[1]
W. Agrell, ‘When everything is intelligence - nothing is intelligence’. Central Intelligence Agency [Online]. Available: https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
[2]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[3]
‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
[4]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[5]
A. N. Shulsky and G. J. Schmitt, Silent warfare: understanding the world of intelligence, 3rd ed. Washington, D.C.: Potomac Books, Inc, 2002 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
[6]
M. Warner, ‘Wanted: A Definition of “Intelligence” — Central Intelligence Agency’ [Online]. Available: https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf
[7]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[8]
B. D. Berkowitz and A. E. Goodman, Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press, 1989.
[9]
B. D. Berkowitz and A. E. Goodman, ‘Best truth: intelligence in the information age’, in Best truth: intelligence in the information age, New Haven: Yale University Press, 2000, pp. 58–98 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099
[10]
P. H. J. Davies, ‘Ideas of Intelligence.’, Harvard International Review, vol. 24, no. Issue 3, 2002 [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
[11]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[12]
S. Farson, ‘Schools of Thought: National Perceptions of Intelligence’, Journal of Conflict Studies, vol. 9, no. 2, 1989 [Online]. Available: https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914
[13]
M. Herman, ‘Intelligence and policy: A comment’, Intelligence and National Security, vol. 6, no. 1, pp. 229–239, Jan. 1991, doi: 10.1080/02684529108432098. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=b0ef33e3-8836-e911-80cd-005056af4099
[14]
M. Herman, Intelligence services in the information age: theory and practice. London: Frank Cass, 2001 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
[15]
R. Hibbert, ‘Intelligence and policy’, Intelligence and National Security, vol. 5, no. 1, pp. 110–128, Jan. 1990, doi: 10.1080/02684529008432037.
[16]
The Intelligence and Security Committee of Parliament, ‘Annual Report 2003-2004’. TSO, London [Online]. Available: http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
[17]
W. Laqueur, ‘World of secrets: the uses and limits of intelligence’, in World of secrets: the uses and limits of intelligence, London: Weidenfeld and Nicolson, 1985, pp. 20–27 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099
[18]
D. Omand, Securing the state. London: Hurst, 2010 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
[19]
K. G. Robertson, ‘Intelligence, Terrorism and Civil Liberties’, Journal of Conflict Studies, vol. 7, no. 2, 1987 [Online]. Available: https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825
[20]
M. A. Turner, ‘A Distinctive U.S. Intelligence Identity’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 1, pp. 42–61, Jan. 2004, doi: 10.1080/08850600490252650.
[21]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[22]
B. D. Berkowitz and A. E. Goodman, Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press, 1989.
[23]
M. Phythian, Ed., Understanding the intelligence cycle. London: Routledge, Taylor & Francis Group, 2014 [Online]. Available: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543
[24]
‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
[25]
G. Evans, ‘Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle’, Defence Studies, vol. 9, no. 1, pp. 22–46, Mar. 2009, doi: 10.1080/14702430701811987.
[26]
A. S. Hulnick, ‘What’s wrong with the Intelligence Cycle’, Intelligence and National Security, vol. 21, no. 6, pp. 959–979, Dec. 2006, doi: 10.1080/02684520601046291.
[27]
R. Z. George, J. B. Bruce, and Georgetown University. Center for Peace and Security Studies, Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press, 2008 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
[28]
The Development, Concepts and Doctrine Centre, ‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. Swindon [Online]. Available: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
[29]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[30]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[31]
J. I. Katz, ‘Deception and Denial in Iraq: The Intelligent Adversary Corollary’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 4, pp. 577–585, Dec. 2006, doi: 10.1080/08850600600829767.
[32]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[33]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[34]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[35]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[36]
M. L. Pribbenow, ‘The Man in the Snow White Cell’ [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
[37]
Intelligence Science Board, ‘Educing Information - Interrogation: Science and Art’. NDIC Press, 2006 [Online]. Available: http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf
[38]
K. Jeffery, MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury, 2011.
[39]
K. Jones, ‘From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain’, Intelligence and National Security, vol. 15, no. 4, pp. 60–80, Dec. 2000, doi: 10.1080/02684520008432628.
[40]
B. G. Royden, ‘Tolkachev, A Worthy Successor to Penkovsky’ [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
[41]
A. N. Shulsky and G. J. Schmitt, Silent warfare: understanding the world of intelligence, 3rd ed. Washington, D.C.: Potomac Books, Inc, 2002 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
[42]
M. M. Aid, ‘All Glory is Fleeting: Sigint and the Fight Against International Terrorism’, Intelligence and National Security, vol. 18, no. 4, pp. 72–120, Dec. 2003, doi: 10.1080/02684520310001688880.
[43]
W. Diffie and S. Landau, ‘Brave New World of Wiretapping’, Scientific American, vol. 299, no. 3, pp. 56–63, 2008, doi: 10.1038/scientificamerican0908-56. [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049
[44]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[45]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[46]
‘Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond’, vol. 16, no. 1, 2001 [Online]. Available: https://www.tandfonline.com/toc/fint20/16/1?nav=tocList
[47]
R. J. Aldrich, GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press, 2010.
[48]
D. Alvarez, Ed., ‘Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II’, vol. 14, no. 1, 1999 [Online]. Available: https://www.tandfonline.com/toc/fint20/14/1?nav=tocList
[49]
D. Alvarez, ‘American signals intelligence and the Cuban missile crisis’, Intelligence and National Security, vol. 15, no. 1, pp. 169–176, Mar. 2000, doi: 10.1080/02684520008432591.
[50]
J. Bamford, Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century, 2001.
[51]
A. Clayton, The enemy is listening. New York: Ballantine, 1982.
[52]
D. A. Day, ‘Ferrets Above: American Signals Intelligence Satellites During the 1960s’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 3, pp. 449–467, Sep. 2004, doi: 10.1080/08850600490446835.
[53]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[54]
R. Lewin, The American magic: codes, ciphers, and the defeat of Japan. New York: Farrar Straus Giroux, 1982.
[55]
J. Richelson and D. Ball, The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin, 1985.
[56]
M. Rudner, ‘Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism’, Intelligence and National Security, vol. 22, no. 4, pp. 473–490, Aug. 2007, doi: 10.1080/02684520701640449.
[57]
M. Smith, ‘New cloak, old dagger: how Britain’s spies came in from the cold’, in New cloak, old dagger: how Britain’s spies came in from the cold, London: V. Gollancz, 1996, pp. 165–177 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099
[58]
N. West, GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson, 1986.
[59]
D. Anderson, ‘A question of trust: report of the investigatory powers review - GOV.UK’. London, pp. 49–70, 2015 [Online]. Available: https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review
[60]
Intelligence and Security Committee (ISC), ‘Privacy and Security: A modern and transparent legal framework’. London, 2015 [Online]. Available: http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf
[61]
Royal United Services Institute (RUSI), ‘A Democratic Licence to Operate: Report of the Independent Surveillance Review’. Royal United Services Institute (RUSI), 2015 [Online]. Available: https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf
[62]
C. Stoll, ‘The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube’. [Online]. Available: https://www.youtube.com/watch?v=EcKxaq1FTac
[63]
C. Stoll, The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books, 1991.
[64]
UK Government, ‘The Investigatory Powers Act 2015 - GOV.UK’. [Online]. Available: https://www.gov.uk/government/collections/investigatory-powers-bill
[65]
B. Berkowitz, ‘The National Reconnaissance Office at 50 Years: A Brief History’. National Reconnaissance Office, Washington DC, 2011 [Online]. Available: https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
[66]
D. A. Brugioni, ‘The art and science of photoreconnaissance.’, Scientific American, no. 3, pp. 78–85, 1AD, doi: 10.1038/scientificamerican0396-78. [Online]. Available: https://cm7ly9cu9w.search.serialssolutions.com/?genre=article&issn=00368733&title=Scientific%20American&volume=274&issue=3&date=19960301&atitle=The%20art%20and%20science%20of%20photoreconnaissance.&spage=78&pages=78-85&sid=EBSCO:Academic%20Search%20Complete&au=Brugioni,%20Dino%20A.
[67]
J. E. David, ‘How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory’, Intelligence and National Security, vol. 32, no. 6, pp. 768–781, Sep. 2017, doi: 10.1080/02684527.2017.1294372.
[68]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[69]
J. Johnson-Freese and L. Gatling, ‘Security Implications of Japan’s Information Gathering Satellite (IGS) System’, Intelligence and National Security, vol. 19, no. 3, pp. 538–552, Sep. 2004, doi: 10.1080/0268452042000316278.
[70]
G. J. Oxlee, Aerospace reconnaissance. London: Brassey’s, 1997.
[71]
P. H. J. Davies, ‘Imagery in the UK: Britain’s troubled imagery intelligence architecture’, Review of International Studies, vol. 35, no. 04, Oct. 2009, doi: 10.1017/S0260210509990386.
[72]
T. J. Finnegan and Center for Strategic Intelligence Research (U.S.), Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [Washington, D.C.]: Center for Strategic Intelligence Research, National Defense Intelligence College, 2006.
[73]
W. W. Radcliffe, ‘Origins and Current State of Japan’s Reconnaissance Satellite Program (U)’, 2010 [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
[74]
‘RSPSoc - Home’. [Online]. Available: http://rspsoc.org.uk/
[75]
N. Short, ‘“The Remote Sensing Tutorial” at the Federation of American Scientists (via the Wayback Machine)’. [Online]. Available: https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
[76]
‘Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine)’. [Online]. Available: https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
[77]
‘Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine)’. [Online]. Available: https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
[78]
E. L. Zorn, ‘Israel’s Quest for Satellite Intelligence’ [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
[79]
P. H. J. Davies, ‘INFORMATION WARFARE AND THE FUTURE OF THE SPY’, Information, Communication & Society, vol. 2, no. 2, pp. 115–133, Jan. 1999, doi: 10.1080/136911899359664.
[80]
D. Omand, J. Bartlett, and C. Miller, ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security, vol. 27, no. 6, pp. 801–823, Dec. 2012, doi: 10.1080/02684527.2012.716965.
[81]
P. Richards and K. Won-Young, ‘MONITORING FOR NUCLEAR EXPLOSIONS.’, Scientific American, vol. 300, no. Issue 3, pp. 70–77, 2009, doi: 10.1038/scientificamerican0309-70. [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049
[82]
J. T. Richelson, ‘MASINT: The New Kid in Town’, International Journal of Intelligence and CounterIntelligence, vol. 14, no. 2, pp. 149–192, Apr. 2001, doi: 10.1080/088506001300063136.
[83]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[84]
D. E. R. Denning, Information warfare and security. New York, N.Y.: ACM Press, 1999.
[85]
K. D. Mitnick and W. L. Simon, The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: Wiley, 2005 [Online]. Available: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834
[86]
S. D. Omand, J. Bartlett, and Carl Miller, ‘#INTELLIGENCE’. Demos, lONDON, 2012 [Online]. Available: https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf
[87]
D. Shoham and S. M. Jacobsen, ‘Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder’, International Journal of Intelligence and CounterIntelligence, vol. 20, no. 1, pp. 79–105, Dec. 2007, doi: 10.1080/08850600600889027.
[88]
C. Stoll, The cuckoo’s egg: tracking a spy through the maze of computer espionage. New York: Doubleday, 1989.
[89]
‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
[90]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[91]
‘bellingcat - MH17 - The Open Source Evidence - bellingcat’. [Online]. Available: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
[92]
L. K. Johnson, ‘Spies’, Foreign Policy, no. 120, Sep. 2000, doi: 10.2307/1149708.
[93]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[94]
A. Olcott, Open source intelligence in a networked world. London: Continuum, 2012 [Online]. Available: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554
[95]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[96]
S. A. Stottlemyre, ‘HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence’, International Journal of Intelligence and CounterIntelligence, vol. 28, no. 3, pp. 578–589, Jul. 2015, doi: 10.1080/08850607.2015.992760.
[97]
P. Cradock, ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world, London: John Murray, 2002, pp. 290–303 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099
[98]
J. Davis, ‘The Kent-Kendall Debate of 1949’, Studies in Intelligence, pp. 91–101, 1991 [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf
[99]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[100]
S. Marrin, ‘At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers’, International Journal of Intelligence and CounterIntelligence, vol. 20, no. 3, pp. 401–414, May 2007, doi: 10.1080/08850600701249733.
[101]
F. Watanabe, ‘Fifteen Axioms for Intelligence Analysts (U)’, Studies in Intelligence. pp. 45–47, 1997 [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
[102]
R. M. Clark, Intelligence analysis : a target-centric approach, Fifth edition. Thousand Oaks: CQ Press, 2016.
[103]
P. Cradock, ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world, London: John Murray, 2002, pp. 281–289 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099
[104]
J. Davis, ‘Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency’, Occasional Papers, Sep. 2002. [Online]. Available: https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
[105]
R. Z. George, J. B. Bruce, and Georgetown University. Center for Peace and Security Studies, Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press, 2008 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
[106]
R. Godson, Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc, 1980 [Online]. Available: https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2
[107]
M. M. Lowenthal and R. A. Marks, ‘Intelligence Analysis: Is It As Good As It Gets?’, International Journal of Intelligence and CounterIntelligence, vol. 28, no. 4, pp. 662–665, Oct. 2015, doi: 10.1080/08850607.2015.1051410.
[108]
S. Marrin, Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: Routledge, 2011.
[109]
D. G. Muller, ‘Intelligence Analysis in Red and Blue’, International Journal of Intelligence and CounterIntelligence, vol. 21, no. 1, pp. 1–12, Jan. 2008, doi: 10.1080/08850600701648652.
[110]
J. Rovner, Fixing the facts: national security and the politics of intelligence. Ithaca: Cornell University Press, 2015 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
[111]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[112]
P. H. J. Davies, ‘From special operations to special political action: The “rump SOE” and SIS post‐war covert action capability 1945–1977’, Intelligence and National Security, vol. 15, no. 3, pp. 55–76, Sep. 2000, doi: 10.1080/02684520008432617.
[113]
L. K. Johnson, ‘Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy’, International Studies Quarterly, vol. 33, no. 1, Mar. 1989, doi: 10.2307/2600495.
[114]
D. B. HICKS, ‘Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action?’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 2, pp. 246–261, Mar. 2005, doi: 10.1080/08850600590911954.
[115]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[116]
W. J. Daugherty, Executive secrets: covert action and the presidency, Pbk ed. Lexington: The University Press of Kentucky, 2006 [Online]. Available: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194
[117]
A. Fraser, ‘Architecture of a broken dream: The CIA and Guatemala, 1952–54’, Intelligence and National Security, vol. 20, no. 3, pp. 486–508, Sep. 2005, doi: 10.1080/02684520500269010.
[118]
K. Gustafson, Hostile intent: U.S. covert operations in Chile, 1964-1974, 1st ed. Washington D.C.: Potomac, 2007 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site
[119]
M. HOLLAND, ‘Operation PBHISTORY: The Aftermath of SUCCESS’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 2, pp. 300–332, Jan. 2004, doi: 10.1080/08850600490274935.
[120]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[121]
A. LE GALLO, ‘Covert Action: A Vital Option in U.S. National Security Policy’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 2, pp. 354–359, Mar. 2005, doi: 10.1080/08850600590884810.
[122]
S. C. Schlesinger, S. Kinzer, and J. H. Coatsworth, Bitter fruit: the story of the American coup in Guatemala, Rev. ed., vol. 3. Cambridge, Mass: Harvard University Press, 2005.
[123]
A. N. Shulsky and G. J. Schmitt, Silent warfare: understanding the world of intelligence, 3rd ed. Washington, D.C.: Potomac Books, Inc, 2002 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
[124]
J. E. Steiner, ‘Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 1, pp. 156–165, Jan. 2006, doi: 10.1080/08850600500332532.
[125]
G. Treverton, Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris, 1988.
[126]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[127]
B. Fischer, ‘Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight’, International Journal of Intelligence and CounterIntelligence, vol. 24, no. 2, pp. 268–306, Jun. 2011, doi: 10.1080/08850607.2011.548205.
[128]
L. A. Kramer and R. J. Heuer, ‘America’s Increased Vulnerability to Insider Espionage’, International Journal of Intelligence and CounterIntelligence, vol. 20, no. 1, pp. 50–64, Dec. 2007, doi: 10.1080/08850600600888698.
[129]
C. Northcott, ‘The Role, Organization, and Methods of MI5’, International Journal of Intelligence and CounterIntelligence, vol. 20, no. 3, pp. 453–479, May 2007, doi: 10.1080/08850600701249758.
[130]
J. M. Olson, ‘The Ten Commandments of Counterintelligence’. [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
[131]
R. I. Bellows, ‘Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation’. [Online]. Available: https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
[132]
G. Brook-Shepherd, The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson, 1988.
[133]
A. Glees, The secrets of the service: British intelligence and Communist subversion 1939-51. London: Cape, 1987.
[134]
R. Godson, National Strategy Information Center, and Consortium for the Study of Intelligence, Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA., 1986.
[135]
F. H. Hinsley and C. A. G. Simkins, British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: H.M.S.O.
[136]
R. W. Hunter, Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press, 1999.
[137]
A. N. Shulsky and G. J. Schmitt, Silent warfare: understanding the world of intelligence, 3rd ed. Washington, D.C.: Potomac Books, Inc, 2002 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
[138]
D. Wise, The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House, 1988.
[139]
P. H. J. Davies, ‘The Missing Dimension’s Missing Dimension’, Public Policy and Administration, vol. 25, no. 1, pp. 5–9, Jan. 2010, doi: 10.1177/0952076709347071.
[140]
P. Gill, S. Marrin, and M. Phythian, Intelligence theory: key questions and debates. London: Routledge, 2009 [Online]. Available: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
[141]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[142]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[143]
P. H. J. Davies, MI6 and the machinery of spying. London: Frank Cass, 2003 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
[144]
J. D. Orton and J. L. Callahan, ‘Important "folk theories” in intelligence reorganization’, International Journal of Intelligence and CounterIntelligence, vol. 8, no. 4, pp. 411–429, Dec. 1995, doi: 10.1080/08850609508435296. [Online]. Available: https://www.tandfonline.com/doi/pdf/10.1080/08850609508435296?redirect=1
[145]
M. Riebling, Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security, 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster, 2002.
[146]
National Commission on Terrorist Attacks upon the United States, The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton, 2004 [Online]. Available: https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
[147]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[148]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[149]
R. W. Pringle, ‘Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 1, pp. 113–123, Jan. 2004, doi: 10.1080/08850600490252687.
[150]
S. T. Thomas, ‘The CIA’s Bureaucratic Dimensions’, International Journal of Intelligence and CounterIntelligence, vol. 12, no. 4, pp. 399–413, Dec. 1999, doi: 10.1080/088506099304972.
[151]
M. Weber, H. Gerth, and C. W. Mills, From Max Weber: essays in sociology, New ed. London: Routledge, 1991.
[152]
P. M. Blau, The dynamics of bureaucracy: a study of interpersonal relations in two government agencies, 2nd ed. Chicago: University of Chicago Press, 1963.
[153]
C. Dandeker, Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity, 1990.
[154]
G. Morgan, Images of organization. Beverly Hills: Sage, 1986.
[155]
G. M. Parker, Cross-functional teams: working with allies, enemies, and other strangers, 2nd ed., Completely revised and Updated. San Francisco, CA: Jossey-Bass, 2003 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
[156]
W. W. Powell and P. J. DiMaggio, The new institutionalism in organizational analysis. Chicago: University of Chicago Press, 1991.
[157]
M. Weber and E. Fischoff, Economy and society: an outline of interpretive sociology. Berkeley: University of California Press, 2013.
[158]
M. Weber and E. Fischoff, Economy and society: an outline of interpretive sociology. Berkeley: University of California Press, 2013.
[159]
D. S. Pugh, Organization theory: selected classic readings, 5th ed. London: Penguin, 2007.
[160]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[161]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[162]
T. Burns and G. M. Stalker, The management of innovation, Rev. ed. Oxford: Oxford University Press, 1994.
[163]
R. X. Cringely, Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking, 1992.
[164]
K. Knight, ‘Matrix management’, in Matrix management, Farnborough, Hants: Gower Press, 1977, pp. 1–12 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099
[165]
P. R. Lawrence, J. W. Lorsch, and Harvard University. Graduate School of Business Administration, Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University, 1967.
[166]
J. W. Lorsch and S. A. Allen, Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: Harvard University, Graduate School of Business Administration, Division of Research, 1973.
[167]
D. Pitt and B. C. Smith, Government departments: an organizational perspective. London: Routledge and Kegan Paul, 1981.
[168]
G. T. Allison, ‘Conceptual Models and the Cuban Missile Crisis’, American Political Science Review, vol. 63, no. 03, pp. 689–718, Sep. 1969, doi: 10.2307/1954423.
[169]
M. D. Cohen, J. G. March, and J. P. Olsen, ‘A Garbage Can Model of Organizational Choice’, Administrative Science Quarterly, vol. 17, no. 1, Mar. 1972, doi: 10.2307/2392088.
[170]
P. H. J. Davies, ‘Intelligence and the Machinery of Government’, Public Policy and Administration, vol. 25, no. 1, pp. 29–46, Jan. 2010, doi: 10.1177/0952076709347073.
[171]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[172]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[173]
S. J. Kaufman, ‘Organizational Politics and Change in Soviet Military Policy’, World Politics, vol. 46, no. 03, pp. 355–382, Apr. 1994, doi: 10.2307/2950686.
[174]
M. J. Smith, ‘Intelligence and the Core Executive’, Public Policy and Administration, vol. 25, no. 1, pp. 11–28, Jan. 2010, doi: 10.1177/0952076709347072.
[175]
A. B. Zegart, ‘An Empirical Analysis of Failed Intelligence Reforms before September 11’, Political Science Quarterly, vol. 121, no. 1, 2006 [Online]. Available: https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents
[176]
G. T. Allison and P. Zelikow, Essence of decision: explaining the Cuban Missile Crisis, 2nd ed. New York: Longman, 1999.
[177]
R. M. Cyert and J. G. March, A behavioral theory of the firm, 2nd ed. Cambridge, Mass: Blackwell, 1992.
[178]
P. H. J. Davies, MI6 and the machinery of spying. London: Frank Cass, 2003 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
[179]
Michael T. Hannan and John Freeman, ‘The Population Ecology of Organizations’, American Journal of Sociology, vol. 82, no. 5, 1977 [Online]. Available: https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents
[180]
P. N. Mescall, ‘A creature of compromise: The establishment of the DIA’, International Journal of Intelligence and CounterIntelligence, vol. 7, no. 3, pp. 251–274, Sep. 1994, doi: 10.1080/08850609408435250. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=c0522a11-2a2a-e911-80cd-005056af4099
[181]
G. Morgan, Images of organization. Beverly Hills: Sage, 1986.
[182]
B. Posen, The sources of military doctrine: France, Britain, and Germany between the world wars. Ithaca: Cornell University Press, 1984 [Online]. Available: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658
[183]
W. W. Powell and P. J. DiMaggio, The new institutionalism in organizational analysis. Chicago: University of Chicago Press, 1991.
[184]
R. A. W. (Roderick A. W. Rhodes and P. Dunleavy, Prime Minister, cabinet and core executive. Basingstoke: Macillan, 1995.
[185]
M. J. Smith, The core executive in Britain. Basingstoke: Macmillan, 1999.
[186]
‘Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine)’, Middle East Review of International Affairs, Sep. 2002 [Online]. Available: https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/
[187]
H. Shukman, ‘Agents for change: intelligence services in the 21st century’, in Agents for change: intelligence services in the 21st century, London: St Ermin’s, 2000, pp. 1–46 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099
[188]
B. Chapman, ‘Police state’, in Police state, London: Macmillan, 1971, pp. 106–115 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099
[189]
J. J. Dziak, ‘Chekisty: a history of the KGB’, in Chekisty: a history of the KGB, Lexington, Mass: Lexington Books, 1988, pp. 1–17 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099
[190]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International, 2008.
[191]
C. M. Andrew and O. Gordievsky, ‘KGB: the inside story of its foreign operations from Lenin to Gorbachev’, in KGB: the inside story of its foreign operations from Lenin to Gorbachev, London: Hodder & Stoughton, 1990, pp. 1–18 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099
[192]
C. M. Andrew and O. Gordievsky, KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton, 1990.
[193]
Bettina Renz, ‘Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics’, Europe-Asia Studies, vol. 58, no. 6, 2006, doi: 10.1080/0966813060031134. [Online]. Available: https://www.jstor.org/stable/20451267?seq=1#metadata_info_tab_contents
[194]
M. Raeff, ‘The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach’, The American Historical Review, vol. 80, no. 5, Dec. 1975, doi: 10.2307/1852058.
[195]
A. Rathmell, ‘Syria’s Intelligence Services: Origins and Development’, Journal of Conflict Studies, vol. 16, no. 2, 1996 [Online]. Available: https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636
[196]
P. H. J. Davies, ‘Intelligence culture and intelligence failure in Britain and the United States’, Cambridge Review of International Affairs, vol. 17, no. 3, pp. 495–520, Oct. 2004, doi: 10.1080/0955757042000298188.
[197]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[198]
I. Duyvesteyn, ‘Intelligence and Strategic Culture: Some Observations’, Intelligence and National Security, vol. 26, no. 4, pp. 521–530, Aug. 2011, doi: 10.1080/02684527.2011.580605.
[199]
C. S. Gray, ‘Strategic Culture as Context: The First Generation of Theory Strikes Back’, Review of International Studies, vol. 25, no. 1, 1999 [Online]. Available: https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents
[200]
D. S. Pugh, ‘Organization theory: selected classic readings’, in Organization theory: selected classic readings, 5th ed., London: Penguin, 2007, pp. 223–252 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099
[201]
G. Morgan, ‘Images of organization’, in Images of organization, Beverly Hills: Sage, 1986, pp. 111–140 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099
[202]
M. A. TURNER, ‘A Distinctive U.S. Intelligence Identity’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 1, pp. 42–61, Jan. 2004, doi: 10.1080/08850600490252650.
[203]
B. Westerfield, ‘American exceptionalism and American intelligence.’, Freedom Review, vol. 28, no. Issue 2 [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
[204]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[205]
H. B. Westerfield, ‘America and the world of intelligence liaison’, Intelligence and National Security, vol. 11, no. 3, pp. 523–560, Jul. 1996, doi: 10.1080/02684529608432375. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=be84103c-531e-e911-80cd-005056af4099
[206]
R. J. Aldrich, ‘Dangerous Liaisons.’, Harvard International Review, vol. 24, no. Issue 3, 2002 [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
[207]
J. T. Richelson, ‘The calculus of intelligence cooperation’, International Journal of Intelligence and CounterIntelligence, vol. 4, no. 3, pp. 307–323, Jan. 1990, doi: 10.1080/08850609008435147. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=24b480e3-531e-e911-80cd-005056af4099
[208]
J. E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 2, pp. 195–217, May 2006, doi: 10.1080/08850600500483657.
[209]
J. I. Walsh, ‘Defection and Hierarchy in International Intelligence Sharing’, Journal of Public Policy, vol. 27, no. 2, 2007, doi: 10.1017/S0143814X07000682. [Online]. Available: https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents
[210]
S. S. Lander, ‘International intelligence cooperation: an inside perspective’, Cambridge Review of International Affairs, vol. 17, no. 3, pp. 481–493, Oct. 2004, doi: 10.1080/0955757042000296964.
[211]
B. Champion, ‘A review of selected cases of industrial espionage and economic spying, 1568–1945’, Intelligence and National Security, vol. 13, no. 2, pp. 123–143, Jun. 1998, doi: 10.1080/02684529808432480.
[212]
C. CLOUGH, ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 4, pp. 601–613, Dec. 2004, doi: 10.1080/08850600490446736.
[213]
A. S. Hulnick, ‘Intelligence cooperation in the post‐cold war era: A new game plan?’, International Journal of Intelligence and CounterIntelligence, vol. 5, no. 4, pp. 455–465, Dec. 1991, doi: 10.1080/08850609108435194. [Online]. Available: https://thecsi.org.uk/isi/wp-content/uploads/2018/07/Hulnick-Intelligence-Cooperation.pdf?0856f5
[214]
S. LEFEBVRE, ‘The Difficulties and Dilemmas of International Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, vol. 16, no. 4, pp. 527–542, Oct. 2003, doi: 10.1080/716100467.
[215]
B. MÜLLER-WILLE, ‘The Effect of International Terrorism on EU Intelligence Co-operation’, JCMS: Journal of Common Market Studies, vol. 46, no. 1, pp. 49–73, Dec. 2007, doi: 10.1111/j.1468-5965.2007.00767.x.
[216]
B. Müller-Wille, ‘EU Intelligence Co-operation. A Critical Analysis’, Contemporary Security Policy, vol. 23, no. 2, pp. 61–86, Aug. 2002, doi: 10.1080/713999737.
[217]
M. RUDNER, ‘Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 2, pp. 193–230, Jan. 2004, doi: 10.1080/08850600490274890.
[218]
P. F. Walsh and S. Miller, ‘Rethinking “Five Eyes” Security Intelligence Collection Policies and Practice Post Snowden’, Intelligence and National Security, vol. 31, no. 3, pp. 345–368, Apr. 2016, doi: 10.1080/02684527.2014.998436.
[219]
M. Warner, ‘Transformation and Intelligence Liaison’, SAIS Review, vol. 24, no. 1, pp. 77–89, 2004, doi: 10.1353/sais.2004.0024. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=c892d01f-ba23-e911-80cd-005056af4099
[220]
R. J. Aldrich, ‘US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion’, The British Journal of Politics and International Relations, vol. 11, no. 1, pp. 122–139, Feb. 2009, doi: 10.1111/j.1467-856x.2008.00353.x.
[221]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[222]
M. Crosston, ‘Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China’, International Journal of Intelligence and CounterIntelligence, vol. 29, no. 1, pp. 110–131, Jan. 2016, doi: 10.1080/08850607.2015.1083337.
[223]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[224]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[225]
G. P. Hastedt, ‘Towards the Comparative Study of Intelligence’, Journal of Conflict Studies, vol. 11, no. 3, 1991 [Online]. Available: https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035
[226]
K. M. O’Connell, ‘Thinking About Intelligence Comparatively.’, Brown Journal of World Affairs, vol. 11, no. Issue 1, pp. 189–111, 2004 [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049
[227]
R. Godson, ‘Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World’, in Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World, Washington: Pergamon-Brassey’s International Defense Publishers, 1988, pp. 115–155 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099
[228]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[229]
P. H. J. Davies, Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger, 2012 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
[230]
P. Gill, Policing politics: security intelligence and the liberal democratic state. London: F. Cass, 1994 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
[231]
M. Herman, Intelligence services in the information age: theory and practice. London: Frank Cass, 2001 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
[232]
T. Skocpol, ‘Explaining Social Revolutions: Alternatives to Existing Theories’, in States and social revolutions: a comparative analysis of France, Russia and China, Cambridge (etc.): Cambridge University Press, 1979, pp. 3–43 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099
[233]
N. Eftimiades, ‘China’s Ministry of State Security: Coming of Age in the International Arena’, Occasional Papers/Reprints Series in Contemporary Asian Studies, vol. 1992, no. 2, 1992 [Online]. Available: https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/
[234]
N. Inkster, ‘Chinese Intelligence in the Cyber Age’, Survival, vol. 55, no. 1, pp. 45–66, Mar. 2013, doi: 10.1080/00396338.2013.767405.
[235]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[236]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International, 2008.
[237]
R. Shaffer, ‘Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence’, International Journal of Intelligence and CounterIntelligence, vol. 30, no. 3, pp. 522–531, Jul. 2017, doi: 10.1080/08850607.2017.1263529.
[238]
India. Kargil Review Committee., From surprise to reckoning. New Delhi: Sage Publications, 2000.
[239]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International, 2008.
[240]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[241]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International, 2008.
[242]
K. Katzman, Iran: politics, human rights, and U.S. policy, vol. RL32048. [Washington, DC]: Congressional Research Service.
[243]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[244]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International, 2008.
[245]
Y. Kobayashi, ‘Assessing Reform of the Japanese Intelligence Community’, International Journal of Intelligence and CounterIntelligence, vol. 28, no. 4, pp. 717–733, Oct. 2015, doi: 10.1080/08850607.2015.1051453.
[246]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[247]
A. S. Farson and Praeger Security International, PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International, 2008.
[248]
P. H. J. Davies and K. Gustafson, Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
[249]
A. W. Bradley and K. D. Ewing, ‘Constitutional and administrative law’, in Constitutional and administrative law, 15th ed., Harlow: Pearson Longman, 2011, pp. 481–486 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099
[250]
A. W. Bradley and K. D. Ewing, ‘Constitutional and administrative law’, in Constitutional and administrative law, 15th ed., Harlow: Pearson Longman, 2011, pp. 553–562 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099
[251]
B. Goold, ‘Liberty and others v The United Kingdom: a new chance for another missed opportunity’, Public Law, 2009 [Online]. Available: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5
[252]
V. O. Benjamin, ‘Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights’, European Human Rights Law Review, 2007 [Online]. Available: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16
[253]
B. Jones, ‘The Justice and Security Bill: “focused and proportionate”, or a derogation of the right to a fair trial (via the Wayback Machine)’, Westminster Law Review, vol. 2, no. 2, Apr. 2013 [Online]. Available: https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php
[254]
‘European Court of Human Rights - ECHR, CEDH, news, information, press releases’. [Online]. Available: https://www.echr.coe.int/Pages/home.aspx?p=home
[255]
John Wadham, ‘The Intelligence Services Act 1994’, The Modern Law Review, vol. 57, no. 6, 1994 [Online]. Available: https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents
[256]
R. J. Aldrich, ‘Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem’, Intelligence and National Security, vol. 24, no. 1, pp. 26–56, Feb. 2009, doi: 10.1080/02684520902756812.
[257]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[258]
P. Gill, ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, vol. 22, no. 1, pp. 14–37, Feb. 2007, doi: 10.1080/02684520701200756.
[259]
A. Glees and P. H. J. Davies, ‘Intelligence, Iraq and the limits of legislative accountability during political crisis’, Intelligence and National Security, vol. 21, no. 5, pp. 848–883, Oct. 2006, doi: 10.1080/02684520600957787.
[260]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[261]
D. Baldino, Democratic oversight of intelligence services. Annandale, NSW: Federation Press, 2010.
[262]
H. Born, I. Leigh, and Geneva Centre for the Democratic Control of Armed Forces, Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies. .
[263]
P. Gill, Policing politics: security intelligence and the liberal democratic state. London: F. Cass, 1994 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
[264]
P. Gill, ‘Reasserting control: Recent changes in the oversight of the UK intelligence community’, Intelligence and National Security, vol. 11, no. 2, pp. 313–331, Apr. 1996, doi: 10.1080/02684529608432359. [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=28d50676-8836-e911-80cd-005056af4099
[265]
A. Glees, P. H. J. Davies, J. N. L. Morrison, and Social Affairs Unit, The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit, 2006.
[266]
‘U.S. House of Representatives Permanent Select Committee on Intelligence’. [Online]. Available: https://intelligence.house.gov/
[267]
‘The Intelligence and Security Committee of Parliament’. [Online]. Available: http://isc.independent.gov.uk/
[268]
L. K. Johnson, A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky, 1985.
[269]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
[270]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[271]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[272]
R. REMPEL, ‘Canada’s Parliamentary Oversight of Security and Intelligence’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 4, pp. 634–654, Dec. 2004, doi: 10.1080/08850600490496443.
[273]
K. G. Robertson, ‘Accountable Intelligence—The British Experience’, Journal of Conflict Studies, vol. 8, no. 1, 1988 [Online]. Available: https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
[274]
K. G. Robertson, ‘Recent reform of intelligence in the UK: Democratization or risk management?’, Intelligence and National Security, vol. 13, no. 2, pp. 144–158, Jun. 1998, doi: 10.1080/02684529808432481.
[275]
‘Security Intelligence Review Committee (Canada)’. [Online]. Available: http://www.sirc-csars.gc.ca/
[276]
‘U.S. Senate Select Committee on Intelligence’. [Online]. Available: https://www.intelligence.senate.gov/
[277]
U. Bar-Joseph, ‘The Professional Ethics of Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, vol. 24, no. 1, pp. 22–43, Jan. 2011, doi: 10.1080/08850607.2011.519222.
[278]
A. Diderichsen and K. V. Rønn, ‘Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics’, Intelligence and National Security, vol. 32, no. 4, pp. 479–493, Jun. 2017, doi: 10.1080/02684527.2016.1270622.
[279]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, ‘Secret intelligence: a reader’, in Secret intelligence: a reader, London: Routledge, 2009, pp. 395–410 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099
[280]
S. D. Omand and M. Phythian, ‘Ethics and Intelligence: A Debate’, International Journal of Intelligence and CounterIntelligence, vol. 26, no. 1, pp. 38–63, Mar. 2013, doi: 10.1080/08850607.2012.705186.
[281]
M. Quinlan, ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, vol. 22, no. 1, pp. 1–13, Feb. 2007, doi: 10.1080/02684520701200715.
[282]
K. Vrist Ronn, ‘Intelligence Ethics: A Critical Review and Future Perspectives’, International Journal of Intelligence and CounterIntelligence, vol. 29, no. 4, pp. 760–784, Oct. 2016, doi: 10.1080/08850607.2016.1177399.
[283]
A. Gendron, ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 3, pp. 398–434, Oct. 2005, doi: 10.1080/08850600590945399.
[284]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[285]
M. Herman, Intelligence services in the information age: theory and practice. London: Frank Cass, 2001 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
[286]
J. M. Olson, Fair play: the moral dilemmas of spying. Washington, D.C.: Potomac Books, Inc, 2008 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049
[287]
D. L. Perry, ‘“Repugnant Philosophy”: Ethics, Espionage, and Covert Action’, Journal of Conflict Studies, vol. 15, no. 1, 1995 [Online]. Available: https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438
[288]
T. Pfaff and J. R. Tiel, ‘The ethics of espionage’, Journal of Military Ethics, vol. 3, no. 1, pp. 1–15, Mar. 2004, doi: 10.1080/15027570310004447.
[289]
C. M. Andrew, R. J. Aldrich, and W. K. Wark, Secret intelligence: a reader. London: Routledge, 2009.
[290]
A. N. Shulsky and G. J. Schmitt, Silent warfare: understanding the world of intelligence, 3rd ed. Washington, D.C.: Potomac Books, Inc, 2002 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
[291]
F. E. R. B. Butler of Brockwell, Great Britain. Privy Council, and Great Britain. Parliament. House of Commons, Review of intelligence on weapons of mass destruction, vol. 898. London: The Stationery Office, 2004 [Online]. Available: https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
[292]
P. H. J. Davies, ‘A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq’ [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
[293]
P. H. J. Davies and K. Gustafson, ‘Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise’, Intelligence and National Security, pp. 1–15, Jul. 2017, doi: 10.1080/02684527.2017.1328860.
[294]
P. H. J. Davies and K. Gustafson, ‘Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise’, Intelligence and National Security, pp. 1–15, Jul. 2017, doi: 10.1080/02684527.2017.1328860.
[295]
‘Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
[296]
C. M. Grabo, Anticipating Surprise: Analysis for Strategic Warning. 2002 [Online]. Available: https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf
[297]
M. Herman, Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs, 1996 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
[298]
J. Hughes-Wilson, Military intelligence blunders and cover-ups, Rev. and Updated ed. London: Robinson, 2004 [Online]. Available: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
[299]
R. J. Heuer and R. H. Pherson, ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis, Second Edition., Los Angeles: SAGE, 2015, pp. 119–121 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099
[300]
R. J. Heuer and R. H. Pherson, ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis, Second Edition., Los Angeles: SAGE, 2015, pp. 133–140 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099
[301]
J. J. Wirtz, ‘Indications and Warning in an Age of Uncertainty’, International Journal of Intelligence and CounterIntelligence, vol. 26, no. 3, pp. 550–562, Sep. 2013, doi: 10.1080/08850607.2013.780558.