Tonnage Through Tibet, by Philip Vetterling and Avis Waring. A more than routine interest has recently been focused on problems of highway logistics by the Communist Chinese threat along the northeastern border of India. The magnitude of this threat depends in large part on the Chinese ability to move military supplies by road from railheads deep in China to the areas of conflict; air transport, the only alternative, is at present not available to the Chinese in significant capacity...
The Theory and Practice of Soviet Intelligence, Alexander Orlov. Like the Western intelligence services, the Russians get information about foreign states from two principal sources, from secret informants and undercover agents and from legitimate sources such as military and scientific journals, published reference material, and records of parliamentary debates. But the Russians regard as true intelligence (razvedka) only the first type of information, that procured by undercover agents and secret informants in defiance of the laws of the foreign country in which they operate. Information obtained from legitimate sources and publications they consider mere research data. In the eyes of Russian officers it takes a real man to do the creative and highly dangerous work of underground intelligence on foreign soil, while the digging up of research data in the safety of the home office or library can be left to women or young lieutenants just beginning their careers. The Western intelligence services, on the other hand, treat both types of information as intelligence, often with a much higher regard for research than for undercover work...
Countersabotage--a Counterintelligence Function, Eric W. Timm. Counterintelligence in its most elementary form creates channels through which enemy agents must pass. Port security control, censorship, and interrogation camps for prisoners of war are such channels. These control channels, however, can be made effective only when the enemy's potential and our own situation have been analyzed and the balance struck between hostile forces and friendly facilities.
Memoranda for the President: Sunrise. Among the William J. Donovan papers are five volumes entitled OSS Reports to the White House containing carbons of memoranda predominantly transmitting or paraphrasing intelligence reports for the President's personal attention. They are characteristically introduced by a note to the President's secretary, Miss Grace Tully: "Dear Grace: Will you please hand the attached memorandum to the President? I believe it will be of interest to him."
Operation Uproot, Frantisek Moravec. As Hitler's forces occupied one after another of the countries of Europe from 1939 through 1941, refugee officials from many of them assembled in London and formed governments in exile or liberation organs which tried among other things to organize intelligence activities. They were handicapped in this by having lost all the assets--agents, files, communications--of their pre-occupation intelligence organizations. They had to start from scratch, and with almost exclusively amateur staff personnel...
Lieutenant John A. Hurley's article, "A Technique for Coastal Infiltration," in the summer 1962 issue of this journal, suggested the application of the buoyant ascent escape technique to the debarking of agent personnel from a submarine submerged off the coast. He was apparently unaware that such an application has been made in practice, that in fact Marine Corps reconnaissance teams have been using the technique successfully in training exercises since 1958. These exercises were made public in the excellent CBS television presentation "The New Marine," shown on "Twentieth Century" in February 1961...
Intelligence in Recent Public Literature. This is the best comprehensive account of U.S. antisubmarine operations in World War II that has come to this reviewer's attention, putting many aspects of them into print for the first time. It is based upon meticulous research into a wide range of source material, including U.S. Navy and captured German Admiralty documents and records, and just about everything that has been published on the subject.2 The main criticism that can be directed at the book arises from the author's dramatic compulsions, the most annoying of which is to portray the good guys as supermen and the bad guys as villains...
The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).
We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.
Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.
Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.
Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or "4-1-9" Fraud scheme.
If you have information which you believe might be of interest to the CIA in pursuit of the CIA's foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program —
Contact Us Form
The United States and its partners continue to face a
growing number of global threats and challenges. The CIA’s mission
includes collecting and analyzing information about high priority
national security issues such as international terrorism, the
proliferation of weapons of mass destruction, cyber attacks,
international organized crime and narcotics trafficking, regional
conflicts, counterintelligence threats, and the effects of environmental
and natural disasters.
These challenges are international in scope and are priorities for
the Central Intelligence Agency. If you have information about these or
other national security challenges, please provide it through our secure
online form. The information you provide will be protected and
confidential. The CIA is particularly interested in information about
imminent or planned terrorist attacks. In cases where an imminent
threat exists, immediately contact your local law enforcement agencies
and provide them with the threat information.