Skip to content. | Skip to navigation

Central Intelligence Agency
The Work of a Nation. The Center of Intelligence

CSI

Operations Subject Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 

A

Abel, Col. Rudolf Ivanovic aka William (Willy) August Fisher
biography, Stud. Intel. Special Unclass. Ed., Fall 2000:137-148 PDF [812KB*]
exchanged for Soviet prisoner Francis Gary Powers, Stud. Intel. V9:3-97-100 PDF [169KB*]

Agent operations, general
see also Agent operations, handling
see also Agent operations, recruitment
see also Counterintelligence (CI)
see also Cover
see also Defectors
see also Interrogation
see also Soviet operations, general
covert communications
Adolf Tolkachev in Moscow, 1977-85, use by, Stud. Intel. V47:3-13-14, 20-21 PDF [1.7MB*]
avoiding detection of radio receivers, Stud. Intel. V7:4-57-60 PDF [177KB*]
communications techniques employed behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*]
pigeons, value of, Stud. Intel. V5:2-A35-A-41 PDF [346KB*]
hotels, use of, Stud. Intel. V9:4-43-56 PDF [702KB*]
psychological assessment
Arabs, importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*]
Cubans, psychological factors to consider, Stud. Intel. V8:3-40-41 PDF [357KB*]
handwriting analysis, use of, Stud. Intel. V3:3-23-43 PDF [1MB*]; Stud. Intel. V3:3-45-51 PDF [334KB*]; Stud. Intel. V47:3-10 PDF [1.7MB*]
of Soviet defector, Adolf Tolkachev, Stud. Intel. V47:3-10-12 PDF [1.7MB*]
Vietnamese, potential psychological vulnerabilities for operational purposes, Stud. Intel. V12:4-57-71 PDF [961KB*]
women as agents, a senior European intelligence opinion (1930s), Stud. Intel. V6:2-A1-A5 PDF [228KB*]
tradecraft
Bloc services in East Berlin post-World War II, techniques used, Stud. Intel. V6:2-A21-A33 PDF [673KB*]
disguise, use of, Stud. Intel. V46:1-67-70 PDF [152KB*]
John Andre's handling of Benedict Arnold, 1779, Stud. Intel. V5:3-A1-A15 PDF [763KB*]
Moscow, surveillance detection in, Stud. Intel. V47:3-14-15, 21-22 PDF [1.7MB*]
subliminal behavior, potential of, Stud. Intel. V2:2-65-69 PDF [277KB*]
tools and techniques for pinpointing targets, Stud. Intel. V11:3-77-84 PDF [443KB*]
training
see Training
volunteers
in Moscow, determining A. Tolkachev's bona fides, Stud. Intel. V47:3-5-8 PDF [1.7MB*]
walk-in sources, preponderance of during World War II in Bern, Stud. Intel. V37:5-66-68 PDF [1.2MB*]

Agent operations, handling
see also Agent operations, general
see also Counterintelligence (CI), techniques and tactics
Arabs
importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*]
recommendation of book to better understand them, Stud. Intel. V18:3-29-32 PDF [217KB*]
cold war exploits, Stud. Intel. V3:3-1-14 PDF [695KB*]
contact instructions, importance of for emergencies, Stud. Intel. V37:5-57 PDF [1.1MB*]
Cubans: psychology pointers when handling, Stud. Intel. V8:3-35-41 PDF [357KB*]
Czech assassination team, World War II, Stud. Intel. V4:1-1-19 PDF [938KB*]
false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*]
hypnosis, use of, Stud. Intel. V4:1-51-64 PDF [714KB*]
improvisation in operations, Stud. Intel. V20:4-27-29 PDF [164KB*]
infiltration and exfiltration
balloons as an agent infiltration vehicle (1951), Stud. Intel. V15:1-103-107 PDF [232KB*]
exfiltration of a blown source, Operation Cicero (World War II) example, Stud. Intel. V1:4-47-53 PDF [351KB*]
submerged submarine coastal infiltration, Stud. Intel. V6:3-25-28 PDF [172KB*]; Stud. Intel. V7:2-A13-A17 PDF [220KB*]
successful fly-by exfiltration device, Stud. Intel. V38:5-99-109 PDF [746KB*]
Lao tribesmen, cash incentives, Stud. Intel. V17:1-1-7 PDF [408KB*]
Latin American sources, tendency to express hopes as facts, Stud. Intel. V7:4-31-32 PDF [102KB*]
motivation through use of Sears catalogue prizes (Vietnam), Stud. Intel. V37:5-59-61 PDF [395KB*]
ship personnel in denied areas (1960s), Stud. Intel. V10:1-45-55 PDF [542KB*]
Soviet assets of US intelligence
Adolf Tolkachev, high level CIA Soviet S&T source, 1977-1985, Stud. Intel. V47:3-5-33 PDF [1.7MB*]
Colonel Oleg V. Penkovskiy (GRU), Stud. Intel. V13:2-29-30 PDF [566KB*]
Soviet experience
KGB agent vetting procedures, Stud. Intel. V15:1-117 PDF [349KB*]
operational doctrine, 1960, Stud. Intel. V9:1-63-80 PDF [925KB*]
Soviet practices, case of Ernst Andersson, Swedish naval NCO (1949-51), Stud. Intel. V6:4-A29-A41 PDF [705KB*]
tradecraft for avoiding detection, Stud. Intel. V8:2-65-91 PDF [1.3MB*]
volunteers
Soviet doctrine, with examples, for handling walk-ins and write-ins (1964), Stud. Intel. V8:1-16-47 PDF [1.7MB*]
write-ins, dealing with, Stud. Intel. V6:4-A1-A2 PDF [723KB*]

Agent operations, recruitment
see also Agent operations, general
see also Counterintelligence (CI), techniques and tactics
Arabs, importance of "face" among, Stud. Intel. V8:3-43-54 PDF [629KB*]
"cold" approaches, drawbacks of, Stud. Intel. V37:5-57 PDF [1.1MB*]
Cubans, psychological factors to consider, Stud. Intel. V8:3-40-41 PDF [357KB*]
East European officials as targets, Stud. Intel. V6:3-47-54 PDF [442KB*]
German scientists and intellectuals, post World War II, Stud. Intel. V3:3-1-14 PDF [695KB*]
hotel personnel, value of, Stud. Intel. V9:4-43-56 PDF [702KB*]
insurgent forces, within/against, Stud. Intel. V12:2-77-79 PDF [960KB*]
Japanese World War II intelligence veterans, US use of in cold war, Stud. Intel. V11:1-67-70 PDF [166KB*]
scientific targets, importance of scientific assets to gain access to, Stud. Intel. V6:4-38-39 PDF [538KB*]
ship personnel in denied areas (1960s), Stud. Intel. V10:1-45-55 PDF [542KB*]
Soviet Bloc experience
see also Soviet operations, general, recruitment operations
Bloc intelligence services in East Berlin post-World War II, techniques used, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
GRU, spotting and recruiting of Stig Wennerstrom, Stud. Intel. V18:3-33-35 PDF [191KB*]
KGB field recruiting procedures, Stud. Intel. V15:1-116-117 PDF [349KB*]
KGB recruitment of a European embassy clerical in Moscow, Stud. Intel. V13:2-87-106 PDF [951KB*]
KGB success against homosexuals, Stud. Intel. V7:2-45-65 PDF [1.1MB*]

[Top of page]

 

B

Bibliographies
1950s, annotated, Stud. Intel. V5:2-A51-A60 PDF [455KB*]
early 1960s, annotated, Stud. Intel. V8:1-A31-A42 PDF [530KB*]
Soviet espionage, 1945-1961, indexed by country and cases, Stud. Intel. V6:2-A35-A47 PDF [516KB*]

Bissell, Richard, Deputy Director of Plans (DDP)
impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801KB*]
review of his autobiography, Stud. Intel. Winter 1998/99:103-111 PDF [646KB*]

British intelligence, pre-World War II
Benjamin Franklin's private secretary in Paris as British spy, Stud. Intel. V5:1-A53-A67 PDF [757KB*]
intelligence organization before and during a war (1874), Stud. Intel. V7:4-A19-A24 PDF [272KB*]
Jesuit agent in reformation England, Stud. Intel. V5:2-A43-A50 PDF [371KB*]

British intelligence, World War II
covert communications behind enemy lines, Stud. Intel. V2:4-55-60 PDF [272KB*]
Czech exile operations in London, Stud. Intel. V7:2- A1-A11 PDF [593KB*]
double agent cases, Stud. Intel. V18:1-25-40 PDF [954KB*]
merging paramilitary and intelligence collection efforts in one organization, reasons for, Stud. Intel. V6:1-73-80 PDF [394KB*]
Secret Intelligence Service (SIS), dealings with the Danish underground, Stud. Intel. V6:4-A63-A66 PDF [165KB*]
Special Operations Executive (SOE)
dealings with the Danish underground, Stud. Intel. V6:4-A63-A66 PDF [165KB*]
failures, Stud. Intel. V6:1-73-80 PDF [394KB*]
support of French resistance, Stud. Intel. V11:2-103-105 PDF [298KB*]
weapons intelligence sources and analysis, World War II, Stud. Intel. V6:3-55-76 PDF [973KB*]

[Top of page]

 

C

Casey, William J., DCI, 1981-1987
Iran-Contra controversy, Stud. Intel. V39:5-93-94 PDF [135KB*]
last month as DCI, description of, Stud. Intel. V39:5-93-94 (1996) PDF; Stud. Intel. V39:5-75-91 PDF [1.4MB*]
Office of Strategic Services (OSS) exploits against Nazi Germany, Stud. Intel. Summer 2000, No. 9:39-40 PDF [1.3MB*]
transition team operations, Stud. Intel. Summer 2000, No. 9:105-107 PDF [175KB*]

Central Intelligence Agency (CIA), general
see also Central Intelligence Agency (CIA), history
see also Directorate of Operations (DO), general
see also Directorate of Operations (DO), history to 1959
"invisible government" charge, Stud. Intel. V8:4-109-110 PDF [231KB*]
leadership development, doctrine and practices, 1950s, Stud. Intel. V2:3-1-6 PDF [295KB*]
organizational evolution
1947-72, as seen by the DDA/Controller Lawrence "Red" White, Stud. Intel. Winter 1999/2000:29-41 PDF
1975 suggestions for organizational change and oversight, Stud. Intel. V19:2-1-8 PDF [470KB*]
call for integrating intelligence collection and analysis on Soviet strategic forces into one unit (1961), Stud. Intel. V5:1-1-7 PDF [474KB*]
Clandestine Service: origins, organization and development, Stud. Intel. V12:1-68-71 PDF [1.1MB*]
covert action, importance of in early years, Stud. Intel. V39:5-25-34 PDF [801KB*]
Publications Review Board, Stud. Intel. V41:3-1-8 PDF [614KB*]
personalities
Colonel Lawrence "Red" White, Executive Director-Controller, Stud. Intel. Winter 1999/2000:29-41 PDF
Lt. Gen. Vernon A. Walters, DDCI, 1972-1976
see Walters, Lt. Gen. Vernon A., DDCI, 1972-1976

Central Intelligence Agency (CIA), history
see also Central Intelligence Agency (CIA), general
Berlin, center of intelligence war between the West and Soviets during Cold War, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769KB*]
joint committee to oversee CIA, attempts to establish, Stud. Intel. V10:3-31-41 PDF [502KB*]
origins of and precursors to CIA, Stud. Intel. V2:1-1-5 PDF; Stud. Intel. V8:3-55-94 PDF [2.1MB*]
birthing pains, Stud. Intel. V37:5-73-79 PDF [1.3MB*]
Central Intelligence Group (CIG), Stud. Intel. V10:2-1-19 PDF [1020KB*]; Stud. Intel. V12:1-55-74 PDF [1.1MB*];Stud. Intel. V12:4-73-94 PDF [1.2MB*]; Stud. Intel. V39:3-49-57 PDF
National Security Act of 1947, politics of, Stud. Intel. V13:1-33-56 PDF [1.2MB*]
Office of Strategic Services(OSS)
see Office of Strategic Services (OSS)
William J. Donovan, contributions to
see Donovan, General William J.
"the Pond," relations with a semi-private US intelligence organization named, Stud. Intel. V48:3-75-82 PDF [189KB*]

Classification system
declassification policies, arguments for and against, Stud. Intel. Winter/Spring 2001, No. 10:55-61 PDF [553KB*]; Stud. Intel. Winter/Spring 2001, No. 10:63-67 PDF [420KB*]
history of and suggested criteria for, Stud. Intel. V37:5-33-35 PDF [476KB*]

Colby, William E., DCI, 1973-1976
evaluation of his tenure, Stud. Intel. Semiannual Ed., No. 1, 1997: 1-7 PDF [550KB*]
OSS exploits, Stud. Intel. Winter 1999/2000:53-60 PDF
review of biography of, Stud. Intel. V47:4-77-82 PDF [49.9KB*]

Collection guidance
see also Collection management
see also Collection operations
see also Directorate of Operations (DO) - analyst relations
see also Intelligence Community relations
see also Interrogation
see also Reporting
analyst evaluation in the 1950s, Stud. Intel. V3:1-47-49 PDF [910KB*]
business reports, assessing for intelligence information, Stud. Intel. V2:2-47-52 PDF [309KB*]
clandestine collection, guidance for, Stud. Intel. V3:2-81-93 PDF [664KB*]
collector - analyst relations
direct contact, value of, Stud. Intel. V3:2-81-93 PDF [664KB*]
early post- World War II period, Stud. Intel. V3:1-37-52 PDF [910KB*]
East-West exchanges, value of, Stud. Intel. V2:3-63-70 PDF [433KB*]
headquarters collection guidance specialist, responsibilities of (1958), Stud. Intel. V2:2-33-40 PDF [704KB*]
military attaches, Soviet obstacles to collection by (1950s), Stud. Intel. V4:3-71-77 PDF [380KB*]
outdated conventional weapons, importance of collecting on, Stud. Intel. V9:4-13-17 PDF [220KB*]
practices and problems (1950s), Stud. Intel. V3:1-37-52 PDF [910KB*]
Priority National Intelligence Objectives (PNIOs)
in the 1950s, Stud. Intel. V3:1-41-43 PDF [910KB*]
as used by DIA in 1962, Stud. Intel. V7:4-33 PDF [395KB*]
requirements management process in 1960, Stud. Intel. V4:4-43-61 PDF [1MB*]
scientific method, application of, Stud. Intel. V6:4-37-48 PDF [538KB*]
Soviet military prospects (1981), Stud. Intel. V7:4-33-40 PDF [395KB*]
State Department organization and procedures for collection guidance (1958), Stud. Intel. V2:2-40-45 PDF [704KB*]
traveler "snapshots", Stud. Intel. V5:2-17-23 PDF [363KB*]

Collection management
see also Collection guidance
clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*]
coordination of PHOTINT, SIGINT and HUMINT for weapons intelligence collection, World War II, Stud. Intel. V6:3-55-76 PDF [973KB*]
Cuban Missile Crisis, 1962, all source tasking/analysis, Stud. Intel. V11:3-3-4 PDF [815KB*]
exploitation of
delegation interpreters, Stud. Intel. V4:1-21-27 PDF [406KB*]
German scientists and intellectuals (post World War II), Stud. Intel. V3:3-1-14 PDF [695KB*]
technical collection: intercepted Western Union Telegraph traffic, Stud. Intel. V2:3-81-101 PDF [1MB*]
Hungarian refugee screening and interviewing program (1958), Stud. Intel. V2:1-85-93 PDF [481KB*]
imagery, meeting military needs for, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*]
"irregular" wars, collection needs for, Stud. Intel. V39:2-51-59 PDF [630KB*]
Science attachƩ Program, limited value of, 1960s, Stud. Intel. V10:2-21-27 PDF [310KB*]
terrain intelligence, need for and use of, Stud. Intel. V3:4-81-86 PDF [279KB*]

Collection operations
see also Human Source (HUMINT) collection
see also Technical collection operations
clandestine collection techniques in non-Western societies, 1950s, Stud. Intel. V3:3-15-21 PDF [355KB*]
Foreign Broadcast Information Service (FBIS)
see Foreign Broadcast Information Service (FBIS)
Soviet bloc, late 1950s, Stud. Intel. V2:2-53-58 PDF [308KB*]
Soviet factory markings in mountainous Afghanistan, collecting (1960s), Stud. Intel. V11:2-79-88 PDF [677KB*]

COMINT
see SIGINT (Signals Intelligence)

Committee for State Security (KGB)
see Soviet operations, KGB

Communications support
KGB agent cipher system in 1953, Stud. Intel. V5:5-A15-A28 PDF [534KB*]
KGB pouch and electronic communications (1971), Stud. Intel. V15:1-115 PDF [349KB*]
OSS radio operator behind German lines, 1944, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*]

Congressional relations, general
investigations of CIA
Guatemala coup, 1954, Stud. Intel. Winter/Spring 2001, No. 10:23-31 PDF [719KB*]
use of/assistance to Nazi war criminals (1977), Stud. Intel. Semiannual Ed., No. 1, 1997: 103-109 PDF [578KB*]
NSA, investigations of telegram intercept program, Stud. Intel. Winter 1999/2000:43-51 PDF

Congressional relations, oversight activities
CIA Inspector General, statuary status, Stud. Intel. Winter/Spring 2001, No. 10:15-21 PDF [506KB*]
CIA Legislative Counsel, reflections, 1949-1970, Stud. Intel. Winter/Spring 2001, No. 10:42-43 PDF [1.1MB*]
covert action operations, congressional approval of, Stud. Intel. V36:5-21, 25 PDF [1.8MB*]
history of and laws enacted 1976-96, Stud. Intel. Semiannual Ed., No. 1, 1997: 97-102 PDF [476KB*]
House Permanent Select Committee on Intelligence (HIPSCI), Chairman's thoughts about (1974), Stud. Intel. V18:2-15-20 PDF [293KB*]
investigations of CIA, mid-1970s: Rockefeller commission, Church and Pike Committees, Stud. Intel. V20:2-1-15 PDF [1.1MB*]
joint committee, history of attempts to establish, Stud. Intel. V10:3-31-41 PDF [502KB*]
of the National Security Agency (NSA), Stud. Intel. Winter/Spring 2001, No. 10:85-94 PDF [778KB*]
oversight committees, main concerns of (1968-74), Stud. Intel. V18:2-1-14 PDF [971KB*]
Pike Committee report, Stud. Intel. Winter 1998/99:86-87 PDF [941KB*]
sources and methods, protection of, Stud. Intel. V2:4-72-74 PDF [708KB*]
see Security, source protection

Counterinsurgency operations
see also Counterintelligence (CI), cases, post-World War II
Belgian Congo, operations against Simba rebels, 1964, Stud. Intel. Winter 1999/2000:17-21 PDF
British experience
efforts against the IRA, 1919-1920, Stud. Intel. V11:1-69-78 PDF [464KB*]
in Kenya, Stud. Intel. V3:1-137-140 PDF [215KB*]
counterintelligence (CI) in counterinsurgency
combatant identification, use of metal tracing kits, Stud. Intel. V11:4-37-44 PDF [351KB*]
ideal CI program against insurgents in Latin America, sketch of, Stud. Intel. V12:2-65-81 PDF [960KB*]
techniques used by insurgent groups against government forces, Stud. Intel. V12:1-39-53 PDF [843KB*]
OSS Jedburgh teams, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*]
preventive, reactive, aggressive, and remedial measures involved, Stud. Intel. V9:4-57-63 PDF [319KB*]
Singapore's People's Association as a counter to potential urban insurgency, Stud. Intel. V12:4-47-55 PDF [875KB*]
Vietnam, Stud. Intel. V11:4-37-44 PDF [351KB*]
interrogation of a captured North Vietnamese intelligence officer, Stud. Intel. V48:1-45-58 PDF [284KB*]
Order of Battle (OOB) information from NVA "defectors", Stud. Intel. V17:1-1-7 PDF [478KB*]
US paramilitary activities in Laos during Vietnam war, Stud. Intel. V47:1-1-17 PDF [922KB*]

Counterintelligence (CI), cases: post-World War II
counterespionage (1960s), Stud. Intel. V7:2-67-72 PDF [303KB*]
Soviet GRU spy in Sweden, use of surveillance to uncover, Stud. Intel. V6:4-A40-A41 PDF [705KB*]
US cases and counterespionage activities
CI efforts in Vietnam, 1967, Stud. Intel. V13:2-34-36 PDF [566KB*]
Edward Lee Howard, former CIA employee, probable KGB agent, Stud. Intel. V47:3-32 PDF [232KB*]
Soviet illicit technology transfer, Stud. Intel. V39:5-121-126 PDF [460KB*]

Counterintelligence (CI), history
Benjamin Franklin's doctrine (1770s), Stud. Intel. V9:2-85-88 PDF [124KB*]
Czech experiences
Czechoslovak intelligence service operations, World War II, Stud. Intel. V3:2-31-45 PDF [1.2MB*]
Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A13 PDF [723KB*]
intelligence service operations, late 1930s, Stud. Intel. V2:4-93-103 PDF [572KB*]
early disorganization of US counterintelligence (early 1950s), Stud. Intel. V13:2-30-32 PDF [566KB*]
German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-35-54 PDF [1MB*]
German fabrications/provocations in 1945-48, detection by US, Stud. Intel. V37:5-81-90 PDF [1.6MB*]
German success against British SOE units in World War II, reasons why, Stud. Intel. V6:1-73-80 PDF [394KB*]
Irish Republican Army (IRA) penetration of British intelligence, 1919-1920, Stud. Intel. V11:1-69-78 PDF [464KB*]
Japanese CI coup against an Australian/Portuguese covert action operation, 1942, Stud. Intel. V4:4-A23-A27 PDF [246KB*]
Polish resistance efforts against German and Soviet occupying forces during World War II, Stud. Intel. V2:3-107-116 PDF [522KB*]
West German chief of Intelligence, account of defection to East Germany, Stud. Intel. V4:4-1-26 PDF [1.9MB*]

Counterintelligence (CI), policy and theory
call for greater effort (1960s), Stud. Intel. V7:3-15-37 PDF [1.2MB*]
counterespionage, aggressiveness key to good CI, Stud. Intel. V13:2-26-29 PDF [566KB*]
definitions, doctrine, and goals
Benjamin Franklin's doctrine (1770s), Stud. Intel. V9:2-85-88 PDF [124KB*]
definition and description of, Stud. Intel. V2:4-87-92 PDF [287KB*]
KGB CI doctrine outlined, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
ten principles for good CI, Stud. Intel. Fall/Winter 2001, No. 11:81-87 PDF [857KB*]
information warfare, definition and defense against, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56 PDF [577KB*]
James Angleton, conspiracy theories on, Stud. Intel. V38:5-129-134 PDF [713KB*]
liaison, importance of with national law enforcement forces, Stud. Intel. V13:1-15-22 PDF [922KB*]
national CI service, potential organization, functions and legal basis of, Stud. Intel. V13:1-9-24 PDF [922KB*]
political costs of "excessive" security, Stud. Intel. Winter/Spring 2001, No. 10:11-12 PDF [1.1MB*]
Soviet scientific exchanges, need for limits on (1960s), Stud. Intel. V7:1-25-30 PDF [341KB*]

Counterintelligence (CI), techniques and tactics
audio surveillance, Stud. Intel. V4:3-39-46 PDF; Stud. Intel. V13:2-32 PDF [566KB*]
countering agent radio communications, equipment for (1950s & 60s), Stud. Intel. V10:1-57-67 PDF [449KB*]
Czech experiences
Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A13 PDF [723KB*]
techniques used by Czech intelligence service, late 1930s, Stud. Intel. V2:4-93-103 PDF [572KB*]
dogs' sensitivity to human scent and its CI possibilities/hazards, Stud. Intel. V5:2-25-37 PDF [645KB*]
double agents
British cases in World War II, Stud. Intel. V18:1-25-40 PDF [954KB*]
hazards of recruiting and running, Stud. Intel. V6:1-57-72 PDF [818KB*]
value and problems of, Stud. Intel. V13:2-31 PDF [566KB*]
entrapment through friendship, Stud. Intel. V10:3-77-80 PDF [107KB*]
forgeries and fabrications
detecting fabricators/provocations in Germany 1945-48, Stud. Intel. V37:5-81-90 PDF [1.6MB*]
detecting fake photographs, Stud. Intel. V13:1-57-67 PDF [511KB*]
false documentation, detection of, Stud. Intel. V4:1-37-49 PDF [713KB*]
forgeries, spotting crude ones in Africa and Latin America, Stud. Intel. V19:1-13-21 PDF [440KB*]
suspect documents, laboratory analysis of, Stud. Intel. V4:3-47-55 PDF [480KB*]
hypnosis, limits of, Stud. Intel. V4:1-51-64 PDF [714KB*]
identi-kit, use of for identication, Stud. Intel. V4:1-29-35 PDF [324KB*]
KGB, field cases managed by headquarters elements, Stud. Intel. V15:1-117 PDF [349KB*]
record keeping, proposed computerized name index system (1962), Stud. Intel. V6:2-1-17 PDF [771KB*]
Russian exile CI methods and successes (1905-1914), Stud. Intel. V11:4-83-100 PDF [912KB*]
spotting signs of CI interest, Stud. Intel. V13:4-50-53 PDF [1.2MB*]

Countersabotage
German sabotage in US (World War I) and its impact on society, Stud. Intel. V46:1-3-9 PDF [384KB*]

Counterterrorism
see also Counterinsurgency operations
Australia: enhanced counterterrorism effort, Stud. Intel. V48:1-27-38 PDF [158KB*]
bioterrorism, problem of publishing dual-use research on, Stud. Intel. V48:3-57-61 PDF [2.3MB*]
countersabotage, Stud. Intel. V7:2-67-72 PDF [303KB*]
Russian operations against terrorist exiles, 1880-1909, Stud. Intel. V11:1-71-86 PDF [795KB*]

Cover
Bloc services in East Berlin in the 1950s and 1960s, techniques used, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*]
historical examples
Bloc restitution missions in West Germany as cover for intelligence activity, 1945-1949, Stud. Intel. V5:2-39-43 PDF [223KB*]
circumvention of Treaty of Versailles restrictions on German rearmament, Stud. Intel. V4:2-A31-A38 PDF [416KB*]
improvised: fishing trip while collecting Soviet data in Afghanistan, 1966, Stud. Intel. V11:2-79-88 PDF [677KB*]
non-official cover
exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1998/99:107-110 PDF [646KB*]
pros and cons discussed, Stud. Intel. V11:1-61-65 PDF [237KB*]
Soviet manual on, Stud. Intel. V8:3-17-33 PDF [956KB*]
official cover
KGB, embassy cover considerations, Stud. Intel. V15:1-116 PDF [349KB*]
Soviet cover operation for sending missiles to Cuba (1962), Stud. Intel. V46:1-50-51 PDF [569KB*]
travel advice for the TDYer, Stud. Intel. V13:3-93-95 PDF [303KB*]
paramilitary action operations, key cover elements in planning, Stud. Intel. V5:2-A51-A60 PDF [455KB*]
tradecraft
argument opposed to going "native", Stud. Intel. V2:3-43-44 PDF [108KB*]
behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*]
techniques and tactics under hostile interrogation, Stud. Intel. Spring 1998:17-21 PDF [4MB*]

Covert action operations, cases
paramilitary (PM) operations
Afghanistan, against al-Qaeda terrorist organization (2001-2002), Stud. Intel. Winter 1998/99:92-101 PDF [737KB*]
Cuba, Bay of Pigs, 1961: results of CIA's internal probe, Stud. Intel. Winter 1998/99:92-101 PDF [737KB*]
Guatemala, 1954, Stud. Intel. Winter/Spring 2001, No. 10:23-31 PDF [719KB*]
Laos, air operations in (1955-74), Stud. Intel. Winter 1999/2000:71-86 PDF
Laos, defense of a USAF radar outpost in (1966-68), Stud. Intel. V38:5-79-88 PDF [818KB*]
Laos, experiences of a first tour officer in (mid-1960s), Stud. Intel. V47:1-1-17 PDF [922KB*]
political action operations
Alfred Frenzel, West German Socialist Deputy and Czech IS agent, Stud. Intel. V6:2-A32-A33 PDF [673KB*]
Chile, CIA covert action in the 1964 and 1970 elections, Stud. Intel. V36:5-21, 25 PDF [1.8MB*]; Stud. Intel. V47:3-35-49 PDF [901KB*]
Congress for Cultural Freedom, the first two years, Stud. Intel. V38:5-89-98 PDF [736KB*]
Soviet activities
KGB activities in protection/support of Soviet trade, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
NKVD and the assassination of Polish POWs, 1940, Stud. Intel. Winter 1999/2000:61-70 PDF
Soviet manipulation of Kwame Nkrumah, 1957, Stud. Intel. V11:3-10-11 PDF [815KB*]

Covert action operations, general
see also Counterinsurgency operations
see also Denial and Deception (D&D) operations
criticism of, by Pike Committee, 1974-1976, Stud. Intel. Winter 1998/99:87-88 PDF [941KB*]
insurgents, harassment of through covert operations, Stud. Intel. V12:2-71-74 PDF [960KB*]
paramilitary (PM) operations
cover elements to consider in planning, Stud. Intel. V5:3-31-35 PDF [286KB*]
value of having PM and intelligence capabilities in one organization, Stud. Intel. V6:1-73-80 PDF [394KB*]
political action operations
as a byproduct of intelligence operations and as a source of intelligence, Stud. Intel. V5:3-49-55 PDF [403KB*]
CI role in discovering and exposing hostile activity, Stud. Intel. V13:1-19 PDF [922KB*]
DCI views of importance of, 1967, Stud. Intel. V11:3-6-13 PDF [815KB*]
French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831KB*]
propaganda operations
as a byproduct of intelligence operations and as a source of intelligence, Stud. Intel. V5:3-49-55 PDF [403KB*]
CI role in discovering and exposing hostile activity, Stud. Intel. V13:1-19 PDF; Stud. Intel. V13:2-32 PDF [566KB*]
Soviet Bloc account of European resistance movements, Stud. Intel. V5:5-A47-A50 PDF [166KB*]
Soviet bloc forgeries, 1956-58, Stud. Intel. V5:1-25-51 PDF [1.5MB*]
Soviet distortion of US intelligence organs and operations, Stud. Intel. V4:3-A19-A26 PDF [392KB*]
Soviet efforts (1950s-1960s) to discredit CIA, Stud. Intel. V6:1-29-55 PDF [1.4MB*]

Covert action operations, historical examples (World War II and prior)
see also Covert action operations, general
biblical lesson: agent of influence restores David to the throne, Stud. Intel. V13:2-21-24 PDF [153KB*]
Czech team assassinates Nazi chief of security apparatus, 1942, Stud. Intel. V4:1-1-19 PDF [938KB*]
inadvertent contributions by war correspondents (propaganda and deception), Stud. Intel. V20:1-65-69 PDF [313KB*]
Office of Strategic Services (OSS) and unconventional fighting in Burma, 1944, Stud. Intel. V5:1-A1-A27 PDF [1.3MB*]
postal forgeries, use of ( "Operation Cornflakes"), Stud. Intel. V4:3-57-69 PDF [592KB*]
US efforts to win Azores base rights from Portugal in World War II, Stud. Intel. V18:4-59-60 PDF [122KB*]

Covert action operations, policy and theory
definition and elements of, Stud. Intel. V46:3-15-22 PDF [378KB*]
importance of in early years, Stud. Intel. V39:5-25-34 PDF [801KB*]
information warfare, definition and use of, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56 PDF [577KB*]
paramilitary operations, risk of contaminating battlefield intelligence, Stud. Intel. V48:2-68-69 PDF [29.9KB*]
political action operations
Soviet KGB doctrine and examples, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
US guidelines for formulating, Stud. Intel. V36:5-19-31 PDF [1.8MB*]

Crisis management
individual and group behavior
Congo, 1964, rescue of downed case officer, Stud. Intel. Winter 1999/2000:21-28 PDF
Iran: US hostages experience, 1979-81, Stud. Intel. Spring 1998:1-45 PDF [4MB*]
negotiating with a skyjacker, Stud. Intel. V16:3-53-63 PDF [487KB*]
organizational behavior
coup and counter-coup in Indonesia, 1965, Stud. Intel. V14:2-13-29 PDF [841KB*]
Soviet behavior in Moscow during Cuban missile crisis, Stud. Intel. V37:5-105-109 PDF [394KB*]

Cuba
Bay of Pigs, 1961
possible reasons for failing to cancel invasion, Stud. Intel. Winter 1998/99:107-110 PDF [646KB*]
results of CIA's internal probe, Stud. Intel. Winter 1998/99:92-101 PDF [737KB*]
Cuban agent operations
handling, Stud. Intel. V8:3-35-41 PDF [357KB*]
psychological factors, Stud. Intel. V8:3-40-41 PDF [357KB*]
Missile crisis, 1962
collection management, Stud. Intel. V11:3-3-4 PDF [815KB*]
D&D operations undertaken by Soviets to conceal the emplacement of missiles, Stud. Intel. V46:1-49-58 PDF [569KB*]
reporting from Moscow, Stud. Intel. V37:5-105-109 PDF [394KB*]
U-2, Soviet view of impact of flights, Stud. Intel. Winter 1998/99:13-14 PDF [819KB*]
refugees and defectors
1960s Florida operations, Stud. Intel. Winter/Spring 2001, No. 10:49-53 PDF [373KB*]
debriefing of, Stud. Intel. V11:3-3-4 PDF [815KB*]

[Top of page]

 

D

Defectors
cases
A. Tolkachev, determining his bona fides, Stud. Intel. V47:3-5-8 PDF [1.7MB*]
Col. Vladimir I. Vetrov, code name "Farewell," French-run Soviet defector-in-place, Stud. Intel. V39:5-121-126 PDF [460KB*]
Otto John, psychological explanation for defections, Stud. Intel. V5:2-45-50 PDF [336KB*]
Soviet defectors as sources of Japanese military intelligence, Manchuria, 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
Soviet ƩmigrƩs and defectors, writings by and about, Stud. Intel. V38:5-129-137 PDF [713KB*]
walk-in sources, World War II in Bern, Stud. Intel. V37:5-66-68 PDF [1.2MB*]
word to replace term "defector", Stud. Intel. V9:1-61 PDF [41.5KB*]
write-ins, dealing with, Stud. Intel. V6:4-A1-A2 PDF [723KB*]

Denial and Deception (D&D) operations
CI operations, important element in, Stud. Intel. V13:2-31 PDF [566KB*]
definition and description of, Stud. Intel. V14:1-19-22 PDF [761KB*]
exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1999/2000:1-16 PDF
historical examples (World War II and prior)
Allied efforts to deceive Germans in World War II, Stud. Intel. V20:1-53-64 PDF [808KB*]
British double agent cases, Stud. Intel. V18:1-25-40 PDF [954KB*]
Civil War: Union army operation allowing Confederate interception of signal flag messages, 1863, Stud. Intel. V10:4-74-79 PDF [1.3MB*]
jamming of German bombing radar, 1940s, Stud. Intel. V6:3-60-76 PDF [973KB*]
Japanese compromise of Australian/Portuguese covert operation in eastern Timor, 1943, Stud. Intel. V4:4-A23-A27 PDF [246KB*]
postal forgeries, use of ( "Operation Cornflakes"), Stud. Intel. V4:3-57-69 PDF [592KB*]
Indian success in hiding nuclear tests, Stud. Intel. Summer 2000, No. 9:97-98 PDF [592KB*]
photographic fakery described, Stud. Intel. V13:1-57-67 PDF [511KB*]
Soviet practice
see also Soviet operations, general
Czechoslovak invasion, 1968, Stud. Intel. V14:1-19-34 PDF [761KB*]
D&D operations undertaken by Soviets concerning Cuban missile crisis (1962), Stud. Intel. V46:1-49-58 PDF [569KB*]
disinformation re CIA involvement in the death of President Kennedy, Stud. Intel. Fall/Winter 2001, No. 11:5-17 PDF [1.7MB*]
false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*]
KGB doctrine and examples, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
managed in the field by headquarters elements, Stud. Intel. V15:1-117 PDF [349KB*]
nuclear weapons program, D&D measures to protect, Stud. Intel. V48:2-1-11 PDF [1.9MB*]
US CI and deception program to counter Soviet illicit technology transfer efforts, Stud. Intel. V39:5-121-126 PDF [460KB*]

Director of Central Intelligence (DCI)
Congressional relations, re: protection of sources and methods, Stud. Intel. V2:4-72-74 PDF [708KB*]
Former DCIs
Admiral Roscoe H. Hillenkoetter
see Hillenkoetter, Admiral Roscoe H., DCI, 1947-1950
Allen Dulles
see Dulles, Allen, DCI, 1953-1961
General Hoyt S. Vandenberg
see Vandenberg, General Hoyt S., DCI, 1946-1947
General Walter Bedell Smith
see Smith, General Walter Bedell, DCI, 1950-1953
Richard Helms
see Helms, Richard, DCI, 1966-1973
Porter J. Goss., DCI, 2004-2005
see Goss, Porter J., DCI, 2004-2005
survey of DCIs, 1946-1992, Stud. Intel. V38:1-49-59 PDF [38.3KB*]
transition team for DCI Casey (1981), Stud. Intel. Summer 2000, No. 9:97-98 PDF [592KB*]

Directorate of Operations (DO) - analyst relations
see also Reporting
in the field
CIA map of Moscow, Stud. Intel. Semiannual Ed., No. 1, 1997: 111-114 PDF [273KB*]
successful clandestine overseas operation with factory markings staff, Stud. Intel. V11:1-33-39 PDF [325KB*]
at Headquarters
healthy rivalry between, Stud. Intel. V11:3-14-15 PDF [815KB*]
HUMINT reporting, need for analysts to be skeptical of, Stud. Intel. V8:4-93-98 PDF [294KB*]
sourcing problems
collector evaluations, Stud. Intel. V5:3-37-47 PDF [552KB*]
Cuban Missile Crisis (1962), Stud. Intel. V8:4-93-98 PDF [294KB*]

Directorate of Operations (DO), general
see also Central Intelligence Agency (CIA), general
see also Congressional relations, oversight activities
see also Directorate of Operations (DO) - analyst relations
Clandestine Service, origins and development of, Stud. Intel. V12:1-68-71 PDF [1.1MB*]
DO culture, improved status of women, Stud. Intel. V46:3-15-22 PDF [378KB*]
domestic collection, Cuban refugee debriefing efforts (1959-61), Stud. Intel. Winter/Spring 2001, No. 10:49-53 PDF [373KB*]
ELINT (Electronic Intelligence) collection, DO role in early years (1958), Stud. Intel. V2:1-78-79 PDF [633KB*]
foreign commercial organizations as espionage targets, negative aspects of, Stud. Intel. V37:5-17-23 PDF [990KB*]
personalities
Desmond Fitzgerald, DD/P, impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801KB*]
Harriette "Tee" Thompson, pioneer in improving status of women in the DO, Stud. Intel. V46:3-45-53 PDF [469KB*]
James Angleton, controversial CI Staff chief, Stud. Intel. V38:5-129-134 PDF [713KB*]
Richard L. Holm, first tour paramilitary case officer in Laos (1962-64), Stud. Intel. V47:1-1-17 PDF [922KB*]
Stephan Haller, case officer extraordinaire, Stud. Intel. V3:3-1-14 PDF [695KB*]
Tracy Barnes, ADD/P, impact of career on CIA, Stud. Intel. V39:5-19-23 PDF
relations with State Department: activities of "the Pond," a semi-private US intelligence organization, Stud. Intel. V48:3-75-82 PDF [189KB*]
relations with the media: permitting access to historical records, Stud. Intel. V39:2-1-5 PDF [780KB*]

Directorate of Operations (DO), history to 1959
Trieste, operational activity, 1951-54, Stud. Intel. V37:5-53-58 PDF [1.1MB*]

Donovan, General William J.
see also Office of Strategic Services (OSS)
career review by Allen Dulles, DCI, 1953-1961, Stud. Intel. V3:3-71-83 PDF [689KB*]
promotes a central intelligence organization, Stud. Intel. V8:3-55-94 PDF [2.1MB*]
World War II activities, Stud. Intel. V37:5-71-79 PDF [1.3MB*]

Dulles, Allen, DCI, 1953-1961
comments upon receipt of the National Security Medal, 1961, Stud. Intel. V6:1-A1-A4 PDF [186KB*]
espionage activity during World War I and World War II, Stud. Intel. V37:5-64-70 PDF [1.2MB*]
Office of Strategic Services (OSS) activities in World War II
acquisition of Ciano Papers (1945), Stud. Intel. V13:2-1-63 PDF [2.3MB*]
assessment on cracking of German morale (1944), Stud. Intel. V9:1-81-90 PDF [440KB*]
Fritz Kolbe (alias George Wood) espionage services, Stud. Intel. V10:1-69-96 PDF [1.1MB*]
meeting with Nazi intelligence chief, Stud. Intel. V4:2-A26-27 PDF [1MB*]
surrender of German armies in Italy, cables from Dulles on, Stud. Intel. V7:2-73-98 PDF [1.2MB*]
Presidential relations: Eisenhower, Stud. Intel. V38:5-72-74 PDF [1MB*]
reflections on
by Col. Lawrence "Red" White, former EXDIR, Stud. Intel. Winter 1999/2000:35-38 PDF
by Frank Wisner, Director of the Office of Policy Coordination, Stud. Intel. V8:1-A1-A16 PDF [789KB*]
Soviet efforts to discredit, Stud. Intel. V6:1-29-55 PDF [1.4MB*]

[Top of page]

 

E

ELINT (Electronic Intelligence)
see SIGINT (Signals Intelligence)

Ethics of intelligence professionals
see also Professionalism
integrity in operations
need for personal integrity in operations officers, Stud. Intel. V39:5-25-34 PDF [801KB*]
observations of DCI Helms, Stud. Intel. V11:3-15-16 PDF [815KB*]
personal integrity in operations officers, need for, Stud. Intel. V39:5-25-34 PDF [801KB*]
political action operations, need for ethical norms in planning, Stud. Intel. V36:5-19-31 PDF [1.8MB*]
professional standards, call for codification of, Stud. Intel. V36:5-17 PDF [463KB*]
protection of sources and methods
legal basis for confidentiality of source identity, Stud. Intel. V2:4-61-74 PDF [708KB*]
Publications Review Board, basic review guidelines, Stud. Intel. V41:3-1-8 PDF [614KB*]

[Top of page]

 

F

Fisher, William (Willy) August
see Abel, Col. Rudolf Ivanovic aka William (Willy) August Fisher

Foreign Broadcast Information Service (FBIS)
Gulf War operations in Tel Aviv, Stud. Intel. V36:5-1-3 PDF [358KB*]
origins of and World War II years, Stud. Intel. Fall/Winter 2001, No. 11:33-43 PDF [1.4MB*]
reorganization, 1947-1951, Stud. Intel. Winter 1999/2000:32-35 PDF

Foreign intelligence organizations
see also British intelligence, pre-World War II and World War II
see also History of intelligence [various country entries]
see also Soviet operations, general
see also Soviet operations, GRU
see also Soviet operations, KGB
Australia, enhanced counterterrorism effort by, Stud. Intel. V48:1-27-38 PDF [157KB*]
avoiding foreign recruitment, Stud. Intel. V10:3-77-80 PDF [170KB*]
China, Communist "brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [168KB*]
eastern Europe, problems of intelligence reform since end of cold war, Stud. Intel. V48:1-11-25 PDF [766KB*]
French External Service (SDECE), surfacing to US of Col. Vladimir I. Vetrov ("Farewell"), Soviet KGB source by, Stud. Intel. V39:5-121-126 PDF [460KB*]
Germany, memoir of General Reinhard Gehlen, Chief of BND, Stud. Intel. V16:3-89-98 PDF [461KB*]
Israel, independent satellite intelligence produced by (1995), Stud. Intel. Winter/Spring 2001, No. 10:33-38 PDF [489KB*]
Japan
1960s lag in foreign operations, Stud. Intel. V7:3-1-14 PDF [788KB*]
World War II Japanese intelligence veterans' involvement in intelligence, security, and CI organizations, Stud. Intel. V11:1-67-70 PDF [166KB*]

Foreign liaison operations
counterintelligence (CI), importance to, Stud. Intel. V13:1-15-16 PDF [922KB*]
OSS cooperation with Soviet intelligence, memos from Gen. Donovan regarding, Stud. Intel. V7:3-63-74 PDF [552KB*]

[Top of page]

 

G

Goss, Porter J., DCI, 2004-2006
Aspin-Brown commission on roles and capabilities of the intelligence community, participation on, Stud. Intel. V48:3-14-15 PDF [524KB*]

Graphological analysis
see Handwriting analysis

GRU
see Soviet operations, GRU

[Top of page]

 

H

Handwriting analysis
psychological assessment, promise of, Stud. Intel. V3:3-23-43 PDF [1MB*]; Stud. Intel. V3:3-45-51 PDF [334KB*]

Harting, Arkadiy
star of the Russian Okhrana foreign intelligence service until 1909, Stud. Intel. V11:1-71-86 PDF [795KB*]

Helms, Richard, DCI, 1966-1973
appreciation of Helms as an intelligence professional, Stud. Intel. V46:4-35-43 PDF [520KB*]
comments on
by Col. Lawrence "Red" White, former EXDIR, Stud. Intel. Winter 1999/2000:40-42 PDF
by DCI George Tenet (eulogy), Stud. Intel. V46:4-31-33 PDF [125KB*]
review of his memoirs, Stud. Intel. V48:1-75-84 PDF
views on
basic principles of intelligence activity, Stud. Intel. V46:4-37-39 PDF [520KB*]
James Angleton, chief of Counterintelligence Staff, Stud. Intel. V48:1-82-84 PDF [85KB*]
secret services in America, role of, Stud. Intel. V11:3-1-16 PDF [815KB*]
Watergate, Stud. Intel. V48:1-76-78 PDF [85KB*]
Yuri Nosenko as a Soviet defector, Stud. Intel. V48:1-78-82 PDF [85KB*]

Hillenkoetter, Admiral Roscoe H., DCI, 1947-1950
role in National Security Act of 1947, Stud. Intel. V13:1-33-56 PDF [1.2MB*]

History of intelligence
see also Bibliographies
see also Central Intelligence Agency (CIA), history
see also Counterintelligence (CI), history
see also Donovan, General William J.
see also Military intelligence, history prior to World War II; Military intelligence, history, World War II
see also Office of Strategic Services (OSS)
see also SIGINT (Signals Intelligence), history prior to World War II; SIGINT (Signals Intelligence), history, World War II
see also Soviet operations, general
American Civil War and post-War
African-American spies for Union forces, Stud. Intel. Winter 1998/99:73-80 PDF
consequences of lost military order, Stud. Intel. V2:1-103-113 PDF [618KB*]
first encrypted cable (1866), Stud. Intel. V36:5-105-109 PDF [692KB*]
intelligence facts and myths, Stud. Intel. V10:3-81-96 PDF [837KB*]; Stud. Intel. V10:4-69-93 PDF [1.3MB*]
"leaks" of military information, Stud. Intel. V9:4:75-76 PDF [67.9KB*]
US intelligence collection operations against Napoleon III and Emperor Maximilian of Mexico, Stud. Intel. V2:3-81-101 PDF [1MB*]
American Revolutionary War
Benjamin Franklin's private secretary in Paris as British spy, Stud. Intel. V5:1-A53-A67 PDF [757KB*]
French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831KB*]
John Andre, Benedict Arnold's British case office, story of, Stud. Intel. V5:3-A1-A15 PDF [763KB*]
Nathan Hale's failed mission, capture and execution, Stud. Intel. V17:4-67-74 PDF [533KB*]
Biblical lesson: agent of influence restores David to the throne, Stud. Intel. V13:2-21-24 PDF [154KB*]
Czech intelligence
Czech exile operations in London, Stud. Intel. V7:2- A1-A11 PDF [593KB*]
Czechs catch a German write-in, 1936, Stud. Intel. V6:4-A1-A2 PDF [723KB*]
operation to assassinate Nazi chief of security apparatus, Stud. Intel. V4:1-1-19 PDF [938KB*]; Stud. Intel. V5:3-65-67 PDF [120KB*]
operations, late 1930s, tradecraft, Stud. Intel. V2:4-93-103 PDF [572KB*]
penetration of German Abwehr, Stud. Intel. V3:2-31-45 PDF [1.2MB*]
Danish underground in World War II, Stud. Intel. V6:4-A63-A66 PDF [165KB*]
French government material support to the American Revolution, Stud. Intel. V14:1-1-18 PDF [831KB*]
French resistance in World War II
anti-American, French version, Stud. Intel. V19:2-39-42 PDF [206KB*]
Soviet Bloc version, Stud. Intel. V5:5-A47-A50 PDF [166KB*]
German intelligence
German interrogation/torture of OSS officer in Italy, Stud. Intel. V11:4-60-78 PDF [1.7MB*]
German success against SOE units in World War II, reasons why, Stud. Intel. V6:1-73-80 PDF [394KB*]
memoir of General Reinhard Gehlen, Chief of BND, Stud. Intel. V16:3-89-98 PDF [461KB*]
sabotage activities in the US before World War I, Stud. Intel. V46:1-3-9 PDF [384KB*]
Historical Intelligence Collection: world's largest, Stud. Intel. V37:5-91-94 PDF [593KB*]
Irish Republican Army (IRA) operations against Britain 1919-1920, Stud. Intel. V11:1-69-78 PDF [464KB*]
Japanese experience
Japanese intelligence efforts against the USSR along the Manchurian border 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
medieval Ninja warrior-spies, Stud. Intel. V9:2-45-52 PDF [357KB*]
targeting Russia in Europe, Stud. Intel. V11:1-81-82 PDF [795KB*]
Poland's World War II agent operations against German and USSR occupation forces, Stud. Intel. V2:3-107-116 PDF [522KB*]
Russian experience
Bolshevik's successful counterintelligence chief 1905-1914, Stud. Intel. V11:4-83-100 PDF [522KB*]
Col. Alfred Redl, case of, Stud. Intel. V4:2-A43-A47 PDF [172KB*]
Czarist use of non-Russian female agents, Stud. Intel. V9:3-59-78 PDF
Czarist use of Russian female agents, Stud. Intel. V9:2-25-41 PDF [794KB*]
Okhrana - history 1881-1917, Stud. Intel. V11:1-93-98 PDF [296KB*]
Okhrana foreign operations, Stud. Intel. V11:1-71-86 PDF [795KB*]; Stud. Intel. V12:3-65-78 PDF [729KB*]
Okhrana operations against Germany, Stud. Intel. V10:2-57-72 PDF [831KB*]
Okhrana operations in West Europe, 1885-1905, Stud. Intel. V10:3-55-66 PDF [592KB*]
penetration of OSS operation to infiltrate agents into Germany at end of World War II, Stud. Intel. V46:1-26-28 PDF [1MB*]
World War II
agent radio operations, allied and enemy, Stud. Intel. V3:1-125-132 PDF [390KB*]
Australian/Portuguese covert action operation compromised by poor tradecraft, Stud. Intel. V4:4-A23-A27 PDF [246KB*]
capture of Nazi intelligence chief, 1945, Stud. Intel. V4:2-A11-A29 PDF [1MB*]
COMINT loss causes Rommel's defeat at El Alamein, Stud. Intel. V3:4-73-80 PDF [405KB*]
Dutch resistance organizations, Stud. Intel. Spring 1998:105-118 PDF [1.1MB*]
FBI's Special Intelligence Service (SIS), bureaucratic history of, Stud. Intel. V48:1-45-58 PDF [932KB*]
French agent (Jeannie de Clarens) reporting on German rocketry, Stud. Intel. V38:5-31-33 PDF [737KB*]
French resistance efforts, Brittany, Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*]
German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-35-54 PDF [1MB*]
Norwegian sabotage of the Vemork heavy water plant, Stud. Intel. V36:5-82-90 PDF [2.3MB*]
Poland's World War II agent operations against German and USSR occupation forces, Stud. Intel. V2:3-107-116 PDF [522KB*]
R.V. Jones and scientific intelligence, Stud. Intel. V38:5-27-36 PDF [737KB*]
Soviet bugging of Teheran and Yalta conferences, Stud. Intel. V47:1-19-31 PDF [823KB*]
Soviet deception operation against German Abwehr, Stud. Intel. V37:5-83-90 PDF [1.6MB*]
US Army intelligence team operations in New Guinea and the Philippines, Stud. Intel. V3:4-87-92 PDF [292KB*]
US efforts to win Azores base rights from Portugal in World War II, Stud. Intel. V18:4-59-60 PDF [122KB*]
US Office of War Information (OWI) contribution to the Japanese surrender, Stud. Intel. V46:3-55-65 PDF [602KB*]

Human source (HUMINT) collection
see also Collection guidance
see also Collection management
attachƩ reporting, value of, Stud. Intel. V4:2-1-6 PDF; Stud. Intel. V4:3-79-83 PDF [290KB*]
clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*]
debriefing Cuban refugees, Stud. Intel. V11:3-3-4 PDF [815KB*]
delegation interpreters, exploitation of, Stud. Intel. V4:1-21-27 PDF [406KB*]
East-West exchanges, value of, Stud. Intel. V2:3-63-70 PDF [433KB*]
German scientists, engineers, and intellectuals as post-World War II sources, Stud. Intel. V3:3-1-14 PDF; Stud. Intel. V12:2-1 PDF [341KB*]
Hungarian refugee screening and interviewing program (1958), Stud. Intel. V2:1-85-93 PDF [481KB*]
hypnosis, limits of in interrogation, Stud. Intel. V4:1-51-64 PDF [714KB*]
staff officers as collectors
collection techniques as a Russian-speaking tourist in the USSR, Stud. Intel. V2:3-71-74 PDF [178KB*]
gathering information on Soviet consumers, techniques used, Stud. Intel. V12:2-43-51 PDF [486KB*]

Humor
communications from cranks, etc., Stud. Intel. V9:3-79-89 PDF [498KB*]
European Intelligence Chief's low assessment of women as agent material, Stud. Intel. V6:2-A1-A5 PDF [228KB*]
tortured prose in CS communications, Stud. Intel. V16:1-1-7 PDF; Stud. Intel. V17:2-33-37 PDF [239KB*]

[Top of page]

 

I

Intelligence Community (IC) relations and activities
Community reform, calls for
by Lt. Gen. William Odom, former director of NSA, Stud. Intel. V48:2-67-68 PDF [29.9KB*]
internal review and call for broad changes in post 9/11 world, Stud. Intel. V46:1-39-47 PDF [463KB*]
in mid-1970s: Rockefeller commission, Church and Pike Committees, Stud. Intel. V20:2-1-15 PDF [1.1MB*]
mission-oriented centers with strong DCI, proposal for, Stud. Intel. V47:1-33-37 PDF [251KB*]
cooperative efforts: interagency coordination, importance of in meeting military imagery needs, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*]
interagency conflicts over assigning authority to CIA (1947), Stud. Intel. V13:1-33-56 PDF [1.2MB*]

Intelligence failures
Cuba, Bay of Pigs, results of CIA's internal probe concerning, Stud. Intel. Winter 1998/99:92-101 PDF [737KB*]

Intelligence history
see History of intelligence

Intelligence humor
see Humor

Intelligence literature
see Bibliographies

Intelligence professionalism
see Professionalism

Intelligence successes
case studies
Adolf Tolkachev, high level CIA Soviet S&T source, 1977-1985, Stud. Intel. V47:3-5-33 PDF [1.7MB*]
Col. Oleg Penkovsky, high level CIA GRU source, Stud. Intel. V13:2-29-30 PDF [566KB*]
OSS mission to disrupt German rail traffic, Norway, April 1945, Stud. Intel. Winter 1999/2000:53-60 PDF
Polish Colonel Ryszard Kuklinski, Stud. Intel. Summer 2000, No. 9:19-33 PDF [1.3MB*]
Soviet technology acquisition program, disruption of, Stud. Intel. V39:5-121-126 PDF [460KB*]
U-2, development and contributions of, Stud. Intel. Winter 1998/99:1-4 PDF [311KB*]

Interrogation
as used by Communist interrogators, Stud. Intel. V13:4-49-74 PDF [1.2MB*]
detecting lies and finding out why, an anecdote, Stud. Intel. V11:3-107-110 PDF [134KB*]
drugs, general inefficacy in interrogations, Stud. Intel. V5:2-A1-A19 PDF [952KB*]
German interrogation/torture of OSS officer in Italy, Stud. Intel. V11:4-60-78 PDF [1.7MB*]
hostile interrogation
by Iranian Revolutionary Guards 1979-81, Stud. Intel. Spring 1998:17-21 PDF [4MB*]
successful resistance by a North Vietnamese intelligence officer, Stud. Intel. V48:1-45-58 PDF [284KB*]
hypnosis, limits of, Stud. Intel. V4:1-51-64 PDF [714KB*]
persons under arrest, Stud. Intel V2:3-51-61 PDF [656KB*]
Soviet and Chinese communist "brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [169KB*]
techniques and tactics
detecting fabricators/provocations in Germany 1945-48, Stud. Intel. V37:5-81-90 PDF [1.6MB*]
used by South Vietnamese and American interrogators, Stud. Intel. V48:1-45-58 PDF [284KB*]

[Top of page]

 

J

Jones, R. V., developer of British World War II technical intelligence, Stud. Intel. V38:5-27-36 PDF [737KB*]

[Top of page]

 

K

KGB
see Soviet operations, KGB

Kuklinski, Ryszard
Polish Colonel recruited by US, story of, Stud. Intel. Summer 2000, No. 9:19-33 PDF [1.3MB*]

[Top of page]

 

L

Language, foreign
experiences of Russian-speaking tourist in the USSR, Stud. Intel. V2:3-71-74 PDF [178KB*]
spelling of foreign names, problem in name indexing, Stud. Intel. V6:2-1-17 PDF [771KB*]

Legal issues
see also Congressional relations, oversight activities
confidentiality of sources, legal basis for, Stud. Intel. V2:4-61-74 PDF [708KB*]
intelligence law
CIA Inspector General, statutory status, Stud. Intel. Winter/Spring 2001, No. 10:15-21 PDF [506KB*]
Foreign Intelligence Surveillance Act (1978), Stud. Intel. Winter/Spring 2001, No. 10:93-94 PDF [778KB*]
international law re: a foreign government agent's liability under local law, Stud. Intel. V5:2-A21-A34 PDF [701KB*]
judicial oversight of intelligence activities since the mid-1970s, Stud. Intel. V39:5-43-50 PDF [635KB*]
national CI organization, importance of potential legislation to establish, Stud. Intel. V13:1-9-11 PDF [922KB*]
Publications Review Board, legal basis and criteria for, Stud. Intel. V41:3-1-8 PDF [614KB*]
unauthorized disclosure, need for better laws to prevent, Stud. Intel. V47:1-33-37 PDF [622KB*]
women in the Directorate of Operations (DO), legal challenge to subordinate position of, Stud. Intel. V46:3-45-53 PDF [469KB*]

Logistics analysis
pioneer estimate by the OSS Research and Analysis Branch, Stud. Intel. V6:4-A15-A28 PDF [698KB*]

[Top of page]

 

M

McCone, John A., DCI, 1961-1965
evaluation by Lawrence K. White, former DDA and EXDIR, Stud. Intel. Winter 1999/2000:38-40 PDF

Military intelligence
see also Soviet operations, GRU
attachƩ reporting, value of, Stud. Intel. V4:2-1-6 PDF; Stud. Intel. V4:3-79-83 PDF [290KB*]
battlefield intelligence, limited value of for achieving victory, Stud. Intel. V48:2-67-68 PDF [29.9KB*]
Berlin, center of intelligence war between the West and Soviets, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769KB*]
CIA operational support
NIST ā€“ National Intelligence Support Team ā€“ crisis support to the field commander, Stud. Intel. Winter 1999/2000:87-96 PDF
Somalia, 1992, collection needs, Stud. Intel. V39:2-28-59 PDF [630KB*]
collection guidance on conventional weapons, importance of, Stud. Intel. V9:4-13-17 PDF [220KB*]
counterinsurgency
see Counterinsurgency operations
Cuban missile crisis, reporting from Moscow during, Stud. Intel. V37:5-105-109 PDF [393KB*]
friendly forces in southern Laos (early 1970s), operations of, Stud. Intel. V17:1-11-19 PDF [566KB*]
history prior to World War II
Army attache reporting 1918-1939, poor quality of, Stud. Intel. V38:5-111-115 PDF [368KB*]
British military intelligence, 1874, organization, use, and management of, Stud. Intel. V7:4-A19-A24 PDF [271KB*]
Civil War: facts and fiction 1861-63, Stud. Intel. V10:3-81-96 PDF; Stud. Intel. V10:4-69-93 PDF [1.3MB*]
creation of first effective American military intelligence organization,1863, Stud. Intel. V10:4-74-79 PDF [1.3MB*]
history, World War II
air-targeting support, Stud. Intel. V9:3-25-31 PDF [357KB*]
British weapons intelligence sources and analysis, Stud. Intel. V6:3-55-76 PDF [972KB*]
capture of Nazi intelligence chief, 1945, Stud. Intel. V4:2-A11-A29 PDF [1.03MB*]
European theater, relative value of combat intelligence sources in, Stud. Intel. V5:4-45-51 PDF [350KB*]
human agent, patrol and photo intelligence in Burma theater, 1944, Stud. Intel. V5:1-A1-A27 PDF [1.3MB*]
Japanese intelligence efforts against the USSR along the Manchurian border 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
SIGINT, heavy use of in anti-submarine warfare, World War II, Stud. Intel. V7:2-A19-A23 PDF [218KB*]
"the Pond," a US Army G-2 collection organization run by John Grombach, activities of, Stud. Intel. V48:3-69-75 PDF [189KB*]
imagery, importance of at tactical and command levels, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*]
KGB collection activity in war and peace, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
Operation Iraqi Freedom, revolution in military affairs (RMA) as demonstrated in (2004), Stud. Intel. V48:1-1-10 PDF [147KB*]
prisoners: important source of combat intelligence, Stud. Intel. V5:4-45-46 PDF [350KB*]
on the Soviet Union
Cuban missile crisis, reporting from Moscow during, Stud. Intel. V37:5-105-109 PDF [394KB*]
Soviet military S&T - reporting on by A. Tolkachev, 1977-85, Stud. Intel. V47:3-6, 18-19 PDF [1.7MB*]
war plans, Stud. Intel. Summer 2000, No. 9:26-27 PDF [1.3MB*]
wargames: value of 1950 Vieques island games, Stud. Intel. V4:2-A1-A9 PDF [396KB*]

[Top of page]

 

N

National Security Agency (NSA)
intercept operations in the United States
discovery of telegram intercept program, Stud. Intel. Winter 1999/2000:43-51 PDF
judicial and congressional oversight of, Stud. Intel. Winter/Spring 2001, No. 10:85-94 PDF [778KB*]
National Cryptologic Museum, description of, Stud. Intel. V47:3-51-60 PDF [519KB*]

[Top of page]

 

O

Office of Strategic Services (OSS)
see also Donovan, General William J.
agent reports
Donovan reports for the President: Allen Dulles on cracking morale in German Foreign office and Abwehr (April 1944), Stud. Intel. V9:1-63-80 PDF [925KB*]
Donovan reports for the President: possible OSS-NKVD collaboration, Stud. Intel. V7:3-63-74 PDF [552KB*]
Donovan reports for the President: surrender of the German army in northern Italy, Stud. Intel. V7:2-73-98 PDF [1.2MB*]
Donovan reports to the President: Japanese peace feelers, Jan-Aug, 1945, Stud. Intel. V9:3-33-50 PDF [772KB*]
France and Germany, reporting from behind enemy lines, Stud. Intel. V5:4-49-50 PDF [350KB*]
surrender of German armies in Italy, cables from Bern on, Stud. Intel. V7:2-73-98 PDF [1.2MB*]
debunking of OSS reminiscences, Stud. Intel. V8:1-A17-A20 PDF; Stud. Intel. V17:1-71-79 PDF [630KB*]
operations, Asia: Detachment 101, operations in Burma, Stud. Intel. V4:3-A1-A13 PDF [609KB*]; Stud. Intel. V5:1-A7-A27 PDF [1.3MB*]; Stud. Intel. Fall/Winter 2001, No. 11:67-79 PDF [1.6MB*]
operations, Europe and North Africa, general
extraordinary exploits of naturalized German Jew, Stud. Intel. V3:3-1-8 PDF [695KB*]
Holland, operations in from May 1944, Stud. Intel. Spring 1998:105-118 PDF [1.1MB*]
Italian operations run out of Bern, Stud. Intel. V37:5-68-70 PDF [1.2MB*]
Italian partisans, 1944, support to, Stud. Intel. Spring 1998:95-103 PDF [689KB*]
Norway, disruption of German rail traffic in, Stud. Intel. Winter 1999/2000:53-60 PDF
Operation Cicero, OSS involvement in, Stud. Intel. V1:4-47-53 PDF [351KB*]
Yugoslavia, on Communist takeover of, Stud. Intel. V9:2-53-84 PDF [1.3MB*]
operations, France
Jedburgh teams, radio-operator's account behind enemy lines (Brittany, 1944), Stud. Intel. Winter 1998/99:15-50 PDF [2.9MB*]
support to French resistance, Stud. Intel. V11:2-103-105 PDF [298KB*]
operations, Germany
Allen Dulles meeting with Nazi intelligence chief, Stud. Intel. V4:2-A11-A29 PDF [1MB*]
Allen Dulles operations from Bern, Stud. Intel. V37:5-64-70 PDF [1.2MB*]
Fritz Kolbe (alias George Wood) espionage services, Stud. Intel. V10:1-69-96 PDF [1.1MB*]
Himmler's efforts to use OSS channels to broker a deal to overthrow Hitler, Stud. Intel. V46:1-31-38 PDF [455KB*]
London-based operation to infiltrate agents into Nazi Germany, Stud. Intel. V46:1-11-29 PDF [1MB*]
tracking Nazi gold abroad, Stud. Intel. Summer 2000, No. 9:35-50 PDF [1.3MB*]
William Casey and German operations, Stud. Intel. V37:5-74-75 PDF [1.3MB*]
operations, USSR
OSS and General Gehlen, Stud. Intel. V37:5-74-75 PDF [1.3MB*]
possible OSS-NKVD collaboration, Stud. Intel. V7:3-63-74 PDF [552KB*]
origins and demise
CIG, movement of clandestine parts of OSS into, Stud. Intel. V12:1-68-71 PDF [1.1MB*]
William J. Donovan, tribute to, by Allen W. Dulles, Stud. Intel. V3:3-71-83 PDF [689KB*]
policies and politics: bombing strategy in Europe, Stud. Intel. V36:5-73-79 PDF [970KB*]
Research and Analysis Branch, Stud. Intel. V6:4-A15-A28 PDF [698KB*]; Stud. Intel. V8:3-66-73 PDF [2.1MB*]; Stud. Intel. V37:5-71-79 PDF [1.3MB*]

Operations management
Laos, air operations in, (1955-74), Stud. Intel. Winter 1999/2000:71-86 PDF
multi-agency CI study in Vietnam, Stud. Intel. V13:2-34-36 PDF [566KB*]
poor management, examples of: Laos, disaster due to over-centralized, remote control, Stud. Intel. V38:5-79-88 PDF [818KB*]
SR-71, management of development effort, Stud. Intel. V15:1-1-25 PDF [1.8MB*]

[Top of page]

 

P

Penkovskiy, Colonel Oleg V. (GRU)
exploitation of, Stud. Intel. V13:2-29-30 PDF [566KB*]

Personnel management
see also Professionalism
in the Directorate of Operations (DO)
rescue and rehabilitation of injured case officer, Belgian Congo, 1964, Stud. Intel. Winter 1999/2000:21-28 PDF
views on unaccompanied and divided overseas tours, Stud. Intel. V37:5-58 PDF [1.1MB*]
in the KGB
role of the Resident, Stud. Intel. V15:1-119-120 PDF [349KB*]
staff recruitment, training, and promotion procedures, Stud. Intel. V15:1-117-119 PDF [349KB*]
leadership development, doctrine and practices, 1950s, Stud. Intel. V2:3-1-6 PDF [295KB*]
NOCs overseas: pros and cons of non-official cover, Stud. Intel. V11:1-61-65 PDF [237KB*]

Powers, Francis Gary
release of captured U-2 pilot from Soviet prison, Stud. Intel. V9:3-97-100 PDF [170KB*]
Soviet view of shootdown of U-2, Stud. Intel. Winter 1998/99:10-12 PDF [819KB*]

Presidential relations
Executive Order 11905 (1976), background, Stud. Intel. V20:2-1-15 PDF [1.1MB*]

Professionalism
see also Ethics of intelligence professionals
see also Personnel management
see also Training
case officers, essential qualities of (Tehran, 1979), Stud. Intel. Spring 1998:1-45 PDF [4MB*]
role of intelligence literature, Stud. Intel. V1:1-1-11 PDF [354KB*]
status in 1955, Stud. Intel. V1:1-1-11 PDF [354KB*]

[Top of page]

 

R

Raborn, Vice Admiral William, DCI, 1965-1966
Col. "Red" White, reflections by, Stud. Intel. Winter 1999/2000:40 PDF

Rado, Alexander aka Sandor Radolffy and Sandor Rado
see Soviet operations, general, espionage activities, general

Records management
CORONA reconnaissance satellite imagery, release of, Stud. Intel. V39:5-61-69 PDF [1013KB*]
in counterintelligence
CI organization's responsibility to organize, maintain and exploit CI information, Stud. Intel. V13:1-20-21 PDF [922KB*]
Irish Republican Army (IRA) CI records system 1919-1920, Stud. Intel. V11:1-71 PDF [464KB*]
Russian exile CI successes - importance of records, Stud. Intel. V11:4-83-100 PDF [912KB*]
declassification: Freedom of Information Act two years after implementation, Stud. Intel. V18:3-11-18 PDF [470KB*]
emergency contact instructions/background, importance of, Stud. Intel. V37:5-57 PDF [1.1MB*]
Historical Intelligence Collection - world's largest, Stud. Intel. V37:5-91-94 PDF [593KB*]
records handling systems and processes
KGB field and headquarters records system, Stud. Intel. V15:1-115-116 PDF [349KB*]
proposed computerized name index system (1962), Stud. Intel. V6:2-1-17 PDF [771KB*]

Reporting
see also Human Source (HUMINT) collection
case histories
KGB: economic reporting, doctrine and example, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
military attachƩ reporting during Cuban missile crisis, Stud. Intel. V37:5-105-109 PDF [394KB*]
ULTRA information, World War II, problems in processing, Stud. Intel. V19:3-45-47 PDF [186KB*]
evaluation of
HUMINT during Cuban missile crisis, Stud. Intel. V8:4-93-98 PDF [294KB*]
tendency of Latin American sources to state hopes as facts, Stud. Intel. V7:4-31-32 PDF [102KB*]
guidelines
case officer's responsibility to evaluate source and information, some guidelines, Stud. Intel. V5:3-37-47 PDF [552KB*]
CI organization's responsibility to collate, analyze and prepare CI reports, Stud. Intel. V13:1-19-21 PDF [922KB*]
clandestine collection requirements process, Stud. Intel. V4:4-43-61 PDF [1MB*]
HUMINT, value of as follow up to PHOTINT/SIGINT collection, Stud. Intel. V6:3-66-76 PDF [973KB*]
maps, advantages and optimum qualities of in field reporting, Stud. Intel. V6:2-43-52 PDF [426KB*]
source motivations/abilities, problems of differing, Stud. Intel. V11:3-3-4 PDF [815KB*]

[Top of page]

 

S

Scientific intelligence
HUMINT, primacy of in peacetime scientific collection, Stud. Intel. V6:4-38-39 PDF [538KB*]
PHOTINT, SIGINT captures in war-time collection, value of, Stud. Intel. V6:4-38-39 PDF [538KB*]
R.V. Jones, scientific intelligence genius during and after World War II, Stud. Intel. V38:5-27-36 PDF [737KB*]
Soviet electronic R&D as a predictor of military capabilities, use of (1950s), Stud. Intel. V12:2-1-6 PDF [341KB*]
Soviet ice station capabilities, Stud. Intel. V38:5-107 PDF [746KB*]
Soviet radars, precision measurement program for (1960s), Stud. Intel. V12:2-7-19 PDF [677KB*]

Security
computer systems, operator vulnerability to information warfare, Stud. Intel. Summer 2000, No. 9:97-103 PDF [592KB*]
embassy/station protection, failures associated with capture of US Embassy in Tehran, 1979, Stud. Intel. Spring 1998:7-15 PDF [4MB*]
operational
avoiding detection of radio receivers, Stud. Intel. V7:4-57-60 PDF [178KB*]
counterintelligence, key function of, Stud. Intel. V13:2-26-29 PDF [566KB*]
dogs' sensitivity to human scent, Stud. Intel. V5:2-25-37 PDF [645KB*]
techniques employed behind enemy lines, World War II, Stud. Intel. V2:4-55-60 PDF [272KB*]
polygraph, case officer views on using, Stud. Intel. V47:1-79-80 PDF [481KB*]
source protection
criteria for document declassification, Stud. Intel. V18:3-11-18 PDF [470KB*]
dangers from declassification policies, Stud. Intel. Winter/Spring 2001, No. 10:55-61 PDF [553KB*]
Publications Review Board, basic review guidelines of, Stud. Intel. V41:3-1-8 PDF [614KB*]

SIGINT (Signals Intelligence)
ELINT (Electronic Intelligence)
collecting faint electronic missile signals with an automated system, Stud. Intel. V12:2-21-27 PDF [286KB*]
monitoring Soviet radar signals reflected by the moon (1960s), Stud. Intel. V11:2-59-66 PDF [426KB*]
Office of ELINT program for measuring power of radars, Stud. Intel. V12:2-7-19 PDF [677KB*]
primer and history (1958), Stud. Intel. V2:1-71-83 PDF [633KB*]
history, post-World War II, ELINT primer and history (1958), Stud. Intel. V2:1-71-83 PDF [633KB*]
history, prior to World War II
Civil War: Union flag signal deception operation, 1863, Stud. Intel. V10:4-74-79 PDF [1.3MB*]
SIGINT, British doctrine (1874), Stud. Intel. V7:4-A19-A24 PDF [272KB*]
US intelligence collection operations against Napoleon III and Emperor Maximilian of Mexico, Stud. Intel. V2:3-81-101 PDF [1MB*]
history, World War II
COMINT loss cause of Rommel's defeat at El Alamein, Stud. Intel. V3:4-73-80 PDF [405KB*]
German agent radio communications, search for and detection of by the FCC, Stud. Intel. V4:2-35-54 PDF [1MB*]
Japanese SIGINT activity against the USSR along the Manchurian border, 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
SIGINT, heavy use of in anti-submarine warfare, World War II, Stud. Intel. V7:2-A19-A23 PDF [218KB*]
successes and failures, World War II, Stud. Intel. V3:1-99-114 PDF [876KB*]
ULTRA information, World War II, problems in processing, Stud. Intel. V19:3-45-47 PDF [186KB*]
World War II weapons intelligence source, Stud. Intel. V6:3-55-76 PDF [973KB*]
Le Carre spy novels, as used in, Stud. Intel. V37:5-125-132 PDF [1.3MB*]

Smith, General Walter Bedell, DCI, 1950-1953
evaluation of
by Lawrence K. White, former DDA and EXDIR, Stud. Intel. Winter 1999/2000:34-35 PDF
by Walter Pforzheimer, Legislative Counsel, Stud. Intel. Winter/Spring 2001, No. 10:41-42 PDF [1.1MB*]
memorabilia, including his presidential citation, honors, and bibliography, Stud. Intel. V5:5-A1-A13 PDF [404KB*]
relations with Truman and Eisenhower, Stud. Intel. V38:5-66-72 PDF [1MB*]

Soviet Bloc (East European services) operations
Bloc restitution missions in West Germany, cover for intelligence activity 1945-1949, Stud. Intel. V5:2-39-43 PDF [223KB*]
Czechoslovakia, Alfred Frenzel, West German Socialist Deputy and Czech IS agent, Stud. Intel. V6:2-A32-A33 PDF [673KB*]
East Germany
East German operations (1950s), Stud. Intel. V7:3-15-37 PDF [1.2MB*]
use of East Berlin as operations base 1950s - case histories, Stud. Intel. V6:2-A32-A33 PDF [673KB*]
West German chief of Intelligence, account of defection to East Germany, Stud. Intel. V4:4-1-26 PDF [1.9MB*]
Poland, use of East Berlin as operations base 1950s - case histories, Stud. Intel. V6:2-A30-A32 PDF [673KB*]
Soviet Bloc account of European resistance movements, Stud. Intel. V5:5-A47-A50 PDF [166KB*]

Soviet operations, general
see also Denial and Deception (D&D) operations, Soviet practice
see also Soviet operations, GRU
see also Soviet operations, KGB
assassinations - NKVD and the massacre of Polish POWs, Stud. Intel. Winter 1999/2000:61-70 PDF
Berlin, center of intelligence war between the West and Soviets, Stud. Intel. Summer 2000, No. 9:1-10 PDF [769KB*]
"brainwashing" techniques, Stud. Intel. V5:5-A33-A36 PDF [169KB*]
case officer training and GRU-KGB relations, Stud. Intel. V10:4-55-56 PDF [667KB*]
East Berlin, use of as operations base 1950s and 60s, Stud. Intel. V6:2-A32-A33 PDF [673KB*]
espionage activities, general
Germany: deception and penetration operations 1939-48, Stud. Intel. V37:5-83-90 PDF [1.6MB*]
Sandor Rado, Soviet agent from 1919-1981, Stud. Intel. V12:3-41-61 PDF [1.3MB*]
espionage in America
Alger Hiss and Whittaker Chambers, Stud. Intel. Winter/Spring 2001, No. 10:1-13 PDF [1.1MB*]
illicit technology acquisition program, 1970-1984, Stud. Intel. V39:5-121-126 PDF [460KB*]
Rosenbergs, Julius and Ethel, Stud. Intel. V46:4-63-73 PDF [514KB*]
forgeries
book about British Commander Lionel Crabb, Stud. Intel. V5:3-A35-A37 PDF [117KB*]
book about Soviet activities in West and Middle East, Stud. Intel. V5:3-A36-A37 PDF [117KB*]
propaganda forgeries, 1956-58, Stud. Intel. V5:1-25-51 PDF [1.5MB*]
geographic intelligence, Soviet collection efforts, 1955-1968, Stud. Intel. V12:3-51-61 PDF [1.3MB*]
Leon Trotsky and the Fourth International, efforts to destroy, Stud. Intel. V16:1-15-61 PDF [2.3MB*]
operations in Europe, 1921-1939, Stud. Intel. V14:1-113-126 PDF [658KB*]
political action operations
Cominform - political action front activity, 1949, Stud. Intel. V38:2-29-30 PDF
Ghana, 1957, Stud. Intel. V11:3-10-11 PDF [815KB*]
propaganda operations
distortions of US intelligence organs and operations, Stud. Intel. V4:3-A19-A26 PDF [392KB*]
efforts (1950s-1960s) to discredit CIA, Stud. Intel. V6:1-29-55 PDF [1.4MB*]
recruitment operations: efforts to recruit, then expose a British MP, Stud. Intel. V11:1-87-92 PDF [295KB*]
requirements for German defectors in Turkey, Stud. Intel. V7:3-70-71 PDF [552KB*]
scientific/student exchanges for collection, use of, Stud. Intel. V6:4-9-15 PDF {369KB*]

Soviet operations, GRU
see also Soviet operations, general
civilian cover (1960s), Stud. Intel. V8:3-17-33 PDF [956KB*]
glorified by USSR (1960s), Stud. Intel. V9:4-77-84 PDF [756KB*]
handling walk-ins (1960s), Stud. Intel. V8:1-16-47 PDF [1.7MB*]
penetration of OSS operation to infiltrate agents into Germany at end of World War II, Stud. Intel. V46:1-26-28 PDF [1MB*]
recruitment, training, handling, and wrap up of a Swedish naval NCO (1949-51), Stud. Intel. V6:4-A29-A41 PDF [705KB*]
Rote Drei: an analysis of the Swiss-based net (and principal source, "Lucy") during World War II, Stud. Intel. V13:3-51-90 PDF [1.9MB*]; Stud. Intel. V16:2-109-111 PDF [124KB*]; Stud. Intel. V16:3-87-88 PDF [98KB*]
Stig Wennerstrom, Swedish Colonel and GRU spy, Stud. Intel. V10:3-67-76 PDF [468KB*]; Stud. Intel. V18:3-33-35 PDF [191KB*]
training for overseas assignments, Stud. Intel. V10:4-45-57 PDF [667KB*]

Soviet operations, KGB
see also Soviet operations, general">Soviet operations, general
"active measures", economic warfare, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
counterintelligence doctrine, 1960s, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
embassy operations (Burma, 1950s), Stud. Intel. V7:3-113-118 PDF [306KB*]
espionage activities
bugging of Teheran and Yalta conferences, Stud. Intel. V47:1-19-31 PDF [823KB*]
focus on secret documents, Stud. Intel. V8:1-A28-A30 PDF [105KB*]
George Blake, story of, Stud. Intel. V13:2-27-29 PDF [566KB*]
illegals, training and use of Colonel Abel, Stud. Intel. Special Unclass. Ed., Fall 2000:137-148 PDF [812KB*]
interrogation techniques, including drugs and hypnosis, Stud. Intel. V2:2-59-63 PDF [271KB*]
KGB agent cipher system in 1953, Stud. Intel. V5:5-A1-A13 PDF [404KB*]
organization and authority
First and Second Chief Directorates: differences in style, Stud. Intel. V16:1-81-82 PDF [100KB*]
goals, doctrine, and methods as reported by a senior defector (1963), Stud. Intel. V7:2-45-65 PDF [1.1MB*]
internal management methods and style, Stud. Intel. V15:1-115-121 PDF [349KB*]
recruitment and agent handling
doctrine on meeting with agents, Stud. Intel. V9:1-63-80 PDF [925KB*]
homosexuals, Stud. Intel. V7:2-45-65 PDF [1.1MB*]
recruitment of a European embassy clerical in Moscow, Stud. Intel. V13:2-87-106 PDF {951KB*]
recruitment procedures, Stud. Intel. V15:1-116-117 PDF [349KB*]
tradecraft for avoiding detection, Stud. Intel. V8:2-65-91 PDF [1.3MB*]
training curriculum, circa early 1950s, Stud. Intel. V3:1-93-98 PDF [283KB*]

Support (non-operational)
information management, 1965 Community study of support to, Stud. Intel. V10:2-43-55 PDF [674KB*]

[Top of page]

 

T

Target analysis
East European official installations, selecting approaches for penetrating, Stud. Intel. V6:3-47-54 PDF [442KB*]
human targets
importance of "face" among Arabs, Stud. Intel. V8:3-43-54 PDF [629KB*]
personality profiles of Cuban refugees, Stud. Intel. V8:3-35-41 PDF [357KB*]
Vietnamese, potential vulnerabilities for for operational purposes, Stud. Intel. V12:4-57-71 PDF [961KB*]
reverse telephone directories, use of (1950s), Stud. Intel. V7:4-61-64 PDF [185KB*]

Technical collection operations
see also SIGINT (Signals intelligence)
see also Technical operations
imagery collection
aerospace photography, technical elements of and expected improvements, Stud. Intel. V6:4-1-8 PDF [435KB*]
clandestine agent photography by A. Tolkachev, Stud. Intel. V47:3-17-18 PDF [1.7MB*]
importance of at tactical and command levels, Stud. Intel. Winter 1998/99: 15-23 PDF [2.9MB*]
imagery, exploitation of
CORONA reconnaissance satellite imagery, declassification and release of, Stud. Intel. V39:5-61-69 PDF [1013KB*]
photointerpretation from 1942-1973, Stud. Intel. V19:1-9-12 PDF [264KB*]
World War II weapons intelligence, Stud. Intel. V6:3-66-76 PDF [973KB*]
nuclear test detection, methods for, East-West conference on (1958), Stud. Intel. V3:1-1-12 PDF [642KB*]
pinpointing targets of intelligence interest, agent tools for, Stud. Intel. V11:3-77-84 PDF [443KB*]
SR-71 aircraft, development of, Stud. Intel. V15:1-1-25 PDF [1.8MB*]
telephone tap and audio operations
audiosurveillance, primary means of, Stud. Intel. V4:3-39-46 PDF [406KB*]
East European installations as targets: benefits and suggestions, Stud. Intel. V6:3-47-54 PDF [442KB*]
important tool of CI, Stud. Intel. V13:2-32 PDF [566KB*]
U-2
birth and development, Stud. Intel. Winter 1998/99:1-4 PDF [311KB*]
Francis Gary Powers, release of from Soviet prison, Stud. Intel. V9:3-97-100 PDF [170KB*]
Soviet view of impact of, Stud. Intel. Winter 1998/99:5-14 PDF [819KB*]

Technical operations
see also Technical collection operations
CI operations, importance in support of, Stud. Intel. V13:1-17-18 PDF [922KB*]
disguises, creating: vignettes from the life of the master of disguise, Antonio Mendez, Stud. Intel. V46:1-67-70 PDF [152KB*]
information warfare, definition and use of, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56 PDF [577KB*]
operational photography
accessing Soviet Lunik for factory markings staff, Stud. Intel. V11:1-33-39 PDF [325KB*]
detailed working guide, Stud. Intel. V5:2-9-16 PDF [339KB*]
ground photography, pointers, Stud. Intel. V5:2-17-23 PDF [363KB*]
Japan: successful use of border observation posts in Manchuria 1940-41, Stud. Intel. V6:2-A7-A20 PDF [623KB*]
support activities
exfiltrating US hostages from Tehran, 1980, Stud. Intel. Winter 1998/99:107-110 PDF [646KB*]
false documentation, use and detection of, Stud. Intel. V4:1-37-49 PDF [713KB*]
identi-kit, use of for facial recognition, Stud. Intel. V4:1-29-35 PDF [324KB*]
microtechnology, implications for advances in, Stud. Intel. V12:4-23-38 PDF [1.3MB*]
trace metal detection of counterinsurgents, Stud. Intel. V11:4-37-44 PDF [351KB*]

Technology transfer operations
illicit technology transfer
major Soviet campaign, 1970-1984, Stud. Intel. V39:5-121-126 PDF [460KB*]
Soviet use of scientific/student exchanges for collection, 1950/60s, Stud. Intel. V6:4-9-15 PDF [369KB*]
US program to counter Soviet efforts, Stud. Intel. V39:5-121-126 PDF [460KB*]

Training
see also Professionalism
foreign area training institutions and approaches, survey of, Stud. Intel. V4:4-A11-A21 PDF [566KB*]
interrogation techniques, Stud. Intel. V2:3-51-61 PDF [656KB*]
language training as part of career development, Stud. Intel. V4:4-A1-A9 PDF [443KB*]
Soviet practice
GRU training for overseas assignments, Stud. Intel. V10:4-45-57 PDF [667KB*]
KGB, GRU training curriculums, circa early 1950s, Stud. Intel. V3:1-93-98 PDF [283KB*]
subliminal behavior, potential of for training, Stud. Intel. V2:2-65-69 PDF [277KB*]

[Top of page]

 

V

Vandenberg, General Hoyt S., DCI, 1946-1947
activities as second DCI and head of Central Intelligence Group (CIG), Stud. Intel. V12:3-79-98 PDF [1.3MB*]; Stud. Intel. V12:4-73-94 PDF [1.2MB*]

Vietnam
see Counterinsurgency operations, Vietnam

[Top of page]

 

W

Walters, Lt. Gen. Vernon A., DDCI, 1972-1976
In Memoriam review of his career, Stud. Intel. V46:1-1-2 PDF [100KB*]
war stories covering his military and, especially, intelligence career, Stud. Intel. V20:2-45-59 PDF [962KB*]

Wisner, Frank, Director of the Office of Policy Coordination (OPC) and Deputy Director of Plans (DDP)
impact of career on CIA, Stud. Intel. V39:5-25-34 PDF [801KB*]
support for the Congress for Cultural Freedom, 1949, Stud. Intel. V38:5-89-98 PDF [736KB*]

* AdobeĀ® ReaderĀ® is needed to view Adobe PDF files. If you don't already have Adobe Reader installed, you may download the current version at www.adobe.com (opens in a new window). [external link disclaimer]

[Top of page]

 


Posted: Apr 26, 2007 05:54 PM
Last Updated: Mar 19, 2008 10:18 AM
Last Reviewed: Apr 26, 2007 05:54 PM