Intelligence: From Secrets to Policy (77 page)

 
Troy, Thomas F
 
Turner, Michael A
 
 
Waller, J. Michael
 
Waltz, Edward
 
Warner. Michael
 
Watson. Bruce
 
West, Nigel
 
Wiebes, Cees
 
Williamson, Ray A.
 
Wirtz, James J.
 
Wohistetter, Roberta
 
Woolsey, R. James
 
Wyden, Peter
 
 
Zelikow, Philip
 
Zuehlke, Arthur A.
 
Subject Index
 
Note: References to
boxes,
figures, and tables are indicated by “b,” “f,” and “t” following page numbers.
A
 
Abel, Rudolf
 
ABM treaty
 
Abrams, Elliot
 
Abu Ghraib prison
 
Abu Nidal Organization
 
Accountability·.
See
Oversight and accountability
 
Accuracy
 
Ad hoes
 
Administrative reform.
See also
Reform
 
Afghanistan
 
al Qaeda
 
assassination and
 
imagery use in
 
Mujaheddin rebels
 
narcotics
 
paramilitary operations in
 
Soviet invasion
 
Taliban
 
war on terrorism.
See
War on terrorism
 
Africa
 
Agencies.
See
Intelligence agencies
 
Agent acquisition cycle
 
Agriculture Department
 
AIDS
 
Air-breathing systems
 
Air Force
 
Algeria
 
Ali, Sayyid Saber
 
Alien and Sedition Acts of 1798
 
Allende, Salvador
 
All-source intelligence
 
al Qaeda
 
in Afghanistan
 
assassination and
 
avoiding detection and
 
communications and
 
renditions and
 
Taliban and
 
use of imagery on
 
Alternative analysis
 
Ambassadors
 
American Israel Public Affairs Committee (AIPAC)
 
Ames, Aldrich
 
damage assessment
 
HUMINT and
 
oversight failure
 
polygraph test
 
Russian intelligence and
 
Analysis.
See also
Analysts
 
alternative analysis
 
analytical stovepipes
 
analytic penetration
 
assessment of
 
briefings
 
competitive analysis.
See
Competitive analysis
 
counterintelligence
 
cooperative vs. competitive analysis
 
crises vs. the norm
 
current vs. long-term intelligence
 
dependence on data
 
estimates
 
ethical and moral issues
 
indications and warning
 
issues in
 
layering
 
limited information for
 
metaphors
 
“on the ground knowledge”
 
opportunity analysis
 
policy makers and intelligence
 
politicized intelligence
 
pressure from policy makers
 
production and
 
redundancy of structure
 
reform
 
relationship with covert action
 
requirements of
 
standards
 
themes in
 
uncertainty in
 
wheat vs. chaff problem
 
Analysis-driven collection
 
Analyst agility
 
Analyst fungibility
 
Analysts
 
agility·
 
altering intelligence
 
career tracks
 
clientism and
 
collection priorities and
 
credibility of
 
dealing with limited information
 
ethics and options
 
fungibility
 
global coverage
 
gifted
 
management of
 
mind-sets of
 
mirror imaging and
 
objectivity of
 
promotion of
 
resignation of
 
stovepipes
 
training of
 
Analytical stovepipes
 
Analytic penetration
 
Analytic Resources Catalog
 
Analytic transformation
 
Angleton, James
 
Angola
 
A not A (appropriated but not authorized)
 
Anthrax
 
Anti-satellite (ASAT) weapons
 
Appropriated but not authorized (A not A)
 
Appropriation Committees
 
Appropriations
 
Argentina
 
Armed Services Committees
 
Arms control
 
Army Field Manual
 
Army War College
 
ASAT (anti-satellite) weapons
 
Asia
 
Aspin, Les
 
Aspin-Brown Commission (1996)
 
Assassination
 
ban of
 
British intelligence
 
ethical and moral issues
 
Hitler and
 
Israeli intelligence
 
Russian intelligence
 
terrorism and
 
Asset validation system
 
Assistant Attorney General for National Security
 
Attorney general
 
Australia
 
Austria-Hungary
 
Authorization
 
Authorization bills
 
Automatic change extraction
 
B
 
Backscratching
 
Baker, James
 
Balkans task force
 
Baseball fields
 
Battle damage assessment (BDA)
 
Barak, Ehud
 
Barry, James
 
Bay of Pigs
 
covert action during
 
failures in
 
intelligence analysis of
 
BDA (battle damage assessment)
 
Bean counting
 
Belgium
 
Berlin Wall
 
Berra, Yogi
 
Best, Richard, Jr.
 
Big “CI”
 
bin Laden, Osama
 
Biological weapons
 
Bioterror
 
Blair, Tony
 
Black, J. Cofer
 
Black September
 
Blake, George
 
Blowback
 
Boeing Company
 
Boland, Edward
 
Boland amendments
 
Bolton, John
 
Boren, David
 
Boren-McCurdy (1993)
 
Bosnia
 
Brandt, Willy
 
Brazil
 
Briefings
 
Britain See
also
British intelligence
 
evaluation as threat
 
imagery and
 
intelligence experience
 
Iraq commission
 
politicization and
 
slavery and
 
terrorist attack in London (2005)
 
weaknesses of intelligence analysis
 
British intelligence.
See also
Britain
 
analysts’ options in
 
covert action and
 
experience
 
foreign intelligence services
 
imagery and
 
influence on national intelligence
 
spying and
 
British Ordinance Survey
 
British Special Air Services (SAS)
 
British Special Boat Services (SBS)
 
Brown, Gordon
 
Budget
 
classification costs
 
collections
 
congressional process
 
covert action
 
defense budget
 
hollow budget authority
 
intelligence budget
 
NIPF and
 
oversight of
 
post-cold war and
 
supplemental appropriations
 
terrorist attacks (2001) and
 
Bulgaria
 
Bureau of Intelligence and Research, State Department. See INR

Other books

Who Goes There by John W. Campbell
The Uncertain Years by Beryl Matthews
Catboy by Eric Walters
Teach Me by Lola Darling
A Lady in Disguise by Cynthia Bailey Pratt
Lover's Revenge by Lyric James
Between Hell and Texas by Dusty Richards
Rendezvous by Amanda Quick
Relias: Uprising by M.J Kreyzer