Intelligence: From Secrets to Policy (86 page)

BOOK: Intelligence: From Secrets to Policy
5.81Mb size Format: txt, pdf, ePub
ads
 
Surrey Satellite Technology
 
Surveillance
 
Swarm ball
 
Sweden
 
SWIFT (Society for Worldwide Interbank Financial Telecommunications)
 
Switzerland
 
Symington, Stuart
 
Syria
 
Israeli air strike on (2007)
 
T
 
TacSats
 
Tactical intelligence and related activities (TIARA)
 
Tactical surprise
 
vs. strategic
 
terrorist attacks as
 
Tailored intelligence
 
Taiwan
 
Taliban.
See also
Afghanistan
 
covert action and
 
information operations
 
narcotics and
 
paramilitary operations and
 
renditions and
 
terrorism and
 
Tasking, Processing, Exploitation, and Dissemination.
See
TPEDs
 
Taylor Commission (1961)
 
Team A-Team B competitive analysis
 
TECHINTs (Technical Intelligence)
 
Technical collection.
See also
Collection
 
Technical Intelligence (TECHINTs)
 
Technology
 
IT revolution
 
reliance on
 
Telemetry intelligence.
See
TELINT
 
Television news.
See also
Media
 
TELINT (telemetry intelligence)
 
Tenet, George J.
 
Afghanistan and
 
al Qaeda and Iraq relationship
 
CIA workforce
 
on commercial imagery
 
creation of TT1C
 
on DNI
 
intelligence budget and
 
intelligence sharing and
 
leaks and
 
on loss of analysts
 
on NIPF
 
partisan politics and
 
on Pollard issue
 
on preventing proliferation
 
relationship with George W Bush
 
terrorist attacks and
 
Term limits
 
Terms of reference (TOR)
 
Terrorism.
See also
9/11 Commission; Terrorist attacks (2001); War on terrorism
 
analysis and
 
assassination and
 
Deutch rules and
 
health and environment
 
human intelligence and
 
imagery and
 
indications and warning
 
Israeli intelligence
 
narcotics and
 
nature of
 
rendition
 
SIGINT and
 
threat-based foreign policy and
 
threat of
 
Terrorism Threat Integration Center. See TT1C
 
Terrorist attacks (2001) .
See also
9/11 Commission
 
assassination and
 
budget and
 
collection and
 
compared with Pearl Harbor
 
covert action and
 
development of intelligence and
 
lessons of
 
reform and
 
as strategic surprise
 
as tactical surprise
 
technology
 
terrorism as new agenda
 
Terrorist Threat to the Homeland. The
 
Tet offensive
 
Thailand
 
Thinking in Time. The Uses of History for Decision Makers
(May & Neustadt)
 
Third option
 
Threat List
 
TIARA (tactical intelligence and related activities)
 
Title 10 prerogatives
 
TOP SECRET classification
 
TOP SECRET/CODEWORD classification
 
TOR (terms of reference)
 
Torricelli, Robert
 
Torture.
See
Renditions and torture
 
Tower Commission (1987)
 
TPEDs (Tasking, Processing, Exploitation, and Dissemination)
 
Trade embargo
 
Traffic analysis
 
Transnational issues
 
Treasury Department
 
Treaties.
See also specific treaties
 
Trotsky, Leon
 
Truman, Harry S.
 
Truth-telling
 
TTIC (Terrorism Threat Integration Center).
See also
NCTC (National Counterterrorism Center)
 
TUAVs (tactical UAVs)
 
Turkey
 
Turning agents
 
Twain, Mark
 
Tyranny of ad hocs
 
U
 
UAVs (unmanned aerial vehicles)
 
DOD and
 
imagery and
 
non-U.S.
 
use in SIGINT
 
war on terrorism and
 
ULTRA
 
Uncertainty
 
Undersecretary of Defense for Intelligence (USDI)
 
United Nations
 
Unmanned aerial vehicles.
See
UAVs
 
UNSCOM (United Nations Special Commission)
 
U.S.A. PATRIOT Act of 2001
 
U.S. persons
 
USDI (Undersecretary of Defense for intelligence)
 
relationship with Congress
 
relationship with NGA
 
relationship with NSA
 
USS Cole
 
V
 
“Vacuum cleaner” problem
 
Value-added intelligence
 
Vanunu, Mordechai
 
Venezuela
 
VENONA intercepts
 
Verification
 
Vietnam War
 
Voice-over-Internet-Protocol (VoIP)
 
W
 
Walesa_ech
 
Walker spy ring
 
Walk-ins
 
War.
See also specific war
 
Warner, John
 
War on terrorism.
See also
9/11 Commission; Terrorism
 
Afghanistan
 
bin Laden and
 
military operations and
 
NGA and
 
renditions and torture and
 
UAVs and
 
Warsaw Pact
 
Washington, George
 
Waterboarding
 
Watergate
 
Weapons capabilities
 
Weapons development
 
Weapons of mass destruction.
See
WMD
 
Weapons proliferation
 
Webster, William
 
Weinberger, Caspar
 
Welch, Richard
 
West Germany
 
Wheat vs. chaff problem
 
“Where and when” phenomenon
 
Whistleblowers
 
“Window of vulnerability”
 
Wiretaps.
See also
FISA (Foreign Intelligence Surveillance Act of 1978)
 
Wiring diagrams
 
Wise, David
 
WMD (weapons of mass destruction).
See also
WMD (Weapons of Mass Destruction) Commission
 
alternative analysis and
 
analysts failures regarding
 
“connecting the dots” and
 
ECHELON to detect
 
FBI on
 
group think and
 
hearings
 
HUMINT and
 
intelligence sharing and
 
investigations
 
Iran and
 
Iraq and
 
layering and
 
MASINT, in development and proliferation
 
NCPC and
 
politicization and
 
as transnational issue
 
WMD (Weapons of Mass Destruction) Commission
 
competition for resources and
 
creation of
 
intelligence reorganization and
 
layering
 
NCPC and
 
politicization and
 
recommendations of
 
Wolf, Markus
 
Women’s suffrage
 
Woolsey, R. James
 
World Trade Center.
See
Terrorist attacks (2001)
 
World War I
 
World War II
 
assassination and
 
collection and
 
creation of COI and OSS and
 
denial and deception and
 
double agents
 
imagery and
 
intelligence oversight and
 
STGINT and
 
strategic surprise and
 
threat-based foreign policy and
 
Worst-case analysis
 
Wyden, Ron
 
Wye River peace talks
BOOK: Intelligence: From Secrets to Policy
5.81Mb size Format: txt, pdf, ePub
ads

Other books

Jake's 8 by Howard McEwen
Up in the Air by Walter Kirn
Take It Farther by Mithras, Laran
Cold Springs by Rick Riordan