Published on CIA FOIA (foia.cia.gov) (https://www.cia.gov/readingroom)


NATIONAL SECURITY AGENCY NATIONAL SENIOR CRYPTOLOGIC COURSE (CY 600) WEDNESDAY, 4 APRIL 1979

Document Type: 
CREST [1]
Collection: 
General CIA Records [2]
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP83-00156R001100010017-7
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
5
Document Creation Date: 
December 15, 2016
Document Release Date: 
September 26, 2003
Sequence Number: 
17
Case Number: 
Publication Date: 
April 4, 1979
Content Type: 
AG
File: 
AttachmentSize
PDF icon CIA-RDP83-00156R001100010017-7.pdf [3]163.12 KB
Body: 
STAT Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7 Next 1 Page(s) In Document Exempt Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7 Approved Fo*ease 2004/01/29: CIA-RDP83-00151100010017-7 NATIONAL SECURITY AGENCY NATIONAL SENIOR CRYPTOLOGIC COURSE (CY 600) Wednesday, 4 April 1979 Room 1 A 07 0930-0940 0940-1040 1050-1150 1150-1245 STAT Welcome An Overview of CIA The Role of CIA in Signals Intelligence Special Programs Officer Office of Training Senior Briefing Officer Office of Training ref, Program Analysis Staff, SIGINT Technical Support to Operations Office of Technical Service The. Directorate of Operations Collection Tasking Concluding Remarks Associate Deputy Director for Operations Theodore G. Shackley Associate Deputy to the DCI for Collection Tasking Admiral (Ret.) Stansfield Turner Director of Central Intelligence The participants in this briefing are cleared for SITK Office of Training ST ST ST ST Approved For Release 2004/01/29 : CIA-RDP83-00156R001100010017-7 STAT Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7 Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7 -a> Approved For ease 2004/01/29: CIA-RDP83-00156 1100010017-7 26 February 1979 NATIONAL SENIOR CRYPTOLOGIC COURSE (CY-600) The purpose of the National Senior Cryptologic Course is improvement of cryptologic operations. The course is designed to provide potential leaders in the National Security Agency and Central Security Service (NSA/CSS) and -selected key officials from appropriate government agencies and departments with the understanding and perspective necessary to improve cryptologic management and use cryptologic resources most effectively and in coordination with the overall efforts of the Intelligence Community. COURSE DESIGN AND OBJECTIVES 1. The learning objectives for CY-600 are: a. Demonstrate the relationship of the Cryptologic Community to other government agencies, the role of cryptology in national intelligence policy making, its impact on the various categories of national intelligence, and its use in the technical processes of intelligence. b. Provide an understanding of the major policy and doctrine governing Signals Intelligence (SIGINT) and Communications Security (COMSEC) operations. c. Survey the SIGINT operational process with emphasis on policy and management aspects. d. Present the techniques for managing Signals Intelligence and Communications Security resources at the higher levels. 2. A resume of the schedule for the seven-week course follows: a. The first week is comprised of the review of the fundamental cryptologic skills which are inherent in the SIGINT process. The first week is designed to give students who are not normally involved in SIGINT operations an understanding of the basic disciplines and terminology of SIGINT. b. The second week and part of the third week is devoted to an examination of the relationship of NSA/CSS to the Intelligence Community and the process through which requirements are generated and specific tasks are 'assigned for collection purposes. The nature of the intelligence threat to the U.S. will also be considered. Additionally, the subject of planning and programming of SIGINT and COMSEC resources and the current budgeting procedures is covered in some detail. c. Following the examinations of the Intelligence Community and NSA/CSS relationship the students will have the opportunity to hear and question senior NSA managers from the SIGINT production organizations. This will provide the managerial information necessary to evaluate specific SIGINT programs discussed later in the course by area and problem experts. Approved For Release 2004/01/29 : CIA-RDP83-00156RO01100010017-7 Approved For ease 2004/01/29: CIA-RDP83-001561100010017-7 d. The fourth week of the course begins the discussion of the SIGINT Operational Process. This includes information on tasking, collection, processing, analysis, and reporting. Individual presentations will emphasize particular operational areas and programs. The emphasis will be on the changing nature.of SIGINT operations and the often highly technical responses NSA/CSS has had to adopt in reaction to an increasingly complex communications world in an era of fiscal austerity. The consideration of the technical aspects of SIGINT operations will continue into the fifth week and will then be followed by consideration of particular analytic areas and problems such as indications and warning intelligence, language analysis problems, crypt- analysis, and problems in reporting SIGINT information to the members of the Intelligence Community. e. The sixth week of the course is devoted to the Service Cryptologic -Agencies (SCA's). The chiefs of each of the SCA's will explain the unique aspects of each service's cryptologic operations. The problems of providing SIGINT support to the military commander by the SCA's and by NSA will also be considered in some depth. f. The final week of the course will provide the students with an overview of the Communications Security (COMSEC) mission and operations of NSA and will complete the picture of the total responsibilities of NSA. g. During weeks two through six of the course senior officials of the Intelligence Community will appear before the class to provide the students with the viewpoint of the highest level of management in the Intelligence Community. Time will be sufficient for speakers to interact with members of the class. h. At various times during the course, the students will make field trips to CIA, NPIC, and the Pentagon as well as selected visits to NSA operational areas in the SIGINT operations, COMSEC, and R&D organizations. i. A final aspect of the course is the required briefing from each student. Since National Senior Cryptologic Course students are a diverse and knowledgeable group, the students themselves represent a valuable -learning resource. By sharing their own unique areas of knowledge with their fellow students, the class benefits from this resource in an organized manner. Approved For Release 2004/01/29 : CIA-RDP83-00156R001100010017-7 2

Source URL: https://www.cia.gov/readingroom/document/cia-rdp83-00156r001100010017-7

Links
[1] https://www.cia.gov/readingroom/document-type/crest
[2] https://www.cia.gov/readingroom/collection/general-cia-records
[3] https://www.cia.gov/readingroom/docs/CIA-RDP83-00156R001100010017-7.pdf