Deger, Evren. "Bold Step against Terrorism: Turkey to Launch Spy Satellite." New Anatolian (Ankara), 12 Nov. 2007. [http://www.thenewanatolian.com]
The Turkish Defense Industry Executive Committee meeting on 23 November 2007 "is expected to give the go ahead" for the Gokturk spy satellite project. The first satellite is expected to be launched in 2008. It "will contribute to the military needs of information gathering and will be the first ever spy satellite to be launched by Turkey.... Research and Development work have already been started" on additional satellite systems, including a radar satellite. "Turkey plans to put about 15 satellites into orbit in the coming two to two and a half years."
De Graaf, Beatrice.
1. "Détente from Below: The Stasi and the Dutch Peace Movement." Journal of Intelligence History 3, no. 2 (Winter 2003). [http://www.intelligence-history.org/jih/ previous.html]
From abstract: "During a period when the Cold War returned to icy conditions (1979-1983) the East German Politburo and the Stasi unleashed a campaign to influence Dutch public opinion against the impending deployment of new NATO missiles.... East German communists used the openings of détente and funded the Dutch peace movement. However successful the East German campaign was in the beginning, they experienced a heavy setback."
2. "Stasi Operations in the Netherlands, 1979-89." Studies in Intelligence 52, no. 1 (Extracts - Mar. 2008): 1-12.
This article investigates "what the MfS was after in and against the Netherlands and to what extent these operations were affected by its thinking about the enemy."
De Graaff, Bob.
deGraffenreid, Kenneth E.
1. "Hostile Intelligence Activities: Can We Counter Them?" National Security Law Report 12, no. 1 (1990): 1-3.
2. A National Counterintelligence and Security Assessment Center. Washington, DC: National Strategy Information Center, 1990.
The author proposes that counterintelligence be centralized in the interest of countering the threat from hostile (and nonhostile) intelligence services.
3. "Tighter Security Needed to Protect U.S. Intelligence." Signal 45, no. 1 (1990): 101-104. [Petersen]
deGraffenreid, Kenneth E., ed. The Cox Report: The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China. Washington, DC: Regnery, 1999.
deGraffenreid, Kenneth E., ed. Report on a Conference of Security, Counterintelligence, and Strategic Experts on Counterintelligence and Security Requirements for National Security. Washington, DC: National Strategy Information Center, 1989.
De Gramont, Sanche. "Rudolf Abel." In Cry Spy, ed. Burke Williamson. Scarsdale, NY: Bradbury, 1969. [Petersen]
De Gramont, Sanche. The Secret War: The Story of International Espionage Since World War II. New York: Putnam, 1962.
Pforzheimer: This book surveys the activities of CIA and foreign intelligence organizations in the 1950s. It is "considered worth reading," particularly for its case studies.
Degras, Jane. The Communist International: Selected Documents, 1919-1929. 2 vols. London: Oxford University Press, 1960.
DeGross, Robert. "Joint Military Intelligence Training: The DIA Role." Defense Intelligence Journal 2, no. 2 (Fall 1993): 135-142.
Deibert, Ronald J. "From Deep Black to Green? Demystifying the Military Monitoring of the Environment." Environmental Change and Security Report 2 (Spring 1996): 28-32.
The value of this article is diminished by what is either an extremely naive or overtly hostile attitude toward the military and the intelligence community. References to "some of the more notorious episodes of deceit involving the NRO" and to "the secretive and duplicitous culture of the NRO and its associated intelligence agencies" do little to further the discussion and, in fact, betray a lack of understanding of the role and functions of the NRO.
Deibert, Ronald J. "Deep Probe: The Evolution of Network Intelligence." Intelligence and National Security 18, no. 4 (Winter 2003): 155-174.
The focus here is on "a different type of intelligence practice that is emerging not among states but among non-state actors and in particular among citizens groups with computer networking capabilities.... There are a variety of good reasons to monitor" this type of transnational activity.
Deighton, Anne, ed. Rebuilding Postwar Europe: National Decision-Makers and European Institutions. London: Macmillan, 1995.
Hopkins, I&NS 12.3, identifies the aim of this collection as establishing "the nature of the respective contributions of politicians and their civil servants in the main West European countries on the question of closer European co-operation." The volume concludes by considering an "American Intelligence Connection." The discussion "provides some compelling insights on the American Committee on United Europe (ACUE), a little studied organization that promoted the cause of European integration with, it appears, the assistance of the CIA" during the years from 1949 to 1960.
Deindorfer, Robert G., ed. The Spies: Great True Stories of Espionage. New York: Fawcett, 1949. New York: Fawcett, 1969. [pb]
This is a "popular," anecdotally presented string of spy stories.
Deitchman, Seymour J. "The 'Electronic Battlefield' in the Vietnam War." Journal of Military History 72, no. 3 (Jul. 2008): 869-887
From abstract: "By mid-1966 the North Vietnamese army had built an elaborate system of truck roads and personnel trails through Laos.... Interdicting movement on that system was a high priority for U.S. forces.... [T]he Jason group of scientists proposed a networked system of sensors and aircraft for the purpose. That system, although not totally successful, significantly affected the course of the war and presaged key aspects of the equipment and operation of America's armed forces today."
de Jong, Ben. "The KGB in Eastern Europe during the Cold War: On Agents and Confidential Contacts." Journal of Intelligence History 5, no. 1 (Summer 2005). [http://www.intelligence-history.org/jih/journal.html]
From abstract: The article looks at "whether Soviet intelligence ... recruited full-fledged agents ... as they did in the West." It "concentrates on Poland but also tries to grasp the bigger picture and focuses on the distinction between fully-fledged agents and so-called 'confidential contacts'. Records from the KGB archives on this topic are completely absent," but the author tries to get at "this interesting question with the help of the writings of several former KGB officers and other materials."
de Jong, Ben, Wies Platje, and Robert David Steele, eds. Peacekeeping Intelligence: Emerging Concepts for the Future. Oakton, VA: OSS International Press, 2003.
A. Walter Dorn, "Intelligence at UN Headquarters? The Information and Research Unit and the Intervention in Eastern Zaire 1996," Intelligence and National Security 20, no. 3 (Sep. 2005): 462/fn. 4, refers to this work as a "compilation of papers on peacekeeping intelligence, including 'seminal past publications' (starting from 1994)."
Dekel, Ephriam [pseud. for Ephriam Krassner]. Shai: The Exploits of Hagana Intelligence. New York: Yoseloff, 1959.
Constantinides: Shai was founded in 1921 as the intelligence and security arm of the Hagana. The author headed the organization at one point. The focus of the work is on the organization's successes.
Return to D Table of Contents
Return to Alphabetical Table of Contents