13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

List of Entries❘ C ❘Biological WarfareBiological Warfare, Advanced DiagnosticsBiological Weapons, Genetic IdentificationBio-MagneticsBiomedical TechnologiesBiometricsBio-Optic Synthetic Systems (BOSS)Biosensor TechnologiesBioShield ProjectBioterrorismBioterrorism, Protective MeasuresBlack ChamberBlack OpsBlack Tom ExplosionBletchley ParkBolivia, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>Bomb Damage, Forensic AssessmentBomb Detection DevicesBombeBosnia <strong>and</strong> Herzegovina, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>Botulinum ToxinBrain-Machine InterfacesBrain Wave ScannersBrazil, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>British Terrorism ActBrookhaven National LaboratoryBubonic PlagueBugs (Microphones) <strong>and</strong> Bug DetectorsBush Administration (1989–1993), United StatesNational <strong>Security</strong> PolicyBush Administration (2001–), United StatesNational <strong>Security</strong> PolicyCambodian Freedom Fighters (CFF)Cambridge University Spy RingCamerasCameras, MiniatureCanada, Counter-Terrorism PolicyCanada, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>Canine Substance DetectionCarter Adminstration (1977–1981), United StatesNational <strong>Security</strong> PolicyCDC (United States Centers for Disease Control<strong>and</strong> Prevention)CERNChechen-Russian ConflictChemical <strong>and</strong> Biological Defense InformationAnalysis Center (CBIAC)Chemical <strong>and</strong> Biological Detection TechnologiesChemical Biological Incident Response Force,United StatesChemical Safety <strong>and</strong> Hazard Investigation Board(USCSB), United StatesChemical Safety: Emergency ResponsesChemical WarfareChemistry: Applications in <strong>Espionage</strong>, <strong>Intelligence</strong>,<strong>and</strong> <strong>Security</strong> IssuesChernobyl Nuclear Power Plant Accident, Detection<strong>and</strong> MonitoringChile, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>China, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>XIVChinese <strong>Espionage</strong> against the United StatesChurch CommitteeCIA (United States Central <strong>Intelligence</strong> Agency)CIA (CSI), Center for the Study of <strong>Intelligence</strong>CIA Directorate of Science <strong>and</strong> Technology (DS&T)CIA, Foreign Broadcast Information ServiceCIA, Formation <strong>and</strong> HistoryCIA, Legal RestrictionCipher DiskCipher KeyCipher MachinesCipher PadCivil Aviation <strong>Security</strong>, United StatesCivil War, <strong>Espionage</strong> <strong>and</strong> <strong>Intelligence</strong>Classified InformationClinton Administration (1993–2001), United StatesNational <strong>Security</strong> PolicyClipper ChipClosed-Circuit Television (CCTV)Coast Guard (USCG), United StatesCoast Guard National Response CenterCode NameCode WordCodes <strong>and</strong> CiphersCodes, Fast <strong>and</strong> Scalable Scientific ComputationCOINTELPROCold War (1945–1950), The Start of the Atomic AgeCold War (1950–1972)Cold War (1972–1989): The Collapse of the SovietUnionColombia, <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>Colossus ICOMINT (Communications <strong>Intelligence</strong>)Commerce Department <strong>Intelligence</strong> <strong>and</strong> <strong>Security</strong>Responsibilities, United StatesCommission on Civil Rights, United StatesCommunicable Diseases, Isolation, <strong>and</strong> QuarantineCommunications System, United States NationalComprehensive Test Ban Treaty (CTBT)Computer <strong>and</strong> Electronic Data DestructionComputer Fraud <strong>and</strong> Abuse Act of 1986Computer HackersComputer Hardware <strong>Security</strong>Computer Keystroke RecorderComputer ModelingComputer <strong>Security</strong> Act (1987)Computer Software <strong>Security</strong>Computer VirusConcealment DevicesConsumer Product Safety Commission (CPSC),United StatesContinuity Irish Republican Army (CIRA)Continuity of Government, United StatesContinuous Assisted Performance (CAP)Coordinator for Counterterrorism, United StatesOfficeCopyright <strong>Security</strong>Counterfeit Currency, Technology <strong>and</strong> theManufactureCounter-<strong>Intelligence</strong>Counter-Terrorism Rewards ProgramCovert OperationsCribCrime Prevention, <strong>Intelligence</strong> AgenciesEncyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!