Wil - Wilf

Wilber, Del Quentin. "Former U.S. official, Wife Admit to 30 Years of Spying for Cuba." Washington Post, 21 Nov. 2009. [http://www.washingtonpost.com]

Former State Department official Walter K. Myers and his wife, Gwendolyn Steingraber Myers, "admitted in federal court [on 20 November 2009] that they spied for Cuba over the past three decades." Myers "pleaded guilty to conspiring to commit espionage and wire fraud," and "faces a mandatory sentence of life in prison." His wife "pleaded guilty to conspiring to gather and transmit national defense information," and faces a sentence of 6 to 7 1/2 years. "Under the plea deal, the couple agreed to forfeit $1.7 million, the total of Myers's salary over the years, in cash and property to the U.S. government."


Wilber, Del Quentin. "Maryland Scientist Is Charged with Spying for Israel." Washington Post, 19 Oct. 2009. [http://www.washingtonpost.com]

According to federal prosecutors, Stewart D. Nozette was charged on 19 October 2009 "with trying to sell top-secret information to Israel for $11,000.... Authorities said the charges stemmed [from] an undercover sting operation in which an FBI agent posed as an Israeli spy.... Nozette worked for the Energy Department's Lawrence Livermore National Laboratory from 1990 through 1999" and "was president of the Alliance for Competitive Technology, a nonprofit group he founded in 1990. He has held security clearances as high as top secret and had regular access to classified information as recently as 2006." Prosecutors and FBI officials said that Nozette gave the FBI agent "classified information about the country's satellites, early-warning systems and its ability to retaliate against a large-scale attack."

Associated Press,"US Scientist Indicted for Trying to Provide Israel with Classified Information," 22 Oct. 2009, reports the grand jury indictment of Nozette. Steven Aftergood, "Scientist Stewart Nozette Pleads Guilty to Attempted Espionage," Secrecy News, 8 Sep. 2011, reports that Nozette "pleaded guilty [on 7 September 2011] to attempted espionage for providing classified information to an undercover FBI agent posing as an Israeli intelligence officer."


Wilber, Donald N. Adventures in the Middle East: Excursions and Incursions. Princeton, NJ: Darwin, 1986.

Haglund, I&NS 4.3, notes Wilber's claim to have both developed the concept for Operation Ajax and played a major role in making that plan operational. Nevertheless, there is "not ... much new information about US intelligence operations in the Middle East, either during the 1950s or during the war, when Wilber was an OSS agent in Iran."

[CA/ME; CIA/Memoirs; CIA/50s/Iran; WWII/OSS/Ops/Other]

Wilber, Donald. Clandestine Service History: Overthrow of Premier Mossadeq of Iran, November 1952-August 1953. Washington, DC: Central Intelligence Agency, Mar. 1954. [Available at: http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html and http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/index.html]

Acoording to a "Historian's Note," dated March 1969, this paper was written by Dr. Donald N. Wilber in March 1954. Wilber "played an active role in the operation." The document as it appears on both sites identified above is the text as published by the New York Times, "after removing certain names and identifying descriptions" to protect "the families of some of those named as foreign agents." "Editor' Note," dated 18 June 2000.


Wilcox, Fulton. "Intelligence Reform: Winning the 'For Keeps' Game." American Intelligence Journal 25, no. 1 (Summer 2007): 51-62.

"Absent effective information-sharing processes, almost any new organizational construct looks suspiciously like another bureaucratic stovepipe.... [E]ngaging the efforts of frontline people may be the most important" step in preventing terrorism, because "the essential prerequisite ... is to have presence 'everywhere.' Narrowly designed organizations cannot supply that presence."


Wilcox, Jennifer. The Secret of Adam and Eve. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History, 2003. [http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/secret_adam_eve.shtml]

"In May 1943, Adam and Eve only resembled what their descendents would become: huge gray machines standing seven feet high, ten feet long, and two feet wide. But Adam and Eve were merely components, motors, and wire spread across workhorses and mounted in cabinets in Building 26 of the National Cash Register Company in Dayton, Ohio. Like the machines they preceded, they held nearly 400 vacuum tubes, 64 individually wired bakelite rotors, and innumerable feet of wire. They were the first of their kind, the U.S. Navy‘s Cryptanalytic Bombes." [Italics in original]


Wilcox, Jennifer. Solving the Enigma: History of the Cryptanalytic Bombe. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History, 2001. [http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/solving_enigma.pdf]

Rejewski, Bertrand, Turing, Welchman, Desch, Bombes, WAVES -- all are mentioned here. The emphasis, however, is the work done in Dayton and at Arlington Hall.


Wilcox, Jennifer. Sharing the Burden: Women in Cryptology during WWII. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History, 1998. [http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/sharing_the_burden.pdf]

"Only those women meeting higher qualifications were admitted into cryptologic work. Women in the Army had to meet officer qualifications, as well as have strong mathematics or language skills. The Navy competed with the Army for women with similar qualifications and offered officer status for cryptographers.[footnote omitted] However, both services placed a higher value on a woman's integrity than on her skills. A woman with the right qualifications, but not trained in cryptography, could learn the skills."

[Women/WWII/U.S.; WWII/Magic/Gen]

Wilcox, Laird M., comp.

1. Bibliography on Espionage and Intelligence Operations. Kansas City, MO: Editorial Research Service, 1988, 1989.

Peake, Reader's Guide, notes that this bibliography includes "more than 3,000 book titles, many on assassination and terrorism.... The annotations ... are very brief and do not always convey the full scope of the content.... Titles ... are organized alphabetically by author but are not separated by major topic."

2. Master Bibliography: Political Psychology, Propaganda, Espionage, Intelligence Operations, Terrorism, and Assassination. Kansas City, MO: Laird Wilcox, 1980.

3. Terrorism, Assassination, Espionage and Propaganda: A Master Bibliography. Olathe, KS: Laird Wilcox, 1988.

Clark comment: This is a spiral bound, 8.5 X 11 format, privately published bibliography. It has over 3,000 titles arranged alphabetically by author. There are brief (and not always accurate), descriptive annotations for most of the items listed, the usefulness of which is not aided by too many "etc.s" at the end of entries.


Wild, Max. Secret Service on the Russian Front. New York: Putnam, 1932. [Chambers]


Wilder, Dennis C. "An Educated Consumer Is Our Best Customer." Studies in Intelligence 55, no. 2 (Jun. 2011): 23-31. [https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-55-no.-2/an-educated-consumer-is-our-best-customer.html]

The author seeks to provide "a series of recommendations for the ODNI on redesigning the policy-intelligence interface and implementing a strategic communications strategy that leverages new social media so that the American people and the policy community will better understand and appreciate the centrality of the Intelligence Community to national security."


Wilder, Ursula M. "Counterterrorism Professionals Reflect on Their Work." Studies in Intelligence 58, no. 4 (Dec. 2014): 2-17. [https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol-58-no-4/counterterrorism-professionals-reflect-on-their-work.html]

"This article is about the psychology of those who work to counter terrorism. It describes the complex responses to their work of people who labor across the range of counterterrorism (CT) vocations.... The 57 counterterrorism professionals interviewed for this article came from many different CT fields, in both the public and private sectors." The study identifies "general positives and negatives," and divides the counterterrorism profession into "three domains of activity: leadership and policy, field professionals, and knowledge workers/analysts."


Wilensky, Harold. Organizational Intelligence: Knowledge and Policy in Government and Industry. New York: Basic Books, 1960.

Wilcox: "Study of intelligence functions, use & misuse."


Wiley, Bell I. "Women of the Lost Cause." American History Illustrated 8, no. 8 (1973): 10-23.


Wiley, Richard G. Electronic Intelligence: The Analysis of Radar Signals. 2d ed. Norwood, MA: Artech House, 1993. [Surveillant 3.4/5]

[GenPostwar/Issues/S&T; NSA/Sigint]

Wilford, Hugh.

Wilford, Timothy.

Return to W Table of Contents

Return to Alphabetical Table of Contents