Intelligence_ From Secrets to Policy - Mark M. Lowenthal [267]
rendition
SIGINT and
threat-based foreign policy and
threat of
Terrorism Threat Integration Center. See TT1C
Terrorist attacks (2001) . See also 9/11 Commission
assassination and
budget and
collection and
compared with Pearl Harbor
covert action and
development of intelligence and
lessons of
reform and
as strategic surprise
as tactical surprise
technology
terrorism as new agenda
Terrorist Threat to the Homeland. The
Tet offensive
Thailand
Thinking in Time. The Uses of History for Decision Makers (May & Neustadt)
Third option
Threat List
TIARA (tactical intelligence and related activities)
Title 10 prerogatives
TOP SECRET classification
TOP SECRET/CODEWORD classification
TOR (terms of reference)
Torricelli, Robert
Torture. See Renditions and torture
Tower Commission (1987)
TPEDs (Tasking, Processing, Exploitation, and Dissemination)
Trade embargo
Traffic analysis
Transnational issues
Treasury Department
Treaties. See also specific treaties
Trotsky, Leon
Truman, Harry S.
Truth-telling
TTIC (Terrorism Threat Integration Center). See also NCTC (National Counterterrorism Center)
TUAVs (tactical UAVs)
Turkey
Turning agents
Twain, Mark
Tyranny of ad hocs
U
UAVs (unmanned aerial vehicles)
DOD and
imagery and
non-U.S.
use in SIGINT
war on terrorism and
ULTRA
Uncertainty
Undersecretary of Defense for Intelligence (USDI)
United Nations
Unmanned aerial vehicles. See UAVs
UNSCOM (United Nations Special Commission)
U.S.A. PATRIOT Act of 2001
U.S. persons
USDI (Undersecretary of Defense for intelligence)
relationship with Congress
relationship with NGA
relationship with NSA
USS Cole
V
“Vacuum cleaner” problem
Value-added intelligence
Vanunu, Mordechai
Venezuela
VENONA intercepts
Verification
Vietnam War
Voice-over-Internet-Protocol (VoIP)
W
Walesa_ech
Walker spy ring
Walk-ins
War. See also specific war
Warner, John
War on terrorism. See also 9/11 Commission; Terrorism
Afghanistan
bin Laden and
military operations and
NGA and
renditions and torture and
UAVs and
Warsaw Pact
Washington, George
Waterboarding
Watergate
Weapons capabilities
Weapons development
Weapons of mass destruction. See WMD
Weapons proliferation
Webster, William
Weinberger, Caspar
Welch, Richard
West Germany
Wheat vs. chaff problem
“Where and when” phenomenon
Whistleblowers
“Window of vulnerability”
Wiretaps. See also FISA (Foreign Intelligence Surveillance Act of 1978)
Wiring diagrams
Wise, David
WMD (weapons of mass destruction). See also WMD (Weapons of Mass Destruction) Commission
alternative analysis and
analysts failures regarding
“connecting the dots” and
ECHELON to detect
FBI on
group think and
hearings
HUMINT and
intelligence sharing and
investigations
Iran and
Iraq and
layering and
MASINT, in development and proliferation
NCPC and
politicization and
as transnational issue
WMD (Weapons of Mass Destruction) Commission
competition for resources and
creation of
intelligence reorganization and
layering
NCPC and
politicization and
recommendations of
Wolf, Markus
Women’s suffrage
Woolsey, R. James
World Trade Center. See Terrorist attacks (2001)
World War I
World War II
assassination and
collection and
creation of COI and OSS and
denial and deception and
double agents
imagery and
intelligence oversight and
STGINT and
strategic surprise and
threat-based foreign policy and
Worst-case analysis
Wyden, Ron
Wye River peace talks
X
Xiaoping, Deng
Y
Yeltsin, Boris
Yom Kippur War
Yugoslavia
Z
Zaporozhsky, Aleksander
Zhemin, Jiang
Zimmermann Telegram