The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.
Priority National Intelligence Objectives, Montague, Ludwell L. Clyde Heffter, in the "Fresh Look at Collection Requirements" which he takes in a recent issue of the Studies,1 notes the "conspicuous hiatus" between such high-level guidance documents as Director of Central Intelligence Directive 1/3, Priority National Intelligence Objectives, and the collection requirements actually produced at the working level, particularly with respect to the question of determining relative priorities among such requirements. He invites discussion of the problem of "how to formulate needs and priorities in such a way as to facilitate the satisfaction of needs in a degree roughly proportionate to their priorities, through the most effective use of the collection means available." ...
Intelligence Photography, Kenneth E. Bofrone. In the days and months after the Nazi blitzkrieg suddenly overran France, British topographic intelligence, ill prepared to support the evacuation at Dunkirk and subsequent raids on the French coast, resorted to photo intelligence from post cards; travel folders and brochures, and tourist snapshots collected by public appeal.1 That they were driven to this kind of improvisation illustrates the wisdom of building up in advance an intelligence photo collection even on objects and areas where no intelligence need is foreseen. It also shows that casual photos taken without any regard to the requirements of a photo interpreter can be useful. Nevertheless their usefulness is increased and the interpreter's work eased in proportion as his requirements-most of them stemming from his need to take measurements-are fulfilled ...
Snapshots at Random, Jane Schnell. Everyone who has taken photographs in a foreign country has collected potential ground photographic intelligence. The traveler turns his camera upon anything that excites his interest -- the civil engineer on peculiarities in the construction of dams, roads, bridges, and city buildings; a woman perhaps on clothing, jewelry, and hair styles; a doctor on things related to disease and therapy; a farmer on crops and tools and methods of farming. The more widely traveled the man behind the camera and the broader his interests, the more discriminating he is likely to be in photographing subject matter peculiar to a particular place. But the potential intelligence thus collected is often lost; there are two minimum requirements for transforming it into actual photo intelligence. One is that the pictures must be identified, at least by the name of the place or subject, the direction the camera was facing, and the date. The other is that they must get to the market ...
Human Scent and Its Detection, Spencer Tebrich. The olfactory sensibilities of dogs have made them a useful adjunct of intelligence and security services for as long as such services have existed. In World War II the German and currently several East European counterintelligence organizations have made notably regular use of them for tracking and identifying suspects, fugitives, and subjects of surveillance. It is curious that this anachronistic animate operational aid has simply been accepted into the age of science and technology without much effort to discover whether it could be replaced or improved upon, to define its precise capabilities with a view to countermeasures, or even to determine how it really works. The very familiarity of the fact that a dog can detect a man's odor from a considerable distance and can also distinguish one person from another by odor alone may explain why there has been little serious consideration of the parameters of the dog's capabilities or what it is about a human being that he smells ...
Cover: Property Restitution, Frederick D. Barathy. Of the many opportunities presented Soviet intelligence in the early postwar years to work unhampered in the Allied occupation zones of Germany, probably none was more nearly ideal than that offered by the large, unprecedented program for the return of confiscated property from the U.S. zone, under which the Military Government played helpful host to restitution missions from the countries looted by the Nazis, including those of the Soviet Bloc, from late in 1945 to June of 1949. Although virtually no instances of intelligence activity were detected, the presumption remains, reinforced by certain indications, that the Soviets took full advantage of the situation. The obverse opportunities, on the other hand, for U.S. intelligence recruitment of Bloc mission members apparently went unexploited ...
Inside Darkest John, Alfred Paumier. Dear Sirs: In "The Defections of Dr. John,"1 Delmege Trimble provided us with an intriguing recital of facts but with only clues about their causes. Probing of the wellsprings of John's defection and redefection is necessary because of the wounds already inflicted by turncoats on the Western body politic and the menacing likelihood of deeper cuts to come unless we learn to detect betrayal before it is unsheathed ...
"Truth" Drugs in Interrogation, George Bimmerle. The search for effective aids to interrogation is probably as old as man's need to obtain information from an uncooperative source and as persistent as his impatience to shortcut any tortuous path. In the annals of police investigation, physical coercion has at times been substituted for painstaking and time-consuming inquiry in the belief that direct methods produce quick results. Sir James Stephens, writing in 1883, rationalizes a grisly example of "third degree" practices by the police of India: "It is far pleasanter to sit comfortably in the shade rubbing red pepper in a poor devil's eyes than to go about in the sun hunting up evidence." ...
Impunity of Agents in International Law, M. C. Miskovsky. International rules and institutions have existed since the earliest days, but it was not until the 16th and 17th centuries that there were developed the laws governing relations between European states which became the basis of our present-day international law. The disintegration of the Holy Roman Empire and the emergence of sovereign states representing great concentrations of military, economic, and political power led to the development or formulation of new rules by which nations sought to govern their dealings with one another. At the same time the concept of sovereignty as a power constituting the sole source of laws was enunciated, and with it an explanation of the concept of the nation. ...
Operation Columba, T. J. Betts. In early March 1944, when SHAEF staff in London was beginning to go all out with preparations for the June invasion of Normandy, we in G-2 were approached by a group of British pigeon fanciers determined to volunteer to intelligence the services of their pigeons. Their argument was simple: they bred carrier pigeons which were guaranteed to return to their owners' lofts; could we not use these birds in some way to bring information back from Europe? ...
English Mission, H.H.Cooper. It is generally realized that the Jesuits of the renaissance were adept in the conduct of affairs requiring secrecy. But knowledge of the clandestine methods they used is not general, even among intelligence officers whose experience would give them a special appreciation of the subject. Considerable insight into these methods is offered in a priest's own narrative of his experiences operating underground in Elizabethan England. Written in Latin after his mission was completed, the book was made accessible to modern English readers ten years ago.1 Its highlights can be quickly summarized ...
Public Texts in Intelligence (1961), Walter Pforzheimer. Unclassified writings on an activity so well protected from public inquiry as intelligence must necessarily show great deficiencies when assessed as material for professional reading. Some number of the thousands of books published in this field have professional value, to be sure, but many of these are devoted to recording the story of particular individuals or isolated episodes rather than to a study of the nature or the history of intelligence.