orders of magnitude as compared to the bent avail-
able commercial circuit was achieved, and size was also rednc~-d by a
):actor of 100. The curve in Figure 7 shows its gain of 11 decibels,
almost flat over 16 megahertz (thousand kilocycles per second), with
.i power input of 100 microwatts.
Aur equally impressive improvement was made in the digital circuit,
whose power drain was reduced by a factor of 1000. Thns after a
Tears effort the power reduction achieved was at least 1.00-fold while
other parameters of both circuits were maintained at the original
level or improved. These accomplishments rested on careful and
clever circuit design and utilization of the new micropower transistor
I'aroily. The prospect of further advances along these lines continued
lo he extremely good when the first year's program was assess-,d at its
conclusion.
`I'he next logical step was to push on to more complicated circuits
and subsystems, and the results were again highly favorable. The
)%oSalr. were accordingly expanded to include all the basic Ibuilding
crocks of radio receivers and transmitters. Figure 8 shows the Iabrica-
9ir.m details of a inicropower intermediate-frequency amplifier, the
Approeffbr Release 2005/01/26 : CIA-RDP78T03194A00030001404-8
Appa-&r For Release 2005/01/26: CIA-RDP78T03I.94A09,~0390010004-8
ccrotec nog ogy
heart of any good superheterodyne receiver. The power consumption
4 t`hi