@misc{Agrell, title={When everything is intelligence - nothing is intelligence}, url={https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm}, publisher={Central Intelligence Agency}, author={Agrell, Wilhelm} }
@article{Aid_2003, title={All Glory is Fleeting: Sigint and the Fight Against International Terrorism}, volume={18}, DOI={10.1080/02684520310001688880}, number={4}, journal={Intelligence and National Security}, author={Aid, Matthew M}, year={2003}, month={Dec}, pages={72–120} }
@article{Aldrich_2002, title={Dangerous Liaisons.}, volume={24}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049}, number={Issue 3}, journal={Harvard International Review}, author={Aldrich, Richard J.}, year={2002} }
@article{Aldrich_2009a, title={US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion}, volume={11}, DOI={10.1111/j.1467-856x.2008.00353.x}, number={1}, journal={The British Journal of Politics and International Relations}, author={Aldrich, Richard J.}, year={2009}, month={Feb}, pages={122–139} }
@article{Aldrich_2009b, title={Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem}, volume={24}, DOI={10.1080/02684520902756812}, number={1}, journal={Intelligence and National Security}, author={Aldrich, Richard J.}, year={2009}, month={Feb}, pages={26–56} }
@book{Aldrich_2010, address={London}, title={GCHQ: the uncensored story of Britain’s most secret intelligence agency}, publisher={Harper Press}, author={Aldrich, Richard J.}, year={2010} }
@article{Allison_1969, title={Conceptual Models and the Cuban Missile Crisis}, volume={63}, DOI={10.2307/1954423}, number={03}, journal={American Political Science Review}, author={Allison, Graham T.}, year={1969}, month={Sep}, pages={689–718} }
@book{Allison_Zelikow_1999, address={New York}, edition={2nd ed}, title={Essence of decision: explaining the Cuban Missile Crisis}, publisher={Longman}, author={Allison, Graham T. and Zelikow, Philip}, year={1999} }
@article{Alvarez_2000, title={American signals intelligence and the Cuban missile crisis}, volume={15}, DOI={10.1080/02684520008432591}, number={1}, journal={Intelligence and National Security}, author={Alvarez, David}, year={2000}, month={Mar}, pages={169–176} }
@misc{Anderson_2015, address={London}, title={A question of trust: report of the investigatory powers review - GOV.UK}, url={https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review}, author={Anderson, David}, year={2015}, pages={49–70} }
@book{Andrew_Aldrich_Wark_2009a, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009b, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009c, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009d, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009e, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009f, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009g, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009h, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@inbook{Andrew_Aldrich_Wark_2009i, address={London}, title={Secret intelligence: a reader}, url={https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099}, booktitle={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009}, pages={395–410} }
@book{Andrew_Aldrich_Wark_2009j, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@book{Andrew_Aldrich_Wark_2009k, address={London}, title={Secret intelligence: a reader}, publisher={Routledge}, author={Andrew, Christopher M. and Aldrich, Richard J. and Wark, Wesley K.}, year={2009} }
@inbook{Andrew_Gordievsky_1990a, address={London}, title={KGB: the inside story of its foreign operations from Lenin to Gorbachev}, url={https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099}, booktitle={KGB: the inside story of its foreign operations from Lenin to Gorbachev}, publisher={Hodder & Stoughton}, author={Andrew, Christopher M. and Gordievsky, Oleg}, year={1990}, pages={1–18} }
@book{Andrew_Gordievsky_1990b, address={London}, title={KGB: the inside story of its foreign operations from Lenin to Gorbachev}, publisher={Hodder & Stoughton}, author={Andrew, Christopher M. and Gordievsky, Oleg}, year={1990} }
@book{Baldino_2010, address={Annandale, NSW}, title={Democratic oversight of intelligence services}, publisher={Federation Press}, author={Baldino, Daniel}, year={2010} }
@book{Bamford_2001, address={London}, title={Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world}, publisher={Century}, author={Bamford, James}, year={2001} }
@article{Bar-Joseph_2011, title={The Professional Ethics of Intelligence Analysis}, volume={24}, DOI={10.1080/08850607.2011.519222}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Bar-Joseph, Uri}, year={2011}, month={Jan}, pages={22–43} }
@misc{Bellows, title={Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation}, url={https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report}, author={Bellows, Randy I.} }
@article{Benjamin_2007, title={Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights}, url={https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16}, journal={European Human Rights Law Review}, author={Benjamin, Vincents Okechukwu}, year={2007} }
@misc{Berkowitz_2011, address={Washington DC}, title={The National Reconnaissance Office at 50 Years: A Brief History}, url={https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf}, publisher={National Reconnaissance Office}, author={Berkowitz, Bruce}, year={2011} }
@book{Berkowitz_Goodman_1989a, address={Princeton, N.J.}, title={Strategic intelligence for American national security}, publisher={Princeton University Press}, author={Berkowitz, Bruce D. and Goodman, Allan E.}, year={1989} }
@book{Berkowitz_Goodman_1989b, address={Princeton, N.J.}, title={Strategic intelligence for American national security}, publisher={Princeton University Press}, author={Berkowitz, Bruce D. and Goodman, Allan E.}, year={1989} }
@inbook{Berkowitz_Goodman_2000, address={New Haven}, title={Best truth: intelligence in the information age}, url={https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099}, booktitle={Best truth: intelligence in the information age}, publisher={Yale University Press}, author={Berkowitz, Bruce D. and Goodman, Allan E.}, year={2000}, pages={58–98} }
@article{Bettina Renz_2006, title={Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics}, volume={58}, url={https://www.jstor.org/stable/20451267?seq=1#metadata_info_tab_contents}, DOI={10.1080/0966813060031134}, number={6}, journal={Europe-Asia Studies}, publisher={Taylor & Francis, Ltd.}, author={Bettina Renz}, year={2006} }
@book{Blau_1963, address={Chicago}, edition={2nd ed}, title={The dynamics of bureaucracy: a study of interpersonal relations in two government agencies}, publisher={University of Chicago Press}, author={Blau, Peter M.}, year={1963} }
@book{Born_Leigh_Geneva Centre for the Democratic Control of Armed Forces, title={Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies}, author={Born, H. and Leigh, I. and Geneva Centre for the Democratic Control of Armed Forces} }
@inbook{Bradley_Ewing_2011a, address={Harlow}, edition={15th ed}, title={Constitutional and administrative law}, url={https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099}, booktitle={Constitutional and administrative law}, publisher={Pearson Longman}, author={Bradley, A. W. and Ewing, K. D.}, year={2011}, pages={481–486} }
@inbook{Bradley_Ewing_2011b, address={Harlow}, edition={15th ed}, title={Constitutional and administrative law}, url={https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099}, booktitle={Constitutional and administrative law}, publisher={Pearson Longman}, author={Bradley, A. W. and Ewing, K. D.}, year={2011}, pages={553–562} }
@book{Brook-Shepherd_1988, address={London}, title={The storm birds: Soviet postwar defectors}, publisher={Weidenfield and Nicolson}, author={Brook-Shepherd, Gordon}, year={1988} }
@article{Brugioni_1AD, title={The art and science of photoreconnaissance.}, url={https://cm7ly9cu9w.search.serialssolutions.com/?genre=article&issn=00368733&title=Scientific%20American&volume=274&issue=3&date=19960301&atitle=The%20art%20and%20science%20of%20photoreconnaissance.&spage=78&pages=78-85&sid=EBSCO:Academic%20Search%20Complete&au=Brugioni,%20Dino%20A.}, DOI={10.1038/scientificamerican0396-78}, number={3}, journal={Scientific American}, author={Brugioni, Dino A}, year={1AD}, pages={78–85} }
@book{Burns_Stalker_1994, address={Oxford}, edition={Rev. ed}, title={The management of innovation}, publisher={Oxford University Press}, author={Burns, Tom and Stalker, G. M.}, year={1994} }
@book{Butler of Brockwell_Great Britain. Privy Council_Great Britain. Parliament. House of Commons_2004, address={London}, title={Review of intelligence on weapons of mass destruction}, volume={898}, url={https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf}, publisher={The Stationery Office}, author={Butler of Brockwell, Frederick Edward Robin Butler and Great Britain. Privy Council and Great Britain. Parliament. House of Commons}, year={2004} }
@article{Champion_1998, title={A review of selected cases of industrial espionage and economic spying, 1568–1945}, volume={13}, DOI={10.1080/02684529808432480}, number={2}, journal={Intelligence and National Security}, author={Champion, Brian}, year={1998}, month={Jun}, pages={123–143} }
@inbook{Chapman_1971, address={London}, title={Police state}, url={https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099}, booktitle={Police state}, publisher={Macmillan}, author={Chapman, Brian}, year={1971}, pages={106–115} }
@book{Clark_2016, address={Thousand Oaks}, edition={Fifth edition}, title={Intelligence analysis : a target-centric approach}, publisher={CQ Press}, author={Clark, Robert M.}, year={2016} }
@book{Clayton_1982, address={New York}, title={The enemy is listening}, publisher={Ballantine}, author={Clayton, Aileen}, year={1982} }
@article{CLOUGH_2004, title={Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation}, volume={17}, DOI={10.1080/08850600490446736}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={CLOUGH, CHRIS}, year={2004}, month={Dec}, pages={601–613} }
@article{Cohen_March_Olsen_1972, title={A Garbage Can Model of Organizational Choice}, volume={17}, DOI={10.2307/2392088}, number={1}, journal={Administrative Science Quarterly}, author={Cohen, Michael D. and March, James G. and Olsen, Johan P.}, year={1972}, month={Mar} }
@inbook{Cradock_2002a, address={London}, title={Know your enemy: how the Joint Intelligence Committee saw the world}, url={https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099}, booktitle={Know your enemy: how the Joint Intelligence Committee saw the world}, publisher={John Murray}, author={Cradock, Percy}, year={2002}, pages={290–303} }
@inbook{Cradock_2002b, address={London}, title={Know your enemy: how the Joint Intelligence Committee saw the world}, url={https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099}, booktitle={Know your enemy: how the Joint Intelligence Committee saw the world}, publisher={John Murray}, author={Cradock, Percy}, year={2002}, pages={281–289} }
@book{Cringely_1992, address={London}, title={Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date}, publisher={Viking}, author={Cringely, Robert X.}, year={1992} }
@article{Crosston_2016, title={Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China}, volume={29}, DOI={10.1080/08850607.2015.1083337}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Crosston, Matthew}, year={2016}, month={Jan}, pages={110–131} }
@book{Cyert_March_1992, address={Cambridge, Mass}, edition={2nd ed}, title={A behavioral theory of the firm}, publisher={Blackwell}, author={Cyert, Richard Michael and March, James G.}, year={1992} }
@book{Dandeker_1990, address={Cambridge}, title={Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day}, publisher={Polity}, author={Dandeker, Christopher}, year={1990} }
@book{Daugherty_2006, address={Lexington}, edition={Pbk ed}, title={Executive secrets: covert action and the presidency}, url={https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194}, publisher={The University Press of Kentucky}, author={Daugherty, William J.}, year={2006} }
@article{David_2017, title={How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory}, volume={32}, DOI={10.1080/02684527.2017.1294372}, number={6}, journal={Intelligence and National Security}, author={David, James Edward}, year={2017}, month={Sep}, pages={768–781} }
@article{Davies_2000, title={From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977}, volume={15}, DOI={10.1080/02684520008432617}, number={3}, journal={Intelligence and National Security}, author={Davies, Philip H. J.}, year={2000}, month={Sep}, pages={55–76} }
@article{Davies_2002, title={Ideas of Intelligence.}, volume={24}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049}, number={Issue 3}, journal={Harvard International Review}, author={Davies, Philip H. J.}, year={2002} }
@book{Davies_2003a, address={London}, title={MI6 and the machinery of spying}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site}, publisher={Frank Cass}, author={Davies, Philip H. J.}, year={2003} }
@book{Davies_2003b, address={London}, title={MI6 and the machinery of spying}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site}, publisher={Frank Cass}, author={Davies, Philip H. J.}, year={2003} }
@article{Davies_2009, title={Imagery in the UK: Britain’s troubled imagery intelligence architecture}, volume={35}, DOI={10.1017/S0260210509990386}, number={04}, journal={Review of International Studies}, author={Davies, Philip H. J.}, year={2009}, month={Oct} }
@book{Davies_2012a, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012b, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012c, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012d, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012e, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012f, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012g, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012h, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012i, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@book{Davies_2012j, address={Santa Barbara, Calif}, title={Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community}, url={http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity}, publisher={Praeger}, author={Davies, Philip H. J.}, year={2012} }
@article{Davies, title={A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm}, author={Davies, Philip H. J.} }
@book{Davies_Gustafson_2013a, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@book{Davies_Gustafson_2013b, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@book{Davies_Gustafson_2013c, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@book{Davies_Gustafson_2013d, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@book{Davies_Gustafson_2013e, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@book{Davies_Gustafson_2013f, address={Washington, DC}, title={Intelligence elsewhere: spies and espionage outside the anglosphere}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049}, publisher={Georgetown University Press}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2013} }
@article{Davies_Gustafson_2017a, title={Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise}, DOI={10.1080/02684527.2017.1328860}, journal={Intelligence and National Security}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2017}, month={Jul}, pages={1–15} }
@article{Davies_Gustafson_2017b, title={Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise}, DOI={10.1080/02684527.2017.1328860}, journal={Intelligence and National Security}, author={Davies, Philip H. J. and Gustafson, Kristian}, year={2017}, month={Jul}, pages={1–15} }
@article{Davies_1999, title={INFORMATION WARFARE AND THE FUTURE OF THE SPY}, volume={2}, DOI={10.1080/136911899359664}, number={2}, journal={Information, Communication & Society}, author={Davies, Philip H.J.}, year={1999}, month={Jan}, pages={115–133} }
@article{Davies_2004, title={Intelligence culture and intelligence failure in Britain and the United States}, volume={17}, DOI={10.1080/0955757042000298188}, number={3}, journal={Cambridge Review of International Affairs}, author={Davies, Philip H.J.}, year={2004}, month={Oct}, pages={495–520} }
@article{Davies_2010a, title={The Missing Dimension’s Missing Dimension}, volume={25}, DOI={10.1177/0952076709347071}, number={1}, journal={Public Policy and Administration}, author={Davies, Philip H.J.}, year={2010}, month={Jan}, pages={5–9} }
@article{Davies_2010b, title={Intelligence and the Machinery of Government}, volume={25}, DOI={10.1177/0952076709347073}, number={1}, journal={Public Policy and Administration}, author={Davies, Philip H.J.}, year={2010}, month={Jan}, pages={29–46} }
@article{Davis_1991, title={The Kent-Kendall Debate of 1949}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf}, journal={Studies in Intelligence}, publisher={CIA}, author={Davis, Jack}, year={1991}, pages={91–101} }
@misc{Davis_2002, title={Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency}, volume={1}, url={https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm}, number={3}, journal={Occasional Papers}, author={Davis, Jack}, year={2002}, month={Sep} }
@article{Day_2004, title={Ferrets Above: American Signals Intelligence Satellites During the 1960s}, volume={17}, DOI={10.1080/08850600490446835}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Day, Dwayne A.}, year={2004}, month={Sep}, pages={449–467} }
@book{Denning_1999, address={New York, N.Y.}, title={Information warfare and security}, publisher={ACM Press}, author={Denning, Dorothy Elizabeth Robling}, year={1999} }
@article{Diderichsen_Rønn_2017, title={Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics}, volume={32}, DOI={10.1080/02684527.2016.1270622}, number={4}, journal={Intelligence and National Security}, author={Diderichsen, Adam and Rønn, Kira Vrist}, year={2017}, month={Jun}, pages={479–493} }
@article{Diffie_Landau_2008, title={Brave New World of Wiretapping}, volume={299}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049}, DOI={10.1038/scientificamerican0908-56}, number={3}, journal={Scientific American}, author={Diffie, Whitfield and Landau, Susan}, year={2008}, pages={56–63} }
@article{Duyvesteyn_2011, title={Intelligence and Strategic Culture: Some Observations}, volume={26}, DOI={10.1080/02684527.2011.580605}, number={4}, journal={Intelligence and National Security}, author={Duyvesteyn, Isabelle}, year={2011}, month={Aug}, pages={521–530} }
@inbook{Dziak_1988, address={Lexington, Mass}, title={Chekisty: a history of the KGB}, url={https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099}, booktitle={Chekisty: a history of the KGB}, publisher={Lexington Books}, author={Dziak, John J.}, year={1988}, pages={1–17} }
@article{Eftimiades_1992, title={China’s Ministry of State Security: Coming of Age in the International Arena}, volume={1992}, url={https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/}, number={2}, journal={Occasional Papers/Reprints Series in Contemporary Asian Studies}, author={Eftimiades, Nicholas}, year={1992} }
@article{Evans_2009, title={Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle}, volume={9}, DOI={10.1080/14702430701811987}, number={1}, journal={Defence Studies}, author={Evans, Geraint}, year={2009}, month={Mar}, pages={22–46} }
@book{Farson_Praeger Security International_2008a, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@book{Farson_Praeger Security International_2008b, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@book{Farson_Praeger Security International_2008c, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@book{Farson_Praeger Security International_2008d, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@book{Farson_Praeger Security International_2008e, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@book{Farson_Praeger Security International_2008f, address={Westport, Conn}, title={PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia}, publisher={Praeger Security International}, author={Farson, Anthony Stuart and Praeger Security International}, year={2008} }
@article{Farson_1989, title={Schools of Thought: National Perceptions of Intelligence}, volume={9}, url={https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914}, number={2}, journal={Journal of Conflict Studies}, author={Farson, Stuart}, year={1989} }
@book{Finnegan_Center for Strategic Intelligence Research (U.S.)_2006, address={[Washington, D.C.]}, title={Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I}, publisher={Center for Strategic Intelligence Research, National Defense Intelligence College}, author={Finnegan, Terrence J. and Center for Strategic Intelligence Research (U.S.)}, year={2006} }
@article{Fischer_2011, title={Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight}, volume={24}, DOI={10.1080/08850607.2011.548205}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={Fischer, Benjamin}, year={2011}, month={Jun}, pages={268–306} }
@article{Fraser_2005, title={Architecture of a broken dream: The CIA and Guatemala, 1952–54}, volume={20}, DOI={10.1080/02684520500269010}, number={3}, journal={Intelligence and National Security}, author={Fraser, Andrew}, year={2005}, month={Sep}, pages={486–508} }
@article{Gendron_2005, title={Just War, Just Intelligence: An Ethical Framework for Foreign Espionage}, volume={18}, DOI={10.1080/08850600590945399}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Gendron, Angela}, year={2005}, month={Oct}, pages={398–434} }
@book{George_Bruce_Georgetown University. Center for Peace and Security Studies_2008a, address={Washington D.C.}, title={Analyzing intelligence: origins, obstacles, and innovations}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site}, publisher={Georgetown University Press}, author={George, Roger Z. and Bruce, James B. and Georgetown University. Center for Peace and Security Studies}, year={2008} }
@book{George_Bruce_Georgetown University. Center for Peace and Security Studies_2008b, address={Washington D.C.}, title={Analyzing intelligence: origins, obstacles, and innovations}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site}, publisher={Georgetown University Press}, author={George, Roger Z. and Bruce, James B. and Georgetown University. Center for Peace and Security Studies}, year={2008} }
@book{Gill_1994a, address={London}, title={Policing politics: security intelligence and the liberal democratic state}, url={http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity}, publisher={F. Cass}, author={Gill, Peter}, year={1994} }
@book{Gill_1994b, address={London}, title={Policing politics: security intelligence and the liberal democratic state}, url={http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity}, publisher={F. Cass}, author={Gill, Peter}, year={1994} }
@article{Gill_1996, title={Reasserting control: Recent changes in the oversight of the UK intelligence community}, volume={11}, url={https://contentstore.cla.co.uk/secure/link?id=28d50676-8836-e911-80cd-005056af4099}, DOI={10.1080/02684529608432359}, number={2}, journal={Intelligence and National Security}, author={Gill, Peter}, year={1996}, month={Apr}, pages={313–331} }
@article{Gill_2007, title={Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’}, volume={22}, DOI={10.1080/02684520701200756}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2007}, month={Feb}, pages={14–37} }
@book{Gill_Marrin_Phythian_2009, address={London}, title={Intelligence theory: key questions and debates}, url={http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874}, publisher={Routledge}, author={Gill, Peter and Marrin, Stephen and Phythian, Mark}, year={2009} }
@book{Glees_1987, address={London}, title={The secrets of the service: British intelligence and Communist subversion 1939-51}, publisher={Cape}, author={Glees, Anthony}, year={1987} }
@book{Glees_Davies_Morrison_Social Affairs Unit_2006, address={London}, title={The open side of secrecy: Britain’s Intelligence and Security Committee}, publisher={The Social Affairs Unit}, author={Glees, Anthony and Davies, Philip H. J. and Morrison, John N. L. and Social Affairs Unit}, year={2006} }
@article{Glees_Davies_2006, title={Intelligence, Iraq and the limits of legislative accountability during political crisis}, volume={21}, DOI={10.1080/02684520600957787}, number={5}, journal={Intelligence and National Security}, author={Glees, Anthony and Davies, Philip H.J.}, year={2006}, month={Oct}, pages={848–883} }
@book{Godson_1980, title={Intelligence Requirements for the 1980’s: Analysis and Estimates}, url={https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2}, publisher={National Strategy Information Center, Inc}, author={Godson, Roy}, year={1980} }
@inbook{Godson_1988, address={Washington}, title={Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World}, url={https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099}, booktitle={Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World}, publisher={Pergamon-Brassey’s International Defense Publishers}, author={Godson, Roy}, year={1988}, pages={115–155} }
@book{Godson_National Strategy Information Center_Consortium for the Study of Intelligence_1986, address={Lexington, MA.}, title={Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]}, author={Godson, Roy and National Strategy Information Center and Consortium for the Study of Intelligence}, year={1986} }
@article{Goold_2009, title={Liberty and others v The United Kingdom: a new chance for another missed opportunity}, url={https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5}, journal={Public Law}, author={Goold, B.}, year={2009} }
@book{Grabo_2002, title={Anticipating Surprise: Analysis for Strategic Warning}, url={https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf}, author={Grabo, Cynthia M.}, year={2002}, month={Dec} }
@article{Gray_1999, title={Strategic Culture as Context: The First Generation of Theory Strikes Back}, volume={25}, url={https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents}, number={1}, journal={Review of International Studies}, publisher={Cambridge University Press}, author={Gray, Colin S.}, year={1999} }
@book{Gustafson_2007, address={Washington D.C.}, edition={1st ed}, title={Hostile intent: U.S. covert operations in Chile, 1964-1974}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site}, publisher={Potomac}, author={Gustafson, Kristian}, year={2007} }
@article{Hastedt_1991, title={Towards the Comparative Study of Intelligence}, volume={11}, url={https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035}, number={3}, journal={Journal of Conflict Studies}, author={Hastedt, Glenn P.}, year={1991} }
@article{Herman_1991, title={Intelligence and policy: A comment}, volume={6}, url={https://contentstore.cla.co.uk/secure/link?id=b0ef33e3-8836-e911-80cd-005056af4099}, DOI={10.1080/02684529108432098}, number={1}, journal={Intelligence and National Security}, author={Herman, Michael}, year={1991}, month={Jan}, pages={229–239} }
@book{Herman_1996a, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996b, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996c, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996d, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996e, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996f, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996g, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996h, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996i, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996j, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996k, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996l, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_1996m, address={Cambridge}, title={Intelligence power in peace and war}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site}, publisher={Royal Institute of International Affairs}, author={Herman, Michael}, year={1996} }
@book{Herman_2001a, address={London}, title={Intelligence services in the information age: theory and practice}, url={http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity}, publisher={Frank Cass}, author={Herman, Michael}, year={2001} }
@book{Herman_2001b, address={London}, title={Intelligence services in the information age: theory and practice}, url={http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity}, publisher={Frank Cass}, author={Herman, Michael}, year={2001} }
@book{Herman_2001c, address={London}, title={Intelligence services in the information age: theory and practice}, url={http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity}, publisher={Frank Cass}, author={Herman, Michael}, year={2001} }
@inbook{Heuer_Pherson_2015a, address={Los Angeles}, edition={Second Edition}, title={Structured analytic techniques for intelligence analysis}, url={https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099}, booktitle={Structured analytic techniques for intelligence analysis}, publisher={SAGE}, author={Heuer, Richards J. and Pherson, Randolph H.}, year={2015}, pages={119–121} }
@inbook{Heuer_Pherson_2015b, address={Los Angeles}, edition={Second Edition}, title={Structured analytic techniques for intelligence analysis}, url={https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099}, booktitle={Structured analytic techniques for intelligence analysis}, publisher={SAGE}, author={Heuer, Richards J. and Pherson, Randolph H.}, year={2015}, pages={133–140} }
@article{Hibbert_1990, title={Intelligence and policy}, volume={5}, DOI={10.1080/02684529008432037}, number={1}, journal={Intelligence and National Security}, author={Hibbert, Reginald}, year={1990}, month={Jan}, pages={110–128} }
@article{HICKS_2005, title={Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action?}, volume={18}, DOI={10.1080/08850600590911954}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={HICKS, D. BRUCE}, year={2005}, month={Mar}, pages={246–261} }
@book{Hinsley_Simkins, address={London}, title={British intelligence in the Second World War: Vol. 4: Security and counter-intelligence}, publisher={H.M.S.O.}, author={Hinsley, F. H. and Simkins, C. A. G.} }
@article{HOLLAND_2004, title={Operation PBHISTORY: The Aftermath of SUCCESS}, volume={17}, DOI={10.1080/08850600490274935}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={HOLLAND, MAX}, year={2004}, month={Jan}, pages={300–332} }
@book{Hughes-Wilson_2004, address={London}, edition={Rev. and updated ed}, title={Military intelligence blunders and cover-ups}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site}, publisher={Robinson}, author={Hughes-Wilson, John}, year={2004} }
@article{Hulnick_1991, title={Intelligence cooperation in the post‐cold war era: A new game plan?}, volume={5}, url={https://thecsi.org.uk/isi/wp-content/uploads/2018/07/Hulnick-Intelligence-Cooperation.pdf?0856f5}, DOI={10.1080/08850609108435194}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Hulnick, Arthur S.}, year={1991}, month={Dec}, pages={455–465} }
@article{Hulnick_2006, title={What’s wrong with the Intelligence Cycle}, volume={21}, DOI={10.1080/02684520601046291}, number={6}, journal={Intelligence and National Security}, author={Hulnick, Arthur S.}, year={2006}, month={Dec}, pages={959–979} }
@book{Hunter_1999, address={Annapolis, Md}, title={Spy hunter: inside the FBI investigation of the Walker espionage case}, publisher={Naval Institute Press}, author={Hunter, Robert W.}, year={1999} }
@book{India. Kargil Review Committee._2000, address={New Delhi}, title={From surprise to reckoning}, publisher={Sage Publications}, author={India. Kargil Review Committee.}, year={2000} }
@article{Inkster_2013, title={Chinese Intelligence in the Cyber Age}, volume={55}, DOI={10.1080/00396338.2013.767405}, number={1}, journal={Survival}, author={Inkster, Nigel}, year={2013}, month={Mar}, pages={45–66} }
@misc{2015a, address={London}, title={Privacy and Security: A modern and transparent legal framework}, url={http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf}, author={Intelligence and Security Committee (ISC)}, year={2015} }
@misc{2006, title={Educing Information - Interrogation: Science and Art}, url={http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf}, publisher={NDIC Press}, author={Intelligence Science Board}, year={2006} }
@book{Jeffery_2011, address={London}, title={MI6: the history of the Secret Intelligence Service, 1909-1949}, publisher={Bloomsbury}, author={Jeffery, Keith}, year={2011} }
@article{John Wadham_1994, title={The Intelligence Services Act 1994}, volume={57}, url={https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents}, number={6}, journal={The Modern Law Review}, publisher={Wiley}, author={John Wadham}, year={1994} }
@book{Johnson_1985, address={Lexington, Ky}, title={A season of inquiry: the Senate intelligence investigation}, publisher={University Press of Kentucky}, author={Johnson, Loch K.}, year={1985} }
@article{Johnson_1989, title={Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy}, volume={33}, DOI={10.2307/2600495}, number={1}, journal={International Studies Quarterly}, author={Johnson, Loch K.}, year={1989}, month={Mar} }
@article{Johnson_2000, title={Spies}, DOI={10.2307/1149708}, number={120}, journal={Foreign Policy}, author={Johnson, Loch K.}, year={2000}, month={Sep} }
@book{Johnson_2009a, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009b, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009c, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009d, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009e, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009f, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009g, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009h, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009i, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009j, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009k, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009l, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@book{Johnson_2009m, address={London}, title={Handbook of intelligence studies}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@article{Johnson-Freese_Gatling_2004, title={Security Implications of Japan’s Information Gathering Satellite (IGS) System}, volume={19}, DOI={10.1080/0268452042000316278}, number={3}, journal={Intelligence and National Security}, author={Johnson-Freese, Joan and Gatling, Lance}, year={2004}, month={Sep}, pages={538–552} }
@article{Jones_2013, title={The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine)}, volume={2}, url={https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php}, number={2}, journal={Westminster Law Review}, author={Jones, Bob}, year={2013}, month={Apr} }
@article{Jones_2000, title={From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain}, volume={15}, DOI={10.1080/02684520008432628}, number={4}, journal={Intelligence and National Security}, author={Jones, Kevin}, year={2000}, month={Dec}, pages={60–80} }
@article{Katz_2006, title={Deception and Denial in Iraq: The Intelligent Adversary Corollary}, volume={19}, DOI={10.1080/08850600600829767}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Katz, Jonathan I.}, year={2006}, month={Dec}, pages={577–585} }
@book{Katzman, address={[Washington, DC]}, title={Iran: politics, human rights, and U.S. policy}, volume={RL32048}, publisher={Congressional Research Service}, author={Katzman, Kenneth} }
@article{Kaufman_1994, title={Organizational Politics and Change in Soviet Military Policy}, volume={46}, DOI={10.2307/2950686}, number={03}, journal={World Politics}, author={Kaufman, Stuart J.}, year={1994}, month={Apr}, pages={355–382} }
@inbook{Knight_1977, address={Farnborough, Hants}, title={Matrix management}, url={https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099}, booktitle={Matrix management}, publisher={Gower Press}, author={Knight, Kenneth}, year={1977}, pages={1–12} }
@article{Kobayashi_2015, title={Assessing Reform of the Japanese Intelligence Community}, volume={28}, DOI={10.1080/08850607.2015.1051453}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Kobayashi, Yoshiki}, year={2015}, month={Oct}, pages={717–733} }
@article{Kramer_Heuer_2007, title={America’s Increased Vulnerability to Insider Espionage}, volume={20}, DOI={10.1080/08850600600888698}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Kramer, Lisa A. and Heuer, Richards J.}, year={2007}, month={Dec}, pages={50–64} }
@article{Lander_2004, title={International intelligence cooperation: an inside perspective}, volume={17}, DOI={10.1080/0955757042000296964}, number={3}, journal={Cambridge Review of International Affairs}, author={Lander, Sir Stephen}, year={2004}, month={Oct}, pages={481–493} }
@inbook{Laqueur_1985, address={London}, title={World of secrets: the uses and limits of intelligence}, url={https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099}, booktitle={World of secrets: the uses and limits of intelligence}, publisher={Weidenfeld and Nicolson}, author={Laqueur, Walter}, year={1985}, pages={20–27} }
@book{Lawrence_Lorsch_Harvard University. Graduate School of Business Administration_1967, address={Boston, Mass}, title={Organization and environment: managing differentiation and integration}, publisher={Division of Research, Graduate School of Business Administration, Harvard University}, author={Lawrence, Paul R. and Lorsch, Jay William and Harvard University. Graduate School of Business Administration}, year={1967} }
@article{LE GALLO_2005, title={Covert Action: A Vital Option in U.S. National Security Policy}, volume={18}, DOI={10.1080/08850600590884810}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={LE GALLO, ANDRÉ}, year={2005}, month={Mar}, pages={354–359} }
@article{LEFEBVRE_2003, title={The Difficulties and Dilemmas of International Intelligence Cooperation}, volume={16}, DOI={10.1080/716100467}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={LEFEBVRE, STÉPHANE}, year={2003}, month={Oct}, pages={527–542} }
@book{Lewin_1982, address={New York}, title={The American magic: codes, ciphers, and the defeat of Japan}, publisher={Farrar Straus Giroux}, author={Lewin, Ronald}, year={1982} }
@book{Lorsch_Allen_1973, address={Boston}, title={Managing diversity and interdependence: an organizational study of multidivisional firms}, publisher={Harvard University, Graduate School of Business Administration, Division of Research}, author={Lorsch, Jay William and Allen, Stephen A.}, year={1973} }
@article{Lowenthal_Marks_2015, title={Intelligence Analysis: Is It As Good As It Gets?}, volume={28}, DOI={10.1080/08850607.2015.1051410}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Lowenthal, Mark M. and Marks, Ronald A.}, year={2015}, month={Oct}, pages={662–665} }
@article{Marrin_2007, title={At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers}, volume={20}, DOI={10.1080/08850600701249733}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Marrin, Stephen}, year={2007}, month={May}, pages={401–414} }
@book{Marrin_2011, address={Abingdon}, title={Improving intelligence analysis: bridging the gap between scholarship and practice}, publisher={Routledge}, author={Marrin, Stephen}, year={2011} }
@article{Mescall_1994, title={A creature of compromise: The establishment of the DIA}, volume={7}, url={https://contentstore.cla.co.uk/secure/link?id=c0522a11-2a2a-e911-80cd-005056af4099}, DOI={10.1080/08850609408435250}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Mescall, Patrick Neil}, year={1994}, month={Sep}, pages={251–274} }
@article{Michael T. Hannan and John Freeman_1977, title={The Population Ecology of Organizations}, volume={82}, url={https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents}, number={5}, journal={American Journal of Sociology}, publisher={The University of Chicago Press}, author={Michael T. Hannan and John Freeman}, year={1977} }
@book{Mitnick_Simon_2005, address={Indianapolis, IN}, title={The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers}, url={https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834}, publisher={Wiley}, author={Mitnick, Kevin D. and Simon, William L.}, year={2005} }
@book{Morgan_1986a, address={Beverly Hills}, title={Images of organization}, publisher={Sage}, author={Morgan, Gareth}, year={1986} }
@book{Morgan_1986b, address={Beverly Hills}, title={Images of organization}, publisher={Sage}, author={Morgan, Gareth}, year={1986} }
@inbook{Morgan_1986c, address={Beverly Hills}, title={Images of organization}, url={https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099}, booktitle={Images of organization}, publisher={Sage}, author={Morgan, Gareth}, year={1986}, pages={111–140} }
@article{Muller_2008, title={Intelligence Analysis in Red and Blue}, volume={21}, DOI={10.1080/08850600701648652}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Muller, David G.}, year={2008}, month={Jan}, pages={1–12} }
@article{Müller-Wille_2002, title={EU Intelligence Co-operation. A Critical Analysis}, volume={23}, DOI={10.1080/713999737}, number={2}, journal={Contemporary Security Policy}, author={Müller-Wille, Björn}, year={2002}, month={Aug}, pages={61–86} }
@article{MÜLLER-WILLE_2007, title={The Effect of International Terrorism on EU Intelligence Co-operation}, volume={46}, DOI={10.1111/j.1468-5965.2007.00767.x}, number={1}, journal={JCMS: Journal of Common Market Studies}, author={MÜLLER-WILLE, BJÖRN}, year={2007}, month={Dec}, pages={49–73} }
@book{National Commission on Terrorist Attacks upon the United States_2004, address={New York}, title={The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States}, url={https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf}, publisher={Norton}, author={National Commission on Terrorist Attacks upon the United States}, year={2004} }
@article{Northcott_2007, title={The Role, Organization, and Methods of MI5}, volume={20}, DOI={10.1080/08850600701249758}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Northcott, Chris}, year={2007}, month={May}, pages={453–479} }
@article{O’Connell_2004, title={Thinking About Intelligence Comparatively.}, volume={11}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049}, number={Issue 1}, journal={Brown Journal of World Affairs}, author={O’Connell, Kevin M.}, year={2004}, pages={189–111} }
@book{Olcott_2012, address={London}, title={Open source intelligence in a networked world}, url={https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554}, publisher={Continuum}, author={Olcott, Anthony}, year={2012} }
@book{Olson_2008, address={Washington, D.C.}, title={Fair play: the moral dilemmas of spying}, url={http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049}, publisher={Potomac Books, Inc}, author={Olson, James M.}, year={2008} }
@misc{Olson, title={The Ten Commandments of Counterintelligence}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html}, publisher={Central Intelligence Agency}, author={Olson, James M.} }
@book{Omand_2010, address={London}, title={Securing the state}, url={http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity}, publisher={Hurst}, author={Omand, David}, year={2010} }
@article{Omand_Bartlett_Miller_2012, title={Introducing Social Media Intelligence (SOCMINT)}, volume={27}, DOI={10.1080/02684527.2012.716965}, number={6}, journal={Intelligence and National Security}, author={Omand, David and Bartlett, Jamie and Miller, Carl}, year={2012}, month={Dec}, pages={801–823} }
@misc{Omand_Bartlett_2012, address={lONDON}, title={#INTELLIGENCE}, url={https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf}, publisher={Demos}, author={Omand, Sir David and Bartlett, Jamie and Carl Miller}, year={2012} }
@article{Omand_Phythian_2013, title={Ethics and Intelligence: A Debate}, volume={26}, DOI={10.1080/08850607.2012.705186}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Omand, Sir David and Phythian, Mark}, year={2013}, month={Mar}, pages={38–63} }
@article{Orton_Callahan_1995, title={Important "folk theories” in intelligence reorganization}, volume={8}, url={https://www.tandfonline.com/doi/pdf/10.1080/08850609508435296?redirect=1}, DOI={10.1080/08850609508435296}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Orton, J. Douglas and Callahan, Jamie L.}, year={1995}, month={Dec}, pages={411–429} }
@book{Oxlee_1997, address={London}, title={Aerospace reconnaissance}, publisher={Brassey’s}, author={Oxlee, G. J.}, year={1997} }
@book{Parker_2003, address={San Francisco, CA}, edition={2nd ed., completely revised and updated}, title={Cross-functional teams: working with allies, enemies, and other strangers}, url={http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity}, publisher={Jossey-Bass}, author={Parker, Glenn M.}, year={2003} }
@article{Perry_1995, title={‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action}, volume={15}, url={https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438}, number={1}, journal={Journal of Conflict Studies}, author={Perry, David L.}, year={1995} }
@article{Pfaff_Tiel_2004, title={The ethics of espionage}, volume={3}, DOI={10.1080/15027570310004447}, number={1}, journal={Journal of Military Ethics}, author={Pfaff, Tony and Tiel, Jeffrey R.}, year={2004}, month={Mar}, pages={1–15} }
@book{Pitt_Smith_1981, address={London}, title={Government departments: an organizational perspective}, publisher={Routledge and Kegan Paul}, author={Pitt, Douglas and Smith, Brian C.}, year={1981} }
@book{Posen_1984, address={Ithaca}, title={The sources of military doctrine: France, Britain, and Germany between the world wars}, url={http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658}, publisher={Cornell University Press}, author={Posen, Barry}, year={1984} }
@book{Powell_DiMaggio_1991a, address={Chicago}, title={The new institutionalism in organizational analysis}, publisher={University of Chicago Press}, author={Powell, Walter W. and DiMaggio, Paul J.}, year={1991} }
@book{Powell_DiMaggio_1991b, address={Chicago}, title={The new institutionalism in organizational analysis}, publisher={University of Chicago Press}, author={Powell, Walter W. and DiMaggio, Paul J.}, year={1991} }
@article{Pribbenow, title={The Man in the Snow White Cell}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html}, publisher={Central Intelligence Agency}, author={Pribbenow, Merle L.} }
@article{Pringle_2004, title={Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941}, volume={17}, DOI={10.1080/08850600490252687}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Pringle, Robert W.}, year={2004}, month={Jan}, pages={113–123} }
@book{Pugh_2007a, address={London}, edition={5th ed}, title={Organization theory: selected classic readings}, publisher={Penguin}, author={Pugh, Derek Salman}, year={2007} }
@inbook{Pugh_2007b, address={London}, edition={5th ed}, title={Organization theory: selected classic readings}, url={https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099}, booktitle={Organization theory: selected classic readings}, publisher={Penguin}, author={Pugh, Derek Salman}, year={2007}, pages={223–252} }
@article{Quinlan_2007, title={Just intelligence: Prolegomena to an ethical theory}, volume={22}, DOI={10.1080/02684520701200715}, number={1}, journal={Intelligence and National Security}, author={Quinlan, Michael}, year={2007}, month={Feb}, pages={1–13} }
@article{Radcliffe_2010, title={Origins and Current State of Japan’s Reconnaissance Satellite Program (U)}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html}, publisher={Central Intelligence Agency}, author={Radcliffe, William W.}, year={2010} }
@article{Raeff_1975, title={The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach}, volume={80}, DOI={10.2307/1852058}, number={5}, journal={The American Historical Review}, author={Raeff, Marc}, year={1975}, month={Dec} }
@article{Rathmell_1996, title={Syria’s Intelligence Services: Origins and Development}, volume={16}, url={https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636}, number={2}, journal={Journal of Conflict Studies}, author={Rathmell, Andrew}, year={1996} }
@article{REMPEL_2004, title={Canada’s Parliamentary Oversight of Security and Intelligence}, volume={17}, DOI={10.1080/08850600490496443}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={REMPEL, ROY}, year={2004}, month={Dec}, pages={634–654} }
@book{Rhodes_Dunleavy_1995, address={Basingstoke}, title={Prime Minister, cabinet and core executive}, publisher={Macillan}, author={Rhodes, R. A. W. (Roderick Arthur William) and Dunleavy, Patrick}, year={1995} }
@article{Richards_Won-Young_2009, title={MONITORING FOR NUCLEAR EXPLOSIONS.}, volume={300}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049}, DOI={10.1038/scientificamerican0309-70}, number={Issue 3}, journal={Scientific American}, author={Richards, Paul and Won-Young, Kin}, year={2009}, pages={70–77} }
@book{Richelson_Ball_1985, address={Boston}, title={The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand}, publisher={Allen & Unwin}, author={Richelson, Jeffrey and Ball, Desmond}, year={1985} }
@article{Richelson_1990, title={The calculus of intelligence cooperation}, volume={4}, url={https://contentstore.cla.co.uk/secure/link?id=24b480e3-531e-e911-80cd-005056af4099}, DOI={10.1080/08850609008435147}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Richelson, Jeffrey T.}, year={1990}, month={Jan}, pages={307–323} }
@article{Richelson_2001, title={MASINT: The New Kid in Town}, volume={14}, DOI={10.1080/088506001300063136}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={Richelson, Jeffrey T.}, year={2001}, month={Apr}, pages={149–192} }
@book{Riebling_2002, address={New York}, edition={1st Touchstone ed., Updated with a new epilogue}, title={Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security}, publisher={Simon & Schuster}, author={Riebling, Mark}, year={2002} }
@article{Robertson_1987, title={Intelligence, Terrorism and Civil Liberties}, volume={7}, url={https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825}, number={2}, journal={Journal of Conflict Studies}, author={Robertson, K. G.}, year={1987} }
@article{Robertson_1988, title={Accountable Intelligence—The British Experience}, volume={8}, url={https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855}, number={1}, journal={Journal of Conflict Studies}, author={Robertson, K. G.}, year={1988} }
@article{Robertson_1998, title={Recent reform of intelligence in the UK: Democratization or risk management?}, volume={13}, DOI={10.1080/02684529808432481}, number={2}, journal={Intelligence and National Security}, author={Robertson, K.G.}, year={1998}, month={Jun}, pages={144–158} }
@book{Rovner_2015, address={Ithaca}, title={Fixing the facts: national security and the politics of intelligence}, url={http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity}, publisher={Cornell University Press}, author={Rovner, Joshua}, year={2015} }
@misc{2015b, title={A Democratic Licence to Operate: Report of the Independent Surveillance Review}, url={https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf}, publisher={Royal United Services Institute (RUSI)}, author={Royal United Services Institute (RUSI)}, year={2015} }
@article{Royden, title={Tolkachev, A Worthy Successor to Penkovsky}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html}, publisher={Central Intelligence Agency}, author={Royden, Barry G.} }
@article{RUDNER_2004, title={Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism}, volume={17}, DOI={10.1080/08850600490274890}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={RUDNER, MARTIN}, year={2004}, month={Jan}, pages={193–230} }
@article{Rudner_2007, title={Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism}, volume={22}, DOI={10.1080/02684520701640449}, number={4}, journal={Intelligence and National Security}, author={Rudner, Martin}, year={2007}, month={Aug}, pages={473–490} }
@book{Schlesinger_Kinzer_Coatsworth_2005, address={Cambridge, Mass}, edition={Rev. ed}, title={Bitter fruit: the story of the American coup in Guatemala}, volume={3}, publisher={Harvard University Press}, author={Schlesinger, Stephen C. and Kinzer, Stephen and Coatsworth, John H.}, year={2005} }
@article{Shaffer_2017, title={Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence}, volume={30}, DOI={10.1080/08850607.2017.1263529}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Shaffer, Ryan}, year={2017}, month={Jul}, pages={522–531} }
@article{Shoham_Jacobsen_2007, title={Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder}, volume={20}, DOI={10.1080/08850600600889027}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Shoham, Dany and Jacobsen, Stuart M.}, year={2007}, month={Dec}, pages={79–105} }
@misc{Short, title={‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine)}, url={https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html}, author={Short, Nicholas} }
@inbook{Shukman_2000, address={London}, title={Agents for change: intelligence services in the 21st century}, url={https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099}, booktitle={Agents for change: intelligence services in the 21st century}, publisher={St Ermin’s}, author={Shukman, Harold}, year={2000}, pages={1–46} }
@book{Shulsky_Schmitt_2002a, address={Washington, D.C.}, edition={3rd ed}, title={Silent warfare: understanding the world of intelligence}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site}, publisher={Potomac Books, Inc}, author={Shulsky, Abram N. and Schmitt, Gary James}, year={2002} }
@book{Shulsky_Schmitt_2002b, address={Washington, D.C.}, edition={3rd ed}, title={Silent warfare: understanding the world of intelligence}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site}, publisher={Potomac Books, Inc}, author={Shulsky, Abram N. and Schmitt, Gary James}, year={2002} }
@book{Shulsky_Schmitt_2002c, address={Washington, D.C.}, edition={3rd ed}, title={Silent warfare: understanding the world of intelligence}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site}, publisher={Potomac Books, Inc}, author={Shulsky, Abram N. and Schmitt, Gary James}, year={2002} }
@book{Shulsky_Schmitt_2002d, address={Washington, D.C.}, edition={3rd ed}, title={Silent warfare: understanding the world of intelligence}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site}, publisher={Potomac Books, Inc}, author={Shulsky, Abram N. and Schmitt, Gary James}, year={2002} }
@book{Shulsky_Schmitt_2002e, address={Washington, D.C.}, edition={3rd ed}, title={Silent warfare: understanding the world of intelligence}, url={http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site}, publisher={Potomac Books, Inc}, author={Shulsky, Abram N. and Schmitt, Gary James}, year={2002} }
@article{Sims_2006, title={Foreign Intelligence Liaison: Devils, Deals, and Details}, volume={19}, DOI={10.1080/08850600500483657}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={Sims, Jennifer E.}, year={2006}, month={May}, pages={195–217} }
@inbook{Skocpol_1979, address={Cambridge (etc.)}, title={Explaining Social Revolutions: Alternatives to Existing Theories}, url={https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099}, booktitle={States and social revolutions: a comparative analysis of France, Russia and China}, publisher={Cambridge University Press}, author={Skocpol, Theda}, year={1979}, pages={3–43} }
@book{Smith_1999, address={Basingstoke}, title={The core executive in Britain}, publisher={Macmillan}, author={Smith, Martin J.}, year={1999} }
@article{Smith_2010, title={Intelligence and the Core Executive}, volume={25}, DOI={10.1177/0952076709347072}, number={1}, journal={Public Policy and Administration}, author={Smith, Martin J.}, year={2010}, month={Jan}, pages={11–28} }
@inbook{Smith_1996, address={London}, title={New cloak, old dagger: how Britain’s spies came in from the cold}, url={https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099}, booktitle={New cloak, old dagger: how Britain’s spies came in from the cold}, publisher={V. Gollancz}, author={Smith, Michael}, year={1996}, pages={165–177} }
@article{Steiner_2006, title={Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action}, volume={19}, DOI={10.1080/08850600500332532}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Steiner, James E.}, year={2006}, month={Jan}, pages={156–165} }
@book{Stoll_1989, address={New York}, title={The cuckoo’s egg: tracking a spy through the maze of computer espionage}, publisher={Doubleday}, author={Stoll, Clifford}, year={1989} }
@book{Stoll_1991, address={London}, title={The cuckoo’s egg: tracking a spy through the maze of computer espionage}, publisher={Pan Books}, author={Stoll, Clifford}, year={1991} }
@misc{Stoll, title={The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube}, url={https://www.youtube.com/watch?v=EcKxaq1FTac}, author={Stoll, Clifford} }
@article{Stottlemyre_2015, title={HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence}, volume={28}, DOI={10.1080/08850607.2015.992760}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Stottlemyre, Steven A.}, year={2015}, month={Jul}, pages={578–589} }
@misc{ address={Swindon}, title={Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK}, url={https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations}, author={The Development, Concepts and Doctrine Centre} }
@misc{ address={London}, title={Annual Report 2003-2004}, url={http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf}, publisher={TSO}, author={The Intelligence and Security Committee of Parliament} }
@article{Thomas_1999, title={The CIA’s Bureaucratic Dimensions}, volume={12}, DOI={10.1080/088506099304972}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Thomas, Stafford T.}, year={1999}, month={Dec}, pages={399–413} }
@book{Treverton_1988, address={London}, title={Covert action: the CIA and the limits of American intervention in the postwar world}, publisher={Tauris}, author={Treverton, Gregory}, year={1988} }
@article{Turner_2004, title={A Distinctive U.S. Intelligence Identity}, volume={17}, DOI={10.1080/08850600490252650}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Turner, Michael A.}, year={2004}, month={Jan}, pages={42–61} }
@article{TURNER_2004, title={A Distinctive U.S. Intelligence Identity}, volume={17}, DOI={10.1080/08850600490252650}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={TURNER, MICHAEL A.}, year={2004}, month={Jan}, pages={42–61} }
@misc{ title={The Investigatory Powers Act 2015 - GOV.UK}, url={https://www.gov.uk/government/collections/investigatory-powers-bill}, author={UK Government} }
@article{Vrist Ronn_2016, title={Intelligence Ethics: A Critical Review and Future Perspectives}, volume={29}, DOI={10.1080/08850607.2016.1177399}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Vrist Ronn, Kira}, year={2016}, month={Oct}, pages={760–784} }
@article{Walsh_2007, title={Defection and Hierarchy in International Intelligence Sharing}, volume={27}, url={https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents}, DOI={10.1017/S0143814X07000682}, number={2}, journal={Journal of Public Policy}, publisher={Cambridge University Press}, author={Walsh, James Igoe}, year={2007} }
@article{Walsh_Miller_2016, title={Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden}, volume={31}, DOI={10.1080/02684527.2014.998436}, number={3}, journal={Intelligence and National Security}, author={Walsh, Patrick F. and Miller, Seumas}, year={2016}, month={Apr}, pages={345–368} }
@article{Warner_2004, title={Transformation and Intelligence Liaison}, volume={24}, url={https://contentstore.cla.co.uk/secure/link?id=c892d01f-ba23-e911-80cd-005056af4099}, DOI={10.1353/sais.2004.0024}, number={1}, journal={SAIS Review}, author={Warner, Michael}, year={2004}, pages={77–89} }
@article{Warner, title={Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency}, url={https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf}, publisher={Central Intelligence Agency}, author={Warner, Michael} }
@misc{Watanabe_1997, title={Fifteen Axioms for Intelligence Analysts (U)}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf}, journal={Studies in Intelligence}, author={Watanabe, Frank}, year={1997}, pages={45–47} }
@book{Weber_Fischoff_2013a, address={Berkeley}, title={Economy and society: an outline of interpretive sociology}, publisher={University of California Press}, author={Weber, Max and Fischoff, Ephraim}, editor={Roth, Guenther and Wittich, Claus}, year={2013} }
@book{Weber_Fischoff_2013b, address={Berkeley}, title={Economy and society: an outline of interpretive sociology}, publisher={University of California Press}, author={Weber, Max and Fischoff, Ephraim}, editor={Roth, Guenther and Wittich, Claus}, year={2013} }
@book{Weber_Gerth_Mills_1991, address={London}, edition={New ed}, title={From Max Weber: essays in sociology}, publisher={Routledge}, author={Weber, Max and Gerth, Hans and Mills, C. Wright}, year={1991} }
@book{West_1986, address={London}, title={GCHQ: the secret wireless war, 1900-86}, publisher={Weidenfeld and Nicolson}, author={West, Nigel}, year={1986} }
@article{Westerfield, title={American exceptionalism and American intelligence.}, volume={28}, url={https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049}, number={Issue 2}, journal={Freedom Review}, author={Westerfield, Bradford} }
@article{Westerfield_1996, title={America and the world of intelligence liaison}, volume={11}, url={https://contentstore.cla.co.uk/secure/link?id=be84103c-531e-e911-80cd-005056af4099}, DOI={10.1080/02684529608432375}, number={3}, journal={Intelligence and National Security}, author={Westerfield, H. Bradford}, year={1996}, month={Jul}, pages={523–560} }
@article{Wirtz_2013, title={Indications and Warning in an Age of Uncertainty}, volume={26}, DOI={10.1080/08850607.2013.780558}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Wirtz, James J.}, year={2013}, month={Sep}, pages={550–562} }
@book{Wise_1988, address={New York}, title={The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow}, publisher={Random House}, author={Wise, David}, year={1988} }
@article{Zegart_2006, title={An Empirical Analysis of Failed Intelligence Reforms before September 11}, volume={121}, url={https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents}, number={1}, journal={Political Science Quarterly}, publisher={The Academy of Political Science}, author={Zegart, Amy B.}, year={2006} }
@article{Zorn, title={Israel’s Quest for Satellite Intelligence}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm}, publisher={Central Intelligence Agency}, author={Zorn, E.L.} }
@article{Alvarez_1999, title={Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II}, volume={14}, url={https://www.tandfonline.com/toc/fint20/14/1?nav=tocList}, number={1}, year={1999} }
@article{Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond_2001, volume={16}, url={https://www.tandfonline.com/toc/fint20/16/1?nav=tocList}, number={1}, year={2001} }
@article{Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine)_2002, url={https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/}, journal={Middle East Review of International Affairs}, year={2002}, month={Sep} }
@book{Phythian_2014, address={London}, title={Understanding the intelligence cycle}, url={https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543}, publisher={Routledge, Taylor & Francis Group}, year={2014} }
@misc{Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, url={https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations} }
@misc{Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, url={https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations} }
@misc{RSPSoc - Home, url={http://rspsoc.org.uk/} }
@misc{Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine), url={https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1} }
@misc{Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine), url={https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2} }
@misc{Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, url={https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations} }
@misc{bellingcat - MH17 - The Open Source Evidence - bellingcat, url={https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/} }
@misc{European Court of Human Rights - ECHR, CEDH, news, information, press releases, url={https://www.echr.coe.int/Pages/home.aspx?p=home} }
@misc{U.S. House of Representatives Permanent Select Committee on Intelligence, url={https://intelligence.house.gov/} }
@misc{The Intelligence and Security Committee of Parliament, url={http://isc.independent.gov.uk/} }
@misc{Security Intelligence Review Committee (Canada), url={http://www.sirc-csars.gc.ca/} }
@misc{U.S. Senate Select Committee on Intelligence, url={https://www.intelligence.senate.gov/} }
@misc{Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, url={https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations} }