Good afternoon, everyone. I'm Diana Bailey. And I'm the Executive Director of the Maryland Women's Heritage Center.. We are a statewide nonprofit. And then we have the mission of adding herstory to history to tell our story. And we're located in Baltimore City, although we're statewide, our location happens to be there. We're at 333 North Charles Street, which is in the former Women's Industrial Exchange building. So we're in historic building, that's a perfect location for us. In addition to our exhibits that we have there, and we have an exhibit of Women in STEM, Women in the Arts, Suffrage, Unsung Heroines, and the Maryland Women's Hall of Fame.
So, at some point, although our our exhibits are portable, right now, because of the current situation we're offering primarily virtual programming like today what I would like to invite you to do as we have a few more people coming in here. We'd like to invite you to check out our website, where it's ongoing, it talks about our programs, and you can register you can get on our mailing list, but there's a lot of information about Maryland women that are there. So I hope that you'll check that out
And then we're thrilled today to host the Queen's of code. And I met Eileen a couple of years ago when they were just getting started with it started with their project.
It's an opportunity that Eileen and I've been talking about for years to have a program such as this and we're finally having it. But I also wanted to mention that in the last two years, two of the Queen's, one was Dr. Nancy Welker was inducted last year into the Maryland Hall of Fame. And Dottie I'm blanking on her name for a moment. I'm so sorry.
Dottie Blum.
Thank you very much, was just inducted. We were notified last week. So they, among the queens, have some very special women. So I want to thank Eileen for being here and have some of her friends that are here today. And I wanted to let our guests know that you'll have an opportunity to only in the chat box, because we have so many people here today, but please write your questions in the chat box, and then we'll deal with those at the end of the panel. So with that, I'd like to turn it over to Eileen and Eileen, the queen of the queen of codes. Take it away.
Thank you. Thank everybody for coming in. I know that there are a lot of people in our audience who we worked with many years ago and also people who are have been here with the Maryland Heritage Center. And also I'd like to welcome in the people who are coming from the simulcast which is going around the world with the Internet Society. So that's, that's really exciting for us. I'm going to share the screen now. And yeah, let's see if this will work. And I'll show you my slides here.
Okay. So we're delighted to be here with you today to talk about our Queens of Code project, which is telling the story of NSA computing women. And we appreciate the support of the Maryland Heritage Center who's been working with us for a couple of years. And they as as Diana said, they help other Maryland women tell their stories. We've kept our secrets for 50 years or more, and if we didn't share them now. They might have been lost forever, and no one would have told these stories. And today we'll be speaking about our experiences working with computing and technology at NSA in the early days in the 60s 70s and 80s. And at the end, we'll also be giving tips to students who are thinking about careers in STEM, if there are students that are attending this or we encourage you to ask for bagging. Thank you. We encourage you, the students to give to ask questions in the chat room and we'll try to get to them because one of the one of the reasons that we one of the reasons that we're doing this is an outreach to to students. As Diana mentioned, we are really excited that we have two women that are going to be now in Maryland's Women's Hall of Fame. Dr. Nancy Welker, who might be in this audience today too, and Dottie Blum. Dottie was one of the most influential women in computing. In the early years. She was a technology leader at NSA. She was a mentor to many of our women and men, including our queens of code. And Nancy was NSA's first female chief of the research and development organization. And as a groundbreaking physicist who worked on superconductivity with mainframe computers and also created in NSA's micro computer lab.
I'd like to have a special thanks to all the women who've been part of this project. telling their stories was not an easy task. First of all, we had to remember what happened 50 or 60, 70 years ago, write them down. And then we had a really long and challenging process to get all everything through and NSA's pre-publication review them. I don't know about you, but I can't remember what I had for breakfast in the morning, but thankfully these women came through. So today we're going to do some time traveling. We're going to go back back back to our pre Queen days in the 50s and 60s, in the early days of computing, so slip into your bell bottom pants and your paisley print shirts. Hum a Beatles tune if you can keep the keep on tune and buckle up for the journey.
For those who didn't live in the 50s and 60s, I want you to think about a world with no Google. No iPads, no PC, no pocket calculators, no ebooks, no email. No online shopping. Whoo. And not much in the way of technology as we know it today. But at NSA saved by 1968 we did have over 100 computers. And there were around 150 women who were queens of code, who worked in many areas of technology. They made up about 10% of the technical workforce. And we were recruited by the agency to some of the best schools in the country. And actually, many of us were recruited during the heart of the Vietnam War, when it was really the Defense Department and military were not really welcomed on college campuses. So it was kind of odd that our advisors prompted us to go take these interviews with NSA. But some of our women majored in math and physics and other humanities and we also had some of the first computer science undergraduate and master's degree recipients in the country.
So talking about our project, why does our history matter? You know, why would why did we bring this to light or wanted to bring it to light? Only a few women have been recognized in computer history. Most history, which is his story, says that women only held data entry jobs back then, but that was not the case, including women at NSA. Books about computer development and computer museums portray it as a boys only club and we want to set the record straight. Some that say this is because women wrote the code and men wrote the history. At NSA, actually women and men wrote the code, and nobody wrote the history because everything was classified. Our stories are about everyday events. However, we were supporting systems and writing code for applications and operating systems, planning for IT, managing big projects, multimillion dollar projects, even back then, doing cutting edge research and development, creating new technology and much more. Our systems had to run 24/7 because we were providing life and death support to the men and women in the field as well as to key decision makers like the president in Congress, and our government. They depended on us, they depended on our systems.
Along the way, we fought for women's rights and fair promotions, childcare, maternity benefits, flexible work schedules work from home and part time that made the workforce more friendly to women. And one of the reasons for coming out now and doing speeches and doing writing articles that hopefully we're gonna have a film coming out soon from the Cryptologic Museum, is that we want to be role models. For young women today. I encourage them to pursue pursue STEM careers. We tell young women especially today, if your grandmothers and great aunts could have 50 years of rewarding and fun careers in tech. So can you if you work hard and take the challenging courses we don't promise that is easy, but it is very worthwhile. And then we have a message for companies who struggle and recruit to retrain the women. You know, looking at our stories of how the agency recruited and trained and had opportunities for advancement that some of these companies could learn a little bit from our experience.
Now, the the actual project came out was when I worked at NSA, I was fortunate to work with smart and talented and amazing women we worked on projects and teams and cross agency working groups. We were a cadre of technical expertise that had a big impact on our organizations, and NSA submission. And we worked alongside them then we were about 10% of the workforce but we were an integral part of the technical cadre. As an aspiring writer, I felt we had to have a story to tell but back then it was really hard to think about with all the security things of being able to write about it. Back in 2018 I went to the computer museum in San Francisco, with my family and I was it was really fun to see all the old computers that we worked with there. And all the stories about all the men who'd worked on computers but there really, other than Grace Hopper and Ada Lovelace there were no women in this museum. And I came back feeling like you know, there was there was something wrong with that picture. And I talked to friends and co workers in the the Cryptologic Museum and history department, and even Liza Mundy who did Code Girls, and everybody encouraged me to try to pull this together. So that's that's kind of how the project started.
Now, career and technology, especially at the agency, meant a lot of different things, it meant making a difference to how things got done. Technology is that for anybody who's working in that field today. There are millions of jobs bboth now, and in the next 10 years, and well paying jobs too. In fact, if you just looked at the new jobs report, they came out from US News and World Report last week, the number one job in the whole country is in information security analyst and that's in the field of cybersecurity, which is one of the areas that we would like to promote and the 10 year outlook it's really good in these areas. And there couple other IT jobs on the top 10 list too.
I'll tell you a little bit about my background. I was born in in Georgia, and I grew up in a small town called Warner Robins. I met my husband at Ohio State, he was also a computer science major, and we've been computing together for more than 50 years. And back when we actually graduated, we were the first graduating class in computer science from Ohio State, and when we were interviewing for jobs and we got a lot of offers around the country, most companies offered me 25% lower start starting salary than they did my husband. But NSA was different, they offered me the same starting salary as a man, which I thought was quite remarkable for that time. And what I liked about a career in computing at NSA was something exciting was happening almost every day, and I had an opportunity to solve problems and contribute to our national defense.
I have one little story to tell you from when I was growing up. I think it shows that, you know today Smart Girls have a tough time, and I think when we were growing up as smart girls, we probably had a tough time too, because the girls weren't really encouraged to show that they were they were smart. Here I was actually named in middle school, named most intellectual, but it was not a superlative hat you really aimed for you really wanted to be most popular, most likely to succeed but I was Miss intellectual. But in eighth grade we had an eccentric teacher named Mr. B. And for our spring quarter grade he decided that would be based on how well we did it building and flying a kite. While I was not thrilled that you know all the work we've done so far on papers and tests not counting because I already had an A in the class. I got into the spirit of this competition when he assigned us to two person teams. My teammate Nancy and I had never built or flown a kite. Those being smart girls and problem solvers. We use a library to research how best to do it. He saw recommendations for using light material Nancy's mother threw in a an old and ugly chiffon dress that we cut up and designed archive and to our delight on a very windy day our kite scored higher above all the rest and we got our ace. I think back then this shows that I was a problem solver and into research early on and always love the library at NSA I started off as an applications programmer actually I was in our data systems intern program and a lot of our queens were in intern programs at NSA.
An application programmer, you got to work with users to define the problems then you would use programming languages today it might be Python, Ruby, Ruby, C++ or Java, but we use something called Fortran PL one an assembly language for specific programming had plastic templates and this actually is a copy of my template that I've kept for 50 years to map out our programs. I had a boss who always told us that we had the best and most interesting job in the whole world. And the fact we got paid to do it was a bonus. You know many days I agreed with that. System programmers and then I moved from application to systems programming involves programming assembly language and the very basics of a computer. We maintained very large UNIVAC 1100 series systems. And every time an operating system would come out we'd have to put like 10,000 lines of our own code into the operating system to support the things that we needed for for security and processing. I did everything from and changes to support the Cyrillic print bar that was printed in Russian as well as security and accounting.
And we used to in our office we actually had for women systems programmers and for men, and we have a saying around the office a couple of things. One was a woman's hours worth two man hours, because we could get things done a little faster than the guys. And then there was another saying that our boss would say if you want the job done and done right, give it to the women as the women really work. Very good on getting things done. So other thing that we would do is when systems would crash, we would have these things called dumps and we would collect them after after we'd get four or five and when we sit around the table and have a dump party, we would do analysis on the dumps, going step by step register by register, sell, buy sell, trying to figure out why the systems had crashed. This was kind of an early computer forensics. But we had no tools except our minds, but it was fun and it was a learning experience.
So I was also a project manager for big system that was like the largest system of this time. It's called Preface, and I directed the design and the implementation of this and manage the team. It was an exciting project and we had like 10 people on the team and we brought we upgraded all the time. Since sensitive processing. So this was was an exciting job to do. The reason why I have the smiley faces here on my slide is because that was about the time that it was introduced and people would go around taking stickers and putting them all over the office. Or computers to I guess cheer us up. So I moved down to another job where I actually worked for Dottie Blum, and I was the editor of the first telecommunications plan. Up until that time, the agency had not done any long term planning and it was a massive undertaking, one of the kind of the little sidebars and that was we had to do an inventory of all of all the programs of all the systems and equipment that we had, and we used a newfangled technology back then it was called barcoding. And we talked to Kroger who had just been working with some handheld devices where they were able to read optically read the barcodes and put the results on a mag card. So we developed a system where we could go and slap barcodes and everything and we could record it and say where they were. So this helped us understand what we're doing.
So that's kind of what my little story is about. I'm going to turn it over to Kathy,
.Yes. Kind of a last minute glitch there and fortunately, I was able to get on so very happy to be participating in the group. And I appreciate the opportunity to come and tell you about my experiences providing Computer Support at NSA in the 60s 70s and 80s. This is just a little bit of background about my preparation for working at NSA. And I just like to give you a little more of that so that I can explain to you how I ended up working in this career field. Did you do the next slide?
Okay, and this is my backstory. I was born in Connecticut and raised in New England, but as a senior in high school, my family moved to Louisiana, which was a little bit of an adjustment for all of us coming down from New England. But anyway, I attended the Louisiana State University. And my goal upon graduating was to be a statistician at the Census Bureau. And it's not surprising that I picked this career because all through school I really did enjoy math and math related subjects. And the thing about math that I really liked was you follow this. You follow the teacher and you did your homework. When the test came, you just never had to study either know it or you didn't know it, which was the case in some other courses that I was taking.
I also enjoyed games. That included planning out the next step, or the next, you know, the next thing that we were going to do and anything that had to do with logic, logic related things I always enjoyed. I also participated in school sports at high school and once I worked for NSA, I worked overseas, two separate tours, three years each tour. Anyway, could we go to the next slide, please.
Okay, so during the during the college interview process, even though my plan was to go to the Census Bureau, and be a statistician, I became aware of NSA and this three year intern program that they were offering that would train me to be a computer systems analyst. I was kind of interested in it because it was math based, but and so I decided that it was probably a good opportunity and I signed up for it. Even though I don't think I really knew at that time, a computer systems analyst it anyway, I moved to Maryland, started my training at NSA. And the first programming language that I learned was Fortran and with my Fortran training, and being a newly minted computer systems intern, I recorded to my first office, and that's when I begin to be introduced to the world of computers at NSA. And like I learned the first system I was working on was a UNIVAC 1108. And I went down to take a look at this system, which was in the basement of the building in this big cavernous area. And it was in its own separate room, and the whole room was filled with this computer. The components were just so large and it's it's so striking compared to what we deal with today with our smaller systems. But anyway, we could do the next slide Eileen and I'll can show a picture of the system.
This is what the system looked like. And you can see it had a large bank of tape drives and that's where the data was read in. And then there was an Operator Console and a computer console and there were several printers attached to it. My job was to take my Fortran programs which run these big metal trays and they were the program was typed up on these Hollerith cards, these sort of like key punch cards. Anyway, we would track them down to the computer room where the program was run, the computer operators would take care of it. And then my job was to come down and the printers were all covered. These black cloths because everything was very secure at that time. So I you know took the black cloth off and pulled out my printer, a printer, my printout and took it back up to my office and I would review it for anomalies and then I if there were anomalies or or errors in the data. I would make adjustments to the program and then I would take it back down for another run out. And those days. We were lucky to get two runs a day. So you really had to be kind of careful about making these changes or updates because you didn't want to waste a run. I'm making, you know sort of a stupid error.
So anyway, we would work very diligently at preparing our changes and taking them down. So I did this work for several months, and then I started to get ready to move on to my next intern assignment, I have to say, was kind of looking forward to it. I had spent a lot of time reviewing a lot of zeros and ones. And even though it was interesting, I kind of thought it's time to move on and do something else. Several years later, I came across a report. They talked about the data that we processed on that UNIVAC 1108, which cryptanalytic data and the importance of that data to national security. So I'm very happy to see that my contribution made a difference. In fact, I really think that was probably some of the most important work I did during my whole career at NSA. Anyway, I was happy to accept the challenge.
And then I moved on to my next intern assignment. So Ali, maybe we can do the next slide. Okay, so in the early in the early 1970s. Many companies were introducing new large mainframe computers and also new programming languages. So the system that I worked on are the systems were the IBM series, IBM 360 In three, seven days, and to program on those computers I use the assembly language coding. Assembly Language coding, programmers either liked it or they didn't like it, because I liked it because it was efficient to use. And, but it wasn't, it was more difficult to learn. And also documentation could be a problem with this language. And we needed to provide documentation because if we moved on, someone else was maintaining our programs. They would need to have that guidance to help them out. So at this time, the software companies were producing these new programming languages. And the languages were kind of tailored, some were for scientific applications, and some were for more business applications. And I think the whole payroll system you know, at NSA at that time was done using COBOL programming. But anyway, um, the languages I used when I was doing this programming included PL/1 and COBOL. Now also, at this time, sort of towards the 1980s a little bit later, for companies were beginning to prove produce the software packages, it would allow you to do
do applications that were relatively frequently used in the business world no such as specialized reports, or statistics or a payroll or project management. Anyway, now at this time at NSA, almost all the software was custom built and tail and built by in house programmers or else, companies that were hired by NSA to do private development. So the software was very tailored to the particular requirements that the analysts had. And when this new off the shelf software came along, it really wasn't quite as adaptable as the, you know, custom built software software at the agency. But anyway, the managers kind of liked it. It saved a lot of time using these packages. And also it was a lot less costly than then custom building every piece of software that we needed. So anyway, even though there was this pushback from the analysts initially, the software became more adaptable as the software companies became more familiar with it and and what the needs of the customers were. And, and so it became much more readily used. And the other thing about it was, initially, you couldn't really introduce these packages, unless you've got them identified kind of early in the program development cycle. So as time went on, and they became more available and more popular planning efforts were broadened to include the use of the software packages. I don't think at the time, we really realized you know how important these applications were going to be throughout the years and now you can see years later we have stores that have all software applications that you can just buy for a very little bit of money. So it was a huge step toward the modernization of the use of the computer systems. Anyway, I guess we can move on to the next slide. But these are just a few these were just a few examples of the kind of work that a computer programmer did when starting a career in information technology. And this background and training that I got early on in my career really, really laid the groundwork for me to be able to expand into a variety of different areas through the many years that I worked at this at this job. So over the years, I I feel positions included including systems analysis, system design, systems, architecture, systems engineering, project management and and management positions. So it was it was very helpful to have this this background, but it also felt that the career area is just filled with opportunities and there was tremendous change going on all the time. So it's always very interesting, doing work in this area. I guess if I were talking to somebody who would be interested in maybe thinking about pursuing a career in information technology, here's some of the steps that I would recommend. Certainly, plate math, high school through algebra and calculus if it's available, and complete a high school college prep curriculum, because that provides a lot of additional opportunities for further training at the college level. As Eileen was saying, we went through college, certainly the college I went to, there was no such thing as a computer science major. So now you can major not only in computer science, but you can major in computer applications or computer management are a variety of different different career areas.
Anyway, I would suggest attending locally sponsored activities that assist you in understanding what's involved in in computer science, what's involved in doing programming, so you could get an idea, you know whether some of these areas would be of interest, including the computer programming as well as the other STEM activities. Now, certainly today, even though the issues are different, the challenges are different. All really still there. Um, the research is just starting in a lot of different areas, such as cyber security. There's always something just around the corner. In fact, kind of like to start over and pick a particular area where a lot of research is needed. And just start over and pursue something different, such as cybersecurity, because I just don't see his career area ending anytime soon.
Anyway, thank you for listening to my stories. And I'm now going to turn it back over to Eileen.
Okay, well, I think it's a good lead in to to Laura, who has been really active in the cybersecurity in the STEM area. Laura, thank you for joining us today.
Well, thank you very much and I'm really excited to be here and I see so many of my friends and colleagues out there listening in today. That's really great to see them out there. So my story I grew up for the most part in Baltimore, so I'm pretty local to the area. Graduated from Virginia Tech in 1984 with a degree in electrical engineering and then went on to complete my master's in electrical engineering as well while I was working full time. I started my career in NSA as a cooperative education student in 1981 and then spent 37 years with the National Security Agency. Next slide.
So, my story on why NSA Well, my father was a career NSA employee. And, and as a result, you know, we knew we knew that he traveled a lot. We had no idea what he did. No idea. We just know he was out in the mountains, doing all kinds of fun things. He was an engineer. He's a civil engineer. We got a little closer to understanding that we moved to Germany when when I was when I was 1011 years old. So we moved to Germany, Tibet Island, which was one of NSH big listening posts at the time. And so we got more involved with the NSA family because we were living in a bubble more or less then you know, you would ask what are those big golf balls out onto out there you know, what is that about? Course we knew they were antennas, but really nothing else about that. When I got back, we moved back from Germany when I was going into junior high school at the time. That's when I figured out that I really really love math and science. Didn't know that before, but it's like, you know, I'm pretty good at this. I should really continue to go into this. So I went into high school I had a physics teacher who really pushed hard on going into engineering, you need to go in engineering. He really pushed a lot of the girls in our high school. To do that, which was great at the time, because not many women went into engineering. Of course, my father was also a big influence and really pushed us well, you know, go ahead, you should really look into being an engineer. And, you know, looking back at the time, I didn't really have any other friends whose father were pushing them into engineering. I didn't think much of it at the time. But hey, that's probably a really big deal for that was a big influence for me.
My physics teacher also talked a lot about cooperative education programs, and that that's something that he really recommended, especially if it didn't know what you're getting into. So basically, you could learn on the job while you're in college and figure out you know, this is something that was really for you. So um, so anyway, I that was that was part of my selection process for going to school. I ended up as a cop and NSA one, they have a great Co Op program so they have opportunities for you to move from, you know, while you're in college, take positions in different organizations, different missions to really learn what the technical jobs were at NSA. The other reason was, I didn't have a car, and I needed a ride to work and then I had debt. So that could take me to work. So that worked out pretty well, too. Next slide. So, as I said, the first three years were in the in the Co Op program, I had multiple jobs in software development, hardware development, and even some technical analysis. I figured out what I liked and what I didn't like, No, this is about the Queen's code. I was never really a software person. I really loved hardware development. So let's think of it as I was a coder because I was programming those chips that were going into the hardware system, designing.
I spent the first 10 years of my career in in the weapons and space community, that mission and that meant that I was developing systems to process foreign instrumentation signals, or telemetry signals as what you might think of it as basically, you have a missile that's under test by some foreign adversary. And they have it so it emanates signals so they can understand the capabilities of the missile where it's doing well where it's not. That's really valuable information to have. So I was basically building systems to process that so we could have an understanding of what they were doing. It was during this time that I also got to provide support to the Strategic Arms Reduction Treaty that was that was going on, it was in development, and that was it was a great way to see diplomacy and action because I was I was kind of on the frontlines of it. And and during that I was able to spend some time developing a special processing system in support of that mission. This is all leading me to the signals analysis field where where I really spent the bulk of my career and just love it. And signals analysis is about, you know, understanding and taking apart signals and understanding how they're constructed, and then how we can process them as a result. So you have to do the analysis first and then understand what needs to be done to process it after spending 10 years in that weapons in space community I eventually moved over to NSA is larger communications intelligence mission or common mission, which is all under signals intelligence, and, and that I split. I still worked in signals analysis for a number of years after that, but just moved to a different mission set. Hey, next slide.
So as it turns out, I was a good engineer. I wasn't a great engineer. There were people who were far more skilled as an engineer than me. But what I did figure out was that I was really good at bringing people together to solve problems. Bringing technical folks together to understand the problem and solve it. And I think some of the my supervisors saw that in me as well and they said, Hey, why don't you become a team chief? And why don't you move up to other other other jobs and leadership? So Sunil originally, when I first started I could I could work as an engineer I'm still building systems and as a team chief, but then as I moved up, I had to kind of give up I could choose to am I going to be a technical person or I'm going to be a leader or you know, in leadership, I chose leadership. I said, I was better at that than an engineer. And, and that's where I started working my way up through the ranks, always leading technical organizations. I don't think there was a job I had that wasn't a technical organization. But I moved from, you know, a team of five or six to eventually leading a team of an organization of 1000 people distributed across the world in the enterprise.
So you know, kind of took steps to get there. But anyway, made my way up the ranks. Um, I did have the opportunity. Besides working on the signals intelligence side, I did have an opportunity to work in the information assurance or what we would now call cybersecurity part of the mission. That was really important because not only to expand my network, but it really set me up for really understanding the cybersecurity mission, which is so absolutely critical today, and affects my work that I do today, which I'll get to later. I became a senior executive in 2001. And with that, I found myself at the CIA. So I took a three year tour there working on joint NSA CIA mission. And that was probably the most interesting job I had during this time. I got to learn a whole new culture, and I got to see NSA in a different way. It's one thing to work in NSA and understand it, but to see how your agency from operates from another agencies, kind of interesting, you see the really good stuff we do and sometimes you see that not so good stuff. But um, but anyway, it was just a fascinating time and I was able to work with a world class leader who I learned a tremendous amount from. So he was he's a legend of the CIA and it was just such a such a delight to work for him.
The other thing that I did as a leader, I became the first woman and the deputy chief level of our large, cryptanalysis organization. And I didn't think anything of it at the time. First of all, I was an engineer going in there. So that was scary to the cryptanalysis. community, having an engineer of their own No, and, and but I was the first woman I didn't realize I didn't even it didn't even occur to me until one of the people said, you know, we're all watching you. You're the first it's like, oh, wow, never even considered that. So it was it was a wonderful a wonderful assignment for me. The other things that I did that were interesting is I got to participate in some special special activities and special projects, one of which was when the EP-3 went down in Hainan Island in 2001. I was assigned to a team to evaluate that to understand the damage, you know, determine the damage that had been done through that. I in doing that, you know, we wrote a report this fascinating, fascinating because I got to work with the Navy, and I got to meet my mentor.
And the other thing that I did was that I -- was because of my expertise in doing this, when the Snowden affair took place, you know, a number of years later, I was called upon to lead the internal NSA work to figure out the same type of thing. You know, what, what could he have taken and what kind of damage was had had happened as a result. So, that was fascinating, hard, hard work. Next slide
My advice for for students moving in or for students and anybody seeking a STEM career is, as I think Kathy said the same thing, take the hard courses, find those really hard courses. You may not get an A, it's okay. But that background is so important. I remember I took calculus in high school, and then when I went into college, and I breezed through it, it was so it was easy. So I thought I had a great calculus teacher in high school that helped me gain experience. Look for every internship you can have. I do a lot of review of scholarships now. And high school students have such wonderful opportunities for internships, technical internships, in companies and government organizations. Take advantage of those opportunities. Or find a Cooperative Education Program. Find a mentor. For me as a woman at NSA going up to the senior ranks there were no there were not there were very few women who were in the senior ranks. And I kept wanting to find that mentor who would be somebody like me married with children as a senior was really hard to find that person. I remember that person was helping me do it said you'd now have to be that woman since you had such a hard time finding the mentor. But I did end up with a great mentor and who I met through my EP-3 experience and you know he still works with me today. Take the hard assignments, taking that job at the CIA was a commute. I had to do combat driving for three years, but it was you know, it's a 50 mile commute from Severna Park to Langley. But you know what, it was the best experience and I just learned a tremendous about Mount about our mission. And other intelligence community missions.
And the other thing I always say and this is especially true for women is Find Your Voice find that way to even when you're it's being dominated so many times you sit in a room and and as a woman, it's really hard to speak up and say hey, I have something to say. But you have to you have to put yourself out there and I tell young women this all the time. I know it's uncomfortable. Do it. Say if the if they're going around and you're getting ignored you stop the meeting and say I have something to say it's really important to do that. Okay, next slide.
The epilogue, I guess to this is my next phase of the career and this is you know, it's so I want the opportunity to be to be able to talk about that. I was given the opportunity to become the first Chief Executive Officer of National Cryptologic foundation at the time it was a National Cryptologic Museum foundation. But we changed the name in the last year. And it's a tremendous opportunity. I didn't know what I was getting into. But I've learned a lot. So the mission of the NCMF is to educate the public and to bring along the next generation of students into STEM and cyber cyber related careers. So that's the primary you know, we work hard at doing that every day. The next is to stimulate, stimulate and innovate, we innovate a lot now too, public engagement and we want to serve as a venue for having some of those discussions that in the between the public and private sector, about things like privacy, about you know, NSA's mission and doing things like that. We have a we have a newly signed memorandum of agreement with the National Security Agency, and they're looking for us to be that private partner for their public engagement,
And then finally, of course, commemorate, and this is where a lot of our museum work goes on. And we want to commemorate and celebrate the work that has been done by those who went before us. That means support to the museum but doing other things as well to support the mission. Really exciting. Really exciting. Next phase of my career and we have so much more to do. That's my story.
Okay, thank you so much, Kathy and Laura That was wonderful. And you know, we're the Queen's of code are really dedicated to the work that you were doing in the cryptologic National Cryptologic foundation and you know, when we when we do speaking engagements we wanted to make sure that our whatever we earn and things like go to that it's support the STEM activities. So we are thinking and doing great things there and we want to help in any way we can. Just to end this upp, I just want to kind of reiterate what we're talking about careers in cybersecurity and STEM. There's so many opportunities for students to think about this militaire millions of openings right now. And they predict this to be so for the next 10 years or so. So there's plenty of time to get in on this activity. How you can prepare, we talked about taking, taking the course the hard courses in math, don't use excuse about math anxiety that you know, you can do it you can try and you know get help if you need help but don't just say you can't do it, give it a try. Look at there are a lot of new things online like coding and computer classes both at school and online. Activities. Even the scouts Boy Scouts and Girl Scouts now have cyber badges and they have hackathons where you can try your your skills.
So those are some of the things and also we're we're on social media and we have a website so you can follow us on Facebook at Queens of Code or check out our website and we're we're starting to tweet a little bit too. We're getting into that. So that's it for our formal question if they Diana, do you want to talk about the questions in the Yes, uh huh.
Um, thank you again, Eileen, and to Kathy and Laura. You definitely are the Queen's of code. There was some things I learned about you all that I hadn't heard before. So we're excited that the Maryland's Heritage Center now has heard more of your stories as part of herstory. The other thing I wanted to mention for the attendees is that this was recorded. And so in your email when I get it back from the cloud, or wherever it comes from later, I'll put it out there on the email.
So I know there were some folks that were not able to attend today. And I wanted to thank the panel today because they provided their stories for free and and also Eileen mentioned some that they had done before. With a foundation. And I want to thank those of you that made a donation. And that donation will be shared with the National Cryptologic foundation and with the Maryland Heritage Center to continue our work and exhibits as well. So with that, there is a question I'm seeing the chat box and the question is there are moves to legislate backdoors in encryption. Is this a good idea? If you want to respond to that someone?
Oh, that's a loaded question or what? Okay, I don't know if we're gonna be responding to some of the policy things like that. It's up to you if you want, I probably wouldn't respond to policy things, either to this. I just know, you know, all I will say is there's risk there's benefits and risks right. And you know, you have if you put a backdoor in that means there's a backdoor and somebody else can find your backdoor. So you got away that we got away but I'm you know, I'm not going to get into you know, stadium policy or anything like that. So we'll leave that to the legislators. Right. But and that is true today was all about you all in the Queen's and their stories at NSA and obviously now the CIA as well. And that's the only questions in the chat box right now, although I invited anyone to please have something in the chat box. If there is another question you would like to ask our guests today? If not, we'll give it a couple more minutes. And I didn't know if any of the any of the queens had any final comments and they didn't have a chance to do since we have a minute or two left. So I will say that, um, that the Cryptologic Museum has done some interesting interviews with six of our Queens is putting together a short film and they're going to be doing when the museum opens in the spring or early summer, they're going to be doing an exhibit about us. So we're, we're very excited about that. So hopefully, you'll be able to stop by and get some more in depth information. Right. And we're also we're also seeing a few more questions come in. So let's get to those. And I've also gotten quite a few Thank you. So that's I'm sure that's a standard response. So thank you again, and David's asking that he had heard about PL one in the 70s What was the language like? You need to calf calf you need to unmute yourself. There you go. There. Yes, Pl one was introduced in the in the 1970s. And it was sort of a break away from other languages that were more close to the bone I guess we used to call it you know very efficient in had limited amount of code. Pl one was one language that it created a lot of additional code like you would you would put your you you'd put your code in in the system and then PL one would build on that, for example. It would already automatically generate documentation associated with your code. So it was a very useful new language to use. The only issue that I really heard about was it was very bulky, it just generate, you know, huge program decks. And at that time, we didn't really have much online capability to generate code. So I other than the fact that it was what I would call kind of a bulky language in that it did provide a lot of additional information when you did your coding, but the information it was useful if it but even though that was one thing that I understood people kind of had a problem with, but other than that I it was just as good as any other language. And it was very versatile could be used for a variety of different systems and we used it to build a large system that was used overseas. So I found it very useful, and the documentation was easy. Thank you. And we have another question from Lisa. How did you deal with a bias against your being at the agency?
One of the things when we were doing the queens of Code project, we had our women fill out a pretty extensive questionnaire and I did want to know how how people felt about their career and whether they were, you know, treated differently because they were a woman. And we did get some some responses to that some people did have early on especially in the late 60s and early 70s Something that near the worker called mid century gender bias. Because sometimes, sometimes the women would the men would get like promoted over the women even though the you know, the the women were just as or more qualified, but there was actually a class action lawsuit in the early 70s. And one of the things that came out of that was that the that all promotion boards would have a woman and minority rep on the promotion boards, which was something new and that they would provide statistics about how the agency was doing and those two things really made a difference going on. But but most women felt or at least from the surveys that I taught that they were treated, treated well and they were respected and they were encouraged and you know, we were at an agency where it took a lot of investment even to get us hired because you had to pass security clearances and then they had to train you for about three years to learn the intelligence business. So certainly to their advantage that they keep all the good people that they could could so I think people had a lot of opportunities to move into to management or to take on big projects. And you know, it was a good place to work. It wasn't perfect, but I think people felt that it was a very good and also most of our women had 3040 50 year careers there. So I think that says a lot too. Right. Thank you. There's another question asking if either the organization's offer scholarships or training for students. Take that one. I think something that's not just that NSA offers this is a national offering. It's called scholarships, scholarships for service that sorry SFS, sometimes referred to as cyber core. This is something that students from across the nation can apply for their, you know, lots of lots of money in this, where they can apply for it's usually during the not in your freshman year, but to be your sophomore through senior year. You can apply for a scholarship and you have to then just give back a couple years of service to a public institution like a federal agency, but I think it'd be even going to a state government or or something like that as well. It is a tremendous, a tremendous program that I think so few so few people know about and that's really a way to get people to come into the national security arena and also pay for their education. The course the other one that NSA has has is the Stoke scholarship. So that those are really prestigious scholarships, where where we go out and we try to bring in the best and brightest and really pushing to bring our underserved communities to the table for that and that is a full ride for four years with a stipend as well. Very competitive, but we've you know, we've had some great graduates to come out of that program. Thank you. Kailyn has a question and what are your ideas for helping narrow the disparities among African Americans in STEM? I think that I think really, I've been doing some research on this too, and I think early early on in the 50s and 60s at NSA, particularly that agency and most government agencies did not have a real good record with permit with opportunities, although there certainly were some women and men of color at NSA, but about in the 80s we had a really wonderful person who was head of the EO in the women's program. Her name was Minnie Kenny, and many Kenny spent time working with
some of the legislators and they set up a special program that went to the starkly black colleges and offered scholarships and really worked with students there to get them on the track so they would be competitive for those STEM, STEM type jobs and they really made in the 80s and 90s, at least when I was there, and I did some stuff in recruiting to the agency really made a big effort and and saw some improvements, did statistics because they had to go back and report to Congress how they were doing so you know, it's still I think it's still a one on one thing, getting students knowing that they can do it, having them have opportunities and programs that may be offered mentorship while they're in college, to help them get into the right courses, but we're hoping that our stories will reach them too and in our piece of code, there are several women of color who we have been able to get their oral histories and tell their stories to so I think I think that's encouraging. I think I can mention, I think I mentioned earlier that we have a portable stem exhibit of women and that's fairly diverse. And we've taken that to schools and other programs. And we've also worked with the Applied Physics Lab when they were doing girl power in person and that was again for hands on experiences. And many of the companies in this area and agencies brought young women in engineers as role models to so that all the Queen's of code have some fabulous stories historically. We also know that young women like to see younger, younger people in those roles today. So there's there's some things are going on in that community as well. I want to take just a couple more questions here. I know we started a smidge late and I think Amy is asking when the panel when you realize that you were doing what you were doing was something future generations of women could benefit from. Well, for projects, I mean, I I knew that when we were back in the 70s when we were working with all the greatest and latest technology that we were doing something really special and we were we were pioneers back then. But we really because of the security things that we had talked about, we really couldn't tell our stories, but it was just in the last two or three years that I guess I realized that how little there was out there and that if I could tell our stories it would be it would be motivating for for students to to hear about it. So it's been the last two or three years that that I've seen that like Liza Mundy and and the wonderful Hidden Figures movie that came out so those two are motivating me to say, you know, let's let's pull this together and get everybody's stories out there. So and that is asking if you know what's the percentage of women today versus the 20 to 10% in the early days. You have ideal NSA. I don't know NSA but in the workforce of there's less than 20% of women who are getting like computer science related degrees. So that's that's a low number but they are they are working. A lot of the universities are working with having programs to encourage more women. But yeah, that's an area that really needs some work. Right? I don't know what NSA record is right now there. I'm sure it's posted online somewhere too. But if we figure that find that well, we'll share that with you as well. And it was an interesting comment from Ellen and she worked with the Navy supporting NSA in the building of the hardware weren't many women and that was an interesting endeavor. So I'm sure she has some stories to share as well. And Susan is also mentioning the AAUW, which is the Association of America University women. They're also a valuable tool for students pursuing STEM education. Thank you, Susan for reminding us of AAUW. And there were many, many, many, many Thank you comments that were here in the chat box. So I want to say what a difference it's made. We're so glad that we have a recording of this. We had hoped to have more teachers that were available to join, but again, I'll share it to our contacts at the State Department of Education. And now that we have the recording as well. So with that, let me mention one more thing. This this program was being simulcast by the Internet Society. And they're going to make an archived version available on their website so that if teachers want to use it in their classroom or students just want to take it as a you know, an after Simon and writing report, I understand right that it should be available.
That will be great. Alright, and and to everyone that joined us today. I want to say thank you so much for coming. I'll be honest, I was a little worried today because the weather and power failures and ice storms, but Mother Nature was at least partially smiling on us today. And I want to thank again the Queen's of code for being with us and for whatever we do together in the future. And for the rest of you. Stay well. And we'll see you on one of our next events. Have a good evening. Thank you all for coming. Queenswood stay on for a Minute.