Burma
Bush, George H. W
failure to define national security interests
policy-intelligence relationship
politicization of
Scowcroft and
Team A-Team B competitive analysis and
veto of intelligence authorization bill and
Bush, George W
al Qaeda in Afghanistan
on CIA capabilities
on commercial imagery
consumer-producer relations and
covert action and
creation of NCTC
creation of WMD Commission
DCI and
executive orders on intelligence
intelligence reform and
Iraq war and
NSPD and
PDB and
PIOB and
policy-intelligence relationship
relationship with CIA
relationship with Tenet
on requirements
restructuring of DOJ
restructuring of FBI
Scowcroft and
9/11 recommendations
success of DNI and
warrantless phone taps
Butler, Lord
Butler Report
C
Cabinet members
Cable taps
Cambodia
Cambone, Stephen
Campbell, Kevin
Canada
Capabilities vs. intentions
Card, Andrew
Carlos, the “Jackal”
Carnot, Sadi
Carter, Jimmy
campaign issues
covert action
Cuba and
executive order on intelligence
politicization and
SALT II treaty
Casey, William
Castro, Fidel
CDA (Congressional Directed Actions)
Cell phones
Centers
Central Intelligence Agency.
See
CIA
Central Intelligence Group (CIG)
Central Security Service.
See
CSS
Chamberlain, Neville
Change extraction
Chatter
Chemical weapons
Cheney Richard
Chernobyl
Chernomydrin, Viktor
Chiefs of station
Chile
Chin, Larry Wu-tai
China
ASAT test
commercial imagery and
espionage by
health issues and
internal stability
intelligence capabilities
politicized intelligence and
regional disputes
spying and
U.S. reconnaissance plane incident
Church, Frank
Church Committee (1976)
CI.
See
Counterintelligence
CIA (Central Intelligence Agency).
See also
DCI (Director of Central Intelligence)
accountability report (2007)
all-source intelligence and
Ames spy scandal
centers
clients of
competition for resources
congressional relationships
continuity of intelligence policy and
counterintelligence and
covert action and
creation of
DCIA and
DHS and
DI (Directorate of Intelligence).
See
DI
Directorate of Science and Technology (DS&T)
DNI and
DOD and
DO (Directorate of Operations).
See
DO
espionage
FBI relationship
foreign intelligence liaison
headquarters
HUMINT and
imagery and
intelligence cycle
in intelligence community
intelligence sharing and
investigations
Israeli-Palestinian negotiations and
NCTC and
Open Source Directorate and
oversight failures and
paramilitary capabilities and
paramilitary operations and
PDB and
personnel practices
politicized intelligence
polygraphs, use of
president as client of
processing and exploitation imbalance
redundancy in intelligence community and
reform and
renditions and
Senior Analytical Service
Special Activities Division
structure of
VENONA intercepts and
Web site of
CIG (Central Intelligence Group)
Civil liberties
Civil Liberties Protection Buard.
See
Privacy and Civil Liberties Oversight Board
Civil rights
Civil War
Clapper, James
Classification system
compartmented
costs of
reasons for
Classified Intelligence Procedures Act
Clausewitz. Karl von
Clearance system
Clemens, Samuel
Clientism and
Clientitis
Clinton, Bill
assassination policy
budget and
DCI and
hostages and
intelligence priorities and
PDD-35 and
Pollard issue
requirements and
Torricelli case and
CNA (computer network attack)
CNE (computer network exploitation)
Coast Guard
Codebreakers
COI (Coordinator of Information)
Colby, William
Cold war.
See also
Post-cold war; Soviet Union
British intelligence
collapse of Soviet Union
containment policy
covert action
defense expenditures
difficulty of the Soviet target
ends vs. means
espionage
global source of intelligence and
imagery
indications and warning
influence on U.S. intelligence
intelligence implications of containment
intelligence priorities
Korea and
legacy of
lessons from
moral issues
National Security Act of 1947 and
open-source intelligence
primacy of Soviet issue
Soviet defense spending
Soviet military capabilities
Soviet strategic forces
statistical intelligence
technical collection costs
Collection.
See also
Collection disciplines
analysis-driven
budget
capabilities in
completing priorities
composition of the ITs
costs of
covert action and
denial and deception
downstream activities
ethical and moral issues
of foreign economic intelligence
of information
intelligence and
long lead times
opacity of intelligence
policy and intelligence
processing and exploitation imbalance
protecting sources and methods
reconnaissance, post-cold war
reform
reliance on technology
satellite limitations
stovepipes problem
swarm ball
synergy
systems development and
themes in
vacuum cleaner problem
Collection disciplines.
See also
Collection
comparison of
human intelligence