1
Agrell W. When everything is intelligence - nothing is intelligence.
2
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
3
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
4
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
5
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc 2002.
6
Warner M. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency.
7
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
8
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press 1989.
9
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. Best truth: intelligence in the information age. New Haven: Yale University Press 2000:58–98.
10
Davies PHJ. Ideas of Intelligence. Harvard International Review. 2002;24.
11
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
12
Farson S. Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies. 1989;9.
13
Herman M. Intelligence and policy: A comment. Intelligence and National Security. 1991;6:229–39. doi: 10.1080/02684529108432098
14
Herman M. Intelligence services in the information age: theory and practice. London: Frank Cass 2001.
15
Hibbert R. Intelligence and policy. Intelligence and National Security. 1990;5:110–28. doi: 10.1080/02684529008432037
16
The Intelligence and Security Committee of Parliament. Annual Report 2003-2004.
17
Laqueur W. World of secrets: the uses and limits of intelligence. World of secrets: the uses and limits of intelligence. London: Weidenfeld and Nicolson 1985:20–7.
18
Omand D. Securing the state. London: Hurst 2010.
19
Robertson KG. Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies. 1987;7.
20
Turner MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004;17:42–61. doi: 10.1080/08850600490252650
21
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
22
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press 1989.
23
Phythian M, editor. Understanding the intelligence cycle. London: Routledge, Taylor & Francis Group 2014.
24
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
25
Evans G. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 2009;9:22–46. doi: 10.1080/14702430701811987
26
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 2006;21:959–79. doi: 10.1080/02684520601046291
27
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press 2008.
28
The Development, Concepts and Doctrine Centre. Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK.
29
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
30
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
31
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 2006;19:577–85. doi: 10.1080/08850600600829767
32
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
33
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
34
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
35
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
36
Pribbenow ML. The Man in the Snow White Cell.
37
Intelligence Science Board. Educing Information - Interrogation: Science and Art. 2006.
38
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury 2011.
39
Jones K. From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 2000;15:60–80. doi: 10.1080/02684520008432628
40
Royden BG. Tolkachev, A Worthy Successor to Penkovsky.
41
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc 2002.
42
Aid MM. All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security. 2003;18:72–120. doi: 10.1080/02684520310001688880
43
Diffie W, Landau S. Brave New World of Wiretapping. Scientific American. 2008;299:56–63. doi: 10.1038/scientificamerican0908-56
44
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
45
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
46
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 2001;16.
47
Aldrich RJ. GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press 2010.
48
Alvarez D, editor. Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 1999;14.
49
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 2000;15:169–76. doi: 10.1080/02684520008432591
50
Bamford J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century 2001.
51
Clayton A. The enemy is listening. New York: Ballantine 1982.
52
Day DA. Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence. 2004;17:449–67. doi: 10.1080/08850600490446835
53
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
54
Lewin R. The American magic: codes, ciphers, and the defeat of Japan. New York: Farrar Straus Giroux 1982.
55
Richelson J, Ball D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin 1985.
56
Rudner M. Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security. 2007;22:473–90. doi: 10.1080/02684520701640449
57
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. New cloak, old dagger: how Britain’s spies came in from the cold. London: V. Gollancz 1996:165–77.
58
West N. GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson 1986.
59
Anderson D. A question of trust: report of the investigatory powers review - GOV.UK. 2015;49–70.
60
Intelligence and Security Committee (ISC). Privacy and Security: A modern and transparent legal framework. 2015.
61
Royal United Services Institute (RUSI). A Democratic Licence to Operate: Report of the Independent Surveillance Review. 2015.
62
Stoll C. The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube.
63
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books 1991.
64
UK Government. The Investigatory Powers Act 2015 - GOV.UK. https://www.gov.uk/government/collections/investigatory-powers-bill
65
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History. 2011.
66
Brugioni DA. The art and science of photoreconnaissance. Scientific American. 1 AD;78–85. doi: 10.1038/scientificamerican0396-78
67
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 2017;32:768–81. doi: 10.1080/02684527.2017.1294372
68
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
69
Johnson-Freese J, Gatling L. Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security. 2004;19:538–52. doi: 10.1080/0268452042000316278
70
Oxlee GJ. Aerospace reconnaissance. London: Brassey’s 1997.
71
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 2009;35. doi: 10.1017/S0260210509990386
72
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [Washington, D.C.]: Center for Strategic Intelligence Research, National Defense Intelligence College 2006.
73
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Published Online First: 2010.
74
RSPSoc - Home. http://rspsoc.org.uk/
75
Short N. ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine). https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
76
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
77
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine). https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
78
Zorn EL. Israel’s Quest for Satellite Intelligence.
79
Davies PHJ. INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society. 1999;2:115–33. doi: 10.1080/136911899359664
80
Omand D, Bartlett J, Miller C. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 2012;27:801–23. doi: 10.1080/02684527.2012.716965
81
Richards P, Won-Young K. MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American. 2009;300:70–7. doi: 10.1038/scientificamerican0309-70
82
Richelson JT. MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence. 2001;14:149–92. doi: 10.1080/088506001300063136
83
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
84
Denning DER. Information warfare and security. New York, N.Y.: ACM Press 1999.
85
Mitnick KD, Simon WL. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: Wiley 2005.
86
Omand SD, Bartlett J, Carl Miller. #INTELLIGENCE. 2012.
87
Shoham D, Jacobsen SM. Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence. 2007;20:79–105. doi: 10.1080/08850600600889027
88
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. New York: Doubleday 1989.
89
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
90
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
91
bellingcat - MH17 - The Open Source Evidence - bellingcat. https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
92
Johnson LK. Spies. Foreign Policy. Published Online First: September 2000. doi: 10.2307/1149708
93
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
94
Olcott A. Open source intelligence in a networked world. London: Continuum 2012.
95
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
96
Stottlemyre SA. HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence. 2015;28:578–89. doi: 10.1080/08850607.2015.992760
97
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray 2002:290–303.
98
Davis J. The Kent-Kendall Debate of 1949. Studies in Intelligence. 1991;91–101.
99
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
100
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 2007;20:401–14. doi: 10.1080/08850600701249733
101
Watanabe F. Fifteen Axioms for Intelligence Analysts (U). Studies in Intelligence. 1997;45–7.
102
Clark RM. Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: CQ Press 2016.
103
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray 2002:281–9.
104
Davis J. Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency. Occasional Papers. 2002;1. https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
105
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press 2008.
106
Godson R. Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc 1980.
107
Lowenthal MM, Marks RA. Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence. 2015;28:662–5. doi: 10.1080/08850607.2015.1051410
108
Marrin S. Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: Routledge 2011.
109
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 2008;21:1–12. doi: 10.1080/08850600701648652
110
Rovner J. Fixing the facts: national security and the politics of intelligence. Ithaca: Cornell University Press 2015.
111
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
112
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 2000;15:55–76. doi: 10.1080/02684520008432617
113
Johnson LK. Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly. 1989;33. doi: 10.2307/2600495
114
HICKS DB. Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence. 2005;18:246–61. doi: 10.1080/08850600590911954
115
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
116
Daugherty WJ. Executive secrets: covert action and the presidency. Pbk ed. Lexington: The University Press of Kentucky 2006.
117
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 2005;20:486–508. doi: 10.1080/02684520500269010
118
Gustafson K. Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Washington D.C.: Potomac 2007.
119
HOLLAND M. Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 2004;17:300–32. doi: 10.1080/08850600490274935
120
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
121
LE GALLO A. Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence. 2005;18:354–9. doi: 10.1080/08850600590884810
122
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Cambridge, Mass: Harvard University Press 2005.
123
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc 2002.
124
Steiner JE. Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence. 2006;19:156–65. doi: 10.1080/08850600500332532
125
Treverton G. Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris 1988.
126
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
127
Fischer B. Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence. 2011;24:268–306. doi: 10.1080/08850607.2011.548205
128
Kramer LA, Heuer RJ. America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence. 2007;20:50–64. doi: 10.1080/08850600600888698
129
Northcott C. The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence. 2007;20:453–79. doi: 10.1080/08850600701249758
130
Olson JM. The Ten Commandments of Counterintelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
131
Bellows RI. Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation. https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
132
Brook-Shepherd G. The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson 1988.
133
Glees A. The secrets of the service: British intelligence and Communist subversion 1939-51. London: Cape 1987.
134
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA. 1986.
135
Hinsley FH, Simkins CAG. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: H.M.S.O. .
136
Hunter RW. Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press 1999.
137
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc 2002.
138
Wise D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House 1988.
139
Davies PHJ. The Missing Dimension’s Missing Dimension. Public Policy and Administration. 2010;25:5–9. doi: 10.1177/0952076709347071
140
Gill P, Marrin S, Phythian M. Intelligence theory: key questions and debates. London: Routledge 2009.
141
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
142
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
143
Davies PHJ. MI6 and the machinery of spying. London: Frank Cass 2003.
144
Orton JD, Callahan JL. Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence. 1995;8:411–29. doi: 10.1080/08850609508435296
145
Riebling M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster 2002.
146
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton 2004.
147
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
148
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
149
Pringle RW. Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 2004;17:113–23. doi: 10.1080/08850600490252687
150
Thomas ST. The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence. 1999;12:399–413. doi: 10.1080/088506099304972
151
Weber M, Gerth H, Mills CW. From Max Weber: essays in sociology. New ed. London: Routledge 1991.
152
Blau PM. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: University of Chicago Press 1963.
153
Dandeker C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity 1990.
154
Morgan G. Images of organization. Beverly Hills: Sage 1986.
155
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: Jossey-Bass 2003.
156
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press 1991.
157
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Berkeley: University of California Press 2013.
158
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Berkeley: University of California Press 2013.
159
Pugh DS. Organization theory: selected classic readings. 5th ed. London: Penguin 2007.
160
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
161
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
162
Burns T, Stalker GM. The management of innovation. Rev. ed. Oxford: Oxford University Press 1994.
163
Cringely RX. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking 1992.
164
Knight K. Matrix management. Matrix management. Farnborough, Hants: Gower Press 1977:1–12.
165
Lawrence PR, Lorsch JW, Harvard University. Graduate School of Business Administration. Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University 1967.
166
Lorsch JW, Allen SA. Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: Harvard University, Graduate School of Business Administration, Division of Research 1973.
167
Pitt D, Smith BC. Government departments: an organizational perspective. London: Routledge and Kegan Paul 1981.
168
Allison GT. Conceptual Models and the Cuban Missile Crisis. American Political Science Review. 1969;63:689–718. doi: 10.2307/1954423
169
Cohen MD, March JG, Olsen JP. A Garbage Can Model of Organizational Choice. Administrative Science Quarterly. 1972;17. doi: 10.2307/2392088
170
Davies PHJ. Intelligence and the Machinery of Government. Public Policy and Administration. 2010;25:29–46. doi: 10.1177/0952076709347073
171
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
172
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger 2012.
173
Kaufman SJ. Organizational Politics and Change in Soviet Military Policy. World Politics. 1994;46:355–82. doi: 10.2307/2950686
174
Smith MJ. Intelligence and the Core Executive. Public Policy and Administration. 2010;25:11–28. doi: 10.1177/0952076709347072
175
Zegart AB. An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly. 2006;121.
176
Allison GT, Zelikow P. Essence of decision: explaining the Cuban Missile Crisis. 2nd ed. New York: Longman 1999.
177
Cyert RM, March JG. A behavioral theory of the firm. 2nd ed. Cambridge, Mass: Blackwell 1992.
178
Davies PHJ. MI6 and the machinery of spying. London: Frank Cass 2003.
179
Michael T. Hannan and John Freeman. The Population Ecology of Organizations. American Journal of Sociology. 1977;82.
180
Mescall PN. A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence. 1994;7:251–74. doi: 10.1080/08850609408435250
181
Morgan G. Images of organization. Beverly Hills: Sage 1986.
182
Posen B. The sources of military doctrine: France, Britain, and Germany between the world wars. Ithaca: Cornell University Press 1984.
183
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press 1991.
184
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, cabinet and core executive. Basingstoke: Macillan 1995.
185
Smith MJ. The core executive in Britain. Basingstoke: Macmillan 1999.
186
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs. Published Online First: September 2002.
187
Shukman H. Agents for change: intelligence services in the 21st century. Agents for change: intelligence services in the 21st century. London: St Ermin’s 2000:1–46.
188
Chapman B. Police state. Police state. London: Macmillan 1971:106–15.
189
Dziak JJ. Chekisty: a history of the KGB. Chekisty: a history of the KGB. Lexington, Mass: Lexington Books 1988:1–17.
190
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International 2008.
191
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton 1990:1–18.
192
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton 1990.
193
Bettina Renz. Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies. 2006;58. doi: 10.1080/0966813060031134
194
Raeff M. The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review. 1975;80. doi: 10.2307/1852058
195
Rathmell A. Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies. 1996;16.
196
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 2004;17:495–520. doi: 10.1080/0955757042000298188
197
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
198
Duyvesteyn I. Intelligence and Strategic Culture: Some Observations. Intelligence and National Security. 2011;26:521–30. doi: 10.1080/02684527.2011.580605
199
Gray CS. Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies. 1999;25.
200
Pugh DS. Organization theory: selected classic readings. Organization theory: selected classic readings. London: Penguin 2007:223–52.
201
Morgan G. Images of organization. Images of organization. Beverly Hills: Sage 1986:111–40.
202
TURNER MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004;17:42–61. doi: 10.1080/08850600490252650
203
Westerfield B. American exceptionalism and American intelligence. Freedom Review. ;28.
204
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
205
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security. 1996;11:523–60. doi: 10.1080/02684529608432375
206
Aldrich RJ. Dangerous Liaisons. Harvard International Review. 2002;24.
207
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence. 1990;4:307–23. doi: 10.1080/08850609008435147
208
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 2006;19:195–217. doi: 10.1080/08850600500483657
209
Walsh JI. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy. 2007;27. doi: 10.1017/S0143814X07000682
210
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 2004;17:481–93. doi: 10.1080/0955757042000296964
211
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 1998;13:123–43. doi: 10.1080/02684529808432480
212
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2004;17:601–13. doi: 10.1080/08850600490446736
213
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence. 1991;5:455–65. doi: 10.1080/08850609108435194
214
LEFEBVRE S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2003;16:527–42. doi: 10.1080/716100467
215
MÜLLER-WILLE B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 2007;46:49–73. doi: 10.1111/j.1468-5965.2007.00767.x
216
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 2002;23:61–86. doi: 10.1080/713999737
217
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 2004;17:193–230. doi: 10.1080/08850600490274890
218
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 2016;31:345–68. doi: 10.1080/02684527.2014.998436
219
Warner M. Transformation and Intelligence Liaison. SAIS Review. 2004;24:77–89. doi: 10.1353/sais.2004.0024
220
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 2009;11:122–39. doi: 10.1111/j.1467-856x.2008.00353.x
221
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
222
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 2016;29:110–31. doi: 10.1080/08850607.2015.1083337
223
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
224
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
225
Hastedt GP. Towards the Comparative Study of Intelligence. Journal of Conflict Studies. 1991;11.
226
O’Connell KM. Thinking About Intelligence Comparatively. Brown Journal of World Affairs. 2004;11:189–111.
227
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Washington: Pergamon-Brassey’s International Defense Publishers 1988:115–55.
228
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger 2012.
229
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger 2012.
230
Gill P. Policing politics: security intelligence and the liberal democratic state. London: F. Cass 1994.
231
Herman M. Intelligence services in the information age: theory and practice. London: Frank Cass 2001.
232
Skocpol T. Explaining Social Revolutions: Alternatives to Existing Theories. States and social revolutions: a comparative analysis of France, Russia and China. Cambridge (etc.): Cambridge University Press 1979:3–43.
233
Eftimiades N. China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies. 1992;1992.
234
Inkster N. Chinese Intelligence in the Cyber Age. Survival. 2013;55:45–66. doi: 10.1080/00396338.2013.767405
235
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
236
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International 2008.
237
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 2017;30:522–31. doi: 10.1080/08850607.2017.1263529
238
India. Kargil Review Committee. From surprise to reckoning. New Delhi: Sage Publications 2000.
239
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International 2008.
240
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
241
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International 2008.
242
Katzman K. Iran: politics, human rights, and U.S. policy. [Washington, DC]: Congressional Research Service .
243
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
244
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International 2008.
245
Kobayashi Y. Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence. 2015;28:717–33. doi: 10.1080/08850607.2015.1051453
246
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
247
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International 2008.
248
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press 2013.
249
Bradley AW, Ewing KD. Constitutional and administrative law. Constitutional and administrative law. Harlow: Pearson Longman 2011:481–6.
250
Bradley AW, Ewing KD. Constitutional and administrative law. Constitutional and administrative law. Harlow: Pearson Longman 2011:553–62.
251
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. Published Online First: 2009.
252
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. Published Online First: 2007.
253
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review. 2013;2.
254
European Court of Human Rights - ECHR, CEDH, news, information, press releases. https://www.echr.coe.int/Pages/home.aspx?p=home
255
John Wadham. The Intelligence Services Act 1994. The Modern Law Review. 1994;57.
256
Aldrich RJ. Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security. 2009;24:26–56. doi: 10.1080/02684520902756812
257
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
258
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007;22:14–37. doi: 10.1080/02684520701200756
259
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 2006;21:848–83. doi: 10.1080/02684520600957787
260
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
261
Baldino D. Democratic oversight of intelligence services. Annandale, NSW: Federation Press 2010.
262
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
263
Gill P. Policing politics: security intelligence and the liberal democratic state. London: F. Cass 1994.
264
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security. 1996;11:313–31. doi: 10.1080/02684529608432359
265
Glees A, Davies PHJ, Morrison JNL, et al. The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit 2006.
266
U.S. House of Representatives Permanent Select Committee on Intelligence. https://intelligence.house.gov/
267
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/
268
Johnson LK. A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky 1985.
269
Johnson LK. Handbook of intelligence studies. London: Routledge 2009.
270
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
271
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
272
REMPEL R. Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence. 2004;17:634–54. doi: 10.1080/08850600490496443
273
Robertson KG. Accountable Intelligence—The British Experience. Journal of Conflict Studies. 1988;8.
274
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 1998;13:144–58. doi: 10.1080/02684529808432481
275
Security Intelligence Review Committee (Canada). http://www.sirc-csars.gc.ca/
276
U.S. Senate Select Committee on Intelligence. https://www.intelligence.senate.gov/
277
Bar-Joseph U. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 2011;24:22–43. doi: 10.1080/08850607.2011.519222
278
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 2017;32:479–93. doi: 10.1080/02684527.2016.1270622
279
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. Secret intelligence: a reader. London: Routledge 2009:395–410.
280
Omand SD, Phythian M. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 2013;26:38–63. doi: 10.1080/08850607.2012.705186
281
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 2007;22:1–13. doi: 10.1080/02684520701200715
282
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 2016;29:760–84. doi: 10.1080/08850607.2016.1177399
283
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005;18:398–434. doi: 10.1080/08850600590945399
284
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
285
Herman M. Intelligence services in the information age: theory and practice. London: Frank Cass 2001.
286
Olson JM. Fair play: the moral dilemmas of spying. Washington, D.C.: Potomac Books, Inc 2008.
287
Perry DL. ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies. 1995;15.
288
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004;3:1–15. doi: 10.1080/15027570310004447
289
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge 2009.
290
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc 2002.
291
Butler of Brockwell FERB, Great Britain. Privy Council, Great Britain. Parliament. House of Commons. Review of intelligence on weapons of mass destruction. London: The Stationery Office 2004.
292
Davies PHJ. A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq.
293
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 2017;1–15. doi: 10.1080/02684527.2017.1328860
294
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 2017;1–15. doi: 10.1080/02684527.2017.1328860
295
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK. https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
296
Grabo CM. Anticipating Surprise: Analysis for Strategic Warning. 2002.
297
Herman M. Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs 1996.
298
Hughes-Wilson J. Military intelligence blunders and cover-ups. Rev. and updated ed. London: Robinson 2004.
299
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. Los Angeles: SAGE 2015:119–21.
300
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. Los Angeles: SAGE 2015:133–40.
301
Wirtz JJ. Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence. 2013;26:550–62. doi: 10.1080/08850607.2013.780558