Technical Factors in Aerospace Photography, John W. Cain. Aerial photography has been recognized since World War II as a prime means for acquiring intelligence; detailed analysis of the camera's faithful and permanent record of what falls within its view produces information of unusually high reliability. In recent years its product has been particularly valuable, and an insight into some of the technical factors involved in getting high-quality aerial photographs may be helpful to those in the intelligence community who make use of the resulting information...
An Idiot System for Intelligence, Harry Hopkinson. The Air Force Inspector General, in February of 1962, remarked that "a serious weakness in our system permits individuals, without proper training and experience, to exercise judgment beyond their capabilities." He was talking about the Air Force, not intelligence, but do we in intelligence occasionally see a glimmer of this truth breaking up through our own silver-lined cloud layer like a forming thunderhead? Armed forces world wide all have a bit of the idiot system rules prescribed by geniuses for idiots to follow-built into their normal operating procedures, for good reason; and it may be that something not quite the same but analogous to it has a place in the collation of raw intelligence data...
Some Far-Out Thoughts on Computers, Orrin Clotworthy. Question: What does the size of the next coffee crop, bullfight attendance figures, local newspaper coverage of UN matters, the birth rate, the mean daily temperatures or refrigerator sales across the country have to do with who will next be elected president of Guatemala?...
The Scientific Intelligencer, R.V. Jones. The devices of Archimedes in the defence of Syracuse gave an earnest of what would happen in warfare as scientific knowledge expanded; and, although it has taken a long time to come, we have seen in this century a complete change in weapons brought about by the application of science. The classic principles of war still apply to the new weapons, of course, and one of the first of these principles dictates that you should establish the intentions of your enemy. In the modern situation, this principle has a new application: it is now vital that you should anticipate your opponent's use of science in warfare, and a need has thus arisen for scientific intelligence...
Captain Stephen Kalman: A Classic Write-In Case. The agent of an adversary service, or a person high in an adversary bureaucracy, if he wishes to make contact with another intelligence or security service, can choose from a number of different means. He can present himself physically as a walk-in. He can use an intermediary in order to retain some control, especially with respect to his own identity. He can send a messenger, make a phone call, or establish a radio contact. Or he can simply write a letter, anonymous or signed...
The Eastern Front at the Turning Point. In December 1941, after General Winter had pinched out Hitler's spectacular six-month Russian onslaught just short of its objectives-Leningrad, Moscow, and the Donetz basin--and on the other side of the globe Pearl Harbor had brought America into the war at last, the question before the world was whether the hitherto invincible and still mighty German armies, when they renewed their offensive in the spring, could finish off the Russians and turn west again before the United States had time to gather the strength to be felt across two oceans...
The Practice of a Prophet. The public examination last year of the Lonsdale-Kroger-Houghton-Gee case of Soviet espionage in England and its parallels with the Abel-Hayhanen case in the United States bring to mind an earlier rather full public exposure of postwar Soviet espionage that was given a great deal of attention in the target country but is little remembered here--that of Ernst Hilding Andersson, whose skill, ingenuity, and devoted diligence gave the USSR a series of prize reports on Swedish naval defenses from 1949 to 1951...
Book review by Anonymous of Kontact med England (1940-1943) and Hemmelig Alliance (1943-1945) by Jorgen Haestrup. Here is a chronological analysis of the Danish underground movement during the Nazi occupation unique in its scholarship, objectivity, and comprehensive treatment. Aided by redoubtable Danish historians and archivists, the author has collected and researched a remarkable quantity of authentic source material and documentation, meticulously and impartially screening it to establish a factual historical record. The resulting account of the Danish resistance, covering practically all phases of its intelligence and other clandestine activity, is so replete with checked and double-checked detail that it may lack appeal for the general public...
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.