| |
| |
Introduction to the Transaction Edition | |
| |
| |
Preface | |
| |
| |
| |
Neglected Elements in American Intelligence | |
| |
| |
Integrating the Elements | |
| |
| |
Neglected Elements | |
| |
| |
Counterintelligence | |
| |
| |
Covert Action | |
| |
| |
| |
Steps and Missteps: Covert Action Since 1945 | |
| |
| |
Halcyon Days | |
| |
| |
Consensus: Stopping Communism | |
| |
| |
A Sometime Instrument of Policy | |
| |
| |
Successes | |
| |
| |
Missteps | |
| |
| |
Expose | |
| |
| |
The Wind Shifts | |
| |
| |
Congressional Assertiveness | |
| |
| |
The Central American Drama | |
| |
| |
Covert Action in the 1990s | |
| |
| |
The Current Ethos | |
| |
| |
| |
Building and Rebuilding: Counterintelligence Since World War II | |
| |
| |
Building the Cold War Consensus | |
| |
| |
The FBI | |
| |
| |
Collection | |
| |
| |
Analysis | |
| |
| |
Exploitation | |
| |
| |
The CIA | |
| |
| |
Military Counterintelligence | |
| |
| |
Breaking the Mold | |
| |
| |
Rebuilding | |
| |
| |
The FBI | |
| |
| |
The CIA | |
| |
| |
The Military | |
| |
| |
| |
Handmaiden of Policy: Principles of Covert Action | |
| |
| |
First Principles | |
| |
| |
Policy, Opportunity, and People | |
| |
| |
The Infrastructure | |
| |
| |
Personnel | |
| |
| |
Material Support | |
| |
| |
Question of Values | |
| |
| |
Symbiosis | |
| |
| |
Ends, Means, and Historical Lessons | |
| |
| |
Political Action | |
| |
| |
Agents of Influence | |
| |
| |
Helping Organizations | |
| |
| |
Movement of Money and Support | |
| |
| |
Covert Propaganda | |
| |
| |
Paramilitary Operations | |
| |
| |
Assassination | |
| |
| |
Terrorism | |
| |
| |
Guerrillas and Resistance Movements | |
| |
| |
Safe Haven | |
| |
| |
Materiel Support for Paramilitary Operations | |
| |
| |
Special Forces | |
| |
| |
Coups d'Etat | |
| |
| |
Intelligence Support | |
| |
| |
Counterterrorism: Synergy in Action | |
| |
| |
| |
Offensive Defense: Principles of Counterintelligence | |
| |
| |
Central Coordination and Strategy | |
| |
| |
Counterintelligence Analysis | |
| |
| |
Triage of Targets | |
| |
| |
Assessing Vulnerability | |
| |
| |
Adversaries: Targets and Competence | |
| |
| |
Counterdeception Analysis | |
| |
| |
Support for Operations | |
| |
| |
Counterintelligence Analysis and Positive Intelligence | |
| |
| |
Counterintelligence Collection | |
| |
| |
Integration of Sources | |
| |
| |
Collection from Open Sources | |
| |
| |
Clandestine Collection from Human Sources | |
| |
| |
Defectors | |
| |
| |
Physical Surveillance | |
| |
| |
Access Agents | |
| |
| |
Double Agents | |
| |
| |
Liaison | |
| |
| |
Illegals | |
| |
| |
Technical Counterintelligence | |
| |
| |
Exploitation | |
| |
| |
On the Offensive | |
| |
| |
Deception and Offensive Counterintelligence | |
| |
| |
Positive Intelligence | |
| |
| |
| |
In Pursuit of Effective Intelligence | |
| |
| |
Variables at Play | |
| |
| |
The Pace of Modernization and Technological Innovation | |
| |
| |
Government Structure and Bureaucratic Culture | |
| |
| |
The Perception of Political Circumstances | |
| |
| |
The Nature of the Regime | |
| |
| |
Putting the Pieces Together | |
| |
| |
For the Foreseeable Future | |
| |
| |
Notes | |
| |
| |
Glossary of Terms and Abbreviations | |
| |
| |
Bibliography | |
| |
| |
Index | |