Career Trainee Program, GRU Style, Richard Framingham. By consolidating information derived from a number of different Soviet sources, it has been possible to reconstruct the process Soviet intelligence uses to spot, screen, train, and assign case officers. The procedures herein outlined had their beginnings in the mid-1940's, were generally established by the mid-1950's, and to our knowledge remained substantially in effect as late as 1961 and projected at least to 1964. The system described is that of the GRU, the military intelligence organization. State Security, the KGB, operates separate but similar machinery, in addition to having a hand, as we shall see, in the GRU's...
Military Intelligence 1861-63: Part II, Edwin C. Fishel. The few historians who have thought seriously about Civil War intelligence have generally concluded that it left much to be desired. They are near the truth, though not necessarily for the right reason. The belief held by some that intelligence in that war was more than ordinarily laden with error is an example of a wrong reason. Another is the assumption that it was seldom of much influence in battlefield decisions. The valid reason for deprecating Civil War intelligence is the limited scope of both the Northern and the Southern effort. Intelligence was not pursued on a scale that seems commensurate with the size and desperateness of the conflict. What was pursued was almost altogether military, and even the military sector was not fully covered: strategic intelligence was severely subordinated to the tactical...
The Investigation of UFO's, Hector Quintanilla, Jr. Unidentified flying objects are not a new phenomenon. In 593 B.C. Ezekiel recorded a whirlwind to the north which appeared as a fiery sphere. In 1254 at Saint Albans Abbey, when the moon was eight days old, there appeared in the sky a ship elegantly shaped, well equipped and of marvelous color. In 1520 in France there were sighted a round-shaped object with rotating lights and two fiery suns. In 1874 in Texas a farmer reported seeing a dark flying object in the shape of a disc cruising in the sky at a wonderful speed. These are a mere sampling of the many such events recorded by historians. The modern era of UFOs, however, can be dated from 24 June 1947, when a flyer made some strange observations which national news coverage and authors with a poetic license so played up as to excite public entertainment of a notion that our planet had been visited by unknown vehicles from outer space...
Military-Economic Estimating: A Positive View, Julie O. Kerlin. In an article entitled "Economic Intelligence in Defense Planning" in a recent issue of this journal,1 Colonel Clyde C. Wooten examines aspects of the economico-military research done on the Soviet Union as input to systems analysis of U.S. defense needs. He concludes with some exasperation that the data are unusable, the methodology questionable, and the product spurious.2 In this essay we shall examine the character of the product and show that in the process an intelligent methodology provides a logical ordering for data which are indeed sparse but which can be used to advantage in place of an otherwise unknown, intuitive input into military judgments. Military plans must reflect, among other factors, judgments concerning the potential enemy; exposing the basis for these judgments and putting the data into logical array improves the plans and provides flexibility through control of changes in the data.
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.