Description of document: Freedom of Information Act FOIA request letters submitted to the Central Intelligence Agency (CIA) by Jeffrey Scudder during CY 2012, and any associated enclosures
Requested date: 05-July-2014
Released date: 11-December-2015
Posted date: 04-January-2016
Source of document: Freedom of Information Act Request Information and Privacy Coordinator Central Intelligence Agency Washington, D.C. 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online
The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Central Intelligence Agency
Washington. D.C. 20505
11December2015
Reference: F-2014-02121
This is a final response to Item 1 of your 5 July 2014 Freedom of Information Act (FOIA) request for "a copy of each FOIA request letter submitted by Jeffrey Scudder during calendar year 2012, and any associated enclosures." As you will recall. in our 16 September 2014 letter, we informed you that we had already begun processing a request for this information in connection with an earlier FOIA request received prior to yours. We cross referenced your request to the earlier one in order to send you any records that were found to be releasable.
As a result of our searches undertaken in connection with the earlier request, we located three documents, consisting of 83 pages, that we determined were releasable in segregable form with deletions made on the basis of FOIA exemptions (b)(l), (b)(3), and (b)(6). Copies of the documents and an explanation of exemptions are enclosed. Exemption (b )(3) pertains to information exempt from disclosure by statute. The relevant statutes are Section 6 of the Central Intelligence Agency Act of 1949, as amended, and Section 102A(i)(l) of the National Security Act of 1947, as amended. As the CIA Information and Privacy Coordinator, I am the CIA official responsible for this determination. You have the right to appeal this response to the Agency Release Panel, in my care, within 45 days from the date of this letter. Please include the basis of your appeal.
We responded regarding Item 2 of your request on 16 September 201 4.
Sincerely, f'pJJjawk~ Michael Lavergne Information and Privacy Coordinator
Enclosures Explanation of Exemptions
Freedom of Information Act:
(b)(1) exempts from disclosure information currently and properly classified, pursuant to an Executive Order;
(b)(2) exempts from disclosure information, which pertains solely to the internal personnel rules and practices of the Agency;
(b)(3) exempts from disclosure information that another federal statute protects, provided that the other federal statute either requires that the matters be withheld, or establishes particular criteria for withholding or refers to particular types of matters to be withheld. The (b)(3) statutes upon which the CIA relies include, but are not limited to, the CIA Act of 1949;
(b)( 4) exempts from disclosure trade secrets and commercial or financial information that is obtained from a person and that is privileged or confidential;
(b)( 5) exempts from disclosure inter-and intra-agency memoranda or letters that would not be available by law to a party other than an agency in litigation with the agency;
(b)(6) exempts from disclosure information from personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion ofprivacy;
(b)(7) exempts from disclosure information compiled for law enforcement purposes to the extent that the production of the information (A) could reasonably be expected to interfere with enforcement proceedings; (B) would deprive a person of a right to a fair trial or an impartial adjudication; (C) could reasonably be expected to constitute an unwarranted invasion of personal privacy; (D) could reasonably be expected to disclose the identity of a confidential source or, in the case of information compiled by a criminal law enforcement authority in the course of a criminal investigation or by an agency conducting a lawful national security intelligence investigation, information furnished by a confidential source ; (E) would disclose techniques and procedures for law enforcement investigations or prosecutions if such disclosure could reasonably be expected to risk circumvention of the law; or (F) could reasonably be expected to endanger any individual's life or physical safety;
(b)(8) exempts from disclosure information contained in reports or related to examination, operating, or condition reports prepared by, or on behalf of, or for use of an agency responsible for regulating or supervising financial institutions; and
(b)(9) exempts from disclosure geological.and geophysical information and data, including maps, concerning wells.
April2012 C05615999 Approved for Release: 2015/10/05 C05615999
Information and Privacy Coordinator Central Intelligence Agency Washington, D.C. 20505
Dear Coordinator: Under the Freedom of Information Act, 5 U.S.C. subsection 552, I am requesting Electronic copies of 133 Studies in Intelligence (Sii) articles listed in the accompanying pages.
Background - The 133 articles have either been released in sanitized versions or are somewhere in the redaction and release process. In the past three years the Agency made PDF copies of all Sii articles ever written. These are excellent quality copies and in electric PDF form can be searched. I would .like to get the requested articles from the newly .scanned files in electronic form.
The accompanying pages list 133 articles; their name, year, volume, issue along with CADRE case and document number where available.
The newly scanned versions of these documents are stored in HR/Center for the Study of Intelligence and in IMS/Historic Collection Division servers. As I am familiar with these documents I am more thah willing to help in locating requested documents.
If there are any fees for searching for, reviewing, orcopying the records, please notify me before processing if the amount exceeds $200:00. Per32 CFR Parts 1900, 1901, 1907, 1908, and 1909 the cost for a CD is $20.. One DVD's should be enough to store all 133 documents and I assume the costfor a CD or DVD is the same.
If you deny all or any part of this request, please cite each specific exemption you think justifies your refusal to release the information and notify me of appeal procedures available under the law. (b)(3) JLvou have amL.ftUestions aboy1 handlina this reauest, you mav teleohone me at 1 ; ,_. ~brflt my worlf \e-mail a~ [!1 ff Scu'oaer '------, ~x~ I I (b)(6) (b)(3) / cer-eiv. .___! <., eff Scudder ___ ',i J (b)(6)
Approved for Release: 2015/10/05 C05615999 C05615999 Approved for Release: 2015/10/05 C05615999
(b)(3) .. -':
25 3 . 26 3
25 2 29 1 ·27 1 30 3 27 4 28 1 24 2 25 2 .. 27 2 28 1 . 24 4
25 3 24 4 36 4
25 4 26 · 3 33 4 28 2 27 1
31 4 33 2 30 4
32 2
38 2
(b)(1) 1of5 (b)(3)
Approved for Release: 2015/10/05 C05615999 C05615999 Approved for Release: 2015/10/05 C05615999 ,·.
... ; ·'
' (b)(3)
32 1 ·27 4 31 4 38 1 ·,33 1 37 ·. 1 32 1 30 1 30 · 4 24 · 4 27 4 32 .1 31 • 3 (b)(1) 29 3 . 37 .. •. 3 (b)(3) 26 3 28 4 35 2 (b)(1) 29 1 . 33 3 (b)(3) . 37 4 34 4 34 2 36 2 34 3 35 2 (b)(1) (b}(3) 38 1 28 2 32 4 31 1
31 3 29 3 (b)(1) 32 3 (b)(3)
2of5
Approved for Release: 2015/10/05 C05615999 )> "C "C
~(1) Q. O' DOCUMENTARY ...., REMEMBRANCE ;:u (1) Aitlcle . (i) Article ti) (/I c VOi 28 ~ issue 2 Article (1) Aitlcle Article 0 Article "'..... Article ~ Article ...... Article. Q 0 Article 01 () 0 01 O>...... 01 CD CD '.· ~ ' : I-"''---· .,,.~'""· ,___ CD ' 36 '· . '. 36 ~ :, " 36 . "· 32 36 '30 32 .
3of 5 ):lo "'C "'C ~ 0 "'C < (I)a. ~(I) a. O'.... O' ;:o .... . (I) 4 of 5 loo "U . '· "U.., 0 < ·\.· 39 a.(1) 47 O'.., 39 ;;o 47 (1) ~ . \ •. 5 of 5 C05616000 Approved for Release: 2015/10/05 C05616000 Information and Privacy Coordinator Central Intelligence Agency Washington, D.C. 20505 Dear Coordinator: Under the Freedom of Information Act, 5 U.S.C. subsection 552, I am requesting Electronic copies of 282 Studies in Intelligence (Sii) articles listed in the accompanying pages. I believe these 282 articles have never been released. In the past three years the Agency made PDF copies of all Sii articles ever written. These are excellent quality copies and in electric PDF form can be searched. I request the Agency use these newly scanned documents for review and release. The accompanying pages list 282 articles; their name, year, volume, and issue. The newly scanned versions of these documents are stored in HR/Center for the Study of Intelligence and in IMS/Historic Collection Division servers. As I am familiar with these documents I am more than wilting to help in locating requested documents. If there are any fees for searching for, reviewing, or copying the records, please notify me before processing if the amountexceeds $200;00. Per 32 CFR Parts 1900, 1901, 1907, 1908, and 1909 the cost for a CD is$20. One DVD's should be enough to store all 282 documents and I assume the cost for a CD or DVD is the same. If you deny all or any part of this request, please cite each specific exemption you think justifies your refusal to release the information and notify me of appeal procedures available under the law. µou haV!l a~estions about handling th~uesl, tetenhone me at (b)(3) rat my e-mailyr: ~- wo~ _I _ 1 ~eff Scudaer (b)(3) _ (b)(3) (b)(3) 1 \ (b)(6) "-.·i/ ~~=/T=-ee=r=e=ly:, eff Scudder,~:~-___j-----.., ',, (b)(6) Approved for Release: 2015/10/05 C05616000 C05616000 Approved for Release: 2015/10/05 C05616000 }"• '~~\~t~~~1,,1i~~,,~~~~~1, 37 2 199 IA.rticle (b)(1) 37 2 199' f'\rticle (b)(3) 31 2 1987 ~rticle 36 4 1992 Miele 23 3 19791AT :sea w1tt1 mA .'-"'"' Article (b)(1) 29 3 198: Article 37 3 199 Article (b)(3) 28 2 198~ Article 29 2 198: 11.;areer - i-on:v Years in· 1nte11inon""' Article 11 196.7 Article 7 19631r: .. ,,.. . . ,_ - . ··- "rtlcle (b)(1) 20 2 197€ Article (b)(3) 28 3 198~ ~rticle 21 3 ".rticle (b)(1) 34 4 199( ~rticle 24 1980 1-nninA·Arinn fr.r 1171".'iRI" "' rticle (b)(3) 29 2 1985 Miele 3 2 1959 Miele 4 4 1960 Miele 5 3 1961 "rticle 36 4 1992 ~rticle . (b) (1) 36 3 1992 rticle (b1 (3) 32 2 1988 p..rticle 17 3-S 1973 p..rticle 3 2 1959 p..rticle 33 1 1989 p..rticle 7 1963 ':'ost Mo·rtem :- me Chinese Economv _. . .. Article 22 "'rticle (b)(1) 23 2 . 197~ !Article 17 4-S 197.~ Article (b)(3) 36 3 199~ Artide 3 2 195~ Article 23 4 1979,~ mv - Miu• en .;:m1e10 .for1-'r61ect AZCJKIAN .. Article 17 4-S 1973 Invasion - .· - Article (b)(1) 7 1963 Article 3 2 1959 Article (b)(3) 2 2 1958 Article 36 2 1992 :->tr ... 1P!-hlnn -r ·n11nr~ri ·· •• · --- Article (b)(1) 2 4 1951 Article 3 2 195! Article (b)(3) 35 3 199 Article 3 2 195~ Article 17 3-S 197 Article 32 2 198~ 1 ne l-'enKovs1 1of6 C05616000 Approved for Release: 2015/ 10/05 C05616000 38 2 1994 Article 17 3-S 197.: Article 3 2 195! Article 36 3 199: Article 38 1 199~ Article Article Article Article Article Article Article Article Article 27 2 1983 Defining Analyst Productivity Article 36 3 199< Article (b)(1) 24 4 198Qlf.l~r~frl Fnrd ~ndthf!Ptesident'sDailv Brief Article 33 3 1989 Article ~g~~~~ 28 3 1984 Article (b)(3) 36 1 1992 Leaminn from MastefS1.1n ·.. · Article 29 1 1985 Article (b)(1) 30 2 1986 Article (b)(3) 28 3 1984 Article 34 2 1990 t\lp1r: Amina :inn Videoti:4n~ · . . Article 28 2 1984 Article (b)(1) 31 4 1987 Article (b)(3) 33 4 1989 Article 33 3 1989 Predictinn the Soviet Strateaic ::threat · Article 28 1 1984 Article (b)(1) 28 2 1984 SIGINT In Space Article (b)(3) 33 4 1989 Sovief.Deceotion in Afohanistah .·· , . ··· ..· · .·· .. Artiele 34 3 1990 Article. (b)(1) 29 1 1985 Soviet Television ~ANew AssetforKremlitfWatchers . Article 35 3 199'.I Article ~g~~~~ 30 4 .. 198~ Article (b)(3) 24 1 . 198C Article 28 ·. 2 '· l98l Article . 31 3 1987 The Brzetinsl . '.-·· .. . 1bHL ·.· ./ .··_.- .·.. -~·:.~·.·<:.-:;·:··:. ·.~---:·· __._:_·· ··.·-·. -~· .:.:~:.· __ ··.·· .-·: •/···· : __ .·_; < .· .. -· .- ·,;:.·:-:~::·;:-).:_:;._: -.~-:::>:-:.- _: :". >_:~> .-_::: .. · ,• ~._:.-.. -,.:_::.:::-.·. ·::.-;,:; > ...... ··,.. .·<: ... :·. ". ,.· ... -" · AP~~v~d ·ii ~~1~;~' f81~t91~'gg~; ~bri' c~· {. •·. •···•· ... . ·---· .··."·" C05616000 Approved for Release: 2015/10/05 C05616000 r---;::35+---:::1+-7:19:-:-9-::ir-1:--:-::---:- -,-----::--:-:-c:------:---:-:-:-,------lf!.:A:..!!rti~Cle:::__ ___-1 (b )(1) t--~--:3~2:-t-~~31--~19~8~8r.U~rt~h~od~o=x~~~A~ir~bl=an~e~a~n~d~M~a~n~~~~~~~~~~~~--1~A~rt~ic~le:....__~~~--1 (b)(3) 33 2 1989 1 '.f'-•-,,,. Thrnunh Antn R<>nistration Article 33 1 1ga9 f--'Art=i=cle~-----i (b)(1) 26 1 1982 l'-'A"-"rti=cl.;:;..e ___---4 (b)(3) 34 4 1~ M~ 34 4 1990 Article 32 4 1988 Article 36 1 1992 Analvzina Economic Esoiohaoe Article 28 1 198'1 Article (b)(1) 38 2 199'1 Article · (b)(3) 32 4 1988 Conditions of Risk -. . Article 31 2 1987 Article (b)(1) 36 3 1992 Desert Sform arid the BDA .Controversy Article (b)(3) 35 4 1991 Election Ooeration in Chile . Article 34 1 1990 Article (b)(1) 26 3 198~ Article (b)(3) 26 4 198~ Article 34 2 199C Article 35 4 1991 Inside a J-2 Joint llifollioence Center Article 29 3 1985 Office of Communicatibr'ls _-1947 to 1985 Article 37 3 1993 Article (b)(1) 32 1 1988 Our.Marfin Havana - .· Article (b)(3) 38 1 1994 Overhead .Jmaaer\I in the Di recto-rate of. lritelliaehce Article 36 3 1992 Article (b)(1) 37 2 199~ Article (b)(3) 27 3 1983 The CIA arid the John Paton Davies Affair Article 35 3 199_1 Article (b)(1) 27 2 198~ Article (b)(3) 33 2 1989 Tribute to Women Who Have Died · . Article (b)(3) 39 1 1995 Director for Science Md.Techloov . - Address 48 2 20o4 A'Brave -NeviWotld - ._ -· Article 45 2 2001 Article (b)(1) 43 1 199~ Article (b)(3) 39 3 1995 AHistorical D~iflaae Assessment ·.. Article 40 4 1996 Article (b)(1) 38 3 1994 Article (b)(3) 45 3 2001 Ame~ican Cr}'ptology During the .Korean War _. Article 41 1 1997 American lhtelliaence.and the Gehlen Oraanit.ation 1945-49 · Article 41 4 199i Article (b)(1) 40 1 1996 An lnter'\iieWWithAdm. William 0 . Studeman . Article (b)(3) 45 1 2001 An Interview With Deputy Director for Operations James Pavitt Article 42 1 1998 An Interview with Director of Central lntellioence .Georae J. Tenet . . Article 40 3 1996 and Techloav · · Article 42 2 1998 An Interview With :Former.General Counsel.Johns_ Warner · Article 44 2 2000 An JntervieWWith John H:Waller Article 44 1 2000 An lriterviewWith NSADirector Lt. Gen. Michael V Havden . Article 39 3 1995 An Interview with Williarri P. Crowell, Deoutvrntedor, NSA Article 3 of6 Appr()ved for Release: 2015/10/05 C05616000 · : ..•.· : - _ .'.···· C05616000 Approved for Release: 2015/10/05 C05616000 ,.. '\\ i~f»UIJ ~1q:- .. -~-" :~. ~,., .. ;'.it ~~l-~l~~fi~~~~~~~t•~~~~~{ll~'' ~f~~1W$ii~tfifll~~it~~~tt~~~" ·: ~~~~<.· :. ,~: . ~ ~~ - : ;· 23 3 1979 Analysis; War arid .Detision: Whv ; lritellio~hceJ=ailure:s are lnevifable · Article 42 3 1998 AnalyziM Soviet Deferise Prooams, 1951-1990 Article 38 4 1994 Article (b)(1) 41 4 1997 British lntellioenceActivitv in Rida, 1934-40 Article (b)(3) 41 4 1997 British Penetration of America's first Diolomatic Mission Article 41 2 1997 Career Prooressibn Analysis and Military Biooraphics Article 47 3 2003 Celebrating the Life of vvalter Pforzheimer Article 39 2 1995 CIA and the Fall of the Soviet Empire - The Politics of 'Gettino it Rio ht' Article 39 3 1995 CIA and the Fall ofthe soyiet Empire, Part II Article 42 4 1998 CIA and the Guatemala Assassination Probosals, .1952-1954 . Article 39 1 1995 CIA Liaison With the British lntetlioence Communitv, 1942-56 Article 39 1 1995 Article (b)(1) 38 4 1994 Article (b)(3) 41 3 1997 CIA's lntellioence Sharino With Conoress . Article 47 2 2003 Article (b)(1) 39 2 1995 Article (b)(3) 42 1 1998 Creatinothe National lrria!:lerv and Mannino Aoencv Article 41 3 1997 Defense and Arms Control in the Carter Administration Article 42 2 1998 Dick Welch 1929c1975·· Article 40 4 1996 Article (b)(1) 39 3 199.5 Facts, findinQs Forecasts, and f6rtune~telling · Article (b)(3) .. .. 43 1 1999 Community ·· .. . · _.. ··· Article 45 1 2001 General MacArthur.and the OSS; 1942-1945 Artitle 41 2 1997 Article (b)(1) 45 1 2001 Honoring the Office of Communications Article 39 4 1995 Article ~g~~~~ 46 2 2002 lmprovingthe lntelligence·community's -Strike Target Support Article (b)(3) 42 2 1998 lncreasina CIA'sValue Added to the Senior Policvmaker Article 47 4 2003 Article (b)(1) 40 4 199E Article (b)(3) 44 1 200( Article 44 2 2000 tntelliaen·c1i Lessons From Pearl Harbor Article 44 2 2000 tntellioence OoeratiOns· in;the Korean War / Article 39 4 1995 1rit.,.11il'i.,.1ice ProductionDurina The Helms Reoime Article 42 1 199€ Article (b)(1) 39 4 1995 tntemaence Stfooort fbr Richard M: Nixon Article 42 1 1998 Article ~g~H~ 46 2 2002 1nter~gency D}'1"larnics and .Otgani;z,ational Myths Article (b)(3) 39 2 1995 lntoPoliticsWith John f. Kenriedv ~· . Article 47 2 2003 Into Ttbet: The CIA's FirstAtomic Sov Article 48 2 2004 Article (b)(1) 42 2 1998 1941 .· Article (b)(3) 42 2 1998 LeQiSlativeand Judicial Safeauards for US lntellioencePersonnel Article 46 2 2002 Leon Theremin -CIA Nemesis Article 44 1 2000 Lookino Behind the KGB Facad Article 40 3 1996 Article (b)(1) 48 2 2004 Article (b)(3) 42 3 1998 Maritime Countetharootics Operations Article 4 of 6 ..- ... ·.· .. Approved for_Relea~E!: ~q15/1 .. · .. / C05616000 Approved for Release: 2015/10/05 C05616000 J\l,llf!lftl 11s~i; ~l~~,l~~ff~li~i-~1,{~~lt-t'~~t~J~~~J~-~~~~ttl1f~~~~~~1ffi~~~~i~ ill:~iJif.~f~f81&i•1~~~ 40 2 ~~--1996 National liiteltiaeiice St.if.inert to the us Trans6ortation Command Article 47 4 2003 Article (b)(1) 46 2 2002 On the Trail ofNazi Counterfeiters Article 40 1 1996 Article ~g~~~~ 45 3 2001 OSINT - The State of the Art, the Artless State Article (b)(3) 40 3 1996 Article (b)(1) 42 3 1998 Passini:i the lntelliaehce ldentitlesProtectioh Act .of 1982 Article (b)(3) 47 4 2003 Perspective of the Undetsecretarv of Defense terr lntellii:ience Article 40 4 1996 Korea Article 42 3 1s9e Article (b)(1) 38 3 1994 Protectinq Satellite Reconnaissance Photoqraohs Article (b)(3) 39 1 1995 I ntelllaence Article 38 4 1994 Article (b)(1) 42 1 1998 Article (b)(3) 40 1 199t Article 39 4 1995IThe 1983 War Scare in US-Soviet Relations Article 42 3 1998 Article (b)(1) 48 2 2004 Article (b)(3) 42 2 1998 The Bureau of lntelllaerice-. and Research at Fiftv Article 42 1 1998 The Case ofOttoAlbrechtAlfred von Bolschwlna Article 40 1 1996 Article (b)(1) 39 2 1995 Article (b)(3) 48 2 2004 The Consequences of Permissive Neolect Article 41 2 1997 E:ncrvotieir:i Techloaies . Article 42 4 199S Article (b)(1) 44 2 2000 The Foundina .of the Office of .Soecial Operations Artiele 42 4 199€ Article ~g~~~~ 40 4 199~ Article (b)(3) 41 1 199i Article 39 2 1995 The Jaoahese Armv~s Naka School,.1938•45 Article 41 2 1997 Article (b)(1) 40 3 1996 Article (b)(3) 40 3 1996 Article 40 4 1996 The President's Fore ion lntellioence 'Advisorv Board . Article 44 1 2000 The '.Qliiet'. Helicopter •· Article 45 3 2001 The Strategic Use of Open~source Information Article 39 3 1995 JheTransition.toPresideiit Johnson _ Article 39 2 1995 The Views of Ambassador Herman J: Cohen Article 41 3 1997 UN PeacekeeoiliQ Ooerations and ltitelliaeiice Article 39 2 1995 Unconventional Radar lmaoerv Historv Article 45 2 2001 UncoverinoAChemlcal Weapons Prboram in The Balkans Article 45 4 2001 Article (b)(1) 41 2 1997 Verification lmblications of Commercial Satellite lmaaerv Article (b)(3) 38 4 1994 Workina the Cuban Beat · . Article 43 1 1999 The Puzzle at CIA Headouartets Article 48 2 2004 The Road to GbVertActiein ih Iran-. 1953 .. Article 39 1 1995 Honorina the Founder of GIA's Ditecterate of Science and Techloav .. Ceremonv 27 4 1983 Donovan of oss 5of6 .. · ... ·· .· ...... ··. ·· . ... .,·, ...... ,·_...... : .. ">>·_ ... _>::. , .. ··· ····.. · -~ .. ··>< ,•' ...... · :: -...:·.. :. -~~----~~:.:.:. . ::.:. ,, . _,,.... ···.-<· ...... :>·· ~- .~--- ::::·· :-::~ :·~::.-~·/_·.:: ... ~·.- .. ~~·::.·.~·:.;;> ... -:.. ::: ::" <.. ":.·; ~--:_·.::~ ·. :·.. :.. ". . ... -·· .. Approved for R~le~s~: 29~ Stf 6,t~S ~o5$1 ~~?0. _.__ .. C05616000 Approved for Release: 2015/10/05 C05616000 27 4 1983 Donovan: America's Mastersov ·· 31 3 1988 (b)(1) 1----.:..:.+--..:+--'2::.:0::.;:0;.;:::0;.::S:.c:;nJ;.v1m~as::.:.te~r.:::.s44 1 ..... ,· · ;.:,;Te:::.:..n:....:C;:..:l.:..:A~O::.:.;ffi~·c:,;;e:..;rs;,;;:in:.;,,T.:..;h~e::::ir..;.;O::.:w::.:.n.:..W:.:..::::or:.:::d.:::.s ______l------1 (b)(3) 45 2 2001 An Interview with formet_ODS& TAibert Wheelon 45 4 2001 An Interview with NRO Director Keith Hall 37 1 1993 An Unworkable DI-Process 34 1 1990 among Policy Officials . 43 1999 CrackihO the Courtvard Crvoto 16 2 1972 Cuban Missile Crisis .. 27 4 1983 Oonovan in Persoective ·. · 45 4 2001 (b)(1) 45 2 2001 Intelligence arid US Missile Defense Planning (b)(3) 46 4 2002 John Keams and the Cold War in Laos 47 2 2003 Kurt Waldheim·and the Central lntellioence Aoencv 40 1 1996 (b)(1) 45 2 2001 IMoscow's Response to US Plans for Missile Defense (b)(3) 46 4 2002 NRO Leadershio Reolies 47 2 2003 Of Soies arid. Lies: ACIA Ue Detector Remembers Vietnam 30 4 1986 (b)(1) 28 2 1984 (b)(3) 45 4 2001 Reflections on HandlingPenkovsky .·· 46 4 2002 African Crisis . 31 2 198E (b)(1) 43 2 1999 Safeauardilia Information Operations (b)(3) 46 4 2002 45 2 2001 36 1 1992 l----(b)(1) 45 2 2001 1------(b (3) 46 4 2002 48 4 2004 48 4 2004 An lnterviewwith ITICDirectorJdhn Srennari . . · 36 2 1994 British and American Policy on lnlelliaehce · 48 4 2004 Counterintellii:lence in the War Mairist Terrorism · 23 4 1979 Finaale's F=ifthLaw oflnformation .· 4 4 1960 Footnotes on lriterr6Qatibn ... 1---...:.:..+---::;.i..._...:..:19;.;;.827 3 ~3.;;.;,J:-=-D~ .. ------""+------(b)(1) 1---___;::..:::.i.--.:::.i--1:...:9;.::.9.:.5"-=L"'-et""te"-'-r=to"--t::.:h-=-e""'39 3 . E""d~ito"'-r'-'-· ~ ·-=O-'-'n--"M=il=ita=1rv-"--.='n=te=ll=io=e'-"nc=e'-'-. -'---· ~---~--'r------(b)(3) 48 4 2004 I 1---__:~--:::..i--1:..::9:.:::9..:..135 4 w.T-llh~e··""D""O'""C,,,.,u~It.,,.o,..,,re"":A,__,,n"" :""O.,,.xiiu.m..,,o""'ro,,,.,n_,_,_?_~------i1------(b)(1) 48 4 ~ {b1~ 2 4 1958 Thev .<::nied on Ennlaiid . 14 1 197on (b)(1) (b)(3) 6 of6 ... .· :· ...' .. ··~-<-~·~-:~<: ~~~-: <··. :_:~~- .. -~-~~: ~~-:~·-:::>~.-~· .. >~.:.. ;• .. :::~ ·::.: -~'.~:_:::·: ~:::~:.. ~;~--/:~;·~-~-:.-.::. '.-:~.. :~·;:.·· ... -,·_:. ~~ ..>;:.-_~~=<;-~ .. >~:~;.:;·. -~/-. Ap~;ovedforReleas~:.2_~1~i1d1~~ C06140394 Approved for Release: 2015/10/05 C06140394~ ;2 0 I/ - c; O L( 5 o ·.. . . . r [____-_____ - Information and Privacy Coordinator (b)(3) Central Intelligence Agency Washington, D.C. 20505 Dear Coordinator: Under the Freedom of Information Act, 5 U.S.C. subsection 552, I am requesting Electronic copies of the Studies in Intelligence (Sil) articles listed in the accompanying pages. Background - In the 1990's a considerable number of Sii articles were released to NARA. Due to the capability of copying technology at that time these documents are very poor quality and some are near impossible to read. In the past three years the Agency made PDF copies of all Sii articles ever written. These are excellent quality copies and in electric PDF form can be searched. I would like to get electronic copies of these articles. · The accompanying pages list 1,572 articles; their name, year, volume, issue as well as the current release status along with CADRE case and document number where available. As you can see all of these requested do_c::uments have either been released to NARA, listed on CIA.gov, published in an unclassified edition of Sii, or a combination of the three. As such, there should be no need to perform any review and redaction on the documents. These documents are stored in HR/Center for the Study of Intelligence and in IMS/Historic Collection Division servers. As I am familiar with these documents I am more than willing to help in locating requested documents. If there are any fees for searching for, reviewing, or copying the records, please notify me before processing if the amount exceeds $200.00. Per 32 CFR Parts 1900, 1901, 1907, 1908, and 1909 the cost for a CD is $20. Three DVD's should be enough to store all 1,571 documents and I assume the cost for a CD or DVD is the same. If you deny all or any part of this request, please cite each specific exemption you think justifies your refusal to release the information and notify me of appeal procedures available under the law. (b)(3) _Jf vnu_havA "nV e~~;OnS abqut handJiOO Ibis reopesl, YOU m8jl lelef:lhQne me_fil__ [ T my workl 1e-mail at 1 ~ (b)(3) L_ __ _ Jeff Scudder - I " 11 I ~ (b)(6) .(ceTety;- (b)(6) ' Jeff Scudder (b)(6) l _____~ Approved for Release: 2015/10/05 C06140394 C06140394 Approved for Release: 2015/10/05 C06140394 (b)(3) 55-1-1 Introduction to Studies In lntelllgence 55-1-1 The Current Program for an Intelligence Literature 55-1-1 . The Need for an Intelligence Literature 56-1-2 The Hazards and Advantages of Estimates of Enemy Intentions 56-1-2 Editors Introduction - Articles on Capabilities Vol.1 No.2 1956 56-1-2 Notes on Some Aspects of Intelligence Estimates 56-1-2 Notes on "Capabllitles" In National Intelligence 56-1-3 Economic Intelligence 56-1-3 Editors Introduction - Articles on Economic Intelligence 56-1-3 Notes and Comments Vol.1 No.3 1956 56-1-3 The Nature and Methods of Economic Intelligence 57-1-4 Strategic Intelligence and National Decisions 57-1-4 Strategic Intelligence Production: Basic Principles 57-1-4 The Labyrinth--The Memoirs of Hitter's Secret Service Chief 57-1-4 We Spied 57-1-4 Technical Intelligence and Arms Inspection omparative Survey of Soviet and S ccess to Published 57-1-4 lnfonnation 57-1-4 Footoote to Cicero 57-1-4 The Role of Interindustry Studies in Economic Intelligence 57-1-4 Coordination and Responsibility 57-1-4 Industrial Planning In the US and the USSR 57-1-4 Intelligence Research • Some Suggested Approaches. 57-1-4 ls Intelligence Over-Coordinated 57-1-4 The Intelligence Necessary to the Fonnulation of a Sound Strategy 58-2-1 The Soviet Secret Police ~--~------L______------ 1of66 Approved for Release: 2015/10/05 C06140394 C06140394 Approved for Release 2015/10/05 C06140394 (b)(3) 58-2-1 Concepts for a Philosophy of Air Intelligence Article 58-2-1 Developments in Air Targeting: The Military Resources Model Article 58-2-1 Paper Mills and Fabrication Article 58-2-1 Report on Hungarian Refugees Book Review 58-2-1 Strategic Thinking and Air Intelligence Article 58-2-1 ELINT: A Scientific Intelligence System 58-2-1 Horrible Thought 58-2-1 Lost Order, Lost Cause 58-2-1 Origin, Missions, and Structure of CIA Article 58-2-2 Air Spy Article 58-2-2 Child of the Revolution Article 58-2-2 Combat Book Review 58-2-2 The Rise of Khrushchev Book Review 58-2-2 The War Potential of Nations Book Review 58-2-2 We Spied Article 58-2-2 You're Stepping on my Cloak and Dagger Book Review 58-2-2 Coexistence and Covert Collection Article Pe odlc eports y ndust a roups as Sources o Intel lgence 58-2-2 Information COMMENT 58-2-2 Developments In Air Targeting: The Air Battle Model Article 58-2-2 Book Review as Oppose to 58-2-2 Book Review 2of66 Approved for Release: 2015/10/05 C06140394 C06140394 Approved for Release: 2015/10/05 C06140394 (b)(3) 'lrllcle tv1icle 58-2-2 The Operational Potential of Subliminal Perception 3ook Review 58-2-2 The Dust That Isn't There aook Review 58-2-3 We Spied ... 'Vticle ommunicatlon to t e E itors: On •eoncepts or a Ph osophy. o Air 58-2-3 Intelligence l\rticle 58-2-3 Kim or Major North? 'lrlicle 58-2-3 Psychological Problems in Singleton Cover Assignments 'Vticle 58-2-3 ::OMMENT 58-2-3 ~rtlcle 58-2-3 Developments in Air Targeting: The Damage Assessment Model 3ookRevlew 58-2-3 A Note on Casual Intelligence Acquisition 'lrlicle 58-2-3 New Anachronism tv1icle 58-2-3 The Intelligence Hand In East-West Exchange Visits ~rtlcle 58-2-3 The Interrogation of Suspects Under Arrest ~rtlcle 58-2-3 A Cable from Napoleon l\.rticle 58-2-3 A Neglected Source of Evidence ~rticle 58-2-3 Military Intelligence Behind Enemy Lines l\.rticle 58-2-3 Toward a Federal Intelligence Memory ~rticle 58-2-3 What is a Generalist? l\rticle 58-2-4 Burma Drop Book Review 58-2-4 C.IA Book Review 58-2-4 Counterintelligence for NaUonal Security Book Review 58-2-4 We Spied ... Book Review 58-2-4 Communication to the Editors:On •Lost Order, Lost Cause" Book Review 3 of66 Approved for Release: 2015/10105 C06140394 58-2-4 Defector Disposal 58-2-4 Soviet Defector Motivation 58-2-4 The Covert Collection of Scientific lnfonnation v v 58-2-4 Counterintelligence for National Security Ol Ol C') C') 58-2-4 A Definition of Intelligence 0 0 v v 58-2-4 The Role of the Consultant in Intelligence Estimates ..- ..- co co Executive Privilege in the Field of Intelligence 0 58-2-4 0 u / u LO 58-2-4 Reminiscences of ·a Communications Agent LO 0 -..0 -.. 58-2-4 The Greater Barrier 0 0 ..- -....- 58-2-4 The Mail from Budapest -.. LO LO ..- 59-3-1 Allied Intelligence Bureau ..- 0 0 N 59-3-1 The Zimmermann Telegram N CD CD (/) (/) cu 59-3-1 Communications to the Editors- Dear Mr. Riposte cu CD wCD w 59-3-1 Techniques of Domestic Intelligence Collection a::: a::: I- I- 0 ...... 0 59-3-1 The Assessment of Communist Economic Penetration ...... -0 -0 CD CD Agent Radio Operations During World War II > > 59-3-1 0 0 I- I- 59-3-1 On Processing Intelligence Information a.. a.. a.. a.. Soviet Intelligence Training <( 59-3-1 <( 59-3-1 The Guiding of Intelligence Collection 59-3-1 The Monitoring of War Indicators 59-3-1 History's Role In Intelligence Estimating 59-3-1 Policing a Nuclear Test Ban 59-3-1 The Early Development of Communications Intelligence 59-3-2 In Flanders Fields 59-3-2 Suspect Documents-Their Scientific Examination 4 of66 Communications to the Editors: Covert Scientific Collection ~rtlcle i Developments in Air Targeting: Data Handling Techniques !Article Spy At Your Service, Sir COMMENT 59-3-2 The Shorthand of Experience v v O> Geographic Intelligence (<") ~ 59-3-2 0 ~ 59-3-3 A Study of Military Intelligence .,....v Count Rve and Die 59-3-4 Knights of the Floating Silk 59-3-4 Second Bureau 59-3-4 Secret Missions of the Clvll War 59-3-4 Sisters of Delilah 5of66 om Norge Book Review The Secret Service of the Confederate States in Europe r..rticle 59-3-4 The Springing Tiger r..rticle 59-3-4 World Within 'Vticle 59-3-4 Bid the Soldiers Shoot Book Review 59-3-4 Histoire de la Liberation de la France 3ookReview -.:!' ..q- Ol 59-3-4 Ouantrill and His Civil War Guerrillas 3ookReview O> (") (") 0 The Secret Capture 3ook Review 0 ..q- 59-3-4 ..q- ,,... The Secret Invaders ,,... co 59-3-4 3ookReview co 0 59-3-4 The Tunnelers of Sandborstal 3ook Review 0 0 0 I.I') l.O 59-3-4 Colonel Abel's Assistant ::;QMMENT 0 ...... 0 ...... ,,...0 ,,...0 ...... 59-3-4 Experience with Types of Agent Motivation r..rticle ...... ,,...l.O l.O,,... 0 0 N 59-3-4 Graphological Assessment In Action "OMMENT N 0,) 0,) (/) 59-3-4 The Calculation of Soviet Helicopter Performance bOMMENT (/) ('(l C\l Ci5 59-3-4 The Alamo Scouts "ii) D:'. D:'. 59-3-4 nee as Foundation for Policy ...... 0 .E 59-3-4 Intelligence for the Pentomic Army .,_ -0 -0 59-3-4 The Lost Keys to El Alamein > A Person from England > 0.... 60-4-1 ....0 0.. Battle: The Story of the Bulge 0.. 0.. 0.. <( Be Not Fearful <( Diplomat 60-4-1 Know Thine Enemy 60-4-1 sous de l'Esplonnage: 1939-59 Book Review 60-4-1 Book Review 60-4-1 Book Review 60-4-1 3ookRe 60166 60-4-1 The Mind of an Assassin 60-4-1 The Secret World !Book Review 60-4-1 They Came in the Night Book Review 60-4-1 Turncoats, Traitors and Heroes !Book Review 60-4-l From the CIA Comer&tone Ceremonies icEREMONY v v m Portuguese Tlmor: An Estimative Failure Article m ('I) 60-4-1 ('I') 0v v0 ...- 60-4-1 Publicizing Soviet Sclentmc Research Article ...- co co 0 0 (.) 60-4-1 The Symptoms of Scientific Breakthrough Article (.) LO 60-4-1 Credentials - Bona Fide or False? :Article LO 0...... 0 0 60-4-l The ldenli-Kit Article 0 ...- ...- The Interpreter as an Agent ...... LO 60-4-1 Article LO ...--- Hypnosis In Interrogation ...- 0 60-4-1 Article 0 N 60-4-1 The Assassination of Reinhard Heydrich Article N Q.) Q.) (/') (/') ('(! 60-4-2 Grivas: Portrait of a Terrorist IBook Review ('(! Q.) Q.) (U 60-4-2 A Study in Infamy IBook Review (U Cl:'. 60-4-2 Competitive Intelligence Book Review Cl:'. '- '- $2 60-4-2 Grivas and the Story of EOKA Book Review $2 "O In the Name of Conscience Book Review "O Q.) 60-4-2 Q.) e> 60-4-2 SHAI: The Exploits of Hagana Intelligence Book Re > Q. 60-4-2 The Brain-Washing Machine Book Re eQ. Q. Q. 60-4-2 ·-Soviet Operations of Kwantung Army Intelligence, 1931-1939 1Article 60-4-2 mmunicalion lo the Editors: On "The Alamo Scouts• COMMENT 7 of66 60-4-2 Design for Jet-Age Reporting 60-4-2 Notes on the CRITIC System 60-4-2 The U.S. Hunt for Axis Agent Radios 60-4-2 Unrecognized Potential in the Military Attaches 60+2 Operation Portrex !Article " 60-4-3 The Polygraph In Agent Interrogation Article 60-4-3 Freely I Served Book Review 60-4-3 Audiosurveillance Article 60-4-3 Laboratory Analysis of Suspect Documents Article ~---~~-- 8of66 Obstacle Course for Attaches Article 60-4-3 The Validity of Soviet Economic Statistics Article 60-4-3 For College Courses in Intelligence icle 60-4-3 Intelligence Operations of OSS Detachment 101 icle 60-4-3 Postal Forgeries in Two Wor1d Wars icle 60-4-3 Soviet Publicists Talk About U.S. Intelligence icle O> 60-4-4 Black Saturday: The Death of the Royal Oak ook Review O> ""'C') ""'C') 0 60-4-4 Conspiracy of Silence 0 ..- 60-4-4 Official Secret Book Review ..- co""' co""' 0 60-4-4 Pin-Stripe Saboteur Book Review 0 (.) (.) 60-4-4 Sequel to Boldness Book Review l.O l.O 0--.. 60-4-4 The Greatest Reid of All ,Book Review 0 0 --.. 60-4-4 The House Built on Sand Book Review 0 ..---.. ..---.. l.O 60-4-4. They Called Me Alfred Book Review l.O ..- ..- 0 0 N 60-4-4 Communication to the Editors: On Interrogation OMMENT N CJ) CJ) C/l C/l ctl 60-4-4 From Capri into Oblivion Book Review ctl CJ) CJ) w 60-4-4 A Fresh Look at Collection Requirements Article w er: 60-4-4 The Computer - Capabilities, Prospects, and Implications Article er: '- '- 0 60-4-4 A Small South Pole Article 0 -"O 60-4-4 The Articulation of Babel :Article "O CJ) -CJ) > 60-4-4 Training for Overs.eas Effectiveness: A Survey Article > 0 0 '- '- Cl. 60-4-4 Life and Death of the Luftwaffe Book Review Cl. Cl. Cl. <( <( 60-4-4 The Defections of Dr. John· Article 61-5-1 Die Schweiz im Zweiten Weltkrieg Article 61-5-1 Soviet Economic Warfare ,Article 61-5-1 The Rise and Fall of the Third Reich jArtlcle 61-5-1 The Overseas Americans Book Review 61-5-1 The Policy Machine Book Review 61-5-1 The Sea was Kind Book Review ------' 9 of66 i 61-5-1 Great Frusina Revisited: The Problem of Priority PosiUve Int Book Review 61-5-l Machines and the Chinese Name Book Review 61-5-1 The Progress of Pinyin 61-5-1 Psywar by Forgery '<:!" '<:!" ()) The Yo-Yo Story: An Electronics Analysis Case History ()) 61-5-1 ('f') ('f') 61-5-1 Edward Bancroft, Estimable Spy 0 0 '<:!" .,....'<:!" 61-5-1 Galahad: Intelligence Aspects .,.... 10 of 66 61-5-3 Broadsides and Bayonets - Propaganda of the Revolution 61-5-3 Colditz - The Gennan Story 61-5-3 Cromwell's Master Spy: John Thur1oe 61-5-3 She Rode with the Generals 61-5-3 The Hunter 61-5-3 The Man Who Started the War a> 61-5-3 Why the North Won the Civil War a> """("') C"')""" 0 61-5-3 Resistance Nurse Book Review 0 ..-""" 61-5-3 Spy for the Confederacy: Rose Greenhaw Book Review ..- ~------· ·---· -- 11 of 66 61-5-4 Spy Ring 61-5-4 The Lost Footsteps 61-5-4 The Manipulation of Human Behavior 61-5-4 The Road Past Mandalay 61-5-4 Thought Reform and the Psychology of Totalism " O> (") (") 0 0 61-5-4 Production at Small Posts " 62-6-1 Estimating Aircraft Performance > .....0 ea. 62-6-1 Intelligence and Covert Action a. a. 62-6-1 Observations on the Double Agent a. <( <( 62-6-1 Scooping the Soviet Press ' 62-6-1 Target: CIA 62-6-2 Soviet Spy Ring 62-6-2 Bum After Reading 62-6-2 Die Piratenchronik 62-6-2 National Character in Action 62-6-2 It's Further Via Gibraltar 12 of 66 62-6-2 One Man and His Dog 62-6-2 Communications lo the Editors - Professional Status rUcle 62-6-2 Production at an Aircraft Plant rticle 62-6-2 You and Your Walk-In rticle O> O> """(") 62-6-2 Postwar Soviet Espionage """(") 0 0 ....- 62-6-2 A National Name Index Network ....- """ ------~------ 13 or 66 Miele "1ook Review BIBL 62-6-4 The Eastern Front at the Tuming Point ~y 62-6-4 Captain Stephan Kalman -A Classic Wr1te-ln Case 62-6-4 Technical Factors in Aerospace Photography ·c1e ..,. Unfair Exchange Book Review ..,. en O> (') An Idiot System for Intelligence Article C"') 0 ..,.0 ..,. Some Far-Out Thoughts on Computers Miele ..... (!) The Scientific Intelligencer 0 The Practice of a Prophet u The Two Faces of Tass l.O ...... 0 ..... olen Terror zue Soclalislischen Gesetzllchkeit .....0 ...... 63-7-1 Sunday ...... l.O .....l.O 0 63-7-1 Gehelmauftrag Irland 0 N 63-7-1 The Spycatcher Omnibus N 4.l \ti r./) r./) t'O 63-7-1 Operation Lincoln t'O 4.l 4.l Q3 Q3 a::: 63-7-l Project Ninos a::: ...... g .g The Libyan as Agent Article 63-7-l -a ~ 63-7-1 Policy Blas Article 4.l > > 63-7-1 The Scientific and Cultural Exchange ....0 ea. a. a. 63-7-1 The Beginnings of Air Targeting a. <( 63-7-2 Anatomy of Spying !Book Review <( 63-7-2 Connoisseurs and SecrefAgents in Eighteenth Century Rome Book Review 63-7-2 The Tenth Fleet 63-7-2 Chinese Growth Estimates Revisited icie 63-7-2 Communication to the Editors: Scientific Exchanges 14 of 66 63-7-2 Requirements and the American Scientist 63-7-2 The Intelligence Yield from ECE 63-7-2 Tonnage Through libel Book Review """ 63-7-2 tage - A Counterintelligence Function Book Review 0) ~ 63-7-2 for the President: Sunrise '3ook Review C")""" ~ 63-7-2 Operation Uproot Book Review ....0 u; 63-7-2 The Theory and Practice of Soviet Intelligence ookRevlew """co 0 8 63-7-3 AShort HiSIOJY of Espionage (.) :g 63-7-3 The Quiet Canadian: Sir William Stephenson l.O 0 C5 63-7-3 Pearl Harbor: Warning and Decision C5 ...... -. ~ 63-7-3 An All-Purpose Data Handling System Article ....l.O 0 0 ~ 63-7-3 Communications to the Editors: Bias and Probity rticle C\j (J) Qj (/) (/) Half a Million Wanted Persons C'O ~ 63-7-3 COMMENT (J) ID ID Open Sources on Soviet Military Affairs a:::.._ 63-7-3 icle a:::.._ 0 ; 63-7-3 The Joint Debriefing of a Cuban ~rticle .E 'O (J) (J) ~ 63-7-3 Your Man in Ohio Miele > ...... 0 0.. 0.. Communications lo the Editors: Caught Napping boMMENT, 0.. 63-7-3 <( 63-7-3 A Study in Indications Methodology 63-7-3 63-7-3 lcle 63-7-3 d Counterlntelligence OMMENT 63-7-3 Article 63-7-3 Inside a Soviet Embassy 111.rticle 63-7-4 Confticl in the Shadows ook Review 15of66 ------·-··------ 63-7-4 Aspects of Counterinsurgency Intelligence 63-7-4 Communications to the Editors: Agent Relations 63-7-4 Communications to the Editors: Quantified Indicators v 63-7-4 Domestic Collection on Cuba v Ol Ol ("') ("') 0 v 63-7-4 Estimating the Soviet Gold Position 0v ....- ....- co co 0 63-7-4 Letter from a Staff Agent 0 () () l.O The Assessment of Insurgency l.O 0 63-7-4 0 0 0 ....- ....--- u:; 63-7-4 The Estimation of Construction Jobs ....- ....---l.O 0 63-7-4 The Intelligence Department 0 N N Q.i 63-7-4 A Name for Your Number Q.i (/) (/) cu 63-7-4 Agent Hazard in the Super-He! cu CV The Intelligence of Literature CV 0) 63-7-4 0) a::: 63-7-4 The Pitfall of a Latin Quirk a::: ...... 0 0 63-7-4 Centralized Requirements in the DIA -"O "O CV 63-7-4 Geographic Intelligence - Vol 7 Issue 4 -CV > > .....0 64-8-1 Burgess and Maclean .....0 a. a. a. 64-8-1 Handbook of Intelligence and Guerrilla Warfare a. <( 64-8-1 No Bugles for Spies <( 64-8-1 The Secret War 64-8-1 The Soviet High Command 64-8-1 The Analyst In a War Theater Role 64-8-1 The Recruitment of Soviet Officials rticle 16 of66 64-8-1 Windfall from Hong Kong COMMENT 64-8-1 Public Texts in Intelligence Book Review 64-8-1 Better an Office of Sovietology rticle " ~ 64-8-2 .....0 ..... c.. 64-8-2 A Crucial Estimate Relived c.. <( <( ase Studies in Insurgency and Ravo ulionary Warfare: A geria 1954 64-8-3 1962 64-8-3 Counterinsurgency Warfare 64-8-3 Modem Warfare 64-8-3 Warfare in the Enemy's Rear 64-8-3 Secret Diplomacy, Espionage and Cryptography, 1500-1815 17 of66 The Graphics Coordinator Program Origins of Central Intelligence "Face" Among the Arabs 64-8-3 Pitfalls of Civilian Cover f'.rticte 64-8-J Portrait of a Cuban Refugee rticle ...;- ...;- O> O> ("') (Y') ''Artide 0 0 64-8-3 An Intelligence Rote for the Footnote ...;- ...;- .,...... ,..... 64-8-4 n Instance ofTreason :Article co co Bay of Pigs Article 0 0 64-8-4 () () 64-8-4 Amateur Agent Book Review IJ) LO 0 64-8-4 National Intelligence Book Review 0 0 0.,..... -.,..... - IJ) 64-8-4 The Oiyarbakir Radar rticle IJ).,..... -.,..... - 0 0 N N 64-8-4 Cralology Pays Off Article i:i.i OJ (/) t/) 64-8-4 Snooping on Space Pictures icle Cll ell OJ OJ Q3 Q3 64-8-4 The Missiles in Cuba livucte 0::: 0::: '- '- ....0 64-8-4 Two Witnesses for the Defense Article $? "C "C 64-8-4 African Numbers Game OJ OJ > > 64-8-4 Telemetry Analysis 0 e '-a. a. 64-8-4 The Definition of Some Estimative Expresskms a. a. <( <( 64-8-4 Communications to the Editors: More Against Footnotes 64-8-4 Against Footnotes Article 64-8-4 Words of Estimative Probability ~tcle 64-8-4 The Invisible Government icle 65-9-1 Their Trade is Treachery Book Review 65-9-1 Counterintelligence Interrogation Book Review 65-9-1 The Fortress That Never Was Article 18 of 66 65-9-1 nlcation to the Editor: Wanted: A Word 65-9-1 rvations as War Indicators 65-9-1 Letters to the President 'q" 'q" O> O> <") 65-9-1 More on the Recruitment of Soviets M 0 0 ....'q" Memoranda for the President- Boston Series l"J11cle .....'q" (0 On Warning f&.rticle (0 0 0 (...) 65-9-1 Operational Contacts Book Review (...) LO Dieppe - The Shame and the Glory Book Review LO 0 65-9-2 0 .....0 65-9-2 I Can TeU it Now Book Review ....0 65-9-2 Red Pawn k Review --LO...... --LO 0 65-9-2 The New Meaning ofTreason 0 N 65-9-2 The Strategy of Subversion N (]) (l) fJ) fJ) ro 65-9-2 CommunlcaUons to the Editors - Some New Words for COMMENT ro (l) (l) (j) (j) a::: 65-9-2 Shepherding a Soviet Tour a::: .e'- 65-9-2 Death of an Hypothesis .e'-- 'O 65-9-2 Memoranda for the President- From Peter to Tito 'O (l) (l) > 65-9-2 Nothing to Hide > e 65-9-2 The Enigma of Soviet BW icte e Cl.. Cl.. Cl.. 65-9-2 The Ninja ~icte Cl.. <( <( 65-9-2 The Okhrana's Female Agents, Part I 65-9-2 Taste of Freedom Blood on the Midnight Sun 65-9-3 Splone In Hamburg und auf Helgoland Book Review 65-9-3 Communications to the Editors- More Words for Defector ~OMMENT 19of66 For a Board of Definitions oak Review Memoranda for the President- Japanese Feelers Book Review On Estimating Reactions Scientific Estimating (1> """(<') The Okhrana's Female Agents. Part II 0 ,... Geo-lime and Intelligence """co Strangers on a Bridge 0 65-9-3 (.) 65-9-4 Chinese Defections Overseas I,() 65-9-4 Camarade Sorge -..0 0 65-9-4 1Spied Spies ..--.. I,() 65-9-4 The Beriin Wall ,... 0 C\I 65-9-4 Communications to the Editors - More Words for Defection Q,) 20 of66 Secret Diplomacy of the Habsburgs, 1598-1625 66-10-1 -.:!' Cl C') Adversary Agent Radios 0 66-10-1 ....-.:!' co 66-10-1 Economic Intelligence in Defense Planning 0 {) 66-10-1 Costing Nuclear Programs LO 66-10-1 On the Trail of the Alexandrovsk 0.._ 0 66-10-1 Alias George Wood ...... _ 66-10-1 The Mariner as Agent 1,1") .... 66-10-1 Spy Wife 0 N 66-10-1 Intelligence and Security (]) 66-10-2 (/') co CD 66-10-2 Q.i 66-10-2 lzmenu Rodine i Shpionazh 0:: .... 66-10-2 0 66-10-2 The Missile Crisis "C Gendai Supai Ron -CD 66-10-2 > No Banners, No Bands ....0 66-10-2 c. c. Recent Soviet Books and Articles <( 66-10-2 Okhrana Agent Dolin 66-10-2 R & D for Intelligence Processing 66-10-2 The Birth of Central Intelligence 66-10-2 The Science Atlache Program kReview 66-10-2 The Soviet AUas as a Source Book Review ------·················--•·.----- 21or66 66-10-2 The Face of Moscow In the Missile Crisis 66-10-3 La Guerre a Ete Gagnee en Suisse 66-10-3 Nevidna Fronta 66-10-3 Not in the Public Interest 66-10-3 Three Research Memoranda On The Tiger's Back (j) 66-10-3 (')""'" 0 66-10-3 .- e n erground War Against Ravo ulionary France: Missions o co""'" 66-10-3 William Wickham 1794-1800 0 (.) Seven Years to Luna 9 LO 66-10-3 0 --.-0 66-10-3 Communications to the Editor-Add the Hotel Engineer LO .--- 66-10-3 Communications to the Editor- The Missile Crisis 0 N Q.i 66-10-3 Military Intelligence 1861-63- Part 1 VJ C1l Cl) 66-10-3 The Chinese as Agent al 0:: 66-10-3 The Failure of Cosmos 57 I... I... 0 66-10-3 Concerning Espionage and Social Courtesy .E "C "C - 66-10-3 Notes on the Wennerstrom Case Cl) Cl) > > 0 I...c. 66-10-3 Paris Okhrana 1885-1905 ec. c. The Watchdog Committee Question c. <( 66-10-3 <( 66-10-4 Secrets of Electronic Espionage 66-10-4 March Crisis 1948, Act 1 66-10-4 Security as an Intelligence Community Concern 66-10-4 The Detection of Joe 1 66-10-4 Career Trainee Program, GRU Style 22 of 66 66-10-4 Military Intelligence 1861-63- Part II 66-10-4 Military-Economic Estimating- A Positive View 66-10-4 The Investigation of UFOs 67-11-1 A-54: Spion mil Drei Geslchtem 67-11-1 ABC Der Spione ..,,. 67-11-1 The Mare's Nest ..,,. Ol ~ 67-11-1 Intelligence for the Policy Chiefs ("') 01--~~~~-+~--~~~~~--~~~~~~~~~~~~~~~ ..,,.0 ..,,. .,.... co 67-11-l The Kldnaping of the Lunik co 0 0 () () 67-11-l Which Way Did They Go? LOl-'--'-....;...;'--'-~~-+~~~'""'-~~-'-~~~~~~~~~~~~~~~4 L() 0 0 0 67-ll-l Automation for Information Control 0 .,.... .,....-.. -.. L() ~ 67-11-l Community Progress in Information Handling .,.... 0 0 N N Q.i 67-11-1 Second Bibliography of Soviet Books and Articles Q) rJ) ~ 67-ll-l A Staff Agent's Second Thoughts Cll Q) A New Kind of Air Targeting ~ 67-1 l-l Q) &:'. 67-11-1 The Illustrious Career of Arkadiy Harting 0:: I... 0 67-11-2 A Don at War .2 ; 67-l l-2 British Agent "O Q) ~ 67-11-2 Der Fall Rudof Roessler > e 67-11-2 Diplomacia e lnteligencia Estrategica c..e Secret Air Mission c.. 67-11-2 <( <( 67-11-2 SOE In France 67-ll-2 The Case of Richard Sorge 67-11-2 The Peacemakers: The Great Powers and American Independence 67-11-2 The Real Eddie Chapman Story 67-11-2 The Secret Surrender 67-11-2 The Spy Who Wasn't Caught 23 of 66 67-11-2 . Moon Bounce Elin! Article 67-11-2 Chinese Industry from the Air Article 1 67-11-2 March Crisis 1948, Act II Article ~ 67-11-2 Red Nautilus Under Way Article ~ O> O> (>") (>") 0 67-11-2 The NSA Journal Article 0 ~...... ~ 24 of 66 67-11-4 Salaista Palapelix 67-11-4 Serviclo de lntellgencla de Cuba Communista 67-11-4 Soldiering for Peace 67-11-4 The Hunt for German Scientists 67-11-4 The Virus House -.;!" 67-11-4 Aerial Photography for Agriculture (J) (") 0 67-11-4 Communications to the Editors: Cl Lantern -.;!"..... co 0 67-11-4 Communications to the Editors: Simplification () LO 67-11-4 Passport to Death -..0 0..... 67-11-4 The Metal Traces Test ;:o 67-11-4 A Theorem for Prediction ..... 0 67-11-4 Roderick "Steve" Hall N 67-11-4 The Sherlock Holmes of the Revolution CJ.) (/) 67-11-4 To Move a Nation co CJ.) Q) 67-11-4 On The Soviet Nuclear Scent 0:: 68-12-1 Adventure in Diplomacy I... I... 0 68-12-1 Competitive Interference .E "C "C -68-12-1 Der Deutsche Geheimdienst CJ.) CJ.) E; 68-12-1 L'actuelle Guerre Secrete e> I... 68-12-1 My Own River Kwai c. c. <{ 68-12-1 Spion Voor NATO <{ 68-12-1 The American Intelligence Community 68-12-1 The Broken Seal 68-12-1 The Espionage Establishment 68-12-1 The Man From Moscow 68-12-1 The Military Attache 68-12-1 The Young Stalin ~------·------··---·· 25 of 66 68-12-1 68-12-1 Encyclopedia of World Espionage Book Review 68-12-1 Central Intelligence Under Souers Book Review How Three Estimates Went Wrong Book Review ' 68-12-2 Communications to the Editors- Wise & Ross Book Review 68-12-2 Crystal Balls and Glass Bottles IArticie 68-12-2 Pricing Soviet Military Exports Article ~------·------~ 26 of 66 68-12-2 Quality Elin! 68-12-2 Soviet Reality Sans Potemkin rticle I 68-12-2 VIP Health Walch Book Review ...,. 68-12-2 Communications to the Editors: on Wise and Ross ...,. O> O> (") (") ...,.0 68-12-2 Philatelic KGB ...,.0 ..... A Value for Information ..... 27 of 66 68-12-4 La Guerre a Ete Gagnee en Suisse Book Review 68-12-4 L'Orchestre Rouge Book Review 68-12-4 My Silent War Book Review 68-12-4 Identifying the Future Threat icle " O> C") 8 68-12-4 View from the Hot Shop 1Book Review 0 "Singapore's People's Association Miele 0 ...... U'5 1969-13-1 Sailor in a Russian Frame Book Review LO...... 0 1969-13-l The Okhrana- A Bibliography ook Review 0 C\I C\I 1969-13-l The Zinoviev Letter ook Review Q.i Cl) (/) 1969-13-1 Bay of Pigs ook Review (/)ca ~ 1969-13-l P.0.W. Boo~ Review ~ a; Cl) 0:: 0:: l 969-13-1 Communication to the Editors- On 'Valediction" OMMENT ~ ~1-~~~~-+~~~~~~~~~~~~~~~~~~~~~~_, -2 0 'C 1969-13-1 Michael Collins and Bloody Sunday -'C Cl) Cl) > > 0 Policy and Intelligence- The Arab-Israeli War ~ 2 1969-13-1 a. a. <{ 1969-13-1 The Anatomy of Counterintelligence Article <{ : 1969-13-1 The Case of the SS-6 rticle 1969-13-1 The Old Winsockie Syndrome rtlcle 1969-13-1 DCI Hillenkoetter- Soft Sell and Stick Article 1969-13-1 Spotting Photo Fakery rticle 28 of 66 1969-13-2 CIA- Problems of Secrecy in a Democracy 1969-13-2 StaJe CIA? eyond We ster and nconventional 1969-13-2 Language On Aging Leaders " 1969-13-3 Biographic Collection Programs Book Review 1969-13-3 The Case Against Solzhenitsyn Book Review 29 of 66 -----···············-~ 1969-13-3 The Exploitation of Foreign Open Sources he Interpretation o Soviet ress Announcements of Cosmos 1969-13-3 Satellite Launchings 1969-13-3 The President's Board-1956-1960 v 1969-13-3 The SS-8 Controversy v O> O> ("') (") 0 1969-13-3 The Standardization of Foreign Personal Names 0 .....v .....v co co 0 1969-13-3 The Unidentifieds Article 0 (.) (.) LO I() 0 1969-13-3 The Rote Orel- Getting Behind the "Lucy" Myth ookReview 0 -.....0 1969-13-3 A Good Trip rticle -.....0 LO 1969-13-4 AssassinaUon Bureau, inc. OMMENT LO -..... Western Economic Warfare ..... Article - 0 1969-13-4 0 N N Cl.l 1969-13-4 Cloud Nine- A Problem In intelligence Production ' rticle Cl.l IJ) IJ) Cll ro ~ 1969-13-4 DOI New York '3ook Review Cl> Cl> iii 0:: 0:: .... 1969-13-4 Defense Against Communist Interrogation Organizations rticte ..... 0 ,£ Non-Electronic Agent Communications l'\rticie "C -a5 1969-13-4 Cl> > > On the Accuracy of National Intelligence Estimates .....0 ec.. 1969-13-4 oak Review c.. c.. c.. <( 1969-13-4 Platt's Law rticle <( 1969-13-4 Power in the Kremlin E!ook Review 1969-13-4 Rolling Thunder and Bomb Damage lo Bridges ~icle I 1969-13-4 The 30 September Movement In Indonesia Miele 30 of 66 1969-13-4 The Bogotazo 1969-13-4 Winnowing Wheat from Chaff 1970-14-1 Die Kommunistischen Partelen der Well 1970-14-1 La Deuxleme Mort de Ramon Mercader ' 1970-14-2 A Modest Suggestion for a Review of the Bidding 1970-14-2 Intelligence In the Ecological BatUe rticie 1970-14-2 New Perspectives in ELINT rticle ------·-~---·---- 31 of 66 1970-14-2 The Elicitation Interview 1970-14-2 The Many Burdens of Defense in the Soviet Union 1970-14-2 The Soviets and Repetitive Fonnulae (J) 1970-14-2 What Basic Intelligence Seeks to Do (J) ""'"M M""'" 0 0 1970-14-2 Who Has the lnfonnation I Want? .,.... «)""'" 1970-14-2 Communist Defense Against Aerial Surveillance in Southeast Asia ""'"co 0 8 1970-14-2 Some Limitations in Systems Analysis In Intelligence Activities u ~rl_9_70-~1_4_-2~~rT_he~Le_s_s_on_s_o_f_lh_e_S_e_p_te_m_b_e_r_3_0_A_ffa_ir~-~~~~~~___, I.() 1971-15-1 The Alsos Mission f2 .,....0 .,....0 1.() --~ 1971-15-1 Basic Psychology for Intelligence Analysts --.,.... 0 0 N N 1971-15-1 Scandinavians as Agents (ii Cl) Ii) Ii) cc ~ 1971-15-1 United States v. Harry A. Jarvinen Cl) Q) 1971-15-1 A Note on KGB Style Q) 0::: r: 1971-15-1 Somewhere in Siberia .... .2 1971-15-1 The Good Old Days - "You are On Your Own" .2 -0 ~ 1971-15-1 The OXCART Story Cl) > ~ 1971-15-1 What Size is It? ....0 .... a. a. a. ~ 1972-16-1 The John Richard Hawke Case <( 1972-16-1 Leon Trotsky, Dupe of the NKVD 1972-16-1 Letter to the Editor-A Comment on A Note on KGB Style 1972-16-1 The Summit Conference of 1960: An intelligence Officer's View 1972-16-1 Elegant Writing in the Clandestine Services 1972-16-2 In Quest of Justice Communication lo the Editors - On "Intelligence in the Ecological 1972-16-2 Battle" '------·------ 32 of 66 1972-16-2 1972-16-2 1972-16-2 ovskly's Legacy and Strategic Research ~rticle 1972-16-2 Bayes' Theorem for Intelligence Analysis Book Review 'Russia's Reactors -(),) "O (),) > > e 1972-16-3 The Cuban Missile Crisis-Phase I ....0 a. a. a. 1972-16-3 Assignment - Skyjacker a. ~ 1973-17-1 ~ 1973-17-1 1973-17-1 1973-17-1 ic/e 1973-17 :Book Review 1973-17-1 The Myth and the Madness Article 33 of 66 1973-17-1 Deception 1973-17-1 CETA: Chinese-English Translation Assistance 1973-17-1 Stretegic Arms Limitation and Intelligence ' 1973-17-3 The Statue of Nathan Hale rticle L______. ___ , _____. ______------ 34 of 66 ~--···········------···-- 1973-17-3 Book Review 1973-17-3 !6-rticle 1973-17-4 14-rtlde 1973-17-4 Twice Through the Lines Article ...,. 1973-17-4 British Military Intelligence Article a> (") ...,.0 1973-17-4 CIA, The Courts, and Executive Privilege .,... Nathan Hale's Mission 35 of 66 197 4-18-3 KGB- The Secret Work of Soviet Agents 1974-18-3 Operation Splinter Factor 1974-18-3 TheArab Mind 1974-18-3 Declassification in an Open Society 1974-18-3 Preface to a Theory of Intelligence 1974-18-4 The Portuguese Connection " 1975-19-2 Another View of S&T Analysis 1975-19-2 Secrecy and Intelligence in a Free Society 1975-19-2 The Case for a Holistic Intelligence 1975-19-2 The Shadow War- European Resistance 1939-1945 1975-19-3 Fight Another Day 36 of 66 1.975-19- e CIA Operations Center 1975-19-3 e Great Chinese Mounds Puzzle " Q.l 1976-20-2 Intelligence Reform in the Mid-1970s Book Review Q.l (J) (J) co 1976-20-2 Thirty-five Years in Intelligence co Q.l Q.l Q5 1976-20-2 Master of Spies Q5 ll'. ,_ 1976-20-3 A Man Called Intrepid ll'.,_ .E A Glimpse into the History of Secret Writing .E "O 1976-20-3 "O Q.l Q.l e> 1976-20-3 icle e> Q. Miele Q. Q. 1976-20-3 Q. <( 1976-20-4 Article <( 1976-20-4 1976-20- atch-Can Operations 1976-20-4 arket for Finished Intelligence rvticle 1977-21-1 ~rticle 37 of 66 ------, Inside the KGB 1977-21-l Caught in the Middle in Beirut 1977-21-l Elegant Writing in the Clandestine Services 1.11 1977-21-1 National Estimates: An Assessment of the Product and the Process ...,,. ...,,. 0) 0) (") 1977-21-l (") ...,,.0 ...,,.0 ..- ..- co 1977-21-1 Some Issuances of the Center for the Study of Intelligence co 0 0 (.) 1977-21-1 The Marchetti Case: New Case law (.) LO LO 0 1977-21-2 CIA's Secret Operations 0 0 ..--- 1977-21-2 Secrets, Spies and Scholars 0..--- U'i LO ..- Cryptography During World War I: A Tsarist Russian's View ..-- 0 1977-21-2 0 N lnte 1gence Monitoring of Reduction-a - u get rms ntro N Q) 1977-21-2 Agreements Q) V) V) Ctl Ctl Q) 1977-21-2 Some Mathematical Methods for Intelligence Analysis Q) Q) Q) c::: c::: ..... 1977-21-2 The Arcane Art of Necrology ..... 0 '+- 1977-21-3 Wilhelm Canaris .8 "'O "'O Q) Q) > 1977-21-3 > .....0 a. ea. a. 1977-21-3 a. <( <( 1977-21-3 The Intelligence Community Post-Mortem Program, 1973-1975 1977-21-3 There are More Things - In National Estimates u les- A B ograp y of Eleanor, Ian an Jo fl osier Du es and 1977-21-4 their Family Network 1977-21-4 Spies and Spymasters 1977-21-4 The Man Who Broke Purple 38 of 66 1977-21-4 Very Special Intelligence 1977-21-4 Anatomy of PRM-8 1977-21-4 Parapsychology In Intelligence: A Personal Review and Conclusion vr1_9_77_-_2_1-_4~~~1n_~_ll~ig~e_nce~a_n_d_t_he~G_en_e_ra_l_S_ra_ff~~~~~~~~~~---; ...... ~ 1978-22-1 A Satellite View of e Historic Battlefield (J) C") ~ 1978-22-1 Secret Intelligence in the Twentieth Century 0 .,...... (0 1978-22-1 Siient Missions co 1978-22-1 The Israeli Secret Service 0 8 () LO 1978-22-1 The Shamrock and the Swastika LO ~ 1978-22-1 The Wrong Horse 0 .,...01-~~~~-t~~~~~~~~~~~~~~~~~~~~~~....., .,...--0 ;:;:;.,... 1978-22-1 Polltlcal Forgeries In the Middle East .,...--LO 0 0 N 1978-22-1 N (].) lltary (].) (/) ~ 1978-22-1 co (].) (].) Q) Q) o::: 1978-22-1 The Life and Death of Cosmos 954 0::: '- 1978-22-2 Practise to Deceive '- £1--~~~~-+~~~~~~~~~~~~~~~~~~~~~~~ £ "O -g 1978-22-2 Analyst in a Helicopter (].) > > 0 a.. 1978-22-2 Cognitive Biases ea. 0.. a. <( <( 1978-22-2 The Myth of the Rogue Elephant Interred 1978-22-2 Chinese Security Regulations 1978-22-2 Communications Intelligence and Tsarist Russia 1978-22-3 Assessing ODO Human Source Reporting 1978-22-3 A Bible Lesson on Spying 39 of 66 1978-22-4 Hitler's Spies 1978-22-4 Honorable Men 1978-22-4 The Nazi Connection 1978-22-4 Communication from the Editor: Intelligence Vlgnettes rticle 1978-22-4 Maxims for Analysts rticle Ol Ol """(") """(") 0 1978-22-4 The Missing Link icle 0 .,.... .,.... """co The Holocaust Revisited """ 1979-23-2 Communication from the Board of Editors 1979-23-2 On Optimism 1979-23-2 Personality Profiles in Support of the Camp David Summit 40 of 66 ,------_,, ______ 1979-23-2 Soviet Comlnt and the Civil War, 1918-1921 1979-23-2 The Mayaguez Rescue Operation Revisited 1979-23-2 The Million-Dollar Photograph utob ography o a py Who Defecte to ...,. ...,. Ol 1979-23-3 (') Ol 1979-23-3 The CIA at Work (') ...,.0 0 ..-- 1979-23-3 Ultra goes to War ...,. co ..- 0 1979-23-3 American Espionage- From Secret Service to CIA co 0 (.) 1979-23-3 Briefly Noted Vol 23, No 3 (.) LO LO 0 0 0 1979-23-3 Analysis, War, and Decision 0 ..---- ..-- LO 1979-23-3 President Truman and the Congolese SAM LO ..---- ..--- 0 N 0 a; 1979-23-3 The OSS Assessment Program N en 1979-23-4 A Station in the Delta a; co en Q) 1979-23-4 Briefly Noted co Q) ~ Q) er: 1979-23-4 The Storm Petrels er: I... I... 0 1979-23-4 A Plea for Continuity in Intelligence Production .2 -"'O "'O Q) > 1979-23-4 Before the Farm Q) 0 > I-c.. e c.. 1979-23-4 Measuring the Military Balance In Central Europe c.. <( c.. 1979-23-4 ----- <( 1980-24-1 1980-24-1 1980-24-2 1980-24-3 A Tribute to Sherman Kent Article 41 of 66 A Short Tour Through the History of lnteHigence --··~·--- 1981-25-1 Harry S. Truman on CIA Covert Operations !Arlicle '<:I" .q- C1I C1I ("') 1981-25-1 Intelligence Estimates: Lei's Make Them Useful CEREMONY ('I) 0 0 '<:I" .q- .,.. 1981-25-1 The case of the Cryptic Communique ~icle ..- co (].) 1981-25-2 Why Vietnam (].) (f) (f) Cl:l Cl:l (].) 1981-25-2 And the Curtain Fell on Yor1down Article (].) a:; a:; 0:: Chronology of a Deception B 0:: '- 1981-25-2 .... .2 ,£ "O 1981-25-2 Book Review "O (].) (].) > > 0 1981-25-2 ;Book Review '-c. ec. c. c. <( 1981-25-2 Book Review <( 1981-25-2 lcle 1981-25-2 Strategies for Analytical Judgment Article 1981-25-3 An Interview with Richard Helms iaook Review 1981-25-4 Donovan and the CIA 'Article 42 of66 : 1981-25-4 Project Termination with a Change of Administration Article 1981-25-4 Biases In Evaluation of Evidence 'Article 1982-26-1 "Zdravo, Purvl Amer1canec• Book Review ...,. 1982-26-1 Before James Bond Article ...,. a> (") a> 1982-26-l Critical Time Junctures in the National Estimative. Process !Book Review (") ...,.0 ...,.0 .,.... .,.... co 1982-26-1 The Professionalizatlon of Intelligence !Article co 0 0 u A Tribute to Some Unsung Heroes u !.O 1982-26-2 !Book Review 0 !.O 0 -...0 ...... 1982-26-2 Development of the Lockheed SR-71 Blackblro Article 0.,.... -... -... !.O.,.... !.O 1982-26-2 Economic Intelligence for the Future Book Review ...... 0 0 N N (!.) 1982-26-2 J58/SR-71 Propulsion Integration Book Review (/) Q.) (/) (!.) 1982-26-2 The Clandestine Service !Book Review "ii)°' °'(!.) er: "ii) ._ 1982-26-2 Valedictory !Book Review er:._ 0 0 "O 1982-26-2 Who Knew Not Fear Book Review -(!.) "O -(!.) "Man You Must Be Lost or Something• e> 1982-26-3 Article > 0. e The President at Langley Article 0. 0. 1982-26-3 0. <( <( 1982-26-4 War Behind the Lines Article 1982-26-4 Teaching inlelllgence Article 1983-27-1 Reports Officer - Issues of Quality Article 1983-27-1 urprise Attack Article 1983-27-1 Instructions for a Secret Mission to Russia Article 43 of 66 1983-27-1 National Security and lhe First Amendment 1983-27-2 Military Deception and Strategic Surprise 1983-27-2 A 17th Century English Intelligence Report Book Review 'V 1983-27-2 Commentary on "Intelligence gathering and the Law" 'V Cl) Cl) ("') ~ 1983-27-2 Intelligence Gathering and the Law k Review 0 'V 'V.... «> 1983-27-2 Memorial Ceremony co 0 . 0 (.) (.) i.o 1983-27-2 The Travail of Intelligence Analysis ~ 1983-27-3 Conflict ofDuty .._"°0 01--.;.._....;...... -....-+:-.,,.------~------1 0 '.!::::: 1983-27-3 SDECE Service 7 .._.... "° .... o 1983-27-3 Intelligence in Crises "°0 Nl-"'-.;;.;;...... ;....;;._ __-+----=------1 N C:D ~ 1983-27-3 National Interest, Morality, and lntelllgence I/) (ll (ll Q.) Q.) iii 1983-27-3 The Objective Is to Keep the Peace c:: c::iii Warning Cycles Book Review .... 0 1983-27-3 .E "'" "C al 1983-27-3 We Believed in Our Work rticle Q.) >l-'-'-.;,.;...... ;....;;.___ -+------1 > e ....0 1983-27-4 Financial Epitaph for a Spymaster Cl. Cl. <( <( 1983-27-4 Translation Error and Political Misinterpretation Book Review 1983-27-4 George Washington: Manager of Intelligence icle 1984-28-1 Inside the Soviet Army Article 1984-28-l Vietnam: A History Book Review 1984-28-1 Disclosure Problems in Espionage Prosecutions Article 1984-28-1 The Intelligence Background of Operation Torch Article 44 of 66 1984-28-1 NATO Intelligence -A Contradiction in Terms 1984-28-2 The Evaluation of Intelligence 1984-28-2 The OSS and the Maginot and Siegfried Lines 1984-28-3 The Hazards of Single-Outcome Forecasting 1984-28-3 The Shadow Warriors: OSS and the Origins of the C.l.A. " 1985-29-2 Briefly Noted Vol 29, No 2 1985-29-2 Breaking with Moscow 1985-29-2 Red Flag Over Afghanistan 1985-29-2 Sidney Reilly 45 of 66 i 1985-29-2 Deciphering Soviet Military Doctrine Miele 1985-29-2 From Ambassador to Prison Spy icle 1985-29-2 Surprised by Tito: Anatomy of an Intelligence Failure " 1986-30-1 Lawrence R. Houston: A Biography rtlcle 1986-30-1 The Future of Intelligence rticle 1986-30-1 Tradecraft In Ancient Greece f..rticle 1986-30-2 Psychology ofTreason Article 46 of 66 -(0 -..0 Techlogy - Origins of a Directorate Enemy University al Oversight of Intelligence ' 1986-30-4 The Supreme Court and the "Intelligence Source• jBook Review 1986-30-4 1987-31-1 1987-31-1 1987-31-1 !Book Review 47 of 66 ,------ 1987-31-1 Soviet Military Vulnerabilities 'Book Review 1987-31-1 The Ill-fated Trojan Spy Book Review 1987-31-1 William J. Casey !Article 1987-31-2 The Agency: The Rise and Decline of the CIA ,Article v v O> O> C'? a 1987-31-2 The Framers on the Realities Article aC'? v v ..- ..- co 1987-31-2 As Others Saw Us Article co a a (.) (.) Article I.() 1987-31-2 Where Secrecy is Essential I.() a a a Article a ..---- 1987-31-2 With Fidelity to the Constitution ..---- I.() I.() ..---- iCEREMONY ..---- a 1987-31-2 "You're From Where and You're Doing What?" a N N IBook Review Q.) 1987-31-2 Presidential War Powers Q.) (J) (J) C'O C'O Q.) 1987-31-2 The CIA and Congress: Uneasy Partners Article Q.) a:; a:; (}'.'. Article (}'.'. I- 1987-31-2 View from the Hill I- 0 1987-31-3 Article 0 -'O I 'O Q.) -Q.) > 1987-31-3 Amphibious Intelligence I Book Review > 0 0 I- a.. I-a.. a.. 1987-31-3 Intelligence and Command Article a.. <( <( 1987-31-3 Intelligence and National Power I Article 1987-31-3 Searching for National Intelligence Article 1987-31-3 The CIA and American Foreign Policy Book Review 1987-31-4 Spycalcher Article 48 of 66 1987-31-4 Intelligence as a Force Enhancer 1988-32-1 "C": The Secret Life of Sir Stewart Graham Menzies - vol 32 issue 1 1988-32-1 Diplomats and Terrorists II 1988-32-1 Mongoose, R. I. P. 1988-32-1 The Ayatollah In the Cathedral-Reflections of a Hostage 1988-32-1 Vi my (j) (j) (")""" (")""" 0 1988-32-l Counterintelligence for the 1990s 0 ..- ..- """co """co 0 1988-32-1 Defectors' Problems in the West 0 () () L.O Structuring Intelligence for War L.O 0 1988-32-1 0 ..---0 0 1988-32-1 The OSS-German POW Controversy ..--- L.O ;:() ..--- 1988-32-2 'C': The Secret Life of Sir Stewart Graham Menzies - vol 32 Issue 2 ..- 0 0 N 1988-32-2 Red Horizons N Q) 1988-32-2 The Age of Terrorism Q) rJ) rJ) CCI CCI Q) 1988-32-2 The White Lady Intelligence Network Q) a> Q) 0::: 0::: '- 1988-32-2 John A. McCone -An Outsider Becomes DCI '- .8 1988-32-3 Veil: The Secret Wars of the CIA, 1981-1987 .8 "'O "'O Q) Q) e> 1988-32-3 "If Donovan Were Here Today' e> 0.. 0.. 0.. 1988-32-3 Deception for St. Mihiel: 1918 0.. <( <( 1988-32-3 The Chinese Intervention in Korea, 1950 1988-32-3 The Evolution of Australian Intelligence 1988-32-3 Intelligence Estimates and the Declslonmaker 1988-32-4 AIDS Disinformation 49 of 66 ~ook Review Review 1988-32-4 Ultra and the Walker Case ' 1989-33-2 Dealing with lntelllgence - Polley Disconnects 0 The Encyclopedia of American Intelligence and Espionage :;; 1989-33-2 "O Q) -Q,) > §> 1989-33-2 Burn Bags 0 ~ ...... _;;...... ;.....;;__-1---.:::----~~~-----~~~~~~---1 ~ Cl. Cl. <( 1989-33-2 Diplomacy, Intelligence, and Portugal's Revolution <( 1989-33-2 Intelligence Rivalries in Wartime rticle 1------o tale: The Profumo ase and lhe Framing of Stephen 1989-33-3 l\rticle 1989-33-3 l\rticle 1989-33-3 The CIA and American Democracy 3ook Review 1989-33-3 The Territory of Lies: The Exclusive Story of Jonathan Jay Pollard icle ...... J 50 of 66 ------·------ 1989-33-3 From the Okhrana to the KGB Article 1989-33-3 Early Warning Systems Article 1989-33-4 America's Secret Powers: The CIA In a Democratic Society Book Review ""'" 1989-33-4 Intelligence and Foreign Policy O> O> ""'"<") 8 1989-33-4 Strategic Intelligence and Effective Policy 0 ~ 1990-34-1 The Ring of Power ..- CD ""'"CD 0 8 1990-34-1 Allen Dulles: An Appraisal 0 LO LO 0-.... 1990-34-1 High-Intensity Annoyance 0-.... 0 0 -...... - .....-.... LO 1990-34-1 Photo Intelligence and Public Persuasion LO .....- .....- 0 0 N 1990-34-1 Secrecy and the Media N Q) Q) I/) ~ 1990-34-1 Triage in Intelligence 1990-34-3 Archie Roosevelt, Original 1990-34-3 Veni, Vidi, Vid-lnt 1990-34-3 CIA, Ghana, end th 51 of 66 1990-34-3 Arms Control Compliance and Intelligence Article 1990-34-4 The KGB: Masters of the Soviet Union Article 1990-34-4 The Unknown CIA Article 1990-34-4 Evaluating Soviet Military Strength Article ' Q.) Q.) rn The Future of Ex-Eastern Bloc Intelligence Personnel rn CCI 1991-35-2 CCI Q.) ~ Q.) Q.) a::: 1991-35-2 The In-Culture of the DO a::: ...... 0 1991-35-2 The Kent-Kendall Debate of 1949 0 "O "O -Q.) -Q.) > 1991-35-2 > .....0 .....0 c.. c.. c.. 1991-35-2 OSI and Arms Control Monitoring c.. <( 1991-35-3 Intelligence Support to the INF Negotiations <( 1991-35-3 The Primary Purpose of National Estimating 1991-35-3 Tilting at the Tower of Babel 1991-35-3 The INF Treaty 1991-35-4 A Brief Review of OSS Literature 52 of 66 1991-35-4 Covert lnterventlon In Chile, 1970-1973 1991-35-4 Intelligence In Small Wars ~rticle 1991-35-4 Combatting Mindset ~cle v 1991-35-4 The Gulf war From Tel Aviv v CJ) (j) ("') ("') 0 0 v 1991-35-4 Waging Economic Warfare From London ..- ..-v co 1992-36-1 La Mission Impossible- A La Tele Des services Secret co 0 The Samson Option ·c1e 0 (..) 1992-36-1 (..) I.!') 1992-36-1 Silent Warfare iBook Review I.!') 0 0 --0..- 1992-36-1 Guarding Against Politiclzalion )Article ..---0 --I.!')..- ..-I.!')-- 0 1992-36-l The DI 10 Years After ReorganizaUon 0 N N (!.) 1992-36-1 The Need for Ethical Norms (!.) I/) I/) co 1992-36-2 co (!.) ~ an (!.) 1U (!'.'. 1992-36-2 Article (!'.'. ,_ 0 1992-36-2 Miele 0 The Spy Who Saved the World t\f11cle "'"" -"C 1992-36-2 "'O (J.) (!.) > > 1992-36-2 Military Intelligence Sources During the American Civil War ,_0 eQ. Q. Q. Q. <( 1992-36-2 Tribal Tongues: lnlelHgence Consumers, Intelligence Producers <( 1992-36-2 Taking Arms Against a Sea of Enemies 1992-36-3 Reminiscences or a Varied Life-An Autobiography of Sherman Kent 1992-36-3 Cold Warrior 1992-36-3 Managing Covert Political Action lArticle 53 of 66 1992-36-3 The Vemork Action 1992-36-4 Major John Andre- A Gallant in Spy's Clothing 1992-36-4 A Legacy of Excellence rticle ...,. 1992-36-4 America's First Encrypted Cable rticle ...,. O> O> (") 1992-36-4 The Sen Cristobal Trapezoid rticle (") ...,.0 ...,.0 ..- ..- co 1992-36-4 Dedicating the Berlin Wall Monument co 0 Openness and Secrecy 0 () 1993-37-1 () LO 1993-37-1 A Case Officer's First Tour LO 0 0 -... 1993-37-1 SIGINT in the novels of John le Carre -... 0 0 -.....- 1993-37-1 The Exploits of Agent 110 -Allen Dulles In Wartime ..--... LO LO ..- 1993-37-1 The Hislor1cal Intelligence Collection ..- 0 0 N 1993-37-2 Government Spying for Commercial Gain N Q) 1993-37-2 Lebanon and the Intelligence Community Q) (/) (/) Cll 1993-37-2 Reflections on Mail-Order Tradecrafl Cll Q) Q) Qi 1993-37-2 Briefing Governor Clinton in Little Rock Q) 0::: 0::: ..... 1993-37-3 At Work With Donovan ..... 0 1993-37-3 Bridging the Intelligence-Policy Divide 0 "'""" "'""" "'C NTA "'C Q) Q) > 1993-37-3 Historical Intelligence Documents > 0 0 ..... 1993-37-3 The ALFA Story ..... 0.. 0.. 0.. 0.. <( <( 1993-37-3 1993-37-4 uestion-s--- 1993-37-4 1993-37-4 Taking Care of Business -A CIA Officer in Residence 1993-37-4 The Intelligence Revolulion and lhe Future 1994-38-1 Fifteen DCls' First 100 Days 54 of 66 -...._,(I') -.0 1994-38-1 1994-38-1 1994-38-1 Lessons in Intelligence 1994-38-1 ing and Teaching Intelligence 1994-38-2 A Policymaker's Perspective on Intelligence Analysis v Of Moles and Molehunlers O'> 1994-38-2 ("') Origins of Iha Congress for Cultural Freedom, 1949-50 0 1994-38-2 v..- 1994-38-3 British and American Policy on Intelligence Archives co 0 1994-38-3 The Komsornolats Disaster 0 1994-38-3 Truman and Eisenhower - the Process l.O 0._ 0 1994-38-4 ..-._ 1994-38-4 The Fall of LimaSita 85 l.O ..- 1994-38-4 The Rola of US Army Miiitary Attaches Between the World Wars 0 N 1995-39-1 Intelligence and thE! Rise of Judicial Intervention Q) Paul Woitowitz on Intelligence Policy-Relations (/) 1995-39-1 C1' The Intelligence Community- Is it Broken? How to Fix It? (!) 1995-39-1 Q) 1995-39-1 Thoughts Engendered by Robert McNamara's In Retrospect ~ ..... 1995-39-2 Gaining Access to CIA Records ..... 0 1995-39-2 Personal Reflections on Bill Casey's Last Month at CIA .E "C · Soma Thoughts on Irregular Warfare "C -(!) 1995-39-2 Q) e> 1995-39-3 The Creation of the Central Intelligence Group > a. 1995-39-3 The FarewaU Dossier e a. <( 1995-39-3 Thoughts Provoked by 'The Very Best Men' <( 1995-39-4 Adam Smith Examines The Intelligence Economy 1995-39-4 and the Intelligence Community 1995-39-4 Commission and the Future of Intelligence !Discussion 1995-39-4 Role In the Study of UFOs, 1947-90 Article 1996-40-1 Breast Cancer Detection Research Article 1996-40-l Fifteen Axioms for Intelligence Analysts ft'.rticle 55 of 66 1996-40-2 Art1c1e 1996-40-2 Inside the White House Situation Room icle .... 1996-40-2 The Coming Intelligence Failure ~cle O> ("".) 1996-40-2 Toward a Functional Model of Information Warfare Article 0 ...... 1996-40-2 The CIA's Internal Probe of the Bay of Pigs Affair co A Review of Congressional Oversight 0 1996-40-2 () 1996-40-2 CIA's Support to the Nazi War Criminal Investigations lO 0 1996-40-2 Why CIA Analysts Were So Doubtful About Vietnam .....0 1996-40-3 A First Tour Like No Other !Article in... 1996-40-4 Congress as a User of Intelligence 0 1996-40-4 Integrity, Ethics, and the CIA N 1997-41-1 An Allied Team With The French Resistance in 1944 Qj tJl 1997-41-1 The Dutch Resistance and the OSS (1l Q.l 1997-41-1 The OSS and the Italian Partisans in Wo11d War II Q.l D.'.'. 1997-41-1 I... 1- .E 1997-41-2 .E "O Reagan and the President's Daily Brief Q.l 1997-41-2 "O > Q.l 0 1997-41-3 Secrets, Free Speech, and Fig Leaves > I... 0 0. 1997-41-3 The Pike Committee lnves ns and the CIA l-o. 0. Panning atellite Reco ce lo Support uture Military 0. <( <( 1997-41-3 Operations IArticle 1997-41-4 Calling the Sino-Soviet Split Article 1997-41-4 An Exceptional Espionage Operation Article 1998-42-1 The National Intelligence support Team Article 1998-42-2 A Classic Case of Deception Article 1998-42-2 CtAAirOperations in Laos, 1955-1974 Article 1998-42-3 A Close Call In Africa :Article 56 of 66 1998-42-3 White 1998-42-3 Skis and Daggers 1998-42-4 Interviewing an intelligence Icon Walter Pforzheimer Reminisces 1998-42-4 Stalin's Kiiiing Field 1999-43-l Recollections of the Church Committee's Investigation of NSA A US Naval Intelligence Mission to China In the 1930s Miele ..;t (j) 1999-43-2 (j) """('I') An lnte1View With Richard Lehman 'cle (") 0 1999-43-2 0 .....'1947 ~lcle 0 ~ ...... -- 1999-43-2 The OSS and Project SAFEHAVEN 11.rticle ..... IJ") iii ...... -- 1999-43-2 Valedictory /:>.rticle ...... 0 1999 0 N N Q,) unclassified ID VJ VJ ctl issue The U-2 Program - A Russian Offlcer Remembers ctl Q,) 1999 ID 03 03 a::: unclassified a::: ...... _0 issue The U-2 Program - The DCl's Perspective Miele J2 -0 2000 9 -0 Summer Prospects for a European Common lntelllgence Polley > ...0 ec.. 2000 9 c.. c.. Summer US lnteUigence and the End of the Cold War 0.. 4: 4: 2000-44-1 Congress, the CIA. and Guatemala, 1954 2000-44-1 The Alger Hiss Case 2000-44-2 Creating A Slatutory IG at the CIA 2000-44-2 Flawed by Design - The Evolution of the CIA, JCS, and MSC 2000-44-2 Intelligence and the 'Market State' 2000-44-2 Openness and the CIA 2000-44-2 Openness and the Future of the Clandestine Service 57 of 66 ...... ~...... 0 The Vilification and Vindication of Colonel Kuklinski The Crash of TWA Flight 800 2000-Summer- 9 COMMENTARY - Samuel J. Watson 2001-11-Fall- Winter Eroding the Soviet 'Culture of Secrecy' a> 2001-45-1 Best Truth - Intelligence in the Information Age ook Review """(") 0 2001-45-1 Israel's Quest for Satellite Intelligence ~rtlcle ..- 2001-45-1 The Book of Honor - Covert Lives and Classified Deaths at the CIA """ 58 of 66 on e Dec ine o the Na onal econna1ssance 2002-46-2 mce· 2002-46-2 Roosevelt's Secret War • FOR and World War II Espionage 2002-46-2 The Decline of the National Reconnaissance Office The Secret History of CIA "It 2002-46-2 "It O> The U-2 Spyplane ·Toward the Unknown. A New History of the Early! O> (") 8 2002-46-2 0 "It Arbeit des MfS - Das Zusammenspiel von 'Auflarung' und ....."It bwehr' (The MfS's Operations in the West - The lnt~raction of (() ~ 0 () 2002-46-2 elli ence' and 'Counterlntell ence' () IJ') Commentary on "Two strategic Intelligence mistakes in Korea, 1950" r:;:omment IJ') 0 2002-46-3 0 --.....0 2002-46-3 Evolution Beats Revolution in Analysis .....--0 IJ') From Munich to Pearl Harbor - Roosevelt's American and the Origins: IJ') --...... --- 0 2002-46-3 of the Second World War 0 C\I 2002-46-3 God's Eye ·Aerial Photography 11nd the Kalyn Forest Massacre C\I Q.) One Woman's Contribution to Social Change at CIA iii V'I 2002-46-3 V'I Cts Cll Q.) els of Victory - The Office of Censorship and The American Q.) v 2002-46-3 nd Radio In World War II v 0::: 2002-46-3 0::: '- .._ .E 2002-46-3 The Information War in the Pacific, 1945 ....0 "Cl 2002-46-3 Wanted -A Delinition of 'Intelligence' "Cl Q.) Q.) > 2002-46-3 Ways to Make Analysis Relevant but not Prescriptive > 0 '-a. 2002-46-3 What To Do When Traditional Models Fail ea. a. a. <( 2002-46-4 Cloak end Dollar: A History of American Secret Intelligence <( 2002-46-4 kugun oborilo Kenkyuio no s lnj1tsu e rut ut t e Army 2002-46-4 Noborito Research Institute] Security lntelUgence ices in New Czech 2002-46-4 Republic, Slovakia and Romania Book Review 2002-46-4 Richard Helms: The lntelltgence Professional Personified 2002-46-4 The Brother 59 of 66 ('() -:;::::::: -..a ting Methodologists into Teams of Substantive Experts v ~ 2003-47-1 The Challenge for the PollUcal Analyst CD <") g 2003-47-1 The Need to Reorganize the Intelligence Community 0 ~ 2003-47-2 Red Spy Queen: A Biography of Elizabeth Bentley Book Review ....v CD ~ The Spy Who u enca: Lies and Betrays in the eat o the 0 0 2003-47-2 Cold War-The Judith Coplon Story ook Review 0 LO Chasing Spies: ow t e le n ounterinte 1gence ut LO 0 a Promoted the Pollllcs of McCarthyism in the Cold War Years Book Review -.D 0 2003-47-3 D ~ 2003-47-3 CIA Machinations In Chile in 1970 Article ....-. ~ 2003-47-3 Developing a Taxonomy of Intelligence Analysis Variables LO..- D ~ 2003-47-3 Intelligence In the Internet Era C\I ~ 2003-47-3 Cll (/) ~ 2003-47-3 icle ttl Cll (i) 2003-47- Book Review (i) ': 2003-47- Book Review er:..__ .2 2004-48- ook Review .2 'O ~ Cll > 2004-48-1 Book Review > 0.... e 2004-4&-1 ~ook Review a. <( Article c. 2004-48-1 <( 2004-48-1 lcle 2004-48-1 Intelligence Roform in Europe's Emorging Democracies lcle 2004-48-1 Keeping Pace with the Revolution in Military Affairs ~le 2004-48-1 New Insights into J. Edgar Hoover's Role Miele 2004-48-1 The Man in the Snow White Cell Miele 2004-48-2 A Secret Life Book Review 60 of 66 2004-48-2 Lubyanka In the Days of the Batue for Moscow: Materials from the 2004-48-2 Organs of State Security SSSR from the Central Archive FSB Russi The Reader of ent emen's Mail: Herbert _Yardley and the Birth o 2004-48-2 American Intelligence " ~------·------·------·------ 61 of 66 How the CIA Missed Stalin's Bomb Operatives, Spies an Saboteurs: The Unknown Story o the Men 2005-49-1 and Women of World War ll's OSS 2005-49-1 The Evolution and Relevance of Joint Intelligence Centers 2005-49-1 Treasonable Doubt: The Harry Dexter White Spy Case 2005-49-1 Making the Analytic Review Process Work ~ 2005-49-2 Cultural Intelligence: Individual Interactions Across Cultures " 2005-49-4 Can the USG and NGOs Do More? e K 0.. 0.. 2005-49-4 Creation of a National Institute for Analytic Methods 0.. <( <( 2005-49-4 Developing an Intelligence Capability 2005-49-4 Fifty Years of Studies in Intelligence F rst In: n Insider's Account o How the IA pearheaded the ar 2005-49-4 on Terror In Afghanistan 2005-49-4 The "Photo Gap" that Delayed Discovery of Missiles in Cuba 2005-49-4 The Castro Obsession Book Review ~------ 62 of 66 Book Review 2005-49-4 Article 2006-50-1 Book Review dunng World 2006-50-1 Book Review ~ ~ 2006-50-1 Book Review O'l C") g 2006-50-l Book Review 0 ~ ~ 2006-50-2 lcle ...... 2007-51-1 Book Review 2007-51-1 The Good Shepherd - Intelligence in Recent Public Media Article 63 of 66 Spymistress: The Life of Vera Atkins: The Greatest Female Agent in Worfd War II Strategic Countenntelligence - What Is It and What Should We Do About It? The Musketeers loak - trategic Deception During the Suez Crisis ..,. O'l of 1956 (") ..,.0 The Office of Reports and Estimates - CIA's First Center for Analysis ..... The Tay Ninh Provincial Reconnaissance Unit and Its Role in the 64 of 66 2008-52-2 2008-52-2 Article 2008-52-2 Book Review 2008-52-2 The Mighty Wurlitzer - How the CIA Played America .... 2008-52-2 The Spy Who Never Was .... O> O> (') ('I) 0 52-2 Thinking About Rethinking: Examples of Refonn in Other Profession~ Article ....0 .... 8-52-3 Commemoration of the Dead at CIA ~rtlcle .- co ~ 2008-52-3 ,Book Review 0 (.) (.) I.() I.() 0 2008-52-3 rtlcle 0 0 I 0 ..--- 2008-52-3 Article ..--- I.() I.() .....-- 2008-52-4 ookReview --.- 0 0 C\I ll1tary ntelligence C\I Book Review Cll Cll rn I/) ('(l rticle ('(l Cll Cll a> 2008-52-4 Article 0::: &.... Leader Abdullah Ocalan .... .e 2009-53-l ii'rticle .e "O nla Hall, une Americaine dans la guerre ook Review "O 2009-53-2 What are We Talking About When We Talk about Counterintelligence Article 65of66 1999-2000- Winter- Honoring a Unique DCI: The George Bush Center for Intelligence Five Months in Petrograd 918: Robert W. lmbrie and the US Searc Web su -52-1 for Information In Russia icle ...,. ...,. (j) (j) (") (") ...,.0 ...,.0 ..- ..- co co 0 0 (.) (.) L.O L.O 0 0 0 ..---0 ..--- L.O ..---L.O ..--- 0 0 N N Q.l Q.l VI VI (1l (1l Q.l Q.l Qi Qi 0::: 0::: ...... £ 0 "O -"O Q.l Q.l > > e .....0 Cl.. Cl.. Cl.. Cl.. <( <( 66 of 66 C06140394 - - -- · -· -. ~':·:..·~ ·/.: ·· :~--·~:.~_.r;.· :7::~:·~._-·-./~.';~;·:.::J>i!~:.~'·;;;G"~~ .~~>:..~~ .. (b )(6) Approved for Release: 2015/10/05 co614o3s4·:;~:".(tt,:;·t~"-·~I '1-.~::~-:;;;..'.-~~.~. ) ·~-· . - - -- ' .. -.--. ·-· - ~ . .. •. j . ". . : .... ' ~~---. . --~- «·· -. ,·-. : ': ._: <~ \~~; ~-.~ I _ _J .. .. . -....., .E:!~ ~·-... ,,.; . ~ ~·~-!;}~~~~~;..·)~ii\---~ . '·. -~~'l~t ..,,:<·~e'>::t~ "'~~· t•)ll~J ' . ' ' . - ~ - ~ ·' \ : •·-· · ·· ~".. "" <.,.- •'.iAl'llOJ . .' '.: ~'..' ". ·,: -_:" ~I': · /. " \,.~ :.~f ~ G _h'." -. · ·. · -~:,-..-1 · . r...) • ...~ '_I: •· .· • ·-.1--/: ·} ,.0 ,,_;:r fy- nc.s>. ~G: . . . ,j , !".( ( 1·..j··---;;;· ~f'" -"' ~;, , \ , . :j USA ~T-C0 ..;,;1 ~lSl!IJV511 e U Q . .... t - ~~-,. . i ~ Qi 5~...... --- ... --. ~. . . G , ,,-, ' r. ' .., .!I . ., ·).,( """')_ " "\\ ., , \'t"!1 ) •• !\~·-'·Jl~•. ' ·:: r" l I . . . , CJ -z r ~ IT1 (/) .. ,.' '(r/' r . i·. ' . , : ("") _:) .· l1 (: jl ~::.-.·:~- C» -0 ~ ( . i: ·f-l co m _p ' \ ll ! ' . y !j ...., (") "'- t j . l t '~ . C» ~ . I •'1- 1·) ' · J,.I ' .. 0 . \ , . '.. . . .A...... ,;, cs -I . l I· · . · ;. · u-r m ~. . ~'J : ~.· - J ., . . . '{ ; . ' ... J .. ". ' . • j I·· 6'f'? '··!o"·:i·~".'\ 0 ' r . , ... '.' ' ]' .. -. I.I... , '· \ I ( · · · · . r... .··:... ·4. -" of· ~"IJ .ir • /:.~-\ \ '\ \ '~. .. . . ,;·~, ..... ))1-r'. ·. 'J~' (r('f ..... y_ i' \ ~( ,. ~..· ' (~c· --- ~.~ . \ ~,~~~Jt .._ ..~ ~I ~~'AA .· F'r1········ II . ,;~,llf . t Approved for Release: 2015/10/05 C061403~4/I / r l