Agrell, W. (n.d.). When everything is intelligence - nothing is intelligence. Central Intelligence Agency. https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
Aid, M. M. (2003). All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security, 18(4), 72–120. https://doi.org/10.1080/02684520310001688880
Aldrich, R. J. (2002). Dangerous Liaisons. Harvard International Review, 24(Issue 3). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
Aldrich, R. J. (2009a). Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security, 24(1), 26–56. https://doi.org/10.1080/02684520902756812
Aldrich, R. J. (2009b). US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations, 11(1), 122–139. https://doi.org/10.1111/j.1467-856x.2008.00353.x
Aldrich, R. J. (2010). GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press.
Allison, G. T. (1969). Conceptual Models and the Cuban Missile Crisis. American Political Science Review, 63(03), 689–718. https://doi.org/10.2307/1954423
Allison, G. T., & Zelikow, P. (1999). Essence of decision: explaining the Cuban Missile Crisis (2nd ed). Longman.
Alvarez, D. (Ed.). (1999). Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 14(1). https://www.tandfonline.com/toc/fint20/14/1?nav=tocList
Alvarez, D. (2000). American signals intelligence and the Cuban missile crisis. Intelligence and National Security, 15(1), 169–176. https://doi.org/10.1080/02684520008432591
Anderson, D. (2015). A question of trust: report of the investigatory powers review - GOV.UK (pp. 49–70). https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009a). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009b). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009c). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009d). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009e). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009f). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009g). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009h). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009i). Secret intelligence: a reader. In Secret intelligence: a reader (pp. 395–410). Routledge. https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009j). Secret intelligence: a reader. Routledge.
Andrew, C. M., Aldrich, R. J., & Wark, W. K. (2009k). Secret intelligence: a reader. Routledge.
Andrew, C. M., & Gordievsky, O. (1990a). KGB: the inside story of its foreign operations from Lenin to Gorbachev. In KGB: the inside story of its foreign operations from Lenin to Gorbachev (pp. 1–18). Hodder & Stoughton. https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099
Andrew, C. M., & Gordievsky, O. (1990b). KGB: the inside story of its foreign operations from Lenin to Gorbachev. Hodder & Stoughton.
Baldino, D. (2010). Democratic oversight of intelligence services. Federation Press.
Bamford, J. (2001). Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. Century.
Bar-Joseph, U. (2011). The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 24(1), 22–43. https://doi.org/10.1080/08850607.2011.519222
bellingcat - MH17 - The Open Source Evidence - bellingcat. (n.d.). https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
Bellows, R. I. (n.d.). Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation. https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
Benjamin, V. O. (2007). Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16
Berkowitz, B. (2011). The National Reconnaissance Office at 50 Years: A Brief History. National Reconnaissance Office. https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
Berkowitz, B. D., & Goodman, A. E. (1989a). Strategic intelligence for American national security. Princeton University Press.
Berkowitz, B. D., & Goodman, A. E. (1989b). Strategic intelligence for American national security. Princeton University Press.
Berkowitz, B. D., & Goodman, A. E. (2000). Best truth: intelligence in the information age. In Best truth: intelligence in the information age (pp. 58–98). Yale University Press. https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099
Bettina Renz. (2006). Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies, 58(6). https://doi.org/10.1080/0966813060031134
Blau, P. M. (1963). The dynamics of bureaucracy: a study of interpersonal relations in two government agencies (2nd ed). University of Chicago Press.
Born, H., Leigh, I., & Geneva Centre for the Democratic Control of Armed Forces. (n.d.). Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
Bradley, A. W., & Ewing, K. D. (2011a). Constitutional and administrative law. In Constitutional and administrative law (15th ed, pp. 481–486). Pearson Longman. https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099
Bradley, A. W., & Ewing, K. D. (2011b). Constitutional and administrative law. In Constitutional and administrative law (15th ed, pp. 553–562). Pearson Longman. https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099
Brook-Shepherd, G. (1988). The storm birds: Soviet postwar defectors. Weidenfield and Nicolson.
Brugioni, D. A. (1 C.E.). The art and science of photoreconnaissance. Scientific American, 3, 78–85. https://doi.org/10.1038/scientificamerican0396-78
Burns, T., & Stalker, G. M. (1994). The management of innovation (Rev. ed). Oxford University Press.
Butler of Brockwell, F. E. R. B., Great Britain. Privy Council, & Great Britain. Parliament. House of Commons. (2004). Review of intelligence on weapons of mass destruction (Vol. 898). The Stationery Office. https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
Champion, B. (1998). A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security, 13(2), 123–143. https://doi.org/10.1080/02684529808432480
Chapman, B. (1971). Police state. In Police state (pp. 106–115). Macmillan. https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099
Clark, R. M. (2016). Intelligence analysis : a target-centric approach (Fifth edition). CQ Press.
Clayton, A. (1982). The enemy is listening. Ballantine.
CLOUGH, C. (2004). Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence, 17(4), 601–613. https://doi.org/10.1080/08850600490446736
Cohen, M. D., March, J. G., & Olsen, J. P. (1972). A Garbage Can Model of Organizational Choice. Administrative Science Quarterly, 17(1). https://doi.org/10.2307/2392088
Cradock, P. (2002a). Know your enemy: how the Joint Intelligence Committee saw the world. In Know your enemy: how the Joint Intelligence Committee saw the world (pp. 290–303). John Murray. https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099
Cradock, P. (2002b). Know your enemy: how the Joint Intelligence Committee saw the world. In Know your enemy: how the Joint Intelligence Committee saw the world (pp. 281–289). John Murray. https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099
Cringely, R. X. (1992). Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. Viking.
Crosston, M. (2016). Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence, 29(1), 110–131. https://doi.org/10.1080/08850607.2015.1083337
Cyert, R. M., & March, J. G. (1992). A behavioral theory of the firm (2nd ed). Blackwell.
Dandeker, C. (1990). Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Polity.
Daugherty, W. J. (2006). Executive secrets: covert action and the presidency (Pbk ed). The University Press of Kentucky. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194
David, J. E. (2017). How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security, 32(6), 768–781. https://doi.org/10.1080/02684527.2017.1294372
Davies, P. H. J. (n.d.). A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
Davies, P. H. J. (1999). INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society, 2(2), 115–133. https://doi.org/10.1080/136911899359664
Davies, P. H. J. (2000). From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security, 15(3), 55–76. https://doi.org/10.1080/02684520008432617
Davies, P. H. J. (2002). Ideas of Intelligence. Harvard International Review, 24(Issue 3). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J. (2003a). MI6 and the machinery of spying. Frank Cass. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
Davies, P. H. J. (2003b). MI6 and the machinery of spying. Frank Cass. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
Davies, P. H. J. (2004). Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs, 17(3), 495–520. https://doi.org/10.1080/0955757042000298188
Davies, P. H. J. (2009). Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies, 35(04). https://doi.org/10.1017/S0260210509990386
Davies, P. H. J. (2010a). Intelligence and the Machinery of Government. Public Policy and Administration, 25(1), 29–46. https://doi.org/10.1177/0952076709347073
Davies, P. H. J. (2010b). The Missing Dimension’s Missing Dimension. Public Policy and Administration, 25(1), 5–9. https://doi.org/10.1177/0952076709347071
Davies, P. H. J. (2012a). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012b). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012c). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012d). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012e). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012f). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012g). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012h). Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012i). Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J. (2012j). Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
Davies, P. H. J., & Gustafson, K. (2013a). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2013b). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2013c). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2013d). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2013e). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2013f). Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
Davies, P. H. J., & Gustafson, K. (2017a). Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security, 1–15. https://doi.org/10.1080/02684527.2017.1328860
Davies, P. H. J., & Gustafson, K. (2017b). Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security, 1–15. https://doi.org/10.1080/02684527.2017.1328860
Davis, J. (1991). The Kent-Kendall Debate of 1949. Studies in Intelligence, 91–101. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf
Davis, J. (2002, September). Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency. Occasional Papers. https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
Day, D. A. (2004). Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence, 17(3), 449–467. https://doi.org/10.1080/08850600490446835
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine). (n.d.). https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine). (n.d.). https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
Denning, D. E. R. (1999). Information warfare and security. ACM Press.
Diderichsen, A., & Rønn, K. V. (2017). Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security, 32(4), 479–493. https://doi.org/10.1080/02684527.2016.1270622
Diffie, W., & Landau, S. (2008). Brave New World of Wiretapping. Scientific American, 299(3), 56–63. https://doi.org/10.1038/scientificamerican0908-56
Duyvesteyn, I. (2011). Intelligence and Strategic Culture: Some Observations. Intelligence and National Security, 26(4), 521–530. https://doi.org/10.1080/02684527.2011.580605
Dziak, J. J. (1988). Chekisty: a history of the KGB. In Chekisty: a history of the KGB (pp. 1–17). Lexington Books. https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099
Eftimiades, N. (1992). China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies, 1992(2). https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/
European Court of Human Rights - ECHR, CEDH, news, information, press releases. (n.d.). https://www.echr.coe.int/Pages/home.aspx?p=home
Evans, G. (2009). Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies, 9(1), 22–46. https://doi.org/10.1080/14702430701811987
Farson, A. S. & Praeger Security International. (2008a). PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
Farson, A. S. & Praeger Security International. (2008b). PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
Farson, A. S. & Praeger Security International. (2008c). PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
Farson, A. S. & Praeger Security International. (2008d). PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
Farson, A. S. & Praeger Security International. (2008e). PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International.
Farson, A. S. & Praeger Security International. (2008f). PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International.
Farson, S. (1989). Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies, 9(2). https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914
Finnegan, T. J. & Center for Strategic Intelligence Research (U.S.). (2006). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Center for Strategic Intelligence Research, National Defense Intelligence College.
Fischer, B. (2011). Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence, 24(2), 268–306. https://doi.org/10.1080/08850607.2011.548205
Fraser, A. (2005). Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security, 20(3), 486–508. https://doi.org/10.1080/02684520500269010
Gendron, A. (2005). Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence, 18(3), 398–434. https://doi.org/10.1080/08850600590945399
George, R. Z., Bruce, J. B., & Georgetown University. Center for Peace and Security Studies. (2008a). Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
George, R. Z., Bruce, J. B., & Georgetown University. Center for Peace and Security Studies. (2008b). Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
Gill, P. (1994a). Policing politics: security intelligence and the liberal democratic state. F. Cass. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
Gill, P. (1994b). Policing politics: security intelligence and the liberal democratic state. F. Cass. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
Gill, P. (1996). Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security, 11(2), 313–331. https://doi.org/10.1080/02684529608432359
Gill, P. (2007). Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security, 22(1), 14–37. https://doi.org/10.1080/02684520701200756
Gill, P., Marrin, S., & Phythian, M. (2009). Intelligence theory: key questions and debates. Routledge. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
Glees, A. (1987). The secrets of the service: British intelligence and Communist subversion 1939-51. Cape.
Glees, A., & Davies, P. H. J. (2006). Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security, 21(5), 848–883. https://doi.org/10.1080/02684520600957787
Glees, A., Davies, P. H. J., Morrison, J. N. L., & Social Affairs Unit. (2006). The open side of secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit.
Godson, R. (1980). Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc. https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2
Godson, R. (1988). Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World (pp. 115–155). Pergamon-Brassey’s International Defense Publishers. https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099
Godson, R., National Strategy Information Center, & Consortium for the Study of Intelligence. (1986). Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6].
Goold, B. (2009). Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5
Grabo, C. M. (2002). Anticipating Surprise: Analysis for Strategic Warning. https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf
Gray, C. S. (1999). Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies, 25(1). https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents
Gustafson, K. (2007). Hostile intent: U.S. covert operations in Chile, 1964-1974 (1st ed). Potomac. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site
Hastedt, G. P. (1991). Towards the Comparative Study of Intelligence. Journal of Conflict Studies, 11(3). https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035
Herman, M. (1991). Intelligence and policy: A comment. Intelligence and National Security, 6(1), 229–239. https://doi.org/10.1080/02684529108432098
Herman, M. (1996a). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996b). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996c). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996d). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996e). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996f). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996g). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996h). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996i). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996j). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996k). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996l). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (1996m). Intelligence power in peace and war. Royal Institute of International Affairs. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
Herman, M. (2001a). Intelligence services in the information age: theory and practice. Frank Cass. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
Herman, M. (2001b). Intelligence services in the information age: theory and practice. Frank Cass. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
Herman, M. (2001c). Intelligence services in the information age: theory and practice. Frank Cass. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
Heuer, R. J., & Pherson, R. H. (2015a). Structured analytic techniques for intelligence analysis. In Structured analytic techniques for intelligence analysis (Second Edition, pp. 119–121). SAGE. https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099
Heuer, R. J., & Pherson, R. H. (2015b). Structured analytic techniques for intelligence analysis. In Structured analytic techniques for intelligence analysis (Second Edition, pp. 133–140). SAGE. https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099
Hibbert, R. (1990). Intelligence and policy. Intelligence and National Security, 5(1), 110–128. https://doi.org/10.1080/02684529008432037
HICKS, D. B. (2005). Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence, 18(2), 246–261. https://doi.org/10.1080/08850600590911954
Hinsley, F. H., & Simkins, C. A. G. (n.d.). British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. H.M.S.O.
HOLLAND, M. (2004). Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence, 17(2), 300–332. https://doi.org/10.1080/08850600490274935
Hughes-Wilson, J. (2004). Military intelligence blunders and cover-ups (Rev. and updated ed). Robinson. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
Hulnick, A. S. (1991). Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence, 5(4), 455–465. https://doi.org/10.1080/08850609108435194
Hulnick, A. S. (2006). What’s wrong with the Intelligence Cycle. Intelligence and National Security, 21(6), 959–979. https://doi.org/10.1080/02684520601046291
Hunter, R. W. (1999). Spy hunter: inside the FBI investigation of the Walker espionage case. Naval Institute Press.
India. Kargil Review Committee. (2000). From surprise to reckoning. Sage Publications.
Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival, 55(1), 45–66. https://doi.org/10.1080/00396338.2013.767405
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. (2001). 16(1). https://www.tandfonline.com/toc/fint20/16/1?nav=tocList
Intelligence and Security Committee (ISC). (2015a). Privacy and Security: A modern and transparent legal framework. http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf
Intelligence Science Board. (2006). Educing Information - Interrogation: Science and Art. NDIC Press. http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). (2002). Middle East Review of International Affairs. https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/
Jeffery, K. (2011). MI6: the history of the Secret Intelligence Service, 1909-1949. Bloomsbury.
John Wadham. (1994). The Intelligence Services Act 1994. The Modern Law Review, 57(6). https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents
Johnson, L. K. (1985). A season of inquiry: the Senate intelligence investigation. University Press of Kentucky.
Johnson, L. K. (1989). Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly, 33(1). https://doi.org/10.2307/2600495
Johnson, L. K. (2000). Spies. Foreign Policy, 120. https://doi.org/10.2307/1149708
Johnson, L. K. (2009a). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009b). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009c). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009d). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009e). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009f). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009g). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009h). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009i). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009j). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009k). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009l). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson, L. K. (2009m). Handbook of intelligence studies. Routledge. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
Johnson-Freese, J., & Gatling, L. (2004). Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security, 19(3), 538–552. https://doi.org/10.1080/0268452042000316278
Jones, B. (2013). The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review, 2(2). https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php
Jones, K. (2000). From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security, 15(4), 60–80. https://doi.org/10.1080/02684520008432628
Katz, J. I. (2006). Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence, 19(4), 577–585. https://doi.org/10.1080/08850600600829767
Katzman, K. (n.d.). Iran: politics, human rights, and U.S. policy (Vol. RL32048). Congressional Research Service.
Kaufman, S. J. (1994). Organizational Politics and Change in Soviet Military Policy. World Politics, 46(03), 355–382. https://doi.org/10.2307/2950686
Knight, K. (1977). Matrix management. In Matrix management (pp. 1–12). Gower Press. https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099
Kobayashi, Y. (2015). Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence, 28(4), 717–733. https://doi.org/10.1080/08850607.2015.1051453
Kramer, L. A., & Heuer, R. J. (2007). America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence, 20(1), 50–64. https://doi.org/10.1080/08850600600888698
Lander, S. S. (2004). International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs, 17(3), 481–493. https://doi.org/10.1080/0955757042000296964
Laqueur, W. (1985). World of secrets: the uses and limits of intelligence. In World of secrets: the uses and limits of intelligence (pp. 20–27). Weidenfeld and Nicolson. https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099
Lawrence, P. R., Lorsch, J. W., & Harvard University. Graduate School of Business Administration. (1967). Organization and environment: managing differentiation and integration. Division of Research, Graduate School of Business Administration, Harvard University.
LE GALLO, A. (2005). Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence, 18(2), 354–359. https://doi.org/10.1080/08850600590884810
LEFEBVRE, S. (2003). The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence, 16(4), 527–542. https://doi.org/10.1080/716100467
Lewin, R. (1982). The American magic: codes, ciphers, and the defeat of Japan. Farrar Straus Giroux.
Lorsch, J. W., & Allen, S. A. (1973). Managing diversity and interdependence: an organizational study of multidivisional firms. Harvard University, Graduate School of Business Administration, Division of Research.
Lowenthal, M. M., & Marks, R. A. (2015). Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence, 28(4), 662–665. https://doi.org/10.1080/08850607.2015.1051410
Marrin, S. (2007). At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence, 20(3), 401–414. https://doi.org/10.1080/08850600701249733
Marrin, S. (2011). Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge.
Mescall, P. N. (1994). A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence, 7(3), 251–274. https://doi.org/10.1080/08850609408435250
Michael T. Hannan and John Freeman. (1977). The Population Ecology of Organizations. American Journal of Sociology, 82(5). https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents
Mitnick, K. D., & Simon, W. L. (2005). The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Wiley. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834
Morgan, G. (1986a). Images of organization. Sage.
Morgan, G. (1986b). Images of organization. Sage.
Morgan, G. (1986c). Images of organization. In Images of organization (pp. 111–140). Sage. https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099
Muller, D. G. (2008). Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence, 21(1), 1–12. https://doi.org/10.1080/08850600701648652
Müller-Wille, B. (2002). EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy, 23(2), 61–86. https://doi.org/10.1080/713999737
MÜLLER-WILLE, B. (2007). The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies, 46(1), 49–73. https://doi.org/10.1111/j.1468-5965.2007.00767.x
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. Norton. https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
Northcott, C. (2007). The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence, 20(3), 453–479. https://doi.org/10.1080/08850600701249758
O’Connell, K. M. (2004). Thinking About Intelligence Comparatively. Brown Journal of World Affairs, 11(Issue 1), 189–111. https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049
Olcott, A. (2012). Open source intelligence in a networked world. Continuum. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554
Olson, J. M. (n.d.). The Ten Commandments of Counterintelligence. Central Intelligence Agency. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
Olson, J. M. (2008). Fair play: the moral dilemmas of spying. Potomac Books, Inc. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049
Omand, D. (2010). Securing the state. Hurst. http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
Omand, D., Bartlett, J., & Miller, C. (2012). Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security, 27(6), 801–823. https://doi.org/10.1080/02684527.2012.716965
Omand, S. D., Bartlett, J., & Carl Miller. (2012). #INTELLIGENCE. Demos. https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf
Omand, S. D., & Phythian, M. (2013). Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence, 26(1), 38–63. https://doi.org/10.1080/08850607.2012.705186
Orton, J. D., & Callahan, J. L. (1995). Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence, 8(4), 411–429. https://doi.org/10.1080/08850609508435296
Oxlee, G. J. (1997). Aerospace reconnaissance. Brassey’s.
Parker, G. M. (2003). Cross-functional teams: working with allies, enemies, and other strangers (2nd ed., completely revised and updated). Jossey-Bass. http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
Perry, D. L. (1995). ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies, 15(1). https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438
Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1–15. https://doi.org/10.1080/15027570310004447
Phythian, M. (Ed.). (2014). Understanding the intelligence cycle. Routledge, Taylor & Francis Group. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543
Pitt, D., & Smith, B. C. (1981). Government departments: an organizational perspective. Routledge and Kegan Paul.
Posen, B. (1984). The sources of military doctrine: France, Britain, and Germany between the world wars. Cornell University Press. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658
Powell, W. W., & DiMaggio, P. J. (1991a). The new institutionalism in organizational analysis. University of Chicago Press.
Powell, W. W., & DiMaggio, P. J. (1991b). The new institutionalism in organizational analysis. University of Chicago Press.
Pribbenow, M. L. (n.d.). The Man in the Snow White Cell. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
Pringle, R. W. (2004). Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence, 17(1), 113–123. https://doi.org/10.1080/08850600490252687
Pugh, D. S. (2007a). Organization theory: selected classic readings (5th ed). Penguin.
Pugh, D. S. (2007b). Organization theory: selected classic readings. In Organization theory: selected classic readings (5th ed, pp. 223–252). Penguin. https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099
Quinlan, M. (2007). Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security, 22(1), 1–13. https://doi.org/10.1080/02684520701200715
Radcliffe, W. W. (2010). Origins and Current State of Japan’s Reconnaissance Satellite Program (U). https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
Raeff, M. (1975). The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review, 80(5). https://doi.org/10.2307/1852058
Rathmell, A. (1996). Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies, 16(2). https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636
REMPEL, R. (2004). Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence, 17(4), 634–654. https://doi.org/10.1080/08850600490496443
Rhodes, R. A. W. (Roderick A. W., & Dunleavy, P. (1995). Prime Minister, cabinet and core executive. Macillan.
Richards, P., & Won-Young, K. (2009). MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American, 300(Issue 3), 70–77. https://doi.org/10.1038/scientificamerican0309-70
Richelson, J., & Ball, D. (1985). The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Allen & Unwin.
Richelson, J. T. (1990). The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 4(3), 307–323. https://doi.org/10.1080/08850609008435147
Richelson, J. T. (2001). MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence, 14(2), 149–192. https://doi.org/10.1080/088506001300063136
Riebling, M. (2002). Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security (1st Touchstone ed., Updated with a new epilogue). Simon & Schuster.
Robertson, K. G. (1987). Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies, 7(2). https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825
Robertson, K. G. (1988). Accountable Intelligence—The British Experience. Journal of Conflict Studies, 8(1). https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
Robertson, K. G. (1998). Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security, 13(2), 144–158. https://doi.org/10.1080/02684529808432481
Rovner, J. (2015). Fixing the facts: national security and the politics of intelligence. Cornell University Press. http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
Royal United Services Institute (RUSI). (2015b). A Democratic Licence to Operate: Report of the Independent Surveillance Review. Royal United Services Institute (RUSI). https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf
Royden, B. G. (n.d.). Tolkachev, A Worthy Successor to Penkovsky. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
RSPSoc - Home. (n.d.). http://rspsoc.org.uk/
RUDNER, M. (2004). Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence, 17(2), 193–230. https://doi.org/10.1080/08850600490274890
Rudner, M. (2007). Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security, 22(4), 473–490. https://doi.org/10.1080/02684520701640449
Schlesinger, S. C., Kinzer, S., & Coatsworth, J. H. (2005). Bitter fruit: the story of the American coup in Guatemala (Rev. ed, Vol. 3). Harvard University Press.
Security Intelligence Review Committee (Canada). (n.d.). http://www.sirc-csars.gc.ca/
Shaffer, R. (2017). Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence, 30(3), 522–531. https://doi.org/10.1080/08850607.2017.1263529
Shoham, D., & Jacobsen, S. M. (2007). Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence, 20(1), 79–105. https://doi.org/10.1080/08850600600889027
Short, N. (n.d.). ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine). https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
Shukman, H. (2000). Agents for change: intelligence services in the 21st century. In Agents for change: intelligence services in the 21st century (pp. 1–46). St Ermin’s. https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099
Shulsky, A. N., & Schmitt, G. J. (2002a). Silent warfare: understanding the world of intelligence (3rd ed). Potomac Books, Inc. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
Shulsky, A. N., & Schmitt, G. J. (2002b). Silent warfare: understanding the world of intelligence (3rd ed). Potomac Books, Inc. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
Shulsky, A. N., & Schmitt, G. J. (2002c). Silent warfare: understanding the world of intelligence (3rd ed). Potomac Books, Inc. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
Shulsky, A. N., & Schmitt, G. J. (2002d). Silent warfare: understanding the world of intelligence (3rd ed). Potomac Books, Inc. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
Shulsky, A. N., & Schmitt, G. J. (2002e). Silent warfare: understanding the world of intelligence (3rd ed). Potomac Books, Inc. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
Sims, J. E. (2006). Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence, 19(2), 195–217. https://doi.org/10.1080/08850600500483657
Skocpol, T. (1979). Explaining Social Revolutions: Alternatives to Existing Theories. In States and social revolutions: a comparative analysis of France, Russia and China (pp. 3–43). Cambridge University Press. https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099
Smith, M. (1996). New cloak, old dagger: how Britain’s spies came in from the cold. In New cloak, old dagger: how Britain’s spies came in from the cold (pp. 165–177). V. Gollancz. https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099
Smith, M. J. (1999). The core executive in Britain. Macmillan.
Smith, M. J. (2010). Intelligence and the Core Executive. Public Policy and Administration, 25(1), 11–28. https://doi.org/10.1177/0952076709347072
Steiner, J. E. (2006). Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence, 19(1), 156–165. https://doi.org/10.1080/08850600500332532
Stoll, C. (n.d.). The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube. https://www.youtube.com/watch?v=EcKxaq1FTac
Stoll, C. (1989). The cuckoo’s egg: tracking a spy through the maze of computer espionage. Doubleday.
Stoll, C. (1991). The cuckoo’s egg: tracking a spy through the maze of computer espionage. Pan Books.
Stottlemyre, S. A. (2015). HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence, 28(3), 578–589. https://doi.org/10.1080/08850607.2015.992760
The Development, Concepts and Doctrine Centre. (n.d.-a). Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
The Intelligence and Security Committee of Parliament. (n.d.-b). Annual Report 2003-2004. TSO. http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
The Intelligence and Security Committee of Parliament. (n.d.). http://isc.independent.gov.uk/
Thomas, S. T. (1999). The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence, 12(4), 399–413. https://doi.org/10.1080/088506099304972
Treverton, G. (1988). Covert action: the CIA and the limits of American intervention in the postwar world. Tauris.
Turner, M. A. (2004). A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence, 17(1), 42–61. https://doi.org/10.1080/08850600490252650
TURNER, M. A. (2004). A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence, 17(1), 42–61. https://doi.org/10.1080/08850600490252650
UK Government. (n.d.-c). The Investigatory Powers Act 2015 - GOV.UK. https://www.gov.uk/government/collections/investigatory-powers-bill
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. (n.d.-a). https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. (n.d.-b). https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. (n.d.-c). https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. (n.d.-d). https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
U.S. House of Representatives Permanent Select Committee on Intelligence. (n.d.). https://intelligence.house.gov/
U.S. Senate Select Committee on Intelligence. (n.d.). https://www.intelligence.senate.gov/
Vrist Ronn, K. (2016). Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence, 29(4), 760–784. https://doi.org/10.1080/08850607.2016.1177399
Walsh, J. I. (2007). Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy, 27(2). https://doi.org/10.1017/S0143814X07000682
Walsh, P. F., & Miller, S. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security, 31(3), 345–368. https://doi.org/10.1080/02684527.2014.998436
Warner, M. (n.d.). Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf
Warner, M. (2004). Transformation and Intelligence Liaison. SAIS Review, 24(1), 77–89. https://doi.org/10.1353/sais.2004.0024
Watanabe, F. (1997). Fifteen Axioms for Intelligence Analysts (U). In Studies in Intelligence (pp. 45–47). https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
Weber, M., & Fischoff, E. (2013a). Economy and society: an outline of interpretive sociology (G. Roth & C. Wittich, Eds.). University of California Press.
Weber, M., & Fischoff, E. (2013b). Economy and society: an outline of interpretive sociology (G. Roth & C. Wittich, Eds.). University of California Press.
Weber, M., Gerth, H., & Mills, C. W. (1991). From Max Weber: essays in sociology (New ed). Routledge.
West, N. (1986). GCHQ: the secret wireless war, 1900-86. Weidenfeld and Nicolson.
Westerfield, B. (n.d.). American exceptionalism and American intelligence. Freedom Review, 28(Issue 2). https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
Westerfield, H. B. (1996). America and the world of intelligence liaison. Intelligence and National Security, 11(3), 523–560. https://doi.org/10.1080/02684529608432375
Wirtz, J. J. (2013). Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence, 26(3), 550–562. https://doi.org/10.1080/08850607.2013.780558
Wise, D. (1988). The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. Random House.
Zegart, A. B. (2006). An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly, 121(1). https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents
Zorn, E. L. (n.d.). Israel’s Quest for Satellite Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm