1
Agrell W. When everything is intelligence - nothing is intelligence. https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
2
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
3
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
4
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
5
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
6
Warner M. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf
7
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
8
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: : Princeton University Press 1989.
9
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. In: Best truth: intelligence in the information age. New Haven: : Yale University Press 2000. 58–98.https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099
10
Davies PHJ. Ideas of Intelligence. Harvard International Review 2002;24.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
11
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
12
Farson S. Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies 1989;9.https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914
13
Herman M. Intelligence and policy: A comment. Intelligence and National Security 1991;6:229–39. doi:10.1080/02684529108432098
14
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
15
Hibbert R. Intelligence and policy. Intelligence and National Security 1990;5:110–28. doi:10.1080/02684529008432037
16
The Intelligence and Security Committee of Parliament. Annual Report 2003-2004. http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
17
Laqueur W. World of secrets: the uses and limits of intelligence. In: World of secrets: the uses and limits of intelligence. London: : Weidenfeld and Nicolson 1985. 20–7.https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099
18
Omand D. Securing the state. London: : Hurst 2010. http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
19
Robertson KG. Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies 1987;7.https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825
20
Turner MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence 2004;17:42–61. doi:10.1080/08850600490252650
21
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
22
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: : Princeton University Press 1989.
23
Phythian M, editor. Understanding the intelligence cycle. London: : Routledge, Taylor & Francis Group 2014. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543
24
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
25
Evans G. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies 2009;9:22–46. doi:10.1080/14702430701811987
26
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security 2006;21:959–79. doi:10.1080/02684520601046291
27
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: : Georgetown University Press 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
28
The Development, Concepts and Doctrine Centre. Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
29
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
30
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
31
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence 2006;19:577–85. doi:10.1080/08850600600829767
32
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
33
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
34
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
35
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
36
Pribbenow ML. The Man in the Snow White Cell. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
37
Intelligence Science Board. Educing Information - Interrogation: Science and Art. 2006.http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf
38
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: : Bloomsbury 2011.
39
Jones K. From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security 2000;15:60–80. doi:10.1080/02684520008432628
40
Royden BG. Tolkachev, A Worthy Successor to Penkovsky. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
41
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
42
Aid MM. All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security 2003;18:72–120. doi:10.1080/02684520310001688880
43
Diffie W, Landau S. Brave New World of Wiretapping. Scientific American 2008;299:56–63. doi:10.1038/scientificamerican0908-56
44
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
45
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
46
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 2001;16.https://www.tandfonline.com/toc/fint20/16/1?nav=tocList
47
Aldrich RJ. GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: : Harper Press 2010.
48
Alvarez D, editor. Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 1999;14.https://www.tandfonline.com/toc/fint20/14/1?nav=tocList
49
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security 2000;15:169–76. doi:10.1080/02684520008432591
50
Bamford J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: : Century 2001.
51
Clayton A. The enemy is listening. New York: : Ballantine 1982.
52
Day DA. Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence 2004;17:449–67. doi:10.1080/08850600490446835
53
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
54
Lewin R. The American magic: codes, ciphers, and the defeat of Japan. New York: : Farrar Straus Giroux 1982.
55
Richelson J, Ball D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: : Allen & Unwin 1985.
56
Rudner M. Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security 2007;22:473–90. doi:10.1080/02684520701640449
57
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. In: New cloak, old dagger: how Britain’s spies came in from the cold. London: : V. Gollancz 1996. 165–77.https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099
58
West N. GCHQ: the secret wireless war, 1900-86. London: : Weidenfeld and Nicolson 1986.
59
Anderson D. A question of trust: report of the investigatory powers review - GOV.UK. 2015;:49–70.https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review
60
Intelligence and Security Committee (ISC). Privacy and Security: A modern and transparent legal framework. 2015.http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf
61
Royal United Services Institute (RUSI). A Democratic Licence to Operate: Report of the Independent Surveillance Review. 2015.https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf
62
Stoll C. The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube. https://www.youtube.com/watch?v=EcKxaq1FTac
63
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: : Pan Books 1991.
64
UK Government. The Investigatory Powers Act 2015 - GOV.UK. https://www.gov.uk/government/collections/investigatory-powers-bill
65
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History. 2011.https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
66
Brugioni DA. The art and science of photoreconnaissance. Scientific American 1AD;:78–85. doi:10.1038/scientificamerican0396-78
67
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security 2017;32:768–81. doi:10.1080/02684527.2017.1294372
68
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
69
Johnson-Freese J, Gatling L. Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security 2004;19:538–52. doi:10.1080/0268452042000316278
70
Oxlee GJ. Aerospace reconnaissance. London: : Brassey’s 1997.
71
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies 2009;35. doi:10.1017/S0260210509990386
72
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [Washington, D.C.]: : Center for Strategic Intelligence Research, National Defense Intelligence College 2006.
73
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Published Online First: 2010.https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
74
RSPSoc - Home. http://rspsoc.org.uk/
75
Short N. ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine). https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
76
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
77
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
78
Zorn EL. Israel’s Quest for Satellite Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
79
Davies PHJ. INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society 1999;2:115–33. doi:10.1080/136911899359664
80
Omand D, Bartlett J, Miller C. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security 2012;27:801–23. doi:10.1080/02684527.2012.716965
81
Richards P, Won-Young K. MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American 2009;300:70–7. doi:10.1038/scientificamerican0309-70
82
Richelson JT. MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence 2001;14:149–92. doi:10.1080/088506001300063136
83
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
84
Denning DER. Information warfare and security. New York, N.Y.: : ACM Press 1999.
85
Mitnick KD, Simon WL. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: : Wiley 2005. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834
86
Omand SD, Bartlett J, Carl Miller. #INTELLIGENCE. 2012.https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf
87
Shoham D, Jacobsen SM. Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence 2007;20:79–105. doi:10.1080/08850600600889027
88
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. New York: : Doubleday 1989.
89
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
90
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
91
bellingcat - MH17 - The Open Source Evidence - bellingcat. https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
92
Johnson LK. Spies. Foreign Policy Published Online First: September 2000. doi:10.2307/1149708
93
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
94
Olcott A. Open source intelligence in a networked world. London: : Continuum 2012. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554
95
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
96
Stottlemyre SA. HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence 2015;28:578–89. doi:10.1080/08850607.2015.992760
97
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. London: : John Murray 2002. 290–303.https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099
98
Davis J. The Kent-Kendall Debate of 1949. Studies in Intelligence 1991;:91–101.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf
99
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
100
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence 2007;20:401–14. doi:10.1080/08850600701249733
101
Watanabe F. Fifteen Axioms for Intelligence Analysts (U). Studies in Intelligence. 1997;:45–7.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
102
Clark RM. Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: : CQ Press 2016.
103
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. London: : John Murray 2002. 281–9.https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099
104
Davis J. Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency. Occasional Papers. 2002;1.https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
105
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: : Georgetown University Press 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
106
Godson R. Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc 1980. https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2
107
Lowenthal MM, Marks RA. Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence 2015;28:662–5. doi:10.1080/08850607.2015.1051410
108
Marrin S. Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: : Routledge 2011.
109
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence 2008;21:1–12. doi:10.1080/08850600701648652
110
Rovner J. Fixing the facts: national security and the politics of intelligence. Ithaca: : Cornell University Press 2015. http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
111
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
112
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security 2000;15:55–76. doi:10.1080/02684520008432617
113
Johnson LK. Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly 1989;33. doi:10.2307/2600495
114
HICKS DB. Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence 2005;18:246–61. doi:10.1080/08850600590911954
115
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
116
Daugherty WJ. Executive secrets: covert action and the presidency. Pbk ed. Lexington: : The University Press of Kentucky 2006. https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194
117
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security 2005;20:486–508. doi:10.1080/02684520500269010
118
Gustafson K. Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Washington D.C.: : Potomac 2007. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site
119
HOLLAND M. Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence 2004;17:300–32. doi:10.1080/08850600490274935
120
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
121
LE GALLO A. Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence 2005;18:354–9. doi:10.1080/08850600590884810
122
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Cambridge, Mass: : Harvard University Press 2005.
123
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
124
Steiner JE. Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence 2006;19:156–65. doi:10.1080/08850600500332532
125
Treverton G. Covert action: the CIA and the limits of American intervention in the postwar world. London: : Tauris 1988.
126
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
127
Fischer B. Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence 2011;24:268–306. doi:10.1080/08850607.2011.548205
128
Kramer LA, Heuer RJ. America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence 2007;20:50–64. doi:10.1080/08850600600888698
129
Northcott C. The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence 2007;20:453–79. doi:10.1080/08850600701249758
130
Olson JM. The Ten Commandments of Counterintelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
131
Bellows RI. Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation. https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
132
Brook-Shepherd G. The storm birds: Soviet postwar defectors. London: : Weidenfield and Nicolson 1988.
133
Glees A. The secrets of the service: British intelligence and Communist subversion 1939-51. London: : Cape 1987.
134
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.: 1986.
135
Hinsley FH, Simkins CAG. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: : H.M.S.O.
136
Hunter RW. Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: : Naval Institute Press 1999.
137
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
138
Wise D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: : Random House 1988.
139
Davies PHJ. The Missing Dimension’s Missing Dimension. Public Policy and Administration 2010;25:5–9. doi:10.1177/0952076709347071
140
Gill P, Marrin S, Phythian M. Intelligence theory: key questions and debates. London: : Routledge 2009. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
141
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
142
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
143
Davies PHJ. MI6 and the machinery of spying. London: : Frank Cass 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
144
Orton JD, Callahan JL. Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence 1995;8:411–29. doi:10.1080/08850609508435296
145
Riebling M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: : Simon & Schuster 2002.
146
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: : Norton 2004. https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
147
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
148
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
149
Pringle RW. Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence 2004;17:113–23. doi:10.1080/08850600490252687
150
Thomas ST. The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence 1999;12:399–413. doi:10.1080/088506099304972
151
Weber M, Gerth H, Mills CW. From Max Weber: essays in sociology. New ed. London: : Routledge 1991.
152
Blau PM. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: : University of Chicago Press 1963.
153
Dandeker C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: : Polity 1990.
154
Morgan G. Images of organization. Beverly Hills: : Sage 1986.
155
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: : Jossey-Bass 2003. http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
156
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: : University of Chicago Press 1991.
157
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Berkeley: : University of California Press 2013.
158
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Berkeley: : University of California Press 2013.
159
Pugh DS. Organization theory: selected classic readings. 5th ed. London: : Penguin 2007.
160
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
161
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
162
Burns T, Stalker GM. The management of innovation. Rev. ed. Oxford: : Oxford University Press 1994.
163
Cringely RX. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: : Viking 1992.
164
Knight K. Matrix management. In: Matrix management. Farnborough, Hants: : Gower Press 1977. 1–12.https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099
165
Lawrence PR, Lorsch JW, Harvard University. Graduate School of Business Administration. Organization and environment: managing differentiation and integration. Boston, Mass: : Division of Research, Graduate School of Business Administration, Harvard University 1967.
166
Lorsch JW, Allen SA. Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: : Harvard University, Graduate School of Business Administration, Division of Research 1973.
167
Pitt D, Smith BC. Government departments: an organizational perspective. London: : Routledge and Kegan Paul 1981.
168
Allison GT. Conceptual Models and the Cuban Missile Crisis. American Political Science Review 1969;63:689–718. doi:10.2307/1954423
169
Cohen MD, March JG, Olsen JP. A Garbage Can Model of Organizational Choice. Administrative Science Quarterly 1972;17. doi:10.2307/2392088
170
Davies PHJ. Intelligence and the Machinery of Government. Public Policy and Administration 2010;25:29–46. doi:10.1177/0952076709347073
171
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
172
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
173
Kaufman SJ. Organizational Politics and Change in Soviet Military Policy. World Politics 1994;46:355–82. doi:10.2307/2950686
174
Smith MJ. Intelligence and the Core Executive. Public Policy and Administration 2010;25:11–28. doi:10.1177/0952076709347072
175
Zegart AB. An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly 2006;121.https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents
176
Allison GT, Zelikow P. Essence of decision: explaining the Cuban Missile Crisis. 2nd ed. New York: : Longman 1999.
177
Cyert RM, March JG. A behavioral theory of the firm. 2nd ed. Cambridge, Mass: : Blackwell 1992.
178
Davies PHJ. MI6 and the machinery of spying. London: : Frank Cass 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
179
Michael T. Hannan and John Freeman. The Population Ecology of Organizations. American Journal of Sociology 1977;82.https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents
180
Mescall PN. A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence 1994;7:251–74. doi:10.1080/08850609408435250
181
Morgan G. Images of organization. Beverly Hills: : Sage 1986.
182
Posen B. The sources of military doctrine: France, Britain, and Germany between the world wars. Ithaca: : Cornell University Press 1984. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658
183
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: : University of Chicago Press 1991.
184
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, cabinet and core executive. Basingstoke: : Macillan 1995.
185
Smith MJ. The core executive in Britain. Basingstoke: : Macmillan 1999.
186
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs Published Online First: September 2002.https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/
187
Shukman H. Agents for change: intelligence services in the 21st century. In: Agents for change: intelligence services in the 21st century. London: : St Ermin’s 2000. 1–46.https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099
188
Chapman B. Police state. In: Police state. London: : Macmillan 1971. 106–15.https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099
189
Dziak JJ. Chekisty: a history of the KGB. In: Chekisty: a history of the KGB. Lexington, Mass: : Lexington Books 1988. 1–17.https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099
190
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: : Praeger Security International 2008.
191
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: : Hodder & Stoughton 1990. 1–18.https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099
192
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: : Hodder & Stoughton 1990.
193
Bettina Renz. Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies 2006;58. doi:10.1080/0966813060031134
194
Raeff M. The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review 1975;80. doi:10.2307/1852058
195
Rathmell A. Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies 1996;16.https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636
196
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs 2004;17:495–520. doi:10.1080/0955757042000298188
197
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
198
Duyvesteyn I. Intelligence and Strategic Culture: Some Observations. Intelligence and National Security 2011;26:521–30. doi:10.1080/02684527.2011.580605
199
Gray CS. Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies 1999;25.https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents
200
Pugh DS. Organization theory: selected classic readings. In: Organization theory: selected classic readings. London: : Penguin 2007. 223–52.https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099
201
Morgan G. Images of organization. In: Images of organization. Beverly Hills: : Sage 1986. 111–40.https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099
202
TURNER MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence 2004;17:42–61. doi:10.1080/08850600490252650
203
Westerfield B. American exceptionalism and American intelligence. Freedom Review;28.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
204
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
205
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security 1996;11:523–60. doi:10.1080/02684529608432375
206
Aldrich RJ. Dangerous Liaisons. Harvard International Review 2002;24.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
207
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence 1990;4:307–23. doi:10.1080/08850609008435147
208
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence 2006;19:195–217. doi:10.1080/08850600500483657
209
Walsh JI. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy 2007;27. doi:10.1017/S0143814X07000682
210
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs 2004;17:481–93. doi:10.1080/0955757042000296964
211
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security 1998;13:123–43. doi:10.1080/02684529808432480
212
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 2004;17:601–13. doi:10.1080/08850600490446736
213
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence 1991;5:455–65. doi:10.1080/08850609108435194
214
LEFEBVRE S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 2003;16:527–42. doi:10.1080/716100467
215
MÜLLER-WILLE B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies 2007;46:49–73. doi:10.1111/j.1468-5965.2007.00767.x
216
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy 2002;23:61–86. doi:10.1080/713999737
217
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence 2004;17:193–230. doi:10.1080/08850600490274890
218
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security 2016;31:345–68. doi:10.1080/02684527.2014.998436
219
Warner M. Transformation and Intelligence Liaison. SAIS Review 2004;24:77–89. doi:10.1353/sais.2004.0024
220
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations 2009;11:122–39. doi:10.1111/j.1467-856x.2008.00353.x
221
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
222
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence 2016;29:110–31. doi:10.1080/08850607.2015.1083337
223
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
224
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
225
Hastedt GP. Towards the Comparative Study of Intelligence. Journal of Conflict Studies 1991;11.https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035
226
O’Connell KM. Thinking About Intelligence Comparatively. Brown Journal of World Affairs 2004;11:189–111.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049
227
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Washington: : Pergamon-Brassey’s International Defense Publishers 1988. 115–55.https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099
228
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
229
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
230
Gill P. Policing politics: security intelligence and the liberal democratic state. London: : F. Cass 1994. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
231
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
232
Skocpol T. Explaining Social Revolutions: Alternatives to Existing Theories. In: States and social revolutions: a comparative analysis of France, Russia and China. Cambridge (etc.): : Cambridge University Press 1979. 3–43.https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099
233
Eftimiades N. China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies 1992;1992.https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/
234
Inkster N. Chinese Intelligence in the Cyber Age. Survival 2013;55:45–66. doi:10.1080/00396338.2013.767405
235
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
236
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: : Praeger Security International 2008.
237
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence 2017;30:522–31. doi:10.1080/08850607.2017.1263529
238
India. Kargil Review Committee. From surprise to reckoning. New Delhi: : Sage Publications 2000.
239
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: : Praeger Security International 2008.
240
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
241
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: : Praeger Security International 2008.
242
Katzman K. Iran: politics, human rights, and U.S. policy. [Washington, DC]: : Congressional Research Service
243
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
244
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: : Praeger Security International 2008.
245
Kobayashi Y. Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence 2015;28:717–33. doi:10.1080/08850607.2015.1051453
246
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
247
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: : Praeger Security International 2008.
248
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
249
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law. Harlow: : Pearson Longman 2011. 481–6.https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099
250
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law. Harlow: : Pearson Longman 2011. 553–62.https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099
251
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law Published Online First: 2009.https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5
252
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review Published Online First: 2007.https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16
253
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review 2013;2.https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php
254
European Court of Human Rights - ECHR, CEDH, news, information, press releases. https://www.echr.coe.int/Pages/home.aspx?p=home
255
John Wadham. The Intelligence Services Act 1994. The Modern Law Review 1994;57.https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents
256
Aldrich RJ. Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security 2009;24:26–56. doi:10.1080/02684520902756812
257
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
258
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security 2007;22:14–37. doi:10.1080/02684520701200756
259
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security 2006;21:848–83. doi:10.1080/02684520600957787
260
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
261
Baldino D. Democratic oversight of intelligence services. Annandale, NSW: : Federation Press 2010.
262
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
263
Gill P. Policing politics: security intelligence and the liberal democratic state. London: : F. Cass 1994. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
264
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security 1996;11:313–31. doi:10.1080/02684529608432359
265
Glees A, Davies PHJ, Morrison JNL, et al. The open side of secrecy: Britain’s Intelligence and Security Committee. London: : The Social Affairs Unit 2006.
266
U.S. House of Representatives Permanent Select Committee on Intelligence. https://intelligence.house.gov/
267
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/
268
Johnson LK. A season of inquiry: the Senate intelligence investigation. Lexington, Ky: : University Press of Kentucky 1985.
269
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
270
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
271
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
272
REMPEL R. Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence 2004;17:634–54. doi:10.1080/08850600490496443
273
Robertson KG. Accountable Intelligence—The British Experience. Journal of Conflict Studies 1988;8.https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
274
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security 1998;13:144–58. doi:10.1080/02684529808432481
275
Security Intelligence Review Committee (Canada). http://www.sirc-csars.gc.ca/
276
U.S. Senate Select Committee on Intelligence. https://www.intelligence.senate.gov/
277
Bar-Joseph U. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence 2011;24:22–43. doi:10.1080/08850607.2011.519222
278
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security 2017;32:479–93. doi:10.1080/02684527.2016.1270622
279
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. In: Secret intelligence: a reader. London: : Routledge 2009. 395–410.https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099
280
Omand SD, Phythian M. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence 2013;26:38–63. doi:10.1080/08850607.2012.705186
281
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security 2007;22:1–13. doi:10.1080/02684520701200715
282
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence 2016;29:760–84. doi:10.1080/08850607.2016.1177399
283
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence 2005;18:398–434. doi:10.1080/08850600590945399
284
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
285
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
286
Olson JM. Fair play: the moral dilemmas of spying. Washington, D.C.: : Potomac Books, Inc 2008. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049
287
Perry DL. ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies 1995;15.https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438
288
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics 2004;3:1–15. doi:10.1080/15027570310004447
289
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
290
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
291
Butler of Brockwell FERB, Great Britain. Privy Council, Great Britain. Parliament. House of Commons. Review of intelligence on weapons of mass destruction. London: : The Stationery Office 2004. https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
292
Davies PHJ. A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
293
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security 2017;:1–15. doi:10.1080/02684527.2017.1328860
294
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security 2017;:1–15. doi:10.1080/02684527.2017.1328860
295
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
296
Grabo CM. Anticipating Surprise: Analysis for Strategic Warning. 2002. https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf
297
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
298
Hughes-Wilson J. Military intelligence blunders and cover-ups. Rev. and updated ed. London: : Robinson 2004. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
299
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 119–21.https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099
300
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 133–40.https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099
301
Wirtz JJ. Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence 2013;26:550–62. doi:10.1080/08850607.2013.780558