At Cold War's End. A Detection Case that Marked the Times, by John Telleray, with an introduction by Michael Sulick. In November 1989 the opening of the Berlin Wall heralded the end of the Soviet Union and the Cold War. Less well known is that this historic event also sparked the greatest wave of Soviet defectors in the history of the CIA and resulted in a windfall of intelligence on past and then on-going Soviet activities.
Some Far-out Thoughts on Computers by Orrin Clotworthy. This year marks a year-long recognition of the establishment of CIA’s Directorate of Science and Technology. During this year, we will look for opportunities to highlight articles that reflect the state of science and technology at the time of the directorate’s creation.
What’s Next? Recent Works on Improving Intelligence Analysis
Sarah Beebe and Randolph Pherson, Cases in Intelligence Analysis: Structured Analytic Techniques in Action (Washington, DC: CQ Press, 2012), 241 pp.
National Research Council, Baruch Fischhoff and Cherie Chauvin, eds., Intelligence Analysis: Behavioral and Social Scientific Foundations (Washington, DC: The National Academies Press, 2012), 350 pp.
Stephen Marrin, Improving Intelligence Analysis: Bridging the Gap Between Scholarship and Practice (London: Routledge Press, 2011), 192 pp.
Reviewed by Jason Manosevitz. Improving intelligence analysis has become something of a cottage industry during the past decade. The three books reviewed here cover the range of work by scholars and former intelligence officers offering ideas about how to do analysis better. The key questions to ask as this flood of books crests are: what value does each new work add, and does it focus on the right issues?
Historical Dictionary of Chinese Intelligence. I.C. Smith and Nigel West. Lanham, MD: The Scarecrow Press, 359 pp., index. Reviewed by Peter Mattis. Inasmuch as the best analytic books on Chinese intelligence were written more than a decade ago, 1 and as concerns about Chinese intelligence activity aimed at the United States and other countries have grown with the exposure of a great many Chinese spies and the explosion of computer network exploitation attributed to the Chinese, any new, English-language production on the subject is of intense interest. Thus, the collaboration of former FBI counterintelligence specialist I.C. Smith and the prolific intelligence historian Nigel West in producing the Historical Dictionary of Chinese Intelligence would seem to be a welcome development. Unfortunately, the dictionary is incomplete, often misleading, and ultimately it provides a shaky foundation for building under-standing of the challenge.
The Emergency State: America’s Pursuit of Absolute Security at All Costs.
David C. Unger (New York: Penguin Press, 2012), 359 pp., bibliography, index.
Reviewed by Samuel Cooper-Wall. “Oceania was at war with Eastasia: Oceania had always been at war with Eastasia,” the government of Big Brother assured its subjects. In truth, its allies and enemies were in a constant state of flux, but the dazed, gullible, and insufficiently educated public was incapable of knowing the difference.
The Tourist Trilogy: The New Genre?
Olen Steinhauer, An American Spy (New York: Minotaur, 2012), 386 pp.
———, The Tourist (New York: Minotaur, 2009), paperback, 408 pp.
———, The Nearest Exit (New York: Minotaur, 2010), paperback, 404 pp.
Reviewed by John Ehrman. A wise critic once observed that the worst thing that could happen to a rising rock musician was to be hailed as the next Bob Dylan. Almost invariably, the subjects of such praise soon fade into obscurity and the publicists begin hunting for the next prodigy/victim. So it is, too, in the world of espionage novels. Since the end of the Cold War, reviewers have searched for a new writer to inherit the mantles of Graham Greene, Len Deighton, and John le Carré as the new master of the espionage genre, and all have fallen short. (Has it been only four years since a Washington Post reviewer told us that Joseph Weisberg’s now-forgotten An Ordinary Spy “recalls Graham Greene”?) Now the critics have settled on a new candidate, Olen Steinhauer, who has completed three novels focusing on the next ostensible spy for our times, Milo Weaver. “Not since John Le Carré,” the New York Times declares, “has a writer so vividly evoked the multilayered, multifaceted, deeply paranoid world of espio-nage.” Great praise, indeed.
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.