1.
Agrell, W.: When everything is intelligence - nothing is intelligence, https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm.
2.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
3.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
4.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
5.
Shulsky, A.N., Schmitt, G.J.: Silent warfare: understanding the world of intelligence. Potomac Books, Inc, Washington, D.C. (2002).
6.
Warner, M.: Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency.
7.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
8.
Berkowitz, B.D., Goodman, A.E.: Strategic intelligence for American national security. Princeton University Press, Princeton, N.J. (1989).
9.
Berkowitz, B.D., Goodman, A.E.: Best truth: intelligence in the information age. In: Best truth: intelligence in the information age. pp. 58–98. Yale University Press, New Haven (2000).
10.
Davies, P.H.J.: Ideas of Intelligence. Harvard International Review. 24, (2002).
11.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
12.
Farson, S.: Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies. 9, (1989).
13.
Herman, M.: Intelligence and policy: A comment. Intelligence and National Security. 6, 229–239 (1991). https://doi.org/10.1080/02684529108432098.
14.
Herman, M.: Intelligence services in the information age: theory and practice. Frank Cass, London (2001).
15.
Hibbert, R.: Intelligence and policy. Intelligence and National Security. 5, 110–128 (1990). https://doi.org/10.1080/02684529008432037.
16.
The Intelligence and Security Committee of Parliament: Annual Report 2003-2004, http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf.
17.
Laqueur, W.: World of secrets: the uses and limits of intelligence. In: World of secrets: the uses and limits of intelligence. pp. 20–27. Weidenfeld and Nicolson, London (1985).
18.
Omand, D.: Securing the state. Hurst, London (2010).
19.
Robertson, K.G.: Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies. 7, (1987).
20.
Turner, M.A.: A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 17, 42–61 (2004). https://doi.org/10.1080/08850600490252650.
21.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
22.
Berkowitz, B.D., Goodman, A.E.: Strategic intelligence for American national security. Princeton University Press, Princeton, N.J. (1989).
23.
Phythian, M. ed: Understanding the intelligence cycle. Routledge, Taylor & Francis Group, London (2014).
24.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
25.
Evans, G.: Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 9, 22–46 (2009). https://doi.org/10.1080/14702430701811987.
26.
Hulnick, A.S.: What’s wrong with the Intelligence Cycle. Intelligence and National Security. 21, 959–979 (2006). https://doi.org/10.1080/02684520601046291.
27.
George, R.Z., Bruce, J.B., Georgetown University. Center for Peace and Security Studies: Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press, Washington D.C. (2008).
28.
The Development, Concepts and Doctrine Centre: Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
29.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
30.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
31.
Katz, J.I.: Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 19, 577–585 (2006). https://doi.org/10.1080/08850600600829767.
32.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
33.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
34.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
35.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
36.
Pribbenow, M.L.: The Man in the Snow White Cell.
37.
Intelligence Science Board: Educing Information - Interrogation: Science and Art, http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf, (2006).
38.
Jeffery, K.: MI6: the history of the Secret Intelligence Service, 1909-1949. Bloomsbury, London (2011).
39.
Jones, K.: From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 15, 60–80 (2000). https://doi.org/10.1080/02684520008432628.
40.
Royden, B.G.: Tolkachev, A Worthy Successor to Penkovsky.
41.
Shulsky, A.N., Schmitt, G.J.: Silent warfare: understanding the world of intelligence. Potomac Books, Inc, Washington, D.C. (2002).
42.
Aid, M.M.: All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security. 18, 72–120 (2003). https://doi.org/10.1080/02684520310001688880.
43.
Diffie, W., Landau, S.: Brave New World of Wiretapping. Scientific American. 299, 56–63 (2008). https://doi.org/10.1038/scientificamerican0908-56.
44.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
45.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
46.
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 16, (2001).
47.
Aldrich, R.J.: GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press, London (2010).
48.
Alvarez, D. ed: Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 14, (1999).
49.
Alvarez, D.: American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 15, 169–176 (2000). https://doi.org/10.1080/02684520008432591.
50.
Bamford, J.: Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. Century, London (2001).
51.
Clayton, A.: The enemy is listening. Ballantine, New York (1982).
52.
Day, D.A.: Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence. 17, 449–467 (2004). https://doi.org/10.1080/08850600490446835.
53.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
54.
Lewin, R.: The American magic: codes, ciphers, and the defeat of Japan. Farrar Straus Giroux, New York (1982).
55.
Richelson, J., Ball, D.: The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Allen & Unwin, Boston (1985).
56.
Rudner, M.: Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security. 22, 473–490 (2007). https://doi.org/10.1080/02684520701640449.
57.
Smith, M.: New cloak, old dagger: how Britain’s spies came in from the cold. In: New cloak, old dagger: how Britain’s spies came in from the cold. pp. 165–177. V. Gollancz, London (1996).
58.
West, N.: GCHQ: the secret wireless war, 1900-86. Weidenfeld and Nicolson, London (1986).
59.
Anderson, D.: A question of trust: report of the investigatory powers review - GOV.UK, https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review, (2015).
60.
Intelligence and Security Committee (ISC): Privacy and Security: A modern and transparent legal framework, http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf, (2015).
61.
Royal United Services Institute (RUSI): A Democratic Licence to Operate: Report of the Independent Surveillance Review, https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf, (2015).
62.
Stoll, C.: The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube, https://www.youtube.com/watch?v=EcKxaq1FTac.
63.
Stoll, C.: The cuckoo’s egg: tracking a spy through the maze of computer espionage. Pan Books, London (1991).
64.
UK Government: The Investigatory Powers Act 2015 - GOV.UK, https://www.gov.uk/government/collections/investigatory-powers-bill.
65.
Berkowitz, B.: The National Reconnaissance Office at 50 Years: A Brief History, https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf, (2011).
66.
Brugioni, D.A.: The art and science of photoreconnaissance. Scientific American. 78–85 (1)AD. https://doi.org/10.1038/scientificamerican0396-78.
67.
David, J.E.: How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 32, 768–781 (2017). https://doi.org/10.1080/02684527.2017.1294372.
68.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
69.
Johnson-Freese, J., Gatling, L.: Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security. 19, 538–552 (2004). https://doi.org/10.1080/0268452042000316278.
70.
Oxlee, G.J.: Aerospace reconnaissance. Brassey’s, London (1997).
71.
Davies, P.H.J.: Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 35, (2009). https://doi.org/10.1017/S0260210509990386.
72.
Finnegan, T.J., Center for Strategic Intelligence Research (U.S.): Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Center for Strategic Intelligence Research, National Defense Intelligence College, [Washington, D.C.] (2006).
73.
Radcliffe, W.W.: Origins and Current State of Japan’s Reconnaissance Satellite Program (U). (2010).
74.
RSPSoc - Home, http://rspsoc.org.uk/.
75.
Short, N.: ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine), https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html.
76.
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine), https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1.
77.
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine), https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2.
78.
Zorn, E.L.: Israel’s Quest for Satellite Intelligence.
79.
Davies, P.H.J.: INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society. 2, 115–133 (1999). https://doi.org/10.1080/136911899359664.
80.
Omand, D., Bartlett, J., Miller, C.: Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 27, 801–823 (2012). https://doi.org/10.1080/02684527.2012.716965.
81.
Richards, P., Won-Young, K.: MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American. 300, 70–77 (2009). https://doi.org/10.1038/scientificamerican0309-70.
82.
Richelson, J.T.: MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence. 14, 149–192 (2001). https://doi.org/10.1080/088506001300063136.
83.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
84.
Denning, D.E.R.: Information warfare and security. ACM Press, New York, N.Y. (1999).
85.
Mitnick, K.D., Simon, W.L.: The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Wiley, Indianapolis, IN (2005).
86.
Omand, S.D., Bartlett, J., Carl Miller: #INTELLIGENCE, https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf, (2012).
87.
Shoham, D., Jacobsen, S.M.: Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence. 20, 79–105 (2007). https://doi.org/10.1080/08850600600889027.
88.
Stoll, C.: The cuckoo’s egg: tracking a spy through the maze of computer espionage. Doubleday, New York (1989).
89.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
90.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
91.
bellingcat - MH17 - The Open Source Evidence - bellingcat, https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
92.
Johnson, L.K.: Spies. Foreign Policy. (2000). https://doi.org/10.2307/1149708.
93.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
94.
Olcott, A.: Open source intelligence in a networked world. Continuum, London (2012).
95.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
96.
Stottlemyre, S.A.: HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence. 28, 578–589 (2015). https://doi.org/10.1080/08850607.2015.992760.
97.
Cradock, P.: Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. pp. 290–303. John Murray, London (2002).
98.
Davis, J.: The Kent-Kendall Debate of 1949. Studies in Intelligence. 91–101 (1991).
99.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
100.
Marrin, S.: At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 20, 401–414 (2007). https://doi.org/10.1080/08850600701249733.
101.
Watanabe, F.: Fifteen Axioms for Intelligence Analysts (U), https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf, (1997).
102.
Clark, R.M.: Intelligence analysis : a target-centric approach. CQ Press, Thousand Oaks (2016).
103.
Cradock, P.: Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. pp. 281–289. John Murray, London (2002).
104.
Davis, J.: Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency, https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm.
105.
George, R.Z., Bruce, J.B., Georgetown University. Center for Peace and Security Studies: Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press, Washington D.C. (2008).
106.
Godson, R.: Intelligence Requirements for the 1980’s: Analysis and Estimates. National Strategy Information Center, Inc (1980).
107.
Lowenthal, M.M., Marks, R.A.: Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence. 28, 662–665 (2015). https://doi.org/10.1080/08850607.2015.1051410.
108.
Marrin, S.: Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge, Abingdon (2011).
109.
Muller, D.G.: Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 21, 1–12 (2008). https://doi.org/10.1080/08850600701648652.
110.
Rovner, J.: Fixing the facts: national security and the politics of intelligence. Cornell University Press, Ithaca (2015).
111.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
112.
Davies, P.H.J.: From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 15, 55–76 (2000). https://doi.org/10.1080/02684520008432617.
113.
Johnson, L.K.: Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly. 33, (1989). https://doi.org/10.2307/2600495.
114.
HICKS, D.B.: Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence. 18, 246–261 (2005). https://doi.org/10.1080/08850600590911954.
115.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
116.
Daugherty, W.J.: Executive secrets: covert action and the presidency. The University Press of Kentucky, Lexington (2006).
117.
Fraser, A.: Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 20, 486–508 (2005). https://doi.org/10.1080/02684520500269010.
118.
Gustafson, K.: Hostile intent: U.S. covert operations in Chile, 1964-1974. Potomac, Washington D.C. (2007).
119.
HOLLAND, M.: Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 17, 300–332 (2004). https://doi.org/10.1080/08850600490274935.
120.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
121.
LE GALLO, A.: Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence. 18, 354–359 (2005). https://doi.org/10.1080/08850600590884810.
122.
Schlesinger, S.C., Kinzer, S., Coatsworth, J.H.: Bitter fruit: the story of the American coup in Guatemala. Harvard University Press, Cambridge, Mass (2005).
123.
Shulsky, A.N., Schmitt, G.J.: Silent warfare: understanding the world of intelligence. Potomac Books, Inc, Washington, D.C. (2002).
124.
Steiner, J.E.: Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence. 19, 156–165 (2006). https://doi.org/10.1080/08850600500332532.
125.
Treverton, G.: Covert action: the CIA and the limits of American intervention in the postwar world. Tauris, London (1988).
126.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
127.
Fischer, B.: Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence. 24, 268–306 (2011). https://doi.org/10.1080/08850607.2011.548205.
128.
Kramer, L.A., Heuer, R.J.: America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence. 20, 50–64 (2007). https://doi.org/10.1080/08850600600888698.
129.
Northcott, C.: The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence. 20, 453–479 (2007). https://doi.org/10.1080/08850600701249758.
130.
Olson, J.M.: The Ten Commandments of Counterintelligence, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html.
131.
Bellows, R.I.: Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation, https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report.
132.
Brook-Shepherd, G.: The storm birds: Soviet postwar defectors. Weidenfield and Nicolson, London (1988).
133.
Glees, A.: The secrets of the service: British intelligence and Communist subversion 1939-51. Cape, London (1987).
134.
Godson, R., National Strategy Information Center, Consortium for the Study of Intelligence: Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. , Lexington, MA. (1986).
135.
Hinsley, F.H., Simkins, C.A.G.: British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. H.M.S.O., London.
136.
Hunter, R.W.: Spy hunter: inside the FBI investigation of the Walker espionage case. Naval Institute Press, Annapolis, Md (1999).
137.
Shulsky, A.N., Schmitt, G.J.: Silent warfare: understanding the world of intelligence. Potomac Books, Inc, Washington, D.C. (2002).
138.
Wise, D.: The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. Random House, New York (1988).
139.
Davies, P.H.J.: The Missing Dimension’s Missing Dimension. Public Policy and Administration. 25, 5–9 (2010). https://doi.org/10.1177/0952076709347071.
140.
Gill, P., Marrin, S., Phythian, M.: Intelligence theory: key questions and debates. Routledge, London (2009).
141.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
142.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
143.
Davies, P.H.J.: MI6 and the machinery of spying. Frank Cass, London (2003).
144.
Orton, J.D., Callahan, J.L.: Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence. 8, 411–429 (1995). https://doi.org/10.1080/08850609508435296.
145.
Riebling, M.: Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. Simon & Schuster, New York (2002).
146.
National Commission on Terrorist Attacks upon the United States: The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. Norton, New York (2004).
147.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
148.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
149.
Pringle, R.W.: Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 17, 113–123 (2004). https://doi.org/10.1080/08850600490252687.
150.
Thomas, S.T.: The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence. 12, 399–413 (1999). https://doi.org/10.1080/088506099304972.
151.
Weber, M., Gerth, H., Mills, C.W.: From Max Weber: essays in sociology. Routledge, London (1991).
152.
Blau, P.M.: The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. University of Chicago Press, Chicago (1963).
153.
Dandeker, C.: Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Polity, Cambridge (1990).
154.
Morgan, G.: Images of organization. Sage, Beverly Hills (1986).
155.
Parker, G.M.: Cross-functional teams: working with allies, enemies, and other strangers. Jossey-Bass, San Francisco, CA (2003).
156.
Powell, W.W., DiMaggio, P.J.: The new institutionalism in organizational analysis. University of Chicago Press, Chicago (1991).
157.
Weber, M., Fischoff, E.: Economy and society: an outline of interpretive sociology. University of California Press, Berkeley (2013).
158.
Weber, M., Fischoff, E.: Economy and society: an outline of interpretive sociology. University of California Press, Berkeley (2013).
159.
Pugh, D.S.: Organization theory: selected classic readings. Penguin, London (2007).
160.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
161.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
162.
Burns, T., Stalker, G.M.: The management of innovation. Oxford University Press, Oxford (1994).
163.
Cringely, R.X.: Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. Viking, London (1992).
164.
Knight, K.: Matrix management. In: Matrix management. pp. 1–12. Gower Press, Farnborough, Hants (1977).
165.
Lawrence, P.R., Lorsch, J.W., Harvard University. Graduate School of Business Administration: Organization and environment: managing differentiation and integration. Division of Research, Graduate School of Business Administration, Harvard University, Boston, Mass (1967).
166.
Lorsch, J.W., Allen, S.A.: Managing diversity and interdependence: an organizational study of multidivisional firms. Harvard University, Graduate School of Business Administration, Division of Research, Boston (1973).
167.
Pitt, D., Smith, B.C.: Government departments: an organizational perspective. Routledge and Kegan Paul, London (1981).
168.
Allison, G.T.: Conceptual Models and the Cuban Missile Crisis. American Political Science Review. 63, 689–718 (1969). https://doi.org/10.2307/1954423.
169.
Cohen, M.D., March, J.G., Olsen, J.P.: A Garbage Can Model of Organizational Choice. Administrative Science Quarterly. 17, (1972). https://doi.org/10.2307/2392088.
170.
Davies, P.H.J.: Intelligence and the Machinery of Government. Public Policy and Administration. 25, 29–46 (2010). https://doi.org/10.1177/0952076709347073.
171.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
172.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger, Santa Barbara, Calif (2012).
173.
Kaufman, S.J.: Organizational Politics and Change in Soviet Military Policy. World Politics. 46, 355–382 (1994). https://doi.org/10.2307/2950686.
174.
Smith, M.J.: Intelligence and the Core Executive. Public Policy and Administration. 25, 11–28 (2010). https://doi.org/10.1177/0952076709347072.
175.
Zegart, A.B.: An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly. 121, (2006).
176.
Allison, G.T., Zelikow, P.: Essence of decision: explaining the Cuban Missile Crisis. Longman, New York (1999).
177.
Cyert, R.M., March, J.G.: A behavioral theory of the firm. Blackwell, Cambridge, Mass (1992).
178.
Davies, P.H.J.: MI6 and the machinery of spying. Frank Cass, London (2003).
179.
Michael T. Hannan and John Freeman: The Population Ecology of Organizations. American Journal of Sociology. 82, (1977).
180.
Mescall, P.N.: A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence. 7, 251–274 (1994). https://doi.org/10.1080/08850609408435250.
181.
Morgan, G.: Images of organization. Sage, Beverly Hills (1986).
182.
Posen, B.: The sources of military doctrine: France, Britain, and Germany between the world wars. Cornell University Press, Ithaca (1984).
183.
Powell, W.W., DiMaggio, P.J.: The new institutionalism in organizational analysis. University of Chicago Press, Chicago (1991).
184.
Rhodes, R.A.W. (Roderick A.W., Dunleavy, P.: Prime Minister, cabinet and core executive. Macillan, Basingstoke (1995).
185.
Smith, M.J.: The core executive in Britain. Macmillan, Basingstoke (1999).
186.
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs. (2002).
187.
Shukman, H.: Agents for change: intelligence services in the 21st century. In: Agents for change: intelligence services in the 21st century. pp. 1–46. St Ermin’s, London (2000).
188.
Chapman, B.: Police state. In: Police state. pp. 106–115. Macmillan, London (1971).
189.
Dziak, J.J.: Chekisty: a history of the KGB. In: Chekisty: a history of the KGB. pp. 1–17. Lexington Books, Lexington, Mass (1988).
190.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International, Westport, Conn (2008).
191.
Andrew, C.M., Gordievsky, O.: KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: the inside story of its foreign operations from Lenin to Gorbachev. pp. 1–18. Hodder & Stoughton, London (1990).
192.
Andrew, C.M., Gordievsky, O.: KGB: the inside story of its foreign operations from Lenin to Gorbachev. Hodder & Stoughton, London (1990).
193.
Bettina Renz: Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies. 58, (2006). https://doi.org/10.1080/0966813060031134.
194.
Raeff, M.: The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review. 80, (1975). https://doi.org/10.2307/1852058.
195.
Rathmell, A.: Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies. 16, (1996).
196.
Davies, P.H.J.: Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 17, 495–520 (2004). https://doi.org/10.1080/0955757042000298188.
197.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
198.
Duyvesteyn, I.: Intelligence and Strategic Culture: Some Observations. Intelligence and National Security. 26, 521–530 (2011). https://doi.org/10.1080/02684527.2011.580605.
199.
Gray, C.S.: Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies. 25, (1999).
200.
Pugh, D.S.: Organization theory: selected classic readings. In: Organization theory: selected classic readings. pp. 223–252. Penguin, London (2007).
201.
Morgan, G.: Images of organization. In: Images of organization. pp. 111–140. Sage, Beverly Hills (1986).
202.
TURNER, M.A.: A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 17, 42–61 (2004). https://doi.org/10.1080/08850600490252650.
203.
Westerfield, B.: American exceptionalism and American intelligence. Freedom Review. 28,.
204.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
205.
Westerfield, H.B.: America and the world of intelligence liaison. Intelligence and National Security. 11, 523–560 (1996). https://doi.org/10.1080/02684529608432375.
206.
Aldrich, R.J.: Dangerous Liaisons. Harvard International Review. 24, (2002).
207.
Richelson, J.T.: The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence. 4, 307–323 (1990). https://doi.org/10.1080/08850609008435147.
208.
Sims, J.E.: Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 19, 195–217 (2006). https://doi.org/10.1080/08850600500483657.
209.
Walsh, J.I.: Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy. 27, (2007). https://doi.org/10.1017/S0143814X07000682.
210.
Lander, S.S.: International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 17, 481–493 (2004). https://doi.org/10.1080/0955757042000296964.
211.
Champion, B.: A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 13, 123–143 (1998). https://doi.org/10.1080/02684529808432480.
212.
CLOUGH, C.: Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 17, 601–613 (2004). https://doi.org/10.1080/08850600490446736.
213.
Hulnick, A.S.: Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence. 5, 455–465 (1991). https://doi.org/10.1080/08850609108435194.
214.
LEFEBVRE, S.: The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 16, 527–542 (2003). https://doi.org/10.1080/716100467.
215.
MÜLLER-WILLE, B.: The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 46, 49–73 (2007). https://doi.org/10.1111/j.1468-5965.2007.00767.x.
216.
Müller-Wille, B.: EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 23, 61–86 (2002). https://doi.org/10.1080/713999737.
217.
RUDNER, M.: Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 17, 193–230 (2004). https://doi.org/10.1080/08850600490274890.
218.
Walsh, P.F., Miller, S.: Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 31, 345–368 (2016). https://doi.org/10.1080/02684527.2014.998436.
219.
Warner, M.: Transformation and Intelligence Liaison. SAIS Review. 24, 77–89 (2004). https://doi.org/10.1353/sais.2004.0024.
220.
Aldrich, R.J.: US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 11, 122–139 (2009). https://doi.org/10.1111/j.1467-856x.2008.00353.x.
221.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
222.
Crosston, M.: Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 29, 110–131 (2016). https://doi.org/10.1080/08850607.2015.1083337.
223.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
224.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
225.
Hastedt, G.P.: Towards the Comparative Study of Intelligence. Journal of Conflict Studies. 11, (1991).
226.
O’Connell, K.M.: Thinking About Intelligence Comparatively. Brown Journal of World Affairs. 11, 189–111 (2004).
227.
Godson, R.: Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. pp. 115–155. Pergamon-Brassey’s International Defense Publishers, Washington (1988).
228.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger, Santa Barbara, Calif (2012).
229.
Davies, P.H.J.: Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger, Santa Barbara, Calif (2012).
230.
Gill, P.: Policing politics: security intelligence and the liberal democratic state. F. Cass, London (1994).
231.
Herman, M.: Intelligence services in the information age: theory and practice. Frank Cass, London (2001).
232.
Skocpol, T.: Explaining Social Revolutions: Alternatives to Existing Theories. In: States and social revolutions: a comparative analysis of France, Russia and China. pp. 3–43. Cambridge University Press, Cambridge (etc.) (1979).
233.
Eftimiades, N.: China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies. 1992, (1992).
234.
Inkster, N.: Chinese Intelligence in the Cyber Age. Survival. 55, 45–66 (2013). https://doi.org/10.1080/00396338.2013.767405.
235.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
236.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International, Westport, Conn (2008).
237.
Shaffer, R.: Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 30, 522–531 (2017). https://doi.org/10.1080/08850607.2017.1263529.
238.
India. Kargil Review Committee.: From surprise to reckoning. Sage Publications, New Delhi (2000).
239.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International, Westport, Conn (2008).
240.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
241.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International, Westport, Conn (2008).
242.
Katzman, K.: Iran: politics, human rights, and U.S. policy. Congressional Research Service, [Washington, DC].
243.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
244.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International, Westport, Conn (2008).
245.
Kobayashi, Y.: Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence. 28, 717–733 (2015). https://doi.org/10.1080/08850607.2015.1051453.
246.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
247.
Farson, A.S., Praeger Security International: PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International, Westport, Conn (2008).
248.
Davies, P.H.J., Gustafson, K.: Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press, Washington, DC (2013).
249.
Bradley, A.W., Ewing, K.D.: Constitutional and administrative law. In: Constitutional and administrative law. pp. 481–486. Pearson Longman, Harlow (2011).
250.
Bradley, A.W., Ewing, K.D.: Constitutional and administrative law. In: Constitutional and administrative law. pp. 553–562. Pearson Longman, Harlow (2011).
251.
Goold, B.: Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. (2009).
252.
Benjamin, V.O.: Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. (2007).
253.
Jones, B.: The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review. 2, (2013).
254.
European Court of Human Rights - ECHR, CEDH, news, information, press releases, https://www.echr.coe.int/Pages/home.aspx?p=home.
255.
John Wadham: The Intelligence Services Act 1994. The Modern Law Review. 57, (1994).
256.
Aldrich, R.J.: Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security. 24, 26–56 (2009). https://doi.org/10.1080/02684520902756812.
257.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
258.
Gill, P.: Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 22, 14–37 (2007). https://doi.org/10.1080/02684520701200756.
259.
Glees, A., Davies, P.H.J.: Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 21, 848–883 (2006). https://doi.org/10.1080/02684520600957787.
260.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
261.
Baldino, D.: Democratic oversight of intelligence services. Federation Press, Annandale, NSW (2010).
262.
Born, H., Leigh, I., Geneva Centre for the Democratic Control of Armed Forces: Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
263.
Gill, P.: Policing politics: security intelligence and the liberal democratic state. F. Cass, London (1994).
264.
Gill, P.: Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security. 11, 313–331 (1996). https://doi.org/10.1080/02684529608432359.
265.
Glees, A., Davies, P.H.J., Morrison, J.N.L., Social Affairs Unit: The open side of secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit, London (2006).
266.
U.S. House of Representatives Permanent Select Committee on Intelligence, https://intelligence.house.gov/.
267.
The Intelligence and Security Committee of Parliament, http://isc.independent.gov.uk/.
268.
Johnson, L.K.: A season of inquiry: the Senate intelligence investigation. University Press of Kentucky, Lexington, Ky (1985).
269.
Johnson, L.K.: Handbook of intelligence studies. Routledge, London (2009).
270.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
271.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
272.
REMPEL, R.: Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence. 17, 634–654 (2004). https://doi.org/10.1080/08850600490496443.
273.
Robertson, K.G.: Accountable Intelligence—The British Experience. Journal of Conflict Studies. 8, (1988).
274.
Robertson, K.G.: Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 13, 144–158 (1998). https://doi.org/10.1080/02684529808432481.
275.
Security Intelligence Review Committee (Canada), http://www.sirc-csars.gc.ca/.
276.
U.S. Senate Select Committee on Intelligence, https://www.intelligence.senate.gov/.
277.
Bar-Joseph, U.: The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 24, 22–43 (2011). https://doi.org/10.1080/08850607.2011.519222.
278.
Diderichsen, A., Rønn, K.V.: Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 32, 479–493 (2017). https://doi.org/10.1080/02684527.2016.1270622.
279.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. In: Secret intelligence: a reader. pp. 395–410. Routledge, London (2009).
280.
Omand, S.D., Phythian, M.: Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 26, 38–63 (2013). https://doi.org/10.1080/08850607.2012.705186.
281.
Quinlan, M.: Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 22, 1–13 (2007). https://doi.org/10.1080/02684520701200715.
282.
Vrist Ronn, K.: Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 29, 760–784 (2016). https://doi.org/10.1080/08850607.2016.1177399.
283.
Gendron, A.: Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 18, 398–434 (2005). https://doi.org/10.1080/08850600590945399.
284.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
285.
Herman, M.: Intelligence services in the information age: theory and practice. Frank Cass, London (2001).
286.
Olson, J.M.: Fair play: the moral dilemmas of spying. Potomac Books, Inc, Washington, D.C. (2008).
287.
Perry, D.L.: ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies. 15, (1995).
288.
Pfaff, T., Tiel, J.R.: The ethics of espionage. Journal of Military Ethics. 3, 1–15 (2004). https://doi.org/10.1080/15027570310004447.
289.
Andrew, C.M., Aldrich, R.J., Wark, W.K.: Secret intelligence: a reader. Routledge, London (2009).
290.
Shulsky, A.N., Schmitt, G.J.: Silent warfare: understanding the world of intelligence. Potomac Books, Inc, Washington, D.C. (2002).
291.
Butler of Brockwell, F.E.R.B., Great Britain. Privy Council, Great Britain. Parliament. House of Commons: Review of intelligence on weapons of mass destruction. The Stationery Office, London (2004).
292.
Davies, P.H.J.: A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq.
293.
Davies, P.H.J., Gustafson, K.: Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 1–15 (2017). https://doi.org/10.1080/02684527.2017.1328860.
294.
Davies, P.H.J., Gustafson, K.: Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 1–15 (2017). https://doi.org/10.1080/02684527.2017.1328860.
295.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK, https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations.
296.
Grabo, C.M.: Anticipating Surprise: Analysis for Strategic Warning. (2002).
297.
Herman, M.: Intelligence power in peace and war. Royal Institute of International Affairs, Cambridge (1996).
298.
Hughes-Wilson, J.: Military intelligence blunders and cover-ups. Robinson, London (2004).
299.
Heuer, R.J., Pherson, R.H.: Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. pp. 119–121. SAGE, Los Angeles (2015).
300.
Heuer, R.J., Pherson, R.H.: Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. pp. 133–140. SAGE, Los Angeles (2015).
301.
Wirtz, J.J.: Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence. 26, 550–562 (2013). https://doi.org/10.1080/08850607.2013.780558.