| Acknowledgements | 第1-5页 |
| 摘要 | 第5-6页 |
| Abstract | 第6-7页 |
| Contents | 第7-9页 |
| Introduction | 第9-10页 |
| Chapter One Historical Development and Main Functions of the CIA | 第10-24页 |
| ·The Historical Development of the CIA | 第10-18页 |
| ·From the Central Intelligence Group to the CIA | 第10-12页 |
| ·The Historical Development and the Covert Actions | 第12-14页 |
| ·Congressional Investigations and the Trouble Period | 第14-17页 |
| ·The Revitalization | 第17-18页 |
| ·The Main Functions of the CIA | 第18-24页 |
| ·Information Collection | 第19-20页 |
| ·Information Analysis and Evaluation | 第20-21页 |
| ·Coordination in the Whole U.S. Intelligence Community | 第21-22页 |
| ·Covert Action | 第22-24页 |
| Chapter Two The CIA and U.S. China Policy during the Cold War | 第24-34页 |
| ·The CIA and the U.S. China Policy Making | 第24-28页 |
| ·U.S. Diplomatic Strategy and China Strategy During the Cold War | 第24-25页 |
| ·The Information Collection and Analysis by the CIA | 第25-27页 |
| ·The Status of the CIA Director | 第27-28页 |
| ·Influence at Home and Abroad | 第28页 |
| ·The CIA and the U.S. China Policy Execution | 第28-32页 |
| ·Overview of the CIA Covert Action during the Cold War | 第29-32页 |
| ·Case Analysis——FCM | 第32页 |
| ·Evaluation on the CIA Covert Action | 第32-34页 |
| Chapter Three The Prediction of the CIA's Future and Advice on China Information Security in the Big Data Era | 第34-50页 |
| ·The Evaluation of the CIA Role and Value | 第34-40页 |
| ·The Success and Failure of the CIA on U.S. China Policy | 第34-37页 |
| ·Negative Effects on American Foreign Image | 第37-38页 |
| ·The Relations between the CIA’s Problem and U.S. Political System | 第38-40页 |
| ·The Prediction of the CIA's Future | 第40-47页 |
| ·The Prediction of the CIA’s Future Status in U.S. Intelligence Community | 第40-43页 |
| ·Application and Transformation of the Cold War Espionage Method in the New Period | 第43-47页 |
| ·Impact on China National Security and Advice on Information Security | 第47-50页 |
| ·U.S. IntelligenceAgencies’Deployment for the Strategy of Big Data | 第47页 |
| ·“Big data” Security Rises to National Security to China | 第47-48页 |
| ·Advice on Information Security | 第48-50页 |
| Conclusion | 第50-52页 |
| Bibliography | 第52-57页 |