Spycraft - Melton [310]
Berlin tunnel operation (Operation GOLD)
Berlin Wall
BIGOT lists
Big Technology
biological weapons
BIRDBOOK communications
Bissell, Richard
Black September terrorists
Blake, George
Bokassa, Jean-Bedel
Bolshakov, Georgi
Bolster . M.
bombing beacons
Boroughs, Robert
botulism
Brandwein, David S.
brick concealment
British intelligence
Bruce, David
brush passes
Brusnitsyn, Nikolai
Buckley, William
budget cuts
bullet bug
bumper lock
Bush, Vannevar
BUSTER communication system
Cabell, Charles P.
cameras and photography
and casing runs
concealment of
in digital age
and Document Copy Attaché Kit
“filmless cameras,”
infrared photography
in low-light and dark conditions
Match Box Cameras (Camera-X)
and Operational Aids Division
operational requirements for
of Penkovsky
reduced-image photography
Robot cameras
and “soft film,”
and stripping-film image delivery
in surveillance
T-
of Tolkachev
T-
training on
in Vietnam
See also specific brands
Camera-X
camouflaging of devices
Carter, Jimmy
car tosses
Casey, William
Casey Jones train explosive
Cassini, Austine
Castro, Fidel
attempts to overthrow
and CIA proposals for
leadership of
power consolidation of
Soviet associations of
Cat Guided Bombs
cellular phones
Central America
Central Intelligence Group (CIG)
Chad
Charge-Coupled Device (CCD)
Cherepanov, Aleksandr
Cherkashin, Victor
China
Chisholm, Janet
Christ, Dave
detained
imprisoned
medal for bravery
operation
return to U.S.
trial
Church Committee
Churchill, Winston
CIA Research Board
cigarette pistols
cigars
CKTAW wiretap
compromised
groundwork for
installation of
Soviet assessment of
clothing
codes and ciphers. See also one-time pads
Cohen, David
Colby, William
Cold War
Combustible Notebooks
commercial offices, audio surveillance of
commercial research
communication plans (commo plans)
compartmentation
computers
concealments
“active” and “passive” concealments
brick concealments
Burma Shave cans
for BUSTER
of cameras and photography
camouflage compared to
catches and latches for
characteristics of
Combustible Notebooks
in counterterrorism
for dead drops
in digital age
for humans
in mobile surveillance
and MOTH project
and OTS lab
of Penkovsky
purposes of
and threat levels
for Tolkachev
Trojan horse operations
as TSD service
in Vietnam
wood block concealments
consumer technologies
contact microphones
contaminated clothing plots
Corona satellite program
Counterintelligence (CI)
covers
covert communications (covcom)
brush passes
codes and ciphers
components of
in digital age
encryption
ideal of
impersonal exchanges
objectives of
personal meetings
requirements for
role of
selection of
signal sites
and Vietnam POWs
See also secret writing
The Craft of Intelligence (Dulles)
Crown, David
“crypts” (cryptonyms)
Cuba
attempted surveillance operation (see also Anderson, Thornton “Andy”; Christ, Dave; Szuminski, Walter “Wally”)
Bay of Pigs invasion
Cuban missile crisis
inaccessibility of
proposals for dealing with
relations with the U.S.
and ZR/RIFLE Cuban program
Cuban exile army
currency, counterfeiting of
dangles
David, Ruth
dead drops
audio dead drops
concealments for
e-mail accounts
of Penkovsky
risks of
and signals
of Tolkachev
and tradecraft lexicon
of TRIGON
DEAR Gun pistol
decryption