NATIONAL SECURITY AGENCY NATIONAL SENIOR CRYPTOLOGIC COURSE (CY 600) WEDNESDAY, 4 APRIL 1979
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP83-00156R001100010017-7
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
5
Document Creation Date:
December 15, 2016
Document Release Date:
September 26, 2003
Sequence Number:
17
Case Number:
Publication Date:
April 4, 1979
Content Type:
AG
File:
Attachment | Size |
---|---|
![]() | 163.12 KB |
Body:
STAT
Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7
Next 1 Page(s) In Document Exempt
Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7
Approved Fo*ease 2004/01/29: CIA-RDP83-00151100010017-7
NATIONAL SECURITY AGENCY
NATIONAL SENIOR CRYPTOLOGIC COURSE (CY 600)
Wednesday, 4 April 1979
Room 1 A 07
0930-0940
0940-1040
1050-1150
1150-1245
STAT
Welcome
An Overview of CIA
The Role of CIA in
Signals Intelligence
Special Programs Officer
Office of Training
Senior Briefing Officer
Office of Training
ref, Program Analysis
Staff, SIGINT
Technical Support
to Operations
Office of Technical
Service
The. Directorate
of Operations
Collection Tasking
Concluding Remarks
Associate Deputy
Director for Operations
Theodore G. Shackley
Associate Deputy to the
DCI for Collection
Tasking
Admiral (Ret.)
Stansfield Turner
Director of
Central Intelligence
The participants in this briefing are cleared for SITK
Office of Training
ST
ST
ST
ST
Approved For Release 2004/01/29 : CIA-RDP83-00156R001100010017-7
STAT Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7
Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7
-a>
Approved For ease 2004/01/29: CIA-RDP83-00156 1100010017-7
26 February 1979
NATIONAL SENIOR CRYPTOLOGIC COURSE (CY-600)
The purpose of the National Senior Cryptologic Course is improvement of
cryptologic operations. The course is designed to provide potential leaders
in the National Security Agency and Central Security Service (NSA/CSS) and
-selected key officials from appropriate government agencies and departments
with the understanding and perspective necessary to improve cryptologic
management and use cryptologic resources most effectively and in coordination
with the overall efforts of the Intelligence Community.
COURSE DESIGN AND OBJECTIVES
1. The learning objectives for CY-600 are:
a. Demonstrate the relationship of the Cryptologic Community
to other government agencies, the role of cryptology in national intelligence
policy making, its impact on the various categories of national intelligence,
and its use in the technical processes of intelligence.
b. Provide an understanding of the major policy and doctrine
governing Signals Intelligence (SIGINT) and Communications Security (COMSEC)
operations.
c. Survey the SIGINT operational process with emphasis on policy
and management aspects.
d. Present the techniques for managing Signals Intelligence and
Communications Security resources at the higher levels.
2. A resume of the schedule for the seven-week course follows:
a. The first week is comprised of the review of the fundamental
cryptologic skills which are inherent in the SIGINT process. The first week
is designed to give students who are not normally involved in SIGINT operations
an understanding of the basic disciplines and terminology of SIGINT.
b. The second week and part of the third week is devoted to an
examination of the relationship of NSA/CSS to the Intelligence Community and
the process through which requirements are generated and specific tasks are
'assigned for collection purposes. The nature of the intelligence threat to
the U.S. will also be considered. Additionally, the subject of planning
and programming of SIGINT and COMSEC resources and the current budgeting
procedures is covered in some detail.
c. Following the examinations of the Intelligence Community and
NSA/CSS relationship the students will have the opportunity to hear and
question senior NSA managers from the SIGINT production organizations. This
will provide the managerial information necessary to evaluate specific SIGINT
programs discussed later in the course by area and problem experts.
Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7
Approved For ease 2004/01/29: CIA-RDP83-001561100010017-7
d. The fourth week of the course begins the discussion of the SIGINT
Operational Process. This includes information on tasking, collection,
processing, analysis, and reporting. Individual presentations will emphasize
particular operational areas and programs. The emphasis will be on the
changing nature.of SIGINT operations and the often highly technical responses
NSA/CSS has had to adopt in reaction to an increasingly complex communications
world in an era of fiscal austerity. The consideration of the technical
aspects of SIGINT operations will continue into the fifth week and will then
be followed by consideration of particular analytic areas and problems such
as indications and warning intelligence, language analysis problems, crypt-
analysis, and problems in reporting SIGINT information to the members of the
Intelligence Community.
e. The sixth week of the course is devoted to the Service Cryptologic
-Agencies (SCA's). The chiefs of each of the SCA's will explain the unique
aspects of each service's cryptologic operations. The problems of providing
SIGINT support to the military commander by the SCA's and by NSA will also
be considered in some depth.
f. The final week of the course will provide the students with an
overview of the Communications Security (COMSEC) mission and operations of
NSA and will complete the picture of the total responsibilities of NSA.
g. During weeks two through six of the course senior officials of the
Intelligence Community will appear before the class to provide the students
with the viewpoint of the highest level of management in the Intelligence
Community. Time will be sufficient for speakers to interact with members
of the class.
h. At various times during the course, the students will make field
trips to CIA, NPIC, and the Pentagon as well as selected visits to NSA
operational areas in the SIGINT operations, COMSEC, and R&D organizations.
i. A final aspect of the course is the required briefing from each
student. Since National Senior Cryptologic Course students are a diverse
and knowledgeable group, the students themselves represent a valuable
-learning resource. By sharing their own unique areas of knowledge with
their fellow students, the class benefits from this resource in an organized
manner.
Approved For Release 2004/01/29 : CIA-RDP83-00156R001100010017-7
2