1.
Agrell W. When everything is intelligence - nothing is intelligence. https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
2.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
3.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
4.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
5.
Shulsky AN, Schmitt GJ. Silent Warfare: Understanding the World of Intelligence. 3rd ed. Potomac Books, Inc; 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
6.
Warner M. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf
7.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
8.
Berkowitz BD, Goodman AE. Strategic Intelligence for American National Security. Princeton University Press; 1989.
9.
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. In: Best Truth: Intelligence in the Information Age. Yale University Press; 2000:58-98. https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099
10.
Davies PHJ. Ideas of Intelligence. Harvard International Review. 2002;24(Issue 3). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
11.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
12.
Farson S. Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies. 1989;9(2). https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914
13.
Herman M. Intelligence and policy: A comment. Intelligence and National Security. 1991;6(1):229-239. doi:10.1080/02684529108432098
14.
Herman M. Intelligence Services in the Information Age: Theory and Practice. Frank Cass; 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
15.
Hibbert R. Intelligence and policy. Intelligence and National Security. 1990;5(1):110-128. doi:10.1080/02684529008432037
16.
The Intelligence and Security Committee of Parliament. Annual Report 2003-2004. http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
17.
Laqueur W. World of secrets: the uses and limits of intelligence. In: World of Secrets: The Uses and Limits of Intelligence. Weidenfeld and Nicolson; 1985:20-27. https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099
18.
Omand D. Securing the State. Hurst; 2010. http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
19.
Robertson KG. Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies. 1987;7(2). https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825
20.
Turner MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004;17(1):42-61. doi:10.1080/08850600490252650
21.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
22.
Berkowitz BD, Goodman AE. Strategic Intelligence for American National Security. Princeton University Press; 1989.
23.
Phythian M, ed. Understanding the Intelligence Cycle. Routledge, Taylor & Francis Group; 2014. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543
24.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
25.
Evans G. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 2009;9(1):22-46. doi:10.1080/14702430701811987
26.
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 2006;21(6):959-979. doi:10.1080/02684520601046291
27.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing Intelligence: Origins, Obstacles, and Innovations. Georgetown University Press; 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
28.
The Development, Concepts and Doctrine Centre. Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
29.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
30.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
31.
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 2006;19(4):577-585. doi:10.1080/08850600600829767
32.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
33.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
34.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
35.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
36.
Pribbenow ML. The Man in the Snow White Cell. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
37.
Intelligence Science Board. Educing Information - Interrogation: Science and Art. Published online 2006. http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf
38.
Jeffery K. MI6: The History of the Secret Intelligence Service, 1909-1949. Bloomsbury; 2011.
39.
Jones K. From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 2000;15(4):60-80. doi:10.1080/02684520008432628
40.
Royden BG. Tolkachev, A Worthy Successor to Penkovsky. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
41.
Shulsky AN, Schmitt GJ. Silent Warfare: Understanding the World of Intelligence. 3rd ed. Potomac Books, Inc; 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
42.
Aid MM. All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security. 2003;18(4):72-120. doi:10.1080/02684520310001688880
43.
Diffie W, Landau S. Brave New World of Wiretapping. Scientific American. 2008;299(3):56-63. doi:10.1038/scientificamerican0908-56
44.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
45.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
46.
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 2001;16(1). https://www.tandfonline.com/toc/fint20/16/1?nav=tocList
47.
Aldrich RJ. GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. Harper Press; 2010.
48.
Alvarez D, ed. Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 1999;14(1). https://www.tandfonline.com/toc/fint20/14/1?nav=tocList
49.
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 2000;15(1):169-176. doi:10.1080/02684520008432591
50.
Bamford J. Body of Secrets: How America’s NSA and Britain’s GCHQ Eavesdrop on the World. Century; 2001.
51.
Clayton A. The Enemy Is Listening. Ballantine; 1982.
52.
Day DA. Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence. 2004;17(3):449-467. doi:10.1080/08850600490446835
53.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
54.
Lewin R. The American Magic: Codes, Ciphers, and the Defeat of Japan. Farrar Straus Giroux; 1982.
55.
Richelson J, Ball D. The Ties That Bind: Intelligence Cooperation between the UKUSA Countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Allen & Unwin; 1985.
56.
Rudner M. Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security. 2007;22(4):473-490. doi:10.1080/02684520701640449
57.
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. In: New Cloak, Old Dagger: How Britain’s Spies Came in from the Cold. V. Gollancz; 1996:165-177. https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099
58.
West N. GCHQ: The Secret Wireless War, 1900-86. Weidenfeld and Nicolson; 1986.
59.
Anderson D. A question of trust: report of the investigatory powers review - GOV.UK. Published online 2015:49-70. https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review
60.
Intelligence and Security Committee (ISC). Privacy and Security: A modern and transparent legal framework. Published online 2015. http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf
61.
Royal United Services Institute (RUSI). A Democratic Licence to Operate: Report of the Independent Surveillance Review. Published online 2015. https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf
62.
Stoll C. The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube. https://www.youtube.com/watch?v=EcKxaq1FTac
63.
Stoll C. The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage. Pan Books; 1991.
64.
UK Government. The Investigatory Powers Act 2015 - GOV.UK. https://www.gov.uk/government/collections/investigatory-powers-bill
65.
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History. Published online 2011. https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
66.
Brugioni DA. The art and science of photoreconnaissance. Scientific American. 1AD;(3):78-85. doi:10.1038/scientificamerican0396-78
67.
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 2017;32(6):768-781. doi:10.1080/02684527.2017.1294372
68.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
69.
Johnson-Freese J, Gatling L. Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security. 2004;19(3):538-552. doi:10.1080/0268452042000316278
70.
Oxlee GJ. Aerospace Reconnaissance. Brassey’s; 1997.
71.
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 2009;35(04). doi:10.1017/S0260210509990386
72.
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the Front: Allied Aerial Reconnaissance and Photographic Interpretation on the Western Front--World War I. Center for Strategic Intelligence Research, National Defense Intelligence College; 2006.
73.
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Published online 2010. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
74.
RSPSoc - Home. http://rspsoc.org.uk/
75.
Short N. ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine). https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
76.
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
77.
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
78.
Zorn EL. Israel’s Quest for Satellite Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
79.
Davies PHJ. INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society. 1999;2(2):115-133. doi:10.1080/136911899359664
80.
Omand D, Bartlett J, Miller C. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 2012;27(6):801-823. doi:10.1080/02684527.2012.716965
81.
Richards P, Won-Young K. MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American. 2009;300(Issue 3):70-77. doi:10.1038/scientificamerican0309-70
82.
Richelson JT. MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence. 2001;14(2):149-192. doi:10.1080/088506001300063136
83.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
84.
Denning DER. Information Warfare and Security. ACM Press; 1999.
85.
Mitnick KD, Simon WL. The Art of Intrusion: The Real Stories behind the Exploits of Hackers, Intruders, & Deceivers. Wiley; 2005. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834
86.
Omand SD, Bartlett J, Carl Miller. #INTELLIGENCE. Published online 2012. https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf
87.
Shoham D, Jacobsen SM. Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence. 2007;20(1):79-105. doi:10.1080/08850600600889027
88.
Stoll C. The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage. Doubleday; 1989.
89.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
90.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
91.
bellingcat - MH17 - The Open Source Evidence - bellingcat. https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
92.
Johnson LK. Spies. Foreign Policy. 2000;(120). doi:10.2307/1149708
93.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
94.
Olcott A. Open Source Intelligence in a Networked World. Continuum; 2012. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554
95.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
96.
Stottlemyre SA. HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence. 2015;28(3):578-589. doi:10.1080/08850607.2015.992760
97.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know Your Enemy: How the Joint Intelligence Committee Saw the World. John Murray; 2002:290-303. https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099
98.
Davis J. The Kent-Kendall Debate of 1949. Studies in Intelligence. Published online 1991:91-101. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf
99.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
100.
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 2007;20(3):401-414. doi:10.1080/08850600701249733
101.
Watanabe F. Fifteen Axioms for Intelligence Analysts (U). Studies in Intelligence. Published online 1997:45-47. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
102.
Clark RM. Intelligence Analysis : A Target-Centric Approach. Fifth edition. CQ Press; 2016.
103.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know Your Enemy: How the Joint Intelligence Committee Saw the World. John Murray; 2002:281-289. https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099
104.
Davis J. Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency. Occasional Papers. Published September 2002. https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
105.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing Intelligence: Origins, Obstacles, and Innovations. Georgetown University Press; 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
106.
Godson R. Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc; 1980. https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2
107.
Lowenthal MM, Marks RA. Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence. 2015;28(4):662-665. doi:10.1080/08850607.2015.1051410
108.
Marrin S. Improving Intelligence Analysis: Bridging the Gap between Scholarship and Practice. Routledge; 2011.
109.
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 2008;21(1):1-12. doi:10.1080/08850600701648652
110.
Rovner J. Fixing the Facts: National Security and the Politics of Intelligence. Cornell University Press; 2015. http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
111.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
112.
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 2000;15(3):55-76. doi:10.1080/02684520008432617
113.
Johnson LK. Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly. 1989;33(1). doi:10.2307/2600495
114.
HICKS DB. Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence. 2005;18(2):246-261. doi:10.1080/08850600590911954
115.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
116.
Daugherty WJ. Executive Secrets: Covert Action and the Presidency. Pbk ed. The University Press of Kentucky; 2006. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194
117.
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 2005;20(3):486-508. doi:10.1080/02684520500269010
118.
Gustafson K. Hostile Intent: U.S. Covert Operations in Chile, 1964-1974. 1st ed. Potomac; 2007. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site
119.
HOLLAND M. Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 2004;17(2):300-332. doi:10.1080/08850600490274935
120.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
121.
LE GALLO A. Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence. 2005;18(2):354-359. doi:10.1080/08850600590884810
122.
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter Fruit: The Story of the American Coup in Guatemala. Vol 3. Rev. ed. Harvard University Press; 2005.
123.
Shulsky AN, Schmitt GJ. Silent Warfare: Understanding the World of Intelligence. 3rd ed. Potomac Books, Inc; 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
124.
Steiner JE. Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence. 2006;19(1):156-165. doi:10.1080/08850600500332532
125.
Treverton G. Covert Action: The CIA and the Limits of American Intervention in the Postwar World. Tauris; 1988.
126.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
127.
Fischer B. Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence. 2011;24(2):268-306. doi:10.1080/08850607.2011.548205
128.
Kramer LA, Heuer RJ. America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence. 2007;20(1):50-64. doi:10.1080/08850600600888698
129.
Northcott C. The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence. 2007;20(3):453-479. doi:10.1080/08850600701249758
130.
Olson JM. The Ten Commandments of Counterintelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
131.
Bellows RI. Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation. https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
132.
Brook-Shepherd G. The Storm Birds: Soviet Postwar Defectors. Weidenfield and Nicolson; 1988.
133.
Glees A. The Secrets of the Service: British Intelligence and Communist Subversion 1939-51. Cape; 1987.
134.
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence Requirements for the 1980’s: Domestic Intelligence, Vol. 6].; 1986.
135.
Hinsley FH, Simkins CAG. British Intelligence in the Second World War: Vol. 4: Security and Counter-Intelligence. H.M.S.O.
136.
Hunter RW. Spy Hunter: Inside the FBI Investigation of the Walker Espionage Case. Naval Institute Press; 1999.
137.
Shulsky AN, Schmitt GJ. Silent Warfare: Understanding the World of Intelligence. 3rd ed. Potomac Books, Inc; 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
138.
Wise D. The Spy Who Got Away: The inside Story of Edward Lee Howard, the CIA Agent Who Betrayed His Country and Escaped to Moscow. Random House; 1988.
139.
Davies PHJ. The Missing Dimension’s Missing Dimension. Public Policy and Administration. 2010;25(1):5-9. doi:10.1177/0952076709347071
140.
Gill P, Marrin S, Phythian M. Intelligence Theory: Key Questions and Debates. Routledge; 2009. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
141.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
142.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
143.
Davies PHJ. MI6 and the Machinery of Spying. Frank Cass; 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
144.
Orton JD, Callahan JL. Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence. 1995;8(4):411-429. doi:10.1080/08850609508435296
145.
Riebling M. Wedge: From Pearl Harbor to 9/11 : How the Secret War between the FBI and CIA Has Endangered National Security. 1st Touchstone ed., Updated with a new epilogue. Simon & Schuster; 2002.
146.
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. Norton; 2004. https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
147.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
148.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
149.
Pringle RW. Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 2004;17(1):113-123. doi:10.1080/08850600490252687
150.
Thomas ST. The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence. 1999;12(4):399-413. doi:10.1080/088506099304972
151.
Weber M, Gerth H, Mills CW. From Max Weber: Essays in Sociology. New ed. Routledge; 1991.
152.
Blau PM. The Dynamics of Bureaucracy: A Study of Interpersonal Relations in Two Government Agencies. 2nd ed. University of Chicago Press; 1963.
153.
Dandeker C. Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. Polity; 1990.
154.
Morgan G. Images of Organization. Sage; 1986.
155.
Parker GM. Cross-Functional Teams: Working with Allies, Enemies, and Other Strangers. 2nd ed., completely revised and updated. Jossey-Bass; 2003. http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
156.
Powell WW, DiMaggio PJ. The New Institutionalism in Organizational Analysis. University of Chicago Press; 1991.
157.
Weber M, Fischoff E. Economy and Society: An Outline of Interpretive Sociology. (Roth G, Wittich C, eds.). University of California Press; 2013.
158.
Weber M, Fischoff E. Economy and Society: An Outline of Interpretive Sociology. (Roth G, Wittich C, eds.). University of California Press; 2013.
159.
Pugh DS. Organization Theory: Selected Classic Readings. 5th ed. Penguin; 2007.
160.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
161.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
162.
Burns T, Stalker GM. The Management of Innovation. Rev. ed. Oxford University Press; 1994.
163.
Cringely RX. Accidental Empires: How the Boys of Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Can’t Get a Date. Viking; 1992.
164.
Knight K. Matrix management. In: Matrix Management. Gower Press; 1977:1-12. https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099
165.
Lawrence PR, Lorsch JW, Harvard University. Graduate School of Business Administration. Organization and Environment: Managing Differentiation and Integration. Division of Research, Graduate School of Business Administration, Harvard University; 1967.
166.
Lorsch JW, Allen SA. Managing Diversity and Interdependence: An Organizational Study of Multidivisional Firms. Harvard University, Graduate School of Business Administration, Division of Research; 1973.
167.
Pitt D, Smith BC. Government Departments: An Organizational Perspective. Routledge and Kegan Paul; 1981.
168.
Allison GT. Conceptual Models and the Cuban Missile Crisis. American Political Science Review. 1969;63(03):689-718. doi:10.2307/1954423
169.
Cohen MD, March JG, Olsen JP. A Garbage Can Model of Organizational Choice. Administrative Science Quarterly. 1972;17(1). doi:10.2307/2392088
170.
Davies PHJ. Intelligence and the Machinery of Government. Public Policy and Administration. 2010;25(1):29-46. doi:10.1177/0952076709347073
171.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
172.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 2: Evolution of the UK Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
173.
Kaufman SJ. Organizational Politics and Change in Soviet Military Policy. World Politics. 1994;46(03):355-382. doi:10.2307/2950686
174.
Smith MJ. Intelligence and the Core Executive. Public Policy and Administration. 2010;25(1):11-28. doi:10.1177/0952076709347072
175.
Zegart AB. An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly. 2006;121(1). https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents
176.
Allison GT, Zelikow P. Essence of Decision: Explaining the Cuban Missile Crisis. 2nd ed. Longman; 1999.
177.
Cyert RM, March JG. A Behavioral Theory of the Firm. 2nd ed. Blackwell; 1992.
178.
Davies PHJ. MI6 and the Machinery of Spying. Frank Cass; 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
179.
Michael T. Hannan and John Freeman. The Population Ecology of Organizations. American Journal of Sociology. 1977;82(5). https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents
180.
Mescall PN. A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence. 1994;7(3):251-274. doi:10.1080/08850609408435250
181.
Morgan G. Images of Organization. Sage; 1986.
182.
Posen B. The Sources of Military Doctrine: France, Britain, and Germany between the World Wars. Cornell University Press; 1984. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658
183.
Powell WW, DiMaggio PJ. The New Institutionalism in Organizational Analysis. University of Chicago Press; 1991.
184.
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, Cabinet and Core Executive. Macillan; 1995.
185.
Smith MJ. The Core Executive in Britain. Macmillan; 1999.
186.
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs. Published online September 2002. https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/
187.
Shukman H. Agents for change: intelligence services in the 21st century. In: Agents for Change: Intelligence Services in the 21st Century. St Ermin’s; 2000:1-46. https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099
188.
Chapman B. Police state. In: Police State. Macmillan; 1971:106-115. https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099
189.
Dziak JJ. Chekisty: a history of the KGB. In: Chekisty: A History of the KGB. Lexington Books; 1988:1-17. https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099
190.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International; 2008.
191.
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: The inside Story of Its Foreign Operations from Lenin to Gorbachev. Hodder & Stoughton; 1990:1-18. https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099
192.
Andrew CM, Gordievsky O. KGB: The inside Story of Its Foreign Operations from Lenin to Gorbachev. Hodder & Stoughton; 1990.
193.
Bettina Renz. Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies. 2006;58(6). doi:10.1080/0966813060031134
194.
Raeff M. The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review. 1975;80(5). doi:10.2307/1852058
195.
Rathmell A. Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies. 1996;16(2). https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636
196.
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 2004;17(3):495-520. doi:10.1080/0955757042000298188
197.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
198.
Duyvesteyn I. Intelligence and Strategic Culture: Some Observations. Intelligence and National Security. 2011;26(4):521-530. doi:10.1080/02684527.2011.580605
199.
Gray CS. Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies. 1999;25(1). https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents
200.
Pugh DS. Organization theory: selected classic readings. In: Organization Theory: Selected Classic Readings. 5th ed. Penguin; 2007:223-252. https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099
201.
Morgan G. Images of organization. In: Images of Organization. Sage; 1986:111-140. https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099
202.
TURNER MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004;17(1):42-61. doi:10.1080/08850600490252650
203.
Westerfield B. American exceptionalism and American intelligence. Freedom Review. 28(Issue 2). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
204.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
205.
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security. 1996;11(3):523-560. doi:10.1080/02684529608432375
206.
Aldrich RJ. Dangerous Liaisons. Harvard International Review. 2002;24(Issue 3). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
207.
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence. 1990;4(3):307-323. doi:10.1080/08850609008435147
208.
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 2006;19(2):195-217. doi:10.1080/08850600500483657
209.
Walsh JI. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy. 2007;27(2). doi:10.1017/S0143814X07000682
210.
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 2004;17(3):481-493. doi:10.1080/0955757042000296964
211.
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 1998;13(2):123-143. doi:10.1080/02684529808432480
212.
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2004;17(4):601-613. doi:10.1080/08850600490446736
213.
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence. 1991;5(4):455-465. doi:10.1080/08850609108435194
214.
LEFEBVRE S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2003;16(4):527-542. doi:10.1080/716100467
215.
MÜLLER-WILLE B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 2007;46(1):49-73. doi:10.1111/j.1468-5965.2007.00767.x
216.
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 2002;23(2):61-86. doi:10.1080/713999737
217.
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 2004;17(2):193-230. doi:10.1080/08850600490274890
218.
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 2016;31(3):345-368. doi:10.1080/02684527.2014.998436
219.
Warner M. Transformation and Intelligence Liaison. SAIS Review. 2004;24(1):77-89. doi:10.1353/sais.2004.0024
220.
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 2009;11(1):122-139. doi:10.1111/j.1467-856x.2008.00353.x
221.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
222.
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 2016;29(1):110-131. doi:10.1080/08850607.2015.1083337
223.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
224.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
225.
Hastedt GP. Towards the Comparative Study of Intelligence. Journal of Conflict Studies. 1991;11(3). https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035
226.
O’Connell KM. Thinking About Intelligence Comparatively. Brown Journal of World Affairs. 2004;11(Issue 1):189-111. https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049
227.
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing Foreign Intelligence: The U.S., the USSR, the U.K., & the Third World. Pergamon-Brassey’s International Defense Publishers; 1988:115-155. https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099
228.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 1: Evolution of the U.S. Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
229.
Davies PHJ. Intelligence and Government in Britain and the United States: A Comparative Perspective, Volume 2: Evolution of the UK Intelligence Community. Praeger; 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
230.
Gill P. Policing Politics: Security Intelligence and the Liberal Democratic State. F. Cass; 1994. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
231.
Herman M. Intelligence Services in the Information Age: Theory and Practice. Frank Cass; 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
232.
Skocpol T. Explaining Social Revolutions: Alternatives to Existing Theories. In: States and Social Revolutions: A Comparative Analysis of France, Russia and China. Cambridge University Press; 1979:3-43. https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099
233.
Eftimiades N. China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies. 1992;1992(2). https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/
234.
Inkster N. Chinese Intelligence in the Cyber Age. Survival. 2013;55(1):45-66. doi:10.1080/00396338.2013.767405
235.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
236.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume  1: The Americas and Asia. Praeger Security International; 2008.
237.
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 2017;30(3):522-531. doi:10.1080/08850607.2017.1263529
238.
India. Kargil Review Committee. From Surprise to Reckoning. Sage Publications; 2000.
239.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume  1: The Americas and Asia. Praeger Security International; 2008.
240.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
241.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International; 2008.
242.
Katzman K. Iran: Politics, Human Rights, and U.S. Policy. Vol RL32048. Congressional Research Service
243.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
244.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume  1: The Americas and Asia. Praeger Security International; 2008.
245.
Kobayashi Y. Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence. 2015;28(4):717-733. doi:10.1080/08850607.2015.1051453
246.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
247.
Farson AS, Praeger Security International. PSI Handbook of Global Security and Intelligence: National Approaches, Volume  1: The Americas and Asia. Praeger Security International; 2008.
248.
Davies PHJ, Gustafson K. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere. Georgetown University Press; 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
249.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and Administrative Law. 15th ed. Pearson Longman; 2011:481-486. https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099
250.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and Administrative Law. 15th ed. Pearson Longman; 2011:553-562. https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099
251.
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. Published online 2009. https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5
252.
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. Published online 2007. https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16
253.
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review. 2013;2(2). https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php
254.
European Court of Human Rights - ECHR, CEDH, news, information, press releases. https://www.echr.coe.int/Pages/home.aspx?p=home
255.
John Wadham. The Intelligence Services Act 1994. The Modern Law Review. 1994;57(6). https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents
256.
Aldrich RJ. Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security. 2009;24(1):26-56. doi:10.1080/02684520902756812
257.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
258.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007;22(1):14-37. doi:10.1080/02684520701200756
259.
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 2006;21(5):848-883. doi:10.1080/02684520600957787
260.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
261.
Baldino D. Democratic Oversight of Intelligence Services. Federation Press; 2010.
262.
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies.
263.
Gill P. Policing Politics: Security Intelligence and the Liberal Democratic State. F. Cass; 1994. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
264.
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security. 1996;11(2):313-331. doi:10.1080/02684529608432359
265.
Glees A, Davies PHJ, Morrison JNL, Social Affairs Unit. The Open Side of Secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit; 2006.
266.
U.S. House of Representatives Permanent Select Committee on Intelligence. https://intelligence.house.gov/
267.
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/
268.
Johnson LK. A Season of Inquiry: The Senate Intelligence Investigation. University Press of Kentucky; 1985.
269.
Johnson LK. Handbook of Intelligence Studies. Routledge; 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
270.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
271.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
272.
REMPEL R. Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence. 2004;17(4):634-654. doi:10.1080/08850600490496443
273.
Robertson KG. Accountable Intelligence—The British Experience. Journal of Conflict Studies. 1988;8(1). https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
274.
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 1998;13(2):144-158. doi:10.1080/02684529808432481
275.
Security Intelligence Review Committee (Canada). http://www.sirc-csars.gc.ca/
276.
U.S. Senate Select Committee on Intelligence. https://www.intelligence.senate.gov/
277.
Bar-Joseph U. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 2011;24(1):22-43. doi:10.1080/08850607.2011.519222
278.
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 2017;32(4):479-493. doi:10.1080/02684527.2016.1270622
279.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. In: Secret Intelligence: A Reader. Routledge; 2009:395-410. https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099
280.
Omand SD, Phythian M. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 2013;26(1):38-63. doi:10.1080/08850607.2012.705186
281.
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 2007;22(1):1-13. doi:10.1080/02684520701200715
282.
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 2016;29(4):760-784. doi:10.1080/08850607.2016.1177399
283.
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005;18(3):398-434. doi:10.1080/08850600590945399
284.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
285.
Herman M. Intelligence Services in the Information Age: Theory and Practice. Frank Cass; 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
286.
Olson JM. Fair Play: The Moral Dilemmas of Spying. Potomac Books, Inc; 2008. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049
287.
Perry DL. ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies. 1995;15(1). https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438
288.
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004;3(1):1-15. doi:10.1080/15027570310004447
289.
Andrew CM, Aldrich RJ, Wark WK. Secret Intelligence: A Reader. Routledge; 2009.
290.
Shulsky AN, Schmitt GJ. Silent Warfare: Understanding the World of Intelligence. 3rd ed. Potomac Books, Inc; 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
291.
Butler of Brockwell FERB, Great Britain. Privy Council, Great Britain. Parliament. House of Commons. Review of Intelligence on Weapons of Mass Destruction. Vol 898. The Stationery Office; 2004. https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
292.
Davies PHJ. A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
293.
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. Published online 10 July 2017:1-15. doi:10.1080/02684527.2017.1328860
294.
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. Published online 10 July 2017:1-15. doi:10.1080/02684527.2017.1328860
295.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
296.
Grabo CM. Anticipating Surprise: Analysis for Strategic Warning.; 2002. https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf
297.
Herman M. Intelligence Power in Peace and War. Royal Institute of International Affairs; 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
298.
Hughes-Wilson J. Military Intelligence Blunders and Cover-Ups. Rev. and updated ed. Robinson; 2004. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
299.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured Analytic Techniques for Intelligence Analysis. Second Edition. SAGE; 2015:119-121. https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099
300.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured Analytic Techniques for Intelligence Analysis. Second Edition. SAGE; 2015:133-140. https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099
301.
Wirtz JJ. Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence. 2013;26(3):550-562. doi:10.1080/08850607.2013.780558