Anda di halaman 1dari 34

Operations Subject Index

ABCDEFGHIJKLMNOPQRSTUVWXYZ

A
Abel, Col. Rudolf Ivanovic aka William (Willy) August Fisher biography, Stud. Intel. Special Unclass. Ed., Fall 2000:137-148 PDF [811.6KB*] exchanged for Soviet prisoner Francis Gary Powers, Stud. Intel. V9:3-97-100 PDF [169.6KB*] Agent operations, general see also Agent operations, handling see also Agent operations, recruitment see also Counterintelligence (CI) see also Cover see also Defectors see also Interrogation see also Soviet operations, general covert communications Adolf Tolkachev in Moscow, 1977-85, use by, Stud. Intel. V47:3-13-14, 20-21 PDF [1.7MB*] avoiding detection of radio receivers, Stud. Intel. V7:4-57-60 PDF [177KB*] communications techniques employed behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*] pigeons, value of, Stud. Intel. V5:2-A35-A-41 PDF [346KB*] hotels, use of, Stud. Intel. V9:4-43-56 PDF [702KB*] psychological assessment Arabs, importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*] Cubans, psychological factors to consider, Stud. Intel. V8:3-40-41 PDF [357KB*] handwriting analysis, use of, Stud. Intel. V3:3-23-43 PDF [1MB*]; Stud. Intel. V3:3-45-51 PDF [334KB*]; Stud. Intel. V47:3-10 PDF [1.7MB*] of Soviet defector, Adolf Tolkachev, Stud. Intel. V47:3-10-12 PDF [1.7MB*] Vietnamese, potential psychological vulnerabilities for operational purposes, Stud. Intel. V12:4-5771 PDF [961.5KB*] women as agents, a senior European intelligence opinion (1930s), Stud. Intel. V6:2-A1-A5 PDF [228KB*] tradecraft Bloc services in East Berlin post-World War II, techniques used, Stud. Intel. V6:2-A21-A33 PDF [673KB*] disguise, use of, Stud. Intel. V46:1-67-70 PDF [152.3KB*] John Andre's handling of Benedict Arnold, 1779, Stud. Intel. V5:3-A1-A15 PDF [763KB*] Moscow, surveillance detection in, Stud. Intel. V47:3-14-15, 21-22 PDF [1.7MB*] subliminal behavior, potential of, Stud. Intel. V2:2-65-69 PDF [277KB*] tools and techniques for pinpointing targets, Stud. Intel. V11:3-77-84 PDF [443.2KB*] training see Training

volunteers in Moscow, determining A. Tolkachev's bona fides, Stud. Intel. V47:3-5-8 PDF [1.7MB*] walk-in sources, preponderance of during World War II in Bern, Stud. Intel. V37:5-66-68 PDF [1.6MB*] Agent operations, handling see also Agent operations, general see also Counterintelligence (CI), techniques and tactics Arabs importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*] recommendation of book to better understand them, Stud. Intel. V18:3-29-32 PDF [217.2KB*] cold war exploits, Stud. Intel. V3:3-1-14 PDF [695KB*] contact instructions, importance of for emergencies, Stud. Intel. V37:5-57 PDF [1.1MB*] Cubans: psychology pointers when handling, Stud. Intel. V8:3-35-41 PDF [357KB*] Czech assassination team, World War II, Stud. Intel. V4:1-1-19 PDF [938KB*] false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*] hypnosis, use of, Stud. Intel. V4:1-51-64 PDF [714KB*] improvisation in operations, Stud. Intel. V20:4-27-29 PDF [163.9KB*] infiltration and exfiltration balloons as an agent infiltration vehicle (1951), Stud. Intel. V15:1-103-107 PDF [232.2KB*] exfiltration of a blown source, Operation Cicero (World War II) example, Stud. Intel. V1:4-47-53 PDF [351KB*] submerged submarine coastal infiltration, Stud. Intel. V6:3-25-28 PDF [171.8KB*]; Stud. Intel. V7:2-A13-A17 PDF [220KB*] successful fly-by exfiltration device, Stud. Intel. V38:5-99-109 PDF [746KB*] Lao tribesmen, cash incentives, Stud. Intel. V17:1-1-7 PDF [566.0KB*] Latin American sources, tendency to express hopes as facts, Stud. Intel. V7:4-31-32 PDF [102KB*] motivation through use of Sears catalogue prizes (Vietnam), Stud. Intel. V37:2-59-61 PDF [395.4KB*] ship personnel in denied areas (1960s), Stud. Intel. V10:1-45-55 PDF [542KB*] Soviet assets of US intelligence Adolf Tolkachev, high level CIA Soviet S&T source, 1977-1985, Stud. Intel. V47:3-5-33 PDF [1.7MB*] Colonel Oleg V. Penkovskiy (GRU), Stud. Intel. V13:2-29-30 PDF [566.2KB*] Soviet experience KGB agent vetting procedures, Stud. Intel. V15:1-117 PDF [349.3KB*] operational doctrine, 1960, Stud. Intel. V9:1-63-80 PDF [925KB*] Soviet practices, case of Ernst Andersson, Swedish naval NCO (1949-51), Stud. Intel. V6:4-A29A41 PDF [705KB*] tradecraft for avoiding detection, Stud. Intel. V8:2-65-91 PDF [1.3MB*] volunteers Soviet doctrine, with examples, for handling walk-ins and write-ins (1964), Stud. Intel. V8:1-16-47 PDF [1.7MB*] write-ins, dealing with, Stud. Intel. V6:4-A1-A2 PDF [723KB*]

Agent operations, recruitment see also Agent operations, general see also Counterintelligence (CI), techniques and tactics Arabs, importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*] "cold" approaches, drawbacks of, Stud. Intel. V37:5-57 PDF [1.1MB*] Cubans, psychological factors to consider, Stud. Intel. V8:3-40-41 PDF [357KB*] East European officials as targets, Stud. Intel. V6:3-47-54 PDF [442KB*] German scientists and intellectuals, post World War II, Stud. Intel. V3:3-1-14 PDF [695KB*] hotel personnel, value of, Stud. Intel. V9:4-43-56 PDF [702KB*] insurgent forces, within/against, Stud. Intel. V12:2-77-79 PDF [959.9KB*] Japanese World War II intelligence veterans, US use of in cold war, Stud. Intel. V11:1-67-70 PDF [166.4KB*] scientific targets, importance of scientific assets to gain access to, Stud. Intel. V6:4-38-39 PDF [538KB*] ship personnel in denied areas (1960s), Stud. Intel. V10:1-45-55 PDF [542KB*] Soviet Bloc experience see also Soviet operations, general, recruitment operations Bloc intelligence services in East Berlin post-World War II, techniques used, Stud. Intel. V6:2-A7A20 PDF [623KB*] GRU, spotting and recruiting of Stig Wennerstrom, Stud. Intel. V18:3-33-35 PDF [191.1KB*] KGB field recruiting procedures, Stud. Intel. V15:1-116-117 PDF [349.3KB*] KGB recruitment of a European embassy clerical in Moscow, Stud. Intel. V13:2-87-106 PDF [951.2KB*] KGB success against homosexuals, Stud. Intel. V7:2-45-65 PDF [1.1MB*] [Top of page]

B
Bibliographies 1950s, annotated, Stud. Intel. V5:2-A51-A60 PDF [455KB*] early 1960s, annotated, Stud. Intel. V8:1-A31-A42 PDF [530KB*] Soviet espionage, 1945-1961, indexed by country and cases, Stud. Intel. V6:2-A35-A47 PDF [516KB*] Bissell, Richard, Deputy Director of Plans (DDP) impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801.1KB*] review of his autobiography, Stud. Intel. Winter 1998/99:103-111 PDF [645.6KB*] British intelligence, pre-World War II Benjamin Franklin's private secretary in Paris as British spy, Stud. Intel. V5:1-A53-A67 PDF [757KB*] intelligence organization before and during a war (1874), Stud. Intel. V7:4-A19-A24 PDF [272KB*] Jesuit agent in reformation England, Stud. Intel. V5:2-A43-A50 PDF [371KB*]

British intelligence, World War II covert communications behind enemy lines, Stud. Intel. V2:4-55-60 PDF [272KB*] Czech exile operations in London, Stud. Intel. V7:2- A1-A11 PDF [593KB*] double agent cases, Stud. Intel. V18:1-25-40 PDF [954.1KB*] merging paramilitary and intelligence collection efforts in one organization, reasons for, Stud. Intel. V6:1-73-80 PDF [394KB*] Secret Intelligence Service (SIS), dealings with the Danish underground, Stud. Intel. V6:4-A63A66 PDF [165KB*] Special Operations Executive (SOE) dealings with the Danish underground, Stud. Intel. V6:4-A63-A66 PDF [165KB*] failures, Stud. Intel. V6:1-73-80 PDF [394KB*] support of French resistance, Stud. Intel. V11:2-103-105 PDF [298.0KB*] weapons intelligence sources and analysis, World War II, Stud. Intel. V6:3-55-76 PDF [973KB*] [Top of page]

C
Casey, William J., DCI, 1981-1987 Iran-Contra controversy, Stud. Intel. V39:5-93-94 PDF [135.2KB*] last month as DCI, description of, Stud. Intel. V39:5-93-94 (1996) PDF; Stud. Intel. V39:5-75-91 PDF [1.4MB*] Office of Strategic Services (OSS) exploits against Nazi Germany, Stud. Intel. Summer 2000, No. 9:39-40 PDF [1.3MB*] transition team operations, Stud. Intel. Summer 2000, No. 9:105-107 PDF [175.3KB*] Central Intelligence Agency (CIA), general see also Central Intelligence Agency (CIA), history see also Directorate of Operations (DO), general see also Directorate of Operations (DO), history to 1959 "invisible government" charge, Stud. Intel. V8:4-109-110 PDF [231KB*] leadership development, doctrine and practices, 1950s, Stud. Intel. V2:3-1-6 PDF [295KB*] organizational evolution 1947-72, as seen by the DDA/Controller Lawrence "Red" White, Stud. Intel. Winter 1999/2000:29-41 PDF 1975 suggestions for organizational change and oversight, Stud. Intel. V19:2-1-8 PDF [469.9KB*] call for integrating intelligence collection and analysis on Soviet strategic forces into one unit (1961), Stud. Intel. V5:1-1-7 PDF [474KB*] Clandestine Service: origins, organization and development, Stud. Intel. V12:1-68-71 PDF [1.1MB*] covert action, importance of in early years, Stud. Intel. V39:5-25-34 PDF [801.1KB*] Publications Review Board, Stud. Intel. V41:5-1-8 PDF [727.0KB*] personalities Colonel Lawrence "Red" White, Executive Director-Controller, Stud. Intel. Winter 1999/2000:2941 PDF [1.1MB*] Lt. Gen. Vernon A. Walters, DDCI, 1972-1976

see Walters, Lt. Gen. Vernon A., DDCI, 1972-1976 Central Intelligence Agency (CIA), history see also Central Intelligence Agency (CIA), general Berlin, center of intelligence war between the West and Soviets during Cold War, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769.1KB*] joint committee to oversee CIA, attempts to establish, Stud. Intel. V10:3-31-41 PDF [502KB*] origins of and precursors to CIA, Stud. Intel. V2:1-1-5 PDF; Stud. Intel. V8:3-55-94 PDF [2.1MB*] birthing pains, Stud. Intel. V37:5-73-79 PDF [1.3MB*] Central Intelligence Group (CIG), Stud. Intel. V10:2-1-19 PDF [1020KB*]; Stud. Intel. V12:1-5574 PDF [1.1MB*];Stud. Intel. V12:4-73-94 PDF [1.2MB*]; Stud. Intel. V39:3-49-57 PDF National Security Act of 1947, politics of, Stud. Intel. V13:1-33-56 PDF [1.2MB*] Office of Strategic Services(OSS) see Office of Strategic Services (OSS) William J. Donovan, contributions to see Donovan, General William J. "the Pond," relations with a semi-private US intelligence organization named, Stud. Intel. V48:375-82 PDF [189.2KB*] Classification system declassification policies, arguments for and against, Stud. Intel. Winter/Spring 2001, No. 10:55-61 PDF [553.4KB*]; Stud. Intel. Winter/Spring 2001, No. 10:63-67 PDF [419.9KB*] history of and suggested criteria for, Stud. Intel. V37:1-33-35 PDF [475.8KB*] Colby, William E., DCI, 1973-1976 evaluation of his tenure, Stud. Intel. Semiannual Ed., No. 1, 1997: 1-7 PDF [549.8KB*] OSS exploits, Stud. Intel. Winter 1999/2000:53-60 PDF review of biography of, Stud. Intel. V47:4-77-82 PDF [50.0KB*] Collection guidance see also Collection management see also Collection operations see also Directorate of Operations (DO) - analyst relations see also Intelligence Community relations see also Interrogation see also Reporting analyst evaluation in the 1950s, Stud. Intel. V3:1-47-49 PDF [910KB*] business reports, assessing for intelligence information, Stud. Intel. V2:2-47-52 PDF [309KB*] clandestine collection, guidance for, Stud. Intel. V3:2-81-93 PDF [664KB*] collector - analyst relations direct contact, value of, Stud. Intel. V3:2-81-93 PDF [664KB*] early post- World War II period, Stud. Intel. V3:1-37-52 PDF [910KB*] East-West exchanges, value of, Stud. Intel. V2:3-63-70 PDF [433KB*] headquarters collection guidance specialist, responsibilities of (1958), Stud. Intel. V2:2-33-40 PDF [704KB*]

military attaches, Soviet obstacles to collection by (1950s), Stud. Intel. V4:3-71-77 PDF [380KB*] outdated conventional weapons, importance of collecting on, Stud. Intel. V9:4-13-17 PDF [220KB*] practices and problems (1950s), Stud. Intel. V3:1-37-52 PDF [910KB*] Priority National Intelligence Objectives (PNIOs) in the 1950s, Stud. Intel. V3:1-41-43 PDF [910KB*] as used by DIA in 1962, Stud. Intel. V7:4-33 PDF [395KB*] requirements management process in 1960, Stud. Intel. V4:4-43-61 PDF [1MB*] scientific method, application of, Stud. Intel. V6:4-37-48 PDF [538KB*] Soviet military prospects (1981), Stud. Intel. V7:4-33-40 PDF [395KB*] State Department organization and procedures for collection guidance (1958), Stud. Intel. V2:2-4045 PDF [704KB*] traveler "snapshots", Stud. Intel. V5:2-17-23 PDF [363KB*] Collection management see also Collection guidance clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*] coordination of PHOTINT, SIGINT and HUMINT for weapons intelligence collection, World War II, Stud. Intel. V6:3-55-76 PDF [973KB*] Cuban Missile Crisis, 1962, all source tasking/analysis, Stud. Intel. V11:3-3-4 PDF [814.8KB*] exploitation of delegation interpreters, Stud. Intel. V4:1-21-27 PDF [406KB*] German scientists and intellectuals (post World War II), Stud. Intel. V3:3-1-14 PDF [695KB*] technical collection: intercepted Western Union Telegraph traffic, Stud. Intel. V2:3-81-101 PDF [1MB*] Hungarian refugee screening and interviewing program (1958), Stud. Intel. V2:1-85-93 PDF [481KB*] imagery, meeting military needs for, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*] "irregular" wars, collection needs for, Stud. Intel. V39:2-51-59 PDF [630.2KB*] Science attach Program, limited value of, 1960s, Stud. Intel. V10:2-21-27 PDF [310KB*] terrain intelligence, need for and use of, Stud. Intel. V3:4-81-86 PDF [279KB*] Collection operations see also Human Source (HUMINT) collection see also Technical collection operations clandestine collection techniques in non-Western societies, 1950s, Stud. Intel. V3:3-15-21 PDF [355KB*] Foreign Broadcast Information Service (FBIS) see Foreign Broadcast Information Service (FBIS) Soviet bloc, late 1950s, Stud. Intel. V2:2-53-58 PDF [308KB*] Soviet factory markings in mountainous Afghanistan, collecting (1960s), Stud. Intel. V11:2-79-88 PDF [677.3KB*] COMINT see SIGINT (Signals Intelligence)

Committee for State Security (KGB) see Soviet operations, KGB Communications support KGB agent cipher system in 1953, Stud. Intel. V5:5-A15-A28 PDF [533.7KB*] KGB pouch and electronic communications (1971), Stud. Intel. V15:1-115 PDF [349.3KB*] OSS radio operator behind German lines, 1944, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*] Congressional relations, general investigations of CIA Guatemala coup, 1954, Stud. Intel. Winter/Spring 2001, No. 10:23-31 PDF [718.5KB*] use of/assistance to Nazi war criminals (1977), Stud. Intel. Semiannual Ed., No. 1, 1997: 103-109 PDF [578.1KB*] NSA, investigations of telegram intercept program, Stud. Intel. Winter 1999/2000:43-51 PDF Congressional relations, oversight activities CIA Inspector General, statuary status, Stud. Intel. Winter/Spring 2001, No. 10:15-21 PDF [505.7KB*] CIA Legislative Counsel, reflections, 1949-1970, Stud. Intel. Winter/Spring 2001, No. 10:42-43 PDF [1.1MB*] covert action operations, congressional approval of, Stud. Intel. V36:5-21, 25 PDF [1.8MB*] history of and laws enacted 1976-96, Stud. Intel. Semiannual Ed., No. 1, 1997: 97-102 PDF [476.2KB*] House Permanent Select Committee on Intelligence (HIPSCI), Chairman's thoughts about (1974), Stud. Intel. V18:2-15-20 PDF [293.1KB*] investigations of CIA, mid-1970s: Rockefeller commission, Church and Pike Committees, Stud. Intel. V20:2-1-15 PDF [1.1MB*] joint committee, history of attempts to establish, Stud. Intel. V10:3-31-41 PDF [502KB*] of the National Security Agency (NSA), Stud. Intel. Winter/Spring 2001, No. 10:85-94 PDF [778.4KB*] oversight committees, main concerns of (1968-74), Stud. Intel. V18:2-1-14 PDF [971.7KB*] Pike Committee report, Stud. Intel. Winter 1998/99:86-87 PDF [940.6KB*] sources and methods, protection of, Stud. Intel. V2:4-72-74 PDF [708KB*] see Security, source protection Counterinsurgency operations see also Counterintelligence (CI), cases, post-World War II Belgian Congo, operations against Simba rebels, 1964, Stud. Intel. Winter 1999/2000:17-21 PDF British experience efforts against the IRA, 1919-1920, Stud. Intel. V13:1-69-78 PDF [463.7KB*] in Kenya, Stud. Intel. V3:1-137-140 PDF [215KB*] counterintelligence (CI) in counterinsurgency combatant identification, use of metal tracing kits, Stud. Intel. V11:4-37-44 PDF [351.4KB*] ideal CI program against insurgents in Latin America, sketch of, Stud. Intel. V12:2-65-81 PDF [959.9KB*] techniques used by insurgent groups against government forces, Stud. Intel. V12:1-39-53 PDF

[842.7KB*] OSS Jedburgh teams, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*] preventive, reactive, aggressive, and remedial measures involved, Stud. Intel. V9:4-57-63 PDF [319KB*] Singapore's People's Association as a counter to potential urban insurgency, Stud. Intel. V12:4-4755 PDF [874.6KB*] Vietnam, Stud. Intel. V11:4-37-44 PDF [351.4KB*] interrogation of a captured North Vietnamese intelligence officer, Stud. Intel. V48:1-45-58 PDF [283.8KB*] Order of Battle (OOB) information from NVA "defectors", Stud. Intel. V17:1-1-7 PDF [478.5KB*] US paramilitary activities in Laos during Vietnam war, Stud. Intel. V47:1-1-17 PDF [922.2KB*] Counterintelligence (CI), cases: post-World War II counterespionage (1960s), Stud. Intel. V7:2-67-72 PDF [303KB*] Soviet GRU spy in Sweden, use of surveillance to uncover, Stud. Intel. V6:4-A40-A41 PDF [704.9KB*] US cases and counterespionage activities CI efforts in Vietnam, 1967, Stud. Intel. V13:2-34-36 PDF [566.2KB*] Edward Lee Howard, former CIA employee, probable KGB agent, Stud. Intel. V47:3-32 Stud. Intel. V19:2-35-38 PDF [231.5KB*] Soviet illicit technology transfer, Stud. Intel. V39:5-121-126 PDF [460.3KB*] Counterintelligence (CI), history Benjamin Franklin's doctrine (1770s), Stud. Intel. V9:2-85-88 PDF [124KB*] Czech experiences Czechoslovak intelligence service operations, World War II, Stud. Intel. V3:2-31-45 PDF [1.2MB*] Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A13 PDF [723KB*] intelligence service operations, late 1930s, Stud. Intel. V2:4-93-103 PDF [572KB*] early disorganization of US counterintelligence (early 1950s), Stud. Intel. V13:2-30-32 PDF [566.2KB*] German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-3554 PDF [1MB*] German fabrications/provocations in 1945-48, detection by US, Stud. Intel. V37:5-81-90 PDF [1.6MB*] German success against British SOE units in World War II, reasons why, Stud. Intel. V6:1-73-80 PDF [394KB*] Irish Republican Army (IRA) penetration of British intelligence, 1919-1920, Stud. Intel. V11:1-6978 PDF [463.7KB*] Japanese CI coup against an Australian/Portuguese covert action operation, 1942, Stud. Intel. V4:4-A23-A27 PDF [246KB*] Polish resistance efforts against German and Soviet occupying forces during World War II, Stud. Intel. V2:3-107-116 PDF [522KB*] West German chief of Intelligence, account of defection to East Germany, Stud. Intel. V4:4-1-26 PDF [1.9MB*]

Counterintelligence (CI), policy and theory call for greater effort (1960s), Stud. Intel. V7:3-15-37 PDF [1.2MB*] counterespionage, aggressiveness key to good CI, Stud. Intel. V13:2-26-29 PDF [566.2KB*] definitions, doctrine, and goals Benjamin Franklin's doctrine (1770s), Stud. Intel. V9:2-85-88 PDF [124KB*] definition and description of, Stud. Intel. V2:4-87-92 PDF [287KB*] KGB CI doctrine outlined, Stud. Intel. V7:2-45-65 PDF [1.1MB*] ten principles for good CI, Stud. Intel. Fall/Winter 2001, No. 11:81-87 PDF [856.5KB*] information warfare, definition and defense against, Stud. Intel. Semiannual Ed., No. 1, 1997: 4956 PDF [576.6KB*] James Angleton, conspiracy theories on, Stud. Intel. V38:5-129-134 PDF [713.1KB*] liaison, importance of with national law enforcement forces, Stud. Intel. V13:1-15-22 PDF [921.8KB*] national CI service, potential organization, functions and legal basis of, Stud. Intel. V13:1-9-24 PDF [921.8KB*] political costs of "excessive" security, Stud. Intel. Winter/Spring 2001, No. 10:11-12 PDF [1.1MB*] Soviet scientific exchanges, need for limits on (1960s), Stud. Intel. V7:1-25-30 PDF [341KB*] Counterintelligence (CI), techniques and tactics audio surveillance, Stud. Intel. V4:3-39-46 PDF; Stud. Intel. V13:2-32 PDF [566.2KB*] countering agent radio communications, equipment for (1950s & 60s), Stud. Intel. V10:1-57-67 PDF [449KB*] Czech experiences Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A13 PDF [723KB*] techniques used by Czech intelligence service, late 1930s, Stud. Intel. V2:4-93-103 PDF [572KB*] dogs' sensitivity to human scent and its CI possibilities/hazards, Stud. Intel. V5:2-25-37 PDF [645KB*] double agents British cases in World War II, Stud. Intel. V18:1-25-40 PDF [954.1KB*] hazards of recruiting and running, Stud. Intel. V6:1-57-72 PDF [818KB*] value and problems of, Stud. Intel. V13:2-31 PDF [566.2KB*] entrapment through friendship, Stud. Intel. V10:3-77-80 PDF [107KB*] forgeries and fabrications detecting fabricators/provocations in Germany 1945-48, Stud. Intel. V37:4-81-90 PDF [1.6MB*] detecting fake photographs, Stud. Intel. V13:1-57-67 PDF [510.7KB*] false documentation, detection of, Stud. Intel. V4:1-37-49 PDF [713KB*] forgeries, spotting crude ones in Africa and Latin America, Stud. Intel. V19:1-13-21 PDF [440.0KB*] suspect documents, laboratory analysis of, Stud. Intel. V4:3-47-55 PDF [480KB*] hypnosis, limits of, Stud. Intel. V4:1-51-64 PDF [714KB*] identi-kit, use of for identication, Stud. Intel. V4:1-29-35 PDF [324KB*] KGB, field cases managed by headquarters elements, Stud. Intel. V15:1-117 PDF [349.3KB*] record keeping, proposed computerized name index system (1962), Stud. Intel. V6:2-1-17 PDF [771KB*]

Russian exile CI methods and successes (1905-1914), Stud. Intel. V11:4-83-100 PDF [911.8KB*] spotting signs of CI interest, Stud. Intel. V13:4-50-53 PDF [1.2MB*] Countersabotage German sabotage in US (World War I) and its impact on society, Stud. Intel. V46:1-3-9 PDF [384KB*] Counterterrorism see also Counterinsurgency operations Australia: enhanced counterterrorism effort, Stud. Intel. V48:1-27-38 PDF [157.7KB*] bioterrorism, problem of publishing dual-use research on, Stud. Intel. V48:3-57-61 PDF [2.3MB*] countersabotage, Stud. Intel. V7:2-67-72 PDF [303KB*] Russian operations against terrorist exiles, 1880-1909, Stud. Intel. V11:1-71-86 PDF [795.1KB*] Cover Bloc services in East Berlin in the 1950s and 1960s, techniques used, Stud. Intel. V6:2-A7-A20 PDF [623KB*] false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*] historical examples Bloc restitution missions in West Germany as cover for intelligence activity, 1945-1949, Stud. Intel. V5:2-39-43 PDF [223KB*] circumvention of Treaty of Versailles restrictions on German rearmament, Stud. Intel. V4:2-A31A38 PDF [416KB*] improvised: fishing trip while collecting Soviet data in Afghanistan, 1966, Stud. Intel. V11:2-79-88 PDF [677.3KB*] non-official cover exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1998/99:107-110 PDF [1.3MB*] pros and cons discussed, Stud. Intel. V11:1-61-65 PDF [237.1KB*] Soviet manual on, Stud. Intel. V8:3-17-33 PDF [956KB*] official cover KGB, embassy cover considerations, Stud. Intel. V15:1-116 PDF [349.3KB*] Soviet cover operation for sending missiles to Cuba (1962), Stud. Intel. V46:1-50-51 PDF [569.3KB*] travel advice for the TDYer, Stud. Intel. V13:3-93-95 PDF [302.8KB*] paramilitary action operations, key cover elements in planning, Stud. Intel. V5:2-A51-A60 PDF [455KB*] tradecraft argument opposed to going "native", Stud. Intel. V2:3-43-44 PDF [108KB*] behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*] techniques and tactics under hostile interrogation, Stud. Intel. Spring 1998:17-21 PDF [4MB*] Covert action operations, cases paramilitary (PM) operations Afghanistan, against al-Qaeda terrorist organization (2001-2002), Stud. Intel. Winter 1998/99:92101 PDF [737KB*] Cuba, Bay of Pigs, 1961: results of CIA's internal probe, Stud. Intel. Winter 1998/99:92-101 PDF

[737KB*] Guatemala, 1954, Stud. Intel. Winter/Spring 2001, No. 10:23-31 PDF [719KB*] Laos, air operations in (1955-74), Stud. Intel. Winter 1999/2000:71-86 PDF Laos, defense of a USAF radar outpost in (1966-68), Stud. Intel. V38:5-79-88 PDF [818KB*] Laos, experiences of a first tour officer in (mid-1960s), Stud. Intel. V47:1-1-17 PDF [922KB*] political action operations Alfred Frenzel, West German Socialist Deputy and Czech IS agent, Stud. Intel. V6:2-A32-A33 PDF [673.0KB*] Chile, CIA covert action in the 1964 and 1970 elections, Stud. Intel. V36:5-21, 25 PDF [1.8MB*]; Stud. Intel. V47:3-35-49 PDF [901KB*] Congress for Cultural Freedom, the first two years, Stud. Intel. V38:5-89-98 PDF [736KB*] Soviet activities KGB activities in protection/support of Soviet trade, Stud. Intel. V7:2-45-65 PDF [1.1MB*] NKVD and the assassination of Polish POWs, 1940, Stud. Intel. Winter 1999/2000:61-70 PDF Soviet manipulation of Kwame Nkrumah, 1957, Stud. Intel. V11:3-10-11 PDF [814.8KB*] Covert action operations, general see also Counterinsurgency operations see also Denial and Deception (D&D) operations criticism of, by Pike Committee, 1974-1976, Stud. Intel. Winter 1998/99:87-88 PDF [941KB*] insurgents, harassment of through covert operations, Stud. Intel. V12:2-71-74 PDF [959.9KB*] paramilitary (PM) operations cover elements to consider in planning, Stud. Intel. V5:3-31-35 PDF [286KB*] value of having PM and intelligence capabilities in one organization, Stud. Intel. V6:1-73-80 PDF [394KB*] political action operations as a byproduct of intelligence operations and as a source of intelligence, Stud. Intel. V5:3-49-55 PDF [403KB*] CI role in discovering and exposing hostile activity, Stud. Intel. V13:1-19 PDF [921.8KB*] DCI views of importance of, 1967, Stud. Intel. V11:3-6-13 PDF [814.8KB*] French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831.3KB*] propaganda operations as a byproduct of intelligence operations and as a source of intelligence, Stud. Intel. V5:3-49-55 PDF [403KB*] CI role in discovering and exposing hostile activity, Stud. Intel. V13:1-19 PDF [921.8KB*]; Stud. Intel. V13:2-32 PDF [566.2KB*] Soviet Bloc account of European resistance movements, Stud. Intel. V5:5-A47-A50 PDF [166.5KB*] Soviet bloc forgeries, 1956-58, Stud. Intel. V5:1-25-51 PDF [1.5MB*] Soviet distortion of US intelligence organs and operations, Stud. Intel. V4:3-A19-A26 PDF [392KB*] Soviet efforts (1950s-1960s) to discredit CIA, Stud. Intel. V6:1-29-55 PDF [1.4MB*] Covert action operations, historical examples (World War II and prior) see also Covert action operations, general

biblical lesson: agent of influence restores David to the throne, Stud. Intel. V13:2-21-24 PDF [153.5KB*] Czech team assassinates Nazi chief of security apparatus, 1942, Stud. Intel. V4:1-1-19 PDF [938KB*] inadvertent contributions by war correspondents (propaganda and deception), Stud. Intel. V20:165-69 PDF [312.8KB*] Office of Strategic Services (OSS) and unconventional fighting in Burma, 1944, Stud. Intel. V5:1A1-A27 PDF [1.3MB*] postal forgeries, use of ( "Operation Cornflakes"), Stud. Intel. V4:3-57-69 PDF [592KB*] US efforts to win Azores base rights from Portugal in World War II, Stud. Intel. V18:4-59-60 PDF [123.0KB*] Covert action operations, policy and theory definition and elements of, Stud. Intel. V46:3-15-22 PDF [378KB*] importance of in early years, Stud. Intel. V39:5-25-34 PDF [801KB*] information warfare, definition and use of, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56 PDF [577KB*] paramilitary operations, risk of contaminating battlefield intelligence, Stud. Intel. V48:2-68-69 PDF [29.9KB*] political action operations Soviet KGB doctrine and examples, Stud. Intel. V7:2-45-65 PDF [1.1MB*] US guidelines for formulating, Stud. Intel. V36:5-19-31 PDF [1.8MB*] Crisis management individual and group behavior Congo, 1964, rescue of downed case officer, Stud. Intel. Winter 1999/2000:21-28 PDF Iran: US hostages experience, 1979-81, Stud. Intel. Spring 1998:1-45 PDF [4MB*] negotiating with a skyjacker, Stud. Intel. V16:3-53-63 PDF [486.5KB*] organizational behavior coup and counter-coup in Indonesia, 1965, Stud. Intel. V14:2-13-29 PDF [840.9KB*] Soviet behavior in Moscow during Cuban missile crisis, Stud. Intel. V37:5-105-109 PDF [394KB*] Cuba Bay of Pigs, 1961 possible reasons for failing to cancel invasion, Stud. Intel. Winter 1998/99:107-110 PDF [646KB*] results of CIA's internal probe, Stud. Intel. Winter 1998/99:92-101 PDF [737KB*] Cuban agent operations handling, Stud. Intel. V8:3-35-41 PDF [357KB*] psychological factors, Stud. Intel. V8:3-40-41 PDF [357KB*] Missile crisis, 1962 collection management, Stud. Intel. V11:3-3-4 PDF [814.8KB*] D&D operations undertaken by Soviets to conceal the emplacement of missiles, Stud. Intel. V46:149-58 PDF [569KB*] reporting from Moscow, Stud. Intel. V37:5-105-109 PDF [394KB*] U-2, Soviet view of impact of flights, Stud. Intel. Winter 1998/99:13-14 PDF [819KB*]

refugees and defectors 1960s Florida operations, Stud. Intel. Winter/Spring 2001, No. 10:49-53 PDF [373KB*] debriefing of, Stud. Intel. V11:3-3-4 PDF [814.8KB*] [Top of page]

D
Defectors cases A. Tolkachev, determining his bona fides, Stud. Intel. V47:3-5-8 PDF [1.7MB*] Col. Vladimir I. Vetrov, code name "Farewell," French-run Soviet defector-in-place, Stud. Intel. V39:5-121-126 PDF [460KB*] Otto John, psychological explanation for defections, Stud. Intel. V5:2-45-50 PDF [336KB*] Soviet defectors as sources of Japanese military intelligence, Manchuria, 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*] Soviet migrs and defectors, writings by and about, Stud. Intel. V38:5-129-137 PDF [713KB*] walk-in sources, World War II in Bern, Stud. Intel. V37:5-66-68 PDF [1.2MB*] word to replace term "defector", Stud. Intel. V9:1-61 PDF [41.5KB*] write-ins, dealing with, Stud. Intel. V6:4-A1-A2 PDF [723KB*] Denial and Deception (D&D) operations CI operations, important element in, Stud. Intel. V13:2-31 PDF [566.2KB*] definition and description of, Stud. Intel. V14:1-19-22 PDF [760.8KB*] exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1999/2000:1-16 PDF historical examples (World War II and prior) Allied efforts to deceive Germans in World War II, Stud. Intel. V20:1-53-64 PDF [808KB*] British double agent cases, Stud. Intel. V18:1-25-40 PDF [954.1KB*] Civil War: Union army operation allowing Confederate interception of signal flag messages, 1863, Stud. Intel. V10:4-74-79 PDF [1.3MB*] jamming of German bombing radar, 1940s, Stud. Intel. V6:3-60-76 PDF [973KB*] Japanese compromise of Australian/Portuguese covert operation in eastern Timor, 1943, Stud. Intel. V4:4-A23-A27 PDF [246KB*] postal forgeries, use of ( "Operation Cornflakes"), Stud. Intel. V4:3-57-69 PDF [592KB*] Indian success in hiding nuclear tests, Stud. Intel. Summer 2000, No. 9:97-98 PDF [592KB*] photographic fakery described, Stud. Intel. V13:1-57-67 PDF [510.7KB*] Soviet practice see also Soviet operations, general Czechoslovak invasion, 1968, Stud. Intel. V14:1-19-34 PDF [760.8KB*] D&D operations undertaken by Soviets concerning Cuban missile crisis (1962), Stud. Intel. V46:149-58 PDF [569KB*] disinformation re CIA involvement in the death of President Kennedy, Stud. Intel. Fall/Winter 2001, No. 11:5-17 PDF [1.7MB*] false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*] KGB doctrine and examples, Stud. Intel. V7:2-45-65 PDF [1.1MB*] managed in the field by headquarters elements, Stud. Intel. V15:1-117 PDF [349.3KB*]

nuclear weapons program, D&D measures to protect, Stud. Intel. V48:2-1-11 PDF [1.9MB*] US CI and deception program to counter Soviet illicit technology transfer efforts, Stud. Intel. V39:5-121-126 PDF [460KB*] Director of Central Intelligence (DCI) Congressional relations, re: protection of sources and methods, Stud. Intel. V2:4-72-74 PDF [708KB*] Former DCIs Admiral Roscoe H. Hillenkoetter see Hillenkoetter, Admiral Roscoe H., DCI, 1947-1950 Allen Dulles see Dulles, Allen, DCI, 1953-1961 General Hoyt S. Vandenberg see Vandenberg, General Hoyt S., DCI, 1946-1947 General Walter Bedell Smith see Smith, General Walter Bedell, DCI, 1950-1953 Richard Helms see Helms, Richard, DCI, 1966-1973 Porter J. Goss., DCI, 2004-2005 see Goss, Porter J., DCI, 2004-2005 survey of DCIs, 1946-1992, Stud. Intel. V38:1-49-59 PDF [38.3KB*] transition team for DCI Casey (1981), Stud. Intel. Summer 2000, No. 9:97-98 PDF [592KB*] Directorate of Operations (DO) - analyst relations see also Reporting in the field CIA map of Moscow, Stud. Intel. Semiannual Ed., No. 1, 1997: 111-114 PDF [273KB*] successful clandestine overseas operation with factory markings staff, Stud. Intel. V11:1-33-39 PDF [325.0KB*] at Headquarters healthy rivalry between, Stud. Intel. V11:3-14-15 PDF [814.8KB*] HUMINT reporting, need for analysts to be skeptical of, Stud. Intel. V8:4-93-98 PDF [294KB*] sourcing problems collector evaluations, Stud. Intel. V5:3-37-47 PDF [552KB*] Cuban Missile Crisis (1962), Stud. Intel. V8:4-93-98 PDF [294KB*] Directorate of Operations (DO), general see also Central Intelligence Agency (CIA), general see also Congressional relations, oversight activities see also Directorate of Operations (DO) - analyst relations Clandestine Service, origins and development of, Stud. Intel. V12:1-68-71 PDF [1.1MB*] DO culture, improved status of women, Stud. Intel. V46:3-15-22 PDF [378KB*] domestic collection, Cuban refugee debriefing efforts (1959-61), Stud. Intel. Winter/Spring 2001, No. 10:49-53 PDF [373KB*] ELINT (Electronic Intelligence) collection, DO role in early years (1958), Stud. Intel. V2:1-78-79 PDF [633KB*]

foreign commercial organizations as espionage targets, negative aspects of, Stud. Intel. V37:5-1723 PDF [990KB*] personalities Desmond Fitzgerald, DD/P, impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801KB*] Harriette "Tee" Thompson, pioneer in improving status of women in the DO, Stud. Intel. V46:345-53 PDF [469KB*] James Angleton, controversial CI Staff chief, Stud. Intel. V38:5-129-134 PDF [713KB*] Richard L. Holm, first tour paramilitary case officer in Laos (1962-64), Stud. Intel. V47:1-1-17 PDF [922KB*] Stephan Haller, case officer extraordinaire, Stud. Intel. V3:3-1-14 PDF [695KB*] Tracy Barnes, ADD/P, impact of career on CIA, Stud. Intel. V39:5-19-23 PDF relations with State Department: activities of "the Pond," a semi-private US intelligence organization, Stud. Intel. V48:3-75-82 PDF [189KB*] relations with the media: permitting access to historical records, Stud. Intel. V39:2-1-5 PDF [780KB*] Directorate of Operations (DO), history to 1959 Trieste, operational activity, 1951-54, Stud. Intel. V37:5-53-58 PDF [1.1MB*] Donovan, General William J. see also Office of Strategic Services (OSS) career review by Allen Dulles, DCI, 1953-1961, Stud. Intel. V3:3-71-83 PDF [689KB*] promotes a central intelligence organization, Stud. Intel. V8:3-55-94 PDF [2.1MB*] World War II activities, Stud. Intel. V37:5-71-79 PDF [1.3MB*] Dulles, Allen, DCI, 1953-1961 comments upon receipt of the National Security Medal, 1961, Stud. Intel. V6:1-A1-A4 PDF [186KB*] espionage activity during World War I and World War II, Stud. Intel. V37:5-64-70 PDF [1.2MB*] Office of Strategic Services (OSS) activities in World War II acquisition of Ciano Papers (1945), Stud. Intel. V13:2-1-63 PDF [2.3MB*] assessment on cracking of German morale (1944), Stud. Intel. V9:1-81-90 PDF [440KB*] Fritz Kolbe (alias George Wood) espionage services, Stud. Intel. V10:1-69-96 PDF [1.1MB*] meeting with Nazi intelligence chief, Stud. Intel. V4:2-A26-27 PDF [1MB*] surrender of German armies in Italy, cables from Dulles on, Stud. Intel. V7:2-73-98 PDF [1.2MB*] Presidential relations: Eisenhower, Stud. Intel. V38:5-72-74 PDF [1MB*] reflections on by Col. Lawrence "Red" White, former EXDIR, Stud. Intel. Winter 1999/2000:35-38 PDF by Frank Wisner, Director of the Office of Policy Coordination, Stud. Intel. V8:1-A1-A16 PDF [789KB*] Soviet efforts to discredit, Stud. Intel. V6:1-29-55 PDF [1.4MB*] [Top of page]

ELINT (Electronic Intelligence) see SIGINT (Signals Intelligence) Ethics of intelligence professionals see also Professionalism integrity in operations need for personal integrity in operations officers, Stud. Intel. V39:5-25-34 PDF [801KB*] observations of DCI Helms, Stud. Intel. V11:3-15-16 PDF [814.8KB*] personal integrity in operations officers, need for, Stud. Intel. V39:5-25-34 PDF [801KB*] political action operations, need for ethical norms in planning, Stud. Intel. V36:5-19-31 PDF [1.8MB*] professional standards, call for codification of, Stud. Intel. V36:5-17 PDF [463KB*] protection of sources and methods legal basis for confidentiality of source identity, Stud. Intel. V2:4-61-74 PDF [708KB*] Publications Review Board, basic review guidelines, Stud. Intel. V41:3-1-8 PDF [614KB*] [Top of page]

F
Fisher, William (Willy) August see Abel, Col. Rudolf Ivanovic aka William (Willy) August Fisher Foreign Broadcast Information Service (FBIS) Gulf War operations in Tel Aviv, Stud. Intel. V36:5-1-3 PDF [358.5KB*] origins of and World War II years, Stud. Intel. Fall/Winter 2001, No. 11:33-43 PDF [1.4MB*] reorganization, 1947-1951, Stud. Intel. Winter 1999/2000:32-35 PDF Foreign intelligence organizations see also British intelligence, pre-World War II and World War II see also History of intelligence [various country entries] see also Soviet operations, general see also Soviet operations, GRU see also Soviet operations, KGB Australia, enhanced counterterrorism effort by, Stud. Intel. V48:1-27-38 PDF [157KB*] avoiding foreign recruitment, Stud. Intel. V10:3-77-80 PDF [170KB*] China, Communist "brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [168KB*] eastern Europe, problems of intelligence reform since end of cold war, Stud. Intel. V48:1-11-25 PDF [766KB*] French External Service (SDECE), surfacing to US of Col. Vladimir I. Vetrov ("Farewell"), Soviet KGB source by, Stud. Intel. V39:5-121-126 PDF [460KB*] Germany, memoir of General Reinhard Gehlen, Chief of BND, Stud. Intel. V16:3-89-98 PDF [461.1KB*] Israel, independent satellite intelligence produced by (1995), Stud. Intel. Winter/Spring 2001, No. 10:33-38 PDF [489KB*] Japan

1960s lag in foreign operations, Stud. Intel. V7:3-1-14 PDF [788KB*] World War II Japanese intelligence veterans' involvement in intelligence, security, and CI organizations, Stud. Intel. V11:1-67-70 PDF [166.4KB*] Foreign liaison operations counterintelligence (CI), importance to, Stud. Intel. V13:1-15-16 PDF [921.8KB*] OSS cooperation with Soviet intelligence, memos from Gen. Donovan regarding, Stud. Intel. V7:363-74 PDF [552KB*] [Top of page]

G
Goss, Porter J., DCI, 2004-2006 Aspin-Brown commission on roles and capabilities of the intelligence community, participation on, Stud. Intel. V48:3-14-15 PDF [524.3KB*] Graphological analysis see Handwriting analysis GRU see Soviet operations, GRU [Top of page]

H
Handwriting analysis psychological assessment, promise of, Stud. Intel. V3:3-23-43 PDF [1MB*]; Stud. Intel. V3:3-4551 PDF [334KB*] Harting, Arkadiy star of the Russian Okhrana foreign intelligence service until 1909, Stud. Intel. V11:1-71-86 PDF [795.1KB*] Helms, Richard, DCI, 1966-1973 appreciation of Helms as an intelligence professional, Stud. Intel. V46:4-35-43 PDF [520KB*] comments on by Col. Lawrence "Red" White, former EXDIR, Stud. Intel. Winter 1999/2000:40-42 PDF by DCI George Tenet (eulogy), Stud. Intel. V46:4-31-33 PDF [125KB*] review of his memoirs, Stud. Intel. V48:1-75-84 PDF views on basic principles of intelligence activity, Stud. Intel. V46:4-37-39 PDF [520KB*] James Angleton, chief of Counterintelligence Staff, Stud. Intel. V48:1-82-84 PDF [85.0KB*] secret services in America, role of, Stud. Intel. V11:3-1-16 PDF [814.8KB*] Watergate, Stud. Intel. V48:1-76-78 PDF [85.0KB*]

Yuri Nosenko as a Soviet defector, Stud. Intel. V48:1-78-82 PDF [85.0KB*] Hillenkoetter, Admiral Roscoe H., DCI, 1947-1950 role in National Security Act of 1947, Stud. Intel. V13:1-33-56 PDF [1.2MB*] History of intelligence see also Bibliographies see also Central Intelligence Agency (CIA), history see also Counterintelligence (CI), history see also Donovan, General William J. see also Military intelligence, history prior to World War II; Military intelligence, history, World War II see also Office of Strategic Services (OSS) see also SIGINT (Signals Intelligence), history prior to World War II; SIGINT (Signals Intelligence), history, World War II see also Soviet operations, general American Civil War and post-War African-American spies for Union forces, Stud. Intel. Winter 1998/99:73-80 PDF consequences of lost military order, Stud. Intel. V2:1-103-113 PDF [618KB*] first encrypted cable (1866), Stud. Intel. V36:5-105-109 PDF [692KB*] intelligence facts and myths, Stud. Intel. V10:3-81-96 PDF [837KB*]; Stud. Intel. V10:4-69-93 PDF [1.3MB*] "leaks" of military information, Stud. Intel. V9:4:75-76 PDF [67.9KB*] US intelligence collection operations against Napoleon III and Emperor Maximilian of Mexico, Stud. Intel. V2:3-81-101 PDF [1MB*] American Revolutionary War Benjamin Franklin's private secretary in Paris as British spy, Stud. Intel. V5:1-A53-A67 PDF [757KB*] French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831.3KB*] John Andre, Benedict Arnold's British case office, story of, Stud. Intel. V5:3-A1-A15 PDF [763KB*] Nathan Hale's failed mission, capture and execution, Stud. Intel. V17:4-67-74 PDF [532.7KB*] Biblical lesson: agent of influence restores David to the throne, Stud. Intel. V13:2-21-24 PDF [153.5KB*] Czech intelligence Czech exile operations in London, Stud. Intel. V7:2- A1-A11 PDF [593KB*] Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A2 PDF [723KB*] operation to assassinate Nazi chief of security apparatus, Stud. Intel. V4:1-1-19 PDF [938KB*]; Stud. Intel. V5:3-65-67 PDF [120KB*] operations, late 1930s, tradecraft, Stud. Intel. V2:4-93-103 PDF [572KB*] penetration of German Abwehr, Stud. Intel. V3:2-31-45 PDF [1.2MB*] Danish underground in World War II, Stud. Intel. V6:4-A63-A66 PDF [165KB*] French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831.3KB*] French resistance in World War II

anti-American, French version, Stud. Intel. V19:2-39-42 PDF [205.8KB*] Soviet Bloc version, Stud. Intel. V5:5-A47-A50 PDF [166KB*] German intelligence German interrogation/torture of OSS officer in Italy, Stud. Intel. V11:4-60-78 PDF [1.7MB*] German success against SOE units in World War II, reasons why, Stud. Intel. V6:1-73-80 PDF [394KB*] memoir of General Reinhard Gehlen, Chief of BND, Stud. Intel. V16:3-89-98 PDF [461.1KB*] sabotage activities in the US before World War I, Stud. Intel. V46:1-3-9 PDF [384KB*] Historical Intelligence Collection: world's largest, Stud. Intel. V37:5-91-94 PDF [593KB*] Irish Republican Army (IRA) operations against Britain 1919-1920, Stud. Intel. V11:1-69-78 PDF [464KB*] Japanese experience Japanese intelligence efforts against the USSR along the Manchurian border 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*] medieval Ninja warrior-spies, Stud. Intel. V9:2-45-52 PDF [357KB*] targeting Russia in Europe, Stud. Intel. V11:1-81-82 PDF [795.1KB*] Poland's World War II agent operations against German and USSR occupation forces, Stud. Intel. V2:3-107-116 PDF [522KB*] Russian experience Bolshevik's successful counterintelligence chief 1905-1914, Stud. Intel. V11:4-83-100 PDF [522KB*] Col. Alfred Redl, case of, Stud. Intel. V4:2-A43-A47 PDF [172KB*] Czarist use of non-Russian female agents, Stud. Intel. V9:3-59-78 PDF Czarist use of Russian female agents, Stud. Intel. V9:2-25-41 PDF [793.8KB*] Okhrana - history 1881-1917, Stud. Intel. V11:1-93-98 PDF [296KB*] Okhrana foreign operations, Stud. Intel. V11:1-71-86 PDF [795.1KB*]; Stud. Intel. V12:3-65-78 PDF [728.6KB*] Okhrana operations against Germany, Stud. Intel. V10:2-57-72 PDF [831KB*] Okhrana operations in West Europe, 1885-1905, Stud. Intel. V10:3-55-66 PDF [592KB*] penetration of OSS operation to infiltrate agents into Germany at end of World War II, Stud. Intel. V46:1-26-28 PDF [1.0MB*] World War II agent radio operations, allied and enemy, Stud. Intel. V3:1-125-132 PDF [390KB*] Australian/Portuguese covert action operation compromised by poor tradecraft, Stud. Intel. V4:4A23-A27 PDF [246KB*] capture of Nazi intelligence chief, 1945, Stud. Intel. V4:2-A11-A29 PDF [1MB*] COMINT loss causes Rommel's defeat at El Alamein, Stud. Intel. V3:4-73-80 PDF [405KB*] Dutch resistance organizations, Stud. Intel. Spring 1998:105-118 PDF [1.1MB*] FBI's Special Intelligence Service (SIS), bureaucratic history of, Stud. Intel. V48:1-45-58 PDF [932KB*] French agent (Jeannie de Clarens) reporting on German rocketry, Stud. Intel. V38:5-31-33 PDF [737KB*] French resistance efforts, Brittany, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*] German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-3554 PDF [1MB*] Norwegian sabotage of the Vemork heavy water plant, Stud. Intel. V36:5-82-90 PDF [2.3MB*]

Poland's World War II agent operations against German and USSR occupation forces, Stud. Intel. V2:3-107-116 PDF [522KB*] R.V. Jones and scientific intelligence, Stud. Intel. V38:5-27-36 PDF [737KB*] Soviet bugging of Teheran and Yalta conferences, Stud. Intel. V47:1-19-31 PDF [823KB*] Soviet deception operation against German Abwehr, Stud. Intel. V37:5-83-90 PDF [1.6MB*] US Army intelligence team operations in New Guinea and the Philippines, Stud. Intel. V3:4-87-92 PDF [292KB*] US efforts to win Azores base rights from Portugal in World War II, Stud. Intel. V18:4-59-60 PDF [122KB*] US Office of War Information (OWI) contribution to the Japanese surrender, Stud. Intel. V46:355-65 PDF [602KB*] Human source (HUMINT) collection see also Collection guidance see also Collection management attach reporting, value of, Stud. Intel. V4:2-1-6 PDF; Stud. Intel. V4:3-79-83 PDF [290KB*] clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*] debriefing Cuban refugees, Stud. Intel. V11:3-3-4 PDF [815KB*] delegation interpreters, exploitation of, Stud. Intel. V4:1-21-27 PDF [406KB*] East-West exchanges, value of, Stud. Intel. V2:3-63-70 PDF [433KB*] German scientists, engineers, and intellectuals as post-World War II sources, Stud. Intel. V3:3-114 PDF; Stud. Intel. V12:2-1 PDF [341.0KB*] Hungarian refugee screening and interviewing program (1958), Stud. Intel. V2:1-85-93 PDF [481KB*] hypnosis, limits of in interrogation, Stud. Intel. V4:1-51-64 PDF [714KB*] staff officers as collectors collection techniques as a Russian-speaking tourist in the USSR, Stud. Intel. V2:3-71-74 PDF [178KB*] gathering information on Soviet consumers, techniques used, Stud. Intel. V12:2-43-51 PDF [486.2KB*] Humor communications from cranks, etc., Stud. Intel. V9:3-79-89 PDF [498KB*] European Intelligence Chief's low assessment of women as agent material, Stud. Intel. V6:2-A1A5 PDF [228KB*] tortured prose in CS communications, Stud. Intel. V16:1-1-7 PDF [292.4KB*]; Stud. Intel. V17:233-37 PDF [239.1KB*] [Top of page]

I
Intelligence Community (IC) relations and activities Community reform, calls for by Lt. Gen. William Odom, former director of NSA, Stud. Intel. V48:2-67-68 PDF [29.9KB*] internal review and call for broad changes in post 9/11 world, Stud. Intel. V46:1-39-47 PDF

[463KB*] in mid-1970s: Rockefeller commission, Church and Pike Committees, Stud. Intel. V20:2-1-15 PDF [1.1MB*] mission-oriented centers with strong DCI, proposal for, Stud. Intel. V47:1-33-37 PDF [251KB*] cooperative efforts: interagency coordination, importance of in meeting military imagery needs, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*] interagency conflicts over assigning authority to CIA (1947), Stud. Intel. V13:1-33-56 PDF [1.2MB*] Intelligence failures Cuba, Bay of Pigs, results of CIA's internal probe concerning, Stud. Intel. Winter 1998/99:92-101 PDF [737KB*] Intelligence history see History of intelligence Intelligence humor see Humor Intelligence literature see Bibliographies Intelligence professionalism see Professionalism Intelligence successes case studies Adolf Tolkachev, high level CIA Soviet S&T source, 1977-1985, Stud. Intel. V47:3-5-33 PDF [1.7MB*] Col. Oleg Penkovsky, high level CIA GRU source, Stud. Intel. V13:2-29-30 PDF [566.2KB*] OSS mission to disrupt German rail traffic, Norway, April 1945, Stud. Intel. Winter 1999/2000:5360 PDF Polish Colonel Ryszard Kuklinski, Stud. Intel. Summer 2000, No. 9:19-33 PDF [1.3MB*] Soviet technology acquisition program, disruption of, Stud. Intel. V39:5-121-126 PDF [460KB*] U-2, development and contributions of, Stud. Intel. Winter 1998/99:1-4 PDF [311KB*] Interrogation as used by Communist interrogators, Stud. Intel. V13:4-49-74 PDF [1.2MB*] detecting lies and finding out why, an anecdote, Stud. Intel. V11:3-107-110 PDF [134.3KB*] drugs, general inefficacy in interrogations, Stud. Intel. V5:2-A1-A19 PDF [952KB*] German interrogation/torture of OSS officer in Italy, Stud. Intel. V11:4-60-78 PDF [1.7MB*] hostile interrogation by Iranian Revolutionary Guards 1979-81, Stud. Intel. Spring 1998:17-21 PDF [4MB*] successful resistance by a North Vietnamese intelligence officer, Stud. Intel. V48:1-45-58 PDF [284KB*] hypnosis, limits of, Stud. Intel. V4:1-51-64 PDF [714KB*]

persons under arrest, Stud. Intel V2:3-51-61 PDF [656KB*] Soviet and Chinese communist "brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [169KB*] techniques and tactics detecting fabricators/provocations in Germany 1945-48, Stud. Intel. V37:5-81-90 PDF [1.6MB*] used by South Vietnamese and American interrogators, Stud. Intel. V48:1-45-58 PDF [284KB*] [Top of page]

J
Jones, R. V., developer of British World War II technical intelligence, Stud. Intel. V38:5-27-36 PDF [737KB*] [Top of page]

K
KGB see Soviet operations, KGB Kuklinski, Ryszard Polish Colonel recruited by US, story of, Stud. Intel. Summer 2000, No. 9:19-33 PDF [1.3MB*] [Top of page]

L
Language, foreign experiences of Russian-speaking tourist in the USSR, Stud. Intel. V2:3-71-74 PDF [178KB*] spelling of foreign names, problem in name indexing, Stud. Intel. V6:2-1-17 PDF [771KB*] Legal issues see also Congressional relations, oversight activities confidentiality of sources, legal basis for, Stud. Intel. V2:4-61-74 PDF [708KB*] intelligence law CIA Inspector General, statutory status, Stud. Intel. Winter/Spring 2001, No. 10:15-21 PDF [506KB*] Foreign Intelligence Surveillance Act (1978), Stud. Intel. Winter/Spring 2001, No. 10:93-94 PDF [778KB*] international law re: a foreign government agent's liability under local law, Stud. Intel. V5:2-A21A34 PDF [701KB*] judicial oversight of intelligence activities since the mid-1970s, Stud. Intel. V39:5-43-50 PDF [635KB*] national CI organization, importance of potential legislation to establish, Stud. Intel. V13:1-9-11 PDF [921.8KB*]

Publications Review Board, legal basis and criteria for, Stud. Intel. V41:3-1-8 PDF [614KB*] unauthorized disclosure, need for better laws to prevent, Stud. Intel. V47:1-33-37 PDF [622KB*] women in the Directorate of Operations (DO), legal challenge to subordinate position of, Stud. Intel. V46:3-45-53 PDF [469KB*] Logistics analysis pioneer estimate by the OSS Research and Analysis Branch, Stud. Intel. V6:4-A15-A28 PDF [698KB*] [Top of page]

M
McCone, John A., DCI, 1961-1965 evaluation by Lawrence K. White, former DDA and EXDIR, Stud. Intel. Winter 1999/2000:38-40 PDF Military intelligence see also Soviet operations, GRU attach reporting, value of, Stud. Intel. V4:2-1-6 PDF; Stud. Intel. V4:3-79-83 PDF [290KB*] battlefield intelligence, limited value of for achieving victory, Stud. Intel. V48:2-67-68 PDF [29.9KB*] Berlin, center of intelligence war between the West and Soviets, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769KB*] CIA operational support NIST National Intelligence Support Team crisis support to the field commander, Stud. Intel. Winter 1999/2000:87-96 PDF Somalia, 1992, collection needs, Stud. Intel. V39:2-28-59 PDF [630KB*] collection guidance on conventional weapons, importance of, Stud. Intel. V9:4-13-17 PDF [220KB*] counterinsurgency see Counterinsurgency operations Cuban missile crisis, reporting from Moscow during, Stud. Intel. V37:5-105-109 PDF [393KB*] friendly forces in southern Laos (early 1970s), operations of, Stud. Intel. V17:1-11-19 PDF [566.0KB*] history prior to World War II Army attache reporting 1918-1939, poor quality of, Stud. Intel. V38:5-111-115 PDF [368KB*] British military intelligence, 1874, organization, use, and management of, Stud. Intel. V7:4-A19A24 PDF [271KB*] Civil War: facts and fiction 1861-63, Stud. Intel. V10:3-81-96 PDF; Stud. Intel. V10:4-69-93 PDF [1.3MB*] creation of first effective American military intelligence organization,1863, Stud. Intel. V10:4-7479 PDF [1.3MB*] history, World War II air-targeting support, Stud. Intel. V9:3-25-31 PDF [357KB*] British weapons intelligence sources and analysis, Stud. Intel. V6:3-55-76 PDF [972KB*]

capture of Nazi intelligence chief, 1945, Stud. Intel. V4:2-A11-A29 PDF [1.03MB*] European theater, relative value of combat intelligence sources in, Stud. Intel. V5:4-45-51 PDF [350KB*] human agent, patrol and photo intelligence in Burma theater, 1944, Stud. Intel. V5:1-A1-A27 PDF [1.3MB*] Japanese intelligence efforts against the USSR along the Manchurian border 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*] SIGINT, heavy use of in anti-submarine warfare, World War II, Stud. Intel. V7:2-A19-A23 PDF [218KB*] "the Pond," a US Army G-2 collection organization run by John Grombach, activities of, Stud. Intel. V48:3-69-75 PDF [189KB*] imagery, importance of at tactical and command levels, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*] KGB collection activity in war and peace, Stud. Intel. V7:2-45-65 PDF [1.1MB*] Operation Iraqi Freedom, revolution in military affairs (RMA) as demonstrated in (2004), Stud. Intel. V48:1-1-10 PDF [147KB*] prisoners: important source of combat intelligence, Stud. Intel. V5:4-45-46 PDF [350KB*] on the Soviet Union Cuban missile crisis, reporting from Moscow during, Stud. Intel. V37:5-105-109 PDF [394KB*] Soviet military S&T - reporting on by A. Tolkachev, 1977-85, Stud. Intel. V47:3-6, 18-19 PDF [1.7MB*] war plans, Stud. Intel. Summer 2000, No. 9:26-27 PDF [1.3MB*] wargames: value of 1950 Vieques island games, Stud. Intel. V4:2-A1-A9 PDF [396KB*] [Top of page]

N
National Security Agency (NSA) intercept operations in the United States discovery of telegram intercept program, Stud. Intel. Winter 1999/2000:43-51 PDF judicial and congressional oversight of, Stud. Intel. Winter/Spring 2001, No. 10:85-94 PDF [778KB*] National Cryptologic Museum, description of, Stud. Intel. V47:3-51-60 PDF [519KB*] [Top of page]

O
Office of Strategic Services (OSS) see also Donovan, General William J. agent reports Donovan reports for the President: Allen Dulles on cracking morale in German Foreign office and Abwehr (April 1944), Stud. Intel. V9:1-63-80 PDF [925KB*] Donovan reports for the President: possible OSS-NKVD collaboration, Stud. Intel. V7:3-63-74 PDF [552KB*]

Donovan reports for the President: surrender of the German army in northern Italy, Stud. Intel. V7:2-73-98 PDF [1.2MB*] Donovan reports to the President: Japanese peace feelers, Jan-Aug, 1945, Stud. Intel. V9:3-33-50 PDF [772KB*] France and Germany, reporting from behind enemy lines, Stud. Intel. V5:4-49-50 PDF [350KB*] surrender of German armies in Italy, cables from Bern on, Stud. Intel. V7:2-73-98 PDF [1.2MB*] debunking of OSS reminiscences, Stud. Intel. V8:1-A17-A20 PDF; Stud. Intel. V17:1-71-79 PDF [630KB*] operations, Asia: Detachment 101, operations in Burma, Stud. Intel. V4:3-A1-A13 PDF [609KB*]; Stud. Intel. V5:1-A7-A27 PDF [1.3MB*]; Stud. Intel. Fall/Winter 2001, No. 11:67-79 PDF [1.6MB*] operations, Europe and North Africa, general extraordinary exploits of naturalized German Jew, Stud. Intel. V3:3-1-8 PDF [695KB*] Holland, operations in from May 1944, Stud. Intel. Spring 1998:105-118 PDF [1.1MB*] Italian operations run out of Bern, Stud. Intel. V37:5-68-70 PDF [1.2MB*] Italian partisans, 1944, support to, Stud. Intel. Spring 1998:95-103 PDF [689KB*] Norway, disruption of German rail traffic in, Stud. Intel. Winter 1999/2000:53-60 PDF Operation Cicero, OSS involvement in, Stud. Intel. V1:4-47-53 PDF [351KB*] Yugoslavia, on Communist takeover of, Stud. Intel. V9:2-53-84 PDF [1.3MB*] operations, France Jedburgh teams, radio-operator's account behind enemy lines (Brittany, 1944), Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*] support to French resistance, Stud. Intel. V11:2-103-105 PDF [298KB*] operations, Germany Allen Dulles meeting with Nazi intelligence chief, Stud. Intel. V4:2-A11-A29 PDF [1MB*] Allen Dulles operations from Bern, Stud. Intel. V37:5-64-70 PDF [1.2MB*] Fritz Kolbe (alias George Wood) espionage services, Stud. Intel. V10:1-69-96 PDF [1.1MB*] Himmler's efforts to use OSS channels to broker a deal to overthrow Hitler, Stud. Intel. V46:1-3138 PDF [455KB*] London-based operation to infiltrate agents into Nazi Germany, Stud. Intel. V46:1-11-29 PDF [1MB*] tracking Nazi gold abroad, Stud. Intel. Summer 2000, No. 9:35-50 PDF [1.3MB*] William Casey and German operations, Stud. Intel. V37:5-74-75 PDF [1.3MB*] operations, USSR OSS and General Gehlen, Stud. Intel. V37:5-74-75 PDF [1.3MB*] possible OSS-NKVD collaboration, Stud. Intel. V7:3-63-74 PDF [552KB*] origins and demise CIG, movement of clandestine parts of OSS into, Stud. Intel. V12:1-68-71 PDF [1.1MB*] William J. Donovan, tribute to, by Allen W. Dulles, Stud. Intel. V3:3-71-83 PDF [689KB*] policies and politics: bombing strategy in Europe, Stud. Intel. V36:5-73-79 PDF [970KB*] Research and Analysis Branch, Stud. Intel. V6:4-A15-A28 PDF [698KB*]; Stud. Intel. V8:3-66-73 PDF [2.1MB*]; Stud. Intel. V37:5-71-79 PDF [1.3MB*] Operations management Laos, air operations in, (1955-74), Stud. Intel. Winter 1999/2000:71-86 PDF multi-agency CI study in Vietnam, Stud. Intel. V13:2-34-36 PDF [566KB*]

poor management, examples of: Laos, disaster due to over-centralized, remote control, Stud. Intel. V38:5-79-88 PDF [818KB*] SR-71, management of development effort, Stud. Intel. V15:1-1-25 PDF [1.8MB*] [Top of page]

P
Penkovskiy, Colonel Oleg V. (GRU) exploitation of, Stud. Intel. V13:2-29-30 PDF [566KB*] Personnel management see also Professionalism in the Directorate of Operations (DO) rescue and rehabilitation of injured case officer, Belgian Congo, 1964, Stud. Intel. Winter 1999/2000:21-28 PDF views on unaccompanied and divided overseas tours, Stud. Intel. V37:5-58 PDF [1.1MB*] in the KGB role of the Resident, Stud. Intel. V15:1-119-120 PDF [349KB*] staff recruitment, training, and promotion procedures, Stud. Intel. V15:1-117-119 PDF [349KB*] leadership development, doctrine and practices, 1950s, Stud. Intel. V2:3-1-6 PDF [295KB*] NOCs overseas: pros and cons of non-official cover, Stud. Intel. V11:1-61-65 PDF [237KB*] Powers, Francis Gary release of captured U-2 pilot from Soviet prison, Stud. Intel. V9:3-97-100 PDF [170KB*] Soviet view of shootdown of U-2, Stud. Intel. Winter 1998/99:10-12 PDF [819KB*] Presidential relations Executive Order 11905 (1976), background, Stud. Intel. V20:2-1-15 PDF [1.1MB*] Professionalism see also Ethics of intelligence professionals see also Personnel management see also Training case officers, essential qualities of (Tehran, 1979), Stud. Intel. Spring 1998:1-45 PDF [4MB*] role of intelligence literature, Stud. Intel. V1:1-1-11 PDF [354KB*] status in 1955, Stud. Intel. V1:1-1-11 PDF [354KB*] [Top of page]

R
Raborn, Vice Admiral William, DCI, 1965-1966 Col. "Red" White, reflections by, Stud. Intel. Winter 1999/2000:40 PDF Rado, Alexander aka Sandor Radolffy and Sandor Rado

see Soviet operations, general, espionage activities, general Records management CORONA reconnaissance satellite imagery, release of, Stud. Intel. V39:5-61-69 PDF [1013KB*] in counterintelligence CI organization's responsibility to organize, maintain and exploit CI information, Stud. Intel. V13:1-20-21 PDF [922KB*] Irish Republican Army (IRA) CI records system 1919-1920, Stud. Intel. V11:1-71 PDF [464KB*] Russian exile CI successes - importance of records, Stud. Intel. V11:4-83-100 PDF [912KB*] declassification: Freedom of Information Act two years after implementation, Stud. Intel. V18:311-18 PDF [470KB*] emergency contact instructions/background, importance of, Stud. Intel. V37:5-57 PDF [1.1MB*] Historical Intelligence Collection - world's largest, Stud. Intel. V37:5-91-94 PDF [593KB*] records handling systems and processes KGB field and headquarters records system, Stud. Intel. V15:1-115-116 PDF [349KB*] proposed computerized name index system (1962), Stud. Intel. V6:2-1-17 PDF [771KB*] Reporting see also Human Source (HUMINT) collection case histories KGB: economic reporting, doctrine and example, Stud. Intel. V7:2-45-65 PDF [1.1MB*] military attach reporting during Cuban missile crisis, Stud. Intel. V37:5-105-109 PDF [394KB*] ULTRA information, World War II, problems in processing, Stud. Intel. V19:3-45-47 PDF [186KB*] evaluation of HUMINT during Cuban missile crisis, Stud. Intel. V8:4-93-98 PDF [294KB*] tendency of Latin American sources to state hopes as facts, Stud. Intel. V7:4-31-32 PDF [102KB*] guidelines case officer's responsibility to evaluate source and information, some guidelines, Stud. Intel. V5:337-47 PDF [552KB*] CI organization's responsibility to collate, analyze and prepare CI reports, Stud. Intel. V13:1-19-21 PDF [922KB*] clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*] HUMINT, value of as follow up to PHOTINT/SIGINT collection, Stud. Intel. V6:3-66-76 PDF [973KB*] maps, advantages and optimum qualities of in field reporting, Stud. Intel. V6:2-43-52 PDF [426KB*] source motivations/abilities, problems of differing, Stud. Intel. V11:3-3-4 PDF [815KB*] [Top of page]

S
Scientific intelligence HUMINT, primacy of in peacetime scientific collection, Stud. Intel. V6:4-38-39 PDF [538KB*] PHOTINT, SIGINT captures in war-time collection, value of, Stud. Intel. V6:4-38-39 PDF

[538KB*] R.V. Jones, scientific intelligence genius during and after World War II, Stud. Intel. V38:5-27-36 PDF [737KB*] Soviet electronic R&D as a predictor of military capabilities, use of (1950s), Stud. Intel. V12:2-1-6 PDF [341KB*] Soviet ice station capabilities, Stud. Intel. V38:5-107 PDF [746KB*] Soviet radars, precision measurement program for (1960s), Stud. Intel. V12:2-7-19 PDF [677KB*] Security computer systems, operator vulnerability to information warfare, Stud. Intel. Summer 2000, No. 9:97-103 PDF [592KB*] embassy/station protection, failures associated with capture of US Embassy in Tehran, 1979, Stud. Intel. Spring 1998:7-15 PDF [4MB*] operational avoiding detection of radio receivers, Stud. Intel. V7:4-57-60 PDF [178KB*] counterintelligence, key function of, Stud. Intel. V13:2-26-29 PDF [566KB*] dogs' sensitivity to human scent, Stud. Intel. V5:2-25-37 PDF [645KB*] techniques employed behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*] polygraph, case officer views on using, Stud. Intel. V47:1-79-80 PDF [481KB*] source protection criteria for document declassification, Stud. Intel. V18:3-11-18 PDF [470KB*] dangers from declassification policies, Stud. Intel. Winter/Spring 2001, No. 10:55-61 PDF [553KB*] Publications Review Board, basic review guidelines of, Stud. Intel. V41:3-1-8 PDF [614KB*] SIGINT (Signals Intelligence) ELINT (Electronic Intelligence) collecting faint electronic missile signals with an automated system, Stud. Intel. V12:2-21-27 PDF [286KB*] monitoring Soviet radar signals reflected by the moon (1960s), Stud. Intel. V11:2-59-66 PDF [426KB*] Office of ELINT program for measuring power of radars, Stud. Intel. V12:2-7-19 PDF [677KB*] primer and history (1958), Stud. Intel. V2:1-71-83 PDF [633KB*] history, post-World War II, ELINT primer and history (1958), Stud. Intel. V2:1-71-83 PDF [633KB*] history, prior to World War II Civil War: Union flag signal deception operation, 1863, Stud. Intel. V10:4-74-79 PDF [1.3MB*] SIGINT, British doctrine (1874), Stud. Intel. V7:4-A19-A24 PDF [272KB*] US intelligence collection operations against Napoleon III and Emperor Maximilian of Mexico, Stud. Intel. V2:3-81-101 PDF [1MB*] history, World War II COMINT loss cause of Rommel's defeat at El Alamein, Stud. Intel. V3:4-73-80 PDF [405KB*] German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-3554 PDF [1MB*] Japanese SIGINT activity against the USSR along the Manchurian border, 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]

SIGINT, heavy use of in anti-submarine warfare, World War II, Stud. Intel. V7:2-A19-A23 PDF [218KB*] successes and failures, World War II, Stud. Intel. V3:1-99-114 PDF [876KB*] ULTRA information, World War II, problems in processing, Stud. Intel. V19:3-45-47 PDF [186KB*] World War II weapons intelligence source, Stud. Intel. V6:3-55-76 PDF [973KB*] Le Carre spy novels, as used in, Stud. Intel. V37:5-125-132 PDF [1.3MB*] Smith, General Walter Bedell, DCI, 1950-1953 evaluation of by Lawrence K. White, former DDA and EXDIR, Stud. Intel. Winter 1999/2000:34-35 PDF by Walter Pforzheimer, Legislative Counsel, Stud. Intel. Winter/Spring 2001, No. 10:41-42 PDF [1.1MB*] memorabilia, including his presidential citation, honors, and bibliography, Stud. Intel. V5:5-A1A13 PDF [404KB*] relations with Truman and Eisenhower, Stud. Intel. V38:5-66-72 PDF [1MB*] Soviet Bloc (East European services) operations Bloc restitution missions in West Germany, cover for intelligence activity 1945-1949, Stud. Intel. V5:2-39-43 PDF [223KB*] Czechoslovakia, Alfred Frenzel, West German Socialist Deputy and Czech IS agent, Stud. Intel. V6:2-A32-A33 PDF [673KB*] East Germany East German operations (1950s), Stud. Intel. V7:3-15-37 PDF [1.2MB*] use of East Berlin as operations base 1950s - case histories, Stud. Intel. V6:2-A32-A33 PDF [673KB*] West German chief of Intelligence, account of defection to East Germany, Stud. Intel. V4:4-1-26 PDF [1.9MB*] Poland, use of East Berlin as operations base 1950s - case histories, Stud. Intel. V6:2-A30-A32 PDF [673KB*] Soviet Bloc account of European resistance movements, Stud. Intel. V5:5-A47-A50 PDF [166KB*] Soviet operations, general see also Denial and Deception (D&D) operations, Soviet practice see also Soviet operations, GRU see also Soviet operations, KGB assassinations - NKVD and the massacre of Polish POWs, Stud. Intel. Winter 1999/2000:61-70 PDF Berlin, center of intelligence war between the West and Soviets, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769KB*] "brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [169KB*] case officer training and GRU-KGB relations, Stud. Intel. V10:4-55-56 PDF [667KB*] East Berlin, use of as operations base 1950s and 60s, Stud. Intel. V6:2-A32-A33 PDF [673KB*] espionage activities, general Germany: deception and penetration operations 1939-48, Stud. Intel. V37:5-83-90 PDF [1.6MB*]

Sandor Rado, Soviet agent from 1919-1981, Stud. Intel. V12:3-41-61 PDF [1.3MB*] espionage in America Alger Hiss and Whittaker Chambers, Stud. Intel. Winter/Spring 2001, No. 10:1-13 PDF [1.1MB*] illicit technology acquisition program, 1970-1984, Stud. Intel. V39:5-121-126 PDF [460KB*] Rosenbergs, Julius and Ethel, Stud. Intel. V46:4-63-73 PDF [514KB*] forgeries book about British Commander Lionel Crabb, Stud. Intel. V5:3-A35-A37 PDF [117KB*] book about Soviet activities in West and Middle East, Stud. Intel. V5:3-A36-A37 PDF [117KB*] propaganda forgeries, 1956-58, Stud. Intel. V5:1-25-51 PDF [1.5MB*] geographic intelligence, Soviet collection efforts, 1955-1968, Stud. Intel. V12:3-51-61 PDF [1.3MB*] Leon Trotsky and the Fourth International, efforts to destroy, Stud. Intel. V16:1-15-61 PDF [2.3MB*] operations in Europe, 1921-1939, Stud. Intel. V14:1-113-126 PDF [658KB*] political action operations Cominform - political action front activity, 1949, Stud. Intel. V38:2-29-30 PDF Ghana, 1957, Stud. Intel. V11:3-10-11 PDF [815KB*] propaganda operations distortions of US intelligence organs and operations, Stud. Intel. V4:3-A19-A26 PDF [392KB*] efforts (1950s-1960s) to discredit CIA, Stud. Intel. V6:1-29-55 PDF [1.4MB*] recruitment operations: efforts to recruit, then expose a British MP, Stud. Intel. V11:1-87-92 PDF [295KB*] requirements for German defectors in Turkey, Stud. Intel. V7:3-70-71 PDF [552KB*] scientific/student exchanges for collection, use of, Stud. Intel. V6:4-9-15 PDF {369KB*] Soviet operations, GRU see also Soviet operations, general civilian cover (1960s), Stud. Intel. V8:3-17-33 PDF [956KB*] glorified by USSR (1960s), Stud. Intel. V9:4-77-84 PDF [756KB*] handling walk-ins (1960s), Stud. Intel. V8:1-16-47 PDF [1.7MB*] penetration of OSS operation to infiltrate agents into Germany at end of World War II, Stud. Intel. V46:1-26-28 PDF [1MB*] recruitment, training, handling, and wrap up of a Swedish naval NCO (1949-51), Stud. Intel. V6:4A29-A41 PDF [705KB*] Rote Drei: an analysis of the Swiss-based net (and principal source, "Lucy") during World War II, Stud. Intel. V13:3-51-90 PDF [1.9MB*]; Stud. Intel. V16:2-109-111 PDF [124KB*]; Stud. Intel. V16:3-87-88 PDF [98KB*] Stig Wennerstrom, Swedish Colonel and GRU spy, Stud. Intel. V10:3-67-76 PDF [468KB*]; Stud. Intel. V18:3-33-35 PDF [191KB*] training for overseas assignments, Stud. Intel. V10:4-45-57 PDF [667KB*] Soviet operations, KGB see also Soviet operations, general">Soviet operations, general "active measures", economic warfare, Stud. Intel. V7:2-45-65 PDF [1.1MB*] counterintelligence doctrine, 1960s, Stud. Intel. V7:2-45-65 PDF [1.1MB*] embassy operations (Burma, 1950s), Stud. Intel. V7:3-113-118 PDF [306KB*]

espionage activities bugging of Teheran and Yalta conferences, Stud. Intel. V47:1-19-31 PDF [823KB*] focus on secret documents, Stud. Intel. V8:1-A28-A30 PDF [105KB*] George Blake, story of, Stud. Intel. V13:2-27-29 PDF [566KB*] illegals, training and use of Colonel Abel, Stud. Intel. Special Unclass. Ed., Fall 2000:137-148 PDF [812KB*] interrogation techniques, including drugs and hypnosis, Stud. Intel. V2:2-59-63 PDF [271KB*] KGB agent cipher system in 1953, Stud. Intel. V5:5-A1-A13 PDF [404KB*] organization and authority First and Second Chief Directorates: differences in style, Stud. Intel. V16:1-81-82 PDF [100KB*] goals, doctrine, and methods as reported by a senior defector (1963), Stud. Intel. V7:2-45-65 PDF [1.1MB*] internal management methods and style, Stud. Intel. V15:1-115-121 PDF [349KB*] recruitment and agent handling doctrine on meeting with agents, Stud. Intel. V9:1-63-80 PDF [925KB*] homosexuals, Stud. Intel. V7:2-45-65 PDF [1.1MB*] recruitment of a European embassy clerical in Moscow, Stud. Intel. V13:2-87-106 PDF [951.2KB*] recruitment procedures, Stud. Intel. V15:1-116-117 PDF [349KB*] tradecraft for avoiding detection, Stud. Intel. V8:2-65-91 PDF [1.3MB*] training curriculum, circa early 1950s, Stud. Intel. V3:1-93-98 PDF [283KB*] Support (non-operational) information management, 1965 Community study of support to, Stud. Intel. V10:2-43-55 PDF [674KB*] [Top of page]

T
Target analysis East European official installations, selecting approaches for penetrating, Stud. Intel. V6:3-47-54 PDF [442KB*] human targets importance of "face" among Arabs, Stud. Intel. V8:3-43-54 PDF [629KB*] personality profiles of Cuban refugees, Stud. Intel. V8:3-35-41 PDF [357KB*] Vietnamese, potential vulnerabilities for for operational purposes, Stud. Intel. V12:4-57-71 PDF [961KB*] reverse telephone directories, use of (1950s), Stud. Intel. V7:4-61-64 PDF [185KB*] Technical collection operations see also SIGINT (Signals intelligence) see also Technical operations imagery collection aerospace photography, technical elements of and expected improvements, Stud. Intel. V6:4-1-8 PDF [435KB*]

clandestine agent photography by A. Tolkachev, Stud. Intel. V47:3-17-18 PDF [1.7MB*] importance of at tactical and command levels, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*] imagery, exploitation of CORONA reconnaissance satellite imagery, declassification and release of, Stud. Intel. V39:5-6169 PDF [1013KB*] photointerpretation from 1942-1973, Stud. Intel. V19:1-9-12 PDF [264KB*] World War II weapons intelligence, Stud. Intel. V6:3-66-76 PDF [973KB*] nuclear test detection, methods for, East-West conference on (1958), Stud. Intel. V3:1-1-12 PDF [642KB*] pinpointing targets of intelligence interest, agent tools for, Stud. Intel. V11:3-77-84 PDF [443KB*] SR-71 aircraft, development of, Stud. Intel. V15:1-1-25 PDF [1.8MB*] telephone tap and audio operations audiosurveillance, primary means of, Stud. Intel. V4:3-39-46 PDF [406KB*] East European installations as targets: benefits and suggestions, Stud. Intel. V6:3-47-54 PDF [442KB*] important tool of CI, Stud. Intel. V13:2-32 PDF [566KB*] U-2 birth and development, Stud. Intel. Winter 1998/99:1-4 PDF [311KB*] Francis Gary Powers, release of from Soviet prison, Stud. Intel. V9:3-97-100 PDF [170KB*] Soviet view of impact of, Stud. Intel. Winter 1998/99:5-14 PDF [819KB*] Technical operations see also Technical collection operations CI operations, importance in support of, Stud. Intel. V13:1-17-18 PDF [922KB*] disguises, creating: vignettes from the life of the master of disguise, Antonio Mendez, Stud. Intel. V46:1-67-70 PDF [152KB*] information warfare, definition and use of, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56 PDF [577KB*] operational photography accessing Soviet Lunik for factory markings staff, Stud. Intel. V11:1-33-39 PDF [325KB*] detailed working guide, Stud. Intel. V5:2-9-16 PDF [339KB*] ground photography, pointers, Stud. Intel. V5:2-17-23 PDF [363KB*] Japan: successful use of border observation posts in Manchuria 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*] support activities exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1998/99:107-110 PDF [646KB*] false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*] identi-kit, use of for facial recognition, Stud. Intel. V4:1-29-35 PDF [324KB*] microtechnology, implications for advances in, Stud. Intel. V12:4-23-38 PDF [1.3MB*] trace metal detection of counterinsurgents, Stud. Intel. V11:4-37-44 PDF [351KB*] Technology transfer operations illicit technology transfer major Soviet campaign, 1970-1984, Stud. Intel. V39:5-121-126 PDF [460KB*] Soviet use of scientific/student exchanges for collection, 1950/60s, Stud. Intel. V6:4-9-15 PDF [369KB*]

US program to counter Soviet efforts, Stud. Intel. V39:5-121-126 PDF [460KB*] Training see also Professionalism foreign area training institutions and approaches, survey of, Stud. Intel. V4:4-A11-A21 PDF [566KB*] interrogation techniques, Stud. Intel. V2:3-51-61 PDF [656KB*] language training as part of career development, Stud. Intel. V4:4-A1-A9 PDF [443KB*] Soviet practice GRU training for overseas assignments, Stud. Intel. V10:4-45-57 PDF [667KB*] KGB, GRU training curriculums, circa early 1950s, Stud. Intel. V3:1-93-98 PDF [283KB*] subliminal behavior, potential of for training, Stud. Intel. V2:2-65-69 PDF [277KB*] [Top of page]

V
Vandenberg, General Hoyt S., DCI, 1946-1947 activities as second DCI and head of Central Intelligence Group (CIG), Stud. Intel. V12:3-79-98 PDF [1.3MB*]; Stud. Intel. V12:4-73-94 PDF [1.2MB*] Vietnam see Counterinsurgency operations, Vietnam [Top of page]

W
Walters, Lt. Gen. Vernon A., DDCI, 1972-1976 In Memoriam review of his career, Stud. Intel. V46:1-1-2 PDF [100KB*] war stories covering his military and, especially, intelligence career, Stud. Intel. V20:2-45-59 PDF [962KB*] Wisner, Frank, Director of the Office of Policy Coordination (OPC) and Deputy Director of Plans (DDP) impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801KB*] support for the Congress for Cultural Freedom, 1949, Stud. Intel. V38:5-89-98 PDF [736KB*] * Adobe Reader is needed to view Adobe PDF files. If you don't already have Adobe Reader installed, you may download the current version at www.adobe.com (opens in a new window). [external link disclaimer] [Top of page] Posted: Apr 26, 2007 05:54 PM

Last Updated: Jan 13, 2012 11:06 AM Last Reviewed: Jan 13, 2012 11:06 AM

Anda mungkin juga menyukai