Online Book Reader

Home Category

Intelligence_ From Secrets to Policy - Mark M. Lowenthal [257]

By Root 787 0
Post-cold war; Soviet Union

British intelligence

collapse of Soviet Union

containment policy

covert action

defense expenditures

difficulty of the Soviet target

ends vs. means

espionage

global source of intelligence and

imagery

indications and warning

influence on U.S. intelligence

intelligence implications of containment

intelligence priorities

Korea and

legacy of

lessons from

moral issues

National Security Act of 1947 and

open-source intelligence

primacy of Soviet issue

Soviet defense spending

Soviet military capabilities

Soviet strategic forces

statistical intelligence

technical collection costs

Collection. See also Collection disciplines

analysis-driven

budget

capabilities in

completing priorities

composition of the ITs

costs of

covert action and

denial and deception

downstream activities

ethical and moral issues

of foreign economic intelligence

of information

intelligence and

long lead times

opacity of intelligence

policy and intelligence

processing and exploitation imbalance

protecting sources and methods

reconnaissance, post-cold war

reform

reliance on technology

satellite limitations

stovepipes problem

swarm ball

synergy

systems development and

themes in

vacuum cleaner problem

Collection disciplines. See also Collection

comparison of

human intelligence

imagery

measurement and signatures intelligence

open-source intelligence

signals intelligence

strengths and weaknesses

Colombia

Combatant Commands (CoComs)

Combest, Larry

COMINT (communications intelligence)

Commerce Department

Commercial attaches

Commercial imagery

Committee on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. See WMD Commission

Communications intelligence (COMINT)

Compartmented systems

Competition among agencies. See Stovepipes

Competitive analysis

Competitive intelligence exercises

Computer network attack (CNA)

Computer network exploitation (CNE)

Computer networks

Confidence levels

CONFIDENTIAL classification

Congress. See also Congressional oversight; Intelligence Committees

covert action and

jurisdiction

leaks

national security policy and

polygraphs

select committees

Torricelli case and

USDI and

Congressional oversight. See also Congress

bipartisan vs. partisan committees

budget process

committee turf

competition within the congressional agenda

constitutional mandate for

co-option

creation of intelligence committees

executive oversight vs.

extent of oversight

external factors

hearings

“hostages”

intelligence budget

intelligence judged by Congress

intelligence oversight committees

internal dynamics of

investigations and reports

issues in

limits of

nominations

price of oversight failures

prior notice of covert action

regulating the intelligence community·

reporting requirements

role of

secrecy and

supplemental appropriations

term limits

treaties

Congress Research Service

“Connecting the dots”

Constitution, U.S.

Consumer-producer relations

Consumers Guide to Intelligence

Consumption. See Dissemination and consumption

Containment

Content analysis

Contras

analysis of

covert action and

funding of

paramilitary operations and

Reagan administration and

Conventional wisdom

Co-option

Coordinator of Information (COI)

CORONA satellite

Council on Foreign Relations Independent Task Force (1996)

Counter Communications System

Counterespionage

Counterintelligence

Ames spy case

China

CIA and

collection and

damage assessments

defined

double agents

external indicators and counterespionage

France

HUMINT and

India

internal safeguards

Israel

Japan

leaks

National Security Branch (FBI) and

polygraphs

problems in

redundancy in

“responsibility to provide”

Return Main Page Previous Page Next Page

®Online Book Reader