- Page 8:
Encyclopedia of Espionage, Intellig
- Page 12:
This page intentionally left blank
- Page 16:
Introductionto Jane’s Strategic W
- Page 20:
This page intentionally left blank
- Page 24:
Advisors and ContributorsAgnes Lich
- Page 28:
List of Entries❘ C ❘Biological
- Page 32:
List of Entries❘ G ❘❘ H ❘Fi
- Page 36:
List of Entries❘ N ❘Mount Weath
- Page 40:
List of Entries❘ T ❘SOE (Specia
- Page 44:
This page intentionally left blank
- Page 48:
AbwehrAbdurajak Abubakar Janjalani,
- Page 52:
Advanced Photon Sourceusing just th
- Page 56:
Africa, Modern U.S. Security Policy
- Page 60:
Africa, Modern U.S. Security Policy
- Page 64:
AIBecause Agent Orange herbicide re
- Page 68:
Air Force Intelligence, United Stat
- Page 72:
Air Marshals, United Statesnot to t
- Page 76:
Air Plume and Chemical AnalysisIn M
- Page 80:
Aircraft CarrierA flight deck crew
- Page 84:
Airline SecurityBritish achievement
- Page 88:
Airline Securitypulse induction sta
- Page 92:
Al-Ittihad al-IslamiUnited States.
- Page 96:
Allied Democratic ForcesTaylor, Fra
- Page 100:
Americas, Modern U.S. Security Poli
- Page 104:
Americas, Modern U.S. Security Poli
- Page 108:
Ames Espionage CaseThe CIA and FBI
- Page 112:
Anthrax, Terrorist Use as a Biologi
- Page 116:
Anthrax, Terrorist Use as a Biologi
- Page 120:
Anthrax VaccineA technician works i
- Page 124:
Anthrax WeaponizationMembers of an
- Page 128:
Antiballistic Missile TreatyWith hi
- Page 132:
Anti-Imperialist Territorial Nuclei
- Page 136:
Archeology and Artifacts, Protectio
- Page 140:
Architecture and Structural Securit
- Page 144:
Architecture and Structural Securit
- Page 148:
Argentina, Intelligence and Securit
- Page 152:
Armed Islamic GroupPresident Bush,
- Page 156:
Army Medical Research Institute of
- Page 160:
Assassinationsafety procedures. The
- Page 164:
AssassinationU.S. Special Forces as
- Page 168:
Assassination Weapons, Mechanicalth
- Page 172:
Assassination Weapons, MechanicalSo
- Page 176:
Asymmetric Warfare❚ K. LEE LERNER
- Page 180:
Atmospheric Release Advisory Capabi
- Page 184:
Audio Amplifiersvolts. A low voltag
- Page 188:
Australia, Intelligence and Securit
- Page 192:
Aviation Intelligence, HistoryFrom
- Page 196:
Aviation Intelligence, Historyproje
- Page 200:
Aviation Security Screeners, United
- Page 204:
B-52ELECTRONIC:Air Force Technology
- Page 208:
Bacterial Biologybacteria are damag
- Page 212:
Bacterial Biologygenome. With only
- Page 216:
Ballistic Missile Defense Organizat
- Page 220:
Ballistic MissilesIn 1999, Pakistan
- Page 224:
Ballistic Missilesreentry vehicles
- Page 228:
Balloon Reconnaissance, Historymeta
- Page 232:
Basque Fatherland and LibertyPresid
- Page 236:
Baton Roundsper surface area unit i
- Page 240:
Belgium, Intelligence and Security
- Page 244:
Berlin AirliftBerlin children cheer
- Page 248:
Berlin TunnelSoviet authorities fin
- Page 252:
Berlin WallThe Brandenburg Gate was
- Page 256:
Biochemical Assassination Weaponsan
- Page 260:
Biocontainment LaboratoriesApart fr
- Page 264:
BiodetectorsAmerica. The others are
- Page 268:
Bio-Flipsthree-dimensional tissue c
- Page 272:
Biological Input/Output Systemsin A
- Page 276:
Biological Warfarebiological warfar
- Page 280:
Biological Weapons, Genetic Identif
- Page 284:
BiometricsA Purdue University profe
- Page 288:
Biosensor Technologieseye, are extr
- Page 292:
BioterrorismUniversity of Nebraska
- Page 296:
Bioterrorism, Protective Measurespr
- Page 300:
Black ListIn the seventeenth centur
- Page 304:
Black Tom ExplosionPlanning the att
- Page 308:
Bletchley ParkThe Duke of York, for
- Page 312:
Bomb Damage, Forensic Assessment❚
- Page 316:
BombeDevices known as sniffers dete
- Page 320:
Border Crossing and InspectionJapan
- Page 324:
BotulismPERIODICALS:Byrne, M.P., an
- Page 328:
Brilliant Pebblesdemilitarize the n
- Page 332:
Bubonic Plagueof the Large-Volume R
- Page 336:
Bugs and Bug Detectorstelephones, p
- Page 340:
Bush Administration, United States
- Page 344:
Bush Administration, United States
- Page 348:
Cambridge University Spy RingKim Ph
- Page 352:
Cambridge University Spy RingThough
- Page 356:
Camerasoperator of the camera plays
- Page 360:
Cameras, Miniaturewhen an image is
- Page 364:
Canada, Counter-Terrorism PolicyBer
- Page 368:
Canada, Intelligence and SecurityBr
- Page 372:
Canine Substance DetectionJohn Long
- Page 376:
Carter Adminstration, United States
- Page 380:
Case OfficerMiddle East, Modern U.S
- Page 384:
CERNsuccess of other vaccination ca
- Page 388:
Chain Reaction“hypertexts”(text
- Page 392:
Chemical and Biological Defense Inf
- Page 396:
Chemical and Biological Mass Spectr
- Page 400:
Chemical Safety: Emergency Response
- Page 404:
Chemical WarfareHazardous material
- Page 408:
Chemical Warfareblisters take a lon
- Page 412:
Chemistry: Applications in Espionag
- Page 416:
Chernobyl Nuclear Power Plant Accid
- Page 420:
Chile, Intelligence and Security❚
- Page 424:
Chinese Espionage against the Unite
- Page 428:
Church CommitteeTrulock, Notra. Cod
- Page 432:
CIAPresident Bush, right, and Georg
- Page 436:
CIA, Center for the Study of Intell
- Page 440:
CIA, Foreign Broadcast Information
- Page 444:
CIA, Formation and HistoryAn aerial
- Page 448:
CIA, Legal RestrictionJames Angleto
- Page 452:
Cipher DiskNSC (National Security C
- Page 456:
Cipher MachinesEnigma cipher machin
- Page 460:
Cipher Padstructure or pattern; a p
- Page 464:
Civil War, Espionage and Intelligen
- Page 468:
Civil War, Espionage and Intelligen
- Page 472:
Classified InformationSpeaker of th
- Page 476:
Clinton Administration, United Stat
- Page 480:
Clipper ChipAs Clinton settled into
- Page 484:
Closed-Circuit TelevisionNikolay Vo
- Page 488:
Coast Guard, United StatesMembers o
- Page 492:
Code WordA code name is a particula
- Page 496:
Codes and CiphersA 1968 miniature K
- Page 500:
Codes, Fast and Scalable Scientific
- Page 504:
Cold War, The Start of the Atomic A
- Page 508:
Cold War, The Start of the Atomic A
- Page 512:
Cold WarTraining Center One, a secr
- Page 516:
Cold WarU.S. Army tanks at Checkpoi
- Page 520:
Cold War: The Collapse of the Sovie
- Page 524:
Cold War: The Collapse of the Sovie
- Page 528:
Colossus Iguerilla control. Violenc
- Page 532:
COMINTNaval successes in the 1920s.
- Page 536:
Commerce Department Intelligence an
- Page 540:
Communicable Diseases, Isolation, a
- Page 544:
Communicable Diseases, Isolation, a
- Page 548:
Communications System, United State
- Page 552:
Comprehensive Test Ban Treatynation
- Page 556:
Computer Hackerspassed decisively.
- Page 560:
Computer Keystroke Recordernetworke
- Page 564:
Computer ModelingA steel structure
- Page 568:
Computer Software SecurityComputer
- Page 572:
Computer Virusdesigned to spread th
- Page 576:
Concealment DevicesConcealed weapon
- Page 580:
Continuity Irish Republican ArmyA c
- Page 584:
Continuous Assisted Performanceplan
- Page 588:
Copyright Securityaspects of U.S. c
- Page 592:
Counter-Intelligence1990s, and in 2
- Page 596:
Counter-Terrorism Rewards ProgramPa
- Page 600:
Covert OperationsTwo members of a U
- Page 604:
CPNBKnott, Stephen F. Secret and Sa
- Page 608:
Critical InfrastructureDEA (Drug En
- Page 612:
Croatia, Intelligence and SecurityS
- Page 616:
Cryo3 Detector❚ FURTHER READING:B
- Page 620:
Cryptology, Historypapyrus was wrap
- Page 624:
Cryptology, HistoryA Korean War vet
- Page 628:
CT Scannersnames most often have li
- Page 632:
Cuban Missile CrisisA low-level pho
- Page 636:
Cultural Resource ProtectionCultura
- Page 640:
Cyanide❚ FURTHER READING:PERIODIC
- Page 644:
Cyber Securitythe computer age, man
- Page 648:
Czech Republic, Intelligence and Se
- Page 652:
This page intentionally left blank
- Page 656:
DARPADARPA is specifically charged
- Page 660:
DCIThe Society of Competitive Intel
- Page 664:
DCIdiplomacy, he favored action. Un
- Page 668:
DEAUnited States and its interests
- Page 672:
DEAJust as marijuana and even cocai
- Page 676:
Decontamination MethodsDead-letter
- Page 680:
Decontamination MethodsDuring the f
- Page 684: Defense Information Systems Agency,
- Page 688: Delta ForceBackground investigation
- Page 692: Department of State, United Statess
- Page 696: Department of State, United Statess
- Page 700: DIAVice Admiral Thomas Wilson, righ
- Page 704: Digital WatermarkingTelephone Recor
- Page 708: DisinformationUniversity students p
- Page 712: Disinformationassertions about depl
- Page 716: DNA FingerprintingAn FBI official h
- Page 720: DNA Recognition Instrumentspiece of
- Page 724: DNA Sequences, UniqueHybridization-
- Page 728: DNA Technologyinto the wrong hands
- Page 732: Document Forgeryoperation at the Br
- Page 738: Document Forgerythe Japanese, who w
- Page 742: Document ForgerySDI to ”prevent t
- Page 746: DODDepartment of Defense photo show
- Page 750: DOEStrategic Command controls missi
- Page 754: DOEfourfold purpose: to protect U.S
- Page 758: Domestic Intelligenceleast, the mos
- Page 762: DosimetrySEE ALSOFBI (United States
- Page 766: DropCIA (United States Central Inte
- Page 770: Drug Intelligence EstimatesELECTRON
- Page 774: Dual Use TechnologyUndersea warfare
- Page 778: ❘❘❙❚❚❙❘❘ E ❘❘
- Page 782: E-Bombin England developed Ebola fe
- Page 786:
EchelonEchelon was established at M
- Page 790:
Economic EspionageU.S. military con
- Page 794:
Economic IntelligenceIn National Se
- Page 798:
Eichmann, Adolf: Israeli CaptureGer
- Page 802:
El Salvador, Intelligence and Secur
- Page 806:
Electromagnetic Spectrumbecause the
- Page 810:
Electromagnetic SpectrumPhotovoltai
- Page 814:
Electronic Communication Intercepts
- Page 818:
Electronic Countermeasures(CIA), ot
- Page 822:
Electronic WarfareA U.S. Navy EA-6B
- Page 826:
ElectrophoresisKupperberg, Paul. Sp
- Page 830:
Emergency Response Teamsto the plan
- Page 834:
Encryption of Dataprogram, which mo
- Page 838:
Enduring Freedom, Operation (Nov.16
- Page 842:
Energy Directed WeaponsPersian Gulf
- Page 846:
Energy TechnologiesSEE ALSODARPA (D
- Page 850:
Engraving and Printing, United Stat
- Page 854:
EnigmaKingdom was attempting to joi
- Page 858:
Enigmaletter A on the right-hand (c
- Page 862:
Environmental Measurements Laborato
- Page 866:
Epidemiologyand regulations to cont
- Page 870:
EspionageSuch laboratory techniques
- Page 874:
Espionage and Intelligence, Early H
- Page 878:
Espionage and Intelligence, Early H
- Page 882:
Espionage and Intelligence, Early H
- Page 886:
European Unionproposed to create a
- Page 890:
Explosive Coaldiscussed elsewhere i