Online Book Reader

Home Category

Intelligence_ From Secrets to Policy - Mark M. Lowenthal [255]

By Root 627 0
terrorism

Africa

Agencies. See Intelligence agencies

Agent acquisition cycle

Agriculture Department

AIDS

Air-breathing systems

Air Force

Algeria

Ali, Sayyid Saber

Alien and Sedition Acts of 1798

Allende, Salvador

All-source intelligence

al Qaeda

in Afghanistan

assassination and

avoiding detection and

communications and

renditions and

Taliban and

use of imagery on

Alternative analysis

Ambassadors

American Israel Public Affairs Committee (AIPAC)

Ames, Aldrich

damage assessment

HUMINT and

oversight failure

polygraph test

Russian intelligence and

Analysis. See also Analysts

alternative analysis

analytical stovepipes

analytic penetration

assessment of

briefings

competitive analysis. See Competitive analysis

counterintelligence

cooperative vs. competitive analysis

crises vs. the norm

current vs. long-term intelligence

dependence on data

estimates

ethical and moral issues

indications and warning

issues in

layering

limited information for

metaphors

“on the ground knowledge”

opportunity analysis

policy makers and intelligence

politicized intelligence

pressure from policy makers

production and

redundancy of structure

reform

relationship with covert action

requirements of

standards

themes in

uncertainty in

wheat vs. chaff problem

Analysis-driven collection

Analyst agility

Analyst fungibility

Analysts

agility·

altering intelligence

career tracks

clientism and

collection priorities and

credibility of

dealing with limited information

ethics and options

fungibility

global coverage

gifted

management of

mind-sets of

mirror imaging and

objectivity of

promotion of

resignation of

stovepipes

training of

Analytical stovepipes

Analytic penetration

Analytic Resources Catalog

Analytic transformation

Angleton, James

Angola

A not A (appropriated but not authorized)

Anthrax

Anti-satellite (ASAT) weapons

Appropriated but not authorized (A not A)

Appropriation Committees

Appropriations

Argentina

Armed Services Committees

Arms control

Army Field Manual

Army War College

ASAT (anti-satellite) weapons

Asia

Aspin, Les

Aspin-Brown Commission (1996)

Assassination

ban of

British intelligence

ethical and moral issues

Hitler and

Israeli intelligence

Russian intelligence

terrorism and

Asset validation system

Assistant Attorney General for National Security

Attorney general

Australia

Austria-Hungary

Authorization

Authorization bills

Automatic change extraction

B


Backscratching

Baker, James

Balkans task force

Baseball fields

Battle damage assessment (BDA)

Barak, Ehud

Barry, James

Bay of Pigs

covert action during

failures in

intelligence analysis of

BDA (battle damage assessment)

Bean counting

Belgium

Berlin Wall

Berra, Yogi

Best, Richard, Jr.

Big “CI”

bin Laden, Osama

Biological weapons

Bioterror

Blair, Tony

Black, J. Cofer

Black September

Blake, George

Blowback

Boeing Company

Boland, Edward

Boland amendments

Bolton, John

Boren, David

Boren-McCurdy (1993)

Bosnia

Brandt, Willy

Brazil

Briefings

Britain See also British intelligence

evaluation as threat

imagery and

intelligence experience

Iraq commission

politicization and

slavery and

terrorist attack in London (2005)

weaknesses of intelligence analysis

British intelligence. See also Britain

analysts’ options in

covert action and

experience

foreign intelligence services

imagery and

influence on national intelligence

spying and

British Ordinance Survey

British Special Air Services (SAS)

British Special Boat Services (SBS)

Brown, Gordon

Budget

classification costs

collections

congressional process

covert action

defense budget

hollow budget authority

intelligence

Return Main Page Previous Page Next Page

®Online Book Reader