Skip to Main Content
NAU Online Library
LibGuides
Henley-Putnam School of Strategic Security
Henley-Putnam's Intelligence Management Subject Guide
Counterintelligence
Search this Guide
Search
Henley-Putnam's Intelligence Management Subject Guide
This Subject Guide will help students locate the fundamental documents that grant and govern the intelligence activities of the United States Intelligence Community (USIC).
Welcome to Henley-Putnam School of Strategic Security
What is Intelligence?
Intelligence-Related Resources
Toggle Dropdown
United States Intelligence Community (USIC)
Journals Relevant to Strategic Security
Intelligence-Related Statutes (Laws)
Intelligence-Related Executive Orders (EO) & Other Policy Directives (PD)
Intelligence Community Directives (ICD) & Policy Guidance and National Intelligence Council (NIC) and Office Director National Intelligence (ODNI) Products
Seminal Documents
Government Resources Relevant to H-PSSS
Dictionaries and Encyclopedias
Intelligence-Related E-books
Datasets
Geospatial Apps
Historical Maps
Maps and Satellite Images
Remote Sensing
Mapping Militancy
Other Intelligence Management Web Resources
Primary and Secondary Sources Tutorial
Intelligence Oversight
Professionalization of the Discipline
Intelligence Theories
Covert Operations
Toggle Dropdown
Case Studies in Covert Action
Covert Operations Oversight
Plausible Deniability
Soviet Active Measures
Cover
OPSEC
Toggle Dropdown
Intellectual Property, Technology, and Operational Security
Information Risk Assessment
OPSEC Plan
Analysis
Counterintelligence
Counterintelligence
Offensive Counterintelligence
Double Agents
Case Studies
Open Source
Collection
Propaganda and Misinformation
History of Intelligence
Writing for the Intelligence Professional
Toggle Dropdown
Using Other People's Information: Avoiding Plagiarism
Legal Materials
Target Packets for Military Intelligence
Interrogation
Denial and Deception Operations
Counterintelligence
Introduction to Counterintelligence
[Author’s Name Censored](1995). Concerning espionage and social courtesy. [CIA Historical review document no.10(3)].
Steinmeyer, W. (1995). Installation penetration [CIA Historical review document no. 6(3)].
(anonymous) (1995) The Practice of a prophet [CIA Historical review document no.2(4)].
Title 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 37 - ESPIONAGE AND CENSORSHIP
Cates C. V. (Released 1993). Counterintelligence for national security
Originally printed in CIA Center for the Study of Intelligence's Studies in Intelligence Vol 2, No. 4
Matschulat, A. B. (Released 1994). Coordination and cooperation in counterintelligence [CIA Historical review document no.13(2)].
Originally printed in CIA Center for the Study of Intelligence's Studies in Intelligence Vol 13, no. 2
Wasemiller, A. C. (Released 1994) The anatomy of counterintelligence, [CIA Historical review document no.13(1)].
Originally CIA Center for the Study of Intelligence's Studies in Intelligence Vol 13, No 1.
Olson, J. M. (2001). The ten commandments of counterintelligence: A never ending necessity. Studies of Intelligence. Winter.
Originally CIA Center for the Study of Intelligence's Studies in Intelligence Winter 2001.
U.S. Espionage Statutes, U.S. Code, Ch 18, Title 37
Distinction and Definitions
Van Cleave, M. K. (2013). What is Counterintelligence. The Intelligencer. 20(2)
Espionage
International Spy Museum. (2021). The Language of Espionage.
Office of Counterintelligence Defense and HUMINT Center, DIA. (2011). The Counterintelligence Glossary
<<
Previous:
Analysis
Next:
Offensive Counterintelligence >>
Global site tag: