Index to International Journal of Intelligence and CounterIntelligence

Volumes 1 to 16 (1986–2003)

by Ralph Erskine

Adams, Jefferson, Crisis and Resurgence: East German State Security: 2(4) 487-512
Adams, Jefferson, Probing the East German State Security Archives: 13(1) 21-34
Albini, Joseph L. and Julie Anderson, Whatever Happened to the KGB?: 11(1) 26-56
Al-Marashi, Ibrahim, The Family, Clan, and Tribal Dynamics of Saddam’s Security and Intelligence Network: 16(2) 202-211
Alvarez, David, Diplomatic Solutions: German Foreign Office Cryptanalysis, 1919-1945: 9(2) 169-185
Alvarez, David, Left in the Dust: Italian Signals Intelligence, 1915-1943: 14(3) 388-408
Amon, Moshe, Cultural Clues: The Nature of Intelligence After Rabin’s Assassination: 9(1) 1-15
Anderson, Elizabeth E., The Security Dilemma And Covert Action: The Truman Years: 11(4) 403-427
Anderson, Julie and Joseph L. Albini, Ukraine’s SBU and the New Oligarchy: 12(3) 282-324
Anderson, William Henry, Probability Analysis for the Case of Yellow Rain: 3(1) 77-82
Andradé, Dale, The Vietnam War’s Secret Side: 14(4) 582-586

Bacon, John, The French Connection Revisited: 4(4) 507-523
Bagley, Tennent H., Bane of Counterintelligence: Our Penchant for Self-Deception: 6(1) 1-20
Bagley, Tennent H., Treason in the KGB: New Facts from Inside: 5(1) 63-75
Baker, Jeffrey L., Domestic and National Security Wiretaps: A Fourth Amendment Perspective: 12(1) 1-17
Bar-Joseph, Uri and Zachary Sheaffer, Surprise And Its Causes in Business Administration and Strategic Studies: 11(3) 331-350
Bar-Joseph, Uri, A Bull in a China Shop: Netanyahu and Israel’s Intelligence Community: 11(2) 154-174
Bar-Joseph, Uri, Israel Caught Unaware: Egypt’s Sinai Surprise of 1960: 8(2) 203-220
Barkin, Edward S. and L. Michael Meyer, COMINT and Pearl Harbor: FDR’s Mistake: 2(4) 513-531
Barrett, David M., Glimpses of a Hidden History: Sen. Richard Russell, Congress, and Oversight of the CIA: 11(3) 271-298
Barzilai, Gad and Gideon Doron, The Middle East Power Balance: Israel’s Attempts to Understand Changes in Soviet-Arab Relations: 5(1) 35-47
Baugher, Thomas R., Swans Swimming in the Sewer: Legal Use of "Dirty Assets" by CIA: 9(3) 435-471
Baumard, Philippe, From Noticing to Making Sense: Using Intelligence to Develop Strategy: 7(1) 29-73
Bell, J. Bowyer, Aspects of the Dragonworld: Covert Communications and the Rebel Ecosystem: 3(1) 15-43
Bell, J. Bowyer, Dragonworld (II): Deception, Tradecraft, and the Provisional IRA: 8(1) 21-50
Bell, J. Bowyer, Toward a Theory of Deception: 16(2) 244-279
Bellocchi, Luke P., Assessing the Effectiveness of the Economic Espionage Act of 1996: 14(3) 366-387
Ben-Zvi, Abraham, Between Warning and Response: The Case of the Yom Kippur War: 4(2) 227-242
Beres, Louis René, Getting Beyond Nuclear Deterrence: Israel, Intelligence and False Hope: 10(1) 75-90
Beres, Louis René, Intelligence and Nuclear Terrorism: Preventing "Pain into Power": 9(2) 159-167
Beres, Louis René, Preventing the Ultimate Nightmare. Nuclear Terrorism Against the United States: 10(3) 333-342
Beres, Louis René, The Iranian Threat To Israel: Capabilities And Intentions: 9(1) 159-167
Bisher, Jamie, German and Chilean Agents in Peru: Entwined by a Yen for Espionage: 6(2) 205-212
Bittman, Ladislav, The Use of Disinformation by Democracies: 4(2) 243-261
Blash, Edmund Charles II, Strategic Intelligence Analysis and National Decisionmaking: A Systems Management Approach: 6(1) 55-68
Bloom, Murray Teigh, The Bank Note World’s Security Obsession: 2(4) 533-545
Bloom, Murray Teigh, Uncle Sam: Bashful Counterfeiter: 2(3) 345-358
Bloomfield Jr., Lincoln P., The Legitimacy of Covert Action: Sorting Out the Moral Responsibilities: 4(4) 525-537
Bonthous, Jean-Marie, Understanding Intelligence Across Cultures: 7(3) 275-311
Bowman, M. E., Intelligence and International Law: 8(3) 321-336
Breckinridge, Scott D., The Shape of Post-Cold War Intelligence: 8(1) 1-10
Breemer, Jan S., Soviet Naval Capabilities: 1(4) 119-132
Bruneau, Thomas C., Controlling Intelligence in New Democracies: 14(3) 323-341
Bullock, Joan G., Intelligence Support of Military Operations: A Perspective: 4(2) 181-198
Burke, James F., The Role of Capital Markets Intelligence in Corporate Management: 7(4) 429-433
Burris, William C., The Uses of History in Intelligence Analysis: 6(3) 297-301

Cable, Larry, Piercing the Mists: Limited and Ambiguous Conflicts: 4(1) 59-76
Callum, Robert, The Case for Cultural Diversity in the Intelligence Community: 14(1) 25-48
Campbell, Kenneth J., Bedell Smith’s Imprint on the CIA: 1(2) 45-62
Canfield, Jeffrey L., Gerbil Redux: What Course Ahead for Naval Intelligence?: 6(3) 271-295
Carroll, Thomas Patrick, The Case Against Intelligence Openness: 14(4) 559-574
Castagna, Michael J., Virtual Intelligence: Reengineering Doctrine for the Information Age: 10(2) 180-195
Cavallini, Enrique H. J., The Malvinas/Falkland Affair: A New Look: 2(2) 203-216
Cepik, Marco and Priscila Antunes, Brazil’s New Intelligence System: An Institutional Assessment: 16(3) 349-373
Champion, Brian, Subreptitious Aircraft in Transnational Covert Operations: 11(4) 453-478
Chapman, Robert D., Reflections on Terrorism: A Sideline View: 12(2) 207-226
Chase, Michael S. and James C. Mulvenon, The Decommercialization of China’s Ministry of State Security: 15(4) 481-495
Chomeau, John B., Covert Action’s Proper Role in U.S. Policy: 2(3) 407-413
Cimbala, Stephen J., Amorphous Wars: 2(1) 73-89
Cimbala, Stephen J., Mainstreaming Military Deception: 3(4) 509-535,
Claburn, Jeffrey, Public Constraints on Assassination as an Instrument of U.S. Foreign Policy: 7(1) 97-109
Cline, Lawrence E., Operational Intelligence in Peace Enforcement and Stability Operations: 15(2) 179-194
Cochran, Edwin S., South Korea’s Intelligence Targets U.S. Technology: 16(2) 179-201
Cohen, Edmund, The CIA and the Declassification of History: 12(3) 338-345
Cohen, Sam, Ted Hall: A Soldier From Venona: 11(3) 351-366
Cohen, William S., Congressional Oversight of Covert Actions: 2(2) 155-162
Collins, J. Foster, The Debate Continues: The CIA In Indonesia: The Scholars vs. The Professionals – III. No U.S. Intrigue: 10(2) 222-226
Constantinides, George C., Tradecraft: Follies and Foibles: 1(4) 97-110
Crabb Jr. Cecil V., and Kevin V. Mulcahy, The National Security Council and The Shaping of U.S. Foreign Policy: 3(2) 153-168
Croddy, Eric, Dealing with Al Shifa: Intelligence and Counterproliferation: 15(1) 52-60
Cummings, Richard, A Diamond Is Forever: Mandela Triumphs, Buthelezi and de Klerk Survive, and ANC on the U.S. Payroll: 8(2) 155-178
Currie, James T., Iran-Contra and Congressional Oversight of the CIA: 11(2) 185-210

Dabelko, David D. and Geoffrey D. Dabelko, The International Environment and the U.S. Intelligence Community: 6(1) 21-41.
Damask, Nicholas and Abraham H. Miller, Thinking About Intelligence After the Fall of Communism: 6(3) 257-269
Daugherty, William J., Behind the Intelligence Failure in Iran: 14(4) 449-484
Daugherty, William J., Truman’s Iranian Policy, 1945-1953: The Soviet Calculus: 15(4) 580-593
Dedijer, Stevan, British Intelligence: The Rainbow Enigma: 1(2) 73-90
Dedijer, Stevan, Ragusa Intelligence and Security (1301-1806): A Model for the Twenty-First Century? 15(1) 101-114
Defalco III, Ralph Lee, Blind to the Sun: U.S. Intelligence Failures Before the War with Japan: 16(1) 95-107
DeLuca, John Vito, Shedding Light on the Rising Sun: 2(1) 1-20
DeMars, William E., Hazardous Partnership: NGOs and United States Intelligence in Small Wars: 14(2) 193-222
Dennison, M. G. and Dale F. Eickelman, Arabizing the Omani Intelligence Services: Clash of Cultures?: 7(1) 1-28
Diamond, John M., Re-examining Problems and Prospects in U.S. Imagery Intelligence: 14(1) 1-24
Dippel, John V. H., Jumping to the Right Conclusion: The State Department Warning on Operation "Barbarossa": 6(2) 213-227
Donovan, G. Murphy, Evidence, Intelligence, and the Soviet Threat: 1(2) 1-28
Dorn, A. Walter, The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping: 12(4) 414-447
Doron, Gideon and Martin Sherman, Free Societies And Their Enemies: An Intelligence Assessment: 8(3) 307-320
Doron, Gideon and Boaz Shapira, Accountability for Secret Operations in Israel: 4(3) 371-382
Doron, Gideon and Reuven Pedatzur, Israeli Intelligence: Utility and Cost-effectiveness in Policy Formation: 3(3) 347-361
Doron, Gideon, Changes in Soviet-Arab Relations: 5(1) 35-47
Doron, Gideon, Israeli Intelligence: Tactics, Strategy, and Prediction: 2(3) 305-319
Doron, Gideon, The Vagaries of Intelligence Sharing: The Political Imbalance: 6(2) 135-146

Ebon, Martin, KGB in Transition: The Bakatin Interregnum: 6(3) 327-338
Eriksson, Pär, Intelligence in Peacekeeping Operations: 10(1) 1-18
Erskine, Ralph, Churchill and the Start of the Ultra-Magic Deals: 10(1) 57-74
Erskine, Ralph, Naval Enigma: A Missing Link: 3(4) 493-508
Evans, Joseph C., Berlin Tunnel Intelligence: A Bumbling KGB: 9(1) 43-50
Evans, Joseph C., U.S. Business Competitiveness and the Intelligence Community: 7(3) 353-361

Feer, Fredric S., Intelligence Storytelling: Moshe Dayan and the 1970 Cease-fire: 11(4) 429-445
Feldman, Daniel L., Constitutional Dimensions of the Iran-contra Affair: 2(3) 381-397
Fischer, Ben B., "One of the Biggest Ears in the World:" East German SIGINT: 11(2) 142-153
Fischer, Benjamin B., Farewell to Sonia, the Spy Who Haunted Britain: 15(1) 61-76
Fishel, Edwin C., Myths That Never Die: 2(1) 27-58
Fishel, Reverdy S., The Attack on the Liberty: An "Accident"?: 8(3) 345-352

Godson, Roy and James J. Wirtz, Strategic Denial and Deception: 13(4) 424-437
Gollin, James, Stirring Up The Past: KAL Flight 007: 7(4) 445-463
Gordon, Don E., Private Minnock’s Private War: 4(2) 199-218
Gordon, Don E., Winners and Losers: 1(3) 1-24
Goulden, Joseph C., The Rogue of Rogues: 1(1) 76-82
Grabo, Cynthia M., The Watch Committee and the National Indications Center: The Evolution of U.S. Strategic Warning 1950-1975: 3(3) 363-385
Grant, Natalie, Deception on a Grand Scale: 1(4) 51-77
Greenberg, Maurice B. and Richard N. Haas, Making Intelligence Smarter: 9(2) 135-1444
Gunter, Michael M., Susurluk: The Connection Between Turkey’s Intelligence Community and Organized Crime: 11(2) 119-141
Gunter, Michael M., The Iraqi Opposition and the Failure of U.S. Intelligence: 12(2) 135-167
Gunter, Michael, Mulla Mustafa Barzani and the Kurdish Rebellion in Iraq: The Intelligence Factor: 7(4) 465-474

Halpern, Samuel and Hayden Peake, Did Angleton Jail Nosenko?: 3(4) 451-464
Hansen, James H., RX: Intelligence Communications – Use Acronyms, Allegories, and Metaphors Only as Directed: 2(1) 21-26
Hansen, James H., The Kremlin Follies of ’53... The Demise of Lavrenti Beria: 4(1) 101-114
Hastedt, Glenn P., Controlling Intelligence: The Role of the DCI: 1(4) 25-40
Hastedt, Glenn P., Intelligence and U.S. Foreign Policy; How to Measure Success?: 5(1) 49-62
Hastedt, Glenn, CIA’s Organizational Culture and the Problem of Reform: 9(3) 249-269
Hastedt, Glenn, Seeking Economic Security Through Intelligence: 11(4) 385-401
Hedley, John Hollister, The CIA’s New Openness: 7(2) 129-141
Henderson, Robert D’A., "Project Rodriguista": Opposing Pinochet’s Regime in Chile: 13(4) 438-489
Henderson, Robert D’A., Operation Vula Against Apartheid: 10(4) 418-455
Henderson, Robert D’A., South African Intelligence Transition from de Klerk to Mandela: An Update: 8(4) 471-485
Henderson, Robert D’A., South African Intelligence Under de Klerk: 8(1) 51-90
Hitz, Frederick P., Obscuring Propriety: The CIA and Drugs: 12(4) 448-462
Hitz, Frederick P., The Future of American Espionage: 13(1) 1-20
Horowitz, Richard, A Framework for Understanding Intelligence: 8(4) 389-410
Horton, John, Mexico, The Way of Iran?: 1(2) 91-101
Horton, John, Reflections on Covert Action and Its Anxieties: 4(1) 77-90
Houston, Lawrence R., The CIA’s Legislative Base: 5(4) 411-415
Hulnick, Arthur S., CIA’s Relations with Academia: Symbiosis Not Psychosis: 1(4) 41-50
Hulnick, Arthur S., Determining U.S. Intelligence Policy: 3(2) 211-224
Hulnick, Arthur S., Dirty Tricks for Profit: Covert Action in Private Industry: 14(4) 529-544
Hulnick, Arthur S., Intelligence and Law Enforcement: The "Spies Are Not Cops" Problem: 10(3) 269-286
Hulnick, Arthur S., Intelligence Cooperation in the Post-Cold War Era: A New Game Plan: 5(4) 455-465
Hulnick, Arthur S., Learning About U.S. Intelligence: Difficult But Not Impossible: 5(1) 89-99
Hulnick, Arthur S., Managing Analysis: Strategies for Playing the End Game: 2(3) 321-343
Hulnick, Arthur S., Openness: Being Public About Secret Intelligence: 12(4) 463-483
Hulnick, Arthur S., The Ames Case: HOW Could It Happen?: 8(2) 133-154
Hulnick, Arthur S., The Downside of Open Source Intelligence: 15(4) 565-579
Hulnick, Arthur S., The Uneasy Relationship Between Intelligence And Private Industry: 9(1) 17-31
Hulnick, Arthur, S., U.S. Covert Action: Does It Have A Future?: 9(2) 145-157
Hyde Jr., Earl M., Bernard Schuster and Joseph Katz: KGB Master Spies in the United States: 12(1) 35-57
Hyde Jr., Earl M., Still Perplexed About Krivitsky: 16(3) 428-441

Ilardi, Gaetano Joe, The Whitlam Government’s 1973 Clash With Australian Intelligence: 14(1) 62-88
Indinopulos, Thomas, Shin Bet’s Blind Side: 10(1) 91-96

Jelen, George F., The Defensive Disciplines of Intelligence: 5(4) 381-399
Jervis, Robert, What’s Wrong with the Intelligence Process?: 1(1) 28-41
Johnson, Loch K. and Annette Freyberg, Ambivalent Bedfellows: German-American Intelligence Relations, 1969-1991: 10(2) 167-179
Johnson, Loch K., DCI Webster’s Legacy: The Judge’s Self-Assessment: 5(3) 287-290
Johnson, Loch K., Making the Intelligence "Cycle" Work: 1(4) 1-23
Johnson, Loch K., Preface to a Theory of Strategic Intelligence: 16(4) 638-663
Johnson, Loch K., Strategic Intelligence: An American Perspective: 3(3) 299-332
Johnson, Loch K., The DCI vs the Eight-Hundred-Pound Gorilla: 13(1) 35-48
Johnson, William R., The Ambivalent Polygraph: 1(3) 71-83
Johnson, William R., The Elephants and the Gorillas: 1(1) 42-56
Johnson, William R., Tricks of the Trade: Counterintelligence Interrogation: 1(2),103-113
Jones, Christopher M., The CIA Under Clinton: Continuity and Change: 14(4) 503-528
Judd, Stephen G., The CIA and the University: A Problem of Power: 6(3) 339-358
Jumper, Roy D. L., Malaysia’s Senoi Praaq Special Forces: 13(1) 64-93

Kahana, Ephraim, Mossad-CIA Cooperation: 14(3) 409-420
Kahana, Ephraim, Reorganizing Israel’s Intelligence Community: 15(3) 415-428
Kahin, Audrey and George McT. Kahin, The Debate Continues: The CIA In Indonesia: The Scholars vs. The Professionals – I. CIA’s Men Disingenuous: 10(2) 206-217
Kaiser, Frederick M., GAO Versus the CIA: Uphill Battles Against an Overpowering Force: 15(3) 330-389
Kaiser, Frederick M., Impact and Implications of the Iran-contra Affair on Congressional
Kaiser, Frederick M., Oversight of Covert Action: 7(2) 205-234
Kaiser, Frederick M., The Watcher’s Watchdog: The CIA Inspector General: 3(1) 55-75
Kalaris, George and Leonard McCoy, Counterintelligence for the 1990s: 2(2) 179-187
Katz, Ytzhak and Ygal Vardi, Strategies for Data Gathering and Evaluation in the Intelligence Community: 5(3) 313-328
Kenney, Michael C., Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises: 16(2) 212-243
Kerr, Sheila, Oleg Tsarev’s Synthetic KGB Gems: 14(1) 89-116
Knight, Amy, Russian Archives: Opportunities and Obstacles: 12(3) 325-337
Knott, Stephen F., Covert Action Comes Home: Daniel Webster’s Secret Operations Against the Citizens of Maine: 5(1) 77-87
Knott, Stephen F., The Great Republican Transformation on Oversight: 13(1) 49-63
Knott, Stephen F., Thomas Jefferson’s Clandestine Foreign Policy: 4(3) 325-355
Koenen-Grant, Julie and Dick Nelson, A Case of Bureaucracy "in Action": The U.S. Embassy in Moscow: 6(3) 303-317
Kovacs, Amos, The Nonuse of Intelligence: 10(4) 383-417
Krause, Lincoln B., Insurgent Intelligence: The Guerrilla Grapevine: 9(3) 291-311
Krepon, Michael, Glasnost and Multilateral Verification: Implications for the U.S. Intelligence Community: 4(1) 47-57

Lahneman, William J., Outsourcing the IC’s Stovepipes?: 16(4) 573-593
Leadbetter Jr., Col. Wyland F. and Cdr. Stephen J. Bury, Prelude to Desert Storm: The Politicization of Intelligence: 6(1) 43-54
Lefebvre, Stéphane, The Difficulties and Dilemmas of International Intelligence Cooperation: 16(4) 527-542
Lewis, Jeremy R. T., Freedom of Information: Developments in the United Kingdom: 3(4) 465-473
Lewis, Jonathan E., National Security and Capital Markets: 6(4) 507-517
Loureiro, Pedro, The Imperial Japanese Navy and Espionage: The Itaru Tachibana Case 1941: 3(1) 105-121
Lowenthal, Mark M., Intelligence Epistemology: Dealing with the Unbelievable: 6(3) 319-325
Lukes, Igor, Great Expectations and Lost Illusions: Soviet Use of Eastern European Proxies in the Third World: 3(1) 1-13
Lukes, Igor, The GPU and GRU in Pre-World War II Czechoslovakia: 8(1) 91-104

Macartney, John, Intelligence: A Consumer’s Guide: 2(4) 457-486
MacDonnell, Francis, The Search for a Second Zimmermann Telegram: FDR, BSC, and the Latin American Front: 4(4) 487-505
MacPherson, Nelson, Reductio Ad Absurdum: The R&A Branch of OSS/London: 15(3) 390-414
Madsen, Wayne, Intelligence Agency Threats to Computer Security: 6(4) 413-488
Maechling Jr., Charles., Official Secrets: British Style/American Style: 2(3) 359-380
Maechling Jr., Charles., Scandal in Wartime Washington: The Craufurd-Stuart Affair of 1918: 4(3) 357-370
Maguire, Keith, The Intelligence War in Northern Ireland: 4(2) 145-165
Mahoney, Harry Thayer, The Saga of Xenophon Dmitrivich Kalamatiano: 8(2) 179-202
Manget, Fred F., Presidential Powers and Foreign Intelligence Operations: 5(2) 131-153
Manget, Fred F., Restitution: A Better Way of Dealing with the Wrongful Appropriation of Classified Government Secrets?: 4(1) 23-37
Mapother, John R., Watching the Evil Empire Dissolve: 14(4) 578-581
Marrin, Stephen, CIA’s Kent School: Improving Training for New Analysts: 16(4) 609-637
Martin, David, Churchill’s Yugoslav Blunder: Precursor to the Yugoslav Tragedy: 5(4) 417-431
Matthews, John P. C., The West’s Secret Marshall Plan for the Mind: 16(3) 409-427
McCarthy, Gregory C., GOP Oversight of Intelligence in the Clinton Era: 15(1) 26-51
McCarthy, Shaun, South Africa’s Intelligence Reformation: 9(1) 63-71
McGill, G. M. (Mert), OSCINT and the Private Information Sector: 7(4) 435-443
Melman, Yossi and Dan Raviv, The Journalist’s Connections: How Israel Got Russia’s Biggest Pre-glasnost Secret: 4(2) 219-225
Mescall, Patrick Neil, A Creature of Compromise: The Establishment of the DIA: 7(3) 251-274
Michal, Kristen, Business Counterintelligence and the Role of the U.S. Intelligence Community: 7(4) 413-427
Mierzejewski, Alfred C., Intelligence and the Strategic Bombing of Germany: The Combined Strategic Targets Committee: 3(1) 83-104
Miller, Abraham H. and Brian Alexander, Structural Quiescence in the Failure of IC21 and Intelligence Reform: 14(2) 234-261
Miller, Abraham H., How the CIA Fell Victim to Myth Posing as Journalism: 10(3) 257-268
Miller, Dawn M., Dark Waters: Britain and Italy’s Invasion of Albania, 7 April 1939: 16(2) 290-323
Mitchell, Fredric, Lots of Smoke – Little Fire: 1(4) 111-118
Mobley, Richard A., North Korea’s Surprise Attack: Weak U.S. Analysis?: 13(4) 490-514
Moriarity, Anthony R., Abating Military Espionage Problems: 4(4) 475-485
Motley, James Berry, International Terrorism: A Challenge for U.S. Intelligence: 1(1) 83-96
Motley, James Berry, The Army’s Need: A Relevant LIC Environment: 4(3) 383-405
Mrozinski, Lawrence G., Thomas Williams, Roman H. Kent and Robin D. Tyner, Countering China’s Threat to the Western Hemisphere: 15(2) 195-210
Mulcahy, Kevin V., The Bush Administration and National Security Policymaking: A Preliminary Assessment: 4(2) 167-180
Murphy Jr., John F., Secret Weapons of the Secret War: 14(2) 262-278
Murphy Jr., John F., The Alaskan Mystery Flights: 9(1) 97-111

Nelsen, Harvey, The U.S. Intelligence Budget in the 1990s: 6(2) 195-203
Nelson, Patricia and Jon Sigurdson, Intelligence Gathering and Japan: The Elusive Role of Grey Intelligence: 5(1) 17-34
Nolan, Cynthia M., Seymour Hersh’s Impact On The CIA: 12(1) 18-34

O’Brien, Kevin A., Interfering with Civil Society: CIA and KGB Covert Political Action During the Cold War: 8(4) 431-456
O’Brien, Kevin A., South Africa’s Evolving Intelligence and Security Structures: 9(2) 187-232
O’Toole, George J. A., Benjamin Franklin: American Spymaster or British Mole?: 3(1) 45-53
O’Toole, George J. A., Kahn’s Law: A Universal Principle of Intelligence?: 4(1) 39-46
O’Toole, George. J. A., The Chesapeake Capes: American Intelligence Coup?: 10(2) 196-205
Oros, Andrew L., Japan’s Growing Intelligence Capability: 15(1) 1-25
Orton, J. Douglas and Jamie L. Callahan, Important "Folk Theories" in Intelligence Reorganization: 8(4) 411-430
Orton, James Douglas, Cross-National Ethical Dilemmas in Competitive Intelligence: 15(3) 440-456
Ott, Marvin C., Partisanship and the Decline of Intelligence Oversight: 16(1) 69-94

Paritzky, Ethan J., Removing Opacity: Putting Israel’s Nuclear Capability Under the LAMP: 16(3) 389-408
Peter Callamari and Derek Reveron, China’s Use of Perception Management: 16(1) 1-15
Phares, Walid, The Intelligence Services in Lebanon During the War of 1975-1990: 7(3) 363-381
Phillips, David Atlee, "Goodbye, Mr. President." "Enjoy Your Retirement, Director": 1(2) 127-132
Phillips, David Atlee, CIA-Bashing Time Again: Covert Action Is the Blunt Instrument: 2(1) 115-121
Phillips, David Atlee, Intelligence Is No Laughing Matter: 2(2) 267-272
Phillips, David Atlee, Some Truth, Some Untruth, Some Half-Truth: 1(3) 109-114
Phillips, David Atlee, The Great White Case Officer: 1(1) 97-102
Phillips, David Atlee, The Walker Family Revisited. Philip Agee Returns: 1(4) 133-139
Pine, Shawn M., CISOC: The Army’s Counterintelligence Special Operations Concept: 9(1) 81-95
Pine, Shawn M., Deficiencies in Military Counterintelligence: A View From the Field: 8(2) 221-228
Polgar, Tom, Defection and Redefection: 1(2) 29-42
Polgar, Tom, The Intelligence Services of West Germany: 1(4) 79-96
Politi, Alessandro, The Citizen as "Intelligence Minuteman": 16(1) 34-38
Porteous, Samuel D., Economic/Commercial Interests and the World’s Intelligence Services: A Canadian Perspective: 8(3) 275-306
Pringle, Robert W., Andropov’s Counterintelligence State: 13(2) 193-203
Pringle, Robert W., Putin: The New Andropov?: 14(4) 545-558
Pringle, Robert W., The Heritage and Future of Russian Intelligence: 11(2) 175-184
Pringle, Robert W., The Limits of OSINT: Diagnosing the Soviet Media, 1985-1989: 16(2) 280-289

Quinn, James L. Staffing the Intelligence Community: The Pros and Cons of an Intelligence Reserve: 13(2) 160-170

Reese, John R., A Case Study in Operational Intelligence: 11(1) 73-92
Reich, Robert C., Re-examining the Team A-Team B Exercise: 3(3) 387-403
Rhee, Will, Comparing U.S. Operations Kingpin (1970) and Eagle Claw (1980): 6(4) 489-506
Richelson, Jeffrey T., "Truth Conquers All Chains": The U.S. Army Intelligence Support Activity, 1981-1989: 12(2) 168-200
Richelson, Jeffrey T., From MONARCH EAGLE to MODERN AGE: The Consolidation of U.S. Defense HUMINT: 10(2) 131-164
Richelson, Jeffrey T., MASINT: The New Kid in Town: 14(2) 149-192
Richelson, Jeffrey T., Out of the Black: The Disclosure and Declassification of the National Reconnaissance Office: 11(1) 1-25
Richelson, Jeffrey T., Restructuring the NRO: From the Cold War’s End to the 21st Century: 15(4) 496-539
Richelson, Jeffrey T., The Calculus of Intelligence Cooperation: 4(3) 307-323
Richelson, Jeffrey T., The IPCRESS File: The Great Game in Film and Fiction, 1953-2002: 16(3) 462-498
Richelson, Jeffrey T., Undercover in Outer Space: The Creation and Evolution of the NRO, 1960-1963: 13(3) 301-344
Richelson, Jeffrey T., When Kindness Fails: Assassination as a National Security Option: 15(2) 243-274
Riley, Patrick R., CIA And Its Discontents: 11(3) 255-270
Robertson, Kenneth G., Canadian Intelligence Policy: The Role and Future of CSIS: 3(2) 225-248
Rodman, David, Against Fishel: Another Look At The Liberty Incident: 9(1) 73-80
Rudner, Martin, The Future of Canada’s Defence Intelligence: 15(4) 540-564
Russell, Richard L., CIA: A Cold War Relic?: 8(1) 11-20

Sakkas, Peter E., Espionage and Sabotage in the Computer World: 5(2) 155-202
Sayle, Edward F., Nuggets from Intelligence History: 1(2) 115-126
Sayle, Edward F., The Déja Vu of American Secret Diplomacy: 2(3) 399-406
Sayle, Edward F., The Historical Underpinnings of the U.S. Intelligence Community: 1(1) 1-27
Sayle, Edward F., Tradecraft in Ancient Greece: 2(2) 189-202
Scalingi, Paula L., Intelligence Community Cooperation: The Arms Control Model: 5(4) 401-410
Schwartau, Winn, "Defense in Depth" for Information Systems Survival: 8(2) 229-234
Segell, Glen M., French Cryptography Policy: The Turnabout of 1999: 13(3) 345-358
Sheldon, Rose Mary, Caesar, Intelligence, and Ancient Britain: 15(1) 77-100
Sheldon, Rose Mary, Hannibal’s Spies: 1(3) 53-70
Sheldon, Rose Mary, The Ancient Imperative: Clandestine Operations and Covert Action: 10(3) 299-315
Sheldon, Rose Mary, The Spartacus Rebellion: A Roman Intelligence Failure?: 6(1) 69-84
Shoham, Dany, The Anthrax Evidence Points to Iraq: 16(1) 39-68
Shpiro, Shlomo, The Media Strategies of Intelligence Services: 14(4) 485-502
Shreeve, Thomas W. and James J. Dowd Jr., Building a Learning Organization: Teaching with Cases at CIA: 10(1) 97-107
Simmons, Robert Ruhl, Intelligence Policy and Performance in Reagan’s First Term: A Good Record or Bad?: 4(1) 1-22
Smith, Bradley F., Sharing Ultra in World War II: 2(1) 59-72
Smith, Michael Douglas, CIA Publications: Serving the President with Daily Intelligence: 12(2) 201-206
Smith, Richard Harris, The First Moscow Station: An Espionage Footnote to Cold War History: 3(3) 333-346
Sommers, Marilyn P., Law Enforcement Intelligence: A New Look: 1(3) 25-40
Sparrow, Malcolm K., Network Vulnerabilities and Strategic Intelligence in Law Enforcement: 5(3) 255-274
Spence, Richard B., Secret Agent 666: Aleister Crowley and British Intelligence in America, 1914-1918: 13(3) 359-371
Spence, Richard B., The Strange Case of Sergius Riis: 15(2) 222-242
Spence, Richard B., The Tragic Fate of Kalamatiano: America’s Man in Moscow: 12(3) 346-374
Stack, Kevin P., A Negative View of Competitive Analysis: 10(4) 456-464
Stack, Kevin P., Appreciating President Ford’s Legacy to Intelligence: 12(1) 73-79
Steele, Robert D., The Importance of Open Source Intelligence To The Military: 8(4) 457-470
Steele, Robert David, A Critical Evaluation of U.S. National Intelligence Capabilities: 6(2) 173-193
Steele, Robert David, Crafting Intelligence in the Aftermath of Disaster: 15(2) 161-178
Steele, Robert David, Possible Presidential Intelligence Initiatives: 13(4) 409-423
Steele, Robert David, Reinventing Intelligence: Holy Grail or Mission Impossible?: 7(2) 199-203
Steinacher, Gerald, The Special Operations Executive (SOE) in Austria, 1940-1945: 15(2) 211-221
Stempel, John D., Error, Folly, and Policy Intelligence: 12(3) 267-281
Stempel, John D., Robert W. Pringle Jr. and Tom Stempel, Intelligence and the Cinema: 15(1) 115-124
Strong, J. Thompson, Covert Activities and Intelligence Operations: Congressional and Executive Roles Redefined: 1(2) 63-72
Strong, J. Thompson, Tilting with Machiavelli: Fighting Competitive Espionage in the 1990s: 7(2) 161-174
Swenson, Russell G., Intelligence Education in the Americas: 16(1) 108-130

Taplin, Winn L., Six General Principles of Intelligence: 3(4) 475-491
Tenet, George J., The CIA and the Security Challenges of the New Century: 13(2) 133-143
Theodorou, Jerry, Political Risk Reconsidered: 6(2) 147-171
Thomas Jr., Ronald C., Influences on Decisionmaking at the Bay of Pigs: 3(4) 537-548
Thomas Jr., Stafford T., Hidden in Plain Sight: Searching for the CIA’s "New Missions": 13(2) 144-159
Thomas, Stafford T., A Political Theory of the CIA: 11(1) 57-72
Thomas, Stafford T., Assessing Current Intelligence Studies: 2(2) 217-244
Thomas, Stafford T., Presidential Styles and DCI Selection: 7(2) 175-198
Thomas, Stafford T., The CIA’s Bureaucratic Dimensions: 12(4) 399-413
Thornton, Richard C., The Unfulfilled Promise of Declassification: 11(4) 447-451
Toffler, Alvin and Heidi Toffler, Powershift: The World’s Most Dangerous Brain Drains: 5(3) 329-331
Toscano, Mario, "Machiavelli" Views World War II Intelligence: 1(3) 41-52
Tovar, B. Hugh, The Indonesian Crisis of 1965-1966: A Retrospective: 7(3) 313-338
Tovar, B. Hugh, Thoughts on Running a Small War: 1(3) 85-93
Tovar, B. Hugh, Vietnam Revisited: The United States and Diem’s Death: 5(3) 291-312
Tovar, Hugh, The Debate Continues: The CIA In Indonesia: The Scholars vs. The Professionals – II. The Professionals: The Kahin’s CIA Fever: 10(2) 218-221
Trim, Peter R. J., Public and Private Sector Cooperation in Counteracting Cyberterrorism: 16(4) 594-608
Trim, Peter R. J., The Company-Intelligence Interface and National Security: 13(2) 204-214
Troy, Thomas F., Knifing of the OSS: 1(3) 95-108
Troy, Thomas F., The "Correct" Definition of Intelligence: 5(4) 433-454
Troy, Thomas F., The British Assault on J. Edgar Hoover: The Tricycle Case: 3(2) 169-209
Troy, Thomas F., The Gaunt-Wiseman Affair: British Intelligence in New York in 1915: 16(3) 442-461
Troy, Thomas F., The Quaintness of the U.S. Intelligence Community: Its Origin, Theory, and Problems: 2(2) 245-266
Troy, Thomas F., Writing History in CIA: A Memoir of Frustration: 7(4) 397-411
Turner, Michael A., CIA-FBI Non-Cooperation: Cultural Trait or Bureaucratic Inertia?: 8(3) 259-274
Turner, Michael A., Issues in Evaluating U.S. Intelligence: 5(3) 275-285
Turner, Michael A., Setting Analytical Priorities in U.S. Intelligence: 9(3) 33-41
Turner, Michael A., Understanding CIA’s Role in Intelligence: 4(3) 295-305
Turner, Robert F., The CIA’s Nicaragua "Murder Manual": A Sandinista Dirty Trick?": 9(1) 33-41
Tyson, James L., The EOU vs. Hitler’s Mini-Missiles: 12(1) 80-87

Unsinger, Peter C., Three Intelligence Blunders in Korea: 3(4) 549-561
Unsinger, Peter Charles, Meeting A Commercial Need for Intelligence: The International Maritime Bureau: 12(1) 58-72
Usowski, Peter S., John McCone and the Cuban Missile Crisis: A Persistent Approach to the Intelligence-Policy Relationship: 2(4) 547-576

Valcourt, Richard R., Controlling U.S. Hired Hands: 2(2) 163-178
Vital, David, Images of Other Peoples in the Making of Intelligence and Foreign Policy: 16(1) 16-33

Waller, John H., Josiah Harlan: American Freebooter in Nineteenth-Century Afghanistan: 15(3) 429-439
Waller, John H., The Devil’s Doctor: Felix Kersten: 11(3) 299-330
Waller, John H., The Double Life of Admiral Canaris: 9(3) 271-289
Wannall, W. Raymond, The FBI’s Domestic Intelligence Operations: Domestic Security in Limbo: 4(4) 443-473
Wannall, W. Raymond, Undermining Counterintelligence Capability: 15(3) 321-329
Warner, Michael, Sophisticated Spies: CIA’s Links to Liberal Anti-Communists, 1949-1967: 9(3) 425-433
Warner, Michael, The CIA’s Office of Policy Coordination: From NSC 10/2 to NSC 68: 11(2) 211-220
Warner, William T., International Technology Transfer and Economic Espionage: 7(2) 143-160
Warren, Ward, Politics, Presidents, and DCIs: 8(3) 337-344
Waxman, Matthew C., Emerging Intelligence Challenges: 10(3) 317-331
Wege, Carl Anthony, Assad’s Legions: The Syrian Intelligence Services: 4(1) 91-100
Wege, Carl Anthony, Iranian Intelligence Organizations: 10(3) 287-298
Wege, Carl Anthony, The Syrian Socialist Party: An Intelligence Asset?: 7(3) 339-351
Weller, Geoffrey R., Accountability in Canadian Intelligence Services: 2(3) 415-441
Weller, Geoffrey R., Assessing Canadian Intelligence Literature: 1980-2000: 14(1) 49-61
Weller, Geoffrey R., Comparing Western Inspectors General of Intelligence and Security: 9(3) 383-406
Weller, Geffrey R., Oversight of Australia’s Intelligence Services: 12(4) 484-503
Weller, Geoffrey R., Political Scrutiny and Control of Scandinavia’s Security and Intelligence Services: 13(2) 171-192
Weller, Geoffrey R., The Internal Modernization of Western Intelligence Agencies: 14(3) 299-322
Westerfield, H. Bradford, Inside Ivory Bunkers: CIA Analysts Resist Managers’ "Pandering" – Part I: 9(3) 407-424
Westerfield, H. Bradford, Inside Ivory Bunkers: CIA Analysts Resist Managers’ "Pandering" – Part II: 10(1) 19-54
Wettering, Frederick L., (C)overt Action: The Disappearing "C": 16(4) 561-572
Wettering, Frederick L., The Internet and the Spy Business: 14(3) 342-365
Wheaton, Kristan J., Analysis in Crisis Prevention: 14(2) 223-233
Wheeler, Douglas L., The Archives of Portugal: A Guide to an Intelligence Treasure Trove: 4(4) 539-550
White, Ralph K., Empathy as an Intelligence Tool: 1(1) 57-75111
White, William, The Microdot: Then and Now: 3(2) 249-269
Winchell, Sean P., Pakistan’s ISI: The Invisible Government: 16(3) 374-388
Windmiller, Marshall, A Tumultuous Time: OSS and Army Intelligence in India, 1942-1946: 8(1) 105-124
Wirtz, James J., Constraints on Intelligence Collaboration: The Domestic Dimension: 6(1) 85-99
Wirtz, James J., Miscalculation, Surprise and American Intelligence after the Cold War: 5(1) 1-16
Wittkoff, E. Peter, Brazil’s SIVAM: Surveillance Against Crime and Terrorism: 16(4) 543-560
Wright, Jeffrey W., Intelligence and Economic Security: 5(2) 203-221

Yu, Maochun, OSS In China – New Information About an Old Role: 7(1) 75-96

Ziegler, David W., Yellow Rain: An Analysis That Went Awry: 2(1) 91-113