^                             USING THE S.I.S.
|                              SCREEN FORMAT

     The S.I.S.  is designed  to be  an easy to use menu-driven system.  The
   top line of every  screen displays  the name  of the  current function or
   process.   The third  line from  the top is reserved for messages such as
   news bulletins.  The  bottom line  of the  screen displays  the currently
   active keys and the line above that is the OPTIONS DESCRIPTION LINE which
   briefly describes  the function  of the  highlighted menu  option.  Menu-
   options windows  are displayed  in the  center of  the screen.   The menu
   windows are explained below.

^                                MAIN MENU
|                                 OPTIONS
    Upon successful completion of  the LOGON  process the  MAIN MENU window
   will  be   displayed.     The  options  available  from  this  menu  are:
   COMMUNICATIONS,  DATA BASE, CRYPTOGRAPHICS, OPERATIONS GUIDE, and LOGOFF.
   These options are explained in more detail below.

|                              COMMUNICATIONS
     Upon selection of COMMUNICATIONS from the main menu, the COMMUNICATIONS
   MENU will appear with the options: AGENT, STATE DEPARTMENT, and OTHER and
   are described below.

^                              COMMUNICATIONS
|                                  AGENT
     Upon  selection  of  AGENT  from  the  COMMUNICATIONS  MENU  a  list of
   codenames will display.  Select an agent and a communications  channel to
   that agent  will be  established via  the Pyramider Satellite Network.  A
   menu will display with the options: TRANSMIT and RECEIVE.  These  options
   are explained in later sections.
     The investigator  has at  their disposal  eight field operatives.  They
   can be assigned individually  to  collect  intelligence  anywhere  in the
   world  as  the  investigation  requires.    They are trained, experienced
   people and are directed by the highest authority to execute the orders of
   the Investigator,  forgoing any  allegiance or association with any other
   department, agency, or  person.    They  are  covert  operatives  and are
   empowered only  to investigate - they cannot arrest, detain, or otherwise
   interact confrontationally with  anyone  without  compromising  their own
   security positions.

|                             STATE DEPARTMENT
     The  investigator  may  communicate  requests  to  the State Department
   through the Security Supervisor.  See  the discussion  on TRANSMIT  for a
   description of requests to the State Department.

|                            RECEIVE CAD MESSAGE
    Select "RECEIVE CAD MESSAGE" to view a message in from the "Cryptograph-
   ics Analysis and Deciphering" lab.

|                                 TRANSMIT
     Select the TRANSMIT option if your objective is to send an order  to an
   agent.   The nature  and structure of the order must be very specific and
   must fall within the category of either a person, place, or thing. ALWAYS
   USE UPPER CASE CHARACTERS.

     If a person is to be investigated then the order must be  the full name
   of  the   person  in  the form: LAST, FIRST  (e.g. DOE, JOHN)
     If a place is to be investigated then a single,  specific location must
   be entered  - a  house, apartment, or building requires an address in the
   form: number street, city (e.g. 1499 CARLSON,LONDON).   If the place is a
   name (e.g.  CLARINGTON HOTEL)  then enter the name exactly as you find it
   in your source.

     A thing must also be specific and not general.   However; this category
   is difficult  to predict  or confine  and only experimentation will guide
   the investigator here.  The best rule-of-thumb is the source of the item.
   If it  is found  in a  file, write  it as found.  If it is something in a
   picture or audio file then use your discretion.

     When the order is typed to satisfaction, press the <Enter> key.  If the
   order is  acceptable it  will be acknowledged, otherwise you will receive
   an error message and you may try again.
     The time required for an agent to execute an order  varies considerably
   with  the  nature  of  the  order  and  the  location of the agent - some
   investigations may take several days while others only  hours or minutes.
   The agent, once assigned, cannot be recontacted until he/she reports in.

^                    COMMUNICATIONS - STATE DEPARTMENT
|                                 OPTIONS
    If the  communique' is  to be transmitted to  the  State Department then
   if the object is a place the State Department will assume the order is to
   "SEIZE AND SECURE PREMISES" and if the object entered is a name the order
   is assumed to be "QUESTION SUSPECT".

^                         COMMUNICATIONS - GENERAL
|                                 RECEIVE
     Select the RECEIVE option  from the  COMMUNICATIONS MENU  to receive an
   incoming message  from an  agent, the  State Department, or other source.
   (See the discussions for AGENT and STATE DEPARTMENT).

^                                 DATABASE MENU
|                                    OPTIONS
     Upon selecting DATABASE from the  MAIN  MENU,  the  DATABASE  MENU will
   appear  with  the  options:  DOSSIERS,  PHOTOGRAPHIC,  DOCUMENT, RECORDS,
   AUDIO, REPORTS, and LIMITED  ACCESS.    These  data  types  are described
   below.

|                                   DOSSIERS
     Upon selection  of the DOSSIERS option from the DATABASE MENU a 'Record
   Criteria' template will display.   Enter  zero or  more values  into this
   template  used  to  isolate  records  in the Dossier Database.  Press the
   <F10> function key and all (if  any) records  matching the  data you have
   specified will  be listed in the 'Selected Records' window.  Position the
   cursor on the dossier  to be  examined using  the up/down  arrow keys and
   press the <F10> function key.

     A   photograph   and   textual   information  will  be  displayed.  Use
   <PgDn>/<PgUp> if there is more than one page of information.

|                                  PHOTOGRAPHIC
     Select the PHOTOGRAPHIC option from the  DATABASE MENU  for the display
   of Surveillance, Satellite, and Aerial Photos.  Once a photo is displayed
   you may "ZOOM" in on the photo by pressing the F10 key and then "SCAN" by
   using the curser arrow keys.  A caption for the photo may be  toggled  by
   pressing the F7 key.

|                                    DOCUMENT
     Select  the  DOCUMENT  option  from  the  DATABASE MENU to  display  an
   Official document of the government.

|                                    RECORDS
     Select the RECORDS  option  from  the  DATABASE  MENU  for  the display
   of Police, Medical, School, Sales, Passports, Transportation.

|                                     AUDIO
     Select the  AUDIO option  from the DATABASE MENU to display transcripts
   of the audio evidence file (also on cassette).

|                                 LIMITED ACCESS
     Select  LIMITED  ACCESS  from  the  DATABASE  MENU to view confidential
   files.  You will be prompted to enter an access code.  Enter the code and
   press <Enter>  - further  instructions will be provided and are dependant
   on the entered access code.

|                             PROSECUTORIAL SUMMARY
    Describes the format to follow for reporting the results of your inves-
    tigation.

^                                 CRYPTOGRAPHICS

|                                CRYPTOGRAPHICS
     Select CRYPTOGRAPHICS to decode encoded data.

     For  reasons   of  security,  some  intelligence  gathered  during  the
   investigation may be in code.    The  encoding  method  is unpredictable.
   There are two possible modes of response to this circumstance.

     The  CRYPTOGRAPHICS  MENU  displays  the options: CAD and ONLINE. These
   options are described below.

^                                CRYPTOGRAPHICS
|                                     CAD
     Select the CAD option to send  the material  to the  CAD (Cryptographic
   Analysis and Deciphering) Section at Langley.  A report of their findings
   will be transmitted to  you  via  the  Pyramider  Satellite  Network upon
   completion of their analysis (See communications).  Due to frequent heavy
   workloads and backlogs at CAD, be  prepared for  lengthy periods  of time
   before results are made available to you.

|                                    ONLINE
     The alternative  to CAD  is for the investigator to attempt translation
   of the material.  To this  end, a  limited set  of deciphering  tools are
   made available  at the terminal.  Although some aspects of the system are
   not comparable to CAD,  insight, ingenuity,  and a  possible time savings
   will compensate.

     Upon  selection  of  ONLINE  a  menu  will  display  with the following
   options:  TRANSPOSITIONS, MORSE CODE, and ENIGMA MACHINE.  These  are de-
   scribed below.

^                                 ONLINE
|                             TRANSPOSITIONS
     Within the  TRANSPOSITIONS MENU  is a list of the various transposition
   functions.  Position the cursor on any function  and a  brief description
   of the  function will display in the OPTIONS DESCRIPTION LINE (See SCREEN
   FORMAT).  Press the  <F10> function  key to  perform the  function at the
   cursor - the function will be performed on the encoded data.

|                               MORSE CODE
     Select this  option to  translate morse code.  The RIGHT SHIFT key acts
   as a telegraph key to enter morse code. Use the space bar for long pauses
   (word  separation). The duration of time the RIGHT SHIFT key is depressed
   determines the  dot/dash pattern.   The  translation will  display in the
   work area.

|                             ENIGMA MACHINE
     The ENIGMA  MACHINE is  a device often used to encode (scramble) normal
   text.  In its simplest application  (and the  one employed  here) some or
   all characters of the alphabet are substituted for other characters.

     Above  the  workspace,  the  cursor  is  in  front  of  a  blinking '='
   character.  Enter a character  of  the  alphabet  to  be  changed  at the
   cursor.   The cursor  will move  to the  other side of the '=' character.
   Enter a character  of  the  alphabet  at  this  cursor  position  and all
   occurrences  of  the  character  left  of  the '=' will be replaced by the
   character to the right of the '='.
   Example:  Assume the encoded text were, "z  dzd zt".   The  'z' character
   stands alone  and thus we can guess the proper substitution is either the
   character 'A' or 'I' since either can be a word. To try the 'I'  we would
   enter "z=i" and the text in the workspace would change to "i did it".

^                                 MAIN MENU
|                             OPERATIONS GUIDE
     Select  OPERATIONS  GUIDE  from  the  MAIN  MENU  for these online SIS
     user's instructions.

|                                  LOGOFF
     Select LOGOFF from the MAIN MENU  when you  wish to  leave the  SIS and
   return control to DOS.

   IMPORTANT:  Always exit the S.I.S. by selecting the LOGOFF option -
               -- DO NOT TURN OFF YOUR COMPUTER BEFORE LOGGING OFF --


|                              EXECUTIVE ORDERS
^                                 CLASSIFIED
     LIMITED OFFICIAL USE                             June 13, 1996
                           National Security Council

   ----------------------------------------------------------------------

                                THE WHITE HOUSE
                                ---------------

                               EXECUTIVE ORDERS
                             NO. 11130 PRIORITY-01
                            -----------------------

            APPOINTING A SPECIAL COMMISSION INVESTIGATOR TO REPORT
            ON THE ABDUCTION OF THE PRESIDENT OF THE UNITED STATES

     Pursuant to  the authority vested in me as Vice President of the United
   States, I hereby appoint a  Special  Investigator  to  the  Commission on
   Abduction  and  Terrorism.    The  duties,  responsibilities,  and powers
   relating to the recent abduction of the President of the United States of
   America.    Under  the  authority  of  the Acting Commander in Chief, the
   Special Investigator  shall  have  been  made  available  to  him/her the
   following:

          * Federal Data Bases
          * Federal Agency Reports
          * Official Government Documents
          * Public and private Records
          * Intelligence Organizations Files
          * Cooperation of related Investigating Agencies
     The purpose  of commissioning  an independent and external Investigator
   is to examine evidence developed by established Intelligence  Sources and
   to evaluate  the facts and circumstances surrounding the abduction of the
   President to determine the perpetrators of  the offense,  the location of
   the  abductees,  and  the  feasibility  of rescue and recovery operations
   through objective analysis free of centralized administrative limitation.

     The Investigator is further charged with  the obligation  to respond to
   this  office  and/or  other  members  of the National Security Council as
   required by authorized officers.

     The Special Investigator is  hereby empowered  to prescribe independent
   methods and  procedures and  to compel  cooperation when and as is deemed
   necessary.

     All Executive departments and  agencies  are  directed  to  furnish any
   assistance and/or materials which the Special Investigator may request.
                                                       VICE PRESIDENT
                                                  ACTING COMMANDER IN CHIEF

|                           PURPOSE AND METHODOLOGY

          The  duties  of  the  Investigator  as prescribed by the Executive
   Order are herein detailed:


          (1)  Examine the evidence compiled and made  available to  you and
          your staff  - beginning  with the Official Report on the abduction
          of  the  President  and  other  executive  officers  of   European
          nations.  This report is filed under DOCUMENTS.

          (2)  Analyze   the   methods,   tactics,  weapons,  vehicles,  and
          personnel  utilized  by  the   perpetrators  and   evaluate  their
          significance as potential conclusive evidence.

           (3)  Examine photographs of  the  attack  site  taken  by aerial
          reconnaissance and security teams and appraise  the value  of  the
          explicit or implicit details therein.

          (4)  Listen  to  the  Audio  Evidence  Cassette  and  examine  the
          transcripts of the material.  Determine, by careful  and  repeated
          examination, any  information from  this source which  might prove
          to be of value for the resolution of this case.

          (5)  Coordinate  the  activities   of   persons   that   may  have
          participated in  any aspect  of the events prior, during, or after
          the abduction.

          (6)  Use the field Operatives to search  for information  which is
          otherwise unavailable to you.

           (7)  Take note  of  national  and  world  events.   Some  public
          activities may have a bearing on the investigative process.

          (8)  Maintain and update  your  case  files  as  the investigation
          proceeds.     These  files   will  aid  in  the  organization  and
          perspective of your research and facilitate a more efficient  mode
          of   operation.      Also,   the   State   Department   and  other
          administrative organizations will have access to these files   and
          their  contents   will  affect   the  decision-making  process  in
          formulating national policy and specific resolve of the  events of
          this case.

          (9)  The objectives  of this  investigation is to (1) expedite the
          recovery of the President and the  other abductees  safely and (2)
          to  bring  those  accountable  for  the  violation to justice. The
          formal methods  used  to  this  end  is  to  reconstruct  from the
           evidence the  plan, execution, and aftermath of the abduction  and
          to reveal the identities of any and all persons involved  directly
          or indirectly in the furtherance of this effort.

^                        --   END OF SIS OPERATIONS GUIDE   --
|                        USE PgDn FOR FIRST PAGE OR F9 TO EXIT

