Acknowledgements | 第1-5页 |
摘要 | 第5-6页 |
Abstract | 第6-7页 |
Contents | 第7-9页 |
Introduction | 第9-10页 |
Chapter One Historical Development and Main Functions of the CIA | 第10-24页 |
·The Historical Development of the CIA | 第10-18页 |
·From the Central Intelligence Group to the CIA | 第10-12页 |
·The Historical Development and the Covert Actions | 第12-14页 |
·Congressional Investigations and the Trouble Period | 第14-17页 |
·The Revitalization | 第17-18页 |
·The Main Functions of the CIA | 第18-24页 |
·Information Collection | 第19-20页 |
·Information Analysis and Evaluation | 第20-21页 |
·Coordination in the Whole U.S. Intelligence Community | 第21-22页 |
·Covert Action | 第22-24页 |
Chapter Two The CIA and U.S. China Policy during the Cold War | 第24-34页 |
·The CIA and the U.S. China Policy Making | 第24-28页 |
·U.S. Diplomatic Strategy and China Strategy During the Cold War | 第24-25页 |
·The Information Collection and Analysis by the CIA | 第25-27页 |
·The Status of the CIA Director | 第27-28页 |
·Influence at Home and Abroad | 第28页 |
·The CIA and the U.S. China Policy Execution | 第28-32页 |
·Overview of the CIA Covert Action during the Cold War | 第29-32页 |
·Case Analysis——FCM | 第32页 |
·Evaluation on the CIA Covert Action | 第32-34页 |
Chapter Three The Prediction of the CIA's Future and Advice on China Information Security in the Big Data Era | 第34-50页 |
·The Evaluation of the CIA Role and Value | 第34-40页 |
·The Success and Failure of the CIA on U.S. China Policy | 第34-37页 |
·Negative Effects on American Foreign Image | 第37-38页 |
·The Relations between the CIA’s Problem and U.S. Political System | 第38-40页 |
·The Prediction of the CIA's Future | 第40-47页 |
·The Prediction of the CIA’s Future Status in U.S. Intelligence Community | 第40-43页 |
·Application and Transformation of the Cold War Espionage Method in the New Period | 第43-47页 |
·Impact on China National Security and Advice on Information Security | 第47-50页 |
·U.S. IntelligenceAgencies’Deployment for the Strategy of Big Data | 第47页 |
·“Big data” Security Rises to National Security to China | 第47-48页 |
·Advice on Information Security | 第48-50页 |
Conclusion | 第50-52页 |
Bibliography | 第52-57页 |