(UNTITLED)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78-05795A000600010038-9
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
2
Document Creation Date:
December 12, 2016
Document Release Date:
December 14, 2001
Sequence Number:
38
Case Number:
Publication Date:
October 23, 1964
Content Type:
NOTES
File:
Attachment | Size |
---|---|
![]() | 162.31 KB |
Body:
1/22 A-R_DP78-05795A0006M010038-9
Comments are keyed. to Item No. on Syllabus:
1. The guest speaker and who follows him should be integrated for this
presentation. Probably t_s will require presence during the intro-
duction to assure that the s-ame theme is not reintroduced in a different context
(and don't think that 'an't happen in this business!)
1'?1y original thought on the keynote speaker was that of a senior OPFRPT IONS OFFICER.,
not a. "senior expert" as currently outlined. The name checker serves the Op,,rations
Officer, and this is where the operati -ns officer with name, fame, and position
fits into this course.
II. 1 {rankly, I think this is a bit short. We shall have to see as time goes on,
25X1A9a but I know (and he is his own critic on this score) and his
predi:iction for being fascinating for hours at a time. It would be a pity to
out him too short if he has brought together a collection of really good. examples
for this presentation..
:;Z' . The CS Auxiliary Indices linked to the outdated Chapter IV of the Handbook
is an important part of this presentation, but I rather doubt that one can give
a definitive discussion of interest to all or nearly all students. For example:
i^W.p spite of effort to charge the student with enthusiasm,, the direct learning
of the nature of the various indices will lose its impact when indices of particular
arc:;. divisions of no interest to the student he thinks are under discussion.
25X1A I would suggest that the GICS Systems, etc. are an integral
part of this study, and as the current sc .e u e brings these in after the
real exercise and practice of the name ch33ck. process, some of these items will
not be exercised in the proper context. What I an saying is that although the
GICS n-, systems are collation tools, the are also useful tools for name traces,
25X1A in certain circumstances. As for the they too should be consulted
certain name traces. Thus, I believe that Item XIII and Item IV should be
presented together and at the earlier portion of the course. Thus, if we bring
irlese two elements together, we are also provided the opportunity for an enlarged
discussion on the responsibility of the name tracer to be constantly on the alert
for other sources of information and to "learn the terrain over which he operates."
(This latter item does not seem to be emphasized directly in any of the items of
the current syllabus).
(unnumbered, but mentioned as item 1500-1700 on Tuesday ":film on Name Tracing")
25X1A9a have just reviewed the film clip as ordered by T believe it is an
excellent instruction tool, not only for the introduction to the material available
in OC.R./13io, etc., but it also demonstrates research procedure, and should be
emphasized. in this context. I can imagine that about an hour's discussion on
this in both thee- ;'Lc and practical context should be .sisa linked between
:h the film and ti-.L, ;name trace cycle" presentations. We also note that the Intelligence
25X1A School, 0is now publishing a revised edition of their pamphlet
i ntellt~;e,ace ~esearc z 1rocedures and Techniques" which outliner -theoretical
and rractical in searching for information, I use this pamphlet in guy CI Pam
to illustrate both n me tracing and investigation and the mental processes that
go ir:,o each, as well as certain aspects of organization of work, pre-planning
;phases 4p& : ''Roil ase k6k/O ~h P~~ ~9 ~0~0 9?
C, j
Approved For Release-2002/01/23 : CIA-RDP78-05795A0006O010038-9
XI. I can only endorse the Practical Exercise as outlined herein. I suggest though,
acid refer you to the two comments above, where? believe that according to
the brief syllabus., we have not really prepared t student to organize his mind
and h is work prior to going into the exercise .)roper. The "lecture objectives"
outlined herein are proper., but further annotation is necessary to the effect
That a resume of preceding material on organizing material and organizing the
name tracers attitude toward his task must be brought it. Weiay even suggest that
a separate block., preceding NIX XT be inserted to provide for this resume and
attitude briefing. As we proceed further into thus item we come to Block 3
.which -indicates that we will L :ell for some time on derogatory and pertimtt
information. I again endorse and add my own weight to this important item, but
unless really significant time is given to this, we may find it taking a light
weight position. 1 believe that one of the biggest p robl.ems in nart tracing today
is not the lack of knowledge of where to find information (although the Almighty
knows that t is lac':_ is great enough) but in a lack of knowledge of whit to look
for in the documents. A recent conversation with a supervisor in RID/CE illuminated
for me the fact that in replying to the community that this element has a 'Very
'a.g problem in disciplining analysts to the intelligence approach rather than the
legal or moral approach as to what constitutes significant information about a
person. We should also note for ourselves that the tone of this syllabus and
indeed the course, is toward Counterintelligence name traces. We must assure that
the naterial in t^.is and other blocks also emphasizes the pertinent information
concerning cont_tits, other possible sources of information, access'--- competence,
capacity., etc. factors as applied to the person being considered for Fl tasks
and CA tasks, etc.
Approved For Release 2002/Q1l2 i A RDP78-05795A000600010038-9