Agrell, W. (no date) ‘When everything is intelligence - nothing is intelligence’. Central Intelligence Agency. Available at: https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm.
Aid, M.M. (2003) ‘All Glory is Fleeting: Sigint and the Fight Against International Terrorism’, Intelligence and National Security, 18(4), pp. 72–120. Available at: https://doi.org/10.1080/02684520310001688880.
Aldrich, R.J. (2002) ‘Dangerous Liaisons.’, Harvard International Review, 24(Issue 3). Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049.
Aldrich, R.J. (2009a) ‘Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem’, Intelligence and National Security, 24(1), pp. 26–56. Available at: https://doi.org/10.1080/02684520902756812.
Aldrich, R.J. (2009b) ‘US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion’, The British Journal of Politics and International Relations, 11(1), pp. 122–139. Available at: https://doi.org/10.1111/j.1467-856x.2008.00353.x.
Aldrich, R.J. (2010) GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press.
Allison, G.T. (1969) ‘Conceptual Models and the Cuban Missile Crisis’, American Political Science Review, 63(03), pp. 689–718. Available at: https://doi.org/10.2307/1954423.
Allison, G.T. and Zelikow, P. (1999) Essence of decision: explaining the Cuban Missile Crisis. 2nd ed. New York: Longman.
Alvarez, D. (ed.) (1999) ‘Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II’, 14(1). Available at: https://www.tandfonline.com/toc/fint20/14/1?nav=tocList.
Alvarez, D. (2000) ‘American signals intelligence and the Cuban missile crisis’, Intelligence and National Security, 15(1), pp. 169–176. Available at: https://doi.org/10.1080/02684520008432591.
Anderson, D. (2015) ‘A question of trust: report of the investigatory powers review - GOV.UK’. London. Available at: https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009a) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009b) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009c) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009d) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009e) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009f) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009g) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009h) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009i) ‘Secret intelligence: a reader’, in Secret intelligence: a reader. London: Routledge, pp. 395–410. Available at: https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009j) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009k) Secret intelligence: a reader. London: Routledge.
Andrew, C.M. and Gordievsky, O. (1990a) ‘KGB: the inside story of its foreign operations from Lenin to Gorbachev’, in KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton, pp. 1–18. Available at: https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099.
Andrew, C.M. and Gordievsky, O. (1990b) KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton.
Baldino, D. (2010) Democratic oversight of intelligence services. Annandale, NSW: Federation Press.
Bamford, J. (2001) Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century.
Bar-Joseph, U. (2011) ‘The Professional Ethics of Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, 24(1), pp. 22–43. Available at: https://doi.org/10.1080/08850607.2011.519222.
bellingcat - MH17 - The Open Source Evidence - bellingcat (no date). Available at: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
Bellows, R.I. (no date) Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation. Available at: https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report.
Benjamin, V.O. (2007) ‘Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights’, European Human Rights Law Review [Preprint]. Available at: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16.
Berkowitz, B. (2011) ‘The National Reconnaissance Office at 50 Years: A Brief History’. Washington DC: National Reconnaissance Office. Available at: https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf.
Berkowitz, B.D. and Goodman, A.E. (1989a) Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press.
Berkowitz, B.D. and Goodman, A.E. (1989b) Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press.
Berkowitz, B.D. and Goodman, A.E. (2000) ‘Best truth: intelligence in the information age’, in Best truth: intelligence in the information age. New Haven: Yale University Press, pp. 58–98. Available at: https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099.
Bettina Renz (2006) ‘Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics’, Europe-Asia Studies, 58(6). Available at: https://doi.org/10.1080/0966813060031134.
Blau, P.M. (1963) The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: University of Chicago Press.
Born, H., Leigh, I., and Geneva Centre for the Democratic Control of Armed Forces (no date) Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
Bradley, A.W. and Ewing, K.D. (2011a) ‘Constitutional and administrative law’, in Constitutional and administrative law. 15th ed. Harlow: Pearson Longman, pp. 481–486. Available at: https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099.
Bradley, A.W. and Ewing, K.D. (2011b) ‘Constitutional and administrative law’, in Constitutional and administrative law. 15th ed. Harlow: Pearson Longman, pp. 553–562. Available at: https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099.
Brook-Shepherd, G. (1988) The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson.
Brugioni, D.A. (1AD) ‘The art and science of photoreconnaissance.’, Scientific American, (3), pp. 78–85. Available at: https://doi.org/10.1038/scientificamerican0396-78.
Burns, T. and Stalker, G.M. (1994) The management of innovation. Rev. ed. Oxford: Oxford University Press.
Butler of Brockwell, F.E.R.B., Great Britain. Privy Council, and Great Britain. Parliament. House of Commons (2004) Review of intelligence on weapons of mass destruction. London: The Stationery Office. Available at: https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf.
Champion, B. (1998) ‘A review of selected cases of industrial espionage and economic spying, 1568–1945’, Intelligence and National Security, 13(2), pp. 123–143. Available at: https://doi.org/10.1080/02684529808432480.
Chapman, B. (1971) ‘Police state’, in Police state. London: Macmillan, pp. 106–115. Available at: https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099.
Clark, R.M. (2016) Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: CQ Press.
Clayton, A. (1982) The enemy is listening. New York: Ballantine.
CLOUGH, C. (2004) ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 601–613. Available at: https://doi.org/10.1080/08850600490446736.
Cohen, M.D., March, J.G. and Olsen, J.P. (1972) ‘A Garbage Can Model of Organizational Choice’, Administrative Science Quarterly, 17(1). Available at: https://doi.org/10.2307/2392088.
Cradock, P. (2002a) ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray, pp. 290–303. Available at: https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099.
Cradock, P. (2002b) ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray, pp. 281–289. Available at: https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099.
Cringely, R.X. (1992) Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking.
Crosston, M. (2016) ‘Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China’, International Journal of Intelligence and CounterIntelligence, 29(1), pp. 110–131. Available at: https://doi.org/10.1080/08850607.2015.1083337.
Cyert, R.M. and March, J.G. (1992) A behavioral theory of the firm. 2nd ed. Cambridge, Mass: Blackwell.
Dandeker, C. (1990) Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity.
Daugherty, W.J. (2006) Executive secrets: covert action and the presidency. Pbk ed. Lexington: The University Press of Kentucky. Available at: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194.
David, J.E. (2017) ‘How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory’, Intelligence and National Security, 32(6), pp. 768–781. Available at: https://doi.org/10.1080/02684527.2017.1294372.
Davies, P.H.J. (1999) ‘INFORMATION WARFARE AND THE FUTURE OF THE SPY’, Information, Communication & Society, 2(2), pp. 115–133. Available at: https://doi.org/10.1080/136911899359664.
Davies, P.H.J. (2000) ‘From special operations to special political action: The “rump SOE” and SIS post‐war covert action capability 1945–1977’, Intelligence and National Security, 15(3), pp. 55–76. Available at: https://doi.org/10.1080/02684520008432617.
Davies, P.H.J. (2002) ‘Ideas of Intelligence.’, Harvard International Review, 24(Issue 3). Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. (2003a) MI6 and the machinery of spying. London: Frank Cass. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site.
Davies, P.H.J. (2003b) MI6 and the machinery of spying. London: Frank Cass. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site.
Davies, P.H.J. (2004) ‘Intelligence culture and intelligence failure in Britain and the United States’, Cambridge Review of International Affairs, 17(3), pp. 495–520. Available at: https://doi.org/10.1080/0955757042000298188.
Davies, P.H.J. (2009) ‘Imagery in the UK: Britain’s troubled imagery intelligence architecture’, Review of International Studies, 35(04). Available at: https://doi.org/10.1017/S0260210509990386.
Davies, P.H.J. (2010a) ‘Intelligence and the Machinery of Government’, Public Policy and Administration, 25(1), pp. 29–46. Available at: https://doi.org/10.1177/0952076709347073.
Davies, P.H.J. (2010b) ‘The Missing Dimension’s Missing Dimension’, Public Policy and Administration, 25(1), pp. 5–9. Available at: https://doi.org/10.1177/0952076709347071.
Davies, P.H.J. (2012a) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012b) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012c) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012d) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012e) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012f) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012g) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012h) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012i) Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012j) Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (no date) ‘A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm.
Davies, P.H.J. and Gustafson, K. (2013a) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013b) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013c) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013d) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013e) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013f) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2017a) ‘Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise’, Intelligence and National Security, pp. 1–15. Available at: https://doi.org/10.1080/02684527.2017.1328860.
Davies, P.H.J. and Gustafson, K. (2017b) ‘Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise’, Intelligence and National Security, pp. 1–15. Available at: https://doi.org/10.1080/02684527.2017.1328860.
Davis, J. (1991) ‘The Kent-Kendall Debate of 1949’, Studies in Intelligence, pp. 91–101. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf.
Davis, J. (2002) Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency, Occasional Papers. Available at: https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm.
Day, D.A. (2004) ‘Ferrets Above: American Signals Intelligence Satellites During the 1960s’, International Journal of Intelligence and CounterIntelligence, 17(3), pp. 449–467. Available at: https://doi.org/10.1080/08850600490446835.
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine) (no date). Available at: https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1.
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine) (no date). Available at: https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2.
Denning, D.E.R. (1999) Information warfare and security. New York, N.Y.: ACM Press.
Diderichsen, A. and Rønn, K.V. (2017) ‘Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics’, Intelligence and National Security, 32(4), pp. 479–493. Available at: https://doi.org/10.1080/02684527.2016.1270622.
Diffie, W. and Landau, S. (2008) ‘Brave New World of Wiretapping’, Scientific American, 299(3), pp. 56–63. Available at: https://doi.org/10.1038/scientificamerican0908-56.
Duyvesteyn, I. (2011) ‘Intelligence and Strategic Culture: Some Observations’, Intelligence and National Security, 26(4), pp. 521–530. Available at: https://doi.org/10.1080/02684527.2011.580605.
Dziak, J.J. (1988) ‘Chekisty: a history of the KGB’, in Chekisty: a history of the KGB. Lexington, Mass: Lexington Books, pp. 1–17. Available at: https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099.
Eftimiades, N. (1992) ‘China’s Ministry of State Security: Coming of Age in the International Arena’, Occasional Papers/Reprints Series in Contemporary Asian Studies, 1992(2). Available at: https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/.
European Court of Human Rights - ECHR, CEDH, news, information, press releases (no date). Available at: https://www.echr.coe.int/Pages/home.aspx?p=home.
Evans, G. (2009) ‘Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle’, Defence Studies, 9(1), pp. 22–46. Available at: https://doi.org/10.1080/14702430701811987.
Farson, A.S. and Praeger Security International (2008a) PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008b) PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008c) PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008d) PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008e) PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008f) PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International.
Farson, S. (1989) ‘Schools of Thought: National Perceptions of Intelligence’, Journal of Conflict Studies, 9(2). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914.
Finnegan, T.J. and Center for Strategic Intelligence Research (U.S.) (2006) Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [Washington, D.C.]: Center for Strategic Intelligence Research, National Defense Intelligence College.
Fischer, B. (2011) ‘Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight’, International Journal of Intelligence and CounterIntelligence, 24(2), pp. 268–306. Available at: https://doi.org/10.1080/08850607.2011.548205.
Fraser, A. (2005) ‘Architecture of a broken dream: The CIA and Guatemala, 1952–54’, Intelligence and National Security, 20(3), pp. 486–508. Available at: https://doi.org/10.1080/02684520500269010.
Gendron, A. (2005) ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, 18(3), pp. 398–434. Available at: https://doi.org/10.1080/08850600590945399.
George, R.Z., Bruce, J.B., and Georgetown University. Center for Peace and Security Studies (2008a) Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site.
George, R.Z., Bruce, J.B., and Georgetown University. Center for Peace and Security Studies (2008b) Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site.
Gill, P. (1994a) Policing politics: security intelligence and the liberal democratic state. London: F. Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity.
Gill, P. (1994b) Policing politics: security intelligence and the liberal democratic state. London: F. Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity.
Gill, P. (1996) ‘Reasserting control: Recent changes in the oversight of the UK intelligence community’, Intelligence and National Security, 11(2), pp. 313–331. Available at: https://doi.org/10.1080/02684529608432359.
Gill, P. (2007) ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, 22(1), pp. 14–37. Available at: https://doi.org/10.1080/02684520701200756.
Gill, P., Marrin, S. and Phythian, M. (2009) Intelligence theory: key questions and debates. London: Routledge. Available at: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874.
Glees, A. (1987) The secrets of the service: British intelligence and Communist subversion 1939-51. London: Cape.
Glees, A. et al. (2006) The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit.
Glees, A. and Davies, P.H.J. (2006) ‘Intelligence, Iraq and the limits of legislative accountability during political crisis’, Intelligence and National Security, 21(5), pp. 848–883. Available at: https://doi.org/10.1080/02684520600957787.
Godson, R. (1980) Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc. Available at: https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2.
Godson, R. (1988) ‘Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World’, in Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Washington: Pergamon-Brassey’s International Defense Publishers, pp. 115–155. Available at: https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099.
Godson, R., National Strategy Information Center, and Consortium for the Study of Intelligence (1986) Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.
Goold, B. (2009) ‘Liberty and others v The United Kingdom: a new chance for another missed opportunity’, Public Law [Preprint]. Available at: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5.
Grabo, C.M. (2002) Anticipating Surprise: Analysis for Strategic Warning. Available at: https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf.
Gray, C.S. (1999) ‘Strategic Culture as Context: The First Generation of Theory Strikes Back’, Review of International Studies, 25(1). Available at: https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents.
Gustafson, K. (2007) Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Washington D.C.: Potomac. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site.
Hastedt, G.P. (1991) ‘Towards the Comparative Study of Intelligence’, Journal of Conflict Studies, 11(3). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035.
Herman, M. (1991) ‘Intelligence and policy: A comment’, Intelligence and National Security, 6(1), pp. 229–239. Available at: https://doi.org/10.1080/02684529108432098.
Herman, M. (1996a) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996b) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996c) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996d) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996e) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996f) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996g) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996h) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996i) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996j) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996k) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996l) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996m) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (2001a) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Herman, M. (2001b) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Herman, M. (2001c) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Heuer, R.J. and Pherson, R.H. (2015a) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. Second Edition. Los Angeles: SAGE, pp. 119–121. Available at: https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099.
Heuer, R.J. and Pherson, R.H. (2015b) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. Second Edition. Los Angeles: SAGE, pp. 133–140. Available at: https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099.
Hibbert, R. (1990) ‘Intelligence and policy’, Intelligence and National Security, 5(1), pp. 110–128. Available at: https://doi.org/10.1080/02684529008432037.
HICKS, D.B. (2005) ‘Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action?’, International Journal of Intelligence and CounterIntelligence, 18(2), pp. 246–261. Available at: https://doi.org/10.1080/08850600590911954.
Hinsley, F.H. and Simkins, C.A.G. (no date) British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: H.M.S.O.
HOLLAND, M. (2004) ‘Operation PBHISTORY: The Aftermath of SUCCESS’, International Journal of Intelligence and CounterIntelligence, 17(2), pp. 300–332. Available at: https://doi.org/10.1080/08850600490274935.
Hughes-Wilson, J. (2004) Military intelligence blunders and cover-ups. Rev. and updated ed. London: Robinson. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site.
Hulnick, A.S. (1991) ‘Intelligence cooperation in the post‐cold war era: A new game plan?’, International Journal of Intelligence and CounterIntelligence, 5(4), pp. 455–465. Available at: https://doi.org/10.1080/08850609108435194.
Hulnick, A.S. (2006) ‘What’s wrong with the Intelligence Cycle’, Intelligence and National Security, 21(6), pp. 959–979. Available at: https://doi.org/10.1080/02684520601046291.
Hunter, R.W. (1999) Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press.
India. Kargil Review Committee. (2000) From surprise to reckoning. New Delhi: Sage Publications.
Inkster, N. (2013) ‘Chinese Intelligence in the Cyber Age’, Survival, 55(1), pp. 45–66. Available at: https://doi.org/10.1080/00396338.2013.767405.
‘Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond’ (2001), 16(1). Available at: https://www.tandfonline.com/toc/fint20/16/1?nav=tocList.
Intelligence and Security Committee (ISC) (2015) ‘Privacy and Security: A modern and transparent legal framework’. London. Available at: http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf.
Intelligence Science Board (2006) ‘Educing Information - Interrogation: Science and Art’. NDIC Press. Available at: http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf.
‘Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine)’ (2002) Middle East Review of International Affairs [Preprint]. Available at: https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/.
Jeffery, K. (2011) MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury.
John Wadham (1994) ‘The Intelligence Services Act 1994’, The Modern Law Review, 57(6). Available at: https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents.
Johnson, L.K. (1985) A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky.
Johnson, L.K. (1989) ‘Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy’, International Studies Quarterly, 33(1). Available at: https://doi.org/10.2307/2600495.
Johnson, L.K. (2000) ‘Spies’, Foreign Policy [Preprint], (120). Available at: https://doi.org/10.2307/1149708.
Johnson, L.K. (2009a) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009b) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009c) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009d) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009e) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009f) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009g) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009h) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009i) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009j) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009k) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009l) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009m) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson-Freese, J. and Gatling, L. (2004) ‘Security Implications of Japan’s Information Gathering Satellite (IGS) System’, Intelligence and National Security, 19(3), pp. 538–552. Available at: https://doi.org/10.1080/0268452042000316278.
Jones, B. (2013) ‘The Justice and Security Bill: “focused and proportionate”, or a derogation of the right to a fair trial (via the Wayback Machine)’, Westminster Law Review, 2(2). Available at: https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php.
Jones, K. (2000) ‘From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain’, Intelligence and National Security, 15(4), pp. 60–80. Available at: https://doi.org/10.1080/02684520008432628.
Katz, J.I. (2006) ‘Deception and Denial in Iraq: The Intelligent Adversary Corollary’, International Journal of Intelligence and CounterIntelligence, 19(4), pp. 577–585. Available at: https://doi.org/10.1080/08850600600829767.
Katzman, K. (no date) Iran: politics, human rights, and U.S. policy. [Washington, DC]: Congressional Research Service.
Kaufman, S.J. (1994) ‘Organizational Politics and Change in Soviet Military Policy’, World Politics, 46(03), pp. 355–382. Available at: https://doi.org/10.2307/2950686.
Knight, K. (1977) ‘Matrix management’, in Matrix management. Farnborough, Hants: Gower Press, pp. 1–12. Available at: https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099.
Kobayashi, Y. (2015) ‘Assessing Reform of the Japanese Intelligence Community’, International Journal of Intelligence and CounterIntelligence, 28(4), pp. 717–733. Available at: https://doi.org/10.1080/08850607.2015.1051453.
Kramer, L.A. and Heuer, R.J. (2007) ‘America’s Increased Vulnerability to Insider Espionage’, International Journal of Intelligence and CounterIntelligence, 20(1), pp. 50–64. Available at: https://doi.org/10.1080/08850600600888698.
Lander, S.S. (2004) ‘International intelligence cooperation: an inside perspective’, Cambridge Review of International Affairs, 17(3), pp. 481–493. Available at: https://doi.org/10.1080/0955757042000296964.
Laqueur, W. (1985) ‘World of secrets: the uses and limits of intelligence’, in World of secrets: the uses and limits of intelligence. London: Weidenfeld and Nicolson, pp. 20–27. Available at: https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099.
Lawrence, P.R., Lorsch, J.W., and Harvard University. Graduate School of Business Administration (1967) Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University.
LE GALLO, A. (2005) ‘Covert Action: A Vital Option in U.S. National Security Policy’, International Journal of Intelligence and CounterIntelligence, 18(2), pp. 354–359. Available at: https://doi.org/10.1080/08850600590884810.
LEFEBVRE, S. (2003) ‘The Difficulties and Dilemmas of International Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 16(4), pp. 527–542. Available at: https://doi.org/10.1080/716100467.
Lewin, R. (1982) The American magic: codes, ciphers, and the defeat of Japan. New York: Farrar Straus Giroux.
Lorsch, J.W. and Allen, S.A. (1973) Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: Harvard University, Graduate School of Business Administration, Division of Research.
Lowenthal, M.M. and Marks, R.A. (2015) ‘Intelligence Analysis: Is It As Good As It Gets?’, International Journal of Intelligence and CounterIntelligence, 28(4), pp. 662–665. Available at: https://doi.org/10.1080/08850607.2015.1051410.
Marrin, S. (2007) ‘At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers’, International Journal of Intelligence and CounterIntelligence, 20(3), pp. 401–414. Available at: https://doi.org/10.1080/08850600701249733.
Marrin, S. (2011) Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: Routledge.
Mescall, P.N. (1994) ‘A creature of compromise: The establishment of the DIA’, International Journal of Intelligence and CounterIntelligence, 7(3), pp. 251–274. Available at: https://doi.org/10.1080/08850609408435250.
Michael T. Hannan and John Freeman (1977) ‘The Population Ecology of Organizations’, American Journal of Sociology, 82(5). Available at: https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents.
Mitnick, K.D. and Simon, W.L. (2005) The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: Wiley. Available at: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834.
Morgan, G. (1986a) Images of organization. Beverly Hills: Sage.
Morgan, G. (1986b) Images of organization. Beverly Hills: Sage.
Morgan, G. (1986c) ‘Images of organization’, in Images of organization. Beverly Hills: Sage, pp. 111–140. Available at: https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099.
Muller, D.G. (2008) ‘Intelligence Analysis in Red and Blue’, International Journal of Intelligence and CounterIntelligence, 21(1), pp. 1–12. Available at: https://doi.org/10.1080/08850600701648652.
Müller-Wille, B. (2002) ‘EU Intelligence Co-operation. A Critical Analysis’, Contemporary Security Policy, 23(2), pp. 61–86. Available at: https://doi.org/10.1080/713999737.
MÜLLER-WILLE, B. (2007) ‘The Effect of International Terrorism on EU Intelligence Co-operation’, JCMS: Journal of Common Market Studies, 46(1), pp. 49–73. Available at: https://doi.org/10.1111/j.1468-5965.2007.00767.x.
National Commission on Terrorist Attacks upon the United States (2004) The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton. Available at: https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf.
Northcott, C. (2007) ‘The Role, Organization, and Methods of MI5’, International Journal of Intelligence and CounterIntelligence, 20(3), pp. 453–479. Available at: https://doi.org/10.1080/08850600701249758.
O’Connell, K.M. (2004) ‘Thinking About Intelligence Comparatively.’, Brown Journal of World Affairs, 11(Issue 1), pp. 189–111. Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049.
Olcott, A. (2012) Open source intelligence in a networked world. London: Continuum. Available at: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554.
Olson, J.M. (2008) Fair play: the moral dilemmas of spying. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049.
Olson, J.M. (no date) The Ten Commandments of Counterintelligence. Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html.
Omand, D. (2010) Securing the state. London: Hurst. Available at: http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity.
Omand, D., Bartlett, J. and Miller, C. (2012) ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security, 27(6), pp. 801–823. Available at: https://doi.org/10.1080/02684527.2012.716965.
Omand, S.D., Bartlett, J. and Carl Miller (2012) ‘#INTELLIGENCE’. lONDON: Demos. Available at: https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf.
Omand, S.D. and Phythian, M. (2013) ‘Ethics and Intelligence: A Debate’, International Journal of Intelligence and CounterIntelligence, 26(1), pp. 38–63. Available at: https://doi.org/10.1080/08850607.2012.705186.
Orton, J.D. and Callahan, J.L. (1995) ‘Important "folk theories” in intelligence reorganization’, International Journal of Intelligence and CounterIntelligence, 8(4), pp. 411–429. Available at: https://doi.org/10.1080/08850609508435296.
Oxlee, G.J. (1997) Aerospace reconnaissance. London: Brassey’s.
Parker, G.M. (2003) Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: Jossey-Bass. Available at: http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity.
Perry, D.L. (1995) ‘“Repugnant Philosophy”: Ethics, Espionage, and Covert Action’, Journal of Conflict Studies, 15(1). Available at: https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438.
Pfaff, T. and Tiel, J.R. (2004) ‘The ethics of espionage’, Journal of Military Ethics, 3(1), pp. 1–15. Available at: https://doi.org/10.1080/15027570310004447.
Phythian, M. (ed.) (2014) Understanding the intelligence cycle. London: Routledge, Taylor & Francis Group. Available at: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543.
Pitt, D. and Smith, B.C. (1981) Government departments: an organizational perspective. London: Routledge and Kegan Paul.
Posen, B. (1984) The sources of military doctrine: France, Britain, and Germany between the world wars. Ithaca: Cornell University Press. Available at: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658.
Powell, W.W. and DiMaggio, P.J. (1991a) The new institutionalism in organizational analysis. Chicago: University of Chicago Press.
Powell, W.W. and DiMaggio, P.J. (1991b) The new institutionalism in organizational analysis. Chicago: University of Chicago Press.
Pribbenow, M.L. (no date) ‘The Man in the Snow White Cell’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html.
Pringle, R.W. (2004) ‘Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 113–123. Available at: https://doi.org/10.1080/08850600490252687.
Pugh, D.S. (2007a) Organization theory: selected classic readings. 5th ed. London: Penguin.
Pugh, D.S. (2007b) ‘Organization theory: selected classic readings’, in Organization theory: selected classic readings. 5th ed. London: Penguin, pp. 223–252. Available at: https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099.
Quinlan, M. (2007) ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, 22(1), pp. 1–13. Available at: https://doi.org/10.1080/02684520701200715.
Radcliffe, W.W. (2010) ‘Origins and Current State of Japan’s Reconnaissance Satellite Program (U)’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html.
Raeff, M. (1975) ‘The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach’, The American Historical Review, 80(5). Available at: https://doi.org/10.2307/1852058.
Rathmell, A. (1996) ‘Syria’s Intelligence Services: Origins and Development’, Journal of Conflict Studies, 16(2). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636.
REMPEL, R. (2004) ‘Canada’s Parliamentary Oversight of Security and Intelligence’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 634–654. Available at: https://doi.org/10.1080/08850600490496443.
Rhodes, R.A.W. (Roderick A.W. and Dunleavy, P. (1995) Prime Minister, cabinet and core executive. Basingstoke: Macillan.
Richards, P. and Won-Young, K. (2009) ‘MONITORING FOR NUCLEAR EXPLOSIONS.’, Scientific American, 300(Issue 3), pp. 70–77. Available at: https://doi.org/10.1038/scientificamerican0309-70.
Richelson, J. and Ball, D. (1985) The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin.
Richelson, J.T. (1990) ‘The calculus of intelligence cooperation’, International Journal of Intelligence and CounterIntelligence, 4(3), pp. 307–323. Available at: https://doi.org/10.1080/08850609008435147.
Richelson, J.T. (2001) ‘MASINT: The New Kid in Town’, International Journal of Intelligence and CounterIntelligence, 14(2), pp. 149–192. Available at: https://doi.org/10.1080/088506001300063136.
Riebling, M. (2002) Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster.
Robertson, K.G. (1987) ‘Intelligence, Terrorism and Civil Liberties’, Journal of Conflict Studies, 7(2). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825.
Robertson, K.G. (1988) ‘Accountable Intelligence—The British Experience’, Journal of Conflict Studies, 8(1). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855.
Robertson, K.G. (1998) ‘Recent reform of intelligence in the UK: Democratization or risk management?’, Intelligence and National Security, 13(2), pp. 144–158. Available at: https://doi.org/10.1080/02684529808432481.
Rovner, J. (2015) Fixing the facts: national security and the politics of intelligence. Ithaca: Cornell University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity.
Royal United Services Institute (RUSI) (2015) ‘A Democratic Licence to Operate: Report of the Independent Surveillance Review’. Royal United Services Institute (RUSI). Available at: https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf.
Royden, B.G. (no date) ‘Tolkachev, A Worthy Successor to Penkovsky’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html.
RSPSoc - Home (no date). Available at: http://rspsoc.org.uk/.
RUDNER, M. (2004) ‘Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism’, International Journal of Intelligence and CounterIntelligence, 17(2), pp. 193–230. Available at: https://doi.org/10.1080/08850600490274890.
Rudner, M. (2007) ‘Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism’, Intelligence and National Security, 22(4), pp. 473–490. Available at: https://doi.org/10.1080/02684520701640449.
Schlesinger, S.C., Kinzer, S. and Coatsworth, J.H. (2005) Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Cambridge, Mass: Harvard University Press.
Security Intelligence Review Committee (Canada) (no date). Available at: http://www.sirc-csars.gc.ca/.
Shaffer, R. (2017) ‘Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence’, International Journal of Intelligence and CounterIntelligence, 30(3), pp. 522–531. Available at: https://doi.org/10.1080/08850607.2017.1263529.
Shoham, D. and Jacobsen, S.M. (2007) ‘Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder’, International Journal of Intelligence and CounterIntelligence, 20(1), pp. 79–105. Available at: https://doi.org/10.1080/08850600600889027.
Short, N. (no date) ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine). Available at: https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html.
Shukman, H. (2000) ‘Agents for change: intelligence services in the 21st century’, in Agents for change: intelligence services in the 21st century. London: St Ermin’s, pp. 1–46. Available at: https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099.
Shulsky, A.N. and Schmitt, G.J. (2002a) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002b) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002c) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002d) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002e) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Sims, J.E. (2006) ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, 19(2), pp. 195–217. Available at: https://doi.org/10.1080/08850600500483657.
Skocpol, T. (1979) ‘Explaining Social Revolutions: Alternatives to Existing Theories’, in States and social revolutions: a comparative analysis of France, Russia and China. Cambridge (etc.): Cambridge University Press, pp. 3–43. Available at: https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099.
Smith, M. (1996) ‘New cloak, old dagger: how Britain’s spies came in from the cold’, in New cloak, old dagger: how Britain’s spies came in from the cold. London: V. Gollancz, pp. 165–177. Available at: https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099.
Smith, M.J. (1999) The core executive in Britain. Basingstoke: Macmillan.
Smith, M.J. (2010) ‘Intelligence and the Core Executive’, Public Policy and Administration, 25(1), pp. 11–28. Available at: https://doi.org/10.1177/0952076709347072.
Steiner, J.E. (2006) ‘Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action’, International Journal of Intelligence and CounterIntelligence, 19(1), pp. 156–165. Available at: https://doi.org/10.1080/08850600500332532.
Stoll, C. (1989) The cuckoo’s egg: tracking a spy through the maze of computer espionage. New York: Doubleday.
Stoll, C. (1991) The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books.
Stoll, C. (no date) ‘The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube’. Available at: https://www.youtube.com/watch?v=EcKxaq1FTac.
Stottlemyre, S.A. (2015) ‘HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence’, International Journal of Intelligence and CounterIntelligence, 28(3), pp. 578–589. Available at: https://doi.org/10.1080/08850607.2015.992760.
The Development, Concepts and Doctrine Centre (no date) ‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. Swindon. Available at: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
The Intelligence and Security Committee of Parliament (no date) ‘Annual Report 2003-2004’. London: TSO. Available at: http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf.
The Intelligence and Security Committee of Parliament (no date). Available at: http://isc.independent.gov.uk/.
Thomas, S.T. (1999) ‘The CIA’s Bureaucratic Dimensions’, International Journal of Intelligence and CounterIntelligence, 12(4), pp. 399–413. Available at: https://doi.org/10.1080/088506099304972.
Treverton, G. (1988) Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris.
Turner, M.A. (2004) ‘A Distinctive U.S. Intelligence Identity’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 42–61. Available at: https://doi.org/10.1080/08850600490252650.
TURNER, M.A. (2004) ‘A Distinctive U.S. Intelligence Identity’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 42–61. Available at: https://doi.org/10.1080/08850600490252650.
UK Government (no date) The Investigatory Powers Act 2015 - GOV.UK. Available at: https://www.gov.uk/government/collections/investigatory-powers-bill.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK (no date a). Available at: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK (no date b). Available at: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK (no date c). Available at: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK (no date d). Available at: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
U.S. House of Representatives Permanent Select Committee on Intelligence (no date). Available at: https://intelligence.house.gov/.
U.S. Senate Select Committee on Intelligence (no date). Available at: https://www.intelligence.senate.gov/.
Vrist Ronn, K. (2016) ‘Intelligence Ethics: A Critical Review and Future Perspectives’, International Journal of Intelligence and CounterIntelligence, 29(4), pp. 760–784. Available at: https://doi.org/10.1080/08850607.2016.1177399.
Walsh, J.I. (2007) ‘Defection and Hierarchy in International Intelligence Sharing’, Journal of Public Policy, 27(2). Available at: https://doi.org/10.1017/S0143814X07000682.
Walsh, P.F. and Miller, S. (2016) ‘Rethinking “Five Eyes” Security Intelligence Collection Policies and Practice Post Snowden’, Intelligence and National Security, 31(3), pp. 345–368. Available at: https://doi.org/10.1080/02684527.2014.998436.
Warner, M. (2004) ‘Transformation and Intelligence Liaison’, SAIS Review, 24(1), pp. 77–89. Available at: https://doi.org/10.1353/sais.2004.0024.
Warner, M. (no date) ‘Wanted: A Definition of “Intelligence” — Central Intelligence Agency’. Available at: https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf.
Watanabe, F. (1997) ‘Fifteen Axioms for Intelligence Analysts (U)’, Studies in Intelligence. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf.
Weber, M. and Fischoff, E. (2013a) Economy and society: an outline of interpretive sociology. Edited by G. Roth and C. Wittich. Berkeley: University of California Press.
Weber, M. and Fischoff, E. (2013b) Economy and society: an outline of interpretive sociology. Edited by G. Roth and C. Wittich. Berkeley: University of California Press.
Weber, M., Gerth, H. and Mills, C.W. (1991) From Max Weber: essays in sociology. New ed. London: Routledge.
West, N. (1986) GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson.
Westerfield, B. (no date) ‘American exceptionalism and American intelligence.’, Freedom Review, 28(Issue 2). Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049.
Westerfield, H.B. (1996) ‘America and the world of intelligence liaison’, Intelligence and National Security, 11(3), pp. 523–560. Available at: https://doi.org/10.1080/02684529608432375.
Wirtz, J.J. (2013) ‘Indications and Warning in an Age of Uncertainty’, International Journal of Intelligence and CounterIntelligence, 26(3), pp. 550–562. Available at: https://doi.org/10.1080/08850607.2013.780558.
Wise, D. (1988) The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House.
Zegart, A.B. (2006) ‘An Empirical Analysis of Failed Intelligence Reforms before September 11’, Political Science Quarterly, 121(1). Available at: https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents.
Zorn, E.L. (no date) ‘Israel’s Quest for Satellite Intelligence’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm.