- Page 8:
Encyclopedia of Espionage, Intellig
- Page 12:
This page intentionally left blank
- Page 16:
Introductionto Jane’s Strategic W
- Page 20:
This page intentionally left blank
- Page 24:
Advisors and ContributorsAgnes Lich
- Page 28:
List of Entries❘ C ❘Biological
- Page 32:
List of Entries❘ G ❘❘ H ❘Fi
- Page 36:
List of Entries❘ N ❘Mount Weath
- Page 40:
List of Entries❘ T ❘SOE (Specia
- Page 44:
This page intentionally left blank
- Page 48:
AbwehrAbdurajak Abubakar Janjalani,
- Page 52:
Advanced Photon Sourceusing just th
- Page 56:
Africa, Modern U.S. Security Policy
- Page 60:
Africa, Modern U.S. Security Policy
- Page 64:
AIBecause Agent Orange herbicide re
- Page 68:
Air Force Intelligence, United Stat
- Page 72:
Air Marshals, United Statesnot to t
- Page 76:
Air Plume and Chemical AnalysisIn M
- Page 80:
Aircraft CarrierA flight deck crew
- Page 84:
Airline SecurityBritish achievement
- Page 88:
Airline Securitypulse induction sta
- Page 92:
Al-Ittihad al-IslamiUnited States.
- Page 96:
Allied Democratic ForcesTaylor, Fra
- Page 100:
Americas, Modern U.S. Security Poli
- Page 104:
Americas, Modern U.S. Security Poli
- Page 108:
Ames Espionage CaseThe CIA and FBI
- Page 112:
Anthrax, Terrorist Use as a Biologi
- Page 116:
Anthrax, Terrorist Use as a Biologi
- Page 120:
Anthrax VaccineA technician works i
- Page 124:
Anthrax WeaponizationMembers of an
- Page 128:
Antiballistic Missile TreatyWith hi
- Page 132:
Anti-Imperialist Territorial Nuclei
- Page 136:
Archeology and Artifacts, Protectio
- Page 140:
Architecture and Structural Securit
- Page 144:
Architecture and Structural Securit
- Page 148:
Argentina, Intelligence and Securit
- Page 152:
Armed Islamic GroupPresident Bush,
- Page 156:
Army Medical Research Institute of
- Page 160:
Assassinationsafety procedures. The
- Page 164:
AssassinationU.S. Special Forces as
- Page 168:
Assassination Weapons, Mechanicalth
- Page 172:
Assassination Weapons, MechanicalSo
- Page 176:
Asymmetric Warfare❚ K. LEE LERNER
- Page 180:
Atmospheric Release Advisory Capabi
- Page 184:
Audio Amplifiersvolts. A low voltag
- Page 188:
Australia, Intelligence and Securit
- Page 192:
Aviation Intelligence, HistoryFrom
- Page 196:
Aviation Intelligence, Historyproje
- Page 200:
Aviation Security Screeners, United
- Page 204:
B-52ELECTRONIC:Air Force Technology
- Page 208:
Bacterial Biologybacteria are damag
- Page 212:
Bacterial Biologygenome. With only
- Page 216:
Ballistic Missile Defense Organizat
- Page 220:
Ballistic MissilesIn 1999, Pakistan
- Page 224:
Ballistic Missilesreentry vehicles
- Page 228:
Balloon Reconnaissance, Historymeta
- Page 232:
Basque Fatherland and LibertyPresid
- Page 236:
Baton Roundsper surface area unit i
- Page 240:
Belgium, Intelligence and Security
- Page 244:
Berlin AirliftBerlin children cheer
- Page 248:
Berlin TunnelSoviet authorities fin
- Page 252:
Berlin WallThe Brandenburg Gate was
- Page 256:
Biochemical Assassination Weaponsan
- Page 260:
Biocontainment LaboratoriesApart fr
- Page 264:
BiodetectorsAmerica. The others are
- Page 268:
Bio-Flipsthree-dimensional tissue c
- Page 272:
Biological Input/Output Systemsin A
- Page 276:
Biological Warfarebiological warfar
- Page 280:
Biological Weapons, Genetic Identif
- Page 284:
BiometricsA Purdue University profe
- Page 288:
Biosensor Technologieseye, are extr
- Page 292:
BioterrorismUniversity of Nebraska
- Page 296:
Bioterrorism, Protective Measurespr
- Page 300:
Black ListIn the seventeenth centur
- Page 304:
Black Tom ExplosionPlanning the att
- Page 308:
Bletchley ParkThe Duke of York, for
- Page 312:
Bomb Damage, Forensic Assessment❚
- Page 316:
BombeDevices known as sniffers dete
- Page 320:
Border Crossing and InspectionJapan
- Page 324:
BotulismPERIODICALS:Byrne, M.P., an
- Page 328:
Brilliant Pebblesdemilitarize the n
- Page 332: Bubonic Plagueof the Large-Volume R
- Page 336: Bugs and Bug Detectorstelephones, p
- Page 340: Bush Administration, United States
- Page 344: Bush Administration, United States
- Page 348: Cambridge University Spy RingKim Ph
- Page 352: Cambridge University Spy RingThough
- Page 356: Camerasoperator of the camera plays
- Page 360: Cameras, Miniaturewhen an image is
- Page 364: Canada, Counter-Terrorism PolicyBer
- Page 368: Canada, Intelligence and SecurityBr
- Page 372: Canine Substance DetectionJohn Long
- Page 376: Carter Adminstration, United States
- Page 380: Case OfficerMiddle East, Modern U.S
- Page 386: CERNMock-up of the CERN Large Hadro
- Page 390: Chechen-Russian Conflictgovernment,
- Page 394: Chemical and Biological Detection T
- Page 398: Chemical Safety and Hazard Investig
- Page 402: Chemical Safety: Emergency Response
- Page 406: Chemical WarfareTerrified children
- Page 410: Chemistry: Applications in Espionag
- Page 414: Chernobyl Nuclear Power Plant Accid
- Page 418: Chernobyl Nuclear Power Plant Accid
- Page 422: China, Intelligence and Securitysec
- Page 426: Chinese Espionage against the Unite
- Page 430: CIAfurther decided that such action
- Page 434:
CIACIA activities since the Iran-Co
- Page 438:
CIA Directorate of Science and Tech
- Page 442:
CIA, Formation and Historyand looke
- Page 446:
CIA, Formation and Historyearly 196
- Page 450:
CIA, Legal Restrictionhe uncovered
- Page 454:
Cipher Machinesnumber of keys is ma
- Page 458:
Cipher Padciphering is performed us
- Page 462:
Civil Aviation Security, United Sta
- Page 466:
Civil War, Espionage and Intelligen
- Page 470:
Classified Informationexecutive ord
- Page 474:
Classified Informationcircumstances
- Page 478:
Clinton Administration, United Stat
- Page 482:
Closed-Circuit TelevisionCipher Mac
- Page 486:
Coast Guard, United Statesobserve w
- Page 490:
Code NameSEE ALSOCoast Guard Nation
- Page 494:
Codes and Ciphers❚ Plaintext lett
- Page 498:
Codes and Ciphersciphers by matchin
- Page 502:
COINTELPROthat are easily scalable,
- Page 506:
Cold War, The Start of the Atomic A
- Page 510:
Cold WarRoleff, Tamara. ed. The Ato
- Page 514:
Cold WarAn electromagnetic separati
- Page 518:
Cold WarCold War politics and marke
- Page 522:
Cold War: The Collapse of the Sovie
- Page 526:
Colombia, Intelligence and Security
- Page 530:
COMINTsettings of the Lorenz encode
- Page 534:
Commerce Department Intelligence an
- Page 538:
Commission on Civil Rights, United
- Page 542:
Communicable Diseases, Isolation, a
- Page 546:
Communicable Diseases, Isolation, a
- Page 550:
Comprehensive Test Ban Treaty❚ FU
- Page 554:
Computer Fraud and Abuse Act of 198
- Page 558:
Computer Hardware SecurityConvicted
- Page 562:
Computer Modelingclaimed protection
- Page 566:
Computer Software SecurityModeling
- Page 570:
Computer VirusAuthorization and int
- Page 574:
Concealment DevicesNational Infrast
- Page 578:
Continuity Irish Republican Armyfor
- Page 582:
Continuity of Government, United St
- Page 586:
Copyright SecurityOn December 5, 20
- Page 590:
Counterfeit Currency, Technology an
- Page 594:
Counter-IntelligenceCounter-intelli
- Page 598:
Covert OperationsLeaflets dropped o
- Page 602:
Covert Operationsof a friendly, but
- Page 606:
Crime Prevention, Intelligence Agen
- Page 610:
Critical Infrastructure Assurance O
- Page 614:
Cruise MissileThe destroyer USS Por
- Page 618:
Cryptology, Historyalgorithm underl
- Page 622:
Cryptology, HistoryThis worker in t
- Page 626:
CryptonymUnited States in the Mexic
- Page 630:
Cuban Missile CrisisThe New York Ti
- Page 634:
Culper RingCuba from whatever natio
- Page 638:
Customs Service, United StatesA sup
- Page 642:
Cyber Securitycyanide capsule on hi
- Page 646:
Cyber Security Warning Networksyste
- Page 650:
Czech Republic, Intelligence and Se
- Page 654:
❘❘❙❚❚❙❘❘ D ❘❘
- Page 658:
Data MiningBiological Warfare, Adva
- Page 662:
DCICIA director George Tenet, right
- Page 666:
DCIThe 1980s: Casey. Whereas Turner
- Page 670:
DEAA Drug Enforcement Agency (DEA)
- Page 674:
Dead-Letter BoxOther programs and t
- Page 678:
Decontamination MethodsA volunteer
- Page 682:
Decryptionkept free from the contam
- Page 686:
Defense Security Service, United St
- Page 690:
Department of State Bureau of Intel
- Page 694:
Department of State, United StatesD
- Page 698:
DIAPlischke, Elmer. U.S. Department
- Page 702:
Dial Tone DecoderIn addition to the
- Page 706:
DisinformationAssassinationDepartme
- Page 710:
Disinformation1999) by Stephen Endi
- Page 714:
DNAThe author wishes to acknowledge
- Page 718:
DNA FingerprintingDNA fingerprintin
- Page 722:
DNA Recognition InstrumentsA techni
- Page 726:
DNA Sequences, UniqueDNA and Genome
- Page 730:
Document DestructionIndustrial shre
- Page 734:
Document ForgeryThis false passport
- Page 738:
Document Forgerythe Japanese, who w
- Page 742:
Document ForgerySDI to ”prevent t
- Page 746:
DODDepartment of Defense photo show
- Page 750:
DOEStrategic Command controls missi
- Page 754:
DOEfourfold purpose: to protect U.S
- Page 758:
Domestic Intelligenceleast, the mos
- Page 762:
DosimetrySEE ALSOFBI (United States
- Page 766:
DropCIA (United States Central Inte
- Page 770:
Drug Intelligence EstimatesELECTRON
- Page 774:
Dual Use TechnologyUndersea warfare
- Page 778:
❘❘❙❚❚❙❘❘ E ❘❘
- Page 782:
E-Bombin England developed Ebola fe
- Page 786:
EchelonEchelon was established at M
- Page 790:
Economic EspionageU.S. military con
- Page 794:
Economic IntelligenceIn National Se
- Page 798:
Eichmann, Adolf: Israeli CaptureGer
- Page 802:
El Salvador, Intelligence and Secur
- Page 806:
Electromagnetic Spectrumbecause the
- Page 810:
Electromagnetic SpectrumPhotovoltai
- Page 814:
Electronic Communication Intercepts
- Page 818:
Electronic Countermeasures(CIA), ot
- Page 822:
Electronic WarfareA U.S. Navy EA-6B
- Page 826:
ElectrophoresisKupperberg, Paul. Sp
- Page 830:
Emergency Response Teamsto the plan
- Page 834:
Encryption of Dataprogram, which mo
- Page 838:
Enduring Freedom, Operation (Nov.16
- Page 842:
Energy Directed WeaponsPersian Gulf
- Page 846:
Energy TechnologiesSEE ALSODARPA (D
- Page 850:
Engraving and Printing, United Stat
- Page 854:
EnigmaKingdom was attempting to joi
- Page 858:
Enigmaletter A on the right-hand (c
- Page 862:
Environmental Measurements Laborato
- Page 866:
Epidemiologyand regulations to cont
- Page 870:
EspionageSuch laboratory techniques
- Page 874:
Espionage and Intelligence, Early H
- Page 878:
Espionage and Intelligence, Early H
- Page 882:
Espionage and Intelligence, Early H
- Page 886:
European Unionproposed to create a
- Page 890:
Explosive Coaldiscussed elsewhere i