The Many Burdens of Defense in the Soviet Union, Rush V. Greenslade. Those who have followed the writings and estimates on Soviet military expenditures over the years are aware of considerable difference of opinion as to how much of a burden on the Soviet economy military programs are and as to the correct way to measure the burden. Ways of measuring burden have, indeed, proliferated in recent years. To illustrate this point, consider the following statements, all of which have been used to express the burden of defense on the Soviet economy...
The Lessons of the September 30 Affair, Richard Cabot Howland. He is dead now, but his mad rhetoric still echoes in the mind for those who were there. Speech after speech, Sukarno's cadence set the rhythm for our work and our lives in that long summer of 1965. We battened down the Embassy hatches and waited, straining to fathom his purpose and predict his next move. One after another, faster and faster, the PKI's enemies were over-run; the domino theory was being tested before our eyes. "All of history," Emerson once wrote, "stands in the long shadow of one man." So too did Indonesia by September 30 of that year ... until the last domino refused to fall...
Communist Defense Against Aerial Surveillance in Southeast Asia, Edward F. Puchalla. The art of deceiving or confusing aerial surveillance is virtually as old as the airplane. Techniques of deception developed greatly during World War II when all parties devoted considerable efforts to concealing or disguising troops, weapons, industries, and even cities. In the Far Eastern conflicts of the past two decades, less sophisticated, but nevertheless serviceable techniques have been employed to the same ends. In particular, the war in Southeast Asia has produced extensive and at times ingenious attempts at deception...
Some Limitations in Systems Analysis in Intelligence Activities, R.C. Shreckengost. The procedure to be followed in using operations research or systems analysis techniques to identify optimal actions in large, complex systems is somewhat akin to the recipe for tiger soup, i.e., take one tiger. . . . If consistent and well-behaved values and objectives are at hand the analyst may then proceed to apply the art to achieve an optimal concoction. Unfortunately, the multitudinous values generally required to explore fully the optimum allocation of resources among diverse intelligence tasks and responsibilities are as critical to the process as the tiger to tiger soup—but far more difficult to bag, assuming that a suitable set of values even exists...
What Basic Intelligence Seeks To Do, Joseph W. Martin. This paper seeks to open a discussion of basic intelligence doctrine: that is, of the objectives this type of intelligence should aim at and of the standards by which effective performance in it should be judged. This kind of discussion—which, I believe, was one of the things Studies in Intelligence was originally founded for—is not likely to end in full agreement but, as experience with other types of intelligence has shown, does offer the prospect of reducing the area of disagreement and making the product more sophisticated and more useful to the consumer...
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.