[1]
Agrell, W. When everything is intelligence - nothing is intelligence. Central Intelligence Agency.
[2]
Aid, M.M. 2003. All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security. 18, 4 (Dec. 2003), 72–120. DOI:https://doi.org/10.1080/02684520310001688880.
[3]
Aldrich, R.J. 2002. Dangerous Liaisons. Harvard International Review. 24, Issue 3 (2002).
[4]
Aldrich, R.J. 2010. GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press.
[5]
Aldrich, R.J. 2009. Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security. 24, 1 (Feb. 2009), 26–56. DOI:https://doi.org/10.1080/02684520902756812.
[6]
Aldrich, R.J. 2009. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 11, 1 (Feb. 2009), 122–139. DOI:https://doi.org/10.1111/j.1467-856x.2008.00353.x.
[7]
Allison, G.T. 1969. Conceptual Models and the Cuban Missile Crisis. American Political Science Review. 63, 03 (Sep. 1969), 689–718. DOI:https://doi.org/10.2307/1954423.
[8]
Allison, G.T. and Zelikow, P. 1999. Essence of decision: explaining the Cuban Missile Crisis. Longman.
[9]
Alvarez, D. 2000. American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 15, 1 (Mar. 2000), 169–176. DOI:https://doi.org/10.1080/02684520008432591.
[10]
Alvarez, D. ed. 1999. Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 14, 1 (1999).
[11]
Anderson, D. 2015. A question of trust: report of the investigatory powers review - GOV.UK.
[12]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[13]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[14]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[15]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[16]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[17]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[18]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[19]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[20]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Secret intelligence: a reader. Routledge. 395–410.
[21]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[22]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[23]
Andrew, C.M. and Gordievsky, O. 1990. KGB: the inside story of its foreign operations from Lenin to Gorbachev. KGB: the inside story of its foreign operations from Lenin to Gorbachev. Hodder & Stoughton. 1–18.
[24]
Andrew, C.M. and Gordievsky, O. 1990. KGB: the inside story of its foreign operations from Lenin to Gorbachev. Hodder & Stoughton.
[25]
Baldino, D. 2010. Democratic oversight of intelligence services. Federation Press.
[26]
Bamford, J. 2001. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. Century.
[27]
Bar-Joseph, U. 2011. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 24, 1 (Jan. 2011), 22–43. DOI:https://doi.org/10.1080/08850607.2011.519222.
[28]
bellingcat - MH17 - The Open Source Evidence - bellingcat: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
[29]
Benjamin, V.O. 2007. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. (2007).
[30]
Berkowitz, B. 2011. The National Reconnaissance Office at 50 Years: A Brief History. National Reconnaissance Office.
[31]
Berkowitz, B.D. and Goodman, A.E. 2000. Best truth: intelligence in the information age. Best truth: intelligence in the information age. Yale University Press. 58–98.
[32]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Princeton University Press.
[33]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Princeton University Press.
[34]
Bettina Renz 2006. Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies. 58, 6 (2006). DOI:https://doi.org/10.1080/0966813060031134.
[35]
Blau, P.M. 1963. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. University of Chicago Press.
[36]
Born, H. et al. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
[37]
Bradley, A.W. and Ewing, K.D. 2011. Constitutional and administrative law. Constitutional and administrative law. Pearson Longman. 481–486.
[38]
Bradley, A.W. and Ewing, K.D. 2011. Constitutional and administrative law. Constitutional and administrative law. Pearson Longman. 553–562.
[39]
Brook-Shepherd, G. 1988. The storm birds: Soviet postwar defectors. Weidenfield and Nicolson.
[40]
Brugioni, D.A. 1AD. The art and science of photoreconnaissance. Scientific American. 3 (1AD), 78–85. DOI:https://doi.org/10.1038/scientificamerican0396-78.
[41]
Burns, T. and Stalker, G.M. 1994. The management of innovation. Oxford University Press.
[42]
Butler of Brockwell, F.E.R.B. et al. 2004. Review of intelligence on weapons of mass destruction. The Stationery Office.
[43]
Champion, B. 1998. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 13, 2 (Jun. 1998), 123–143. DOI:https://doi.org/10.1080/02684529808432480.
[44]
Chapman, B. 1971. Police state. Police state. Macmillan. 106–115.
[45]
Clark, R.M. 2016. Intelligence analysis : a target-centric approach. CQ Press.
[46]
Clayton, A. 1982. The enemy is listening. Ballantine.
[47]
CLOUGH, C. 2004. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 601–613. DOI:https://doi.org/10.1080/08850600490446736.
[48]
Cohen, M.D. et al. 1972. A Garbage Can Model of Organizational Choice. Administrative Science Quarterly. 17, 1 (Mar. 1972). DOI:https://doi.org/10.2307/2392088.
[49]
Cradock, P. 2002. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. John Murray. 290–303.
[50]
Cradock, P. 2002. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. John Murray. 281–289.
[51]
Cringely, R.X. 1992. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. Viking.
[52]
Crosston, M. 2016. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 29, 1 (Jan. 2016), 110–131. DOI:https://doi.org/10.1080/08850607.2015.1083337.
[53]
Cyert, R.M. and March, J.G. 1992. A behavioral theory of the firm. Blackwell.
[54]
Dandeker, C. 1990. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Polity.
[55]
Daugherty, W.J. 2006. Executive secrets: covert action and the presidency. The University Press of Kentucky.
[56]
David, J.E. 2017. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 32, 6 (Sep. 2017), 768–781. DOI:https://doi.org/10.1080/02684527.2017.1294372.
[57]
Davies, P.H.J. A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq.
[58]
Davies, P.H.J. 2000. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 15, 3 (Sep. 2000), 55–76. DOI:https://doi.org/10.1080/02684520008432617.
[59]
Davies, P.H.J. 2002. Ideas of Intelligence. Harvard International Review. 24, Issue 3 (2002).
[60]
Davies, P.H.J. 2009. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 35, 04 (Oct. 2009). DOI:https://doi.org/10.1017/S0260210509990386.
[61]
Davies, P.H.J. 1999. INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society. 2, 2 (Jan. 1999), 115–133. DOI:https://doi.org/10.1080/136911899359664.
[62]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[63]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[64]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[65]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[66]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[67]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[68]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[69]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[70]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger.
[71]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger.
[72]
Davies, P.H.J. 2010. Intelligence and the Machinery of Government. Public Policy and Administration. 25, 1 (Jan. 2010), 29–46. DOI:https://doi.org/10.1177/0952076709347073.
[73]
Davies, P.H.J. 2004. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 17, 3 (Oct. 2004), 495–520. DOI:https://doi.org/10.1080/0955757042000298188.
[74]
Davies, P.H.J. 2003. MI6 and the machinery of spying. Frank Cass.
[75]
Davies, P.H.J. 2003. MI6 and the machinery of spying. Frank Cass.
[76]
Davies, P.H.J. 2010. The Missing Dimension’s Missing Dimension. Public Policy and Administration. 25, 1 (Jan. 2010), 5–9. DOI:https://doi.org/10.1177/0952076709347071.
[77]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[78]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[79]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[80]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[81]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[82]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[83]
Davies, P.H.J. and Gustafson, K. 2017. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. (Jul. 2017), 1–15. DOI:https://doi.org/10.1080/02684527.2017.1328860.
[84]
Davies, P.H.J. and Gustafson, K. 2017. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. (Jul. 2017), 1–15. DOI:https://doi.org/10.1080/02684527.2017.1328860.
[85]
Davis, J. 1991. The Kent-Kendall Debate of 1949. Studies in Intelligence. (1991), 91–101.
[86]
Day, D.A. 2004. Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence. 17, 3 (Sep. 2004), 449–467. DOI:https://doi.org/10.1080/08850600490446835.
[87]
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine): https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1.
[88]
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine): https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2.
[89]
Denning, D.E.R. 1999. Information warfare and security. ACM Press.
[90]
Diderichsen, A. and Rønn, K.V. 2017. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 32, 4 (Jun. 2017), 479–493. DOI:https://doi.org/10.1080/02684527.2016.1270622.
[91]
Diffie, W. and Landau, S. 2008. Brave New World of Wiretapping. Scientific American. 299, 3 (2008), 56–63. DOI:https://doi.org/10.1038/scientificamerican0908-56.
[92]
Duyvesteyn, I. 2011. Intelligence and Strategic Culture: Some Observations. Intelligence and National Security. 26, 4 (Aug. 2011), 521–530. DOI:https://doi.org/10.1080/02684527.2011.580605.
[93]
Dziak, J.J. 1988. Chekisty: a history of the KGB. Chekisty: a history of the KGB. Lexington Books. 1–17.
[94]
Eftimiades, N. 1992. China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies. 1992, 2 (1992).
[95]
European Court of Human Rights - ECHR, CEDH, news, information, press releases: https://www.echr.coe.int/Pages/home.aspx?p=home.
[96]
Evans, G. 2009. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 9, 1 (Mar. 2009), 22–46. DOI:https://doi.org/10.1080/14702430701811987.
[97]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
[98]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
[99]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
[100]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
[101]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International.
[102]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International.
[103]
Farson, S. 1989. Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies. 9, 2 (1989).
[104]
Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation: https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report.
[105]
Finnegan, T.J. and Center for Strategic Intelligence Research (U.S.) 2006. Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Center for Strategic Intelligence Research, National Defense Intelligence College.
[106]
Fischer, B. 2011. Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence. 24, 2 (Jun. 2011), 268–306. DOI:https://doi.org/10.1080/08850607.2011.548205.
[107]
Fraser, A. 2005. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 20, 3 (Sep. 2005), 486–508. DOI:https://doi.org/10.1080/02684520500269010.
[108]
Gendron, A. 2005. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 18, 3 (Oct. 2005), 398–434. DOI:https://doi.org/10.1080/08850600590945399.
[109]
George, R.Z. et al. 2008. Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press.
[110]
George, R.Z. et al. 2008. Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press.
[111]
Gill, P. 2007. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 22, 1 (Feb. 2007), 14–37. DOI:https://doi.org/10.1080/02684520701200756.
[112]
Gill, P. et al. 2009. Intelligence theory: key questions and debates. Routledge.
[113]
Gill, P. 1994. Policing politics: security intelligence and the liberal democratic state. F. Cass.
[114]
Gill, P. 1994. Policing politics: security intelligence and the liberal democratic state. F. Cass.
[115]
Gill, P. 1996. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security. 11, 2 (Apr. 1996), 313–331. DOI:https://doi.org/10.1080/02684529608432359.
[116]
Glees, A. et al. 2006. The open side of secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit.
[117]
Glees, A. 1987. The secrets of the service: British intelligence and Communist subversion 1939-51. Cape.
[118]
Glees, A. and Davies, P.H.J. 2006. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 21, 5 (Oct. 2006), 848–883. DOI:https://doi.org/10.1080/02684520600957787.
[119]
Godson, R. 1988. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Pergamon-Brassey’s International Defense Publishers. 115–155.
[120]
Godson, R. 1980. Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc.
[121]
Godson, R. et al. 1986. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6].
[122]
Goold, B. 2009. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. (2009).
[123]
Grabo, C.M. 2002. Anticipating Surprise: Analysis for Strategic Warning.
[124]
Gray, C.S. 1999. Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies. 25, 1 (1999).
[125]
Gustafson, K. 2007. Hostile intent: U.S. covert operations in Chile, 1964-1974. Potomac.
[126]
Hastedt, G.P. 1991. Towards the Comparative Study of Intelligence. Journal of Conflict Studies. 11, 3 (1991).
[127]
Herman, M. 1991. Intelligence and policy: A comment. Intelligence and National Security. 6, 1 (Jan. 1991), 229–239. DOI:https://doi.org/10.1080/02684529108432098.
[128]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[129]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[130]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[131]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[132]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[133]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[134]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[135]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[136]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[137]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[138]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[139]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[140]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[141]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[142]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[143]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[144]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 119–121.
[145]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 133–140.
[146]
Hibbert, R. 1990. Intelligence and policy. Intelligence and National Security. 5, 1 (Jan. 1990), 110–128. DOI:https://doi.org/10.1080/02684529008432037.
[147]
HICKS, D.B. 2005. Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence. 18, 2 (Mar. 2005), 246–261. DOI:https://doi.org/10.1080/08850600590911954.
[148]
Hinsley, F.H. and Simkins, C.A.G. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. H.M.S.O.
[149]
HOLLAND, M. 2004. Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 17, 2 (Jan. 2004), 300–332. DOI:https://doi.org/10.1080/08850600490274935.
[150]
Hughes-Wilson, J. 2004. Military intelligence blunders and cover-ups. Robinson.
[151]
Hulnick, A.S. 1991. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence. 5, 4 (Dec. 1991), 455–465. DOI:https://doi.org/10.1080/08850609108435194.
[152]
Hulnick, A.S. 2006. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 21, 6 (Dec. 2006), 959–979. DOI:https://doi.org/10.1080/02684520601046291.
[153]
Hunter, R.W. 1999. Spy hunter: inside the FBI investigation of the Walker espionage case. Naval Institute Press.
[154]
Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency: 2002. https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm.
[155]
India. Kargil Review Committee. 2000. From surprise to reckoning. Sage Publications.
[156]
Inkster, N. 2013. Chinese Intelligence in the Cyber Age. Survival. 55, 1 (Mar. 2013), 45–66. DOI:https://doi.org/10.1080/00396338.2013.767405.
[157]
Intelligence and Security Committee (ISC) 2015. Privacy and Security: A modern and transparent legal framework.
[158]
Intelligence Science Board 2006. Educing Information - Interrogation: Science and Art. NDIC Press.
[159]
Jeffery, K. 2011. MI6: the history of the Secret Intelligence Service, 1909-1949. Bloomsbury.
[160]
John Wadham 1994. The Intelligence Services Act 1994. The Modern Law Review. 57, 6 (1994).
[161]
Johnson, L.K. 1985. A season of inquiry: the Senate intelligence investigation. University Press of Kentucky.
[162]
Johnson, L.K. 1989. Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly. 33, 1 (Mar. 1989). DOI:https://doi.org/10.2307/2600495.
[163]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[164]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[165]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[166]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[167]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[168]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[169]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[170]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[171]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[172]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[173]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[174]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[175]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[176]
Johnson, L.K. 2000. Spies. Foreign Policy. 120 (Sep. 2000). DOI:https://doi.org/10.2307/1149708.
[177]
Johnson-Freese, J. and Gatling, L. 2004. Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security. 19, 3 (Sep. 2004), 538–552. DOI:https://doi.org/10.1080/0268452042000316278.
[178]
Jones, B. 2013. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review. 2, 2 (Apr. 2013).
[179]
Jones, K. 2000. From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 15, 4 (Dec. 2000), 60–80. DOI:https://doi.org/10.1080/02684520008432628.
[180]
Katz, J.I. 2006. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 19, 4 (Dec. 2006), 577–585. DOI:https://doi.org/10.1080/08850600600829767.
[181]
Katzman, K. Iran: politics, human rights, and U.S. policy. Congressional Research Service.
[182]
Kaufman, S.J. 1994. Organizational Politics and Change in Soviet Military Policy. World Politics. 46, 03 (Apr. 1994), 355–382. DOI:https://doi.org/10.2307/2950686.
[183]
Knight, K. 1977. Matrix management. Matrix management. Gower Press. 1–12.
[184]
Kobayashi, Y. 2015. Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence. 28, 4 (Oct. 2015), 717–733. DOI:https://doi.org/10.1080/08850607.2015.1051453.
[185]
Kramer, L.A. and Heuer, R.J. 2007. America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence. 20, 1 (Dec. 2007), 50–64. DOI:https://doi.org/10.1080/08850600600888698.
[186]
Lander, S.S. 2004. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 17, 3 (Oct. 2004), 481–493. DOI:https://doi.org/10.1080/0955757042000296964.
[187]
Laqueur, W. 1985. World of secrets: the uses and limits of intelligence. World of secrets: the uses and limits of intelligence. Weidenfeld and Nicolson. 20–27.
[188]
Lawrence, P.R. et al. 1967. Organization and environment: managing differentiation and integration. Division of Research, Graduate School of Business Administration, Harvard University.
[189]
LE GALLO, A. 2005. Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence. 18, 2 (Mar. 2005), 354–359. DOI:https://doi.org/10.1080/08850600590884810.
[190]
LEFEBVRE, S. 2003. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 16, 4 (Oct. 2003), 527–542. DOI:https://doi.org/10.1080/716100467.
[191]
Lewin, R. 1982. The American magic: codes, ciphers, and the defeat of Japan. Farrar Straus Giroux.
[192]
Lorsch, J.W. and Allen, S.A. 1973. Managing diversity and interdependence: an organizational study of multidivisional firms. Harvard University, Graduate School of Business Administration, Division of Research.
[193]
Lowenthal, M.M. and Marks, R.A. 2015. Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence. 28, 4 (Oct. 2015), 662–665. DOI:https://doi.org/10.1080/08850607.2015.1051410.
[194]
Marrin, S. 2007. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 20, 3 (May 2007), 401–414. DOI:https://doi.org/10.1080/08850600701249733.
[195]
Marrin, S. 2011. Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge.
[196]
Mescall, P.N. 1994. A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence. 7, 3 (Sep. 1994), 251–274. DOI:https://doi.org/10.1080/08850609408435250.
[197]
Michael T. Hannan and John Freeman 1977. The Population Ecology of Organizations. American Journal of Sociology. 82, 5 (1977).
[198]
Mitnick, K.D. and Simon, W.L. 2005. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Wiley.
[199]
Morgan, G. 1986. Images of organization. Sage.
[200]
Morgan, G. 1986. Images of organization. Sage.
[201]
Morgan, G. 1986. Images of organization. Images of organization. Sage. 111–140.
[202]
Muller, D.G. 2008. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 21, 1 (Jan. 2008), 1–12. DOI:https://doi.org/10.1080/08850600701648652.
[203]
Müller-Wille, B. 2002. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 23, 2 (Aug. 2002), 61–86. DOI:https://doi.org/10.1080/713999737.
[204]
MÜLLER-WILLE, B. 2007. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 46, 1 (Dec. 2007), 49–73. DOI:https://doi.org/10.1111/j.1468-5965.2007.00767.x.
[205]
National Commission on Terrorist Attacks upon the United States 2004. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. Norton.
[206]
Northcott, C. 2007. The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence. 20, 3 (May 2007), 453–479. DOI:https://doi.org/10.1080/08850600701249758.
[207]
O’Connell, K.M. 2004. Thinking About Intelligence Comparatively. Brown Journal of World Affairs. 11, Issue 1 (2004), 189–111.
[208]
Olcott, A. 2012. Open source intelligence in a networked world. Continuum.
[209]
Olson, J.M. 2008. Fair play: the moral dilemmas of spying. Potomac Books, Inc.
[210]
Omand, D. et al. 2012. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 27, 6 (Dec. 2012), 801–823. DOI:https://doi.org/10.1080/02684527.2012.716965.
[211]
Omand, D. 2010. Securing the state. Hurst.
[212]
Omand, S.D. et al. 2012. #INTELLIGENCE. Demos.
[213]
Omand, S.D. and Phythian, M. 2013. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 26, 1 (Mar. 2013), 38–63. DOI:https://doi.org/10.1080/08850607.2012.705186.
[214]
Orton, J.D. and Callahan, J.L. 1995. Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence. 8, 4 (Dec. 1995), 411–429. DOI:https://doi.org/10.1080/08850609508435296.
[215]
Oxlee, G.J. 1997. Aerospace reconnaissance. Brassey’s.
[216]
Parker, G.M. 2003. Cross-functional teams: working with allies, enemies, and other strangers. Jossey-Bass.
[217]
Perry, D.L. 1995. ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies. 15, 1 (1995).
[218]
Pfaff, T. and Tiel, J.R. 2004. The ethics of espionage. Journal of Military Ethics. 3, 1 (Mar. 2004), 1–15. DOI:https://doi.org/10.1080/15027570310004447.
[219]
Phythian, M. ed. 2014. Understanding the intelligence cycle. Routledge, Taylor & Francis Group.
[220]
Pitt, D. and Smith, B.C. 1981. Government departments: an organizational perspective. Routledge and Kegan Paul.
[221]
Posen, B. 1984. The sources of military doctrine: France, Britain, and Germany between the world wars. Cornell University Press.
[222]
Powell, W.W. and DiMaggio, P.J. 1991. The new institutionalism in organizational analysis. University of Chicago Press.
[223]
Powell, W.W. and DiMaggio, P.J. 1991. The new institutionalism in organizational analysis. University of Chicago Press.
[224]
Pribbenow, M.L. The Man in the Snow White Cell.
[225]
Pringle, R.W. 2004. Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 113–123. DOI:https://doi.org/10.1080/08850600490252687.
[226]
Pugh, D.S. 2007. Organization theory: selected classic readings. Penguin.
[227]
Pugh, D.S. 2007. Organization theory: selected classic readings. Organization theory: selected classic readings. Penguin. 223–252.
[228]
Quinlan, M. 2007. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 22, 1 (Feb. 2007), 1–13. DOI:https://doi.org/10.1080/02684520701200715.
[229]
Radcliffe, W.W. 2010. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). (2010).
[230]
Raeff, M. 1975. The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review. 80, 5 (Dec. 1975). DOI:https://doi.org/10.2307/1852058.
[231]
Rathmell, A. 1996. Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies. 16, 2 (1996).
[232]
REMPEL, R. 2004. Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 634–654. DOI:https://doi.org/10.1080/08850600490496443.
[233]
Rhodes, R.A.W. (Roderick A.W. and Dunleavy, P. 1995. Prime Minister, cabinet and core executive. Macillan.
[234]
Richards, P. and Won-Young, K. 2009. MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American. 300, Issue 3 (2009), 70–77. DOI:https://doi.org/10.1038/scientificamerican0309-70.
[235]
Richelson, J. and Ball, D. 1985. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Allen & Unwin.
[236]
Richelson, J.T. 2001. MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence. 14, 2 (Apr. 2001), 149–192. DOI:https://doi.org/10.1080/088506001300063136.
[237]
Richelson, J.T. 1990. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence. 4, 3 (Jan. 1990), 307–323. DOI:https://doi.org/10.1080/08850609008435147.
[238]
Riebling, M. 2002. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. Simon & Schuster.
[239]
Robertson, K.G. 1988. Accountable Intelligence—The British Experience. Journal of Conflict Studies. 8, 1 (1988).
[240]
Robertson, K.G. 1987. Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies. 7, 2 (1987).
[241]
Robertson, K.G. 1998. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 13, 2 (Jun. 1998), 144–158. DOI:https://doi.org/10.1080/02684529808432481.
[242]
Rovner, J. 2015. Fixing the facts: national security and the politics of intelligence. Cornell University Press.
[243]
Royal United Services Institute (RUSI) 2015. A Democratic Licence to Operate: Report of the Independent Surveillance Review. Royal United Services Institute (RUSI).
[244]
Royden, B.G. Tolkachev, A Worthy Successor to Penkovsky.
[245]
RSPSoc - Home: http://rspsoc.org.uk/.
[246]
Rudner, M. 2007. Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security. 22, 4 (Aug. 2007), 473–490. DOI:https://doi.org/10.1080/02684520701640449.
[247]
RUDNER, M. 2004. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 17, 2 (Jan. 2004), 193–230. DOI:https://doi.org/10.1080/08850600490274890.
[248]
Schlesinger, S.C. et al. 2005. Bitter fruit: the story of the American coup in Guatemala. Harvard University Press.
[249]
Security Intelligence Review Committee (Canada): http://www.sirc-csars.gc.ca/.
[250]
Shaffer, R. 2017. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 30, 3 (Jul. 2017), 522–531. DOI:https://doi.org/10.1080/08850607.2017.1263529.
[251]
Shoham, D. and Jacobsen, S.M. 2007. Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence. 20, 1 (Dec. 2007), 79–105. DOI:https://doi.org/10.1080/08850600600889027.
[252]
Shukman, H. 2000. Agents for change: intelligence services in the 21st century. Agents for change: intelligence services in the 21st century. St Ermin’s. 1–46.
[253]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[254]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[255]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[256]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[257]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[258]
Sims, J.E. 2006. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 19, 2 (May 2006), 195–217. DOI:https://doi.org/10.1080/08850600500483657.
[259]
Skocpol, T. 1979. Explaining Social Revolutions: Alternatives to Existing Theories. States and social revolutions: a comparative analysis of France, Russia and China. Cambridge University Press. 3–43.
[260]
Smith, M. 1996. New cloak, old dagger: how Britain’s spies came in from the cold. New cloak, old dagger: how Britain’s spies came in from the cold. V. Gollancz. 165–177.
[261]
Smith, M.J. 2010. Intelligence and the Core Executive. Public Policy and Administration. 25, 1 (Jan. 2010), 11–28. DOI:https://doi.org/10.1177/0952076709347072.
[262]
Smith, M.J. 1999. The core executive in Britain. Macmillan.
[263]
Steiner, J.E. 2006. Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence. 19, 1 (Jan. 2006), 156–165. DOI:https://doi.org/10.1080/08850600500332532.
[264]
Stoll, C. 1991. The cuckoo’s egg: tracking a spy through the maze of computer espionage. Pan Books.
[265]
Stoll, C. 1989. The cuckoo’s egg: tracking a spy through the maze of computer espionage. Doubleday.
[266]
Stoll, C. The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube.
[267]
Stottlemyre, S.A. 2015. HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence. 28, 3 (Jul. 2015), 578–589. DOI:https://doi.org/10.1080/08850607.2015.992760.
[268]
The Development, Concepts and Doctrine Centre Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK.
[269]
The Intelligence and Security Committee of Parliament Annual Report 2003-2004. TSO.
[270]
The Intelligence and Security Committee of Parliament: http://isc.independent.gov.uk/.
[271]
The Investigatory Powers Act 2015 - GOV.UK: https://www.gov.uk/government/collections/investigatory-powers-bill.
[272]
‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine): https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html.
[273]
The Ten Commandments of Counterintelligence: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html.
[274]
Thomas, S.T. 1999. The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence. 12, 4 (Dec. 1999), 399–413. DOI:https://doi.org/10.1080/088506099304972.
[275]
Treverton, G. 1988. Covert action: the CIA and the limits of American intervention in the postwar world. Tauris.
[276]
Turner, M.A. 2004. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 42–61. DOI:https://doi.org/10.1080/08850600490252650.
[277]
TURNER, M.A. 2004. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 42–61. DOI:https://doi.org/10.1080/08850600490252650.
[278]
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
[279]
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
[280]
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
[281]
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
[282]
U.S. House of Representatives Permanent Select Committee on Intelligence: https://intelligence.house.gov/.
[283]
U.S. Senate Select Committee on Intelligence: https://www.intelligence.senate.gov/.
[284]
Vrist Ronn, K. 2016. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 29, 4 (Oct. 2016), 760–784. DOI:https://doi.org/10.1080/08850607.2016.1177399.
[285]
Walsh, J.I. 2007. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy. 27, 2 (2007). DOI:https://doi.org/10.1017/S0143814X07000682.
[286]
Walsh, P.F. and Miller, S. 2016. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 31, 3 (Apr. 2016), 345–368. DOI:https://doi.org/10.1080/02684527.2014.998436.
[287]
Warner, M. 2004. Transformation and Intelligence Liaison. SAIS Review. 24, 1 (2004), 77–89. DOI:https://doi.org/10.1353/sais.2004.0024.
[288]
Warner, M. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency.
[289]
Watanabe, F. 1997. Fifteen Axioms for Intelligence Analysts (U). Studies in Intelligence.
[290]
Weber, M. et al. 1991. From Max Weber: essays in sociology. Routledge.
[291]
Weber, M. and Fischoff, E. 2013. Economy and society: an outline of interpretive sociology. University of California Press.
[292]
Weber, M. and Fischoff, E. 2013. Economy and society: an outline of interpretive sociology. University of California Press.
[293]
West, N. 1986. GCHQ: the secret wireless war, 1900-86. Weidenfeld and Nicolson.
[294]
Westerfield, B. American exceptionalism and American intelligence. Freedom Review. 28, Issue 2.
[295]
Westerfield, H.B. 1996. America and the world of intelligence liaison. Intelligence and National Security. 11, 3 (Jul. 1996), 523–560. DOI:https://doi.org/10.1080/02684529608432375.
[296]
Wirtz, J.J. 2013. Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence. 26, 3 (Sep. 2013), 550–562. DOI:https://doi.org/10.1080/08850607.2013.780558.
[297]
Wise, D. 1988. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. Random House.
[298]
Zegart, A.B. 2006. An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly. 121, 1 (2006).
[299]
Zorn, E.L. Israel’s Quest for Satellite Intelligence.
[300]
2001. Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 16, 1 (2001).
[301]
2002. Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs. (Sep. 2002).