- Page 8: Encyclopedia of Espionage, Intellig
- Page 12: This page intentionally left blank
- Page 16: Introductionto Jane’s Strategic W
- Page 20: This page intentionally left blank
- Page 24: Advisors and ContributorsAgnes Lich
- Page 28: List of Entries❘ C ❘Biological
- Page 32: List of Entries❘ G ❘❘ H ❘Fi
- Page 36: List of Entries❘ N ❘Mount Weath
- Page 40: List of Entries❘ T ❘SOE (Specia
- Page 44: This page intentionally left blank
- Page 48: AbwehrAbdurajak Abubakar Janjalani,
- Page 52:
Advanced Photon Sourceusing just th
- Page 56:
Africa, Modern U.S. Security Policy
- Page 60:
Africa, Modern U.S. Security Policy
- Page 64:
AIBecause Agent Orange herbicide re
- Page 68:
Air Force Intelligence, United Stat
- Page 72:
Air Marshals, United Statesnot to t
- Page 76:
Air Plume and Chemical AnalysisIn M
- Page 80:
Aircraft CarrierA flight deck crew
- Page 84:
Airline SecurityBritish achievement
- Page 88:
Airline Securitypulse induction sta
- Page 92:
Al-Ittihad al-IslamiUnited States.
- Page 96:
Allied Democratic ForcesTaylor, Fra
- Page 100:
Americas, Modern U.S. Security Poli
- Page 104:
Americas, Modern U.S. Security Poli
- Page 108:
Ames Espionage CaseThe CIA and FBI
- Page 112:
Anthrax, Terrorist Use as a Biologi
- Page 116:
Anthrax, Terrorist Use as a Biologi
- Page 120:
Anthrax VaccineA technician works i
- Page 124:
Anthrax WeaponizationMembers of an
- Page 128:
Antiballistic Missile TreatyWith hi
- Page 132:
Anti-Imperialist Territorial Nuclei
- Page 136:
Archeology and Artifacts, Protectio
- Page 140:
Architecture and Structural Securit
- Page 144:
Architecture and Structural Securit
- Page 148:
Argentina, Intelligence and Securit
- Page 152:
Armed Islamic GroupPresident Bush,
- Page 156:
Army Medical Research Institute of
- Page 160:
Assassinationsafety procedures. The
- Page 164:
AssassinationU.S. Special Forces as
- Page 168:
Assassination Weapons, Mechanicalth
- Page 172:
Assassination Weapons, MechanicalSo
- Page 176:
Asymmetric Warfare❚ K. LEE LERNER
- Page 180:
Atmospheric Release Advisory Capabi
- Page 184:
Audio Amplifiersvolts. A low voltag
- Page 188:
Australia, Intelligence and Securit
- Page 192:
Aviation Intelligence, HistoryFrom
- Page 196:
Aviation Intelligence, Historyproje
- Page 200:
Aviation Security Screeners, United
- Page 204:
B-52ELECTRONIC:Air Force Technology
- Page 208:
Bacterial Biologybacteria are damag
- Page 212:
Bacterial Biologygenome. With only
- Page 216:
Ballistic Missile Defense Organizat
- Page 220:
Ballistic MissilesIn 1999, Pakistan
- Page 224:
Ballistic Missilesreentry vehicles
- Page 228:
Balloon Reconnaissance, Historymeta
- Page 232:
Basque Fatherland and LibertyPresid
- Page 236:
Baton Roundsper surface area unit i
- Page 240:
Belgium, Intelligence and Security
- Page 244:
Berlin AirliftBerlin children cheer
- Page 248:
Berlin TunnelSoviet authorities fin
- Page 252:
Berlin WallThe Brandenburg Gate was
- Page 256:
Biochemical Assassination Weaponsan
- Page 260:
Biocontainment LaboratoriesApart fr
- Page 264:
BiodetectorsAmerica. The others are
- Page 268:
Bio-Flipsthree-dimensional tissue c
- Page 272:
Biological Input/Output Systemsin A
- Page 276:
Biological Warfarebiological warfar
- Page 280:
Biological Weapons, Genetic Identif
- Page 284:
BiometricsA Purdue University profe
- Page 288:
Biosensor Technologieseye, are extr
- Page 292:
BioterrorismUniversity of Nebraska
- Page 296:
Bioterrorism, Protective Measurespr
- Page 300:
Black ListIn the seventeenth centur
- Page 304:
Black Tom ExplosionPlanning the att
- Page 308:
Bletchley ParkThe Duke of York, for
- Page 312:
Bomb Damage, Forensic Assessment❚
- Page 316:
BombeDevices known as sniffers dete
- Page 320:
Border Crossing and InspectionJapan
- Page 324:
BotulismPERIODICALS:Byrne, M.P., an
- Page 328:
Brilliant Pebblesdemilitarize the n
- Page 332:
Bubonic Plagueof the Large-Volume R
- Page 336:
Bugs and Bug Detectorstelephones, p
- Page 340:
Bush Administration, United States
- Page 344:
Bush Administration, United States
- Page 348:
Cambridge University Spy RingKim Ph
- Page 352:
Cambridge University Spy RingThough
- Page 356:
Camerasoperator of the camera plays
- Page 360:
Cameras, Miniaturewhen an image is
- Page 364:
Canada, Counter-Terrorism PolicyBer
- Page 368:
Canada, Intelligence and SecurityBr
- Page 372:
Canine Substance DetectionJohn Long
- Page 376:
Carter Adminstration, United States
- Page 380:
Case OfficerMiddle East, Modern U.S
- Page 384:
CERNsuccess of other vaccination ca
- Page 388:
Chain Reaction“hypertexts”(text
- Page 392:
Chemical and Biological Defense Inf
- Page 396:
Chemical and Biological Mass Spectr
- Page 400:
Chemical Safety: Emergency Response
- Page 404:
Chemical WarfareHazardous material
- Page 408:
Chemical Warfareblisters take a lon
- Page 412:
Chemistry: Applications in Espionag
- Page 416:
Chernobyl Nuclear Power Plant Accid
- Page 420:
Chile, Intelligence and Security❚
- Page 424:
Chinese Espionage against the Unite
- Page 428:
Church CommitteeTrulock, Notra. Cod
- Page 432:
CIAPresident Bush, right, and Georg
- Page 436:
CIA, Center for the Study of Intell
- Page 440:
CIA, Foreign Broadcast Information
- Page 444:
CIA, Formation and HistoryAn aerial
- Page 448:
CIA, Legal RestrictionJames Angleto
- Page 452:
Cipher DiskNSC (National Security C
- Page 456:
Cipher MachinesEnigma cipher machin
- Page 460:
Cipher Padstructure or pattern; a p
- Page 464:
Civil War, Espionage and Intelligen
- Page 468:
Civil War, Espionage and Intelligen
- Page 472:
Classified InformationSpeaker of th
- Page 476:
Clinton Administration, United Stat
- Page 480:
Clipper ChipAs Clinton settled into
- Page 484:
Closed-Circuit TelevisionNikolay Vo
- Page 488:
Coast Guard, United StatesMembers o
- Page 492:
Code WordA code name is a particula
- Page 496:
Codes and CiphersA 1968 miniature K
- Page 500:
Codes, Fast and Scalable Scientific
- Page 504:
Cold War, The Start of the Atomic A
- Page 508:
Cold War, The Start of the Atomic A
- Page 512:
Cold WarTraining Center One, a secr
- Page 516:
Cold WarU.S. Army tanks at Checkpoi
- Page 520:
Cold War: The Collapse of the Sovie
- Page 524:
Cold War: The Collapse of the Sovie
- Page 528:
Colossus Iguerilla control. Violenc
- Page 532:
COMINTNaval successes in the 1920s.
- Page 536:
Commerce Department Intelligence an
- Page 540:
Communicable Diseases, Isolation, a
- Page 544:
Communicable Diseases, Isolation, a
- Page 548:
Communications System, United State
- Page 552:
Comprehensive Test Ban Treatynation
- Page 556:
Computer Hackerspassed decisively.
- Page 560:
Computer Keystroke Recordernetworke
- Page 564:
Computer ModelingA steel structure
- Page 568:
Computer Software SecurityComputer
- Page 572:
Computer Virusdesigned to spread th
- Page 576:
Concealment DevicesConcealed weapon
- Page 580:
Continuity Irish Republican ArmyA c
- Page 584:
Continuous Assisted Performanceplan
- Page 588:
Copyright Securityaspects of U.S. c
- Page 592:
Counter-Intelligence1990s, and in 2
- Page 596:
Counter-Terrorism Rewards ProgramPa
- Page 600:
Covert OperationsTwo members of a U
- Page 604:
CPNBKnott, Stephen F. Secret and Sa
- Page 608:
Critical InfrastructureDEA (Drug En
- Page 612:
Croatia, Intelligence and SecurityS
- Page 616:
Cryo3 Detector❚ FURTHER READING:B
- Page 620:
Cryptology, Historypapyrus was wrap
- Page 624:
Cryptology, HistoryA Korean War vet
- Page 628:
CT Scannersnames most often have li
- Page 632:
Cuban Missile CrisisA low-level pho
- Page 636:
Cultural Resource ProtectionCultura
- Page 640:
Cyanide❚ FURTHER READING:PERIODIC
- Page 644:
Cyber Securitythe computer age, man
- Page 648:
Czech Republic, Intelligence and Se
- Page 652:
This page intentionally left blank
- Page 656:
DARPADARPA is specifically charged
- Page 660:
DCIThe Society of Competitive Intel
- Page 664:
DCIdiplomacy, he favored action. Un
- Page 668:
DEAUnited States and its interests
- Page 672:
DEAJust as marijuana and even cocai
- Page 676:
Decontamination MethodsDead-letter
- Page 680:
Decontamination MethodsDuring the f
- Page 684:
Defense Information Systems Agency,
- Page 688:
Delta ForceBackground investigation
- Page 692:
Department of State, United Statess
- Page 696:
Department of State, United Statess
- Page 700:
DIAVice Admiral Thomas Wilson, righ
- Page 704:
Digital WatermarkingTelephone Recor
- Page 708:
DisinformationUniversity students p
- Page 712:
Disinformationassertions about depl
- Page 716:
DNA FingerprintingAn FBI official h
- Page 720:
DNA Recognition Instrumentspiece of
- Page 724:
DNA Sequences, UniqueHybridization-
- Page 728:
DNA Technologyinto the wrong hands
- Page 732:
Document Forgeryoperation at the Br
- Page 736:
Document Forgerypurported to show t
- Page 740:
Document ForgeryForeign Intelligenc
- Page 744:
DODSoviet Active Measures, United S
- Page 748:
DODDOD controls some 30 million acr
- Page 752:
DOEA trauma intervention volunteer
- Page 756:
Domestic Emergency Support Team, Un
- Page 760:
Domestic Preparedness Office, Unite
- Page 764:
Double Agentscharge is enabled to l
- Page 768:
Drug Control Policy, United States
- Page 772:
Dual Use Technology❚ JUDSON KNIGH
- Page 776:
This page intentionally left blank
- Page 780:
Ebola Virusfrom 1954 to 1964. In 19
- Page 784:
EchelonCarbon-graphite coils capabl
- Page 788:
Economic Espionagestudy. From these
- Page 792:
Economic Intelligencesigned into la
- Page 796:
Egypt, Intelligence and SecurityAn
- Page 800:
Eisenhower Administration, United S
- Page 804:
Electroactive Polymers and DevicesT
- Page 808:
Electromagnetic Spectrumhas units o
- Page 812:
Electromagnetic Warhead Shroudingte
- Page 816:
Electronic Communication Intercepts
- Page 820:
Electronic WarfareThis April 1999 U
- Page 824:
Electro-Optical Intelligence1. Elec
- Page 828:
ELINTcompound that can take on a ne
- Page 832:
Emergency Response Teamsbehind the
- Page 836:
Encryption of Dataprotection of com
- Page 840:
Enduring Freedom, OperationIllegal
- Page 844:
Energy Directed WeaponsA U.S. Navy
- Page 848:
Energy Technologiesinvolves environ
- Page 852:
Engulf, Operationcurrency and coina
- Page 856:
EnigmaA four-rotor Enigma machine,
- Page 860:
Entry-Exit Registration System, Uni
- Page 864:
EPAgovernment. Research at the faci
- Page 868:
EpidemiologyFurthermore, in the era
- Page 872:
EspionageUnited States attorney gen
- Page 876:
Espionage and Intelligence, Early H
- Page 880:
Espionage and Intelligence, Early H
- Page 884:
Estonia, Intelligence and Securitye
- Page 888:
Executive Orders and Presidential D
- Page 892:
Explosive Coalinnovative OSS-disgui