Developments in Air Targeting: The Air Battle Model, Robert H. Adams. In pursuit of its basic objective, the assessment of enemy strengths as targets for US air action, air targeting is developing a series of mechanized analytical techniques as an aid to its intelligence production. The Military Resources Model, described in the Winter 1958 issue of Studies in Intelligence, is intended to provide estimates of capabilities to build up or mobilize military resources for war or to recuperate from attack. The Air Battle Model, described here, will provide estimates of capabilities to carry out war plans in the face of opposing offensive and defensive air operations ...
Some Views on the Theory and Practice of Intelligence Collection, Stanley E. Smigel. Intelligence collection as here discussed is a broad service and support activity. Its principal service, of course, is procurement of material for the intelligence analyst-producer's mill. To meet this responsibility, intelligence collection seeks out information on countless facets of subjects political, economic, scientific, cultural and military. In form this information may be press clippings, books, reports, maps, photos, samples of grain or oil, radios or machine tools, identity documents, or reproductions of industrial markings ...
Periodic Reports by Industrial Groups as Sources of Intelligence Information, Charles H. Helsper. The major part of the world's economic and industrial activity is conducted by corporations, combines, associations, and other industrial-commercial groups which possess a corporate identity, engage in corporate action, and pursue corporate objectives. These identities, actions, and objectives are in aggregate decisive for the course of the free economies and not without influence in the controlled ones. Yet the intelligence community, for all the enormous effort it devotes to acquiring economic data, has not addressed itself to the systematic study of industry at the corporate level ...
Coexistence and Covert Collection, George Romano. The collection of intelligence information is greatly influenced in its purposes and methods by the state of international affairs; changes in the world situation can create or improve certain opportunities for collection and diminish or even deny others, while shifts in world opinion may seriously affect the advisability of undertaking particular types of intelligence activities. The present time is one of rapid change in world affairs; in general it provides expanding opportunities for collection operations abroad, but at the same time it renders the exposure of these operations by the opposition more damaging than before to our national interest ...
Conditioned Reflex, Drugs and Hypnosis in Communist Interrogations, Leonard Hilden
The dramatic confessions of persons brought to trial by the Communists and the pro-Communist sentiments expressed by some Americans released from Communist prisons have led to much speculation about Communist use of Pavlovian conditioning techniques, drugs, hypnosis, and other exotic means of controlling human behavior. This speculation presupposes that behavioral scientists participate in the formulation and development of Communist control methods ...
The Operational Potential of Subliminal Perception, Richard Gafford. Perception is demonstrated to have occurred below the threshold of conscious sensory experience when a person responds to a stimulus too weak in intensity or too short in duration for him to be aware of it. Individual behavior without awareness of the stimulus, of which subliminal perception is a subtype, has been a subject of study in psychological laboratories for at least 70 years, and a great deal of technical data has been collected on the subject. Recently it has been associated with some theories of depth analysis and popularized for possible commercial exploitation by the advertising world ...
The Dust That Isn't There, George A. Pughe. A rash of articles has recently appeared, both in the daily press and in such a distinguished source as the Federal Bar Journal,1 expressing deep concern over our failure to exploit Soviet and Satellite publications, especially the Soviet scientific and technical literature. With extraordinary uniformity these articles point out that although the Library of Congress "receives between 20 and 30 thousand Soviet publications annually, they are simply gathering dust on the shelves of the Library." The same articles note by way of contrast that the USSR's All-Union Institute for Scientific Documentation (VNICI), located in Moscow, has a permanent staff of 2,300 employees who screen and abstract or translate over 11,000 periodicals (largely U.S. and U.K. publications, but including also those produced in the USSR itself) in 85 different languages and publish 15 comprehensive abstract journals in the physical, natural, biological, and earth sciences ...
Intelligence as a Science, R.A. Random. Some writers on intelligence problems suggest that intelligence is a science or at leas should be made one. This article examines the question and discusses its practical implications...
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.