- Page 8:
Encyclopedia of Espionage, Intellig
- Page 12:
This page intentionally left blank
- Page 16:
Introductionto Jane’s Strategic W
- Page 20:
This page intentionally left blank
- Page 24:
Advisors and ContributorsAgnes Lich
- Page 28:
List of Entries❘ C ❘Biological
- Page 32:
List of Entries❘ G ❘❘ H ❘Fi
- Page 36:
List of Entries❘ N ❘Mount Weath
- Page 40:
List of Entries❘ T ❘SOE (Specia
- Page 44:
This page intentionally left blank
- Page 48:
AbwehrAbdurajak Abubakar Janjalani,
- Page 52:
Advanced Photon Sourceusing just th
- Page 56:
Africa, Modern U.S. Security Policy
- Page 60:
Africa, Modern U.S. Security Policy
- Page 64:
AIBecause Agent Orange herbicide re
- Page 68:
Air Force Intelligence, United Stat
- Page 72:
Air Marshals, United Statesnot to t
- Page 76:
Air Plume and Chemical AnalysisIn M
- Page 80:
Aircraft CarrierA flight deck crew
- Page 84:
Airline SecurityBritish achievement
- Page 88:
Airline Securitypulse induction sta
- Page 92:
Al-Ittihad al-IslamiUnited States.
- Page 96:
Allied Democratic ForcesTaylor, Fra
- Page 100:
Americas, Modern U.S. Security Poli
- Page 104:
Americas, Modern U.S. Security Poli
- Page 108:
Ames Espionage CaseThe CIA and FBI
- Page 112:
Anthrax, Terrorist Use as a Biologi
- Page 116:
Anthrax, Terrorist Use as a Biologi
- Page 120:
Anthrax VaccineA technician works i
- Page 124:
Anthrax WeaponizationMembers of an
- Page 128:
Antiballistic Missile TreatyWith hi
- Page 132:
Anti-Imperialist Territorial Nuclei
- Page 136:
Archeology and Artifacts, Protectio
- Page 140:
Architecture and Structural Securit
- Page 144:
Architecture and Structural Securit
- Page 148:
Argentina, Intelligence and Securit
- Page 152:
Armed Islamic GroupPresident Bush,
- Page 156:
Army Medical Research Institute of
- Page 160:
Assassinationsafety procedures. The
- Page 164:
AssassinationU.S. Special Forces as
- Page 168:
Assassination Weapons, Mechanicalth
- Page 172:
Assassination Weapons, MechanicalSo
- Page 176:
Asymmetric Warfare❚ K. LEE LERNER
- Page 180:
Atmospheric Release Advisory Capabi
- Page 184:
Audio Amplifiersvolts. A low voltag
- Page 188:
Australia, Intelligence and Securit
- Page 192:
Aviation Intelligence, HistoryFrom
- Page 196:
Aviation Intelligence, Historyproje
- Page 200:
Aviation Security Screeners, United
- Page 204:
B-52ELECTRONIC:Air Force Technology
- Page 208:
Bacterial Biologybacteria are damag
- Page 212:
Bacterial Biologygenome. With only
- Page 216:
Ballistic Missile Defense Organizat
- Page 220:
Ballistic MissilesIn 1999, Pakistan
- Page 224:
Ballistic Missilesreentry vehicles
- Page 228:
Balloon Reconnaissance, Historymeta
- Page 232:
Basque Fatherland and LibertyPresid
- Page 236:
Baton Roundsper surface area unit i
- Page 240:
Belgium, Intelligence and Security
- Page 244:
Berlin AirliftBerlin children cheer
- Page 248:
Berlin TunnelSoviet authorities fin
- Page 252:
Berlin WallThe Brandenburg Gate was
- Page 256:
Biochemical Assassination Weaponsan
- Page 260:
Biocontainment LaboratoriesApart fr
- Page 264:
BiodetectorsAmerica. The others are
- Page 268:
Bio-Flipsthree-dimensional tissue c
- Page 272:
Biological Input/Output Systemsin A
- Page 276:
Biological Warfarebiological warfar
- Page 280:
Biological Weapons, Genetic Identif
- Page 284:
BiometricsA Purdue University profe
- Page 288:
Biosensor Technologieseye, are extr
- Page 292:
BioterrorismUniversity of Nebraska
- Page 296:
Bioterrorism, Protective Measurespr
- Page 300:
Black ListIn the seventeenth centur
- Page 304:
Black Tom ExplosionPlanning the att
- Page 308:
Bletchley ParkThe Duke of York, for
- Page 312:
Bomb Damage, Forensic Assessment❚
- Page 316:
BombeDevices known as sniffers dete
- Page 320:
Border Crossing and InspectionJapan
- Page 324:
BotulismPERIODICALS:Byrne, M.P., an
- Page 328:
Brilliant Pebblesdemilitarize the n
- Page 332:
Bubonic Plagueof the Large-Volume R
- Page 336:
Bugs and Bug Detectorstelephones, p
- Page 340:
Bush Administration, United States
- Page 344:
Bush Administration, United States
- Page 348:
Cambridge University Spy RingKim Ph
- Page 352:
Cambridge University Spy RingThough
- Page 356:
Camerasoperator of the camera plays
- Page 360:
Cameras, Miniaturewhen an image is
- Page 364:
Canada, Counter-Terrorism PolicyBer
- Page 368:
Canada, Intelligence and SecurityBr
- Page 372:
Canine Substance DetectionJohn Long
- Page 376:
Carter Adminstration, United States
- Page 380:
Case OfficerMiddle East, Modern U.S
- Page 384:
CERNsuccess of other vaccination ca
- Page 388:
Chain Reaction“hypertexts”(text
- Page 392:
Chemical and Biological Defense Inf
- Page 396:
Chemical and Biological Mass Spectr
- Page 400:
Chemical Safety: Emergency Response
- Page 404:
Chemical WarfareHazardous material
- Page 408:
Chemical Warfareblisters take a lon
- Page 412:
Chemistry: Applications in Espionag
- Page 416:
Chernobyl Nuclear Power Plant Accid
- Page 420:
Chile, Intelligence and Security❚
- Page 424:
Chinese Espionage against the Unite
- Page 428:
Church CommitteeTrulock, Notra. Cod
- Page 432:
CIAPresident Bush, right, and Georg
- Page 436:
CIA, Center for the Study of Intell
- Page 440:
CIA, Foreign Broadcast Information
- Page 444:
CIA, Formation and HistoryAn aerial
- Page 448:
CIA, Legal RestrictionJames Angleto
- Page 452:
Cipher DiskNSC (National Security C
- Page 456:
Cipher MachinesEnigma cipher machin
- Page 460:
Cipher Padstructure or pattern; a p
- Page 464:
Civil War, Espionage and Intelligen
- Page 468:
Civil War, Espionage and Intelligen
- Page 472:
Classified InformationSpeaker of th
- Page 476:
Clinton Administration, United Stat
- Page 480:
Clipper ChipAs Clinton settled into
- Page 484:
Closed-Circuit TelevisionNikolay Vo
- Page 488:
Coast Guard, United StatesMembers o
- Page 492:
Code WordA code name is a particula
- Page 496:
Codes and CiphersA 1968 miniature K
- Page 500:
Codes, Fast and Scalable Scientific
- Page 504:
Cold War, The Start of the Atomic A
- Page 508:
Cold War, The Start of the Atomic A
- Page 512:
Cold WarTraining Center One, a secr
- Page 516: Cold WarU.S. Army tanks at Checkpoi
- Page 520: Cold War: The Collapse of the Sovie
- Page 524: Cold War: The Collapse of the Sovie
- Page 528: Colossus Iguerilla control. Violenc
- Page 532: COMINTNaval successes in the 1920s.
- Page 536: Commerce Department Intelligence an
- Page 540: Communicable Diseases, Isolation, a
- Page 544: Communicable Diseases, Isolation, a
- Page 548: Communications System, United State
- Page 552: Comprehensive Test Ban Treatynation
- Page 556: Computer Hackerspassed decisively.
- Page 560: Computer Keystroke Recordernetworke
- Page 564: Computer ModelingA steel structure
- Page 570: Computer VirusAuthorization and int
- Page 574: Concealment DevicesNational Infrast
- Page 578: Continuity Irish Republican Armyfor
- Page 582: Continuity of Government, United St
- Page 586: Copyright SecurityOn December 5, 20
- Page 590: Counterfeit Currency, Technology an
- Page 594: Counter-IntelligenceCounter-intelli
- Page 598: Covert OperationsLeaflets dropped o
- Page 602: Covert Operationsof a friendly, but
- Page 606: Crime Prevention, Intelligence Agen
- Page 610: Critical Infrastructure Assurance O
- Page 614: Cruise MissileThe destroyer USS Por
- Page 618:
Cryptology, Historyalgorithm underl
- Page 622:
Cryptology, HistoryThis worker in t
- Page 626:
CryptonymUnited States in the Mexic
- Page 630:
Cuban Missile CrisisThe New York Ti
- Page 634:
Culper RingCuba from whatever natio
- Page 638:
Customs Service, United StatesA sup
- Page 642:
Cyber Securitycyanide capsule on hi
- Page 646:
Cyber Security Warning Networksyste
- Page 650:
Czech Republic, Intelligence and Se
- Page 654:
❘❘❙❚❚❙❘❘ D ❘❘
- Page 658:
Data MiningBiological Warfare, Adva
- Page 662:
DCICIA director George Tenet, right
- Page 666:
DCIThe 1980s: Casey. Whereas Turner
- Page 670:
DEAA Drug Enforcement Agency (DEA)
- Page 674:
Dead-Letter BoxOther programs and t
- Page 678:
Decontamination MethodsA volunteer
- Page 682:
Decryptionkept free from the contam
- Page 686:
Defense Security Service, United St
- Page 690:
Department of State Bureau of Intel
- Page 694:
Department of State, United StatesD
- Page 698:
DIAPlischke, Elmer. U.S. Department
- Page 702:
Dial Tone DecoderIn addition to the
- Page 706:
DisinformationAssassinationDepartme
- Page 710:
Disinformation1999) by Stephen Endi
- Page 714:
DNAThe author wishes to acknowledge
- Page 718:
DNA FingerprintingDNA fingerprintin
- Page 722:
DNA Recognition InstrumentsA techni
- Page 726:
DNA Sequences, UniqueDNA and Genome
- Page 730:
Document DestructionIndustrial shre
- Page 734:
Document ForgeryThis false passport
- Page 738:
Document Forgerythe Japanese, who w
- Page 742:
Document ForgerySDI to ”prevent t
- Page 746:
DODDepartment of Defense photo show
- Page 750:
DOEStrategic Command controls missi
- Page 754:
DOEfourfold purpose: to protect U.S
- Page 758:
Domestic Intelligenceleast, the mos
- Page 762:
DosimetrySEE ALSOFBI (United States
- Page 766:
DropCIA (United States Central Inte
- Page 770:
Drug Intelligence EstimatesELECTRON
- Page 774:
Dual Use TechnologyUndersea warfare
- Page 778:
❘❘❙❚❚❙❘❘ E ❘❘
- Page 782:
E-Bombin England developed Ebola fe
- Page 786:
EchelonEchelon was established at M
- Page 790:
Economic EspionageU.S. military con
- Page 794:
Economic IntelligenceIn National Se
- Page 798:
Eichmann, Adolf: Israeli CaptureGer
- Page 802:
El Salvador, Intelligence and Secur
- Page 806:
Electromagnetic Spectrumbecause the
- Page 810:
Electromagnetic SpectrumPhotovoltai
- Page 814:
Electronic Communication Intercepts
- Page 818:
Electronic Countermeasures(CIA), ot
- Page 822:
Electronic WarfareA U.S. Navy EA-6B
- Page 826:
ElectrophoresisKupperberg, Paul. Sp
- Page 830:
Emergency Response Teamsto the plan
- Page 834:
Encryption of Dataprogram, which mo
- Page 838:
Enduring Freedom, Operation (Nov.16
- Page 842:
Energy Directed WeaponsPersian Gulf
- Page 846:
Energy TechnologiesSEE ALSODARPA (D
- Page 850:
Engraving and Printing, United Stat
- Page 854:
EnigmaKingdom was attempting to joi
- Page 858:
Enigmaletter A on the right-hand (c
- Page 862:
Environmental Measurements Laborato
- Page 866:
Epidemiologyand regulations to cont
- Page 870:
EspionageSuch laboratory techniques
- Page 874:
Espionage and Intelligence, Early H
- Page 878:
Espionage and Intelligence, Early H
- Page 882:
Espionage and Intelligence, Early H
- Page 886:
European Unionproposed to create a
- Page 890:
Explosive Coaldiscussed elsewhere i