Library

 

Author Title Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z



A

Abrahamson, Sherman R., "Intelligence for Economic Defense", Stud. Intel. V8:2-33-43 (Spring 1964) PDF [588KB*]

"Adam Smith Examines the Intelligence Economy" by Todd Brethauer, Stud. Intel. V39:5-71-73 (1996) PDF [195.1KB*]
Concerned about growing demand for intelligence support at a time of declining resources, the author proposes that an intelligence marketplace be developed in which users are given a budget from which to "pay" for intelligence collection and analysis. This will force consumers to be more judicious in their requests and producers to become more efficient in order to remain in business.

Adams, Robert H., "Developments in Air Targeting: The Air Battle Model", Stud. Intel. V2:2-13-31 (Spring 1958) PDF [992KB*]

"Adversary Agent Radios" by James J. Fauth, Stud. Intel. V10:1-57-67 (Winter 1966) PDF [449.4KB*]
Description of radio equipment used by agents from Communist countries in late 1950s and early 1960s; of historical use only.

"Aerial Photography for Agriculture" by William R. Gasser, Stud. Intel. V11:4-31-36 (Fall 1967) PDF [308.6KB*]
Details how overhead reconnaissance techniques are being developed to produce crop estimates for Communist countries.

"African Numbers Game" by Walter McDonald, Stud. Intel. V8:4-11-20 (Fall 1964) PDF [532KB*]
A senior economic analyst shows how inaccurate national statistics can be and suggests how analysts should handle them.

"Against Footnotes" by Allan Evans, Stud. Intel. V8:4-81-84 (Fall 1964) PDF [171KB*]
Why footnotes to sources are inappropriate in most intelligence publications, and especially NIEs.

"The Agency and the Future" by Charles D. Cremeans, Stud. Intel. V14:1-77-87 (Spring 1970) PDF [540.1KB*]
Changes in world affairs require changes in intelligence priorities and culture. CIA must be ready to adjust to change but also preserve what is essential to its mission, especially the well-educated and trained analyst (a 1970 perspective).

"Agent Hazard in the Super-Het" by M. J. Angellichio, Stud. Intel. V7:4-57-60 (Fall 1963) PDF [182KB*]
Protecting agent radio receivers from hostile radiation detection. The technology is dated (1950s) but the concern for counterintelligence and the tradecraft tips are current.

"Agent Radio Operation During World War II" by Anonymous, Stud. Intel. V3:1-125-132 (Winter 1959) PDF [400KB*]
Salute to clandestine radio operators in World War II—friendly and enemy alike. Description of various types of operations -- i.e., nets and singletons -- including techniques and equipment used, and the make up or characteristics of a "good" operator.

Agnor, Francis, "The Interpreter as an Agent", Stud. Intel. V4:1-21-27 (Winter 1960) PDF [416KB*]

Ahern, Charles R., "The Yo-Yo Story", Stud. Intel. V5:1-11-23 (Winter 1961) PDF [707KB*]

"The Alamo Scouts" by Eustace E. Nabbie, Stud. Intel. V3:4-87-92 (Fall 1959) PDF [299KB*]
History of special intelligence operations with the Sixth Army in New Guinea and the Philippines, World War II.

Aldrich, Richard J., "British and American Policy on Intelligence", Stud. Intel. V38:5-17-26 (1995) PDF [764.1KB*]

Alexander, John A. "An Intelligence Role for the Footnote", Stud. Intel. V8:3-1-10 (Summer 1964) PDF [500KB*]

"Alexander Rado" by Louis Thomas, Stud. Intel. V12:3-41-61 (Summer 1968) PDF [1.3MB*]
This is a biographic sketch of Soviet spy, Alexander (Sandor) Rado, the famed chief of the Swiss-based "Rote Drei" net during World War II. This account focuses on his exploits from 1955 to 1968, when he collected geographic intelligence for the Soviets from a base in Budapest.

"The Alger Hiss Case" by John Erhman, Stud. Intel. Winter/Spring 2001, No. 10:1-13, PDF [1.1MB*]
Chronicle of the long controversy about whether Hiss was a Soviet spy concludes that release of Verona documents, once the Soviets knew about this US counter-intelligence operation, would have pointed to Hiss's guilt without damage to US security.

"Alias George Wood" by Anthony Quibble, Stud. Intel. V10:1-69-96 (Winter 1966) PDF [1.1MB*]
Account of the German official Fritz Kolbe, who, as an idealistically motivated "walk-in," provided valuable German documents and commentary on German military and diplomatic affairs to the OSS Bern Station under Allen Dulles.

Allan, R. T. Jr., "More Against Footnotes", Stud. Intel. V8.4:85-86 (Fall 1964) PDF [76KB*]

Allen, Edward L., "Industrial Planning in the US and the USSR", Stud. Intel. V1:4-27-34 (Fall 1957) PDF [406KB*]

Allen, Edward L., "The Validity of Soviet Economic Statistics", Stud. Intel. V4:3-1-8 (Summer 1960) PDF [413KB*]

Allen, Robert Loring, "The Role of Interindustry Studies in Economic Intelligence", Stud. Intel. V1:4-97-117 (Fall 1957) PDF [1.3MB*]

"Allen Welsh Dulles: 1893-1969" by Sherman Kent, Stud. Intel. V13:2-1-2 (Spring 1969) PDF [104.4KB*]
Appreciation of the intelligence career of DCI Dulles, with reference to his attention to analysis.

"American Intelligence and the Tricentennial" by Lt. Gen. Samuel V. Wilson, Stud. Intel. V20:3-1-7 (Fall 1976) PDF [410.6KB*]
The Director of DIA shares some of his concerns about the problems facing US intelligence in the mid-1970s. He also briefly describes nine intelligence successes.

"The American Joint Intelligence Committee and Estimates of the Soviet Union, 1945-1947" by Larry A. Valero, Stud. Intel. Summer 2000, No 9:65-80 PDF [1.4MB*]
British academic's study of the origins, politics, and accomplishments of an estimative intelligence arm set up by the military, partly to block the civilian-controlled Coordinator of Intelligence (COI, later OSS), from engaging in analysis of military threats and prospects.

"America's First Encrypted Cable" by Ralph E. Weber, Stud. Intel. V36:5-105-109 (1992) PDF [691.5KB*]
State Department sent first coded message in 1866, soon after the completion of the trans-Atlantic cable.

Amory, Robert Jr., "John Andre: Case Officer", Stud. Intel. V5:3-A1-A15 (Summer 1961) PDF [782KB*]

"Analytic Professionalism and the Policymaking Process: Q&A on a Challenging Relationship" by Jack Davis, Kent Cen. Occ. Pap. 2:4-1-9 (October 2003) PDF [30 KB*]

"The Anatomy of Counterintelligence" by A. C. Wasemiller, Stud. Intel. V13:1-9-24 (Winter 1969) PDF [921.8KB*]
Describes the basic elements of a potential national counterintelligence (CI) organization: CI goals, structure, fundamentals, functions, domestic and foreign liaison, technical skills, security, reporting and records keeping, and its legal basis.

Anderson, Dwayne, "On the Trail of the Alexandrovsk", Stud. Intel. V10:1-39-43 (Winter 1966) PDF [212.5KB*]

Anderson, Dwayne, "Yesterday's Weapons Tomorrow", Stud. Intel. V9:4-13-17 (Fall 1965) PDF [225KB*]

Angellichio, M. J., "Agent Hazard in the Super-Het", Stud. Intel. V7:4-57-60 (Fall 1963) PDF [182KB*]

Anonymous, "A Small South Pole", Stud. Intel. V4:4-A23-A27 (Fall 1960) PDF [252KB*]

Anonymous, "Agent Radio Operation During World War II", Stud. Intel. V3:1-125-132 (Winter 1959) PDF [400KB*]

Anonymous. Book review of Coercive Persuasion by Edgar H. Schein, Stud. Intel. V5:5-A33-A36 (Fall 1961) PDF [168.9KB*]

Anonymous. Book review of Danger from Moscow by Joseph Heisler aka J. Bernard Hutton, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]

Anonymous. Book review of European Resistance Movements 1939-1945, Stud. Intel. V5:5-A47-A50 (Fall 1961) PDF [166.5KB*]

Anonymous. Book review of Frogman Extraordinary by J. Bernard Hutton aka Joseph Heisler, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]

Anonymous. Book review of Handbook of Intelligence and Guerrilla Warfare by Alexander Orlov, Stud. Intel. V8:1-A28-A30 (Winter 1964) PDF [107KB*]

Anonymous. Book review of Inside the Company: CIA Diary by Philip Agee., Stud. Intel. V19:2-35-38 (Summer 1975) PDF [231.5KB*]

Anonymous. Book review of Kontact med England (1940-1943) and Hemmelig Alliance (1943-1945) by Jorgen Haestrup, Stud. Intel. V6:4-A63-A66 (Fall 1962) PDF [169KB*]

Anonymous. Book review of "The Panther's Feast" by Robert Asprey, Stud. Intel. V4:2-A43-A47 (Spring 1960) PDF [177KB*]

Anonymous. Book review of The Secret Road to World War Two: Soviet Versus Western Intelligence, 1921-1939 by Paul W. Blackstock, Stud. Intel. V14:1-113-126 (Spring 1970) PDF [657.6KB*]

Anonymous. Book review of The Service: The Memoirs of General Reinhard Gehlen by Reinhard Gehlen., Stud. Intel. V16:3-89-98 (Fall 1972) PDF [461.1KB*]

Anonymous, "Geographic Intelligence", Stud. Intel. V7:4-A1-A18 (Fall 1963) PDF [886KB*]

Anonymous, "Platt's Law", Stud. Intel. V13:4-89-90 (Fall 1969) PDF [54.9KB*]

Anonymous, "Public Texts in Intelligence", Stud. Intel. V8:1-A31-A42 (Winter 1964) PDF [543KB*]

Anonymous, "Soviet Use of Assassination and Kidnapping", Stud. Intel. V19:3-1-10 (Fall 1975) PDF [563.3KB*]

Anonymous, "The Last Days of Ernst Kaltenbrunner", Stud. Intel. V4:2-A11-A29 (Spring 1960) PDF [1.1MB*]

Anonymous, "The Lohmann Affair", Stud. Intel. V4:2-A31-A38 (Spring 1960) PDF [426KB*]

Anonymous, "The Mail from Budapest", Stud. Intel. V2:4-93-103 (Fall 1958) PDF [586KB*]

"Another View of S&T Analysis" by Donald C. Brown, Stud. Intel. V19:2-25-28 (Summer 1975) PDF [192.4KB*]
Disagrees with precepts for S&T analysis offered by Robert Clark in "Scientific and Technical Intelligence Analysis" (V19:1-39-48, PDF [568.3KB*]

"Anti-Soviet Operations of Kwantung Army Intelligence, 1940-41" by Richard G. Brown, Stud. Intel. V6:2-A7-A20 (Spring 1962) PDF [638KB*]
Describes the Japanese army in Manchuria's efforts to collect and disseminate intelligence on Soviet border military activity 1940-41. SIGINT, including deciphering and traffic analysis, visual observation, defector debriefings, and organized analysis and dissemination are described.

Appelbaum, Henry R., "US Intelligence and the End of the Cold War", Stud. Intel. Summer 2000, No 9:11-18, PDF [587.7KB*]

Appelbaum, Henry R., "Vernon Walters--Renaissance Man", Stud. Intel. V46:1-1-2 (2002) PDF [100.4KB*]

The Arab Mind by Raphael Patai. Book review by Lloyd F. Jordan, Stud. Intel. V18:3-29-32 (Fall 1974) PDF [217.2KB*]
Understanding of Arab culture and national character as an analytic and operational tool.

Arango, Carlos Revilla, "Counterintelligence vs. Insurgency", Stud. Intel. V12:2-65-81 (Spring 1968) PDF [959.9KB*]

Arango, Carlos Revilla, "Insurgent Counterintelligence", Stud. Intel. V12:1-39-53 (Winter 1968) PDF [842.7KB*]

Armstrong, Fulton T., "Ways to Make Analysis Relevant but Not Prescriptive", Stud. Intel. V46:3-37-43 (2002) PDF [56.6KB*]

"The Art of China Watching" by Gail Solin, Stud. Intel. V19:1-23-33 (Spring 1975) PDF [687.7KB*]
Tradecraft for assessing China's politics (1970s). The obstacles that cloud understanding include a paranoid level of secrecy, deception, and propaganda.

"The Articulation of Babel" by Jacob Ornstein, Stud. Intel. V4:4-A1-A9 (Fall 1960) PDF [454KB*]
A critic of existing language training proposes an ideal program for training language specialists (1960).

"The Aspin-Brown Intelligence Inquiry: Behind the Closed Doors of a Blue Ribbon Commission" by Loch K. Johnson, Stud. Intel. V48:3-1-20 (2004) PDF [524.3KB*]
Provides a detailed account, by an insider, of how this commission (and by inference, many others) went about its work of recommending how and to what extent the intelligence community needed to be reformed to cope with post-Cold War problems. Outlines how the committee was organized and led, the principal issues it took on, the political pressures it faced, the conclusions it reached, and what it did (and did not) accomplish. Includes short bibliography on presidential commissions.

"The Assassination of Reinhard Heydrich" by R. C. Jaggers, Stud. Intel. V4:1-1-19 (Winter 1960) PDF [961KB*]
Traces the planning and successful execution of the Czech covert action operation to assassinate the head of the Nazi Security apparatus in Prague in May 1942. Author ends with a discourse on the terrible Nazi repercussions resulting from the assassination, leaving the reader to decide the merits of this clandestine operation–and others to follow.

"The Assessment of Graphology" by E. A. Rundquist, Stud. Intel. V3:3-45-51 (Summer 1959) PDF [342KB*]
Critique of preceding article in same issue regarding the value of graphology (handwriting analysis) as an character assessment technique. Author (CIA Office of Training) agrees that more research is needed for validation, but is not convinced that graphology can deliver as good a results as those obtained from current personal interview and personality testing procedures.

"Assignment: Skyjacker" by Thomas Polgar, Stud. Intel. V16:3-53-63 (Fall 1972) PDF [486.5KB*]
A blow-by-blow account by the Buenos Aires Chief of Station of how a skyjacker was talked into submission. Insights into hostage negotiations, and crisis communications and decisionmaking.

"At Work with Donovan" by John D. Wilson, Stud. Intel. V37:5-71-79 (1994) PDF [1.3MB*]
Colorful personal account of the Office of Strategic Services (including its origins as Coordinator of Information and its dispersal after World War II). Several references to the organization and activities of Research and Analysis Branch, the precursor to the Directorate of Intelligence (DI).

Atkins, Merle
see Fuller, Kenneth C., "'Rolling Thunder' and Bomb Damage to Bridges"

"Audiosurveillance" by Alfred Hubest, Stud. Intel. V4:3-39-46 (Summer 1960) PDF [415KB*]
Broadbrush overview of the basic types of technical audiosurveillance used in intelligence gathering.

"Australia's Response to Terrorism" by Nicholas Grono, Stud. Intel. V48:1-27-38 (2004) PDF [157.7KB*]
Describes the changes that have taken place in Australia's approach to meeting the challenge of terrorism, stimulated by preparing for the 2000 Olympics and, particularly, in reaction to the 9/11 attacks in the US. These changes include enhanced intelligence collection, a much larger budget, new legal powers, closer coordination among domestic intelligence agencies, and increased cooperation with foreign intelligence services, particularly in Southeast Asia.

"Automation for Information Control" by Paul A. Borel, Stud. Intel. V11:1-25-31 (Winter 1967) PDF [306KB*]
Status and plans of CIA information management systems in mid-1960s presented in terms both of promise and obstacles.

Avery, Donald
see Torrey, Gordon, "Postal Forgeries in Two World Wars"

[Top of page]



B

"B-29s Against Coke Ovens" by A. R. Northridge,, Stud. Intel. V9:3-25-31 (Summer 1965) PDF [366KB*]
Relating the first use of the then "super plane" B-29s in the Pacific in World War II, stresses the importance of reliable intelligence in identifying enemy vulnerabilities and targets

Baclawski, Joseph A., "The Best Map of Moscow", Stud. Intel. Semiannual Ed., No. 1, 1997: 111-114, PDF [273.4KB*]

Bagnall, J. J., "The Exploitation of Russian Scientific Literature for Intelligence Purposes", Stud. Intel. V2:3-45-48 (Summer 1958) PDF [280KB*]

Barathy, Frederick D., "Cover; Property Restitution", Stud. Intel. V5:2-39-43 (Summer 1961) PDF [229KB*]

Barrett, David M., "Congress, the CIA, and Guatemala, 1954", Stud. Intel. Winter/Spring 2001, No. 10:23-31, PDF [718.5KB*]

Barry, James A., "Bridging the Intelligence-Policy Divide", Stud. Intel. V37:3-1-8 (1994) PDF [2.5MB*]

Barry, James A., "Managing Covert Political Action", Stud. Intel. V36:5-19-31 (1992) PDF [1.8MB*]

"Basic Psychology for Intelligence Analysts" by Charles D. Cremeans, Stud. Intel. V15:1-109-114 (Winter 1971) PDF [289.2KB*]
The games analysts, bosses, editors, and coordinators play, how to recognize and counter them. Written in 1971, but timeless in its humorous insights.

Bass, Streeter, "Beaumarchais and the American Revolution", Stud. Intel. V14:1-1-18 (Spring 1970) PDF [831.3KB*]

Bass, Streeter, "Nathan Hale's Mission", Stud. Intel. V17:4-67-74 (Winter 1973) PDF [532.7KB*]

The Bay of Pigs by Haynes Johnson with Manuel Artime and others. Book review by L.B. Kirkpatrick, Stud. Intel. V8:4-104-105 (Fall 1964) PDF [134KB*]
Complimentary review that rebuts exiles' complaints about CIA actions

"Bayes' Theorem for Intelligence Analysis" by Jack Zlotnick, Stud. Intel. V16:2-43-52 (Spring 1972) PDF [476.0KB*]
Value and limitation of Bayesian analysis for improving the reliability of intelligence estimates.

"Bayesian Analysis for Intelligence: Some Focus on the Middle East" by Nicholas Schweitzer, Stud. Intel. V20:2-31-44 (Summer 1976) PDF [756.6KB*]
The article describes Bayesian analysis, using the Delphi (expert) technique and applying it to calculating the probabilities that a war will break out between Israel and Arab states within the next 30 days.

"Beaumarchais and the American Revolution" by Streeter Bass, Stud. Intel. V14:1-1-18 (Spring 1970) PDF [831.3KB*]
Describes Pierre Beaumarchais' moral, financial, and logistical support to the American Revolution, organizing arms shipments and stimulating French government support for the rebels.

Becker, Joseph, "Comparative Survey of Soviet and US Access to Published Information", Stud. Intel. V1:4-35-46 (Fall 1957) PDF [551KB*]

Becker, Joseph, "The Computer: Capabilities, Prospects and Implications", Stud. Intel. V4:4-63-75 (Fall 1960) PDF [716KB*]

"The Beginnings of Air Targeting" by W. W. Rostow, Stud. Intel. V7:1-A1-A24 (Winter 1963) PDF [1.3MB*]
A distinguished economist recalls how analysts of the OSS R&A Branch developed, in close cooperation with operations officers, a comprehensive program for evaluating bombing targets.

Begoum, F. M., "Observations on the Double Agent", Stud. Intel. V6:1-57-72 (Winter 1962) PDF [838KB*]

"Behind the Japanese Lines in Burma" by Troy J. Sacquety, Stud. Intel. Fall/Winter 2001, No. 11:67-79, PDF [1.6MB*]
Offered as a tribute to OSS Detachment 101, which operated behind enemy lines from 1942-1945. It presents a report of a perilous journey between Allied camps by Detachment Chief Carl Eifler.

Behling, Thomas, "Planning Satellite To Support Future Military 0perations", Stud. Intel. Winter 1998/99:113-121, PDF [751.2KB*]

Bekrenev, L. K., "Operational Contacts", Stud. Intel. V9:1-63-80 (Winter 1965) PDF [947KB*]

Beller, Patrick R., "The Life and Work of Stephan Haller", Stud. Intel. V3:3-1-14 (Summer 1959) PDF [712KB*]

Bennett, Burney B., "The Greater Barrier", Stud. Intel. V2:4-105-112 (Fall 1958) PDF [393KB*]

Bentley, Stewart, Maj., "The Dutch Resistance and the OSS", Stud. Intel. Spring 1998:105-118, PDF [1.1MB*]

Berkeley, George, "For a Board of Definitions", Stud. Intel. V9:3-13-17 (Summer 1965) PDF [230KB*]

Berkowitz, Bruce, "Failing to Keep Up With the Information Revolution", Stud. Intel. V47:1-67-74 (2003) PDF [481.0KB*]

"The Best Map of Moscow" by Joseph A. Baclawski, Stud. Intel. Semiannual Ed., No. 1, 1997: 111-114, PDF [273.4KB*]
Starting in the 1950s, CIA researchers and cartographers produced a detailed street map of Moscow (the USSR did not publish one, for security reasons). The map was used for operations and collection, as well as for daily "survival" in a major city.

"Better an Office of Sovietology" by John Whitman, Stud. Intel. V8:1-65-66 (Winter 1964) PDF [108KB*]
Responds to Shryock article, "For an Eclectic Sovietology" (same issue) by calling for an office of Soviet political analysis rather than ad hoc collaboration.

Betts, T.J., "Operation Columba", Stud. Intel. V5:2-A35-A-41 (Spring 1961) PDF [355KB*]

Bimfort, Martin T., "A Definition of Intelligence", Stud. Intel. V2:4-75-78 (Fall 1958) PDF [177KB*]

Bimmerle, George, "'Truth Drugs in Interrogation", Stud. Intel. V5:2-A1-A19 (Spring 1961) PDF [975KB*]

"The Birth of Central Intelligence" by Arthur B. Darling, Stud. Intel. V10:2-1-19 (Spring 1966) PDF [1020.5KB*]
Describes the emergence, during 1944-46, of support for a central intelligence organization, reflecting battles for control among the military, State Department, and the FBI and awareness that a congressional probe of the Pearl Harbor intelligence failure would create pressures for an effective organization.

Blackburn, Clifton A. Jr., "Terrain Intelligence for the Pentomic Army", Stud. Intel. V3:4-81-86 (Fall 1959) PDF [286KB*]

Bodyguard of Lies by Anthony Cave Brown. Book review by Russell J. Bowen., Stud. Intel. V20:1-53-64 (Spring 1976) PDF [827KB*]
Primarily comments upon the quality of Anthony Cave Brown's description and analysis of the Allied efforts to mount deception operations against the Germans in World War II. Draws a number of "lessons" about why deception operations succeed or fail.

Boerner, Mark
see Ramsey, Diane M. "A Study in Indications Methodology"

Bofrone, Kenneth E., "Intelligence Photography", Stud. Intel. V5:2-9-16 (Spring 1961) PDF [347KB*]

"The Bogotazo" by Jack Davis, Stud. Intel. V13:4-75-87 (Fall 1969) PDF [617.1KB*]
Describes events leading to the civil uprising in Bogota in 1948, the aftermath and Congressional attacks against CIA and State for not predicting it. Changes in DO reporting of attitudes in Latin American occurred as a result. Also offers precepts regarding likelihood of regime change as a result of civil unrest.

Boifeuillette, Louis, "A Staff Agents Second Thoughts", Stud. Intel. V11:1-61-65 (Winter 1967) PDF [237.1KB*]

Borel, Paul A., "Automation for Information Control", Stud. Intel. V11:1-25-31 (Winter 1967) PDF [306KB*]

Borel, Paul A., "On Processing Intelligence Information", Stud. Intel. V3:1-25-35 (Winter 1959) PDF [565KB*]

Borowy, Stefan, "Military Intelligence Behind Enemy Lines", Stud. Intel. V2:3-107-116 (Summer 1958) PDF [535KB*]

Bowen, Russell J. Book review of Bodyguard of Lies by Anthony Cave Brown, Stud. Intel. V20:1-53-64 (Spring 1976) PDF [827KB*]

Brandwein, David S., "Confessions of a Former USIB Committee Chairman", Stud. Intel. V18:2-43-50 (Summer 1974) PDF [500.5KB*]

Brandwein, David S., "Interaction in Weapons R&D", Stud. Intel. V12:1-13-20 (Winter 1968) PDF [425.4KB*]

Brandwein, David. S., "Telemetry Analysis", Stud. Intel. V8:4-21-29 (Fall 1964) PDF [430KB*]

Brandwein, David S., "The SS-8 Controversy", Stud. Intel. V13:3-27-35 (Summer 1969) PDF [441.1KB*]

"Breast Cancer Detection Research" by Sam Grant and Peter C. Oleson, Stud. Intel. Semiannual Ed., No. 1, 1997: 27-34, PDF [558.1KB*]
Intelligence Community R&D on imagery is joined to the national effort to improve breast cancer detection.

Brethauer, Todd, "Adam Smith Examines the Intelligence Economy", Stud. Intel. V39:5-71-73 (1996) PDF [195.1KB*]

"Bridging the Intelligence-Policy Divide" by James A. Barry, Jack Davis, David D. Gries, and Joseph Sullivan, Stud. Intel. V37:5-1-8 (1994) PDF [2.5MB*]
The results of many interviews with policymakers and of three seminars on the subject of policymaker - intelligence officer communications are summarized.

Brigane, David V. "Credentials--Bona Fide or False", Stud. Intel. V4:1-37-49 (Fall 1960) PDF [730KB*]

"British and American Policy on Intelligence Archives" by Richard J. Aldrich, Stud. Intel. V38:5-17-26 (1995) PDF [764.1KB*]
US practices for release of classified intelligence materials were more supportive of scholars than UK practices, but the latter are improving.

"British Honors for Lundahl" by Dino A. Brugioni and Robert F. McCort, Stud. Intel. V19:1-9-12 (Spring 1975) PDF [264.0KB*]
Cites honors and commendations bestowed on Arthur C. Lundahl, Director of the National Photographic Interpretation Center (NPIC) since its founding in 1953 to his retirement in 1973, reviewing the history of US photointerpretation and Lundahl's contributions from 1942.

Brockmiller, John, "Psywar in Intelligence Operations", Stud. Intel. V5:3-49-55 (Summer 1961) PDF [413KB*]

Bross, John A. Book review of SOE In France by M. R. D. Foot, Stud. Intel. V11:2-100-105 (Spring 1967) PDF [298KB*]

The Brother by Sam Roberts. Book review by John Ehrman, Stud. Intel. V46:4-63-73 (2002) PDF [514.3KB*]
Using The Brother as his starting point, the author recounts the history of the Ethel and Julius Rosenberg case, including the trial and, in particular, the controversy that erupted after their execution over their guilt or innocence. He shows how new information released after the fall of the Soviet Union conclusively proved their guilt.

"The Brown Commission and the Future of Intelligence" by Editorial Board
, Stud. Intel. V39:5-1-9 (1996) PDF [779.7KB*]
Discussion with Commission staff members covers organization, funding, clandestine collection, and analysis. On analysis, staff members believe irrelevance is a greater danger than politicization, which can be kept in check by sound analytic tradecraft.

Brown, Donald C., "Another View of S&T Analysis", Stud. Intel. V19:2-25-28 (Summer 1975) PDF [192.4KB*]

Brown, Richard G., "Anti-Soviet Operations of Kwantung Army Intelligence, 1940-41", Stud. Intel. V6:2-A7-A20 (Spring 1962) [638KB*]

Bruce, James B., "The Consequences of Permissive Neglect", Stud. Intel. V47:1-39-49 (2003) PDF [621.6KB*]

Brugioni, Dino A., "British Honors for Lundahl", Stud. Intel. V19:1-9-12 (Spring 1975) PDF [264.0KB*]

Brugioni, Dino A., "Spotting Photo Fakery", Stud. Intel. V13:1-57-67 (Winter 1969) PDF [510.7KB*]

Brugioni, Dino A., "The Holocaust Revisited: A Retrospective Analysis of the Auschwitz-Birkenau Extermination Complex", Stud. Intel. Special Unclass. Ed., Fall 2000:87-105, PDF [2.2MB*]

Brunetta, Leslie
see Kennedy, David, "Lebanon and the Intelligence Community"

Bukharin, Oleg A., "The Cold War Atomic Intelligence Game, 1945-70", Stud. Intel. V48:2-1-11 (2004) PDF [1.9MB*]

Bundy, William P., "The Guiding of Intelligence Collection", Stud. Intel. V3:1-37-52 (Winter 1959) PDF [932KB*]

Burridge, James, "SIGINT in the Novels of John le Carre", Stud. Intel. V37:5-125-132 (1994) PDF [1.3MB*]

Burton, Mark, "Government Spying for Commercial Gain", Stud. Intel. V37:5-17-23 (1994) PDF [989.6KB*]

[Top of page]



C

"A Cable from Napoleon" by Edwin C. Fishel, Stud. Intel. V2:3-81-101 (Summer 1958) PDF [1.1MB*]
Tells the story of how the US government, in 1867, intercepted a critically important cable from Napoleon III to his commanding general in Mexico confirming Napoleon's order to withdraw all French troops from Mexico. This was probably the first instance of US peacetime communications intelligence.

Cain, John W., "Technical Factors in Aerospace Photography", Stud. Intel. V6:4-1-8 (Fall 1962) PDF [446KB*]

"The Calculation of Soviet Helicopter Performance" by Theodore A. George, Stud. Intel. V3:4-43-48 (Fall 1959) PDF [285KB*]
How to use mathematical formulas and data derived from photo analysis to calculate Soviet helicopter performance (1959).

"Calling the Sino-Soviet Split" by Harold P. Ford, Stud. Intel. Winter 1998/99:57-71, PDF [1.2MB*]
Reviews the analytic performance of CIA from the early 1950s to the early 1960s regarding the validity of the Sino-Soviet split. Evidence is provided that CIA was considerably ahead of the policy community in calling the split.

"Captain Stephen Kalman: A Classic Write-In Case" by A.V. Knobelspiesse, Stud. Intel. V6:4-A1-A13 (Fall 1962) PDF [741KB*]
Counterintelligence lessons learned from a classic write-in case.

"Career Trainee Program, GRU Style" by Richard Framingham, Stud. Intel. V10:4-45-57 (Fall 1966) PDF [666.9KB*]
GRU training for overseas assignments at the Military-Diplomatic Academy lasts from 2 to 4 years. Case officer candidates are carefully selected at the captain-major level and highly motivated. A portion after graduation are assigned to the KGB and receive further tradecraft training.

Carey, Warren F., "Intelligence Implications of Disease", Stud. Intel. V16:2-71-78 (Spring 1972) PDF [396.7KB*]

"The Case for a Holistic Intelligence" by Lloyd F. Jordan, Stud. Intel. V19:2-9-19 (Summer 1975) PDF [688.1KB*]
Calls for much greater Agency reliance on estimative analysis by interdisciplinary teams, which would be responsible for generating collection and analytic focus, as well as judgments.

"The Case of the SS-6" by M. C. Wonus, Stud. Intel. V13:1-25-31 (Winter 1969) PDF [432.9KB*]
The author argues that the intelligence community badly misunderstood the propellant system of the Soviet space rocket booster, the SS-6, because analysts engaged in mirror imaging, assuming wrongly the applicability of US design criteria.

"A Case Officer's First Tour" by Richard Stolz, Stud. Intel. V37:5-53-58 (1994) PDF [1.1MB*]
Describes a case officer's first tour in Trieste (1951-54), the lessons learned, the operations run, the Base organization, the family life.

"Cash on Delivery" by Robert A. Petchell, Stud. Intel. V17:3-1-7 (Fall 1973) PDF [407.8KB*]
Relates how cash incentives were used by case officers to motivate Lao tribesmen to induce North Vietnamese Army personnel to defect or to abduct them for the purpose of providing OOB information.

Casion, Matthew N. Book review of Inside a Soviet Embassy by Aleksandr Kaznacheev, Stud. Intel. V7:3-113-118 (Summer 1963) PDF [313KB*]

"Catch-As-Catch-Can Operations" by Benjamin F. Onate, Stud. Intel. V20:4-27-29 (Winter 1976) PDF [163.9KB*]
An example of improvisation in agent handling.

Cate, Charles V., "Counterintelligence for National Security", Stud. Intel. V2:4-87-92 (Fall 1958) PDF [294KB*]

"Celebrating the Life of Walter Pforzheimer" by Timothy Naftali, Stud. Intel. V47:3-1-3 (2003) PDF [160.3KB*]
A short review of the life of a CIA "Trailblazer," who was the Agency's first legislative counsel and the founder and curator of CIA's Historical Intelligence Collection, now the largest professional intelligence collection in the world.

"Central Intelligence Under Souers" by Arthur B. Darling, Stud. Intel. V12:1-55-74 (Winter 1968) PDF [1.1MB*]
Formation and early history of the Central Intelligence Group under the first DCI, during which wartime intelligence functions of the War, Navy and State departments, as well as OSS, were extended, phased out, shuffled, shifted, and fought over before eventually migrating to the CIG.

"Centralized Requirements in the DIA" by Lowell E. Mayt, Stud. Intel. V7:4-33-40 (Fall 1963) PDF [404KB*]
Advantages of consolidating military intelligence requirements in a new (1962) DIA center.

"The Challenge for the Political Analyst" by Martin Petersen, Stud. Intel. V47:1-51-56 (2003) PDF [324.3KB*]
A senior CIA analyst and manager distills three decades of serving policymakers to set forth how political analysts can best develop credibility with those in the policy community. He explains why policymakers are an especially tough audience for political analysts (they know more about politics than any analyst) and, then, provides six areas of knowledge analysts need to master if they hope to have an impact.

Chandlee, John, "Scooping the Soviet Press", Stud. Intel. V6:1-23-27 (Winter 1962) PDF [264KB*]

Charlevois, J. J., "Nothing to Hide", Stud. Intel. V9:2-85-88 (Spring 1965) PDF [127KB*]

"Chasing Bitterfeld Calcium" by Henry S. Lowenhaupt, Stud. Intel. V17:1-21-30 (Spring 1973) PDF [704.3KB*]
A scientific intelligence detective story: how US intelligence attempted to determine in the late 1940s how much uranium metal the USSR could produce for atomic bombs by determining how much metallic calcium they could acquire.

Chef de Renseignements, "A Dim View of Women", Stud. Intel. V6:2-A1-A5 (Spring 1962) PDF [681KB*]

"Chinese Industry from the Air" by William B. Tomlinson, Stud. Intel. V11:2-37-50 (Spring 1967) PDF [868KB*]
Case study on how photo interpreters and economic analysts derive valuable economic data on overall industrial output from U-2 photography.

Chronomaniac, "Geo-Time and Intelligence", Stud. Intel. V9:3-19-23 (Summer 1965) PDF [185KB*]

"CIA Air Operations in Laos, 1955-1974" by William M. Leary, Stud. Intel. Winter 1999/2000:71-86, PDF [1.3MB*]
Describes CIA support to anti-communist forces in Laos from 1955, focusing on the role of CIA proprietary Air America in supporting that effort.

"CIA and the Congress" by John M. Maury, Stud. Intel. V18:2-1-14 (Summer 1974) PDF [970.8KB*]
CIA Legislative Counsel (1968-1974) describes dealing with oversight committees, their priorities, styles, support, and main concerns.

"CIA Assessments of the Soviet Union" by Douglas J. MacEachin, Stud. Intel. Semiannual Ed., No. 1, 1997: 57-65, PDF [732.7KB*]
Former DDI (1993-1995) asserts the large number of CIA studies of the Soviet economy during the 1970s and 1980s show a sound grasp of trends that led to the breakup of the USSR, thereby refuting public criticism of the estimative record. The problem was in communicating these judgments to policy officials.

CIA History Staff, "Fifteen DCIs' First 100 Days", Stud. Intel. V38:1-53-63 (1995) PDF [38.4KB*]

"CIA Machinations in Chile in 1970" by Kristian C. Gustafson, Stud. Intel. V47:3-35-49 (2003) PDF [901.1KB*]
Based upon thousands of newly declassified documents called the "Chile Collection," the author tells the story of CIA covert action against the Salvador Allende government from 1970 to 1973 in Chile. CIA, at the direction of President Nixon, encouraged the military to overthrow Allende. Events spun out-of-control, leading to the assassination of Army commander-in-chief, Rene Schneider, an action for which CIA was blamed by many, including some in the US Congress. The author concludes that CIA neither planned nor desired the assassination attempt but also had no ability to control events to prevent it.

"CIA Meets the Press" by Rush V. Greenslade, Stud. Intel. V13:2-3-10 (Spring 1969) PDF [384.7KB*]
CIA's first press conference, on the Soviet economic slowdown (1964), was capped by speculation on the Agency's motives, not by commenting on the economic analysis, so subsequent news releases on the Soviet economy were attributed to the State Department.

"The Ciano Papers: Rose Garden" by Howard McGaw Smyth, Stud. Intel. V13:2-1-63 (Spring 1969) PDF [2.3MB*]
Describes the acquisition of the diaries and other papers of Mussolini's son-in-law, which were thought to have valuable information on Italo-German relations in World War II. Allen Dulles, OSS Bern, had a major role in obtaining the papers (1945).

"The CIA's Internal Probe of the Bay of Pigs Affair" by Michael Warner, Stud. Intel. Winter 1998/99:92-101, PDF [736.8KB*]
Describes the IG's report on the reasons for the failure of the Bay of Pigs invasion of Cuba in 1961, the DDO's (then DDP) rebuttal, and the author's conclusions regarding the failure.

"The CIA's Role in the Study of UFOs, 1947-9" by Gerald Haines, Stud. Intel. Semiannual Ed., No. 1, 1997: 67-84, PDF [1.5MB*]
Reviews the dilemmas faced by CIA in investigating UFOs, particularly regarding charges that CIA was part of a government conspiracy to cover up the existence of UFOs. CIA did not want to admit it was investigating UFOs for fear that such interest would be taken as confirmation of their existence. At the same time, secret CIA programs to test high-altitude reconnaissance aircraft, such as the U-2, led to an increase in UFO sightings that had to be explained away for security reasons. This eventually led to additional charges that CIA was covering up UFO research.

"CIA's Support to the Nazi War Criminal Investigations" by Kevin C. Ruffner, Stud. Intel. Semiannual Ed., No. 1, 1997: 103-109, PDF [578.1KB*]
Describes investigations by the Department of Justice (1977) into allegations of CIA use of and assistance to Nazi war criminals, the findings clearing CIA of willful illegal activity, and the unsatisfied Congressional complainants.

"The Civil War: Black American Contributions to Union Intelligence" by P. K. Rose, Stud. Intel. Winter 1998/99:73-80, PDF [636.2KB*]
Recounts stories of African-American spies for Union forces during the Civil War.

Clark, Keith, "Notes on Estimating", Stud. Intel. V11:3-55-64 (Summer 1967) PDF [524.5KB*]

Clark, Keith, "On Warning", Stud. Intel. V9:1-15-31 (Winter 1965) PDF [338KB*]

Clark, Robert M., "Scientific and Technical Intelligence Analysis", Stud. Intel. V19:1-39-48 (Spring 1975) PDF [568.3KB*]

"A Classic Case of Deception" by Antonio J. Mendez, Stud. Intel. Winter 1999/2000:1-16, PDF [1.3MB*]
A blow by blow description of the planning, preparation, and execution of the mission to exfiltrate six State Department personnel hiding in the Canadian Embassy in Tehran after the seizure of the embassy by student radicals in 1980.

Clift, A. Denis, "Intelligence in the Internet Era", Stud. Intel. V47:3-73-79 (2003) PDF [350.0KB*]

Clinard, Outten J., "Developments in Air Targeting: Data Handling Techniques", Stud. Intel. V3:2-95-104 (Spring 1959) PDF [649KB*]

Cline, Ray S., "Is Intelligence Over-coordinated?", Stud. Intel. V1:4-11-18 (Fall 1957) PDF [392KB*]

"A Close Call in Africa" by Richard L. Holm, Stud. Intel. Winter 1999/2000:17-28, PDF [947KB*]
Recounts a Case Officer's 1964 assignment to the Belgian Congo, describes the severe burns received in a plane crash in the jungle, his survival, rescue and rehabilitation.

Clotworthy, Orrin, "Some Far-Out Thoughts on Computers", Stud. Intel. V6:4-25-36 (Fall 1962) PDF [601KB*]

"Cloud Nine: A Problem in Intelligence Production" by James W. Featherstone, Stud. Intel. V13:4-11-17 (Fall 1969) PDF [327.7KB*]
Meeting a White House deadline for a massive project with early model word processors (1969).

"Coastal Infiltration and Withdrawal" by Paul X. Kelley, Stud. Intel. V7:2-A13-A17 (Spring 1963) PDF [225KB*]
Elaborates on or rebuts an earlier article on coastal infiltration using submarines. See Hurley, John A., "A Technique for Coastal Infiltration" (V6:2-25-28, PDF [171.8KB*])

Cochran, Zefram, "When Jack Welch Was Deputy Director for Intelligence", Stud. Intel. V48:3-37-43 (2004) PDF [76.0KB*]

The Codebreakers: The Story of Secret Writing by David Kahn. Book review by Roger Pineau, Stud. Intel. V12:3-99-105 (Summer 1968) PDF [332.5KB*]
Detailed review of a major work on the history over the centuries of codes and code breaking.

CODIB Task Team VI, "R&D for Intelligence Processing", Stud. Intel. V10:2-43-55 (Spring 1966) PDF [673.8KB*]

Coercive Persuasion by Edgar H. Schein. Book review by Anonymous, Stud. Intel. V5:5-A33-A36 (Fall 1961) PDF [168.9KB*]
Discusses Soviet and Chinese communist techniques of "brainwashing", noting the book provides interesting case histories.

"Coexistence and Covert Collection" by George Romano, Stud. Intel. V2:2-53-58 (Spring 1958) PDF [316KB*]
Post-Stalin loosening of East-West tensions (late 1950s) provided greater collection opportunities in Soviet Bloc countries; but outward softening of the Soviet "image" required greater care in collection planning to avoid openings for the Soviets to blame US aggression for re-introducing tensions.

Colby, William E. "Skis and Daggers", Stud. Intel. Winter 1999/2000:53-60, PDF [599.8KB*]

"The Cold War Atomic Intelligence Game, 1945-70" by Oleg A. Bukharin, Stud. Intel. V48:2-1-11 (2004) PDF [1.9MB*]
Describes the Soviet nuclear weapons program through 1970, US efforts to collect intelligence on it, and Soviet efforts to use denial and deception (D&D) techniques to frustrate US intelligence collection. Provides brief summary of author's beliefs about extent to which both sides succeeded or failed.

"The Collector's Role in Evaluation" by Bruce L. Pechan, Stud. Intel. V5:3-37-47 (Summer 1961) PDF [565KB*]
Argues for increased role for DO collector in evaluating the accuracy of source reports, in part to take advantage of often keen understanding of local developments. Useful depiction of DO evaluation practices in the 1950s.

"Combat Intelligence: A Comparative Evaluation" by Lyman B. Kirkpatrick, Stud. Intel. V5:4-45-51 (Fall 1960) PDF [358KB*]
Assesses the relative value of combat intelligence sources in the European theater in World War II: prisoners, air reconnaissance, SIGINT, documents, and agents.

"Combating Mindset" by Jack Davis, Stud. Intel. V36:5-33-38 (1992) PDF [780.0KB*]
Identifies the mindset, or substantive biases, that an analyst brings to his work as one of the main challenges to achieving objectivity in analysis. Describes several strategies for overcoming the distorting effects of mindset.

"Comes the Teaching Machine" by John Fulcher, Stud. Intel. V6:1-A5-A20 (Winter 1962) PDF [835KB*]
Explains the benefits of programmed learning and early Agency training applications (1960s).

"The Coming Intelligence Failure" by Russ Travers, Stud. Intel. Semiannual Ed., No. 1, 1997: 35-43, PDF [656.7KB*]
One man's view (1996) of flaws in the structure of the Intelligence Community. He argues that responsibility for analysis has become so fragmented and analyst ranks so depleted that an intelligence failure is inevitable. He calls for significant consolidation. Pertains especially to defense intelligence.

"A Comment on 'A Note on KGB Style'" by John W. Monkiewicz. Letter to the Editor, Stud. Intel. V16:1-81-82 (Special Edition 1972) PDF [100.1KB*]
Underscores the differences in operational styles between the KGB First (foreign) and Second (internal) Chief Directorates.

["Commentary"], Letter to the Editor by David Gries (U), Stud. Intel. V39:5-93-94 (1996) PDF [135.2KB*]
Adds two observations about DCI Casey's weakened state in his last month to James McCullough's account ("Personal Reflections on Bill Casey's Last Month at CIA (U)," Stud. Intel. V39:5-75-91, PDF [1.4MB*]), including on dangers of vertical compartmentation of command.

"Commentary on 'Congress as a User of Intelligence' " by James McCullough, Stud. Intel. Spring 1998:71-83, PDF [268.8KB*]
In response to L. Britt Snider's article on "Congress as a User of Intelligence (Stud. Intel. Spring 1998:47-69 PDF [1.9MB*]), a DI veteran analyst laments and documents the lack of understanding by executive policymakers of CIA's obligation to provide analytic support to Congress.

"Communist Defense Against Aerial Surveillance in Southeast Asia" by Edward F. Puchalla, Stud. Intel. V14:2-31-78 (Fall 1970) PDF [3.2MB*]
Examples and analyses of ingenious deception devices used against US aerial reconnaissance in Southeast Asia, and photo interpreters' methods of detecting them.

"Comparative Survey of Soviet and US Access to Published Information" by Joseph Becker, Stud. Intel. V1:4-35-46 (Fall 1957) PDF [551KB*]
The Soviets can take advantage of the much more prolific and available information generated by and about the United States, yet the much more sparse volume of published Soviet information is the single most important source for most CIA analysts (1950s).

Compos, Don, "The Interrogation of Suspects Under Arrest", Stud. Intel. V2:3-51-61 (Summer 1958) PDF [656KB*]

"The Computer: Capabilities, Prospects and Implications" by Joseph Becker, Stud. Intel. V4:4-63-75 (Fall 1960) PDF [716KB*]
An early (1960) primer on electronic data processing with forecasts of applications to intelligence, predicting that by 1970 "magnetic tapes will be as common a form of dissemination as paper."

"Computers in Economic Intelligence" by Michael C. McCracken, Stud. Intel. V13:2-107-112 (Spring 1969) PDF [293.8KB*]
Early use of computers for file management and analysis, especially on the Soviet economy (late 1960s).

"Concerning Espionage and Social Courtesy" by Direction de la Surveillance du Territoire, Stud. Intel. V10:3-77-80 (Summer 1966) PDF [170.3KB*]
Excerpted from a French service pamphlet that describes and warns against a process of entrapment by a foreign service, which starts out with casual social contact and seemingly innocent acts of friendship.

"Conditioned Reflex, Drugs and Hypnosis in Communist Interrogations" by Leonard Hilden, Stud. Intel. V2:2-59-63 (Spring 1958) PDF [278KB*]
Assessment of KGB, MVD, and other Communist Intelligence Services use of psychotherapy and pharmacotherapy techniques in interrogations.

"Confessions of a Former USIB Committee Chairman" by David S. Brandwein, Stud. Intel. V18:2-43-50 (Summer 1974) PDF [500.5KB*]
Anecdotal account of the problems of running important interagency committees, touching on the value of such committees, interagency coordination of National Intelligence Estimates and collection requirements, S&T analysis, policy support, and collector - analyst relations.

Conger, Clinton B. Book review of First Casualty, Stud. Intel. V20:1-65-69 (Spring 1976) PDF [312.8KB*]

"Congress as a User of Intelligence" by L. Britt Snider, Stud. Intel. Spring 1998:47-69, PDF [1.9MB*]
Comprehensive coverage of (1) the evolution of congressional use of intelligence analysis since the establishment of oversight committees in the 1970s, (2) the tensions as well as the benefits for intelligence producers, Congress, and executive policy officials, and (3) recommendations for increasing benefits and reducing tensions for the three sides of the inherently complex relationship.

"Congress, the CIA, and Guatemala, 1954" by David M Barrett, Stud. Intel. Winter/Spring 2001, No. 10:23-31, PDF [718.5KB*]
Congress as well as the Eisenhower Administration encouraged the overthrow of a leftist government depicted as a tool of the USSR. The role of CIA in organizing the coup was little talked about on the record but almost certainly known by Congressional leaders and heads of CIA monitoring subcommittees.

"The Consequences of Permissive Neglect" by James B. Bruce, Stud. Intel. V47:1-39-49 (2003) PDF [621.6KB*]
Argues that leaks of classified information are seriously damaging US national security by revealing and, thereby, undermining intelligence capabilities. Calls for new laws to enable prosecution of such leaks or, failing that, amending existing laws to improve chances of prosecution. Above all, calls for the will to legally go after leakers and the media that publish classified information.

Cooper, H. H., "English Missions", Stud. Intel. V5:2-A43-A50 (Spring 1961) PDF [380KB*]

Cooperwood, Gordon, "Wanted: a Word", Communication to the Editor, Stud. Intel. V9:1-61 (Winter 1965) PDF [43KB*]

"Coordination and Cooperation in Counterintelligence" by Austin B. Matschulat, Stud. Intel. V13:2-25-36 (Spring 1969) PDF [566.2KB*]
Analyzes the key elements of counterintelligence: operational security and counterespionage, the importance and risks of Community coordination, the importance of CI penetrations of hostile services, mounting deception operations, and undermining hostile propaganda. Includes a case history in Vietnam.

"Coordination and Responsibility" by R. J. Smith, Stud. Intel. V1:4-19-26 (Fall 1957) PDF [423KB*]
Sets forth the positive values of inter-agency coordination of national intelligence products and argues that the coordination process should be improved but only slowly, in small increments.

Coriden, Guy E., "Report on Hungarian Refugees", Stud. Intel. V2:1-85-93 (Winter 1958) PDF [492KB*]

Coriden, Guy E., "The Intelligence Hand in East-West Exchange Visits", Stud. Intel. V2:3-63-70 (Summer 1958) PDF [443KB*]

"CORONA and the Intelligence Community" by Kevin C. Ruffner, Stud. Intel. V39:5-61-69 (1996) PDF [1013.3KB*]
Recounts the three-year effort to declassify and release to the public the imagery collected by first US reconnaissance satellites, which were in use between 1960 and 1972. The effort culminated in an unclassified conference on satellite intelligence that took place in May 1995.

Correll, Edward G.
see Whitmire, Frank A., "The Failure of Cosmos 57"

"Costing Nuclear Programs" by Alan B. Smith, Stud. Intel. V10:1-23-38 (Winter 1966) PDF [790.4KB*]
Describes two methods -- documentary and by analogy with U.S. -- for costing the nuclear programs of foreign countries. Applies these methods to France, China, and the Soviet Union.

"Counterintelligence for National Security" by Charles V. Cate, Stud. Intel. V2:4-87-92 (Fall 1958) PDF [294KB*]
Defines and describes the terms, framework, and activities associated with counterintelligence.

"Counterintelligence vs. Insurgency" by Carlos Revilla Arango, Stud. Intel. V12:2-65-81 (Spring 1968) PDF [959.9KB*]
Describes in detail how counterintelligence forces in Latin America ideally plan and mount operations against insurgent forces. Covers every aspect of counterintelligence from identifying insurgents to mounting covert action operations against them.

"Countersabotage--a Counterintelligence Function" Eric W. Timm, Stud. Intel. V7:2-67-72 (Spring 1963) PDF [300KB*]
This brief 1960s tradecraft guide points out the similarities of counterespionage intelligence and today's counterterrorism efforts, including the importance of assessing target vulnerability and enemy goals and methods and the value of deterrence and preemption.

"Cover in Unconventional Operations", Harvey B. McCadden, Stud. Intel. V5:3-31-35 (Summer 1961) PDF [293KB*]
Describes cover in paramilitary and other action operations. Planning, compartmentation, close coordination, avoiding extemporizing, extent of depth needed, and size of operation are elements discussed.

"Cover: Property Restitution", Frederick D. Barathy, Stud. Intel. V5:2-39-43 (Summer 1961) PDF [229KB*]
Assesses Soviet bloc countries' use of their missions in West Germany to handle property restitutions to cover intelligence activity 1945-1949. Concludes there was little US intelligence exploitation of their presence.

Cram, Cleveland C., "Of Moles and Molehunters", Stud. Intel. V38:5-129-137 (1995) PDF [713.1KB*]

"Cranks. Nuts. and Screwballs" by David R. McLean, Stud. Intel. V9:3-79-89 (Summer 1965) PDF [510KB*]
The Agency receives a large number of letters from cranks and disturbed individuals who are essentially harmless, though security deems a small number as potentially dangerous and an even smaller number as potentially useful.

"Creating a Statutory Inspector General at CIA" by Britt L. Snider, Stud. Intel. Winter/Spring 2001, No. 10:15-21, PDF [505.7KB*]
Describes Congressional maneuvering that led in 1989 to an Agency IG with enhanced power but with the DCI retaining undiluted power to protect sources and methods.

"The Creation of the Central Intelligence Group" by Michael Warner, Stud. Intel. V39:5-111-120 (1996) PDF [806.4KB*]
Detailed coverage of the political infighting that preceded, accompanied, and followed the dissolution of OSS and the creation of its successors by President Truman.

"Credentials--Bona Fide or False" by David V. Brigane, Stud. Intel. V4:1-37-49 (Fall 1960) PDF [730KB*]
Tutorial on the use of false documents for cover purposes--with emphasis on Soviet practices--and the means and methods of detecting forgeries. A number of case histories referenced.

Cremeans, Charles D., "Basic Psychology for Intelligence Analysts", Stud. Intel. V15:1-109-114 (Winter 1971) PDF [289.2KB*]

Cremeans, Charles D., "The Agency and the Future", Stud. Intel. V14:1-77-87 (Spring 1970) PDF [540.1KB*]

"A Crucial Estimate Relived" by Sherman Kent, Stud. Intel. V36:5-111-119 (Spring 1964) PDF [1.4MB*]
A classic evaluation of a classic intelligence estimating failure: "The Military Buildup in Cuba," 1962, by the manager of the estimate.

"Crystal Balls and Glass Bottles" by William A. Gray, Stud. Intel. V12:2-1-6 (Spring 1968) PDF [341KB*]
Two short case histories showing how collection on Soviet electronic R&D efforts led to an understanding of their technological capabilities for designing new military systems (in this case, new radars). The information came primarily from debriefing German engineering returnees, legal travelers, and unclassified Soviet publications.

"The Current Program for an Intelligence Literature" by The Editors (of Studies in Intelligence), Stud. Intel. V1:1-12-17 (Fall 1955) PDF [253KB*]
Sets for the rationale, basic principles, and procedures for creating a literature on intelligence.

Curtis, Joanne, "Policy Bias" [Communication to the Editors], Stud. Intel. V7:3-109-112 (Summer 1963) PDF [179KB*]

Cutler, Robert, "Intelligence as Foundation for Policy", Stud. Intel. V3:4-59-71 (Fall 1959) PDF [682KB*]

[Top of page]



D

Danger from Moscow by Joseph Heisler aka J. Bernard Hutton. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]
A fabricated intelligence story, evidently Soviet inspired, about Soviet influence in the west.

Darling, Arthur B., "Central Intelligence Under Souers", Stud. Intel. V12:1-55-74 (Winter 1968) PDF [1.1MB*]

Darling, Arthur B., "DCI Hillenkoetter: Soft Sell and Stick", Stud. Intel. V13:1-33-56 (Winter 1969) PDF [1.2MB*]

Darling, Arthur B. "Origins of Central Intelligence", Stud. Intel. V8:3-55-94 (Summer 1964) PDF [2.2MB*]

Darling, Arthur B., "The Birth of Central Intelligence", Stud. Intel. V10:2-1-19 (Spring 1966) PDF [1020.5KB*]

Darling, Arthur B., "With Vandenberg as DCI", Stud. Intel. V12:3-79-98 (Summer 1968) PDF [1.3MB*]

Darling, Arthur B., "With Vandenberg as DCI (Part II)", Stud. Intel. V12:4-73-94 (Fall 1968) PDF [1.2MB*]

Daugherty, William J., "A First Tour Like No Other", Stud. Intel. Spring 1998:1-45, PDF [4.0MB*]

Davis, Euan G. "A Watchman for All Seasons", Stud. Intel. V13:2-37-43 (Spring 1969) PDF [308.1KB*]

Davis, Jack
see Barry, James A., "Bridging the Intelligence-Policy Divide"

Davis, Jack, "A Policymaker's Perspective on Intelligence Analysis", Stud. Intel. V38:5-7-15 (1995) PDF [611.3KB*]

Davis, Jack, "Analytic Professionalism and the Policymaking Process: Q&A on a Challenging Relationship", Kent Cen. Occ. Pap. 2:4-1-9 (October 2003) PDF 29.6KB*]

Davis, Jack, "Combating Mindset", Stud. Intel. V36:5-33-38 (1992) PDF [780.0KB*]

Davis, Jack, "If Surprise is Inevitable, What Role for Analysis?", Kent Cen. Occ. Pap.2:1-1-15 (January 2003) PDF [48.4KB*]

Davis, Jack, "Improving CIA Analytic Performance: Analysts and the Policymaking Process", Kent Cen. Occ. Pap. 1:2-1-9 (September 2002) PDF [28.6KB*]

Davis, Jack, "Improving CIA Analytic Performance: DI Analytic Priorities", Kent Cen. Occ. Pap. 1:3-1-8 (September 2002) PDF [27.9KB*]

Davis, Jack, "Improving CIA Analytic Performance: Strategic Warning", Kent Cen. Occ. Pap. 1:1-1-8 (September 2002) PDF [29.4KB*]

Davis, Jack, "Paul Wolfowitz on Intelligence-Policy Relations", Stud. Intel. V39:5-35-42 (1996) PDF [561.6KB*]

Davis, Jack, "Sherman Kent and the Profession of Intelligence Analysis", Kent Cen. Occ. Pap.1:5-1-16 (November 2002) PDF [49.0KB*]

Davis, Jack, "Sherman Kent's Final Thoughts on Analyst–Policymaker Relations", Kent Cen. Occ. Pap. 2:3-1-11 (June 2003) PDF [108.1KB*]

Davis, Jack, "Tensions in Analyst-Policymaker Relations: Opinions, Facts, and Evidence", Kent Cen. Occ. Pap. 2:2-1-13 (January 2003) PDF [46.7KB*]

Davis, Jack, "The Bogotazo", Stud. Intel. V13:4-75-87 (Fall 1969) PDF [617.1KB*]

Davis, Jack, "The Kent-Kendall Debate of 1949", Stud. Intel. V36:5-91-103 (1992) PDF [1.9MB*]

Davis, Peter Dixon
see Kerr, Richard J., "Ronald Reagan and the President's Daily Brief"

"DCI Hillenkoetter: Soft Sell and Stick" by Arthur B. Darling, Stud. Intel. V13:1-33-56 (Winter 1969) PDF [1.2MB*]
Provides background on Admiral Hillenkoetter, the third DCI, and a detailed account of the political battle that took place in 1947 within the Intelligence Community (particularly among members of the Intelligence Advisory Board) regarding how much independence and power the CIA should have.

"Death of a Hypothesis" by Sherman Kent, Stud. Intel. V9:2-21-24 (Spring 1965) PDF [190KB*]
Cautionary tales on testing bright ideas for simpler solutions.

"Deception", compiled by the staff of Studies in Intelligence, Stud. Intel. V17:1-31-38 (Spring 1973) PDF [546.2KB*]
Presentations from a 1972 seminar on Strategic Planning which focus on the value of strategic deception (primarily about enemy intentions) to achieving strategic surprise and the difficulties surrounding detecting deception through warning analysis.

"Decision Trees" by Edwin Greenlaw Sapp,, Stud. Intel. V18:4-45-57 (Winter 1974) PDF [618.9KB*]
An analytic methodology that helps structure both analytic judgments and policymaking decisions to help manage substantive uncertainty.

"Declassification in an Open Society" by Gail F. Donnalley, Stud. Intel. V18:3-11-18 (Fall 1974) PDF [470.0KB*]
Discusses the reasons for the Freedom of Information Act (FOIA), the criteria established for classifying and declassifying documents, and reviews achievements two years after implementation (1974).

"The Decryption of a Picture" by Henry S. Lowenhaupt, Stud. Intel. V11:3-41-53 (Summer 1967) PDF [764.5KB*]
An interesting account of how an electric power analyst, working from a censored photograph published in a Soviet picture magazine, was able to figure out the power supply to suspected atomic energy sites in the Urals.

"Dedicating the Berlin Wall Monument" by Vernon A. Walters and Robert M. Gates, Stud. Intel. V36:5-39-43 (1992) PDF [1.3MB*]
Speeches by former DDCI Walters and then DCI Gates at 1992 ceremony underscore the role of intelligence in advancing freedom and security.

"The Defections of Dr. John" by Delmege Trimble, Stud. Intel. V4:4-1-26 (Fall 1960) PDF [2.0MB*]
The sensational and mysterious intelligence betrayal and defection of the West German Intelligence Chief to Soviet Bloc (1954) is examined in terms of motivation and key circumstances.

"Defense Against Communist Interrogation Organizations" by Michael L. Mineur, Stud. Intel. V13:4-49-74 (Fall 1969) PDF [1.2MB*]
Details techniques used by Communist country interrogators. Provides guidance on how to detect possible arrest, prepare oneself psychologically and operationally for prison and interrogation, recognize gambits, and maintain stability.

"A Definition of Intelligence" by Martin A. Bimfort, Stud. Intel. V2:4-75-78 (Fall 1958) PDF [177KB*]
A refinement of previous proposals for a pithy definition of the intelligence process

"The Definition of Some Estimative Expressions" by David L. Wark, Stud. Intel. V8:4-67-80 (Fall 1964) PDF [608KB*]
A survey of analysts and policymakers (1960s) indicates that consensus on usage exists for some estimative terms (such as "probably") but not for others (e.g., "could").

Desjere. Edward F., "Hypnosis in Interrogation", Stud. Intel. V4:1-51-64 (Winter 1960) PDF [731KB*]

"Developing a Taxonomy of Intelligence Analysis Variables" by Rob Johnston, Stud. Intel. V47:3-61-71 (2003) PDF [581.0KB*]
The author distills a list of variables that can affect analytic reasoning. This list, or taxonomy, is a first attempt at creating a structure that can help analysts look for analytic biases, sort available data, identify information gaps, and increase the sophistication of analytic judgments. The effort is intended to stimulate debate about what variables really matter and how to apply them to analytic thinking.

"Developments in Air Targeting: Data Handling Techniques" by Outten J. Clinard, Stud. Intel. V3:2-95-104 (Spring 1959) PDF [649KB*]
An air intelligence officer examines problems encountered in compiling and presenting data required for targeting of nuclear weapons (1950s)

"Developments in Air Targeting: Progress and Future" by Kenneth T. Johnson, Stud. Intel. V3:3-53-62 (Summer 1959) PDF [553KB*]
Fifth in a series of reports, describes in clear detail progress and prospects in the operational development of the USAF's computerized air targeting analysis system (1959), emphasizing the vital role of the targeting intelligence analyst in all aspects of the process. This article focuses on the actual and potential benefits of computerized modeling, highlighting capabilities for refining collection and analysis requirements.

"Developments in Air Targeting: The Air Battle Model" by Robert H. Adams, Stud. Intel. V2:2-13-31 (Spring 1958) PDF [992KB*]
Describes how computers and mathematical modeling are used in war gaming air battles, especially to provide estimates of capabilities to carry out war plans in the face of opposing offensive and defensive air operations.

"Developments in Air Targeting: The Damage Assessment Model" by Davis B. McCarn, Stud. Intel. V2:3-19-23 (Summer 1958) PDF [336KB*]
Third in a seminal series on early developments in USAF quantitative analysis and modeling for purposes of assessing threats, developing attack strategies, and measuring results

"Developments in Air Targeting: The Military Resources Model" by Robert W. Leavitt, Stud. Intel. V2:1-51-64 (Winter 1958) PDF [752KB*]
Describes one of the earliest applications of computer modeling to intelligence problems: mathematical "Monte Carlo" and "input-output" type models to support war gaming and analysis of a nation's economic and military resources for air targeting.

"The DI 10 Years After Reorganization" by David W. Overton, Stud. Intel. V36:5-45-54 (1992) PDF [1.4MB*]
Evaluates the mostly positive effects of the 1981 reorganization of the DI from a mostly disciplinary (functional) to a regional structure. Benefits include enhanced multi-disciplinary analysis of emerging issues (such as WMD proliferation). Costs include complications in disciplinary training for new analysts.

"A Dim View of Women", by Chef de Renseignements, Stud. Intel. V6:2-A1-A5 (Spring 1962) PDF [234KB*]
A European Intelligence Chief's low assessment of women as agent material

Direction de la Surveillance du Territoire, "Concerning Espionage and Social Courtesy", Stud. Intel. V10:3-77-80 (Summer 1966) PDF [170.3KB*]

"The Diyarbkir Radar" by Stanley G. Zabetakis and John F. Peterson, Stud. Intel. V8:4-41-47 (Fall 1964) PDF [303KB*]
How a DS&T radar installation, designed for surveillance of rocket launches from the Soviet experimental center at Kapustin Yar, enabled analysts to analyze the nature and performance of Soviet rockets, satellites and reentry vehicles

Dockham, John, "A Sharp Look at SinoSovietology", Stud. Intel. V5:3-A23-A27 (Summer 1961) PDF [231KB*]

Donley, Michael, "Inside the White House Situation Room", Stud. Intel. Semiannual Ed., No. 1, 1997: 7-13, PDF [549.8KB*]

Donnalley, Gail F. "Declassification in an Open Society", Stud. Intel. V18:3-11-18 (Fall 1974) PDF [470.0KB*]

"Donovan's Original Marching Orders" by Thomas F. Troy, Stud. Intel. V17:2-39-69 (Summer 1973) PDF [773.9KB*]
Hour-by-hour, blow-by-blow account of the bureaucratic battle to establish an independent Coordinator of Information in 1942.

Dorando, Peter J., "For College Courses in Intelligence", Stud. Intel. V4:3-A!5-A19 (Summer 1960) PDF [191KB*]

Dorondo, Peter J., "The Military Attachés", Communications to the Editors, Stud. Intel. V4:3-79-83 (Summer 1960) PDF [297KB*]

Drell, Bernard, "Intelligence Research--Some Suggested Approaches", Stud. Intel. V1:4-79-95 (Fall 1957) PDF [838KB*]

Dulles, Allen W, "Valediction", Stud. Intel. V6:1-A1-A4 (Winter 1962) PDF [186.2KB*]

Dulles, Allen W., "William J. Donovan and the National Security", Stud. Intel. V3:3-71-83 (Summer 1959) PDF [706KB*]

Duncan, K. C., "Geographic Intelligence", Stud. Intel. V3:2-17-30 (Spring 1958) PDF [770KB*]

Dunleigh, Lowell M., "Spy at Your Service, Sir", Stud. Intel. V3:2-81-93 (Spring 1959) PDF [680KB*]

"The Dust That Isn't There" by George A. Pughe, Stud. Intel. V2:2-71-74 (Spring 1958) PDF [218KB*]
Describes the Library of Congress program, launched in 1948 and funded by Air Force Intelligence, to exploit Soviet S&T literature.

"The Dutch Resistance and the OSS" by Maj. Stewart Bentley, Stud. Intel. Spring 1998:105-118, PDF [1.1MB*]
Provides brief sketches of four main Dutch resistance groups and their goals, and of OSS efforts to contact them and exploit their intelligence beginning in May 1944

[Top of page]



E

"The Early Development of Communications Intelligence" by Wilhelm F. Flicke, Stud. Intel. V3:1-99-114 (Winter 1959) PDF [898KB*]
Traces the use and value of military and diplomatic communications intercepts(radio-telegraph-phone) prior to and during World War II. Details successes and failures on both sides of conflict that greatly influenced the outcomes of major confrontations -- i.e., victory, defeat.

"The Eastern Front at the Turning Point" by Anthony Quibble, Stud. Intel. V6:4-A15-A28 (Fall 1962) PDF [715KB*]
How the OSS R&A Branch devised the first military-economic logistics estimate, and how it fared.

Ecklund, George, "Guns or Butter Problems of the Cold War", Stud. Intel. V9:4-1-11 (Fall 1965) PDF [516KB*]

Editorial Board, "The Brown Commission and the Future of Intelligence", Stud. Intel. V39:5-1-9 (1996) PDF [779.7KB*]

The Editors (of Studies in Intelligence), "The Current Program for an Intelligence Literature", Stud. Intel. V1:1-12-17 (Fall 1955) PDF [253KB*]

"Edward Bancroft (@ Edwd. Edwards), Estimable Spy", John P. Vaillancourt, Stud. Intel. V5:1-A53-A67 (Winter 1961) PDF [775KB*]
An account of the activities of Benjamin Franklin's private secretary in Paris and his prolific intelligence reporting to the British Government during the American Revolution.

Ehrman, John. Book review of The Brother by Sam Roberts., Stud. Intel. V46:4-63-73 (2002) PDF [514.3KB*]

"Elegant Writing – Report Number Two" by Richard T. Puderbaugh, Stud. Intel. V17:2-33-37 (Summer 1973) PDF [239.1KB*]
More humorous examples of tortured prose.

"Elegant Writing in the Clandestine Services" by Richard T. Puderbaugh, Stud. Intel. V16:1-1-7 (Special Edition 1972) PDF [292.4KB*]
Satirical comment, with many examples, about tortured prose sent to Headquarters from the field.

"ELINT: A Scientific Intelligence System" by Charles A. Kroger, Jr., Stud. Intel. V2:1-71-83 (Winter 1958) PDF [649KB*]
This primer on ELINT (electronic intelligence), although quite dated (1958), provides a brief history of the field as well as a good explanation of what it is and how it works. Includes a brief description of CIA's (and the DO's) role in ELINT.

"An Elint Vigil, Unmanned" by Edmund L. Soohoo, Stud. Intel. V12:2-21-27 (Spring 1968) PDF [285.7KB*]
Describes how an automated ELINT collection system, using computer capabilities that are barely explored (1968), might be developed to collect faint signals from periodic maintenance tests on new Soviet missiles.

Eliot, Frank, "Moon Bounce Elint", Stud. Intel. V11:2-59-66 (Spring 1967) PDF [426KB*]

Ellison, Dawn, "One Woman's Contribution to Social Change at CIA", Stud. Intel. V46:3-45-53 (2002) PDF [468.7KB*]

Elzweig, Thomas F., "The Shorthand of Experience", Stud. Intel. V3:2-31-45 (Spring 1959) PDF [1.2MB*]

"English Mission", H.H.Cooper, Stud. Intel. V5:2-A43-A50 (Spring 1961) PDF [380KB*]
Describes the tradecraft of a Jesuit in reformation England, his use of cover, secret writing, safe houses, bribery, and his torture and escape from the tower of London.

"The Enigma of Soviet BW" by Wilton E. Lexow and Julian Hoptman, Stud. Intel. V9:2-15-20 (Spring 1965) PDF [279KB*]
Concentrated analytic and collection efforts fail to confirm the existence of a presumed Soviet weapons program.

Erhman, John, "The Alger Hiss Case", Stud. Intel. Winter/Spring 2001, No. 10:1-13, PDF [1.1MB*]

Ericson, Paul G., "The Need for Ethical Norms", Stud. Intel. V36:5-15-18 (1992) PDF [475KB*]

Ermarth, Fritz W. Book reviews of Essence of Decision: Explaining the Cuban Missile Crisis by Graham T. Allison and Victims of Group Think by Irving L. Janus, Stud. Intel. V18:1-61-67 (Spring 1974) PDF [453.4KB*]

"Eroding the Soviet 'Culture of Secrecy' " by Sergo A. Mikoyan, Stud. Intel. Fall/Winter 2001, No. 11:45-56, PDF [1.6MB*]
The son of former Soviet diplomat, Anastas Mikoyan, examines how information flowed to senior policymakers in the Soviet Union. He describes in detail the system of censorship that prevailed, its impact, and how and when it was circumvented.

Essence of Decision: Explaining the Cuban Missile Crisis by Graham T. Allison. Book review by Fritz W. Ermarth, Stud. Intel. V18:1-61-67 (Spring 1974) PDF [453.4KB*]
Praises the author for raising important questions about governmental decisionmaking but criticizes the application of theory to Soviet behavior in the Cuban Missile Crisis of 1962.

"Estimates and Influence" by Sherman Kent, Stud. Intel. V12:3-11-21 (Summer 1968) PDF [546.9KB*]
Classical defense of reliance on tough minded analytic tradecraft to reach judgments in National Intelligence Estimates and for keeping the estimative process independent from policymaking and political influences. Analysts should strive to be knowledgeable and credible above all else.

"Estimating Aircraft Performance," by Isado Herman, Stud. Intel. V6:1-13-22 (Winter 1962) PDF [465KB*]
Detailed description of how photointerpretation and engineering analysis can produce useful estimates of aircraft performance (1962)

"Estimating Soviet Gold Production" by Richard Flynn, Stud. Intel. V19:3-11-22 (Fall 1975) PDF [904.1KB*]
Description of use of multiple collection systems and creative analysis to overcome Soviet secrecy about gold production.

"Eulogy for Former DCI Richard McGarrah Helms" by George J. Tenet, Stud. Intel. V46:4-31-33 (2002) PDF [124.6KB*]
DCI Tenet speaks of Richard Helms' life, career, and service to country.

European Resistance Movements 1939-1945, presentation at the first International Conference on the History of the Resistance Movements, Book review by Anonymous, Stud. Intel. V5:4-A47-A50 (Fall 1961) PDF [166.5KB*]
Disputes the findings of the Soviet Bloc dominated conference, which extols communist supported resistance movements in World War II while diminishing the role of other movements and impugning the motives of western support.

Evans, Allan, "Against Footnotes", Stud. Intel. V8:4-81-84 (Fall 1964) PDF [171KB*]

"Evolution Beats Revolution in Analysis" by Steven R. Ward, Stud. Intel. V46:3-29-36 (2002) PDF [407.1KB*]
Debates the proposition put forth in an earlier article ("What To Do When Traditional Models Fail," Stud. Intel. Unclass. Ed., V46:3-35-40 PDF) that the traditional model for DI analysis, which concentrates on explaining developments to policymakers, is obsolete. Offers evidence that many of the "new" approaches suggested in the previous article (e.g., serving policymaker needs more directly) have been underway for some time. Concludes that the problem is that the "traditional" model is being applied unevenly throughout the Directorate rather than that it is obsolete.

"Executive Privilege in the Field of Intelligence" by Lawrence R. Houston, Stud. Intel. V2:4-61-74 (Fall 1958) PDF [725KB*]
Former CIA General Counsel reviews legal precedents for protecting sensitive information from disclosure in the courts and Congress, with particular references to Central Intelligence privileges. Citations stretch back to Continental Congress proceedings.

Expatriate, "Reminiscences of a Communications Agent", Stud. Intel. V2:4-55-60 (Fall 1958) PDF [278KB*]

"The Exploitation of Russian Scientific Literature for Intelligence Purposes" by J. J. Bagnall, Stud. Intel. V2:3-45-48 (Summer 1958) PDF [280KB*]
A post-Sputnik survey of US acquisition and processing of Soviet scientific publications.

"The Exploits of Agent 110" by Mark Murphy, Stud. Intel. V37:5-63-70 (1994) PDF [1.2MB*]
Recounts Allen Dulles' espionage activity during World War I diplomatic postings, inter-bellum civil employment, and return to intelligence service with OSS to begin and run key operations against Germany during World War II.

[Top of page]



F

" 'Face' Among the Arabs" by Peter A. Naffsinger, Stud. Intel. V8:3-43-54 (Summer 1964) PDF [644KB*]
Detailed and well illustrated description of why the outward appearance of personal dignity (or "face") is so important to Arabs, how it affects their behavior, and why the concept is of operational importance.

"The Face of Moscow in the Missile Crisis" by William F. Scott, Stud. Intel. V10:2-29-36 (Spring 1966) PDF [393.6KB*]
US military attachés observed no evidence of preparations for war and noted the Soviets' ability to control the news at home and, thus, minimize domestic tensions during the Missile Crisis of 1962.

"Failing to Keep Up With the Information Revolution" by Bruce Berkowitz, Stud. Intel. V47:1-67-74 (2003) PDF [481.0KB*]
Describes project by a Kent Center Scholar-in Residence to see how the DI uses information technology (IT) and how it can use the technology more effectively. Concludes that DI analysts understand and use IT much less than analysts in the private sector and even in other government agencies. Offers reasons for this situation and suggests changes that could make the DI more technology-able.

"The Failure of Cosmos 57" by Frank A. Whitmire and Edward G. Correll, Stud. Intel. V10:3-25-29 (Summer 1966) PDF [166.8KB*]
Explains how, using intercepted Soviet telemetry data, the U.S. analyzed in detail the testing of Cosmos 57, an unmanned test vehicle used to prepare for the flight of Voskhod 2 (from which the first space walk took place).

"The Fall of Lima Site 85" by James C. Linder, Stud. Intel. V38:5-79-88 (1995) PDF [818.4KB*]
The history of an Air Force navigation/radar-bombing site in mountainous Laos from installation in 1966 to its capture by North Vietnamese/Pathet Lao forces in 1968.

"The Farewell Dossier" by Gus W. Weiss, Stud. Intel. V39:5-121-126 (1996) PDF [460.3KB*]
Recounts how Brezhnev's KGB exploited the Nixon-Kissinger detente to modernize the Soviet economy (while maintaining its drive for military superiority) by stealing Western technology. After detection, CIA launched an interagency counteroperation of deception and exposure that aimed at sabotaging the Soviet economy and destroying the espionage enterprise.

Fauth, James J., "Adversary Agent Radios", Stud. Intel. V10:1-57-67 (Winter 1966) PDF [449.4KB*]

"FBIS Against the Axis, 1941-1945 (U)" by Stephen C. Mercado, Stud. Intel. Fall/Winter 2001, No. 11:33-43, PDF [1.4MB*]
Recounts the origins of FBIS and the history of its World War II years, including its people, functions, locations, tributes to its value, and political battles with Congress.

Featherstone, James. W., "Cloud Nine: A Problem in Intelligence Production", Stud. Intel. V13:4-11-17 (Fall 1969) PDF [327.7KB*]

"Fifteen Axioms for Intelligence Analysts" by Frank Watanabe, Stud. Intel. Semiannual Ed., No. 1, 1997: 45-47, PDF [234.8KB*]
Advice for new analysts include pursue collection aggressively, know Community counterparts, be agressive in making and sticking to judgments but be ready to admit mistakes rather than mask them.

"Fifteen DCIs' First 100 Days" by CIA History Staff, Stud. Intel. V38:5-53-63 (1995) PDF [38.4KB*]
Information on the backgrounds and early actions of DCIs from Admiral Sidney Souers (1946) to Robert Gates (1991-92).

Finer, Sydney Wesley, "The Kidnapping of the Lunik", Stud. Intel. V11:1-33-39 (Winter 1967) PDF [325KB*]

First Casualty by Phillip Knightley. Book review by Clinton B. Conger, Stud. Intel. V20:1-65-69 (Spring 1976) PDF [312.8KB*]
The reviewer (a former war correspondent), in commenting on this history of censorship, provides examples of how war correspondents' articles have sometimes been used for propaganda or even for deception operations.

"A First Tour Like No Other" by William J. Daugherty, Stud. Intel. Spring 1998:1-45, PDF [4.0MB*]
Case officer's personal account of the capture of the US embassy in Iran November 4, 1979 and his ensuing 444 days of captivity and hostile treatment by Iranian revolutionary zealots. Useful for new case officers – tradecraft (what works, what doesn't), survival techniques, and interrogation tips.

Fischer, Benjamin B. Book review of God's Eye: Aerial Photography and the Katyn Forest Massacre by Frank Fox, Stud. Intel. V46:3-67-70 (2002), PDF [191.3KB*]

Fischer, Benjamin B. "Stalin's Killing Field", Stud. Intel. Winter 1999/2000:61-70, PDF [982.2KB*]

Fischer, Benjamin B., "The Vilification and Vindication of Colonel Kuklinski", Stud. Intel. Summer 2000, No 9:19-33, PDF [1.3MB*]

Fishel, Edwin C., "A Cable from Napoleon", Stud. Intel. V2:3-81-101 (Summer 1958) PDF [1.2MB*]

Fishel, Edwin C., "Military Intelligence 1861-63 (Part I)", Stud. Intel. V10:3-81-96 (Summer 1966) PDF [837KB*]

Fishel, Edwin C., "Military Intelligence 1861-63: Part II", Stud. Intel. V10:4-69-93 (Fall 1966) PDF [1.3MB*]

Fisk, Charles E., "The Sino-Soviet Border Dispute: A Comparison of the Conventional and Bayesian Methods for Intelligence Warning", Stud. Intel. V16:2-53-62 (Spring 1972) PDF [341.9KB*]

Fitzgerald, Dennis, "NRO Leadership Replies (U)", Stud. Intel. Unclass. Ed., V46:2-17-20 (2002) PDF [204.9KB*]

"Five Weeks at Phalane" by Edwin K. Stockinger, Stud. Intel. V17:1-11-19 (Spring 1973) PDF [566.0KB*]
Lao irregulars hold-off North Vietnamese forces in southern Laos before being overrun. Depicts intelligence and operational procedures of US military support units.

Fixing Intelligence: For A More Secure America by Lt. Gen. William E. Odom. Book review by Hayden B. Peake, Stud. Intel. V48:2-63-65 (2004) PDF [29.9KB*]
Critiques the major restructuring of the intelligence community proposed in Lt. Gen. Odom's book on grounds that Odom has not shown how organizational changes can fix the operational problems that Odom describes.

Flemer, Sherman W., "Soviet Intelligence Training", Stud. Intel. V3:1-93-98 (Winter 1959) PDF [290KB*]

Flicke, Wilhelm F., "The Early Development of Communications Intelligence", Stud. Intel. V3:1-99-114 (Winter 1959) PDF [898KB*]

Flicke, Wilhelm F., "The Lost Keys to El Alamein", Stud. Intel. V3:4-73-80 (Fall 1959) PDF [415KB*]

Flynn, Richard, "Estimating Soviet Gold Production", Stud. Intel. V19:3-11-22 (Fall 1975) PDF [904.1KB*]

"Footnote to Cicero" by Dorothy J. Keatts, Stud. Intel. V1:4-47-53 (Fall 1957) PDF [360KB*]
Describes what happened to the woman who provided the information that enabled the British to identify "Cicero," the World War II German spy in the British Embassy in Ankara, Turkey. Good example of how to exfiltrate a blown source to a safehaven.

"For a Board of Definitions" by George Berkeley, Stud. Intel. V9:3-13-17 (Summer 1965) PDF [230KB*]
A mathematician bemoans the dangerously loose definitions of political terminology in intelligence publications and proposes a Swiftian solution.

"For an Eclectic Sovietology" by Richard W. Shryock, Stud. Intel. V8:1-57-64 (Winter 1964) PDF [423KB*]
Tongue-in-check but insightful depiction of the methods and biases of the several schools of CIA's Soviet political analysts. Calls for collaborative analytic efforts through working groups and other cross-office activities.

"For College Courses in Intelligence" by Peter J. Dorando, Stud. Intel. V4:3-A!5-A19 (Summer 1960) PDF [191KB*]
Notes the absence of college courses on intelligence and makes the case that students in a broad range of fields would benefit (1960).

Ford, Harold P., "Calling the Sino-Soviet Split", Stud. Intel. Winter 1998/99:57-71, PDF [1.2MB*]

Ford, Harold P., "Why CIA Analysts Were So Doubtful About Vietnam", Stud. Intel. Semiannual Ed., No. 1, 1997: 85-95, PDF [949.4KB*]

Ford, Harold P., "William Colby: Retrospect", Stud. Intel. Semiannual Ed., No. 1, 1997: 1-5, PDF [285.9KB*]

Ford, Harold P., "Thoughts Engendered by Robert McNamara's In Retrospect", Stud. Intel. V39:5-95-109 (1996) PDF [1.2MB*]

"Foretesting a Soviet ABM System" by Edward Tauss, Stud. Intel. V12:1-21-26 (Winter 1968) PDF [326.7KB*]
A pioneering S&T analyst's account of how inductive analysis overcame US mirror imaging of Soviet ABM development and led to revised US countermeasures (a forerunner of "Star Wars" technology), with a plea for more rapid collaboration between intelligence analysts and the R&D community.

"'Foretesting' ABM Systems: Some Hazards" by Sayre Stevens, Stud. Intel. V12:3-1-9 (Summer 1968) PDF [491KB*]
Description of analytic processes of CIA S&T weapons analysts (1968), with emphasis on managing uncertainty by setting forth technical limitations on what the USSR can do rather than reaching specific judgments on Soviet plans before sufficient evidence is available.

Framingham, Richard, "Career Trainee Program, GRU Style", Stud. Intel. V10:4-45-57 (Fall 1966) PDF [666.9KB*]

Fran Borjan Til Slutet: En Spions Memoarer by Stig Wennerstrom. Book review by Frederick K. Schilling, Stud. Intel. V18:3-33-35 (Fall 1974) PDF [191.1KB*]
Recounts the story of the Swedish Air Force Colonel and GRU spy as known to the reviewer, not as revealed in the memoir.

Freeman, J. F., "A New Source for Figures on Soviet Military Output", Stud. Intel. V6:2-19-26 (Spring 1962) PDF [405KB*]

"A Fresh Look at Collection Requirements" by Clyde R. Heffler, Stud. Intel. V4:4-43-61 (Fall 1960) PDF [1.1MB*]
In-depth discussion of problems of coordinating and prioritizing collection requirements (1960)

Friedman, Richard S., "A Stone for Willy Fisher", Stud. Intel. Special Unclass. Ed., Fall 2000:137-148, PDF [811.6KB*]

Frogman Extraordinary by J. Bernard Hutton aka Joseph Heisler. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]
A fabricated intelligence story, probably Soviet inspired, about the actual death of British Commander Lionel Crabb in 1956

Frost, David, " An Interview with Richard Helms", Stud. Intel. Special Unclass. Ed., Fall 2000:107-136, PDF [1.9MB*]

Fryxell, Alma, "Psywar by Forgery", Stud. Intel. V5:1-25-51 (Winter 1961) PDF [1.6MB*]

Fulcher, John, "Comes the Teaching Machine", Stud. Intel. V6:1-A5-A20 (Winter 1962) PDF [835KB*]

Fuller, Kenneth C., "'Rolling Thunder' and Bomb Damage to Bridges", Stud. Intel. V13:4-1-9 (Fall 1969) PDF [479KB*]

"The Future Market for Finished Intelligence,"by Ross Cowey, Stud. Intel. V20:4-1-19 (Winter 1976) PDF [1.2MB*]

[Top of page]



G

Gafford, Richard, "The Operational Potential of Subliminal Perception", Stud. Intel. V2:2-65-69 (Spring 1958) PDF [284KB*]

"Gaining Access to CIA Records" by Evan Thomas, Stud. Intel. V39:5-19-23 (1996) PDF [364.9KB*]
Evan, Assistant Managing Editor of Newsweek, was given one-time access in 1995 to review classified Agency historical records while writing The Very Best Men. This article records his experience, his belief that the Agency is not concealing any more dark secrets from the American public, and his recommendation that historians be given more access to classified records.

"Galahad: Intelligence Aspects", Charles N. Hunter, Stud. Intel. V5:1-A1-A27 (Winter 1961) PDF [1.4MB*]
An account of guerrilla actions in Burma by "Merrill's Marauders" in mid-1944 that discusses the problems of poor or late intelligence, value of good human and photo intelligence, the success of OSS units in the area, and the problems occasioned by General Stilwell's poor leadership.

Gasser, William R., "Aerial Photography for Agriculture", Stud. Intel. V11:4-31-36 (Fall 1967) PDF [308.6KB*]

Gates, Robert M
see Walters, Vernon A., "Dedicating the Berlin Wall Monument"

Gates, Robert M., "Guarding Against Politicization", Stud. Intel. V36:5-5-13 (1992) PDF [1.3MB*]

Gates, Robert M., "The Prediction of Soviet Intentions", Stud. Intel. V17:1-39-46 (Spring 1973) PDF [500.3KB*]

"Gauging the Iraqi Threat to Kuwait in the 1960s" by Richard A. Mobley, Stud. Intel. Fall/Winter 2001, No. 11:19-31, PDF [1.7MB*]
Examines British Joint Intelligence Committee (JIC) assessments in the 1960s of Iraqi intentions and capabilities to invade Kuwait, primarily as a case study in warning analysis. Covers in some detail the scenarios of possible invasion the JIC developed, the indicators that any particular scenario was actually underway, and how these warning assessments were used to guide policy action.

Gelman, Robert M.
see Millican, C. Bowie, "Lost Order, Lost Cause"

"Geo-Time and Intelligence" by Chronomaniac, Stud. Intel. V9:3-19-23 (Summer 1965) PDF [185KB*]
Compensating for, and taking advantage of, day-and-night disparities between Washington and the field, by a former night duty officer and analyst

"Geographic Intelligence" by Anonymous, Stud. Intel. V7:4-A1-A18 (Fall 1963) PDF [886KB*]
Conceptual presentation of the evolving (1964) discipline of geographic intelligence, with examples of applications to political, military, economic and scientific intelligence

"Geographic Intelligence" by K. C. Duncan, Stud. Intel. V3:2-17-30 (Spring 1958) PDF [770KB*]
Examines several fields of geographic intelligence in terms of how current (1959) problems in each affect the ability of geographic intelligence analyst to support military operations.

George, Theodore A. "The Calculation of Soviet Helicopter Performance", Stud. Intel. V3:4-43-48 (Fall 1959) PDF [285KB*]

Geschwind, C. N., "The Tale of Hushai the Archite", Stud. Intel. V13:2-21-24 (Spring 1969) PDF [153.5KB*]

Geschwind, C. N.,"Wanted: An Integrated Counter-intelligence", Stud. Intel. V7:3-15-37 (Summer 1963) PDF [1.3MB*]

Gioumau, Walter H., "The Good Old Days", Stud. Intel. V15:1-103-107 (Winter 1971) PDF [232.2KB*]

Gleichauf, Justin F., "A Listening Post in Miami", Stud. Intel. Winter/Spring 2001, No. 10:49-53, PDF [373.2KB*]

God's Eye: Aerial Photography and the Katyn Forest Massacre by Frank Fox. Book review by Benjamin B. Fischer, Stud. Intel. V46:3-67-70 (2002) PDF [191.3KB*]
The book describes how a self-taught, Polish photointerpreter used World War II German Luftwaffe aerial reconnaissance photos to prove that the Soviets were responsible for the Katyn Forest massacre. The reviewer indicates that tensions over the Katyn atrocities continue between Russia and Poland.

"The Good Old Days" by Walter H. Gioumau, Stud. Intel. V15:1-103-107 (Winter 1971) PDF [232.2KB*]
Recounts an unauthorized test flight of a balloon being assessed for delivering agents behind the Iron Curtain.

"A Good Trip" by Mary Evans O'Keefe Gravalos, Stud. Intel. V13:3-91-97 (Summer 1969) PDF [302.8KB*]
Travel advice for the TDYer, including cover considerations.

Gould, Jonathan S., "The OSS and the London 'Free Germans'", Stud. Intel. V46:1-11-29 (2002) PDF [1.0MB*]

"Government Spying for Commercial Gain" by Mark Burton, Stud. Intel. V37:5-17-23 (1994) PDF [989.6KB*]
Cites arguments against use of intelligence resources to help US firms gain advantages over foreign competitors and calls, instead, for protecting US firms through international agreements against foreign spying.

Grabo, Cynthia M., "Soviet Deception in the Czechoslovak Crisis", Stud. Intel. V14:1-19-34 (Spring 1970) PDF [760.8KB*]

Grabo, Cynthia M., "Strategic Warning: The Problem of Timing", Stud. Intel. V16:2-79-92 (Spring 1972) PDF [664.7KB*]

Grant, Sam, "Breast Cancer Detection Research", Stud. Intel. Semiannual Ed., No. 1, 1997: 27-34, PDF [558.1KB*]

Gravalos, M. E. O., "The Pitfall of a Latin Quirk", Stud. Intel. V7:4-31-32 (Fall 1963) PDF [104KB*]

Gravalos, Mary Evans O'Keefe, "A Good Trip", Stud. Intel. V13:3-91-97 (Summer 1969) PDF [302.8KB*]

Gray, William A., "Crystal Balls and Glass Bottles", Stud. Intel. V12:2-1-6 (Spring 1968) PDF [341KB*]

"Great Frusina Revisited" by Wallace E. Seidel, Stud. Intel. V5:1-1-7 (Winter 1961) PDF [486KB*]
Introduction of ICBMs to the Cold War competition creates time compression for US intelligence and policy that requires CIA reorganization to effect greater integration of analysis, collection, and planning.

"The Greater Barrier" by Burney B. Bennett, Stud. Intel. V2:4-105-112 (Fall 1958) PDF [393KB*]
Semi-humorous advice on the need for clarity in writing.

Greenslade, Rush V., "CIA Meets the Press", Stud. Intel. V13:2-3-10 (Spring 1969) PDF [384.7KB*]

Greenslade, Rush V., "Rubles Versus Dollars", Stud. Intel. V6:1-1-11 (Winter 1962) PDF [673KB*]

Greenslade, Rush V., "The Many Burdens of Defense in the Soviet Union", Stud. Intel. V14:2-1-12 (Fall 1970) PDF [534.4KB*]

Gries, David, ["Commentary"], Letter to the Editor, Stud. Intel. V39:5-93-94 (1996) PDF [135.2KB*]

Gries, David D.
see Barry, James A., "Bridging the Intelligence-Policy Divide"

Gries, David D., "Openness and Secrecy", Stud. Intel. V37:5-33-35 (1994) PDF [475.8KB*]

Grono, Nicholas, "Australia's Response to Terrorism", Stud. Intel. V48:1-27-38 (2004) PDF [157.7KB*]

"Guarding Against Politicization," by Robert M. Gates, Stud. Intel. V36:5-5-13 (1992) PDF [1.3MB*]
Newly appointed DCI Robert Gates provides his definition of "politicization," briefly summarizes the report of the task force he appointed to study the issue, and lists the actions he is taking to guard against politicization affecting analysis in CIA.

"The Guiding of Intelligence Collection" by William P. Bundy, Stud. Intel. V3:1-37-52 (Winter 1959) PDF [932KB*]
Senior Agency official illustrates in detail the process of linking analysts as intelligence consumers with collectors so that requirements can be generated, prioritized, and tailored to meet specific needs (late 1950s).

"The Gulf War from Tel Aviv" by Sheryl Robinson, Stud. Intel. V36:5-1-3 (1992) PDF [358.5KB*]
FBIS officer in Tel Aviv reports on precautions, fears, incidents, and operations during period of Iraqi Scud Missile attacks.

"Guns or Butter Problems of the Cold War" by George Ecklund, Stud. Intel. V9:4-1-11 (Fall 1965) PDF [516KB*]
A foresighted examination of the economic costs of weapons systems versus the economic benefits of disarmament programs, and the means by which these may be estimated.

Gustafson, Kristian C., "CIA Machinations in Chile in 1970", Stud. Intel. V47:3-35-49 (2003) PDF [901.1KB*]

[Top of page]



H

Haas, Richard N., "Supporting US Foreign Policy in the Post-9/11 World", Stud. Intel. V46:3-1-13 (2002) PDF [695.0KB*]

Haberstich, Art, "The Mariner as Agent", Stud. Intel. V10:1-45-55 (Winter 1966) PDF [542KB*]

Haines, Gerald K., "The Pike Committee Investigations and the CIA ", Stud. Intel. Winter 1998/99:81-92, PDF [940.6KB*]

Haines, Gerald, "The CIA's Role in the Study of UFOs, 1947-90", Stud. Intel. Semiannual Ed., No. 1, 1997: 67-84, PDF [1.5MB*]

Hajek, Lester, "Target: CIA", Stud. Intel. V6:1-29-55 (Winter 1962) PDF [1.4MB*]

Halebian, Olivia, "New Light on Old Spies: A Review of Recent Soviet Intelligence Revelations" (Intelligence in Recent Public Literature), Stud. Intel. V9:4-77-92 (Fall 1965) PDF [774KB*]

Hall, Arthur. B., "Landscape Analysis", Stud. Intel. V11:3-65-75 (Summer 1967) PDF [573.5KB*]

Handbook of Intelligence and Guerrilla Warfare by Alexander Orlov. Book review by Anonymous, Stud. Intel. V8:1-A28-A30 (Winter 1964) PDF [107KB*]
Former Soviet security official (1930s) emphasizes that Soviet collection is concerned mostly with secre documents, not opinions or unclassified information.

"Handwriting Analysis as an Assessment Aid" by Keith Laycock, Stud. Intel. V3:3-23-43 (Summer 1959) PDF [1.1MB*]
Amateur graphologist (handwriting analysis) makes a case for employment of handwriting experts in intelligence operations where source assessment access is extremely limited.

Hanrahan, James, "An Interview With Former Executive Director Lawrence K. "Red" White", Stud. Intel. Winter 1999/2000:29-41, PDF [1.1MB*]

Hanrahan, James P., "Intelligence for the Policy Chiefs", Stud. Intel. V11:1-1-12 (Winter 1967) PDF [559.7KB*]

Hansen, James H., "Soviet Deception in the Cuban Missile Crisis", Stud. Intel. V46:1-49-58 (2002) PDF [569.3KB*]

Hardy, Timothy S., "Intelligence Reform in the Mid-1970s", Stud. Intel. V20:2-1-15 (Summer 1976) PDF [1.1MB*]

Hartline, Martin C., "Michael Collins and Bloody Sunday", Stud. Intel. V13:1-69-78 (Winter 1969) PDF [463.7KB*]

Hedley, John H.
see Appelbaum, Henry R., "US Intelligence and the End of the Cold War"

Hedley, John H., "The Intelligence Community: Is it Broken? How to Fix It?", Stud. Intel. V39:5-11-18 (1996) PDF [661.8KB*]

Hedley, John Hollister, "Secrets, Free Speech, and Fig Leaves", Stud. Intel. Spring 1998:75-83, PDF [727.0KB*]

Heffler, Clyde R., "A Fresh Look at Collection Requirements", Stud. Intel. V4:4-43-61 (Fall 1960) PDF [1.1MB*]

Helberg, Claus, "The Vemork Action", Stud. Intel. V36:5-80-90 (1992) PDF [2.3MB*]

Helgerson, John, "Truman and Eisenhower: Launching the Process", Stud. Intel. V38:5-65-77 (1995) PDF [1.0MB*]

Helms, Richard, "Intelligence in American Society", Stud. Intel. V11:3-1-16 (Summer 1967) PDF [814.8KB*]

Helms, Richard, "Strategic Arms Limitation and Intelligence", Stud. Intel. V17:1-1-7 (Spring 1973) PDF [478.5KB*]

Helsper, Charles H., "Periodic Reports by Industrial Groups as Sources of Intelligence Information", Stud. Intel. V2:2-47-52 (Spring 1958) PDF [317KB*]

Herman, Isadore, "Estimating Aircraft Performance", Stud. Intel. V6:1-13-22 (Winter 1962) PDF [465KB*]

"Hermit Surfers of P'yongyang" by Stephen C. Mercado, Stud. Intel. V48:1-39-44 (2004) PDF [106.9KB*]
Reviews historical instances of counties seeking out foreign science and technology information while blocking access to foreign political philosophies as a prelude to discussing North Korea's use of the Internet. Provides examples of how the North Korean government encourages its scientists to exploit the Internet but retains control by keeping them under surveillance. Shows how Open Source Intelligence (OSINT) is of value to North Korea.

Hiesler, Joseph (using pseudonym J. Bernard Hutton), Danger from Moscow. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]

Hiesler, Joseph (using pseudonym J. Bernard Hutton), Frogman Extraordinary. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]

Hilden, Leonard, "Conditioned Reflex, Drugs and Hypnosis in Communist Interrogations", Stud. Intel. V2:2-59-63 (Spring 1958) PDF [278KB*]

"The Historical Intelligence Collection" by Ward Warren and Emma Sullivan, Stud. Intel. V37:5-91-94 (1994) PDF [593.4KB*]
Describes the 1950s origins and growth of the Historical Intelligence Collection, which now comprises the world's largest concentration of books on "all aspects of intelligence operations and doctrine in the past."

Historical Intelligence Documents: CIA's Earliest Days, Stud. Intel. V38:5-117-122 (1995) PDF [162.5KB*]
Three early documents, including two concerning early versions of current intelligence summaries written for President Truman.

"Historical Intelligence Documents: From COI to CIG", Stud. Intel. V37:5-111-123 (1994) PDF [826.8KB*]
Copies of documents establishing Coordinator of Information (1941), OSS (1942), and Central Intelligence Group (1946).

"History's Role in Intelligence Estimating" by Cyrus H. Peake, Stud. Intel. V3:1-85-91 (Winter 1959) PDF [353KB*]
State Department analyst (1959) signals the importance that the context of historical perspective generally and specific country history can place on interpreting current factors in the estimative process.

Holland Max, "The Lie That Linked CIA to the Kennedy Assassination", Stud. Intel. Fall/Winter 2001, No. 11:5-17, PDF [1.7MB*]

Hollyman, Francis, "Intelligence Gathering in an Unlettered Land", Stud. Intel. V3:3-15-21 (Summer 1959) PDF [364KB*]

Holm, Richard L. "A Close Call in Africa", Stud. Intel. Winter 1999/2000:17-28, PDF [924.6KB*]

Holm, Richard L., "Recollections of a Case Officer in Laos, 1962-1964", Stud. Intel. V47:1-1-17 (2003) PDF [922.2KB*]

"The Holocaust Revisited: A Retrospective Analysis of the Auschwitz-Birkenau Extermination Complex" by Dino A Brugioni and Robert G. Poirier, Stud. Intel. Special Unclass. Ed., Fall 2000:87-105, PDF [2.2MB*]
Shows how analysis of old overhead photography using modern equipment and techniques can yield important historical information. Uses World War II aerial photography of the Auschwitz-Birkenau nazi extermination complex to demonstrate.

"Honoring Two World War II Heroes" by R. James Woolsey, Maj. Gen. Doyle Larson, and Linda Zall, Stud. Intel. V38:5-27-36 (1995) PDF [737.3KB*]
Recounts the exploits of R.V. Jones, head of scientific intelligence for the British Air Staff during World War II and for the SIS since then, and Jeannie de Clarens, French underground agent, who reported on German rocket development during World War II.

Hopkinson, Harry, "An Idiot System for Intelligence", Stud. Intel. V6:4-17-23 (Fall 1962) PDF [316KB*]

Hoptman, Julian
see Lexow, Wilton E., "The Enigma of Soviet BW"

"Horrible Thought" by W. A. Tidwell, Stud. Intel. V2:1-65-70 (Winter 1958) PDF [292KB*]
Early call (1950s) for more creative analysis (for example, "What-If" analysis) and more attention to the means for ensuring policymaker attention to sound intelligence research findings with important policy implications.

"The Hotel in Operations" by James J. Lagrone, Stud. Intel. V9:4-43-56 (Fall 1965) PDF [719KB*]
Detailed assessment (early 1960s) on opportunities and hazards of use of hotels in agent operations. Good and bad staff targets for recruitment.

Houston, Lawrence "Executive Privilege in the Field of Intelligence", Stud. Intel. V2:4-61-74 (Fall 1958) PDF [725KB*]

"How 'Uncle Joe' Bugged FDR" by Gary Kern, Stud. Intel. V47:1-19-31 (2003) PDF [823.3KB*]
Tells how President Roosevelt, completely misunderstanding Stalin's nature and his intent to dominate post-war relations with the Allies, stayed in Soviet-supplied quarters during the Teheran and Yalta conferences. This allowed Stalin to thoroughly bug Roosevelt's private conversations with his advisors. Provides details of the operation from Soviet sources.

Howland, Richard Cabot, "The Lessons of the September 30 Affair", Stud. Intel. V14:2-13-29 (Fall 1970) PDF [840.9KB*]

Hubest, Alfred, "Audiosurveillance", Stud. Intel. V4:3-39-46 (Summer 1960) PDF [415KB*]

Hudek, James G., "Unlucky Shamrock: The View from the Other Side", Stud. Intel. Winter/Spring 2001, No. 10:85-94, PDF [778.4KB*]

Hughes, John T., "The San Cristobal Trapezoid", Stud. Intel. Special Unclass. Ed., Fall 2000:149-165, PDF [1.3MB*]

"Human Scent and Its Detection" by Spencer Tebrich, Stud. Intel. V5:2-25-37 (Spring 1961) PDF [661KB*]
A somewhat technical discussion of a dog's sense of smell, and of human odor and its lasting qualities. The article extrapolates to the operational security and counterintelligence consequences.

Hunter, Charles N., "Galahad: Intelligence Aspects", Stud. Intel. V5:1-A1-A27 (Winter 1961) PDF [1.4MB*]

Hunter, Helen-Louise, "Zanzibar Revisited", Stud. Intel. V11:2-1-7 (Spring 1967) PDF [362.6KB*]

Hurley, John A., "A Technique for Coastal Infiltration", Stud. Intel. V6:2-25-28 (Summer 1962) PDF [171.8KB*]

Hutton, J Bernard, pseudonym of Joseph Heisler, Danger from Moscow. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [119KB*]

Hutton, J Bernard, pseudonym of Joseph Heisler, Frogman Extraordinary. Book review by Anonymous, Stud. Intel. V5:3-A35-A37 (Summer 1961) PDF [116.6KB*]

"Hypnosis in Interrogation" by Edward F. Deshere, Stud. Intel. V4:1-51-64 (Winter 1960) PDF [731KB*]
A psychotherapist discusses the theory and practice of using hypnosis as a tool in interrogation situations.

[Top of page]



I

"The Identi-Kit" by Herman E. Kimsey, Stud. Intel. V4:1-29-35 (Winter 1960) PDF [332KB*]
Anatomy of a scientific bag of tricks to conjure up the likeness of an unknown face.

"Identifying the Future Threat" by Herbert C. Rothenberg, Stud. Intel. V12:4-13-21 (Fall 1968) PDF [585.1KB*]
How R&D analysts used mathematical techniques, inductive and deductive logic, mirror imaging, and "thinking like a Russian" to cope with the "bathtub curve" of data on new weapons development in the 1960s.

"An Idiot System for Intelligence" by Harry Hopkinson, Stud. Intel. V6:4-17-23 (Fall 1962) PDF [316KB*]
An early (1962) ADP effort to create a "universal research instrument" called Unifile, "an instrument for correlating all pertinent available data regardless of its class, source or security classification."

"If Surprise is Inevitable, What Role for Analysis?" by Jack Davis, Kent Cen. Occ. Pap.2:1-1-15 (January 2003) PDF [48.4KB*]

"The Illustrious Career of Arkadiy Harting" by Rita T. Kronenbitter, Stud. Intel. V11:1-71-86 (Winter 1967) PDF [795.1KB*]
Describes the career of Arkadiy Harting, Okhrana (Tsarist secret service) informer, agent, agent provocateur, case officer, and (finally) head of the Okharan overseas service during its most successful years. Also a sub-history of Russian exile revolutionaries.

"Improving CIA Analytic Performance: Analysts and the Policymaking Process" by Jack Davis, Kent Cen. Occ. Pap. 1:2-1-9 (September 2002) PDF [28.6KB*] ; Kent Cen. Occ. Pap. 1:2-1-9 (September 2002) PDF [28.6KB*]

"Improving CIA Analytic Performance: DI Analytic Priorities" by Jack Davis, Kent Cen. Occ. Pap. 1:3-1-8 (September 2002) PDF [27.9KB*]

"Improving CIA Analytic Performance: Strategic Warning" by Jack Davis, Kent Cen. Occ. Pap. 1:1-1-8 (September 2002) PDF [29.4KB*]

"Impunity of Agents in International Law", M. C. Miskovsky, Stud. Intel. V5:2-A21-A34 (Spring 1961) PDF [718KB*]
Reviews international law and custom re: a foreign government's agent's liability under local law.

"In Memoriam" compiled by Walter Pforzheimer, Stud. Intel. V5:5-A1-A13 (Fall 1961) PDF [404.1KB*]
A collection of General Walter Bedell Smith's memorabilia, including his presidential citation, honors and bibliography.

"Industrial Planning in the US and the USSR" by Edward L. Allen, Stud. Intel. V1:4-27-34 (Fall 1957) PDF [406KB*]
Similarities and differences between industrial planning and organization in the USSR and the US (1957).

"The Information War in the Pacific, 1945" by Josette H. Williams, Stud. Intel. V46:3-55-65 (2002) PDF [601.8KB*]
Tells the story of how the Office of War Information (OWI) contributed to the Japanese decision to surrender in August 1945. Through radio broadcasts and leafleting operations, OWI succeeded in getting the message through to the Japanese people that, over the opposition most high Japanese military leaders, the Emperor had accepted Allied peace terms.

Ingram, Jack E., "The Story of the National Cryptologic Museum", Stud. Intel. V47:3-51-60 (2003) PDF [519.1KB*]

Inquirer, "Porthole to the West", Stud. Intel. V6:2-A21-A33 (Spring 1962) PDF [689KB*]

Inquirer, "The Practice of a Prophet", Stud. Intel. V6:4-A29-A41 (Fall 1962) PDF [722KB*]

Inside a Soviet Embassy by Aleksandr Kaznacheev. Book review by Matthew N. Casion, Stud. Intel. V7:3-113-118 (Summer 1963) PDF [313KB*]
Soviet defector provides interesting portrait of activities and problems of Soviet KGB operations, in Burma in the 1950s.

"Inside Darkest John" by Alfred Paumier (Communication to the Editor), Stud. Intel. V5:2-45-50 (Spring 1961) PDF [344KB*]
Offers a psychological explanation (specifically, masochism) for the multiple defections of Otto John, including from West German to East German intelligence.

Inside the Company: CIA Diary by Philip Agee. Book review by Anonymous, Stud. Intel. V19:2-35-38 (Summer 1975) PDF [231.5KB*]
Comments on Philip Agee's apparent reasons for exposing Agency operations and personnel, and briefly outlines some of the damage to the Agency.

"Inside the White House Situation Room" by Michael Donley, Cornelius O'Leary, and John Montgomery, Stud. Intel. Semiannual Ed., No. 1, 1997: 7-13, PDF [549.8KB*]
Informative article on the history, nature and functions of the President's foreign affairs command post and current intelligence center, and its interactions with the President and his advisors, the Intelligence Community and its watch offices and National Intelligence Officers, and the National Security Council and its staff.

"Installation Penetration" by Walter Steinmeyer, Stud. Intel. V6:3-47-54 (Summer 1962) PDF [453KB*]
Covers the reasons for targeting East European satellite official missions and outlines the human and technical methods that have proven successful.

"Insurgent Counterintelligence" by Carlos Revilla Arango, Stud. Intel. V12:1-39-53 (Winter 1968) PDF [842.7KB*]
Primer on insurgent counterintelligence and security techniques. Covers organizational, personnel, communications, and operational measures.

"Integrating Methodologists into Teams of Substantive Experts" by Rob Johnston, Stud. Intel. V47:1-57-65 (2003) PDF [576.7KB*]
Argues that intelligence analysis needs the organizing input of methodologists just as much as other disciplines do. An analytic methodologist would help domain experts overcome their own limitations in knowing what analytic methods to apply to specific kinds of problems, how to apply them, and how to synthesize the results in order to make better forecasts than subject matter experts generally make.

"Integrity, Ethics, and the CIA" by Kent Pekel, Stud. Intel. Spring 1998:85--93 PDF [709.6KB*]
Based on interviews with 50 CIA officers and research on business-world ethics, avers that a stronger performance on ethics in all Directorates requires more management commitment to defining and rewarding integrity and a redefinition of "failure" as a learning experience and not something to be kept under wraps.

"Intelligence and Covert Action" by Albert E. Riffice, Stud. Intel. V6:1-73-80 (Winter 1962) PDF [404KB*]
Attributes the failures of the British Special Operations Executive (SOE) during World War II in conducting paramilitary operations behind enemy lines to poor coordination with British intelligence and security offices, and argues for covert action and intelligence to be in one organization.

"Intelligence and the 'Market State'" by Gregory F. Treverton, Stud. Intel. Winter/Spring 2001, No. 10:67-76, PDF [624.0KB*]
The author argues that the "territorial state" is being replaced by the "market state," which will have two major consequences for intelligence. The first is that the boundaries between what is "foreign" and what is "domestic" will further fade and the second is that the range of consumers for intelligence production will continue to grow.

"Intelligence and the Rise of Judicial Intervention" by Frederic F. Manget, Stud. Intel. V39:5-43-50 (1996) PDF [635.1KB*]
Gives a history of the rise in judicial oversight of the activities of the US intelligence community since the mid-1970s, including the reasons for increased judicial scrutiny and some of the tradeoffs that are required between the need for secrecy and the need for public accountability in a democracy.

"Intelligence as a Science" by R. A. Random, Stud. Intel. V2:2-75-79 (Spring 1958) PDF [286KB*]
Intelligence has the potential to be a science--specifically a branch of the social or policy sciences. Recommends collaboration between practitioners and methodologists to introduce the rigor of the scientific method and the applicable techniques of other policy sciences to intelligence activities.

"Intelligence as Foundation for Policy" by Robert Cutler, Stud. Intel. V3:4-59-71 (Fall 1959) PDF [682KB*]
Describes, from the viewpoint of President Eisenhower's Special Assistant for National Security, how the National Security Council and its subordinate boards use current and estimative intelligence in the formulation of policy.

"The Intelligence Community: 2001-2015" by Aris A. Pappas and James M. Simon, Jr., Stud. Intel. V46:1-39-47 (2002) PDF [463.3KB*]
Reviews the Intelligence Community's approach to and tools for generating intelligence and argues that radical change is called for in the post-9/11 world. States that our human and technical collection systems are outmoded, our targets have seriously changed, we face threats from new quarters (e.g., cyber penetration and attack}, and we have lost out R&D edge. Calls for centralized leadership that can push invention of new technologies, greater integration across the community, better information processing, and deeper relations with private sector.

"The Intelligence Community: Is it Broken? How to Fix It?" by John H. Hedley, Stud. Intel. V39:5-11-18 (1996) PDF [661.8KB*]
Discussion (1994) of the future of the Intelligence Community, featuring the remarks of former DCI Robert Gates and congressmen with intelligence oversight and foreign policy responsibilities, calling in particular for a smaller and more focused analytic cadre.

"The Intelligence Department" by Major General Sir Garnet J. Wolseley, Stud. Intel. V7:4-A19-A24 (Fall 1963) PDF [278KB*]
Basic precepts of military intelligence laid down by one of its most successful 19th Century practitioners.

"Intelligence for Defense Planning" by W. E. Seidel, Stud. Intel. V8:2-19-32 (Spring 1964) PDF [743KB*]
Contemporary account of how today's systems of intelligence support for US defense planning evolved from DoD systems analysis in the early 1960s.

"Intelligence for Economic Defense" by Sherman R. Abrahamson, Stud. Intel. V8:2-33-43 (Spring 1964) PDF [602KB*]
Evolution of Cold War trade controls and the intelligence functions supporting them (1964).

"Intelligence for the Policy Chiefs" by James P. Hanrahan, Stud. Intel. V11:1-1-12 (Winter 1967) PDF [559.7KB*]
Survey of 1960s intelligence production for top policymakers, especially the PDB and other current intelligence periodicals. Addresses then prevailing DI doctrine on anticipating customer needs and other producer-consumer issues.

"Intelligence Gathering in an Unlettered Land" by Francis Hollyman, Stud. Intel. V3:3-15-21 (Summer 1959) PDF [364KB*]
Tutorial on the challenge facing the clandestine HUMINT collector in a land (Saudia Arabia, circa 1950s) where learning is an elite privilege, time is cheap, and the dignity of friendship is dear.

"The Intelligence Hand in East-West Exchange Visits" by Guy E. Coriden, Stud. Intel. V2:3-63-70 (Summer 1958) PDF [443KB*]
Provides an analysis of the East-West Exchange policies and practices of the US, Canada, Great Britian, and the USSR arranged during the late 1950s, and lists the pros and cons of each relative to intelligence collection opportunities.

"Intelligence Implications of Disease" by Warren F. Carey and Myles Maxfield, Stud. Intel. V16:2-71-78 (Spring 1972) PDF [396.7KB*]
Interdisciplinary analysis approach to assessing intelligence implications of epidemics.

"Intelligence in American Society" by Richard Helms, Stud. Intel. V11:3-1-16 (Summer 1967) PDF [814.8KB*]
DCI Helms addresses the Council on Foreign Relations on the necessity for, and dilemma of, having secret services in a democracy such as the United States.

"Intelligence in the Internet Era" by A Denis Clift, Stud. Intel. V47:3-73-79 (2003) PDF [350.0KB*]
Describes the impact the Internet has had on the job of the intelligence analyst and how the Intelligence Community has taken advantage of these technologies to develop its own intranet connectivity.

"Intelligence in the New Japan" by Adam Jourdonnais, Stud. Intel. V7:3-1-14 (Summer 1963) PDF [806KB*]
Explains why Japan, for historical, psychological, and institutional reasons, is showing little inclination to create an foreign intelligence system that might be appropriate to its growing strength and importance in the international system (1963).

Intelligence in War: Knowledge of the Enemy from Napoleon to al-Qaeda by John Keegan. Book review by Michael Warner, Stud. Intel. V48:2-67-69 (2004) PDF [30.0KB*]
Presents and then critiques John Keegan's theses that 1) intelligence in battle is marginal to achieving victory and 2) covert operations to win battles (e.g., special operations) seldom work and often contaminate the ability to obtain operational intelligence. Suggests that Keegan may be right but that he has advanced insufficient evidence to prove his case.

"The Intelligence Necessary to the Formulation of a Sound Strategy" by Lt. Gen. John A. Samford, Stud. Intel. V1:4-1-9 (Fall 1957) PDF [433KB*]
Discussion of the proper relationship of intelligence to formulating strategy. Most important role of intelligence is to identify and measure enemy threats and friendly forces' opportunities.

"The Intelligence of Literature" by James V. Ogle, Stud. Intel. V7:4-23-29 (Fall 1963) PDF [387KB*]
How to analyze literature from closed societies to detect and understand areas of ideological dissidence that might have political and social significance.

"Intelligence Operations of OSS Detachment 101" by W. R. Peers, Stud. Intel. V4:3-A1-A13 (Summer 1960) PDF [624KB*]
Aspects of a classical scouting and resistance-leading unit behind Japanese lines in Burma, from the viewpoint of its commander.

"Intelligence Photography" by Kenneth E. Bofrone, Stud. Intel. V5:2-9-16 (Spring 1961) PDF; [347KB*]
Clever ways that photogrammetrists can derive intelligence even from amateur photographs, with lessons for photo-intelligence collectors and analysts (1961).

"Intelligence Reform in Europe's Emerging Democracies" by Larry L. Watts, Stud. Intel. V48:1-11-25 (2004) PDF [766.4KB*]
Briefly reviews post-cold war intelligence reforms in the US and in northern Europe as a prelude to considering the course of intelligence reform that has occurred in Eastern Europe since the fall of communism. Outlines the difficulties faced by the eastern European countries trying to shake their authoritarian legacies, particularly those in southeastern Europe. Indicates how western assistance has helped and could be of even more value in the future.

"Intelligence Reform in the Mid-1970s" by Timothy S. Hardy, Stud. Intel. V20:2-1-15 (Summer 1976) PDF [1.1MB*]
An examination by a participant in the various public investigations of CIA in the mid-1970s of the context in which the investigations took place, the recommendations of the various investigators, and the consequences for the White House and the CIA. Primarily focuses on the activities of the Rockefeller Commission, the Church Committee, the Pike Committee, and the resulting Presidential Executive Order of February 1976.

"Intelligence Research--Some Suggested Approaches" by Bernard Drell, Stud. Intel. V1:4-79-95 (Fall 1957) PDF [838KB*]
An early (1950s) primer on intelligence research, in particular economic research, with recommendations for project planning, data collection, analysis, and report writing.

"The Intelligence Revolution and the Future" by Wesley K. Wark, Stud. Intel. V37:5-9-16 (1994) PDF [1.3MB*]
A broad-canvas survey of the rising influence of intelligence services--a 20th century revolution--with references to the impact on governments, technology, and literature.

"An Intelligence Role for the Footnote" by A. John Alexander, Stud. Intel. V8:3-1-10 (Summer 1964) PDF [500KB*]
A plea, with argumentation, for using footnotes in finished intelligence to provide for reviewers and consumers better documentation of source and quality of information.

"The Intelligence Role in Counterinsurgency" by Walter Steinmeyer, Stud. Intel. V9:4-57-63 (Fall 1965) PDF [327KB*]
Role of clandestine service in combating all phases of insurgency, from initial recruitment and training of cadres to fullblown "Peoples War." Briefly covers reporting, counter-intelligence, propaganda and political action generally, and training and logistic support of government forces (1960s).

"Intelligence Story in Three Parts" by Edward M. Zivich, Stud. Intel. V9:4:75-76 (Fall 1965) PDF [70KB*]
Three letters from Civil War generals indicate the potential costs of "leaks" of military information to the press and the need to evaluate press reports for disinformation.

"Intelligence Support to the Life Science Community: Mitigating Threats from Bioterrorism" by James B. Petro, Stud. Intel. V48:3-57-68 (2004) PDF [2.3MB*]
As a preface to discussing the current level of cooperation between the life sciences community and the Intelligence Community regarding how to deal with publishing research potentially useful to terrorists, reviews previous relations between the national security and science communities. Outlines differences between these previous efforts to develop controls and the much broader problem that now exists. Discusses the current debate, various recommendations that have been made, and the creation of the National Scientific Advisory Board for Biosecurity (NSABB).

"Interaction in Weapons R&D" by David S. Brandwein, Stud. Intel. V12:1-13-20 (Winter 1968) PDF [425.4KB*]
A scientific intelligence wizard lists reasons why the Intelligence Community generally fails at "interactive analysis" for the benefit of US weapons designers and argues for better communication and interaction between the two.

"The Interpreter as an Agent" by Francis Agnor, Stud. Intel. V4:1-21-27 (Winter 1960) PDF [416KB*]
Benefits and drawbacks of using an interpreter assigned to international exchange delegations as an intelligence agent.

"The Interrogation of Suspects Under Arrest" by Don Compos, Stud. Intel. V2:3-51-61 (Summer 1958) PDF [672KB*]
Discusses the "art" of interrogation. Provides a tutorial on the basic principals and procedures for transforming a recalcitrant prisoner into something approaching an ally. Does not cover subtler techniques of interrogation used for suspected double agents (1950s).

"An Interview with Former Executive Director Lawrence K. 'Red' White" by James Hanrahan, Stud. Intel. Winter 1999/2000:29-41, PDF [1.1MB*]
Reflections, many humorous, on Directors, Presidents, and issues and management by a consummate manager, 1947-1972.

"An Interview with Richard Helms" by David Frost, Stud. Intel. Special Unclass. Ed., Fall 2000:107-136, PDF [1.9MB*]
Retrospective look at his time in CIA, including on such issues as the need for public trust; his relationships with Presidents Kennedy, Johnson, and Nixon; Watergate; covert action in Chile; assassination plots; and DCI Colby's decision to release classified documents to the public.

"An Interview with Richard Lehman" by Richard Kovar, Stud. Intel. Summer 2000, No 9:51-63, PDF [1.1MB*]
Observations on (1) development of current intelligence during the 1950s and 1960s, (2) briefings of presidential candidates, (3) Cuban Missile Crisis, and (4) Team A-Team B controversy over Soviet strategic intentions.

"Interviewing an Intelligence Icon" by William Nolte, Stud. Intel. Winter/Spring 2001, No. 10:39-47, PDF [1.1MB*]
The first Legislative Counsel, Walter Pforzheimer, reflects on CIA leaders, Congressional oversight, and issues from 1947-1997

"The Investigation of UFO's" by Hector Quintanilla, Jr., Stud. Intel. V10:4-95-110 (Fall 1966) PDF [765KB*]
A report (1966) by the principal airforce investigator about UFO cases and how they are handled.

The Invisible Government by David Wise and Thomas B. Ross. Book review by Charles E. Valpey, Stud. Intel. V8:4-109-110 (Fall 1964) PDF [237KB*]
Refutation of the authors' charges that the CIA dominates a secret area of government in defiance of the Constitution, the President and the Congress

"Is Intelligence Over-coordinated?" by Ray S. Cline, Stud. Intel. V1:4-11-18 (Fall 1957) PDF [392KB*]
The author argues that intelligence products, especially National Estimates, frequently lose value because they become delayed and their judgments watered down through needlessly detailed bureaucratic coordination.

"Israel's Quest for Satellite Intelligence" by E. L. Zorn, Stud. Intel. Winter/Spring 2001, No. 10:33-38, PDF [489.1KB*]
Israel deployed a space satellite in 1995, incurring great expense to ensure an independent space reconnaissance capability, because of dissatisfaction with what the Israelis saw as unreliable and inadequate US provision of satellite intelligence.

[Top of page]



J

Jackson, Wayne, "Scientific Estimating", Stud. Intel. V9:3-7-11 (Summer 1965) PDF [217KB*]

Jaggers, R. C. Book review of Seven Men at Daybreak by Alan Burgess, Stud. Intel. V5:3-65-67 (Summer 1961) PDF [124KB*]

Jaggers, R. C., "The Assassination of Reinhard Heydrich", Stud. Intel. V4:1-1-19 (Winter 1960) PDF [961KB*]

Jessel, Walter, "A National Name Index Network", Stud. Intel. V6:2-1-17 (Spring 1962) PDF [790KB*]

Jethmal, Peter F. Book review of Man Hunt in Kenya by Ian Henderson and Philip Goodhart, Stud. Intel. V3:1-137-140 (Winter 1959) PDF [220KB*]

"John Andre, Case Officer" by Robert Amory, Jr., Stud. Intel. V5:3-A1-A15 (Summer 1961) PDF [782KB*]
An account of British Captain John Andre, who handled Benedict Arnold's write-in correspondence, intelligence, reporting, and tasking.He was caught by American soldiers after secretly meeting Arnold, tried, and executed.

Johnson, Kenneth T., "Developments in Air Targeting: Progress and Future", Stud. Intel. V3:3-53-62 (Summer 1959) PDF [553KB*]

Johnson, L. Scott, "Toward a Functional Model of Information Warfare", Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56, PDF [576.6KB*]

Johnson, Loch K., "The Aspin-Brown Intelligence Inquiry: Behind the Closed Doors of a Blue Ribbon Commission", Stud. Intel. V48:3-1-20 (2004) PDF [524.3KB*]

Johnston, Rob, "Developing a Taxonomy of Intelligence Analysis Variables", Stud. Intel. V47:3-61-71 (2003) PDF [581.0KB*]

Johnston, Rob, "Integrating Methodologists into Teams of Substantive Experts", Stud. Intel. V47:1-57-65 (2003) PDF [576.7KB*]

Jones, R. V., "Scientific Intelligence", Stud. Intel. V6:3-55-76 (Summer 1962) PDF [996KB*]

Jones, R. V., "Some Lessons in Intelligence", Stud. Intel. V38:5-37-42 (1995) PDF [446.2KB*]

Jones, R. V., "The Scientific Intelligencer", Stud. Intel. V6:4-37-48 (Fall 1962) PDF [537.8KB*]

Jordan, Lloyd F. Book review of The Arab Mind by Raphael Patai, Stud. Intel. V18:3-29-32 (Fall 1974) PDF [217.2KB*]

Jordan, Lloyd F., "The Case for a Holistic Intelligence", Stud. Intel. V19:2-9-19 (Summer 1975) PDF [688.1KB*]

Jourdonnais, Adam, "Intelligence in the New Japan", Stud. Intel. V7:3-1-14 (Summer 1963) PDF [806KB*]

[Top of page]



K

Kahn, David, "Number One From Moscow", Stud. Intel. V5:4-A15-A28 (Fall 1961) PDF [533.7KB*]

"The Kaiser Sows Destruction" by Michael Warner, Stud. Intel. V46:1-3-9 (2002), PDF [383.9KB*]
Recounts German sabotage efforts in the United States just before World War I and shows how the federal government, in reaction, created the first espionage laws and America's first civilian-military intelligence sharing relationship. Suggests that the terrorism events of 9/11 could have an equally profound and longterm impact.

Kaulbach, M. M.
Hartline, Martin C., "Michael Collins and Bloody Sunday"

Keatts, Dorothy, "Footnote to Cicero", Stud. Intel. V1:4-47-53 (Fall 1957) PDF [360KB*]

"Keeping Pace with the Revolution in Military Affairs" by William Nolte, Stud. Intel. V48:1-1-10 (2004) PDF [147.0KB*]
The author asserts that the 2004 war against Iraq, Operation Iraqi Freedom, demonstrated that the revolution in military affairs (RMA) is well underway, even compared with what the US military achieved in the Persian Gulf war a few years earlier. The challenge is for other parts of the US foreign policy establishment, especially including intelligence, to reform itself with equal speed and effectiveness. He describes how RMA has affected military behavior (e.g., emphasis on innovation in the field) and suggests implications for intelligence.

Kehm, Harold D, "Notes on Some Aspects of Intelligence Estimates", Stud. Intel. V1:2-19-37 (Winter 1956) PDF [875.7KB*]

Kehoe, Robert R., "1944: An Allied Team with the French Resistance", Stud. Intel. Winter 1998/99:15-50, PDF [2.9MB*]

Kelley, Paul X., "Coastal Infiltration and Withdrawal", Stud. Intel. V7:2-A13-A17 (Spring 1963) PDF [225KB*]

Kennedy, David and Leslie Brunetta, "Lebanon and the Intelligence Community", Stud. Intel. V37:2-37-51 (1994) PDF [2.4MB*]

"The Kent-Kendall Debate of 1949" by Jack Davis, Stud. Intel. V36:5-91-103 (1992) PDF [1.9MB*]
Describes doctrinal developments since the 1950s regarding customized analyst support for policymakers' decision and action agendas, with emphasis on growing attention to opportunity or action analysis.

Kent, Sherman, "A Crucial Estimate Relived", Stud. Intel. V36:5-111-119 (Spring 1964) PDF [1.4MB*]

Kent, Sherman, "Allen Welsh Dulles: 1893-1969", Stud. Intel. V13:2-1-2 (Spring 1969) PDF [104.4KB*]

Kent, Sherman. Book review of No Bugles for Spies by Robert Hayden Alcorn, Stud. Intel. V8:1-A17-A20 (Winter 1964) PDF [169KB*]

Kent, Sherman. Book review of OSS: The Secret History of America's First Central Intelligence Agency by R(ichard) Harris Smith., Stud. Intel. V17:1-71-79 (Spring 1973) PDF [629.7KB*]

Kent, Sherman, "Death of a Hypothesis", Stud. Intel. V9:2-21-24 (Spring 1965) PDF [190KB*]

Kent, Sherman, "Estimates and Influence", Stud. Intel. V12:3-11-21 (Summer 1968) PDF [546.9KB*]

Kent, Sherman, "The Need for an Intelligence Literature", Stud. Intel. V1:1-1-11 (Fall 1955) PDF [363KB*]

Kent Sherman, "The Yale Report", Stud. Intel. V17:2-7-21 (Summer 1973) PDF [962.2KB*]

Kent, Sherman, "Valediction", Stud. Intel. V12:1-1-11 (Winter 1968) PDF [498.1KB*]

Kent, Sherman, "Words of Estimative Probability", Stud. Intel. V8:4-49-65 (Fall 1964) PDF [770KB*]

Kerbel, Josh, "Thinking Straight: Cognitive Bias in the US Debate about China", Stud. Intel. V48:3-27-35 (2004) PDF [112.1KB*]

Kerlin, Julie O., "Military-Economic Estimating: A Positive View", Stud. Intel. V10:4-35-44 (Fall 1966) PDF [469.2KB*]

Kern, Gary, "How 'Uncle Joe' Bugged FDR", Stud. Intel. V47:1-19-31 (2003) PDF [823.3KB*]

Kerr, Richard J., "Ronald Reagan and the President's Daily Brief", Stud. Intel. Winter 1998/99:51-56, PDF [462.2KB*]

"The Kidnapping of the Lunik" by Sydney Wesley Finer, Stud. Intel. V11:1-33-39 (Winter 1967) PDF [325KB*]
Describes the clandestine waylaying of a crated Soviet Lunik by an unidentified Station, its overnight concealment, the opening of its crate, the photographing of the factory markings therein, and successful undetected return to shipping channels.

Kimball, Walter B., "Singapore's People's Association", Stud. Intel. V12:4-47-55 (Fall 1968) PDF [874.6KB*]

Kimball, Warren F., "Openness and the CIA", Stud. Intel. Winter/Spring 2001, No. 10:63-67, PDF [419.9KB*]

Kimsey, Herman E., "The Identi-Kit", Stud. Intel. V4:1-29-35 (Winter 1960) PDF [332KB*]

Kindsvater, Larry C., "The Need to Reorganize the Intelligence Community", Stud. Intel. V47:1-33-37 (2003) PDF [250.7KB*]

Kinsman, N. Richard, "Openness and the Future of the Clandestine Service", Stud. Intel. Winter/Spring 2001, No. 10:55-61, PDF [553.4KB*]

Kirkpatrick, L.B. Book review of The Bay of Pigs by Haynes Johnson with Manuel Artime and others., Stud. Intel. V8:4-104-105 (Fall 1964) PDF [134KB*]

Kirkpatrick, Lyman A. Book review of Pearl Harbor: Warning and Decision by Roberta Wohlstetter, Stud. Intel. V7:3-119-122 (Summer 1963) PDF [201KB*]

Kirkpatrick, Lyman B., "Combat Intelligence: A Comparative Evaluation", Stud. Intel. V5:4-45-51 (Fall 1960) PDF [358KB*]

Kirkpatrick, Lyman B., "Unrecognized Potential in the Military Attachés", Stud. Intel. V4:2-1-6 (Spring 1960) PDF [338KB*]

Kirkpatrick, Lyman, "Origins, Missions, and Structure of CIA", Stud. Intel. V2:1-1-5 (Winter 1958) PDF [271KB*]

Knapp, Frank A. Jr. "Styles and Stereotypes in Intelligence Studies", Stud. Intel. V8:2-A1-A5 (Spring 1964) PDF [233KB*]

Knobelspiesse, A.V., "Captain Stephen Kalman: A Classic Write-In Case", Stud. Intel. V6:4-A1-A13 (Fall 1962) PDF [741KB*]

Knobelspiesse, A.V., "Masterman Revisited", Stud. Intel. V18:1-25-40 (Spring 1974) PDF [954.1KB*]

Knott, James E., "Secrecy and Intelligence in a Free Society", Stud. Intel. V19:2-1-8 (Summer 1975) PDF [469.9KB*]

Knowles. Kenneth A. Book review of The Tenth Fleet by Ladislas Farago, Stud. Intel. V7:2-A19-A23 (Spring 1963) PDF [223KB*]

Koch, Scott A., "The Role of US Army Military Attachés between the World Wars", Stud. Intel. V38:5-111-115 (1995) PDF [368.2KB*]

Kohler, Robert J., "One Officer's Perspective:The Decline of the National Reconnaissance Office", Stud. Intel. Unclass. Ed., V46:2-1-16 (2002) PDF [432.6KB*]

"The Komsomolets Disaster" by George Montgomery, Stud. Intel. V38:5-43-51 (1995) PDF [652.7KB*]
This is an account of the sinking of the Russian nuclear attack submarine, Komsomolets. Reconstructs why the sub sank, how the crew reacted during the disaster, and what the Russians did to ascertain potential environmental damage from the sub's nuclear reactor and torpedoes.

Konovalov, A. A., "Meeting with Agents", Stud. Intel. V8:2-65-91 (Spring 1964) PDF [1.3MB*]

Kontakt med England (1940-1943) and Hemmelig Alliance (1943-1945) by Jorgen Haestrup. Book review by Anonymous
Describes the organization and activities of the Danish underground in World War II, and its connections with the British SOE and SIS, and the Danish Communist Party., Stud. Intel. V6:4-A63-A66 (Fall 1962) PDF [169KB*]

Kovar, Richard, "An Interview with Richard Lehman", Stud. Intel. Summer 2000, No 9:51-63, PDF [1.1MB*]

Kovner, Milton, "Pricing Soviet Military Exports", Stud. Intel. V12:2-37-42 (Spring 1968) PDF [311.2KB*]

Kroger, Charles A., Jr., "ELINT: A Scientific Intelligence System", Stud. Intel. V2:1-71-83 (Winter 1958) PDF [649KB*]

Kronenbitter, Rita T., "Leon Trotsky, Dupe of the NKVD", Stud. Intel. V16:1-15-61 (Special Edition 1972) PDF [2.3MB*]

Kronenbitter, Rita T., "Okhrana Agent Dolin", Stud. Intel. V10:2-57-72 (Spring 1966) PDF [830.7KB*]

Kronenbitter, Rita T., "Paris Okhrana 1885-1905", Stud. Intel. V10:3-55-66 (Summer 1966) PDF [591.9KB*]

Kronenbitter, Rita T., "Paris Okhrana: Final Phase", Stud. Intel. V12:3-65-78 (Summer 1968) PDF [728.6KB*]

Kronenbitter, Rita T., "The Illustrious Career of Arkadiy Harting", Stud. Intel. V11:1-71-86 (Winter 1967) PDF [795.1KB*]

Kronenbitter, Rita T., "The Okhrana's Female Agents: Part I: Russian Women", Stud. Intel. V9:2-25-41 (Spring 1965) PDF [813KB*]

Kronenbitter, Rita T., "The Okhrana's Female Agents: Part II: Indigenous Recruits", Stud. Intel. V9:3-59-78 (Summer 1965) PDF [806KB*]

Kronenbitter, Rita T., "The Sherlock Holmes of the Revolution", Stud. Intel. V11:4-83-100 (Fall 1967) PDF [911.8KB*]

[Top of page]



L

"Laboratory Analysis of Suspect Documents" by James Van Stappen, Stud. Intel. V4:3-47-55 (Summer 1960) PDF [492KB*]
Some of the possibilities, methods, and results of submitting written materials to examination by test tube and microscope.

Lagrone, James J., "The Hotel in Operations", Stud. Intel. V9:4-43-56 (Fall 1965) PDF [719KB*]

Lambridge, Wayne, "A Note on KGB Style", Stud. Intel. V15:1-115-121 (Winter 1971) PDF [349.3KB*]

"Landscape Analysis" by Arthur R. Hall, Stud. Intel. V11:3-65-75 (Summer 1967) PDF [573.5KB*]
A primer on the methods used, types of intelligence problems tackled, and products created by the intelligence geographer, including in such operational support activities as briefs for escape and evasion, infiltration, paramilitary operations, SIGINT collection, and guides to and about targets for agents.

Larson, Doyle, Maj. General
see Woolsey, R. James, "Honoring Two World War II Heroes"

"The Last Days of Ernst Kaltenbrunner" by Anonymous, Stud. Intel. V4:2-A11-A29 (Spring 1960) PDF [1.1MB*]
Account of the manhunt for and capture of the head of Nazi intelligence and security services by the US military officer who commanded effort. Also summarizes events at Nuremberg trials of Nazi leadership.

Laycock, Keith, "Handwriting Analysis as an Assessment Aid", Stud. Intel. V3:3-23-43 (Summer 1959) PDF [1.1MB*]

Leary, William M., "CIA Air Operations in Laos, 1955-1974", Stud. Intel. Winter 1999/2000:71-86, PDF [1.3MB*]

Leary, William M., "Robert Fulton's Skyhook and Operation Coldfeet", Stud. Intel. V38:5-99-109 (1995) PDF [746.0KB*]

Leavitt, Robert W., "Developments in Air Targeting: The Military Resources Model", Stud. Intel. V2:1-51-64 (Winter 1958) PDF [752KB*]

"Lebanon and the Intelligence Community" by David Kennedy and Leslie Brunetta, Stud. Intel. V37:2-37-51 (1994) PDF [2.4MB*]
A Harvard University/Kennedy School case study on major fault lines in policymaker - analyst relations re the Lebanon crisis (1982-83). Analysts across the Intelligence Community anticipated a policy disaster for the Reagan Administration, but had limited direct contact and received almost no policymaker attention to their analysis.

Leidesdorf, Titus, "The Vietnamese as Operational Target", Stud. Intel. V12:4-57-71 (Fall 1968) PDF [961.5KB*]

"Leon Trotsky, Dupe of the NKVD" by Rita T. Kronenbitter, Stud. Intel. V16:1-15-61 (Special Edition 1972) PDF [2.3MB*]
A long, detailed account of how the Soviet services (first the OGPU, then the NKVD) mounted a ten year campaign (1930-1940) to destroy Leon Trotsky, his family, his aides, and other promoters of the Fourth International.

"The Lessons of the September 30 Affair" by Richard Cabot Howland, Stud. Intel. V14:2-13-29 (Fall 1970) PDF [840.9KB*]
Recounts the events leading to and following the Indonesian Communist Party (PKI) and President Sukarno's attempt to assassinate top army leaders and seize total control. Argues that it was an internal Indonesian affair without Chinese complicity and could not have been foreseen by all but the closest insiders.

Lewis, Anthony Marc, "Re-examining Our Perceptions on Vietnam", Stud. Intel. V17:4-1-62 (Winter 1973) PDF [4.2MB*]

Lexow, Wilton E., "The Enigma of Soviet BW", Stud. Intel. V9:2-15-20 (Spring 1965) PDF [279KB*]

Lexow, Wilton, "The Science Attaché Program", Stud. Intel. V10:2-21-27 (Spring 1966) PDF [310.1KB*]

"The Lie That Linked CIA to the Kennedy Assassination" by Max Holland, Stud. Intel. Fall/Winter 2001, No. 11:5-17, PDF [1.7MB*]
Follows the trail of a Soviet disinformation effort that linked Clay Shaw, accused of masterminding the plot that led to President Kennedy's assassination by New Orleans District Attorney Jim Garrison, to CIA. The article traces the disinformation from its first appearance in a small, leftist Italian newspaper in 1967 to its role in stimulating Oliver Stone's film, JFK, many years later. Provides a detailed account of how the Agency reacted to Garrison's efforts, what Shaw's relationship with the Agency actually was, and the ultimate impact the disinformation had on the belief of many that the Agency had a hand in Kennedy's death.

"The Life and Work of Stephan Haller" by Patrick R. Beller, Stud. Intel. V3:3-1-14 (Summer 1959) PDF [712KB*]
Biographical account of an extraordinary case officer whose exploits in the OSS and later with the CIA accounted for information coups of unprecedented value to US national security interests.

Linder, James C., "The Fall of Lima Site 85", Stud. Intel. V38:5-79-88 (1995) PDF [818.4KB*]

"A Listening Post in Miami" by Justin F. Gleichauf, Stud. Intel. Winter/Spring 2001, No. 10:49-53, PDF [373.2KB*]
An officer of the Domestic Contacts Division (then in the DI) relates frantic activities in Miami, Key West, and Opalaca Florida to glean information from refugees fleeing Castro's Cuba (starting in 1959). The disappointment after the Bay of Pigs (April 1961). The excitement of the Missile Crisis (October 1962).

"The Lohmann Affair" by Anonymous, Stud. Intel. V4:2-A31-A38 (Spring 1960) PDF [426KB*]
Weimar Republic's attempt to circumvent the Treaty of Versailles restrictions on post-World War I German rearmament through clandestine financing and cover arrangements.

A Look Over My Shoulder: A Life in the Central Intelligence Agency by Richard Helms. Book review by Thomas M. Troy, Jr., Stud. Intel. V48:1-75-84 (2004) PDF [85KB*]
The review concentrates on critiquing three episodes that Helms covers in this memoir: CIA's involvement in Watergate, the debate over whether Yuri Nosenko was or was not a legitimate Soviet defector, and Helms' defense of James Angleton, the Counterintelligence chief who was fired by William Colby.

Lose, Capt. James M., "The National Intelligence Support Team", Stud. Intel. Winter 1999/2000:87-96, PDF [711.9KB*]

Lost Crusader: The Secret Wars of CIA Director William Colby by John Prados. Book review by David S. Robarge, Stud. Intel. V47:4-77-82 (2003) PDF [50.0KB*]
Brief review of a biography of William Colby that attempts to correct what the author sees as misjudgments about Colby and the consequences of his actions of, to some degree, opening up the Agency to public and congressional scrutiny.

"The Lost Keys to El Alamein" by Wilhelm F. Flicke, Stud. Intel. V3:4-73-80 (Fall 1959) PDF [415KB*]
German COMINT officer presents his version of the reason General Rommel was beaten at the gates of Egypt, July 1941.

"Lost Order, Lost Cause" by C. Bowie Millican, Robert M. Gelman, and Thomas A. Stanhope, Stud. Intel. V2:1-103-113 (Winter 1958) PDF [633KB*]
Describes how a military order lost by General Robert E. Lee's forces and found by those of the North's General George B. McClellan may have contributed to the defeat of Lee's army at the Battle of Antietam. Speculates how that loss may have been pivotal in the South's loss of the Civil War.

Lowenhaupt, Henry S., "Chasing Bitterfeld Calcium", Stud. Intel. V17:1-21-30 (Spring 1973) PDF [704.3KB*]

Lowenhaupt, Henry S., "Mission to Birch Woods", Stud. Intel. V12:4-1-12 (Fall 1968) PDF [892.7KB*]

Lowenhaupt, Henry S., "On the Soviet Nuclear Scent", Stud. Intel. V11:4-13-29 (Fall 1967) PDF [842.1KB*]

Lowenhaupt, Henry S., "Somewhere in Siberia", Stud. Intel. V15:1-35-51 (Winter 1971) PDF [876.2KB*]

Lowenhaupt, Henry S., "The Decryption of a Picture", Stud. Intel. V11:3-41-53 (Summer 1967) PDF [764.5KB*]

[Top of page]



M

MacEachin, Douglas J., "CIA Assessments of the Soviet Union", Stud. Intel. Semiannual Ed., No. 1, 1997: 57-65, PDF [732.7KB*]

Magnan, Stephen W., "Safeguarding Information Operations", Stud. Intel. Summer 2000, No 9:97-109, PDF [591.9KB*]

"The Mail from Budapest" by Anonymous, Stud. Intel. V2:4-93-103 (Fall 1958) PDF [586KB*]
Gripping account of a Czech counterintelligence service operation against a Hungarian-controlled spy ring deployed in Czechoslovakia prior to World War II. Describes in graphic detail the tradecraft employed in uncovering the clandestine operation, including surveillance techniques, secret writing, and mail tampering.

"Making Intelligence Analysis Responsive to Policy Concerns" by James Murphy and K. Wayne Smith, Stud. Intel. V17:2-1-6 (Summer 1973) PDF [373.9KB*]
NSC staff members make a strong case on intelligence analysts' responsibility to participate in the policymaking process from beginning to end, using the mechanism of the National Security Study Memorandum (NSSM) to illustrate how analysis must be focused on policy concerns and requirements.

Man Hunt in Kenya by Ian Henderson and Philip Goodhart. Book review by Peter F. Jethmal, Stud. Intel. V3:1-137-140 (Winter 1959) PDF [220KB*]
Importance of knowing the local language and culture and of good intelligence from native informants in combating the Mau Mau insurrection in Kenya, 1950s.

"The Man in the Snow White Cell" by Merle L. Pribbenow, Stud. Intel. V48:1-45-58 (2004) PDF [283.8KB*]
Recounts the story of Nguyen Tai, a high ranking North Vietnamese military intelligence officer held in captivity by the South Vietnamese for five years during the Vietnam War. He successfully resisted South Vietnamese torture and American interrogation during this entire period. The article uses Tai's experience to underscore the author's belief that torture is an inefficient and immoral interrogation technique.

Managhan, Dr. Robert L., "Trends in African Forgeries", Stud. Intel. V19:1-13-21 (Spring 1975) PDF [440.0KB*]

"Managing Covert Political Action" by James A. Barry, Stud. Intel. V36:5-19-31 (1992) PDF [1.8MB*]
Proposes guidelines for rationalizing, planning, and legalizing covert political action using "just war" theory, and applies these guidelines to the Chilean political action operations in the 1964 and 1970 Chilean elections as test cases.

Manget, Frederic F., "Intelligence and the Rise of Judicial Intervention", Stud. Intel. V39:5-43-50 (1996) PDF [635.1KB*]

"The Many Burdens of Defense in the Soviet Union" by Rush V. Greenslade, Stud. Intel. V14:2-1-12 (Fall 1970) PDF [534.4KB*]
A leading analyst of the Soviet economy ponders whether it is possible to extract accurate intelligence on military programs from a non-market production system that is in "a state of gross and pervasive disequilibrium." The author attacks several presumptions about Soviet abilities to shift production priorities and about measures used in the US to estimate Soviet military expenditures.

"The Map in Field Reporting" by Louis Thomas, Stud. Intel. V6:2-43-52 (Spring 1962) PDF [340KB*]
Lists the advantages, kinds, and optimum qualities of maps used as part of field reporting.

Marcquenski, Thomas W., "A Name for Your Number", Stud. Intel. V7:4-61-64 (Fall 1963) PDF [189KB*]

The Mare's Nest by David Irving. Book review by Edwin R. Walker, Stud. Intel. V11:1-93-96 (Winter 1967) PDF [258.7KB*]
An excellent summary of a highly readable book (subsequently a gripping movie), which also includes useful maxims for analysts on the negative effects of mindsets and bureaucratic infighting

"The Mariner as Agent" by Art Haberstich, Stud. Intel. V10:1-45-55 (Winter 1966) PDF [542KB*]
Detailed tradecraft primer (1960s) on recruiting and handling seamen and ship officers as agents for collection in "denied areas" and as couriers, and for such operations as spotting of new agents and exfiltration of third parties.

Martin, Joseph W., "What Basic Intelligence Seeks To Do", Stud. Intel. V14:2-103-113 (Fall 1970) PDF [564.4KB*]

The Master of Disguise: My Secret Life in the CIA by Antonio Mendez. Book review by Jim Steinmeyer, Stud. Intel. V46:1-67-70 (2002) PDF [152.3KB*]
A delightful review of Mendez's book, relating his artistry in creating disguises to that of a master magician.

"Masterman Revisited" by A. V. Knobelspiesse, Stud. Intel. V18:1-25-40 (Spring 1974) PDF [954.1KB*]
Outlines the double agent cases described in John Masterman's The Double Cross System in the War of 1939 to 1945. Makes the case for deception operations.

Matschulat, Austin B., "Coordination and Cooperation in Counterintelligence", Stud. Intel. V13:2-25-36 (Spring 1969) PDF [566.2KB*]

Maury, John M., "CIA and the Congress", Stud. Intel. V18:2-1-14 (Summer 1974) PDF [970.8KB*]

Maxfield, Myles
see Carey, Warren F., "Intelligence Implications of Disease"

Maximov, William J., "The Metal Traces Test", Stud. Intel. V11:4-37-44 (Fall 1967) PDF [351.4KB*]

May, Ernest R, "Studying and Teaching Intelligence", Stud. Intel. V38:5-1-5 (1995) PDF [396.6KB*]

May, Lowell E., "Centralized Requirements in the DIA", Stud. Intel. V7:4-33-40 (Fall 1963) PDF [404KB*]

McCadden, Harvey B., "Cover in Unconventional Operations", Stud. Intel. V5:3-31-35 (Summer 1961) PDF [293KB*]

McCarn, Davis B., "Developments in Air Targeting: The Damage Assessment Model", Stud. Intel. V2:3-19-23 (Summer 1958) PDF [336KB*]

McConnaughy, David
see Allan, R. T., Jr., "More Against Footnotes"

McCort, Robert F.
see Brugioni, Dino A., "British Honors for Lundahl"

McCullough, James, "Commentary on 'Congress as a User of Intelligence' ", Stud. Intel. Spring 1998:71-83 PDF [268.8KB*]

McCullough, James, "Personal Reflections on Bill Casey's Last Month at CIA", Stud. Intel. V39:5-75-91 (1996) PDF [1.4MB*]

McDonald, Walter, "African Numbers Game", Stud. Intel. V8:4-11-20 (Fall 1964) PDF [519KB*]

McGrath, James, "The Scientific and Cultural Exchange", Stud. Intel. V7:1-25-30 (Winter 1963) PDF [349KB*]

McIninch, Thomas P., "The Oxcart Story", Stud. Intel. V15:1-1-25 (Winter 1971) PDF [1.8MB*]

McLean, David R., "Cranks. Nuts. and Screwball", Stud. Intel. V9:3-79-89 (Summer 1965) PDF [510KB*]

Medina, Carmen A., "What To Do When Traditional Models Fail", Stud. Intel. Unclass. Ed., V46:3-35-40 (2001) PDF [310.7KB*]

"Meeting with Agents" by A. A. Konovalov, A and V. S. Sokolov, Stud. Intel. V8:2-65-91 (Spring 1964) PDF [1.3MB*]

Megaris, Andrew K., "More on 'Lucy'", Stud. Intel. V16:2-109-111 (Spring 1972) PDF [123.5KB*]

"Memoranda for the President: Japanese Feelers", OSS Reports to the White House, Stud. Intel. V9:3-33-50 (Summer 1965) PDF [790KB*]
Dispatches from Allen Dulles and other US contacts detail the efforts of a Japanese peace group to end the Pacific war.

"Memoranda for the President: OSS-NKVD Liaison", OSS Reports to the White House, Stud. Intel. V7:3-63-74 (Summer 1963) PDF [565KB*]
Memos from Gen. William J. Donovan, principally to President Roosevelt, regarding possible wartime collaboration between OSS and the Soviet intelligence services (especially NKVD).

"Memoranda for the President: Sunrise", OSS Reports to the White House, Stud. Intel. V7:2-73-98 (Spring 1963) PDF [1.3MB*]
OSS chief Donovan sent Presidents Roosevelt and Truman mainly case officer reports, rather than finished intelligence. Here a collection of reports from Allen Dulles, OSS agent in Bern Switzerland, on arrangements for surrender of the German army in Northern Italy in 1945.

"Memorandum for the President: Boston Series", OSS Reports to the White House, Stud. Intel. V9:1-81-90 (Winter 1965) PDF [451KB*]
Series of OSS field reports sent to President Roosevelt by General Donovan, including assessment by Allen Dulles in April 1944, stationed in Switzerland, that according to well-placed sources German diplomatic and governmental morale was collapsing.

"Memorandum for the President: From Peter to Tito", OSS Reports to the White House, Stud. Intel. V9:2-53-84 (Spring 1965) PDF [1.4MB*]
Highly placed OSS officers record in dispatches the two-year process by which Tito and Stalin duped Roosevelt, Churchill, and the Yugoslav government in exile into facilitating the establishment of a Communist dictatorship in Belgrade.

Mendez, Antonio J., "A Classic Case of Deception", Stud. Intel. Winter 1999/2000:1-16, PDF [1.3MKB*]

Mercado, Stephen C., "FBIS Against the Axis, 1941-1945 (U)", Stud. Intel. Fall/Winter 2001, No. 11:33-43, PDF [1.4MB*]

Mercado, Stephen C., "Hermit Surfers of P'yongyang", Stud. Intel. V48:1-39-44 (2004) PDF [106.9KB*]

Mercado, Stephen C., "Sailing the Sea of OSINT in the Information Age", Stud. Intel. V48:3-45-55 (2004) PDF [131.9KB*]

Merkle, Janet Hill, "Policy Bias", Stud. Intel. V7:1-55-59 (Winter 1963) PDF [273KB*]

"The Metal Traces Test" by William J. Maximov and Edward Scrutchings, Stud. Intel. V11:4-37-44 (Fall 1967) PDF [351.4KB*]
Development, deployment, and results of a metal traces test kit designed to identify persons who have handled firearms. Designed for use in counterinsurgency operations in Vietnam.

"Michael Collins and Bloody Sunday" by Martin C. Hartline and M. M. Kaulbach, Stud. Intel. V13:1-69-78 (Winter 1969) PDF [463.7KB*]
Describes Irish Republican Army's intelligence service leader, Michael Collins', penetration of British intelligence and forces in Ireland, his organization and methods, including frequent assassinations leading up to November 21, 1920–Bloody Sunday.

"Microtechnology" by Donald Reiser and Harry Wood, Stud. Intel. V12:4-23-38 (Fall 1968) PDF [1.3MB*]
Describes the latest advances in microtechnology (1968) and the implications of these improvements regarding size and power demands for audio, video, optical, and electronic intelligence gathering systems.

Mikoyan, Sergo A., "Eroding the Soviet 'Culture of Secrecy' ", Stud. Intel. Fall/Winter 2001, No. 11:45-56, PDF [1.6MB*]

"The Military Attachés", Communications to the Editors by Peter J. Dorondo, Stud. Intel. V4:3-79-83 (Summer 1960) PDF [297KB*]
Worthwhile amplification of Lyman Kirkpatrick's summary article on the importance and value of attaché reporting to intelligence users (Studies V4:2).

"Military-Economic Estimating: A Positive View" by Julie O. Kerlin, Stud. Intel. V10:4-35-44 (Fall 1966) PDF [469.2KB*]
Debates the negative view of military-economic costing of the Soviet defense effort reflected in "Economic Intelligence in Defense Planning (V10:1-1-22, PDF) and describes the costing process used and its benefits (1966).

"Military Intelligence 1861-63 (Part I)" by Edwin C. Fishel, Stud. Intel. V10:3-81-96 (Summer 1966) PDF [837KB*]
A revisionist view of the importance and uses of intelligence during the first campaigns of the Civil War. Debunks many famous myths about when intelligence was effectively used but supplies new examples of where it was effective.

"Military Intelligence 1861-63: Part II" by Edwin C. Fishel, Stud. Intel. V10:4-69-93 (Fall 1966) PDF [1.3MB*]
More examples of the failures and successes of intelligence in the Civil War, and the many misconceptions that surround the subject today.

"Military Intelligence Behind Enemy Lines" by Stefan Borowy, Stud. Intel. V2:3-107-116 (Summer 1958) PDF [535KB*]
Appraisal of the organizational structure and activities carried out by the Intelligence Division of Poland's Home Army during the German/USSR occupation of World War II.

Millican, C. Bowie, "Lost Order, Lost Cause", Stud. Intel. V2:1-103-113 (Winter 1958) PDF [633KB*]

Mineur, Michael L., "Defense Against Communist Interrogation Organizations", Stud. Intel. V13:4-49-74 (Fall 1969) PDF [1.2MB*]

Miskovsky, M. C. Book review of Strangers on a Bridge, 1964 by James B. Donovan, Stud. Intel. V9:3-97-100 (Summer 1965) PDF [173KB*]

Miskovsky, M. C., "Impunity of Agents in International Law", Stud. Intel. V5:2-A21-A34 (Spring 1961) PDF [718KB*]

"Mission to Birch Woods" by Henry S. Lowenhaupt, Stud. Intel. V12:4-1-12 (Fall 1968) PDF [892.7KB*]
A veteran of the Manhattan Project plots targets for the first U-2 reconnaissance flights over suspect Soviet nuclear weapons R&D sites, with only prisoners' gossip and a tainted fur hat for evidence -- and hits the jackpot.

Mitelman, Lawrence T., "Preface to a Theory of Intelligence", Stud. Intel. V18:3-19-22 (Fall 1974) PDF [280.4KB*]

Miyagi, Takemi, "Which Way Did They Go?", Stud. Intel. V11:1-67-70 (Winter 1967) PDF [166.4KB*]

Mobley, Richard A., "Gauging the Iraqi Threat to Kuwait in the 1960s", Stud. Intel. Fall/Winter 2001, No. 11:19-31, PDF [1.7MB*]

"The Monitoring of War Indicators" by Thomas J. Patton, Stud. Intel. V3:1-55-68 (Winter 1959) PDF [749KB*]
Comprehensive survey of the Intelligence Community's organization, doctrine, and practices for strategic warning during the late 1950s, including the roles of the DCI's Watch Committee and the interagency National Indications Center.

Monkiewicz, John W., "A Comment on 'A Note on KGB Style'", Letter to the Editor , Stud. Intel. V16:1-81-82 (Special Edition 1972) PDF [100.1KB*]

"Montague, Ludwell L., "Priority National Intelligence Objectives", Stud. Intel. V5:2-1-8 (Spring 1961) PDF [452KB*]

Montague, Ludwell Lee, "The Origins of National Intelligence Estimating", Stud. Intel. V16:2-63-70 (Spring 1972) PDF [373.8KB*]

Montgomery, George, "The Komsomoloets Disaster", Stud. Intel. V38:5-43-51 (1995) PDF [652.7KB*]

Montgomery, John, "Inside the White House Situation Room"
see Donley, Michael, "Inside the White House Situation Room"

"Moon Bounce Elint" by Frank Eliot, Stud. Intel. V11:2-59-66 (Spring 1967) PDF [426KB*]
Describes the technique for monitoring Soviet radar signals reflected by the moon (1960s).

Moravic, Frantisek, "Operation Uproot", Stud. Intel. V7:2- A1-A11 (Spring 1963) PDF [607KB*]

"More Against Footnotes" by R. T. Allan, Jr. and David McConnaughy, Stud. Intel. V8.4:85-86 (Fall 1964) PDF [76KB*]
More arguments against the use of footnotes in intelligence publications

"More on 'Lucy'" by Andrew K. Megaris, Stud. Intel. V16:2-109-111 (Spring 1972) PDF [123.5KB*]
A critique of an earlier article ("The Rote Drei: Getting Behind The 'Lucy' Myth," V13:3-51/f1-/f090). Advances the theory that the source, "Lucy," was a creation by Swiss intelligence to enable it to pass intelligence to the allies without compromising Swiss neutrality.

"More Yet on 'Lucy'" by Mark A. Tittenhofer, Stud. Intel. V16:3-87-88 (Fall 1972) PDF [98.5KB*]
Author of earlier article rebuts observations and challenges made by reviewer (V16:2-109-111 , PDF [123.5KB*]) about his identification of Soviet spy ring suspects operating in Germany during World War II. Suggests post-war Soviet disclosures about operation are "disinformation."

To Move a Nation by Roger Hilsman. Book review by Abbot E. Smith, Stud. Intel. V11:4-106-107 (Fall 1967) PDF [94.2KB*]
A trenchant (1960s) comment on the degree to which CIA "makes" policy.

Mull, Alexander, "Notes on the Wennerström Case", Stud. Intel. V10:3-67-76 (Summer 1966) PDF [468KB*]

Munson, Harlow T., "Two Witnesses for the Defense", Stud. Intel. V8:4-93-98 (Fall 1964) PDF [301KB*]

Murphy, Lt. Col. James, "Making Intelligence Analysis Responsive to Policy Concerns", Stud. Intel. V17:2-1-6 (Summer 1973) PDF [373.9KB*]

Murphy, Mark, "The Exploits of Agent 110", Stud. Intel. V37:5-63-70 (1994) PDF [1.2MB*]

[Top of page]



N

Nabbie, Eustace E., "The Alamo Scouts", Stud. Intel. V3:4-87-92 (Fall 1959) PDF [299KB*]

Naffsinger, Peter A., " 'Face' Among the Arabs", Stud. Intel. V8:3-43-54 (Summer 1964) PDF [644KB*]

Naftali, Timothy, "Celebrating the Life of Walter Pforzheimer", Stud. Intel. V47:3-1-3 (2003) PDF [160.3KB*]

"A Name for Your Number" by Thomas W. Marcqueski, Stud. Intel. V7:4-61-64 (Fall 1963) PDF [189KB*]
Operational benefits of "reversed" city telephone books organized by telephone number or street address. Key punch technology of the 1950s for production.

Nance, William H., "Quality ELINT", Stud. Intel. V12:2-7-19 (Spring 1968) PDF [677.2KB*]

"Nathan Hale's Mission" by Streeter Bass, Stud. Intel. V17:4-67-74 (Winter 1973) PDF [532.7KB*]
Detailed account of the mission, circumstances of capture, and execution of Nathan Hale.

"The National Intelligence Daily" by Nathan Nielsen, Stud. Intel. V20:1-39-51 (Spring 1976) PDF [751KB*]
This was a relatively short-lived experiment, undertaken in the mid-1970s, in using a four page newspaper format to deliver current intelligence to principal policy officials, including the President. The articles describes DCI William Colby's reasons for creating the newspaper and the process used to produce it.

"The National Intelligence Support Team" by Capt. James M. Lose, Stud. Intel. Winter 1999/2000:87-96, PDF [711.9KB*]
Outlines the role of a NIST as a conduit for multi-agency intelligence focused on the needs of a local military commander, citing examples of Haiti and Bosnia. Argues for a more formal mandate, a focus on limited crisis support, and better and coordinated technical capabilities.

"A National Name Index Network" by Walter Jessel, Stud. Intel. V6:2-1-17 (Spring 1962) PDF [790KB*]

Nedzi, Lucien N., "Oversight or Overlook: Congress and the U.S. Intelligence Agencies", Stud. Intel. V18:2-15-20 (Summer 1974) PDF [293.1KB*]

"The Need for an Intelligence Literature" by Sherman Kent, Stud. Intel. V1:1-1-11 (Fall 1955) PDF [363KB*]
Writing in 1955, observes that intelligence had taken on many of the attributes of a distinctive profession, but is in need of a literature to create "an institutional mind and memory" for the new discipline, in such areas as doctrine (principles about mission and standards), methods (tradecraft), and definition or clarification of central analytic concepts.

"The Need for Ethical Norms" by Paul G. Ericson, Stud. Intel. V36:5-15-18 (1992) PDF [463.4KB*]
A 1992 call, by the then Director of Training, for an experience-based codification of ethical standards for Agency professionals in order to balance such trade-offs as Directorate of Operations "can-do" vs. "shouldn't do," and Directorate of Intelligence "making the call" vs. "limits of predictive insights."

"The Need to Reorganize the Intelligence Community" by Larry C. Kindsvater, Stud. Intel. V47:1-33-37 (2003) PDF [250.7KB*]
Proposes that the Intelligence Community (IC) be reorganized so that the primary units, placed in a strengthened CIA, are mission-oriented centers drawing resources from the entire IC that combine analysis and collection on single, substantive issues. The DCI would be given budget and personnel authority over all members of the IC.

"A Neglected Source of Evidence" by Myron Rush, Stud. Intel. V2:3-117-125 (Summer 1958) PDF [454KB*]
Methods and merits of analyzing "esoteric communications" in Soviet leaders' statements and in official accounts of their activities, using Khrushchev as a prime example. (1958)

"New Anachronism" by Ralph Riposte, Stud. Intel. V2:3-43-44 (Summer 1958) PDF [111KB*]
Rebuts "Kim or Major North" (V2:3-37-42, PDF) which suggested that operations officers overseas would be more effective if they "went native." In rebuttal, the author affirms that each operational situation requires a separate decision, and in many cases, going "native" would be counterproductive.

"New Insights into J. Edgar Hoover's Role" by G. Gregg Webb, Stud. Intel. V48:1-45-58 (2004) PDF [931.5KB*]
Provides a new look at the history of the founding of the FBI's Special Intelligence Service (SIS), which was set up in 1940 at the behest of President Roosevelt to conduct foreign intelligence activities in the Western Hemisphere. Argues that J. Edgar Hoover initially attempted to transfer responsibility for the SIS to other US agencies, because he could not be certain the FBI would have undivided responsibility for operations in that region. Only later did Hoover make an attempt to gain control over foreign intelligence operations worldwide, based on the success of the SIS.

"A New Kind of Air Targeting" by William A. Tidwell, Stud. Intel. V11:1-55-60 (Winter 1967) PDF [262.6KB*]
Assessment of tactical intelligence techniques aimed at destroying guerrilla bases in Vietnam (1967).

"New Light on Old Spies: A Review of Recent Soviet Intelligence Revelations" by Olivia Halebian, Stud. Intel. V9:4-77-92 (Fall 1965) PDF [774KB*]
After decades of silence about internal security and denial of foreign espionage, in early 1960s Soviets glorify for domestic propaganda both the GRU and the KGB and its predecessors, concentrating on heroes and successes of the prewar and World War II years.

"A New Source for Figures on Soviet Military Output" by J. F. Freeman, Stud. Intel. V6:2-19-26 (Spring 1962) PDF [405KB*]
An economic analyst reveals a breakthrough in estimating closely-held Soviet military production figures from statistical analysis of open source reports (1962).

Nielsen, Nathan, "The National Intelligence Daily", Stud. Intel. V20:1-39-51 (Spring 1976) PDF [751KB*]

"1944: An Allied Team with the French Resistance" by Robert R. Kehoe, Stud. Intel. Winter 1998/99:15-50, PDF [2.9MB*]
A personal account of the author's selection and training as an ODD Jedburgh radio operator, and a rather detailed account of his activity with French partisans in Brittany behind German lines, June to August 1944.

"The Ninja" by W. M. Trengrouse, Stud. Intel. V9:2-45-52 (Spring 1965) PDF [366KB*]
Espionage exploits of medieval Japanese mystic warrior cult.

No Bugles for Spies by Robert Hayden Alcorn. Book review by Sherman Kent, Stud. Intel. V8:1-A17-A20 (Winter 1964) PDF [169KB*]
Corrections to an administrative officer's reminiscences of life in the OSS, including the R&A Branch and the European Theater, by a senior analyst on the scene.

Nolte, William, "Interviewing an Intelligence Icon", Stud. Intel. Winter/Spring 2001, No. 10:39-47, PDF [1.1MB*]

Nolte, William, "Keeping Pace with the Revolution in Military Affairs", Stud. Intel. V48:1-1-10 (2004) PDF [147.0KB*]

Nolte, William, "Preserving Central Intelligence: Assessment and Evaluation in Support of the DCI", Stud. Intel. V48:3-21-25 (2004) PDF [60.4KB*]

Northridge, A. R., "B-29s Against Coke Ovens",, Stud. Intel. V9:3-25-31 (Summer 1965) PDF [366KB*]

Northridge, A. R, "Pearl Harbor: Estimating Then and Now", Stud. Intel. V9:4-65-74 (Fall 1965) PDF [500KB*]

Northridge, A. R., "The Selectively Reluctant Informant", Stud. Intel. V11:3-107-110 (Summer 1967) PDF [134.3KB*]

"A Note on Casual Intelligence Acquisition" by Amerikanskiy Turist, Stud. Intel. V2:3-71-74 (Summer 1958) PDF [183KB*]
Experienced Russian-speaking operations officer illustrates the potential for acquiring useful intelligence while casually walking the streets of Moscow and other cities in the Soviet Union.

"A Note on KGB Style" by Wayne Lambridge, Stud. Intel. V15:1-115-121 (Winter 1971) PDF [349.3KB*]
KGB internal management methods, habits, and style.

"Notes on 'Capabilities' in National Intelligence" by Abbot E. Smith, Stud. Intel. V1:2-1-18 (Winter 1956) PDF [820KB*]
Borrowing from US military doctrine, defines capabilities as "courses of action within the power of a foreign nation or organization which would, if carried out, affect the security interests of the United States" (1950s).

"Notes on Estimating" by Keith Clark, Stud. Intel. V11:3-55-64 (Summer 1967) PDF [524.5KB*]
An experienced estimator offers observations on short vs. longer estimates, predictive estimating vs. prophecy, and on how estimates had become more sophisticated and responsive to policymakers' needs in the 1960s.

"Notes on Some Aspects of Intelligence Estimates" by Harold D. Kehm, Stud. Intel. V1:2-19-37 (Winter 1956) PDF [875.7KB*]
One of several articles from the mid-1950s that addresses military doctrine on assessing foreign country capabilities and the relative importance of intentions, and that suggests means for adapting the capabilities-intentions doctrine to intelligence estimates generally. See for example, "Notes on 'Capabilities in National Intelligence" by Abbot E. Smith (V1:2-1-18 , PDF [801.1KB*])

"Notes on the Critic System" by William A. Tidwell, Stud. Intel. V4:2-19-23 (Spring 1960) PDF [238KB*]
Review of the origins and early development of the intelligence community's system for rapid early-warning reporting and dissemination

"Notes on the Wennerström Case" by Alexander Mull, Stud. Intel. V10:3-67-76 (Summer 1966) PDF [468KB*]
Account of a Swedish air attaché who spied for the Russians to uncover US and NATO war plans illustrates GRU handling tradecraft (1950s).

"Nothing to Hide" by J. J. Charlevois, Stud. Intel. V9:2-85-88 (Spring 1965) PDF [127KB*]
Benjamin Franklin in Paris in the 1770s dealt with spies on his staff whose competent service he needed by adopting the "counterintelligence doctrine" of never doing anything that would cause embarrassment

"NRO Leadership Replies" by Dennis Fitzgerald, Stud. Intel. Unclass. Ed., V46:4-17-20 (2002) PDF [204.9KB*]
The current (2002) Deputy Director of the NRO rebuts most of the conclusions of the article, "The Decline of the National Reconnaissance Office" (Stud. Intel. Unclass. Ed., V46:2-1-16, PDF [432.6KB*] ), in part on the grounds that the oversight and cost environment in which today's NRO functions make a return to the past impossible.

"Number One From Moscow" by David Kahn, Stud. Intel. V5:4-A15-A28 (Fall 1961) PDF [533.7KB*]
Describes the cipher used to communicate with KGB agent Reino Hayhanen

[Top of page]



O

"Observations on the Double Agent" by F. M. Begoum, Stud. Intel. V6:1-57-72 (Winter 1962) PDF [838KB*]
Detailed advice for case officers on handling a classic but hazardous collection source.

"Obstacle Course for Attachés" by Thomas W. Wolfe, Stud. Intel. V4:3-71-77 (Summer 1960) PDF [389KB*]
First-hand account of the efforts of the Soviets to thwart normal collection through travel and observation by military attachés during the 1950s.

"Of Moles and Molehunters" by Cleveland C. Cram, Stud. Intel. V38:5-129-137 (1995) PDF [713.1KB*]
Reviews many of the books published from 1975 to 1994 on the CIA and British intelligence, focusing particularly on counterintelligence, James Angleton and his belief in massive Soviet penetration of the USG, various Soviet defectors/authors, and British Security Service revelations.

Of Spies and Lies: A CIA Lie Detector Remembers Vietnam by John F. Sullivan. Book review by Ward W. Warren, Stud. Intel. V47:1-79-80 (2003) PDF [93.4KB*]
In the context of a book review, some useful remarks about the use of the polygraph in operations.

Ogle, James V. "The Intelligence of Literature", Stud. Intel. V7:4-23-29 (Fall 1963) PDF [387KB*]

"Okhrana Agent Dolin" by Rita T. Kronenbitter, Stud. Intel. V10:2-57-72 (Spring 1966) PDF [830.7KB*]
Based on Czarist records, describes the exploits of an agent who worked successfully first against revolutionaries in Russia and then during World War I as a double agent within the ranks of German intelligence.

The Okhrana: The Russian Department of Police. A Bibliography by Edward Ellis Smith. Book review by Thomas G. Therkelsen, Stud. Intel. V13:1-93-98 (Winter 1969) PDF [296.3KB*]
A critique of this history of Russia's security-intelligence organization from 1881-1917 that adds stories and background from western sources not included in the book.

"The Okhrana's Female Agents: Part I: Russian Women" by Rita T. Kronenbitter, Stud. Intel. V9:2-25-41 (Spring 1965) PDF [793.8KB*]
Czarist Russia's use of female agents for espionage, including infiltration of revolutionary groups. Although many provided successful service, none rose to the rank of case officer.

"The Okhrana's Female Agents: Part II: Indigenous Recruits" by Rita K. Kronenbitter, Stud. Intel. V9:3-59-78 (Summer 1965) PDF
Non-Russian female agents were motivated mainly by money and switched sides and paymasters often. Part I, on Russian female agents is covered in v0912a04p1//9:2:25-41.

Oldham, Max S. "A Value for Information", Stud. Intel. V12:2-29-36 (Spring 1968) PDF [332KB*]

O'Leary, Cornelius, "Inside the White House Situation Room"
see Donley, Michael, "Inside the White House Situation Room"

Oleson, Peter C.
see Grant, Sam, "Breast Cancer Detection Research"

Olson, James M., "The Ten Commandments of Counterintelligence", Stud. Intel. Fall/Winter 2001, No. 11:81-87, PDF [856.5KB*]

"On Estimating Reactions" by John Whitman, Stud. Intel. V9:3-1-6 (Summer 1965) PDF [292KB*]
Predicting enemy reactions to a postulated US course of action can be a frustrating, thankless task with questionable outcome, but if well done it at least helps the policymaker see the issues and hazards more clearly.

"On Processing Intelligence Information" by Paul A. Borel, Stud. Intel. V3:1-25-35 (Winter 1959) PDF [565KB*]
An early (1959) organizer of CIA's information intake reports on problems and prospects in the pre-dawn of the computer age, when some 1500 intelligence documents (not counting cables) were received, cataloged and disseminated by hand each day. Libraries, microphotography of documents, and a cutting-edge computer, the IBM 704, were the principal assets.

"On the Accuracy of National Intelligence Estimates" by Abbot E. Smith, Stud. Intel. V13:4-25-35 (Fall 1969) PDF [527.1KB*]
A master estimator discusses the difficulties of scoring the accuracy of National Intelligence Estimates and of estimating in general.

"On The Craft of Intelligence" by Frank G. Wisner, Stud. Intel. V8:1-A1-A16 (Winter 1964) PDF [808KB*]
Gentle critique of Allen Dulles' classic, noting its slighting of research, analysis, estimating, and overt collection as intelligence functions.

"On the Front Lines of the Cold War: The Intelligence War in Berlin" by Donald P. Steury, Stud. Intel. Summer 2000, No 9:1-10, PDF [769.1KB*]
Provides the agenda and a brief overview of some of the topics that were covered during a conference in Berlin in September 1999 on intelligence activities in Berlin from the end of World War II to the construction of the Berlin wall. The conference, which was co-hosted by CIA, was attended by over 150 Cold War intelligence veterans, historians, and journalists from the West and from the former Soviet Bloc.

"On the Soviet Nuclear Scent" by Henry S. Lowenhaupt, Stud. Intel. V11:4-13-29 (Fall 1967) PDF [842.1KB*]
An account of how an elaborate US/UK program to trace the activities of German scientists who fled to the Soviet Union after World War II led to an understanding of the early Soviet atomic energy program.

"On the Trail of the Alexandrovsk" by Dwayne Anderson, Stud. Intel. V10:1-39-43 (Winter 1966) PDF [212.5KB*]
Brief account of how analysts attempted to discern, using primarily overhead photography, the purpose of the visit of a Soviet merchant ship to Cuba during the period of the Cuban missile crisis.

"On Warning" by Keith Clark, Stud. Intel. V9:1-15-31 (Winter 1965) PDF [338KB*]
Reflections, in 1965, on the perennial problems of warning analysis regarding political developments, including inherent uncertainty, accelerating change, and the difficult tradeoffs of warning too early and too often vs. neglecting to warn or not gaining the busy policymaker's attention to a warning.

Onate, Benjamin F., "Catch-As-Catch-Can Operations", Stud. Intel. V20:4-27-29 (Winter 1976) PDF [163.9KB*]

"One Officer's Perspective: The Decline of the National Reconnaissance Office" by Robert J. Kohler, Stud. Intel. Unclass. Ed., V46:2-1-16 (2002) PDF [432.6KB*]
Describes, in the author's view, the abolishing of separate Air Force, CIA, and Navy programs within the NRO in the late 1980s contributed to the deterioration of the NRO the point where, in 2002, it is "a shadow of its former self."

"One Woman's Contribution to Social Change at CIA" by Dawn Ellison, Stud. Intel. V46:3-45-53 (2002) PDF [468.7KB*]
Describes the saga of Harriette "Tee" Thompson, a DO female officer who, from 1977 through 1980, undertook to challenge the DO's promotion bias against women, first through the internal EEO process and, later, through the court system. Her victory significantly expanded the opportunity of women to serve at high levels in the DO.

"Openness and Secrecy" by David D. Gries, Stud. Intel. V37:5-33-35 (1994) PDF [475.8KB*]
Discusses the history of secrecy within the USG since the 18th century, its sudden surge with World War II and, then, the Cold War. The end of the Cold War has reduced the need for some secrecy, but the process of reducing classification and declassifying is evolving. Some suggested guidelines are offered.

"Openness and the CIA" by Warren F Kimball, Stud. Intel. Winter/Spring 2001, No. 10:63-67 , PDF [419.9KB*]
University historian and longtime member of State Department declassification program argues that, to ensure democratic accountability, CIA clandestine materials must be declassified after 30 years, with rare exceptions involving a strong case for security damage.

"Openness and the Future of the Clandestine Service" by N. Richard Kinsman, Stud. Intel. Winter/Spring 2001, No. 10:55-61, PDF [553.4KB*]
DO careerist, working since 1997 in declassification program, argues that the legitimate goals of openness must be pursued, but he is greatly concerned that recent developments will undermine the DCI's authority to protect sources and methods, and undermine the clandestine service's effectiveness.

"Operation Columba", T.J. Betts, Stud. Intel. V5:2-A35-A-41 (Spring 1961) PDF [355KB*]
Courier pigeons dropped in occupied Europe proved of no intelligence value but accidentally bolstered invasion deception efforts.

"Operation Portrex" by Edwin L. Sibert, Stud. Intel. V4:2-A1-A9 (Spring 1960) PDF [406KB*]
Author reflects on US wargame exercise (1950, Vieques Island) where he directed and oversaw "enemy" defense force's denial and deception operations against US forces.

"Operation Uproot" by Frantisek Moravic, Stud. Intel. V7:2- A1-A11 (Spring 1963) PDF [607KB*]
Czech military intelligence was able to move substantial assets to London in World War II to help with the Allied war effort because of effective planning by the author in anticipation of the Nazi invasion.

"Operational Contacts" by L. K. Bekrenev,, Stud. Intel. V9:1-63-80 (Winter 1965) PDF [947KB*]
Translation of 1960 Soviet tradecraft manual for residents and case officers on holding meetings with agents. Stresses vigilance and general caution to avoid detection by hostile counterintelligence and blowback of exposure on Soviet foreign policy initiatives.

"The Operational Potential of Subliminal Perception" by Richard Gafford, Stud. Intel. V2:2-65-69 (Spring 1958) PDF [284KB*]
Author argues that the feasibility of using subliminal stimuli as an operational technique is exceedingly limited and prone to failure. Explains four main categories of behavior without awareness.

"Origins, Missions, and Structure of CIA" by Lyman B. Kirkpatrick, Stud. Intel. V2:1-1-5 (Winter 1958) PDF [271KB*]
A brief description of the institutional and legal origins of CIA.

"Origins of Central Intelligence" by Arthur B. Darling, Stud. Intel. V8:3-55-94 (Summer 1964) PDF [2.2MB*]
History of efforts of Gen. Donovan to create a central intelligence organization for the U.S., covering the period 1941 to 1950. Taken from Chapter 1 of the History of the Central Intelligence Agency by the same author.

"The Origins of National Intelligence Estimating" by Ludwell Lee Montague, Stud. Intel. V16:2-63-70 (Spring 1972) PDF [373.8KB*]
The fractious process by which the DCI, in the early postwar period, was able to overcome the objections of State, Army, and Navy to obtain the independent authority and staffing to produce national intelligence estimates, culminating with the establishment of the Office of National Estimates by Bedell Smith in 1950.

"Origins of the Congress for Cultural Freedom, 1949-1950" by Michael Warner, Stud. Intel. V38:5-89-98 (1995) PDF [736.2KB*]
Recounts the spontaneous reaction of anti-communist intellectuals to a 1949 Soviet sponsored anti-western conference in New York, the organization of a counter group, and CIA increased covert support for and involvement in it. Covers the first two years of a 17-year association.

Orleans, Leo A., "The Problem of Chinese Statistics", Stud. Intel. V17:1-47-62 (Spring 1973) PDF [1.1MB*]

Orlov, Alexander, "The Theory and Practice of Soviet Intelligence", Stud. Intel. V7:2-45-65 (Spring 1963) PDF [1.1KB*]

Orlov, Alexander, "The U-2 Program: A Russian Officer Remembers", Stud. Intel. Winter 1998/99:5-14, PDF [818.5KB*]

Ornstein, Jacob, "The Articulation of Babel", Stud. Intel. V4:4-A1-A9 (Fall 1960) PDF [454KB*]

Orr, Kenneth G.,"Training for Overseas Effectiveness", Stud. Intel. V4:4-A11-A21 (Fall 1960) PDF [579KB*]

"The OSS and Italian Partisans in World War II" by Peter Tompkins, Stud. Intel. Spring 1998:95-103, PDF [689.1KB*]
Covers OSS radio and air-supply support to partisan groups in several parts of Italy fighting against the Germans in 1944. Describes these campaigns and the partisan intelligence that was used by allied forces.

"The OSS and Project SAFEHAVEN" by Donald P. Steury, Stud. Intel. Summer 2000, No 9:35-50, PDF [1.3MB*]
Recounts the OSS role (SI–Secret Intelligence and X-2–Counterintelligence) in support of US policy to track, locate, and prevent Nazi postwar control of Germany's gold and other valuable assets in neutral countries as Allied victory approached.

"The OSS and the London 'Free Germans' " by Jonathan S. Gould, Stud. Intel. V46:1-11-29 (2002) PDF [1.0MB*]
In the closing days of World War II, the OSS infiltrated over 200 agents into Nazi Germany. This article relates the story of the recruitment, training, and infiltration of seven exiled German trade unionists, as told by the son of their OSS case officer. Evidence is also presented that this OSS operation was probably penetrated and monitored by the Soviet GRU, working through the notorious Soviet spy, "Sonya."

OSS Reports to the White House, "Memoranda for the President: OSS-NKVD Liaison",, Stud. Intel. V7:3-63-74 (Summer 1963) PDF [565KB*]

OSS Reports to the White House, "Memoranda for the President: Sunrise", Stud. Intel. V7:2-73-98 (Spring 1963) PDF [1.3MB*]

OSS Reports to the White House, "Memorandum for the President: Boston Series", Stud. Intel. V9:1-81-90 (Winter 1965) PDF [451KB*]

OSS Reports to the White House, "Memorandum for the President: From Peter to Tito", Stud. Intel. V9:2-53-84 (Spring 1965) PDF [1.4MB*]

OSS Reports to the White House,"Memoranda for the President: Japanese Feelers", Stud. Intel. V9:3-33-50 (Summer 1965) PDF [790KB*]

OSS: The Secret History of America's First Central Intelligence Agency by R(ichard) Harris Smith. Book review by Sherman Kent., Stud. Intel. V17:1-71-79 (Spring 1973) PDF [629.7KB*]
Kent lambastes this book as "wanting in most of the attributes of quality." He comments extensively on the sources the author used, points out many errors, and outlines what he thinks it would take to write a good history of the Office of Strategic Services (OSS).

Ostensoe, James G., "The Problem of Scientific Surprise", Stud. Intel. V5:4-15-20 (Fall 1961) PDF [317KB*]

"Oversight or Overlook: Congress and the U.S. Intelligence Agencies" by Lucien N. Nedzi (D-Mich), Stud. Intel. V18:2-15-20 (Summer 1974) PDF [293.1KB*]
The HIPSCI Chairman describes Congress' past "overlook" of intelligence activities and the reasons and need for real oversight in the future (1974).

Overton, David W., "Taking Care of Business", Stud. Intel. V37:4-25-31 (1994) PDF [1.1MB*]

Overton, David W., "The DI 10 Years After the Reorganization, Stud. Intel. V36:5-45-54 (1992) PDF [1.4MB*]

"The Oxcart Story" by Thomas P. McIninch, Stud. Intel. V15:1-1-25 (Winter 1971) PDF [1.8KB*]
History of the conception, development, testing and deployment of the OXCART (SR-71 reconnaissance aircraft) from 1957-1968.

[Top of page]



P

"The Panther's Feast" by Robert Asprey. Book review by Anonymous, Stud. Intel. V4:2-A43-A47 (Spring 1960) PDF [177KB*]
Reviewer takes to task author's error-ridden fictionalized account of Russian spy Colonel Alfred Redl. In so doing, the reviewer adds much information and insight about the actual case history of the Redl's motivation and manipulation abilities to achieve desired ends.

Pappas, Aris A., "The Intelligence Community: 2001-2015", Stud. Intel. V46:1-39-47 (2002) PDF [463.3KB*]

"Paris Okhrana 1885-1905" by Rita T. Kronenbitter, Stud. Intel. V10:3-55-66 (Summer 1966) PDF [591.9KB*]
Based on Czarist records, describes operations of the Paris "Station," the main West European center for countering Russian revolutionaries and separatist movements.

"Paris Okhrana: Final Phase" by Rita T. Kronenbitter, Stud. Intel. V12:3-65-78 (Summer 1968) PDF [728.6KB*]
Completes the author's earlier work on the Paris office of Okhrana (V10:3-55-66, PDF [591.9KB*] and V11:1-71-86, PDF [830.7KB*]), covering its activities from 1909 through 1917.

Patton, Thomas J., "A Personal Perspective", Stud. Intel. V46:3-81-83 (2002) PDF [122.6KB*]

Patton, Thomas J., "The Monitoring of War Indicators", Stud. Intel. V3:1-55-68 (Winter 1959) PDF [749KB*]

"Paul Wolfowitz on Intelligence-Policy Relations" by Jack Davis, Stud. Intel. V39:5-35-42 (1996) PDF [561.6KB*]
Wolfowitz, Under Secretary of Defense during the Gulf War (later, Deputy Secretary) avers the main contribution of intelligence analysis is to help policy officials manage substantive uncertainty by developing well-structured depictions of alternative developments, including longshot dangers and opportunities.

Paumier, Alfred, "Inside Darkest John" (Communication to the Editor), Stud. Intel. V5:2-45-50 (Spring 1961) PDF [344KB*]

Peake, Cyrus H., "History's Role in Intelligence Estimating", Stud. Intel. V3:1-85-91 (Winter 1959) PDF [353KB*]

Peake, Hayden B. Book review of Fixing Intelligence: For A More Secure America, Stud. Intel. V48:2-63-65 (2004) PDF [29.9KB*]

"Pearl Harbor: Estimating Then and Now" by A. R. Northridge, Stud. Intel. V9:4-65-74 (Fall 1965) PDF [500KB*]
An examination of the "national stereotypes" that contributed to US misreading of Japanese intentions and capabilities

Pearl Harbor: Warning and Decision by Roberta Wohlstetter. Book review by Lyman A. Kirkpatrick, Stud. Intel. V7:3-119-122 (Summer 1963) PDF [201KB*]
Classic 1962 study of 1941 intelligence failure points to lack of coordination of collected information, biases about enemy intentions, effective denial and deception, and excessive secrecy as bases for strategic surprise.

Pearse, Ralph S., "What Size is It?", Stud. Intel. V15:1-53-65 (Winter 1971) PDF [792.2KB*]

Pechan, Bruce L., "The Collector's Role in Evaluation", Stud. Intel. V5:3-37-47 (Summer 1961) PDF [565KB*]

Peers, W. R., "Intelligence Operations of OSS Detachment 101", Stud. Intel. V4:3-A1-A13 (Summer 1960) PDF [624KB*]

Pekel, Kent, "Integrity, Ethics, and the CIA", Stud. Intel. Spring 1998:85--93, PDF [709.6KB*]

"Periodic Reports by Industrial Groups as Sources of Intelligence Information" by Charles H. Helsper, Stud. Intel. V2:2-47-52 (Spring 1958) PDF [317KB*]
Urges exploitation of corporate reports primarily for valuable information on market economies and information on relations with Communist countries as well.

"A Personal Perspective" by Thomas J. Patton, Stud. Intel. V46:3-81-83 (2002) PDF [122.6KB*]
Calls the publishing of the article, "Two Strategic Intelligence Mistakes in Korea, 1950" in Studies in Intelligence (Stud. Intel. Fall/Winter 2001, No. 11:57-65 PDF [1.2MB*]) a disservice to the Agency, because it did not put the events into an appropriate context. In particular, describes how limited the information flow was to analysts in the early 1950s and notes the original article never mentions the intelligence sent to the President in the Situation Summary (SitSum), the first all-source weekly published by the Intelligence Community.

"Personal Reflections on Bill Casey's Last Month at CIA" by James McCullough, Stud. Intel. V39:5-75-91 (1996) PDF [1.4MB*]
The DCI's ensnarement in the Iran-Contra controversy during the months in which he is overcome by a brain tumor (November 1986-January 1987).

Petchell, Robert A., "Cash on Delivery", Stud. Intel. V17:3-1-7 (Fall 1973) PDF [407.8KB*]

Petersen, Martin, "The Challenge for the Political Analyst", Stud. Intel. V47:1-51-56 (2003) PDF [324.3KB*]

Peterson, John F.
see Zabetakis, Stanley G., "The Diyarbkir Radar"

Petro, James B., "Intelligence Support to the Life Science Community: Mitigating Threats from Bioterrorism", Stud. Intel. V48:3-57-68 (2004) PDF [2.3MB*]

Pforzheimer, Walter. Book review of The Shadow War: European Resistance 1939-1945 by Henri Michel, Stud. Intel. V19:2-39-42 (Summer 1975) PDF [205.8KB*]

Pforzheimer, Walter, "In Memoriam", Stud. Intel. V5:4-A1-A13 (Fall 1961) PDF [404.1KB*]

Pforzheimer, Walter, "Postwar Soviet Espionage -- a Bibliography", Stud. Intel. V6:2-A35-A47 (Spring 1962) PDF [528KB*]

Pforzheimer, Walter, "Public Texts in Intelligence", Stud. Intel. V5:2-A51-A60 (Spring 1961) PDF [466KB*]

"The Pike Committee Investigations and the CIA" by Gerald K. Haines, Stud. Intel. Winter 1998/99:81-92, PDF [940.6KB*]
An account of the monumental struggle between the House Select Committee chaired by Representative Pike and the Ford administration (including CIA), and of the highly critical report it issued (1976).

Pineau, Roger. Book review of The Codebreakers: The Story of Secret Writing by David Kahn, Stud. Intel. V12:3-99-105 (Summer 1968) PDF [332.5KB*]

"The Pitfall of a Latin Quirk" by M. E. O. Gravalos, Stud. Intel. V7:4-31-32 (Fall 1963) PDF [104KB*]
A warning to analysts and collectors to exercise caution in accepting alarming statements by Latin American sources. They may be indulging in a cultural tendency to state hopes as facts.

"Pitfalls of Civilian Cover" by A. S. Rogov, Stud. Intel. V8:3-17-33 (Summer 1964) PDF [979KB*]
Training manual (1961) of Soviet military intelligence (GRU) which seeks to improve tradecraft for use of official civilian cover by examining the mistakes by case officers and headquarters that increase vulnerability to counterintelligence.

"Planning Satellite Reconnaissance To Support Future Military Operations" by Thomas Behling and Kenneth McGruther, Stud. Intel. Winter 1998/99:113-121, PDF [751.2KB*]
Describes the ideal military requirements for imagery intelligence at a tactical and command level, current limited capabilities in that area, problems in Intelligence Community/military coordination, equipment design and defense, and suggests some steps to be taken.

"Platt's Law" by Anonymous, Stud. Intel. V13:4-89-90 (Fall 1969) PDF [54.9KB*]
Observations on the peculiarities of the review process go back to the Agency's earliest days.

Poirier, Robert G.
see Brugioni, Dino A., "The Holocaust Revisited: A Retrospective Analysis of the Auschwitz-Birkenau Extermination Complex"

Polgar, Thomas, "Assignment: Skyjacker", Stud. Intel. V16:3-53-63 (Fall 1972) PDF [486.5KB*]

"Policing a Nuclear Test Ban" by Herbert Scoville, Jr., Stud. Intel. V3:1-1-12 (Winter 1959) PDF [657KB*]
Account of East-West conference in Geneva (1958) on methods of detecting violations of nuclear tests. Describes negotiating tactics and concessions on both sides to reach agreement on number of technical means to detect nuclear events. Author concludes that Soviets were more serious than the West in monitoring small-yield nuclear tests.

"Policy Bias" by Janet Hill Merkle, Stud. Intel. V7:1-55-59 (Winter 1963) PDF [273KB*]
Case study pinpointing analytical biases apparently influenced by announced policy goals.

"Policy Bias" by Joanne Curtis [Communication to the Editors], Stud. Intel. V7:3-109-112 (Summer 1963) PDF [179KB*]
Response to "Policy Bias" (V7:1-55-59, PDF [273KB*]), stating that the criticism of an INR piece cited in the article as "biased" in support of policy is misplaced. The letter argues the piece was correctly written to respond to a policymaker's need but was not colored to support policy.

"A Policymaker's Perspective on Intelligence Analysis" by Jack Davis, Stud. Intel. V38:5-7-15 (1995) PDF [611.3KB*]
In this interview, Ambassador Robert Blackwill comments on the service provided him by Agency analysts during his time as Senior Director for European and Soviet Affairs on the National Security Council staff (1989-1990). Of particular merit are his observations on how analysts can be most helpful to senior policymakers.

"The Pond: Running Agents for State, War, and the CIA" by Mark Stout, Stud. Intel. V48:3-69-82 (2004) PDF [189.2KB*]
This is a sketchy history of a semi-private US intelligence organization, known as "the Pond," which was created and run for 13 years (1942-1954) by a mysterious figure named John Grombach. Originally began as a secret intelligence collection organization within the Army G-2 as a counterweight to the OSS, Grombach managed to find sponsorship for the Pond from State Department and, ultimately, CIA until it was finally disbanded in 1954.

"Porthole to the West" by Inquirer, Stud. Intel. V6:2-A21-A33 (Spring 1962) PDF [689KB*]
Recounts several cases histories of Soviet and East Bloc intelligence operations run from East Berlin.

"Portrait of a Cuban Refugee" by Andrew Wixson, Stud. Intel. V8:3-35-41 (Summer 1964) PDF [365KB*]
Generalizes about the psychological make-up of Cuban men and women, with an eye to helping recruit and handle them as agents.

The Portuguese Connection by Air Commodore Roland Eugene Vintras. Book review by Lt. Gen Vernon A. Walters, Stud. Intel. V18:4-59-60 (Winter 1974) PDF [123.0KB*]
Disputes the book's Anglo-centric account of the wooing of the Portuguese government during World War II to gain Azores base rights, showing the extent to which the US influenced Portuguese thinking.

"Postal Forgeries in Two World Wars", by Gordon Torrey and Donald Avery, Stud. Intel. V4:3-57-69 (Summer 1960) PDF [606KB*]
Historical synopsis (World War I & II) of the use of postal forgeries--primarily by the Allied forces (including OSS) for use in psychological warfare programs.

"Postwar Soviet Espionage - a Bibliography" by Walter Pforzheimer, Stud. Intel. V6:2-A35-A47 (Spring 1962) PDF [528KB*]
A bibliography indexed by country and cases, 1945-1961

"The Practice of a Prophet" by Inquirer, Stud. Intel. V6:4-A29-A41 (Fall 1962) PDF [722KB*]
Describes the recruitment, training, and handling of a Swedish naval NCO by the Soviet GRU from 1949-1951. Also covers how he was detected and wrapped up.

"The Prediction of Soviet Intentions" by Robert M. Gates, Stud. Intel. V17:1-39-46 (Spring 1973) PDF [500.3KB*]
Evaluates DI record on analyzing correctly Soviet intentions as "not particularly distinguished," provides reasons for uneven performance, and offers remedies. Written when DDI Gates was a Soviet analyst.

"Preface to a Theory of Intelligence" by Lawrence T. Mitelman, Stud. Intel. V18:3-19-22 (Fall 1974) PDF [280.4KB*]
Establishment in 1974 of the Center for the Study of Intelligence was intended to foster development of theories based on patterns and general lessons learned from CIA and community experience, an area of professional development the author believed had atrophied since Kent's Strategic Intelligence (1949).

"Preserving Central Intelligence: Assessment and Evaluation in Support of the DCI" by William Nolte, Stud. Intel. V48:3-21-25 (2004) PDF [60.4KB*]
Proposes that the DCI create a formal mechanism for producing evaluative after-action assessments of how well the Intelligence Community (IC) performed on high profile intelligence issues. This unit could also support him with prospective assessments on how well prepared the IC is to deal with likely upcoming issues.

"Presidential Transition" (Letters to the editor) by Samuel J. Watson, Stud. Intel. Summer 2000, No 9:105-107, PDF [180KB*]
Chief of Staff of the Reagan/Bush transition team for DCI Casey explains the transition team's purposes and operations.

Pribbenow, Merle L., "The Man in the Snow White Cell", Stud. Intel. V48:1-45-58 (2004) PDF [283.8KB*]

"Pricing Soviet Military Exports" by Milton Kovner, Stud. Intel. V12:2-37-42 (Spring 1968) PDF [311.2KB*]
Describes methods used for, and problems inherent in, deriving prices for Soviet military exports to developing countries.

"Priority National Intelligence Objectives" by Ludwell L. Montague, Stud. Intel. V5:2-1-8 (Spring 1961) PDF [452KB*]
Description of the origins of the Priority National Intelligence Objectives (PNIOs) process, the reasons for them, their value, and the problems with the process (as of 1961).

"The Problem of Chinese Statistics" by Leo A. Orleans, Stud. Intel. V17:1-47-62 (Spring 1973) PDF [1.1MB*]
Assesses the state of statistics keeping in China (very poor from a Western point-of-view) and provides a well presented argument as to why that is, based on cultural, philosophical, political, and bureaucratic reasons.

"The Problem of Scientific Surprise" by James G. Ostensoe, Stud. Intel. V5:4-15-20 (Fall 1961) PDF [317KB*]
Assessment of the measures taken in mid-1950s to reduce the likelihood of a scientific surprise by the USSR, including benefits and limits of predictive efforts.

"The Progress of Pinyin" by J.N. Wong, Stud. Intel. V5:1-A35-A52 (Winter 1961) PDF [828KB*]
Status report (1961) on the Chinese Communist latinization of Chinese, including implications for intelligence analysis.

"Prospects for a European Common Intelligence Policy" by Ole R. Villadsen, Stud. Intel. Summer 2000, No 9:81-95, PDF [1.1MB*]
Explores the question of to what extent Europe is moving toward a common intelligence policy and the institutions to implement one, and the the incentives and constraints for doing so.

Prunko, Donald H., "Recruitment in Moscow", Stud. Intel. V13:2-87-106 (Spring 1969) PDF [951.2KB*]

"Psywar by Forgery" by Alma Fryxell, Stud. Intel. V5:1-25-51 (Winter 1961) PDF [1.6MB*]
Dated (1950s) catalog of mostly Soviet Bloc forgeries of correspondence and other documents designed as propaganda to sow dissension abroad.

"Psywar in Intelligence Operations", John Brockmiller, Stud. Intel. V5:3-49-55 (Summer 1961) PDF [413KB*]
How propaganda and political action operations can be byproducts of intelligence operations and and sometimes provide intelligence.

"Public Texts in Intelligence" by Anonymous, Stud. Intel. V8:1-A31-A42 (Winter 1964) PDF [543KB*]
Annotated bibliography of books on intelligence, prepared in the early 1960s, probably by Historical Intelligence Collection curator Walter Pfortzheimer.
Brief annotations of books available in English judged to be of interest to intelligence professionals (1961).

"Public Texts in Intelligence" by Walter Pforzheimer, Stud. Intel. V5:2-A51-A60 (Spring 1961) PDF [466KB*]
Survey of intelligence literature published in the 1950s, including both World War II and early post-war coverage.

Puchalla, Edward F., "Communist Defense Against Aerial Surveillance in Southeast Asia", Stud. Intel. V14:2-31-78 (Fall 1970) PDF [3.2MB*]

Puderbaugh, Richard T., "Elegant Writing – Report Number Two", Stud. Intel. V17:2-33-37 (Summer 1973) PDF [239.1KB*]

Puderbaugh, Richard T., "Elegant Writing in the Clandestine Services", Stud. Intel. V16:1-1-7 (Special Edition 1972) PDF [292.4KB*]

Pughe, George A., "The Dust That Isn't There", Stud. Intel. V2:2-71-74 (Spring 1958) PDF [218KB*]

[Top of page]



Q

"Quality ELINT" by William H. Nance, Stud. Intel. V12:2-7-19 (Spring 1968) PDF [677.2KB*]
Describes a unique Office of ELINT program to develop and deploy a capability to measure accurately the radiated power of radars (primarily Soviet) as an aid to developing countermeasures (1960s).

"Questions, Questions, Questions" by Arnold M. Silver, Stud. Intel. V37:5-81-90 (1994) PDF [1.6MB*]
A rambling but interesting description of the work of the Oberursel refugee/defector interrogation center near Frankfurt from 1945-1948. Counterintelligence, interrogation, and management issues discussed.

Quibble, Anthony, "Alias George Wood", Stud. Intel. V10:1-69-96 (Winter 1966) PDF [1.1MB*]

Quibble, Anthony, "Roderick 'Steve' Hall", Stud. Intel. V11:4-45-78 (Fall 1967) PDF [1.7MB*]

Quibble, Anthony, "Study in Indications Methodology" [Communications to the Editors], Stud. Intel. V7:4-65-66 (Fall 1963) PDF [85KB*]

Quibble, Anthony, "The Eastern Front at the Turning Point", Stud. Intel. V6:4-A15-A28 (Fall 1962) PDF [715KB*]

Quintanilla, Hector Jr., "The Investigation of UFO's", Stud. Intel. V10:4-95-110 (Fall 1966) PDF [765KB*]

[Top of page]



R

"R&D for Intelligence Processing" by CODIB Task Team VI, Stud. Intel. V10:2-43-55 (Spring 1966) PDF [673.8KB*]
Task force report regarding the need to establish an Intelligence Community R&D program for intelligence data handling. Concludes Intelligence Community is seriously deficient in modern data handling capabilities and that a broad R&D program, established under USIB, is required to remedy this deficiency.

Ramsey, Diane M. "A Study in Indications Methodology", Stud. Intel. V7:3-75-94 (Summer 1963) PDF [892KB*]

Random, R. A., "Intelligence as a Science", Stud. Intel. V2:2-75-79 (Spring 1958) PDF [286KB*]

"Re-examining Our Perceptions on Vietnam" by Anthony Marc Lewis, Stud. Intel. V17:4-1-62 (Winter 1973) PDF [4.2MB*]
Scholarly essay ascribing cultural misperceptions and mirror imaging among intelligence analysts and policymakers as the cause of US misunderstandings and policy failures in Vietnam.

"Recollections of a Case Officer in Laos, 1962-1964" by Richard L. Holm, Stud. Intel. V47:1-1-17 (2003) PDF [922.2KB*]
The author remembers fondly his first tour abroad as a paramilitary case officer, supporting operations in Laos against the Pathet Lao and the North Vietnamese (VC). Describes how operations were set up to monitor and report on VC traffic on the Ho Chi Minh trail. Speaks sadly of how US policies ultimately led to the destruction of the tribes he worked with, particularly the Hmong.

"Recollections of the Church Committee's Investigation of NSA" by Britt L. Snider, Stud. Intel. Winter 1999/2000:43-51, PDF [699.8KB*]
Discovery and curbing of project SHAMROCK, a closely-held World War II Army program inherited by NSA in 1952, under which NSA was given access to all international telegrams sent from the United States, allowing for the private communications of US citizens to be processed for intelligence information.

"Recruitment in Moscow" by Donald H. Prunko, Stud. Intel. V13:2-87-106 (Spring 1969) PDF [951.2KB*]
Blow by blow recruitment by the KGB of a European embassy female clerical stationed in Moscow circa 1961 and subsequent inept handling abroad. Use of lovers, threats of exposure, appeals to good living and self-esteem described in detail.

Reflections of a Cold Warrior: From Yalta to the Bay of Pigs by Richard M. Bissell Jr. Book review by H. Bradford Westerfield, Stud. Intel. Winter 1998/99:103-111, PDF [645.6KB*]
Critiques Bissell's memoir as interesting but flawed in the way it was written. Speculates that refusal of those planning the Bay of Pigs invasion to remain realistic about its declining chances of success may have rested on belief that Castro was to be assassinated at time of invasion.

"Reflections on Mail Order Tradecraft" by Jon A. Wiant, Stud. Intel. V37:5-59-61 (1994) PDF [395.4KB*]
Motivating backcountry Vietnamese agents with Sears catalogue prizes.

"Reichsführer Himmler Pitches Washington" by John H. Waller, Stud. Intel. V46:1-31-38 (2002) PDF [455.5KB*]
Describes Himmler's unsuccessful efforts to persuade the US, through OSS channels, that he would be willing to overthrow Hitler if the US and Great Britain agreed to make a common front with a Himmler-led Germany against the Soviet Union. Speculates that General Donovan ordered a cut off of contact with Himmler's emissaries too soon, because encouragement of Himmler's intrigue might have led to the discovery of his disloyalty by Hitler and created additional chaos among Nazi Germany's leaders.

Reiser, Donald, "Microtechnology", Stud. Intel. V12:4-23-38 (Fall 1968) PDF [1.3MB*]

"Reminiscences of a Communications Agent" by Expatriate, Stud. Intel. V2:4-55-60 (Fall 1958) PDF [278KB*]
Tutorial on covert communications and secret message handling techniques used by expatriate British agent stationed behind enemy lines in World War II.

"Report on Hungarian Refugees" by Guy E. Coriden, Stud. Intel. V2:1-85-93 (Winter 1958) PDF [492KB*]
Describes the US government organization and effort from 1956 to 1958 to interview and extract intelligence from refugees from the 1956 Hungarian revolution who came to the US. Focuses on the problems involved in screening 35,000 refugees, the procedures developed, and CIA's role in the effort.

"Research Intelligence in Early Modern England" by William H. Sherman, Stud. Intel. V37:5-95-104 (1994) PDF [612.5KB*]
Argues that Donovan's recruiting of scholars into the OSS to provide intelligence-focused research was not the first time in history scholars had been employed in this fashion. Compares this with the use of scholars in 16th and 17th century England, when they frequently provided policy-oriented research to support decisionmaking by, for example, highly placed Elizabethan government officials.

"A Review of Congressional Oversight" by James S. Van Wagenen, Stud. Intel. Semiannual Ed., No. 1, 1997: 97-102, PDF [476.2KB*]
Chronicles the evolution of the oversight committees since 1976, their relationships with the Iintelligence Community and White House, the laws enacted, and their role up to 1996.

"Richard Helms: The Intelligence Professional Personified" by David S. Robarge, Stud. Intel. V46:4-35-43 (2002) PDF [520.3KB*]
After a brief review of his career up to being appointed DCI in 1966, the author summarizes Helms' "credo," his style as Director, and the difficulties he faced in his last years as DCI as the Agency came under increasing public and congressional attack.

Riffice, Albert E., "Intelligence and Covert Action", Stud. Intel. V6:1-73-80 (Winter 1962) PDF [404KB*]

Riposte, Ralph, "New Anachronism", Stud. Intel. V2:3-43-44 (Summer 1958) PDF [111KB*]

Robarge, David S., "Richard Helms: The Intelligence Professional Personified", Stud. Intel. V46:4-35-43 (2002) PDF [520.3KB*]

Robarge, John. Book review of Lost Crusader: The Secret Wars of CIA Director William Colby by John Prados, Stud. Intel. V47:4-77-82 (2003) PDF [50.0KB*]

"Robert Fulton's Skyhook and Operation Coldfeet" by William M. Leary, Stud. Intel. V38:5-99-109 (1995) PDF [746.0KB*]
Describes the development and use of a fly-by person and object retrieval system.

Robinson, Sheryl, "The Gulf War from Tel Aviv", Stud. Intel. V36:5-1-3 (1992) PDF [358.5KB*]

"Roderick 'Steve' Hall" by Anthony Quibble, Stud. Intel. V11:4-45-78 (Fall 1967) PDF [1.7MB*]
Documentary history of an OSS officer's mission to and in support of Northern Italian partisans, their sabotage operations, his capture and execution by the German SS.

Rogov, A. S., "Pitfalls of Civilian Cover", Stud. Intel. V8:3-17-33 (Summer 1964) PDF [979KB*]

"The Role of Interindustry studies in Economic Intelligence" by Robert Loring Allen, Stud. Intel. V1:4-97-117 (Fall 1957) PDF [1.1MB*]
Primer on the economic research technique popularly known as "input-output analysis," used to measure the Soviet economy during the 1950s and 1960s.

"The Role of the Consultant in Intelligence Estimates" by Joseph R. Strayer, Stud. Intel. V2:4-1-5 (Fall 1958) PDF [264KB*]
The value of the academic consultant as generalist as opposed to specialist, who is positioned better to challenge assumptions and see discontinuities in events.

"The Role of US Army Military Attachés between the World Wars" by Scott A. Koch, Stud. Intel. V38:5-111-115 (1995) PDF [368.2KB*]
Describes how poor was the selection process, training, and quality of reporting of Army attachés before World War II, and how little the information they supplied was used by Army Headquarters. Also states that attaché reporting was not especially valued during World War II.

" 'Rolling Thunder' and Bomb Damage to Bridges" by Kenneth C. Fuller, Bruce Smith, and Merle Atkins, Stud. Intel. V13:4-1-9 (Fall 1969) PDF [479KB*]
How CIA economic analysts developed criteria and procedures for assessing the success (and ultimate failure) of the US program to interdict North Vietnamese transport facilities (after Air Force assessments showed ten times as many bridges destroyed as had originally existed). The techniques used would be useful for bomb damage assessments in other underdeveloped countries.

Romano, George, "Coexistence and Covert Collection", Stud. Intel. V2:2-53-58 (Spring 1958) PDF [316KB*]

Romig, Walter W., "Spy Mission to Montana", Stud. Intel. V11:3-77-84 (Summer 1967) PDF [443.2KB*]

"Ronald Reagan and the President's Daily Brief" by Richard J. Kerr and Peter Dixon Davis, Stud. Intel. Winter 1998/99:51-56, PDF [462.2KB*]
How the DI organized to brief Ronald Reagan as president-elect and how the good relationships thereby established with him and his staff paid off after he was President.

Rose, P. K., "The Civil War: Black American Contributions to Union Intelligence", Stud. Intel. Winter 1998/99:73-80, PDF [636.2KB*]

Rose, P. K., "Two Strategic Intelligence Mistakes in Korea, 1950", Stud. Intel. Fall/Winter 2001, No. 11:57-65, PDF [1.2MB*]

Rostow, W. W., "The Beginnings of Air Targeting", Stud. Intel. V7:1-A1-A24 (Winter 1963) PDF [1.3MB*]

Rostow, W. W., "Waging Economic Warfare from London", Stud. Intel. V36:5-73-79 (1992) PDF [970.2KB*]

"The Rote Drei: Getting Behind The 'Lucy' Myth" by Mark A. Tittenhofer, Stud. Intel. V13:3-51-90 (Summer 1969) PDF [1.9MB*]
Story of the Soviet intelligence net in Switzerland, "Rote Drei" (1941-1944), based largely on intercepted messages from and to the net.

Rothenberg, Herbert C., "Identifying the Future Threat", Stud. Intel. V12:4-13-21 (Fall 1968) PDF [585.1KB*]

Royden, Barry G., "Tolkachev, A Worthy Successor to Penkovsky", Stud. Intel. V47:3-5-33 (2003) PDF [1.7MB*]

"Rubles Versus Dollars" by Rush V. Greenslade, Stud. Intel. V6:1-1-11 (Winter 1962) PDF [673KB*]
Explanation of advantages and limitations of methodology of using a ruble-dollar geometric mean for comparing the overall value of US and USSR economic output--a major challenge to economic analysis in the 1960s.

Ruffner, Kevin C., "CIA's Support to the Nazi War Criminal Investigations", Stud. Intel. Semiannual Ed., No. 1, 1997: 103-109, PDF [578.1KB*]

Ruffner, Kevin C., "CORONA and the Intelligence Community", Stud. Intel. V39:5-61-69 (1996) PDF [1013.3MB*]

Rundquist, E. A., "The Assessment of Graphology", Stud. Intel. V3:3-45-51 (Summer 1959) PDF [342KB*]

Rush, Myron, "A Neglected Source of Evidence", Stud. Intel. V2:3-117-125 (Summer 1958) PDF [454KB*]

[Top of page]



S

Sacquety, Troy J., "Behind the Japanese Lines in Burma", Stud. Intel. Fall/Winter 2001, No. 11:67-79, PDF [1.6MB*]

"Safeguarding Information Operations (U)" by Stephen W. Magnan, Stud. Intel. Summer 2000, No 9:97-109, PDF [591.9KB*]
Argues that the main vulnerability of US information systems, both government and commercial, to offensive information warfare is the failure of human operators to practice good operations security (OPSEC). Provides examples of these failures and calls for more senior level attention to the problem, and more and better training for workers.

"Sailing the Sea of OSINT in the Information Age" by Stephen C. Mercado, Stud. Intel. V48:3-45-55 (2004) PDF [1351.9KB*]
Using North Korea example, argues that more directly useful open source intelligence (OSINT) is available than ever before but that the US Intelligence Community is not adequately exploiting this important source. Lack of understanding of value of OSINT is compounded by shortage of necessary language and area expertise. Recommends remedies.

Sailor in a Russian Frame by Cdr. Anthony Courtney. Book review by R. H. Sheepshanks, Stud. Intel. V13:1-87-92 (Winter 1969) PDF [294.5KB*]
Outlines Courtney's book on Soviet attempts to blackmail and recruit him and, failing that, to expose him in 1965.

"The SAM Upgrade Blues" by Sayre Stevens, Stud. Intel. V18:2-21-35 (Summer 1974) PDF [971.7KB*]
Anecdotal account of how CIA S&T analysts were forced to play Devil's advocate for politically-influenced arms control negotiators, analyzing an imaginary threat rather then the most likely one in order to satisfy the policymakers' concerns about low-probability, high-impact outcomes.

Samford, Lt. Gen. John A., "The Intelligence Necessary to the Formulation of a Sound Strategy", Stud. Intel. V1:4-1-9 (Fall 1957) PDF [433KB*]

"The San Cristobal Trapezoid" by John T. Hughes with A. Denis Clift, Stud. Intel. Special Unclass. Ed., Fall 2000:149-165, PDF [1.3MB*]
A lead photointerpreter provides a detailed account of the photointelligence and analysis that discovered long-range, offensive Soviet missiles in Cuba in 1962, tracked Soviet preparations for making them operational, and monitored their removal at the conclusion of the Cuban missile crisis.

Sapp, Edwin Greenlaw, "Decision Trees", Stud. Intel. V18:4-45-57 (Winter 1974) PDF [618.9KB*]

Schilling, Frederick K. Book review of Fran Borjan Tel Slutet: En Spions Memoarer by Stig Wennerstrom, Stud. Intel. V18:3-33-35 (Fall 1974) PDF [191.1KB*]

Schnell, Jane, "Snapshots at Random", Stud. Intel. V5:2-17-23 (Summer 1961) PDF [372KB*]

Schreckengost, R. C., "Some Limitations in Systems Analysis in Intelligence Activities", Stud. Intel. V14:2-79-86 (Fall 1970) PDF [390.7KB*]

Schroeder, Gertrude, "Soviet Reality Sans Potemkin", Stud. Intel. V12:2-43-51 (Spring 1968) PDF [486.2KB*]

Schweitzer, Nicholas, "Bayesian Analysis for Intelligence: Some Focus on the Middle East", Stud. Intel. V20:2-31-44 (Summer 1976) PDF [756.6KB*]

"The Science Attaché Program" by Wilton Lexow, Stud. Intel. V10:2-21-27 (Spring 1966) PDF [310.1KB*]
As of the mid-1960s, the intelligence benefits of the program were limited by the attachés' focus on exchange of views over collection and by lack of posting to Communist countries.

"The Scientific and Cultural Exchange" by James McGrath, Stud. Intel. V7:1-25-30 (Winter 1963) PDF [349KB*]
Argues that Soviet gains in information on weapons technology and other advantages they acquire from the exchange program are largely balanced the achievement of US goals (e.g., "opening" the USSR) and can be minimized by intelligence calculations of US vulnerability to losses and other security-based limitations on Soviet visits.

"Scientific and Technical Intelligence Analysis" by Robert M. Clark, Stud. Intel. V19:1-39-48 (Spring 1975) PDF [568.3KB*]
Challenges to S&T analysis of enemy weapons development and precepts for overcoming them were the same in CIA in the 1970s as those facing R. V. Jones, father of British World War II S&T analysis, including need for openmindedness.

"Scientific Estimating" by Wayne Jackson, Stud. Intel. V9:3-7-11 (Summer 1965) PDF [217KB*]
How scientists and engineers can inadvertently contribute to questionable worst case estimates by letting theoretical potentialities appear to be concrete possibilities.

"Scientific Intelligence" by Reginald V. Jones, Stud. Intel. V6:3-55-76 (Summer 1962) PDF [996KB*]
The "father of scientific intelligence" (and master storyteller) describes how putting scientific collection and analysis under one head (himself) successfully anticipated and thwarted all of Hitler's secret weapons. Value of PHOTINT followed up by agent reporting described.

"The Scientific Intelligencer" by R. V. Jones, Stud. Intel. V6:4-37-48 (Fall 1962) PDF [551KB*]
The "father of scientific intelligence" philosophizes on the application of scientific methods to intelligence collection and analysis.

"Scooping the Soviet Press" by John Chandlee, Stud. Intel. V6:1-23-27 (Winter 1962) PDF [264KB*]
A veteran FBIS officer recounts how a valuable semi-open source was jeopardized by a Presidential press release.

Scott, William F. "The Face of Moscow in the Missile Crisis", Stud. Intel. V10:2-29-36(Spring 1966) PDF [393.6KB*]

Scoville, Herbert Jr., "Policing a Nuclear Test Ban", Stud. Intel. V3:1-1-12 (Winter 1959) PDF [657KB*]

Scrutchings, Edward
see Maximov, William J., "The Metal Traces Test"

"Secrecy and Intelligence in a Free Society" by James E. Knott, Stud. Intel. V19:2-1-8 (Summer 1975) PDF [469.9KB*]
Suggests a new structure for the oversight of classification, intelligence production, and clandestine operations in the intelligence community. Calls for a redefinition of secrecy, Congressional oversight, executive oversight, reducing Agency secrecy, and procedures for promoting change and flexibility,

The Secret Road to World War Two: Soviet Versus Western Intelligence, 1921-1939 by Paul W. Blackstock. Book review by Anonymous, Stud. Intel. V14:1-113-126 (Spring 1970) PDF [657.6KB*]
Focusing on the book's accounts of Soviet intelligence activities in the period, the reviewer corrects and adds to the book's comments, particularly concerning Soviet deception operations.

"Secrets, Free Speech, and Fig Leaves" by John Hollister Hedley, Stud. Intel. Spring 1998:75-83, PDF [727.0KB*]
Describes the origins and mandate of the Publications Review Board and the basic guidelines it uses to review submissions for publication. Includes examples of and changes in review criteria that have developed since the end of the Cold War.

Seidel, W. E., "Intelligence for Defense Planning", Stud. Intel. V8:2-19-32 (Spring 1964) PDF [743KB*]

Seidel, Wallace E., "Great Frusina Revisited", Stud. Intel. V5:1-1-7 (Winter 1961) PDF [486KB*]

"The Selectively Reluctant Informant" by A. R. Northridge, Stud. Intel. V11:3-107-110 (Summer 1967) PDF [134.3KB*]
A useful and forthcoming Thai military source clearly lies about one possible bomb target. Circumspectly, the interrogator finds out why. It's near his home (1944).

Serov, Ivan A., "Work With Walk-ins", Stud. Intel. V8:1-16-47 (Winter 1964) PDF [1.8MB*]

The Service: The Memoirs of General Reinhard Gehlen by Reinhard Gehlen. Book review by Anonymous, Stud. Intel. V16:3-89-98 (Fall 1972) PDF [461.1KB*]
A senior DO officer offers his personal views and remembrances about General Gehlen's successes and failures as head of Germany's Secret Service, in addition to a critical review of the General's book. The reviewer also provides his critical take on several other recently released biographies of Gehlen–all described as poor works.

Seven Men at Daybreak by Alan Burgess. Book review by R.C. Jaggers, Stud. Intel. V5:3-65-67 (Summer 1961) PDF [124KB*]
Reviewer disputes many specifics of the author's study of the assassination Nazi leader Reinhard Heydrich in 1942.

The Shadow War: European Resistance 1939-1945 by Henri Michel. Book review by Walter Pforzheimer., Stud. Intel. V19:2-39-42 (Summer 1975) PDF [205.8KB*]
A French account of resistance movements in Europe. Review points out several areas ignored by the author or presented with a gratuitously anti-American slant.

"A Sharp Look at SinoSovietology" by John Dockham, Stud. Intel. V5:3-A23-A27 (Summer 1961) PDF [231KB*]

Shea, James R., "Winnowing Wheat from Chaff", Stud. Intel. V13:4-19-23 (Fall 1969) PDF [243.4KB*]

Sheepshanks, R.H. Book review of Sailor in a Russian frame by Cdr. Anthony Courtney, Stud. Intel. V13:1-87-92 (Winter 1969) PDF [294.5KB*]

"The Sherlock Holmes of the Revolution" by Rita T. Kronenbitter, Stud. Intel. V11:4-83-100 (Fall 1967) PDF [911.8KB*]
How V. L. Burtzev became the principal, most successful counterintelligence agent of the Russian exile revolutionaries (1905-1914), his methods, the Okhrana agents he uncovered, his repudiation by the revolutionaries, and his ultimate exile from the USSR to Paris, where he died in 1942.

"Sherman Kent and the Profession of Intelligence Analysis" by Jack Davis, Kent Cen. Occ. Pap. 1:5-1-16 (November 2002) PDF [49.0KB*]

"Sherman Kent's Final Thoughts on Analyst-Policymaker Relations" by Jack Davis, Kent Cen. Occ. Pap. 2:3-1-11 (June 2003) PDF [108.1KB*]

Sherman, William H., "Research Intelligence in Early Modern England", Stud. Intel. V37:5-95-104 (1994) PDF [612.5KB*]

"The Shorthand of Experience" by Thomas F. Elzweig, Stud. Intel. V3:2-31-45 (Spring 1959) PDF [1.2MB*]
True chronicle of long-lived association between the Czechoslovak military intelligence service and a German Abwehr (counterintelligence) officer who provided exceptional source reporting on Nazi intentions prior to and and throughout World War II.

Shryock, Richard W. "For an Eclectic Sovietology", Stud. Intel. V8:1-57-64 (Winter 1964) PDF [423KB*]

Sibert, Edwin L., "Operation Portrex", Stud. Intel. V4:2-A1-A9 (Spring 1960) PDF [406KB*]

"SIGINT in the Novels of John le Carre" by James Burridge, Stud. Intel. V37:5-125-132 (1994) PDF [1.3MB*]
Reviews the spy books of John le Carre, focusing on what he reveals and thinks about SIGINT in the largely HUMINT business. Concludes le Carre is ant-American and anti-technical. Some good examples of the use of SIGINT in HUMINT operations.

Silver, Arnold M., "Questions, Questions, Questions", Stud. Intel. V37:5-81-90 (1994) PDF [1.6MB*]

Simon, James M., Jr., "The Intelligence Community: 2001-2015", Stud. Intel. V46:1-39-47 (2002) PDF [463.3KB*]

"Singapore's People's Association" by Walter B. Kimball, Stud. Intel. V12:4-47-55 (Fall 1968) PDF [874.6KB*]
Describes how the Singapore government created neighborhood community centers as a method of countering communist efforts to foster a pro-Communist, urban insurgency.

"The Sino-Soviet Border Dispute: A Comparison of the Conventional and Bayesian Methods for Intelligence Warning" by Charles E. Fisk, Stud. Intel. V16:2-53-62 (Spring 1972) PDF [341.9KB*]
An experiment showed advantages to the mathematical component of the Bayesian model for eliciting analysts' estimates of probability over conventional, more subjective tracking of analysts' judgment.

"Skis and Daggers" by William E. Colby, Stud. Intel. Winter 1999/2000:53-60, PDF [599.8KB*]
An account, written in 1945, of then Maj.Colby's successful OSS mission to disrupt German rail traffic in northern Norway in April of that year.

"A Small South Pole" by Anonymous, Stud. Intel. V4:4-A23-A27 (Fall 1960) PDF [252KB*]
The Japanese successfully play back a radio agent from Australia. (World War II allied covert operation in eastern Timor compromised by poor tradecraft)

Smigel, Stanley E., "Some Views on the Theory and Practice of Intelligence Collection", Stud. Intel. V2:2-33-45 (Spring 1958) PDF [721KB*]

Smith, Abbot E. Book review of To Move a Nation by Roger Hilsman, Stud. Intel. V11:4-106-107 (Fall 1967) PDF [94.2KB*]

Smith, Abbot E., "Notes on "Capabilities in National Intelligence", Stud. Intel. V1:2-1-18 (Winter 1956) PDF [820KB*]

Smith, Abbot E., "On the Accuracy of National Intelligence Estimates", Stud. Intel. V13:4-25-35 (Fall 1969) PDF [527.1KB*]

Smith, Alan B., "Costing Nuclear Programs", Stud. Intel. V10:1-23-38 (Winter 1966) PDF [790.4KB*]

Smith, Bruce
see Fuller, Kenneth C., "'Rolling Thunder' and Bomb Damage to Bridges"

Smith, K Wayne
see Murphy, Lt. Col. James, "Making Intelligence Analysis Responsive to Policy Concerns"

Smith, R. J., "Coordination and Responsibility", Stud. Intel. V1:4-19-26 (Fall 1957) PDF [423KB*]

Smyth, Howard McGaw, "The Ciano Papers: Rose Garden", Stud. Intel. V13:2-1-63 (Spring 1969) PDF [2.3MB*]

"Snapshots at Random" by Jane Schnell, Stud. Intel. V5:2-17-23 (Spring 1961) PDF [372KB*]
The value of traveler photographs to intelligence and tips for effective support of CIA's Graphics Register (1961).

Snider, L. Britt, "Congress as a User of Intelligence", Stud. Intel. Spring 1998:47-69, PDF [1.9MB*]

Snider, L. Britt, "Creating a Statutory Inspector General at CIA", Stud. Intel. Winter/Spring 2001, No. 10:15-21, PDF [505.7KB*]

Snider, L. Britt, "Recollections of the Church Committee's Investigation of NSA", Stud. Intel. Winter 1999/2000:43-51, PDF [699.8KB*]

SOE In France by M. R. D. Foot. Book review by John A. Bross, Stud. Intel. V11:2-100-105 (Spring 1967) PDF [298KB*]
Describes British Special Operations Executive (SOE) support for French resistance during World War II. Reviewer outlines significant US involvement ignored in the British publication.

Sokolov, V. S.
see Konovalov, A. A., "Meeting with Agents"

Solin, Gail, "The Art of China Watching", Stud. Intel. V19:1-23-33 (Spring 1975) PDF [687.7KB*]

"Some Far-Out Thoughts on Computers" by Orrin Clotworthy, Stud. Intel. V6:4-25-36 (Fall 1962) PDF [601KB*]
Imaginative predictions of things to come in computer applications to intelligence problems (1962).

"Some Lessons in Intelligence" by R.V. Jones, Stud. Intel. V38:5-37-42 (1995) PDF [446.2KB*]
Some enduring principles of intelligence (for example, the tradeoff in Warning analysis of too many and too few alerts), by the head of British World War II scientific intelligence, in a speech at CIA in 1993.

"Some Limitations in Systems Analysis in Intelligence Activities" by R. C. Schreckengost, Stud. Intel. V14:2-79-86 (Fall 1970) PDF [390.7KB*]
Scholarly article offering cautionary advice on the application of systems analysis and operations research methods to intelligence analysis and to budget allocation in the Intelligence Community, with bibliography.

"Some Thoughts on Irregular Warfare" by Jeffrey B. White, Stud. Intel. V39:5-51-59 (1996) PDF [630.2KB*]
How the new era of mini-wars will affect war-fighters, analysts, and collectors alike, producing an uncertain environment that requires specialist knowledge and understanding of a host of mini-cultures and micro-climates. Includes paragraphs on implications for collection and analysis.

"Some Views on the Theory and Practice of Intelligence Collection" by Stanley E. Smigel, Stud. Intel. V2:2-33-45 (Spring 1958) PDF [721KB*]
Advice (1958) for using State Department collection officers for effective tasking of Embassy personnel.

"Somewhere in Siberia" by Henry S. Lowenhaupt, Stud. Intel. V15:1-35-51 (Winter 1971) PDF [876.2KB*]
Painstaking research by teams of imagery analysts and scientists to identify location and characteristics of USSR's facility for production of weapons grade plutonium.

Soohoo, Edmund L., "An Elint Vigil, Unmanned", Stud. Intel. V12:2-21-27 (Spring 1968) PDF [285.7KB*]

Southard, W. P.
see Munson, Harlow T., "Two Witnesses for the Defense"

"The Soviet Atlas as a Source" by William Terechow, Stud. Intel. V10:2-37-42 (Spring 1966) PDF [304.2KB*]
In praise of world-class Soviet Atlases and their geographic, economic, social, and political information as useful intelligence sources.

"Soviet Deception in the Cuban Missile Crisis" by James H. Hansen, Stud. Intel. V46:1-49-58 (2002) PDF [569.3KB*]
Four decades after the Cuban missile crisis, the massive Soviet denial and deception (D&D) effort to hide the movement of offensive, nuclear armed missiles to Cuba can now be pieced together from declassified US, Russian, and Cuban sources. In addition to classical D&D techniques, the Soviets also used such imaginative methods as flooding already discredited Cuban exile sources with valid information about their operation.

"Soviet Deception in the Czechoslovak Crisis" by Cynthia N. Grabo, Stud. Intel. V14:1-19-34 (Spring 1970) PDF [760.8KB*]
Detailed assessment of the run-up to the 1968 invasion concludes that Moscow did not engage to its customary extent in military and political deception practices, which are well explained in the course of the discussion.

"Soviet Intelligence Training" by Sherman W. Flemer, Stud. Intel. V3:1-93-98 (Winter 1959) PDF [290KB*]
Overview of Soviet intelligence training program for new and experienced personnel, circa early 1950s. Outlines requirements for service and the content of the curriculums of both the Armed Forces's Chief Intelligence Directorate (GRU) and the Committee for State Security's Foreign Directorate (KGB).

"Soviet Publicists Talk About U. S. Intelligence" by Leslie D. Weir, Stud. Intel. V4:3-A19-A26 (Summer 1960) PDF [402KB*]
Presents Soviet's distorted views of US intelligence organs and operations (1960s), much like Soviet espionage and subversion appears to US eyes.

"Soviet Reality Sans Potemkin" by Gertrude Schroeder, Stud. Intel. V12:2-43-51 (Spring 1968) PDF [486.2KB*]
Techniques used by a DI economic analyst (who sometimes passed herself off as a local resident) on a four-month TDY to Moscow to collect information on the standard-of-living and behavior of Soviet consumers.

"Soviet Use of Assassination and Kidnapping" by Anonymous, Stud. Intel. V19:3-1-10 (Fall 1975) PDF [563.3KB*]
Describes known cases of KGB assassinations and kidnappings based on defector and forensic information as of 1964. Preferred targets, methods, organization, techniques discussed.

"Spotting Photo Fakery" by Dino A. Brugioni, Stud. Intel. V13:1-57-67 (Winter 1969) PDF [510.7KB*]
An NPIC expert provides guidelines has to how a non-expert can detect that a photograph has been doctored and demonstrates various techniques with examples of Communist fakery (1969).

"Spy at Your Service, Sir" by Lowell M. Dunleigh, Stud. Intel. V3:2-81-93 (Spring 1959) PDF [680KB*]
Basic principles and sound advice for analysts and managers on the interactive process by which productive requirements can be developed for clandestine collection, emphasizing the value of close relations between collector and analyst. A well-written "how to do it" suitable for classroom use, even though dated (1950s).

"Spy Mission to Montana" by Walter W. Romig, Stud. Intel. V11:3-77-84 (Summer 1967) PDF [443.2KB*]
Plotting the location of missile silos in Montana, using tools available to clandestine agents.

"The SS-8 Controversy" by David S. Brandwein, Stud. Intel. V13:3-27-35 (Summer 1969) PDF [441.1KB*]
One of CIA's most able weapons analysts recounts a classic case of rival analyses that divided the Intelligence Community into warring camps until expert panels were brought in to resolve it.

"A Staff Agent's Second Thoughts" by Louis Boifeuillette, Stud. Intel. V11:1-61-65 (Winter 1967) PDF [237.1KB*]
A Non-Official Cover (NOC) officer's assessment of the pros and cons of deep overseas cover following a four year NOC tour in Africa. Cover for access, and keeping NOCs current and fully employed discussed, among other issues.

Staff of Studies in Intelligence, compilation entitled "Deception", Stud. Intel. V17:1-31-38 (Spring 1973) PDF [982.2KB*]

"Stalin's Killing Field" by Benjamin B. Fischer, Stud. Intel. Winter 1999/2000:61-70, PDF [1.0MB*]
Recounts the gradual revelation by researchers and finally Soviet and Russian authorities of the mass execution of Polish POWs in 1940 in the Katyn forest and elsewhere in Russia and the Ukraine.

Stanhope, Thomas A.
Millican, C. Bowie, "Lost Order, Lost Cause"

Stappen, James Van, "Laboratory Analysis of Suspect Documents", Stud. Intel. V4:3-47-55 (Summer 1960) PDF [492KB*]

Steinmeyer, Jim. Book review of The Master of Disguise: My Secret Life in the CIA by Antonio Mendez, Stud. Intel. V46:1-67-70 (2002) PDF [152.3KB*]

Steinmeyer, Walter, "Installation Penetration", Stud. Intel. V6:3-47-54 (Summer 1962) PDF [453KB*]

Steinmeyer, Walter, "The Intelligence Role in Counterinsurgency", Stud. Intel. V9:4-57-63 (Fall 1965) PDF [327KB*]

Sterling, George E., "The U.S. Hunt for Axis Agent Radios", Stud. Intel. V4:2-35-54 (Spring 1960) PDF [1.1MB*]

Steury, Donald P., "On the Front Lines of the Cold War: The Intelligence War in Berlin", Stud. Intel. Summer 2000, No 9:1-10, PDF [769.1KB*]

Steury, Donald P., "The OSS and Project SAFEHAVEN", Stud. Intel. Summer 2000, No 9:35-50, PDF [1.3MB*]

Stevens, Sayre, "'Foretesting' ABM Systems: Some Hazards", Stud. Intel. V12:3-1-9 (Summer 1968) PDF [491KB*]

Stevens, Sayre, "The SAM Upgrade Blues", Stud. Intel. V18:2-21-35 (Summer 1974) PDF [971.7KB*]

Stewart, Gordon M., "What is a Generalist?", Stud. Intel. V2:3-1-6 (Summer 1958) PDF [302KB*]

Stockinger, Edwin K., "Five Weeks at Phalane", Stud. Intel. V17:1-11-19 (Spring 1973) PDF [566.0KB*]

Stolz, Richard, "A Case Officer's First Tour", Stud. Intel. V37:5-53-58 (1994) PDF [1.1MB*]

"A Stone for Willy Fisher" by Richard S. Friedman, Stud. Intel. Special Unclass. Ed., Fall 2000:137-148, PDF [811.6KB*]
Presents a brief biography of the Soviet KGB illegal, William August Fisher alias Colonel Rudolf Ivanovich Abel. Includes examples of the KGB's tradecraft and choice of espionage targets.

"The Story of the National Cryptologic Museum" by Jack E. Ingram, Stud. Intel. V47:3-51-60 (2003) PDF [519.1KB*]
Relates the evolution of the National Cryptologic Museum from a cobbled together, one exhibit area institution in 1993 to a national level museum ten years later. Spells out the value of the museum in putting a public face on the super secret NSA.

Stout, Mark, "The Pond: Running Agents for State, War, and the CIA", Stud. Intel. V48:3-69-82 (2004) PDF [189.2KB*]

Strangers on a Bridge by James B. Donovan. Book review by M. C. Miskovsky, Stud. Intel. V9:3-97-100 (Summer 1965) PDF [174KB*]
Recounts the exchange of Francis Gary Powers, U-2 pilot who was a Soviet prisoner, for convicted Soviet spy Rudolph Abel. The author is the lawyer who publicly arranged the exchange. The reviewer participated in the detailed CIA backup effort.

"Strategic Arms Limitation and Intelligence" by Richard Helms, Stud. Intel. V17:1-1-7 (Spring 1973) PDF [478.5KB*]
Former DCI sets forth the role of intelligence in working with policy officials to develop arms control treaties -- in this case the first SALT treaty. Describes how CIA has contributed to working out the US position and the delicacy of being so close to the policy process. Emphasizes the need for professionalism: close enough to be relevant, distant enough to remain objective.

"Strategic Thinking and Air Intelligence" by Maj. Gen. James H. Walsh, Stud. Intel. V2:1-7-30 (Winter 1958) PDF [1.5MB*]
This long article discusses how the coming of atomic weapons and the space age changing air strategy. In particular, the author outlines how he believes the new age will change intelligence requirements and processing, including coping with the dangers of strategic and technological surprise. With the end of the Cold War much of the discussion is outdated, but the author's description (see last four pages) of the value of intelligence and the need to do a better job of extracting meaning from collected "facts" and in communicating with decisionmakers is still relevant.

"Strategic Warning: The Problem of Timing" by Cynthia M. Grabo, Stud. Intel. V16:2-79-92 (Spring 1972) PDF [664.7KB*]
Strategic warning should concentrate on intent and readiness of a military attack, and not on precise timing, which can be changed repeatedly by the attacker, who in so doing has frequently caused a reduction in attention by the target country.

Strayer, Joseph R., "The Role of the Consultant in Intelligence Estimates", Stud. Intel. V2:4-1-5 (Fall 1958) PDF [264KB*]

"A Study in Indications Methodology" by Diane M. Ramsey and Mark S. Boerner, Stud. Intel. V7:3-75-94 (Summer 1963) PDF [892KB*]
An experiment in quantifying the relevance of indicator patterns to different types of hostile actions.

"Study in Indications Methodology", Communications to the Editors by Anthony Quibble, Stud. Intel. V7:4-65-66 (Fall 1963) PDF [85KB*]
Criticisms of inconsistency in the original article, with authors' correction of the inconsistencies.

"Studying and Teaching Intelligence" by Ernest R. May, Stud. Intel. V38:5-1-5 (1995) PDF [396.6KB*]
Leading intelligence history scholar cites recent improvements but avers that scholars still largely ignore the role of intelligence in addressing international relations and intelligence agencies still are too slow in declassifying historical materials for scholars use.

"Styles and Stereotypes in Intelligence Studies" by Frank A. Knapp, Jr., Stud. Intel. V8:2-A1-A5 (Spring 1964) PDF [233KB*]
An editor argues for less uniformity in the writing and editing of intelligence publications.

Sullivan, Emma
see Warren, Ward, "The Historical Intelligence Collection"

Sullivan, Joseph
see Barry, James A., "Bridging the Intelligence-Policy Divide"

"Supporting US Foreign Policy in the Post-9/11 World" by Richard N. Haas, Stud. Intel. V46:3-1-13 (2002) PDF [695.0KB*]
The Director of State's Policy Planning Staff sketches the main longer term issues facing policymakers and states that intelligence analysts need to spend more time addressing them rather than just tending to "in-box" issues. He advocates, in particular, that analysts get much closer to policymakers, taking greater initiative to find out what they need and calling attention, as forcefully as possible, to issues they are missing.

[Top of page]



T

"Taking Care of Business" by David W. Overton, Stud. Intel. V37:4-25-31 (1994) PDF [1.1MB*]
Describes what he learned about attitudes toward the Agency while a CIA officer-in-residence at the graduate school of business at Dartmouth College (1992-1993).

"The Tale of Hushai the Archite" by C.N. Geschwind, Stud. Intel. V13:2-21-24 (Spring 1969) PDF [153.5KB*]
Recounts the old testament fight between King David and his insurgent son, Absalom, and the role of the classic agent of influence, Hushai, in restoring David to the throne.

"Target: CIA" by Lester Hajek, Stud. Intel. V6:1-29-55 (Winter 1962) PDF [1.4MB*]
Soviet efforts (1950s-1960s) to discredit CIA and especially DCI Allen Dulles, not only in Bloc channels and publications but also through witting and unwitting authors and media in non-Communist countries.

Tauss, Edward, "Foretesting a Soviet ABM System", Stud. Intel. V12:1-21-26 (Winter 1968) PDF [326.7KB*]

Tebrich, Spencer, "Human Scent and its Detection", Stud. Intel. V5:2-25-37 (Spring 1961) PDF [661KB*]

"Technical Factors in Aerospace Photography" by John W. Cain, Stud. Intel. V6:4-1-8 (Fall 1962) PDF [446KB*]
Describes the technical elements and considerations of aerospace photography, improvements made in twenty years, and those expected in the next five.

"A Technique for Coastal Infiltration" by John A. Hurley, Stud. Intel. V6:2-25-28 (Summer 1962) PDF [171.8KB*]
Describes the merits and technique of submerged submarine egress as an agent infiltration method.

"Telemetry Analysis" by David S. Brandwein, Stud. Intel. V8:4-21-29 (Fall 1964) PDF [430KB*]
An analyst of Soviet rocketry describes how engineering techniques and scientific deductions can provide accurate estimates of performance.

"The Ten Commandments of Counterintelligence" by James M. Olson, Stud. Intel. Fall/Winter 2001, No. 11:81-87, PDF [856.5KB*]
A former chief of CIA's Counterintelligence Center lays out his views of the ten most important principles that should guide intelligence organizations and counterintelligence officers.

Tenet, George J., "Eulogy for Former DCI Richard McGarrah Helms", Stud. Intel. V46:4-31-33 (2002) PDF [124.6KB*]

Tenet, George J., "The U-2 Program: The DCI's Perspective", Stud. Intel. Winter 1998/99:1-4, PDF [310.5KB*]

"Tensions in Analyst-Policymaker Relations: Opinions, Facts, and Evidence" by Jack Davis, Kent Cen. Occ. Pap. 2:2-1-13 (January 2003) PDF [46.7KB*]

The Tenth Fleet by Ladislas Farago. Book review by Kenneth A. Knowles, Stud. Intel. V7:2-A19-A23 (Spring 1963) PDF [223KB*]
Describes the anti-submarine efforts of the allies in World War II. Reviewer describes the close, fast connection between intelligence and operations, and of the great value of SIGINT, given the German submarine's frequent radio reporting.

Terechow, William, "The Soviet Atlas as a Source", Stud. Intel. V10:2-37-42 (Spring 1966) PDF [304.2KB*]

"Terrain Intelligence for the Pentomic Army" by Clifton A. Blackburn Jr., Stud. Intel. V3:4-81-86 (Fall 1959) PDF [286KB*]
The capabilities of terrain intelligence rethought for use in the age of missiles and space warfare.

"A Theorem for Prediction" by Jack Zlotnick, Stud. Intel. V11:4-1-12 (Winter 1967) PDF [604.5KB*]
Report of a 1967 experiment to test the usefulness of Bayes' Theorem (a mathematical model to calculate probabilities) as applied to intelligence analysis. Cuban missile crisis used as test case.

"The Theory and Practice of Soviet Intelligence" by Alexander Orlov, Stud. Intel. V7:2-45-65 (Spring 1963) PDF [1.1MB*]
A former Soviet intelligence official describes collection, analysis, and denial and deception practices as honed under Stalin. Notable are (1) the concentration on clandestine collection and disdain for the Western emphasis on research, and (2) the importance of seeding "disinformation" to advance Soviet goals.

Therkelsen, Thomas G. Book review of The Okhrana: The Russian Department of Police. A Bibliography by Edward Ellis Smith, Stud. Intel. V13:1-93-98 (Winter 1969) PDF [296.3KB*]

"Thinking Straight: Cognitive Bias in the US Debate about China" by Josh Kerbel, Stud. Intel. V48:3-27-35 (2004) PDF [112.1KB*]
Using main stream analysis of China's likely future as an example, argues that many analysts tend to have a cognitive bias toward linear thinking that leads to single-outcome projections. Suggests, instead, that non-linear thinking is more suitable for understanding complex systems; such an approach leads to forecasting a range of plausible outcomes, or alternative scenarios, and signposts as to which one may be developing.

"Thirtyfive Years in Intelligence" by Lt. Gen. Vernon A. Walters, Stud. Intel. V20:2-45-59 (Summer 1976) PDF [962.0KB*]
War stories covering his military and, especially, intelligence career by one of the Intelligence Community's greatest story tellers.

Thomas, Evan, "Gaining Access to CIA Records", Stud. Intel. V39:5-19-23 (1996) PDF [364.9KB*]

Thomas, Louis, "Alexander Rado", Stud. Intel. V12:3-41-61 (Summer 1968) PDF [1.3MB*]

Thomas, Louis, "The Map in Field Reporting", Stud. Intel. V6:2-43-52 (Spring 1962) PDF [436KB*]

Thompson, Michael, "Thoughts Provoked by The Very Best Men", Stud. Intel. V39:5-25-34 (1996) PDF [801.1KB*]

"Thoughts Engendered by Robert McNamara's In Retrospect" by Harold P. Ford, Stud. Intel. V39:5-95-109 (1996) PDF [1.2MB*]
An informed and critical review of the 1995 book by the former SECDEF during the height of US engagement in Vietnam indicates the national costs of persistent disregard for CIA's analytic judgments, which were largely on target both about negative prospects for winning the war and manageable costs for losing it.

"Thoughts Provoked by The Very Best Men" by Michael Thompson, Stud. Intel. V39:5-25-34 (1996) PDF [801.1KB*]
Evan Thomas' book is a generally perceptive account of the first two decades of the CIA seen through the career of four senior operations officers: Frank Wisner, Tracy Barnes, Richard Bissell, and Desmond FitzGerald. Thomas describes their preference for covert action over intelligence collection and operational security.

Tidwell, W. A., "Horrible Thought", Stud. Intel. V2:1-65-70 (Winter 1958) PDF [292KB*]

Tidwell, William A., "A New Kind of Air Targeting", Stud. Intel. V11:1-55-60 (Winter 1967) PDF [262.6KB*]

Tidwell, William A., "Notes on the Critic System", Stud. Intel. V4:2-19-23 (Spring 1960) PDF [238KB*]

Timm, Eric W., "Countersabotage--a Counterintelligence Function", Stud. Intel. V7:2-67-72 (Spring 1963) PDF [310KB*]

Tittenhofer, Mark A.., "More Yet on 'Lucy'", Stud. Intel. V16:3-87-88 (Fall 1972) PDF [98.5KB*]

Tittenhofer, Mark A., "The Rote Drei: Getting Behind the 'Lucy' Myth", Stud. Intel. V13:3-51-90 (Summer 1969) PDF [1.9MB*]

"Tolkachev, A Worthy Successor to Penkovsky" by Barry G. Royden, Stud. Intel. V47:3-5-33 (2003) PDF [1.7MB*]
A detailed account of the case of Soviet walk-in, Adolf Tolkachev. Covers his initial approach in Moscow, agent assessment techniques and handling procedures, covert communications, clandestine photography, his exposure by Edward Lee Howard, and the extraordinary value of his S&T production.

Tomlinson, William B., "Chinese Industry from the Air", Stud. Intel. V11:2-37-50 (Spring 1967) PDF [868KB*]

Tompkins, Peter, "The OSS and Italian Partisans in World War II", Stud. Intel. Spring 1998:95-103, PDF [689.1KB*]

"Tonnage Through Tibet" by Philip Vetterling and Avis Waring, Stud. Intel. V7:2-13-25 (Spring 1963) PDF [685KB*]
Analytic methodology for determining Chinese military's capability for moving warfighting supplies to a remote border area (late 1950s).

Tordella, Louis W. Book review of The Ultra Secret by F. W. Winterbotham, Stud. Intel. V19:3-45-47 (Fall 1975) PDF [186.1KB*]

Torrey, Gordon, "Postal Forgeries in Two World Wars", Stud. Intel. V4:3-57-69 (Summer 1960) PDF [591.6KB*]

"Toward a Federal Intelligence Memory" by George W. Wright, Stud. Intel. V2:3-7-22 (Summer 1958) PDF [873KB*]
Assessment of attributes and shortcomings of CIA's library and reference facilities in the 1950s, with an eye to improving its utility to all intelligence units and agencies, including a critical review of document search systems.

"Toward a Functional Model of Information Warfare" by L. Scott Johnson, Stud. Intel. Semiannual Ed., No. 1, 1997: 49-56, PDF [576.6KB*]
Sets forth the elements of a definition of "Information Warfare," and develops a three level model of IW which can be used to guide discussion of relevant capabilities and an analysis of a country's IW capability or concept.

"Training for Overseas Effectiveness" by Kenneth G. Orr, Stud. Intel. V4:4-A11-A21 (Fall 1960) PDF [579KB*]
A detailed catalogue of private institutions and programs that prepare Americans to work abroad, with recommendations for intelligence adaptations (1960).

Travers, Russ, "The Coming Intelligence Failure", Stud. Intel. Semiannual Ed., No. 1, 1997: 35-43, PDF [656.7KB*]

"Trends in African Forgeries" by Dr. Robert L. Managhan, Stud. Intel. V19:1-13-21 (Spring 1975) PDF [440.0KB*]
Describes non-intelligence related forgeries in Africa and Latin America, their preparers, their poor quality, their remarkable impact, and how they were detected.

Trengrouse, W. M., "The Ninja", Stud. Intel. V9:2-45-52 (Spring 1965) PDF [366KB*]

Treverton, Gregory F. "Intelligence and the 'Market State'", Stud. Intel. Winter/Spring 2001, No. 10:67-76, PDF [624.0KB*]

Trimble, Delmege, "The Defections of Dr. John", Stud. Intel. V4:4-1-26 (Fall 1960) PDF [2.0MB*]

Troy, Thomas F., "Donovan's Original Marching Orders", Stud. Intel. V17:2-39-69 (Summer 1973) PDF [773.9KB*]

Troy, Thomas F., "Truman on CIA"., Stud. Intel. V20:1-21-38 (Spring 1976) PDF [1.1MB*]

Troy, Thomas M., Jr. Book review of Looking Over My Shoulder: A Life in the Central Intelligence Agency by Richard Helms., Stud. Intel. V48:1-75-84 (2004) PDF [85.0KB*]

"Truman and Eisenhower: Launching the Process" by John Helgerson, Stud. Intel. V38:5-65-77 (1995) PDF [1.0MB*]
Recounts how Presidents Truman and Eisenhower and candidate Adlai Stevenson preferred to receive intelligence briefings, their interaction with the briefers, and their relations with their DCIs and each other.

"Truman on CIA" by Thomas F. Troy, Stud. Intel. V20:1-21-38 (Spring 1976) PDF [1.1MB*]
The author, a leading authority on CIA origins, corrects and places in broader historical context President Truman's claim that CIA was his "invention," citing the key roles of President Franklin Roosevelt and OSS Director William Donovan, as well as Washington based departmental and partisan politics.

" 'Truth' Drugs in Interrogation", George Bimmerle, Stud. Intel. V5:2-A1-A19 (Spring 1961) PDF [975KB*]
A review of published literature on the efficacy of drugs and hypnosis to extract truth from uncooperative persons. Concludes results are generally unreliable.

Turist, Amerikanskiy, "A Note on Casual Intelligence Acquisition", Stud. Intel. V2:3-71-74 (Summer 1958) PDF [183KB*]

"Two Strategic Intelligence Mistakes in Korea, 1950" by P. K. Rose, Stud. Intel. Fall/Winter 2001, No. 11:57-65, PDF [1.2MB*]
The invasion of South Korea by North Korea in 1950 and the intervention of China four months later caught US political, intelligence, and military leaders by surprise. This article explains how the belief that the Soviet Union controlled all Communist forces in the world and that the Soviets would not risk starting a World War blinded US observers to clear intelligence indications that such attacks were likely.

"Two Witnesses for the Defense" by Harlow T. Munson and W. P. Southard, Stud. Intel. V8:4-93-98 (Fall 1964) PDF [301KB*]
DI analysts rebut DO claims that they should have been able to warn of Soviet missiles in Cuba from available HUMINT reporting, citing the "cry wolf" factor.

[Top of page]



U

"The U-2 Program: A Russian Officer Remembers" by Alexander Orlov, Stud. Intel. Winter 1998/99:5-14, PDF [818.5KB*]
Col. Orlov, a former Soviet Air Defense officer, recounts the Soviet view of the arms competition with the US in the decades of the 1950s and 60s, how the U-2's collection successes affected this competition, how the Soviets shot down the U-2 piloted by Gary Francis Powers, and the role of the U-2 during the Cuban missile crisis in 1962.

"The U-2 Program: The DCI's Perspective" by George J. Tenet, Stud. Intel. Winter 1998/99:1-4, PDF [310.5KB*]
Reviews the history of the U-2 and recounts some of its major contributions to intelligence. Pays tribute to its developers, pilots, and the remarkable public-private partnership required to design and build it.

The Ultra Secret by F.W. Winterbotham. Book review by Louis W. Tordella, Stud. Intel. V19:3-45-47 (Fall 1975) PDF [186.1KB*]
Points out omissions in the book: extent of US involvement in the ULTRA production, the difficulty in selecting raw traffic for decryption, and making operational sense out of scraps of intercepts.

"Unfair Exchange" by Amos K. Wylie., Stud. Intel. V6:4-9-15 (Fall 1962) PDF [378KB*]
Outlines the net benefit to the USSR from scientific/student exchanges with the US.

"Unlucky Shamrock: The View from the Other Side" by James G. Hudek, Stud. Intel. Winter/Spring 2001, No. 10:85-94, PDF [778.4KB*]
NSA retained its authority to screen telegrams sent abroad from the United States, despite hostile hearings by Congressional investigating committees (1975). But the authority was put under tighter control by the Foreign Intelligence Surveillance Act of 1978 and the new intelligence oversight committees.

"Unrecognized Potential in the Military Attachés" by Lyman B. Kirkpatrick, Stud. Intel. V4:2-1-6 (Spring 1960) PDF [338KB*]
A prescient (1960) assessment of the potential contributions to national intelligence of service attachés as reporters, warning analysts, and collectors of vital, if mundane, basic intelligence.

"The U.S. Hunt for Axis Agent Radios" by George E. Sterling, Stud. Intel. V4:2-35-54 (Spring 1960) PDF [1.1MB*]
Traces the organization and activities of the Federal Communications Commission' s (FCC) Radio Intelligence Division in tracking down German agent clandestine radio stations just prior to and during World War II.

US Intelligence and the End of the Cold War" by Henry R. Appelbaum and John H. Hedley, Stud. Intel. Summer 2000, No 9:11-18, PDF [587.7KB*]
Sums up the results of a 1989 conference on how and how well US intelligence performed around the time of the end of the Cold War. Attendees included intelligence and policy officials from the US and the former Soviet Union. Includes excerpts from speakers comments on how policymakers viewed intelligence support at that time, what kind of intelligence was provided to them, how well intelligence supported arms control negotiations, and what kind of operations the US and the Soviets mounted against each other.

[Top of page]



V

Vaillancourt, John P., "Edward Bancroft (@ Edwd. Edwards), Estimable Spy", Stud. Intel. V5:1-A53-A67 (Winter 1961) PDF [775KB*]

"Valediction" by Allen W. Dulles, Stud. Intel. V6:1-A1-A4 (Winter 1962) PDF [186.2KB*]
Reprints comments by President Kennedy and Allen Dulles upon presentation of the National Security Medal to Dulles in 1961.

"Valediction" by Sherman Kent, Stud. Intel. V12:1-1-11 (Winter 1968) PDF [498.1KB*]
Reflections on the origin and first ten years of "Studies in Intelligence" and on Kent's ideas for an "Institute for Advanced Study of Intelligence" as the means to fostering a science and a literature of intelligence.

Valero, Larry A., "The American Joint Intelligence Committee and Estimates of the Soviet Union, 1945-1947", Stud. Intel. Summer 2000, No 9:65-80, PDF [1.4MB*]

"The Validity of Soviet Economic Statistics" by Edward L. Allen, Stud. Intel. V4:3-1-8 (Summer 1960) PDF [408KB*]
Official Soviet economic statistics, which became more readily available with the publication in the mid-1950s of statistical handbooks, are judged generally reliable but nonetheless in need of careful interpretation.

Valpey, Charles E. Book review of The Invisible Government by David Wise and Thomas B. Ross., Stud. Intel. V8:4-109-110 (Fall 1964) PDF [237KB*]

"A Value for Information" by Max S. Oldham, Stud. Intel. V12:2-29-36 (Spring 1968) PDF [332KB*]
Explains how strategic war gaming can be used to compare the worth of different items of intelligence information on an enemy's strategic forces as an aid to determining, for example, resource allocation.

Van Wagenan, James S., "A Review of Congressional Oversight", Stud. Intel. Semiannual Ed., No. 1, 1997: 97-102, PDF [476.2KB*]

"The Vemork Action" by Claus Helberg, Stud. Intel. V36:5-80-90 (1992) PDF [2.3KB*]
Recounts the successful attack on the Vemork heavy water plant in Norway in 1943, including training and infiltration into Norway of the sabotage team, setbacks, the actual bombing, and the escape of the author.

"Vernon Walters--Renaissance Man" by Henry R. Appelbaum, Stud. Intel. V46:1-1-2 (2002) PDF [100.4KB*]
Quick review of General Walter's life as a soldier, intelligence office, and diplomat.

Vetterling, Philip, "Tonnage Through Tibet", Stud. Intel. V7:2-13-25 (Spring 1963) PDF [685KB*]

"The Vietnamese as Operational Target" by Titus Leidesdorf, Stud. Intel. V12:4-57-71 (Fall 1968) PDF [961.5KB*]
A psychologist analyses potential vulnerabilities among Vietnamese that might be exploitable for operational purposes.

"The Vilification and Vindication of Colonel Kuklinski" by Benjamin B. Fischer, Stud. Intel. Summer 2000, No 9:19-33, PDF [1.3KB*]
Recounts the career of one of the most valuable US Cold War agents – a Polish military officer who was a leading source into Soviet military operations and plans from the late 1960s to the early 1980s, and his impact on Poland's post-Communist politics.

Villadsen, Ole R., "Prospects for a European Common Intelligence Policy", Stud. Intel. Summer 2000, No 9:81-95, PDF [1.1MB*]

Viniar, Lester M, "With Rod & Reel in Afghanistan", Stud. Intel. V11:2-79-88 (Spring 1967) PDF [677.3KB*]

[Top of page]



W

"Waging Economic Warfare from London" by W. W. Rostow, Stud. Intel. V36:5-73-79 (1992) PDF [970.2KB*]
Role of OSS economists in deciding the bombing targets most likely to weaken and defeat Germany. Decisionmaking impacted by theory, bias, personality, rank, and "events."

Walker, Edward R.. Book review of The Mare's Nest by David Irving, Stud. Intel. V11:1-93-96 (Winter 1967) PDF [258.7KB*]

Waller, John H., "Reichsführer Himmler Pitches Washington", Stud. Intel. V46:1-31-38 (2002) PDF [455.5KB*]

Walsh, Maj. Gen. James H., "Strategic Thinking and Air Intelligence", Stud. Intel. V2:1-7-30 (Winter 1958) PDF [1.5MB*]

Walters, Lt. Gen. Vernon A. Book review of The Portuguese Connection by Air Commodore Roland Eugene Vintras, Stud. Intel. V18:4-59-60 (Winter 1974) PDF [123.0KB*]

Walters, Lt. Gen. Vernon A., "Thirtyfive Years in Intelligence", Stud. Intel. V20:2-45-59 (Summer 1976) PDF [962.0KB*]

Walters, Vernon A., "Dedicating the Berlin Wall Monument", Stud. Intel. V36:5-39-43 (1992) PDF [1.3MB*]

"Wanted: A Definition of 'Intelligence'" by Michael Warner, Stud. Intel. V46:3-15-22 (2202) PDF [3878.2KB*]
A delightful, erudite discussion of what a definition of "intelligence" should and should not include and some reasons why having a good definition is important.

"Wanted: a Word", Communication to the Editor by Gordon Cooperwood, Stud. Intel. V9:1-61 (Winter 1965) PDF [43KB*]
Asks reader help in finding a word that conveys less opprobrium to replace the term "defector."

"Wanted: An Integrated Counter-intelligence" by C. N. Geschwind, Stud. Intel. V7:3-15-37 (Summer 1963) PDF [1.3MB*]
Doctrinal treatise (1960s) posits that the USSR in Germany and elsewhere uses a massive coordinated security apparat to secure local control and undermine the West. The US-led counter-intelligence response--now weak and disorganized--must be reconfigured with greater unity, resources, and determination.

Ward, Steven R., "Evolution Beats Revolution in Analysis", Stud. Intel. V46:3-29-36 (2002) PDF [407.1KB*]

Waring, Avis
Vetterling, Philip, "Tonnage Through Tibet"

Wark, David L., "The Definition of Some Estimative Expressions", Stud. Intel. V8:4-67-80 (Fall 1964) PDF [608KB*]

Wark, Wesley, "The Intelligence Revolution and the Future", Stud. Intel. V37:5-9-16 (1994) PDF [1.3MB*]

Warner, John S., "The Watchdog Committee Question", Stud. Intel. V10:3-31-41 (Summer 1966) PDF [502KB*]

Warner, Michael. Book review of Intelligence in War: Knowledge of the Enemy from Napoleon to al-Qaeda by John Keegan., Stud. Intel. V48:2-67-69 (2004) PDF [30.0KB*]

Warner, Michael, "Origins of the Congress for Cultural Freedom, 1949-1950", Stud. Intel. V38:5-89-98 (1995) PDF [736.2KB*]

Warner, Michael, "The CIA's Internal Probe of the Bay of Pigs Affair", Stud. Intel. Winter 1998/99:92-101, PDF [736.8KB*]

Warner, Michael, "The Creation of the Central Intelligence Group", Stud. Intel. V39:5-111-120 (1996) PDF [806.4KB*]

Warner, Michael, "The Kaiser Sows Destruction", Stud. Intel. V46:1-3-9 (2002), PDF [383.9KB*]

Warner, Michael, "Wanted: A Definition of 'Intelligence'", Stud. Intel. V46:3-15-22 (2202) PDF [378.2KB*]

Warren, Ward, "The Historical Intelligence Collection", Stud. Intel. V37:5-91-94 (1994) PDF [593.4KB*]

Warren, Ward W. Book review of Of Spies and Lies: A CIA Lie Detector Remembers Vietnam, Stud. Intel. V47:1-79-80 (2003) PDF [93.4KB*]

Wasemiller, A. C., "The Anatomy of Counterintelligence", Stud. Intel. V13:1-9-24 (Winter 1969) PDF [921.8KB*]

Watanabe, Frank, "Fifteen Axioms for Intelligence Analysts", Stud. Intel. Semiannual Ed., No. 1, 1997: 45-47, PDF [234.8KB*]

"The Watchdog Committee Question" by John W. Warner, Stud. Intel. V10:3-31-41 (Summer 1966) PDF [502KB*]
Gives a history of Congressional consideration of the idea (to 1966) of establishing a joint committee to oversee CIA. Sets forth arguments for and, especially, against.

"A Watchman for All Seasons" by Euan G. Davis, Stud. Intel. V13:2-37-43 (Spring 1969) PDF [308.1KB*]
Mission, values, and analytic tradecraft of warning analysis specialists in the late 1960s, when they were known as indications analysts, including lessons learned from warning successes and failures.

Watson, Samuel J., "Presidential Transition" (Letters to the editor), Stud. Intel. Summer 2000, No 9:105-107, PDF [180KB*]

Watts, Larry L., "Intelligence Reform in Europe's Emerging Democracies", Stud. Intel. V48:1-11-25 (2004) PDF [766.4KB*]

"Ways to Make Analysis Relevant but Not Prescriptive" by Fulton T. Armstrong, Stud. Intel. V46:3-37-43 (2002) PDF [56.6KB*]
Explores the variety of meanings that attach to the phrase "national interests" and shows how the analyst's job of supporting policymakers is complicated by the difficulty of distinguishing between truly national interests and those that are more partisan or bureaucratic. Provides tips on how to remain relevant but avoid policy advocacy.

Webb, G. Gregg, "New Insights into J. Edgar Hoover's Role", Stud. Intel. V48:1-45-58 (2004) PDF [954KB*]

Weber, Ralph E., "America's First Encrypted Cable", Stud. Intel. V36:5-105-109 (1992) PDF [691.5KB*]

Weir, Leslie D., "Soviet Publicists Talk About U. S. Intelligence", Stud. Intel. V4:3-A19-A26 (Summer 1960) PDF [402KB*]

Weiss, Gus W., "The Farewell Dossier", Stud. Intel. V39:5-121-126 (1996) PDF [460.3KB*]

Westerfield, H. Bradford. Book review of Reflections of a Cold Warrior: From Yalta to the Bay of Pigs by Richard M. Bissell Jr., Stud. Intel. Winter 1998/99:103-111, PDF [645.6KB*]

"What Basic Intelligence Seeks To Do" by Joseph W. Martin, Stud. Intel. V14:2-103-113 (Fall 1970) PDF [564.4KB*]
Defines basic intelligence and discusses what its objectives and standards of quality should be (1970).

"What is a Generalist?" by Gordon M. Stewart, Stud. Intel. V2:3-1-6 (Summer 1958) PDF [302KB*]
Defining generalists as key people, explains why during the 1950s the Agency decided to look for generalists from among the ranks of case officers, analysts, and other experienced specialists, rather than to train a cadre of young officers selected early on to serve as generalists.

"What Size is It?" by Ralph S. Pearse, Stud. Intel. V15:1-53-65 (Winter 1971) PDF [792.2KB*]
Early history of CIA photo mensuration (1950s and 1960s).

"What To Do When Traditional Models Fail" by Carmen A. Medina, Stud. Intel. Unclass. Ed., V46:3-35-40 (2001) PDF [310.7KB*]
Argues that the decades-old model of intelligence analysis, which focused on explaining developments to policymakers in an objective, neutral fashion, is no longer valid. Suggests that analysts in the 21st century will need to concentrate more on seeking out the hard questions that decisionmakers have regarding how to implement policy, particularly in non-traditional areas rather than those involving customary political and economic questions.

"When Everything is Intelligence – Nothing is Intelligence" by Wilhelm Agrell, Kent Cen. Occ. Pap. 1:4-1-5 (October 2002) PDF [22.9KB*]

"When Jack Welch Was Deputy Director for Intelligence" by Zefram Cochran, Stud. Intel. V48:3-37-43 (2004) PDF [76.0KB*]
In the form of a fantasy, suggests how the management principles of Jack Welch, former head of General Electric, might be applied to improving the Directorate of Intelligence (DI). Stresses, in particular, those principles related to coping with change, breaking down organizational barriers, improving quality, training managers, and building expertise.

"Which Way Did They Go?" by Takemi Miyagi, Stud. Intel. V11:1-67-70 (Winter 1967) PDF [166.4KB*]
Describes employment of World War II Japanese intelligence functionaries in post war Japan, their return to intelligence before and during the Korean war; and police, CI, and commercial intelligence thereafter.

White, Jeffrey B., "Some Thoughts on Irregular Warfare", Stud. Intel. V39:5-51-59 (1996) PDF [630.2KB*]

Whitman, John, "Better an Office of Sovietology", Stud. Intel. V8:1-65-66 (Winter 1964) PDF [108KB*]

Whitman, John, "On Estimating Reactions", Stud. Intel. V9:3-1-6 (Summer 1965) PDF [292KB*]

Whitmire, Frank A., "The Failure of Cosmos 57", Stud. Intel. V10:3-25-29 (Summer 1966) PDF [166.8KB*]

"Why CIA Analysts Were So Doubtful About Vietnam" by Harold P. Ford, Stud. Intel. Semiannual Ed., No. 1, 1997: 85-95, PDF [949.4KB*]
A retrospective lesson (for analysts and intelligence managers as well as policymakers) on how good analysis can fail to have the necessary impact on policy. The author lists the reasons why CIA analysts were able to see the picture more clearly than did the policymakers and other observers, and the obstacles they encountered (including some of their own making).

Wiant, Jon A., "Reflections on Mail-Order Tradecraft", Stud. Intel. V37:5-59-61 (1994) PDF [395.4KB*]

"William Colby: Retrospect" by Harold P. Ford, Stud. Intel. Semiannual Ed., No. 1, 1997: 1-5, PDF [285.9KB*]
Tribute to the DCI (1973-1976), whose campaign for greater CIA openness failed to win support from the Nixon Administration, Congressional investigators bent on exaggerated past Agency wrongdoing, and former Directorate of Operations colleagues.

"William J. Donovan and the National Security" by Allen W. Dulles, Stud. Intel. V3:3-71-83 (Summer 1959) PDF [706KB*]
Personal tribute and summary of Colonel Donovan's life accomplishments, including his establishment and directorship of the Office of Strategic Services (OSS).

Williams, Josette H., "The Information War in the Pacific, 1945", Stud. Intel. V46:3-55-65 (2002) PDF [601.8KB*]

Wilson, John D., "At Work with Donovan", Stud. Intel. V37:5-71-79 (1994) PDF [1.3MB*]

Wilson, Lt. Gen. Samuel V.,"American Intelligence and the Tricentennial", Stud. Intel. V20:3-1-7 (Fall 1976) PDF [410.6KB*]

"Winnowing Wheat from Chaff" by James R. Shea, Stud. Intel. V13:4-19-23 (Fall 1969) PDF [243.4KB*]
Refining seismic detection and identification analysis to support the first nuclear test-ban treaty (1969).

Wisner, Frank G., "On The Craft of Intelligence", Stud. Intel. V8:1-A1-A16 (Winter 1964) PDF [808KB*]

"With Rod & Reel in Afghanistan" by Lester M. Viniar, Stud. Intel. V11:2-79-88 (Spring 1967) PDF [677.3KB*]
Recounts a jeep expedition north from Kabul into the Hindu Kush mountains to collect data on Soviet construction.

"With Vandenberg as DCI" by Arthur B. Darling, Stud. Intel. V12:3-79-98 (Summer 1968) PDF [1.3MB*]
Gen Vandenberg, the second DCI (1946-1947), slowly overcame the resistance of State, FBI, and the military services to establish the authority, budget, and personnel for the Central Intelligence Group (CIG) – including, with some clear limitations, for clandestine operations.

"With Vandenberg as DCI (Part II)" by Arthur B. Darling, Stud. Intel. V12:4-73-94 (Fall 1968) PDF [1.2MB*]

Wixson, Andrew, "Portrait of a Cuban Refugee", Stud. Intel. V8:3-35-41 (Summer 1964) PDF [365KB*]

Wolfe, Thomas W., "Obstacle Course for Attachés", Stud. Intel. V4:3-71-77 (Summer 1960) PDF [389KB*]

Wolseley, Major General Sir Garnet J., "The Intelligence Department", Stud. Intel. V7:4-A19-A24 (Fall 1963) PDF [278KB*]

Wong, J. N., "The Progress of Pinyin", Stud. Intel. V5:1-A35-A52 (Winter 1961) PDF [238KB*]

Wonus, M. C., "The Case of the SS-6, Stud. Intel. V13:1-25-31 (Winter 1969) PDF [432.9KB*]

Wood, Harry
Reiser, Donald, "Microtechnology"

Woolsey, R. James, "Honoring Two World War II Heroes", Stud. Intel. V38:5-27-36 (1995) PDF [737.3KB*]

"Words of Estimative Probability" by Sherman Kent, Stud. Intel. V8:4-49-65 (Fall 1964) PDF [770KB*]
Makes the case for logic and consistency in terms for conveying degrees of likelihood in estimative judgments. Sets forth the counter-arguments of those who prefer maximum leeway in selecting estimative terms. Explains why the argument between the so-called mathematicians and poets is difficult to resolve.

"Work With Walk-ins" by Ivan A. Serov, Stud. Intel. V8:1-16-47 (Winter 1964) PDF [1.8MB*]
Soviet 1962 training manual on doctrine and tradecraft for dealing with write-ins and walk-ins, stressing that probing for possession of valuable information is paramount concern.

Wright, George W., "Toward a Federal Intelligence Memory", Stud. Intel. V2:3-7-22 (Summer 1958) PDF [873KB*]

Wylie, Amos K., "Unfair Exchange", Stud. Intel. V6:4-9-15 (Fall 1962) PDF [378KB*]

[Top of page]



Y

"The Yale Report" by Sherman Kent, Stud. Intel. V17:2-7-21 (Summer 1973) PDF [962.2KB*]
Reflections on how and why classified military information becomes public knowledge while remaining classified within the government, with an illustrative anecdote from the 1950s that shows how DCI Smith overcame military objections to doing estimates of enemy intentions with "own forces" data.

"Yesterday's Weapons Tomorrow" by Dwayne Anderson, Stud. Intel. V9:4-13-17 (Fall 1965) PDF [225KB*]
Sketches the war-fighting limitations of advanced weaponry, particularly in less than total war, and the advantages of traditional weapons. Suggests more intelligence attention needs to be paid to the latter as a result.

"The Yo-Yo Story" by Charles R. Ahern, Stud. Intel. V5:1-11-23 (Winter 1961) PDF [707KB*]
Case study of successful teamwork among Intellgience Community (IC) collectors, debriefers, analysts and engineers to detect, collect, analyze and reverse-engineer an early Soviet air defense system (1950s)

[Top of page]



Z

Zabetakis, Stanley G., "The Diyarbkir Radar", Stud. Intel. V8:4-41-47 (Fall 1964) PDF [303KB*]

Zall, Linda
see Woolsey, R. James, "Honoring Two World War II Heroes"

"Zanzibar Revisited" by Helen-Louise Hunter, Stud. Intel. V11:2-1-7 (Spring 1967) PDF [362.6KB*]
After analysts, with only rumors and speculation to go on, miscall a surprise coup in an obscure capital, researchers set the record straight with new sources and new hypotheses.

Zivich, Edward M., "Intelligence Story in Three Parts", Stud. Intel. V9:4:75-76 (Fall 1965) PDF [70KB*]

Zlotnick, Jack, "Bayes' Theorem for Intelligence Analysis", Stud. Intel. V16:2-43-52 (Spring 1972) PDF [476.0KB*]

Zlotnick, Jack, " A Theorem for Prediction", Stud. Intel. V11:4-1-12 (Winter 1967) PDF [604.5KB*]

Zorn, E. L., "Israel's Quest for Satellite Intelligence", Stud. Intel. Winter/Spring 2001, No. 10:33-38, PDF [489.1KB*]



[Top of page]





* Adobe® Reader® is needed to view Adobe PDF files. If you don't already have Adobe Reader installed, you may download the current version at www.adobe.com (opens in a new window). [external link disclaimer]


Posted: Apr 26, 2007 05:54 PM
Last Updated: Mar 18, 2013 08:18 PM