V11:4-37-44 (Fall 1967) PDF 351.4KB* May, Ernest R, "Studying and Teaching Intelligence", Stud.
James., "The National Intelligence Support Team", Stud.
V11:4-1-12 (Winter 1967) PDF 604.5KB* Report of a 1967 experiment to test the usefulness of Bayes' Theorem (a mathematical model to calculate probabilities) as applied to intelligence analysis.
V6:1-A1-A4 (Winter 1962) PDF 186.2KB* Reprints comments by poker casino online 1500 President Kennedy and Allen Dulles upon presentation of the National Security Medal to Dulles in 1961.James, "Making Intelligence Analysis Responsive to Policy Concerns" Smith,.V3:4-81-86 (Fall 1959) PDF 286KB* The capabilities of terrain intelligence rethought for use in the age of missiles and space warfare.V38:5-17-26 (1995) PDF 764.1KB* US practices for release of classified intelligence materials were more supportive of scholars than UK practices, but the latter are improving.V2:1-65-70 (Winter 1958) PDF 292KB* Tidwell, William., "A New Kind of Air Targeting", Stud.V36:5-80-90 (1992) PDF.3KB* Recounts the successful attack on the Vemork heavy water plant in Norway in 1943, including training and infiltration into Norway of the sabotage team, setbacks, the actual slots free online games egypt bombing, and the escape of the author.V9:1-81-90 (Winter 1965) PDF 451KB* Series of OSS field reports sent to President Roosevelt by General Donovan, including assessment by Allen Dulles in April 1944, poke radar diamond stationed in Switzerland, that according to well-placed sources German diplomatic and governmental morale was collapsing.V7:2-A13-A17 (Spring 1963) PDF 225KB* Kennedy, David and Leslie Brunetta, "Lebanon and the Intelligence Community", Stud.V14:2-13-29 (Fall 1970) PDF 840.9KB* Recounts the events leading to and following the Indonesian Communist Party (PKI) and President Sukarno's attempt to assassinate top army leaders and seize total control."Policy Bias" by Janet Hill Merkle, Stud.V4:1-29-35 (Winter 1960) PDF 332KB* Anatomy of a scientific bag of tricks to conjure up the likeness of an unknown face.V4:3-A1-A13 (Summer 1960) PDF 624KB* Aspects of a classical scouting and resistance-leading unit behind Japanese lines in Burma, from the viewpoint of its commander.
Winter 1998/99:15-50, PDF.9MB* A personal account of the author's selection and training as an ODD Jedburgh radio operator, and a rather detailed account of his activity with French partisans in Brittany behind German lines, June to August 1944.
"The Lohmann Affair" by Anonymous, Stud.
Winter 1999/2000:53-60, PDF 599.8KB* An account, written in 1945, of then lby's successful OSS mission to disrupt German rail traffic in northern Norway in April of that year.Hunt for Axis Agent Radios", Stud."The Intelligence Revolution and the Future" by Wesley.V8:4-93-98 (Fall 1964) PDF 301KB* DI analysts rebut DO claims that they should have been able to warn of Soviet missiles in Cuba from available humint reporting, citing the "cry wolf" factor.Spring 1998:47-69, PDF.9MB* Comprehensive coverage of (1) the evolution of congressional use of intelligence analysis since the establishment of oversight committees in the 1970s, (2) the tensions as well as the benefits for intelligence producers, Congress, and executive policy officials, and (3) recommendations for.Doyle Larson, and Linda Zall, Stud."The Intelligence Community: " by Aris.V20:1-21-38 (Spring 1976) PDF.1MB* The author, a leading authority on CIA origins, corrects and places in broader historical context President Truman's claim that CIA was his "invention citing the key roles of President Franklin Roosevelt and OSS Director William Donovan, as well as Washington.Paumier, Alfred, "Inside Darkest John" (Communication to the Editor), Stud.R., "The Selectively Reluctant Informant", Stud.V10:2-21-27 (Spring 1966) PDF 310.1KB* "The Lie That Linked CIA to the Kennedy Assassination" by Max Holland, Stud.Describes in graphic detail the tradecraft employed in uncovering the clandestine operation, including surveillance techniques, secret writing, and mail tampering.V11:3-1-16 (Summer 1967) PDF 814.8KB* Helms, Richard, "Strategic Arms Limitation and Intelligence", Stud.V48:2-1-11 (2004) PDF.9MB* Describes the Soviet nuclear weapons program through 1970, US efforts to collect intelligence on it, and Soviet efforts to use denial and deception (D D) techniques to frustrate US intelligence collection.
Written in 1971, but timeless in its humorous insights.