Intelligence: From Secrets to Policy (79 page)

BOOK: Intelligence: From Secrets to Policy
5.69Mb size Format: txt, pdf, ePub
ads
 
imagery
 
measurement and signatures intelligence
 
open-source intelligence
 
signals intelligence
 
strengths and weaknesses
 
Colombia
 
Combatant Commands (CoComs)
 
Combest, Larry
 
COMINT (communications intelligence)
 
Commerce Department
 
Commercial attaches
 
Commercial imagery
 
Committee on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.
See
WMD Commission
 
Communications intelligence (COMINT)
 
Compartmented systems
 
Competition among agencies.
See
Stovepipes
 
Competitive analysis
 
Competitive intelligence exercises
 
Computer network attack (CNA)
 
Computer network exploitation (CNE)
 
Computer networks
 
Confidence levels
 
CONFIDENTIAL classification
 
Congress.
See also
Congressional oversight; Intelligence Committees
 
covert action and
 
jurisdiction
 
leaks
 
national security policy and
 
polygraphs
 
select committees
 
Torricelli case and
 
USDI and
 
Congressional oversight.
See also
Congress
 
bipartisan vs. partisan committees
 
budget process
 
committee turf
 
competition within the congressional agenda
 
constitutional mandate for
 
co-option
 
creation of intelligence committees
 
executive oversight vs.
 
extent of oversight
 
external factors
 
hearings
 
“hostages”
 
intelligence budget
 
intelligence judged by Congress
 
intelligence oversight committees
 
internal dynamics of
 
investigations and reports
 
issues in
 
limits of
 
nominations
 
price of oversight failures
 
prior notice of covert action
 
regulating the intelligence community·
 
reporting requirements
 
role of
 
secrecy and
 
supplemental appropriations
 
term limits
 
treaties
 
Congress Research Service
 
“Connecting the dots”
 
Constitution, U.S.
 
Consumer-producer relations
 
Consumers Guide to Intelligence
 
Consumption.
See
Dissemination and consumption
 
Containment
 
Content analysis
 
Contras
 
analysis of
 
covert action and
 
funding of
 
paramilitary operations and
 
Reagan administration and
 
Conventional wisdom
 
Co-option
 
Coordinator of Information (COI)
 
CORONA satellite
 
Council on Foreign Relations Independent Task Force (1996)
 
Counter Communications System
 
Counterespionage
 
Counterintelligence
 
Ames spy case
 
China
 
CIA and
 
collection and
 
damage assessments
 
defined
 
double agents
 
external indicators and counterespionage
 
France
 
HUMINT and
 
India
 
internal safeguards
 
Israel
 
Japan
 
leaks
 
National Security Branch (FBI) and
 
polygraphs
 
problems in
 
redundancy in
 
“responsibility to provide” standard
 
Taiwan
 
types of
 
vetting applicants
 
who spies on whom
 
Counterintelligence Division
 
Counterintelligence Enhancement Act
 
Counterintelligence polygraphs
 
Counter Surveillance Reconnaissance System (CSRS)
 
Counterterrorism
 
Counterterrorism Center
 
Counterterrorism Division
 
Coups
 
Cover stories
 
Covert action
 
analysis and
 
assassination
 
assessing
 
blowback and
 
in British intelligence
 
budget
 
in cold war
 
collection and
 
Congress and
 
costs of
 
debate over
 
decision-making process in
 
defined
 
ethical and moral issues
 
HUMINT
 
Iran coup and
 
issues in
 
ladder
 
legislative reaction to
 
legitimacy of
 
oversight of
 
paramilitary operations
 
plausible deniability
 
policy and intelligence
 
policy makers and
 
in post-cold war
 
presidential approval for
 
prior notice for Congress
 
rationale for
 
risks of
 
SIGINT and
 
types of activities
 
Cox, Christopher
 
Cox Committee
 
“Crateology”
 
Crisis mode
 
Crosswalks
 
Cryptographers
 
CSRS (Counter Surveillance Reconnaissance System)
 
CSS (Central Security Service)
 
Cuba. See
also
Bay of Pigs
 
Cuban missile crisis
 
Lourdes facility
 
Soviet defense spending
 
Currency issues
 
Current intelligence
 
CURVE HALL agent
 
“Cyberattacks”
 
Czechoslovakia
 
D
 
Damage assessment
 
Dangles
 
Darfur
 
DBA (dominant battlefield awareness)
 
DCI (Director of Central Intelligence) .
See also
DNI (Director of National Intelligence)
 
creation of COI and OSS
 
congressional relationships
 
National Security Act and
 
nominations for
 
partisan politics and
 
president and
 
as principal intelligence advisor to presidents and
 
on proliferation of nuclear weapons
 
reform and
 
relationship with Congress
 
replacement by DNI (Director of National Intelligence)
 
role of
 
stovepipes problem and
 
DCIA (Director of Central Intelligence Agency)
 
DCs (Deputies Committees)
 
Debs, Eugene
 
Deception
 
DeConcini, Dennis
 
Deep Web
 
Defense budget and expenditures
 
Defense Department.
See
DOD
 
Defense Intelligence Agency.
See
DIA
 
Defense Investigative Service
 
Defense Joint Intelligence Operations Center (DJIOC)
 
Defensive counterintelligence
 
Democratic policies
 
Denial and deception
 
Denied areas
 
Denied targets
 
Department.
See specific department name
 
Deptula, David
 
Deputies Committees (DCs)
 
Deputy director of national intelligence
 
Deutch, John
 
Deutch rules
 
DHS (Department of Homeland Security)
 
DI (Directorate of Intelligence) CIA
 
DO and
 
DIA (Defense Intelligence Agency)
 
all-source intelligence and
 
collection and
 
competitive analysis and
 
Congress and
 
Directorate of Intelligence (DI) and
 
DOD and
 
foreign intelligence liaison
 
HUMINT and
 
J2 Executive Highlights
 
BOOK: Intelligence: From Secrets to Policy
5.69Mb size Format: txt, pdf, ePub
ads

Other books

The Rip-Off by Jim Thompson
HighlandHeat by Tilly Greene
A Child's War by Mike Brown
Rivals for the Crown by Kathleen Givens
The Heaven Trilogy by Ted Dekker
Reflecting the Sky by Rozan, S. J.
Vector by Robin Cook
Gunpowder by G.H. Guzik