Secrecy and Intelligence in a Free Society, James E. Knott. In discussing what I believe to be the major areas of concern that our free society has evinced regarding secrecy and intelligence, I hope to make it clear that I feel there are no final answers. They are not problems that can be solved; they are focal points that will demand continuing attention in pursuit of a balance which must be worked out between the opposing factors...
The Case for a Holistic Intelligence, Lloyd F. Jordan. The central thesis of this paper is that the increasing complexity of national security problems requires that the Central Intelligence Agency adopt a new approach to intelligence analysis. This approach requires that intelligence problems which have important political, economic, scientific, military, and other salient dimensions be treated in a manner that will assure from the outset that the interplay of these various factors is taken fully into account. Since this thesis is based upon a belief that the separate treatment of each of these factors is inadequate because the problem as a whole is more than just the sum of its parts, it can be referred to as a holistic approach. The finished intelligence product of such an approach would be qualitatively more than the mere sum of its parts by virtue of an extra dimension provided by their integration at every stage of research — from the development of the research design to the completion of the analysis...
Another View of S&T Analysis, Donald C. Brown. It was with a feeling akin to deja vu that I read Dr. Clark's article. What he describes is very familiar, but it just isn't the S&T intelligence that I know...
Inside the Company: CIA Diary by Philip Agee. (Penguin Books, 1975.) Philip Agee's 600-page story of his career and views as a junior and middle-level case officer in Quito, Montevideo, and Mexico City will anger all those who have worked for the Central Intelligence Agency because he is its first real defector in the classic sense of the word. Though it is unlikely that he could be successfully prosecuted in a cold or at least cooling war, in a hotter context Agee would fall into the area which the Constitution, speaking of enemies in time of war, defines as "giving them aid and comfort." In any case Inside the Company: CIA Diary will certainly give aid and comfort to any one looking for concrete and heretofore classified information about some aspects of the Clandestine Service. Unlike previous information about CIA operations made available by Victor Marchetti and others who have claimed to have had the best interests of the country at heart, this book aims, Mr. Agee says, to get "useful information on the CIA to revolutionary organizations that could use it." ...
THE SHADOW WAR: EUROPEAN RESISTANCE 1939-1945. By Henri Michel.(Harper and Row, New York, 416 pp.) This is the first publication in English of any major work by Professor Henri Michel.* He is an indefatigable worker, with a lengthy list of titles to his credit, by himself or as editor or co-author, to say nothing of numerous periodical articles...
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.