Size | Seeds | Peers | Completed |
---|---|---|---|
13.36 MiB | 0 | 0 | 0 |
VII Encyclopedia of Espionage, Intelligence, and Security
In composing The Encyclopedia of Espionage, Intelligence,
and Security (EEIS), our goal was to shape a modern
encyclopedia offering immediate value to our intended
readers by emphasizing matters of espionage, intelligence,
and security most frequently in the news.
EEIS is not intended as a classical “spy book,” filled
with tales of daring operations. Instead, within a frame-
work of historical overviews, EEIS emphasizes the scien-
tific foundations, applications of technology, and organi-
zational structure of modern espionage, intelligence, and
security. High school and early undergraduate students
can use this book to expand upon their developing aware-
ness of the fundamentals of science, mathematics, and
government as they begin the serious study of contempo-
rary issues.
EEIS is also intended to serve more advanced readers
as a valuable quick reference and as a foundation for
advanced study of current events.
EEIS devotes an extensive number of articles to agen-
cies and strategies involved in emerging concepts of home-
land security in the United States. Faced with a daunting
amount of information provided by agencies, organiza-
tions, and institutes seeking to put their best foot forward,
we have attempted to allocate space to the topics compris-
ing EEIS based upon their relevance to some unique facet
of espionage, intelligence, or security—especially with
regard to science and technology issues—as opposed to
awarding space related to power of the agency or availa-
bility of material.
A fundamental understanding of science allows citi-
zens to discern hype and disregard hysteria, especially
with regard to privacy issues. Spy satellites powerful
enough to read the details of license plates do so at peril of
missing events a few steps away. With regard to elec-
tronic intercepts, the capability to identify what to care-
fully examine—often a decision driven by mathematical
analysis—has become as essential as the capacity to gather
the intelligence itself. Somewhere between the scrutiny of
Big Brother and the deliberately blind eye lie the shadows
into which terrorists often slip.
With an emphasis on the realistic possibilities and
limitations of science, we hope that EEIS finds a useful and
unique place on the reference shelf.
It seems inevitable that within the first half of the
twenty-first century, biological weapons may eclipse nu-
clear and chemical weapons in terms of potential threats
to civilization. Because informed and reasoned public
policy debates on issues of biological warfare and
bioterrorism can only take place when there is a funda-
mental understanding of the science underpinning com-
peting arguments, EEIS places special emphasis on the
multifaceted influence and applications of the biological
sciences and emerging biometric technologies. Future
generations of effective intelligence and law enforcement
officers seeking to thwart the threats posed by tyrants,
terrorists, and the technologies of mass destruction might
be required to be as knowledgeable in the terminology of
epidemiology as they are with the tradecraft of espionage.
Knowledge is power. In a time where news can over-
whelm and in fact, too easily mingle with opinion, it is our
hope that EEIS will provide readers with greater insight to
measure vulnerability and risks, and correspondingly, an
increased ability to make informed judgments concerning
the potential benefits and costs of espionage, intelligence,
and security matters.
K. LEE LERNER & BRENDA WILMOTH LERNER, EDITORS
CORNWALL, U.K.
MAY, 2003
How to Use the Book
The Encyclopedia of Espionage, Intelligence, and Secu-
rity was not intended to contain a compendium of weap-
ons systems. Although EEIS carries brief overviews of
specifically selected systems commonly used in modern
intelligence operations, readers interested in detailed in-
formation regarding weapons systems are recommended
to Jane’s Strategic Weapon Systems, or Jane’s Defense
Equipment Library.
Although EEIS contains overview of significant his-
torical periods and events, for those readers interested in
additional information regarding the history of espionage
operations and biographies of intelligence personnel, the
editors recommend Jeffrey T. Richelson’s A Century of
Spies : Intelligence in the Twentieth Century (Oxford Uni-
versity Press, 1995), Vincent Buranelli and Nan Buranelli’s
Spy/Counterspy: An Encyclopedia of Espionage (New York:
McGraw-Hill, 1982), and Allen Dulles’, The Craft of Intelli-
gence (New York: Harper & Row, 1963).
The articles in EEIS are meant to be understandable
by anyone with a curiosity about topics in espionage,
intelligence, and security matters, and this first edition of
the book has been designed with ready reference in mind:
Entries are arranged alphabetically. In an effort to
facilitate easy use of this encyclopedia, and to at-
tempt order in a chaotic universe of names and acro-
nyms the editors have adopted a “common use”
approach. Where an agency, organization, or pro-
gram is known best by its acronym, the entry related
to that organization will be listed by the acronym (e.g.
FEMA is used instead of Federal Emergency Manage-
ment Agency). To facilitate use, the editors have
included a number of “jumps” or cross-referenced
titles that will guide readers to desired entries.
To avoid a log jam of terms starting with “Federal”
and “United States,” titles were broken to most accu-
rately reflect the content emphasized or subject of
agency authority.
“See Also” references at the end of entries alert the
readers to related entries not specifically mentioned
in the body of the text that may provide additional or
interesting resource material.
An extensive Glossary of terms and acronyms is
included to help the reader navigate the technical
information found in EEIS.
The Chronology includes significant events related to
the content of the encyclopedia. Often accompanied
by brief explanations, the most current entries date
represent events that occurred just as EEIS went
to press.
A Sources section lists the most worthwhile print
material and web sites we encountered in the compi-
lation of this volume. It is there for the inspired reader
who wants more information on the people and dis-
coveries covered in this volume.
A comprehensive general Index guides the reader to
topics and persons mentioned in the book. Bolded
page references refer the reader to the term’s full entry.
molecules—where necessary for complete under-
standing, sufficient information regarding scientific
terms is provided.
To the greatest extent possible we have attempted to
use Arabic names instead of their Latinized versions.
Where required for clarity we have included Latinized
names in parentheses after the Arabic version. Alas,
we could not retain some diacritical marks (e.g. bars
over vowels, dots under consonants). Because there
is no generally accepted rule or consensus regarding
the format of translated Arabic names, we have
adopted the straightforward, and we hope sensitive,
policy of using names as they are used or cited in
their region of origin.
EEIS relies on open source material and no classified
or potentially dangerous information is included. Arti-
cles have been specifically edited to remove potential
“how to” information. All articles have been pre-
pared and reviewed by experts who were tasked with
ensuring accuracy, appropriateness, and accessibil-
ity of language.
With regard to entries regarding terrorist organiza-
tions, EEIS faced a serious dilemma. For obvious
reasons, it was difficult to obtain balanced, impartial,
and independently verifiable information regarding
these organizations, nor could EEIS swell to incorpo-
rate lengthy scholarly analysis and counter-analysis
of these organizations without losing focus on sci-
ence and technology issues. As a compromise in-
tended to serve students and readers seeking initial
reference materials related to organizations often in
the news, EEIS incorporates a series of supplemental
articles to convey the information contained in the
U.S. Department of State annual report to Congress
titled, Patterns of Global Terrorism, 2001. These arti-
cles contain the language, assertions of fact, and
views of the U.S. Department of State. Readers are
encouraged to seek additional information from cur-
rent U.S. Department of State resources and inde-
pendent non-governmental scholarly publications that
deal with the myriad of issues surrounding the nature
and activities of alleged terrorist organizations. A
number of governmental and non-governmental publi-
cations that deal with these issues are cited in the
bibliographic sources section located near the index.
Key EEIS articles are signed by their authors. Brief
entries were compiled by experienced researchers and
reviewed by experts. In the spirit of numerous indepen-
dent scientific watchdog groups, during the preparation of
EEIS no contributors held a declared affiliation with any
intelligence or security organization. This editorial policy
not only allowed a positive vetting of contributors, but
also assured an independence of perspective and an em-
phasis on the fundamentals of science as opposed to
unconfirmable “insider” information.
The editors and authors have attempted to explain
scientific concepts clearly and simply, without sacri-
ficing fundamental accuracy. Accordingly, an ad-
vanced understanding of physics, chemistry, or bio-
chemistry is not assumed or required. Students and
other readers should not, for example, be intimidated
or deterred by the complex names of biochemical
When the only verifiable or attributable source of
information for an entry comes from documents or infor-
mation provided by a governmental organization (e.g., the
U.S. Department of State), the editors endeavored to
carefully note when the language used and perspective
offered was that of the governmental organization.