1.
Agrell W. When everything is intelligence - nothing is intelligence [Internet]. Central Intelligence Agency; Available from: https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
2.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
3.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
4.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
5.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
6.
Warner M. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. Available from: https://apps.dtic.mil/dtic/tr/fulltext/u2/a525816.pdf
7.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
8.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press; 1989.
9.
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. In: Best truth: intelligence in the information age [Internet]. New Haven: Yale University Press; 2000. p. 58–98. Available from: https://contentstore.cla.co.uk/secure/link?id=9385e876-8033-e911-80cd-005056af4099
10.
Davies PHJ. Ideas of Intelligence. Harvard International Review [Internet]. 2002;24(Issue 3). Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
11.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
12.
Farson S. Schools of Thought: National Perceptions of Intelligence. Journal of Conflict Studies [Internet]. 1989;9(2). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14845/15914
13.
Herman M. Intelligence and policy: A comment. Intelligence and National Security [Internet]. 1991 Jan;6(1):229–39. Available from: https://contentstore.cla.co.uk/secure/link?id=b0ef33e3-8836-e911-80cd-005056af4099
14.
Herman M. Intelligence services in the information age: theory and practice [Internet]. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
15.
Hibbert R. Intelligence and policy. Intelligence and National Security. 1990 Jan;5(1):110–28.
16.
The Intelligence and Security Committee of Parliament. Annual Report 2003-2004 [Internet]. London: TSO; Available from: http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
17.
Laqueur W. World of secrets: the uses and limits of intelligence. In: World of secrets: the uses and limits of intelligence [Internet]. London: Weidenfeld and Nicolson; 1985. p. 20–7. Available from: https://contentstore.cla.co.uk/secure/link?id=2ab5e770-9933-e911-80cd-005056af4099
18.
Omand D. Securing the state [Internet]. London: Hurst; 2010. Available from: http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
19.
Robertson KG. Intelligence, Terrorism and Civil Liberties. Journal of Conflict Studies [Internet]. 1987;7(2). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14756/15825
20.
Turner MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(1):42–61.
21.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
22.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press; 1989.
23.
Phythian M, editor. Understanding the intelligence cycle [Internet]. London: Routledge, Taylor & Francis Group; 2014. Available from: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=1209543
24.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
25.
Evans G. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 2009 Mar;9(1):22–46.
26.
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 2006 Dec;21(6):959–79.
27.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations [Internet]. Washington D.C.: Georgetown University Press; 2008. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
28.
The Development, Concepts and Doctrine Centre. Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK [Internet]. Swindon; Available from: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
29.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
30.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
31.
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 2006 Dec;19(4):577–85.
32.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
33.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
34.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
35.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
36.
Pribbenow ML. The Man in the Snow White Cell. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
37.
Intelligence Science Board. Educing Information - Interrogation: Science and Art [Internet]. NDIC Press; 2006. Available from: http://hrlibrary.umn.edu/OathBetrayed/Intelligence%20Science%20Board%202006.pdf
38.
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury; 2011.
39.
Jones K. From the horse’s mouth: Luftwaffe POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 2000 Dec;15(4):60–80.
40.
Royden BG. Tolkachev, A Worthy Successor to Penkovsky. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
41.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
42.
Aid MM. All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence and National Security. 2003 Dec;18(4):72–120.
43.
Diffie W, Landau S. Brave New World of Wiretapping. Scientific American [Internet]. 2008;299(3):56–63. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049
44.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
45.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
46.
Intelligence and National Security Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. 2001;16(1). Available from: https://www.tandfonline.com/toc/fint20/16/1?nav=tocList
47.
Aldrich RJ. GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press; 2010.
48.
Alvarez D, editor. Intelligence and National Security Special Issue on Allied and Axis Signals Intelligence in World War II. 1999;14(1). Available from: https://www.tandfonline.com/toc/fint20/14/1?nav=tocList
49.
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 2000 Mar;15(1):169–76.
50.
Bamford J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century; 2001.
51.
Clayton A. The enemy is listening. New York: Ballantine; 1982.
52.
Day DA. Ferrets Above: American Signals Intelligence Satellites During the 1960s. International Journal of Intelligence and CounterIntelligence. 2004 Sep;17(3):449–67.
53.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
54.
Lewin R. The American magic: codes, ciphers, and the defeat of Japan. New York: Farrar Straus Giroux; 1982.
55.
Richelson J, Ball D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin; 1985.
56.
Rudner M. Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security. 2007 Aug;22(4):473–90.
57.
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. In: New cloak, old dagger: how Britain’s spies came in from the cold [Internet]. London: V. Gollancz; 1996. p. 165–77. Available from: https://contentstore.cla.co.uk/secure/link?id=01532d15-8433-e911-80cd-005056af4099
58.
West N. GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson; 1986.
59.
Anderson D. A question of trust: report of the investigatory powers review - GOV.UK [Internet]. London; 2015. p. 49–70. Available from: https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review
60.
Intelligence and Security Committee (ISC). Privacy and Security: A modern and transparent legal framework [Internet]. London; 2015. Available from: http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf
61.
Royal United Services Institute (RUSI). A Democratic Licence to Operate: Report of the Independent Surveillance Review [Internet]. Royal United Services Institute (RUSI); 2015. Available from: https://rusi.org/sites/default/files/20150714_whr_2-15_a_democratic_licence_to_operate.pdf
62.
Stoll C. The KGB, the Computer, and Me (Complete) - Nova documentary on YouTube [Internet]. Available from: https://www.youtube.com/watch?v=EcKxaq1FTac
63.
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books; 1991.
64.
UK Government. The Investigatory Powers Act 2015 - GOV.UK [Internet]. Available from: https://www.gov.uk/government/collections/investigatory-powers-bill
65.
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History [Internet]. Washington DC: National Reconnaissance Office; 2011. Available from: https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
66.
Brugioni DA. The art and science of photoreconnaissance. Scientific American [Internet]. 1AD;(3):78–85. Available from: https://cm7ly9cu9w.search.serialssolutions.com/?genre=article&issn=00368733&title=Scientific%20American&volume=274&issue=3&date=19960301&atitle=The%20art%20and%20science%20of%20photoreconnaissance.&spage=78&pages=78-85&sid=EBSCO:Academic%20Search%20Complete&au=Brugioni,%20Dino%20A.
67.
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 2017 Sep 19;32(6):768–81.
68.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
69.
Johnson-Freese J, Gatling L. Security Implications of Japan’s Information Gathering Satellite (IGS) System. Intelligence and National Security. 2004 Sep;19(3):538–52.
70.
Oxlee GJ. Aerospace reconnaissance. London: Brassey’s; 1997.
71.
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 2009 Oct;35(04).
72.
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [Washington, D.C.]: Center for Strategic Intelligence Research, National Defense Intelligence College; 2006.
73.
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). 2010; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
74.
RSPSoc - Home [Internet]. Available from: http://rspsoc.org.uk/
75.
Short N. ‘The Remote Sensing Tutorial’ at the Federation of American Scientists (via the Wayback Machine) [Internet]. Available from: https://web.archive.org/web/20160828033759/http://fas.org/irp/imint/docs/rst/Front/tofc.html
76.
Declassified Satellite Imagery - 1 at USGS (via the Wayback Machine) [Internet]. Available from: https://web.archive.org/web/20170513015905/https://lta.cr.usgs.gov/declass_1
77.
Declassified Satellite Imagery - 2 at USGS (via the Wayback Machine) [Internet]. Available from: https://web.archive.org/web/20170513015917/https://lta.cr.usgs.gov/declass_2
78.
Zorn EL. Israel’s Quest for Satellite Intelligence. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
79.
Davies PHJ. INFORMATION WARFARE AND THE FUTURE OF THE SPY. Information, Communication & Society. 1999 Jan;2(2):115–33.
80.
Omand D, Bartlett J, Miller C. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 2012 Dec;27(6):801–23.
81.
Richards P, Won-Young K. MONITORING FOR NUCLEAR EXPLOSIONS. Scientific American [Internet]. 2009;300(Issue 3):70–7. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049
82.
Richelson JT. MASINT: The New Kid in Town. International Journal of Intelligence and CounterIntelligence. 2001 Apr;14(2):149–92.
83.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
84.
Denning DER. Information warfare and security. New York, N.Y.: ACM Press; 1999.
85.
Mitnick KD, Simon WL. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers [Internet]. Indianapolis, IN: Wiley; 2005. Available from: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=225834
86.
Omand SD, Bartlett J, Carl Miller. #INTELLIGENCE [Internet]. lONDON: Demos; 2012. Available from: https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf
87.
Shoham D, Jacobsen SM. Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder. International Journal of Intelligence and CounterIntelligence. 2007 Dec;20(1):79–105.
88.
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. New York: Doubleday; 1989.
89.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
90.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
91.
bellingcat - MH17 - The Open Source Evidence - bellingcat [Internet]. Available from: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
92.
Johnson LK. Spies. Foreign Policy. 2000 Sep;(120).
93.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
94.
Olcott A. Open source intelligence in a networked world [Internet]. London: Continuum; 2012. Available from: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=894554
95.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
96.
Stottlemyre SA. HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence. 2015 Jul 3;28(3):578–89.
97.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world [Internet]. London: John Murray; 2002. p. 290–303. Available from: https://contentstore.cla.co.uk/secure/link?id=e674dcad-6830-e911-80cd-005056af4099
98.
Davis J. The Kent-Kendall Debate of 1949. Studies in Intelligence [Internet]. 1991;91–101. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/pdf/v35i2a06p.pdf
99.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
100.
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 2007 May 21;20(3):401–14.
101.
Watanabe F. Fifteen Axioms for Intelligence Analysts (U) [Internet]. Studies in Intelligence. 1997. p. 45–7. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
102.
Clark RM. Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: CQ Press; 2016.
103.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world [Internet]. London: John Murray; 2002. p. 281–9. Available from: https://contentstore.cla.co.uk/secure/link?id=754a0b37-6930-e911-80cd-005056af4099
104.
Davis J. Improving CIA Analytic Performance: DI Analytic Priorities — Central Intelligence Agency [Internet]. Vol. 1, Occasional Papers. 2002. Available from: https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
105.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations [Internet]. Washington D.C.: Georgetown University Press; 2008. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
106.
Godson R. Intelligence Requirements for the 1980’s: Analysis and Estimates [Internet]. National Strategy Information Center, Inc; 1980. Available from: https://www.amazon.co.uk/Intelligence-Requirements-1980s-Analysis-Estimates/dp/B001KA8FJ2
107.
Lowenthal MM, Marks RA. Intelligence Analysis: Is It As Good As It Gets? International Journal of Intelligence and CounterIntelligence. 2015 Oct 2;28(4):662–5.
108.
Marrin S. Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: Routledge; 2011.
109.
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 2008 Jan 2;21(1):1–12.
110.
Rovner J. Fixing the facts: national security and the politics of intelligence [Internet]. Ithaca: Cornell University Press; 2015. Available from: http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
111.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
112.
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 2000 Sep;15(3):55–76.
113.
Johnson LK. Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly. 1989 Mar;33(1).
114.
HICKS DB. Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? International Journal of Intelligence and CounterIntelligence. 2005 Mar 2;18(2):246–61.
115.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
116.
Daugherty WJ. Executive secrets: covert action and the presidency [Internet]. Pbk ed. Lexington: The University Press of Kentucky; 2006. Available from: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=792194
117.
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 2005 Sep;20(3):486–508.
118.
Gustafson K. Hostile intent: U.S. covert operations in Chile, 1964-1974 [Internet]. 1st ed. Washington D.C.: Potomac; 2007. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388619&site=ehost-live&scope=site
119.
HOLLAND M. Operation PBHISTORY: The Aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(2):300–32.
120.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
121.
LE GALLO A. Covert Action: A Vital Option in U.S. National Security Policy. International Journal of Intelligence and CounterIntelligence. 2005 Mar 2;18(2):354–9.
122.
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Vol. 3. Cambridge, Mass: Harvard University Press; 2005.
123.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
124.
Steiner JE. Commentary: Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and CounterIntelligence. 2006 Jan;19(1):156–65.
125.
Treverton G. Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris; 1988.
126.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
127.
Fischer B. Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight. International Journal of Intelligence and CounterIntelligence. 2011 Jun;24(2):268–306.
128.
Kramer LA, Heuer RJ. America’s Increased Vulnerability to Insider Espionage. International Journal of Intelligence and CounterIntelligence. 2007 Dec;20(1):50–64.
129.
Northcott C. The Role, Organization, and Methods of MI5. International Journal of Intelligence and CounterIntelligence. 2007 May 21;20(3):453–79.
130.
Olson JM. The Ten Commandments of Counterintelligence [Internet]. Central Intelligence Agency; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
131.
Bellows RI. Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation [Internet]. Available from: https://www.justice.gov/archives/ag/attorney-generals-foia-reading-room-records-bellows-report
132.
Brook-Shepherd G. The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson; 1988.
133.
Glees A. The secrets of the service: British intelligence and Communist subversion 1939-51. London: Cape; 1987.
134.
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.; 1986.
135.
Hinsley FH, Simkins CAG. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: H.M.S.O.;
136.
Hunter RW. Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press; 1999.
137.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
138.
Wise D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House; 1988.
139.
Davies PHJ. The Missing Dimension’s Missing Dimension. Public Policy and Administration. 2010 Jan;25(1):5–9.
140.
Gill P, Marrin S, Phythian M. Intelligence theory: key questions and debates [Internet]. London: Routledge; 2009. Available from: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
141.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
142.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
143.
Davies PHJ. MI6 and the machinery of spying [Internet]. London: Frank Cass; 2003. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
144.
Orton JD, Callahan JL. Important "folk theories” in intelligence reorganization. International Journal of Intelligence and CounterIntelligence [Internet]. 1995 Dec;8(4):411–29. Available from: https://www.tandfonline.com/doi/pdf/10.1080/08850609508435296?redirect=1
145.
Riebling M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster; 2002.
146.
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States [Internet]. New York: Norton; 2004. Available from: https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
147.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
148.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
149.
Pringle RW. Modernization of Terror: The Transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(1):113–23.
150.
Thomas ST. The CIA’s Bureaucratic Dimensions. International Journal of Intelligence and CounterIntelligence. 1999 Dec;12(4):399–413.
151.
Weber M, Gerth H, Mills CW. From Max Weber: essays in sociology. New ed. London: Routledge; 1991.
152.
Blau PM. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: University of Chicago Press; 1963.
153.
Dandeker C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity; 1990.
154.
Morgan G. Images of organization. Beverly Hills: Sage; 1986.
155.
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers [Internet]. 2nd ed., completely revised and updated. San Francisco, CA: Jossey-Bass; 2003. Available from: http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
156.
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press; 1991.
157.
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Roth G, Wittich C, editors. Berkeley: University of California Press; 2013.
158.
Weber M, Fischoff E. Economy and society: an outline of interpretive sociology. Roth G, Wittich C, editors. Berkeley: University of California Press; 2013.
159.
Pugh DS. Organization theory: selected classic readings. 5th ed. London: Penguin; 2007.
160.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
161.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
162.
Burns T, Stalker GM. The management of innovation. Rev. ed. Oxford: Oxford University Press; 1994.
163.
Cringely RX. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking; 1992.
164.
Knight K. Matrix management. In: Matrix management [Internet]. Farnborough, Hants: Gower Press; 1977. p. 1–12. Available from: https://contentstore.cla.co.uk/secure/link?id=b5889629-6a30-e911-80cd-005056af4099
165.
Lawrence PR, Lorsch JW, Harvard University. Graduate School of Business Administration. Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University; 1967.
166.
Lorsch JW, Allen SA. Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: Harvard University, Graduate School of Business Administration, Division of Research; 1973.
167.
Pitt D, Smith BC. Government departments: an organizational perspective. London: Routledge and Kegan Paul; 1981.
168.
Allison GT. Conceptual Models and the Cuban Missile Crisis. American Political Science Review. 1969 Sep;63(03):689–718.
169.
Cohen MD, March JG, Olsen JP. A Garbage Can Model of Organizational Choice. Administrative Science Quarterly. 1972 Mar;17(1).
170.
Davies PHJ. Intelligence and the Machinery of Government. Public Policy and Administration. 2010 Jan;25(1):29–46.
171.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
172.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
173.
Kaufman SJ. Organizational Politics and Change in Soviet Military Policy. World Politics. 1994 Apr;46(03):355–82.
174.
Smith MJ. Intelligence and the Core Executive. Public Policy and Administration. 2010 Jan;25(1):11–28.
175.
Zegart AB. An Empirical Analysis of Failed Intelligence Reforms before September 11. Political Science Quarterly [Internet]. 2006;121(1). Available from: https://www.jstor.org/stable/20202644?seq=1#metadata_info_tab_contents
176.
Allison GT, Zelikow P. Essence of decision: explaining the Cuban Missile Crisis. 2nd ed. New York: Longman; 1999.
177.
Cyert RM, March JG. A behavioral theory of the firm. 2nd ed. Cambridge, Mass: Blackwell; 1992.
178.
Davies PHJ. MI6 and the machinery of spying [Internet]. London: Frank Cass; 2003. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
179.
Michael T. Hannan and John Freeman. The Population Ecology of Organizations. American Journal of Sociology [Internet]. 1977;82(5). Available from: https://www.jstor.org/stable/2777807?seq=1#metadata_info_tab_contents
180.
Mescall PN. A creature of compromise: The establishment of the DIA. International Journal of Intelligence and CounterIntelligence [Internet]. 1994 Sep;7(3):251–74. Available from: https://contentstore.cla.co.uk/secure/link?id=c0522a11-2a2a-e911-80cd-005056af4099
181.
Morgan G. Images of organization. Beverly Hills: Sage; 1986.
182.
Posen B. The sources of military doctrine: France, Britain, and Germany between the world wars [Internet]. Ithaca: Cornell University Press; 1984. Available from: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=3138658
183.
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press; 1991.
184.
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, cabinet and core executive. Basingstoke: Macillan; 1995.
185.
Smith MJ. The core executive in Britain. Basingstoke: Macmillan; 1999.
186.
Iraq’s Security and Intelligence Network; A Guide and Analysis (via the Wayback Machine). Middle East Review of International Affairs [Internet]. 2002 Sep; Available from: https://web.archive.org/web/20130522063947/http://www.gloria-center.org/2002/09/al-marashi-2002-09-01/
187.
Shukman H. Agents for change: intelligence services in the 21st century. In: Agents for change: intelligence services in the 21st century [Internet]. London: St Ermin’s; 2000. p. 1–46. Available from: https://contentstore.cla.co.uk/secure/link?id=a5cd95b7-8e33-e911-80cd-005056af4099
188.
Chapman B. Police state. In: Police state [Internet]. London: Macmillan; 1971. p. 106–15. Available from: https://contentstore.cla.co.uk/secure/link?id=8a87b5f5-9133-e911-80cd-005056af4099
189.
Dziak JJ. Chekisty: a history of the KGB. In: Chekisty: a history of the KGB [Internet]. Lexington, Mass: Lexington Books; 1988. p. 1–17. Available from: https://contentstore.cla.co.uk/secure/link?id=0da23d0d-7930-e911-80cd-005056af4099
190.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International; 2008.
191.
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: the inside story of its foreign operations from Lenin to Gorbachev [Internet]. London: Hodder & Stoughton; 1990. p. 1–18. Available from: https://contentstore.cla.co.uk/secure/link?id=69951f97-9c33-e911-80cd-005056af4099
192.
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton; 1990.
193.
Bettina Renz. Putin’s Militocracy? An Alternative Interpretation of Siloviki in Contemporary Russian Politics. Europe-Asia Studies [Internet]. 2006;58(6). Available from: https://www.jstor.org/stable/20451267?seq=1#metadata_info_tab_contents
194.
Raeff M. The Well-Ordered Police State and the Development of Modernity in Seventeenth- and Eighteenth-Century Europe: An Attempt at a Comparative Approach. The American Historical Review. 1975 Dec;80(5).
195.
Rathmell A. Syria’s Intelligence Services: Origins and Development. Journal of Conflict Studies [Internet]. 1996;16(2). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/11815/12636
196.
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 2004 Oct;17(3):495–520.
197.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
198.
Duyvesteyn I. Intelligence and Strategic Culture: Some Observations. Intelligence and National Security. 2011 Aug;26(4):521–30.
199.
Gray CS. Strategic Culture as Context: The First Generation of Theory Strikes Back. Review of International Studies [Internet]. 1999;25(1). Available from: https://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#metadata_info_tab_contents
200.
Pugh DS. Organization theory: selected classic readings. In: Organization theory: selected classic readings [Internet]. 5th ed. London: Penguin; 2007. p. 223–52. Available from: https://contentstore.cla.co.uk/secure/link?id=52287c24-7130-e911-80cd-005056af4099
201.
Morgan G. Images of organization. In: Images of organization [Internet]. Beverly Hills: Sage; 1986. p. 111–40. Available from: https://contentstore.cla.co.uk/secure/link?id=5f4beea5-7530-e911-80cd-005056af4099
202.
TURNER MA. A Distinctive U.S. Intelligence Identity. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(1):42–61.
203.
Westerfield B. American exceptionalism and American intelligence. Freedom Review [Internet]. 28(Issue 2). Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
204.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
205.
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security [Internet]. 1996 Jul;11(3):523–60. Available from: https://contentstore.cla.co.uk/secure/link?id=be84103c-531e-e911-80cd-005056af4099
206.
Aldrich RJ. Dangerous Liaisons. Harvard International Review [Internet]. 2002;24(Issue 3). Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
207.
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence [Internet]. 1990 Jan;4(3):307–23. Available from: https://contentstore.cla.co.uk/secure/link?id=24b480e3-531e-e911-80cd-005056af4099
208.
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 2006 May;19(2):195–217.
209.
Walsh JI. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy [Internet]. 2007;27(2). Available from: https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents
210.
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 2004 Oct;17(3):481–93.
211.
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 1998 Jun;13(2):123–43.
212.
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):601–13.
213.
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence [Internet]. 1991 Dec;5(4):455–65. Available from: https://thecsi.org.uk/isi/wp-content/uploads/2018/07/Hulnick-Intelligence-Cooperation.pdf?0856f5
214.
LEFEBVRE S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2003 Oct;16(4):527–42.
215.
MÜLLER-WILLE B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 2007 Dec 10;46(1):49–73.
216.
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 2002 Aug;23(2):61–86.
217.
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(2):193–230.
218.
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 2016 Apr 15;31(3):345–68.
219.
Warner M. Transformation and Intelligence Liaison. SAIS Review [Internet]. 2004;24(1):77–89. Available from: https://contentstore.cla.co.uk/secure/link?id=c892d01f-ba23-e911-80cd-005056af4099
220.
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 2009 Feb;11(1):122–39.
221.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
222.
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 2016 Jan 2;29(1):110–31.
223.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
224.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
225.
Hastedt GP. Towards the Comparative Study of Intelligence. Journal of Conflict Studies [Internet]. 1991;11(3). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14966/16035
226.
O’Connell KM. Thinking About Intelligence Comparatively. Brown Journal of World Affairs [Internet]. 2004;11(Issue 1):189–111. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=13811065&site=ehost-live&scope=site&custid=s1123049
227.
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing foreign intelligence: the US, the USSR, the UK, & the Third World [Internet]. Washington: Pergamon-Brassey’s International Defense Publishers; 1988. p. 115–55. Available from: https://contentstore.cla.co.uk/secure/link?id=5618e884-8833-e911-80cd-005056af4099
228.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
229.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
230.
Gill P. Policing politics: security intelligence and the liberal democratic state [Internet]. London: F. Cass; 1994. Available from: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
231.
Herman M. Intelligence services in the information age: theory and practice [Internet]. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
232.
Skocpol T. Explaining Social Revolutions: Alternatives to Existing Theories. In: States and social revolutions: a comparative analysis of France, Russia and China [Internet]. Cambridge (etc.): Cambridge University Press; 1979. p. 3–43. Available from: https://contentstore.cla.co.uk/secure/link?id=ab0df71e-6b30-e911-80cd-005056af4099
233.
Eftimiades N. China’s Ministry of State Security: Coming of Age in the International Arena. Occasional Papers/Reprints Series in Contemporary Asian Studies [Internet]. 1992;1992(2). Available from: https://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1/
234.
Inkster N. Chinese Intelligence in the Cyber Age. Survival. 2013 Mar;55(1):45–66.
235.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
236.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International; 2008.
237.
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 2017 Jul 3;30(3):522–31.
238.
India. Kargil Review Committee. From surprise to reckoning. New Delhi: Sage Publications; 2000.
239.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International; 2008.
240.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
241.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International; 2008.
242.
Katzman K. Iran: politics, human rights, and U.S. policy. Vol. RL32048. [Washington, DC]: Congressional Research Service;
243.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
244.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International; 2008.
245.
Kobayashi Y. Assessing Reform of the Japanese Intelligence Community. International Journal of Intelligence and CounterIntelligence. 2015 Oct 2;28(4):717–33.
246.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
247.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International; 2008.
248.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
249.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law [Internet]. 15th ed. Harlow: Pearson Longman; 2011. p. 481–6. Available from: https://contentstore.cla.co.uk/secure/link?id=cee2bb5d-1335-e911-80cd-005056af4099
250.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law [Internet]. 15th ed. Harlow: Pearson Longman; 2011. p. 553–62. Available from: https://contentstore.cla.co.uk/secure/link?id=bdcce3e8-773a-e911-80cd-005056af4099
251.
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law [Internet]. 2009; Available from: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=I0C3A5710E1F511DD93AEE69B09385F41&crumb-action=append&context=5
252.
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review [Internet]. 2007; Available from: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=16
253.
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial (via the Wayback Machine). Westminster Law Review [Internet]. 2013 Apr;2(2). Available from: https://web.archive.org/web/20130715051827/http://www.westminsterlawreview.org/wlr12.php
254.
European Court of Human Rights - ECHR, CEDH, news, information, press releases [Internet]. Available from: https://www.echr.coe.int/Pages/home.aspx?p=home
255.
John Wadham. The Intelligence Services Act 1994. The Modern Law Review [Internet]. 1994;57(6). Available from: https://www.jstor.org/stable/1096888?seq=1#metadata_info_tab_contents
256.
Aldrich RJ. Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem. Intelligence and National Security. 2009 Feb;24(1):26–56.
257.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
258.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007 Feb;22(1):14–37.
259.
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 2006 Oct;21(5):848–83.
260.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
261.
Baldino D. Democratic oversight of intelligence services. Annandale, NSW: Federation Press; 2010.
262.
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
263.
Gill P. Policing politics: security intelligence and the liberal democratic state [Internet]. London: F. Cass; 1994. Available from: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
264.
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security [Internet]. 1996 Apr;11(2):313–31. Available from: https://contentstore.cla.co.uk/secure/link?id=28d50676-8836-e911-80cd-005056af4099
265.
Glees A, Davies PHJ, Morrison JNL, Social Affairs Unit. The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit; 2006.
266.
U.S. House of Representatives Permanent Select Committee on Intelligence [Internet]. Available from: https://intelligence.house.gov/
267.
The Intelligence and Security Committee of Parliament [Internet]. Available from: http://isc.independent.gov.uk/
268.
Johnson LK. A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky; 1985.
269.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
270.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
271.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
272.
REMPEL R. Canada’s Parliamentary Oversight of Security and Intelligence. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):634–54.
273.
Robertson KG. Accountable Intelligence—The British Experience. Journal of Conflict Studies [Internet]. 1988;8(1). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
274.
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 1998 Jun;13(2):144–58.
275.
Security Intelligence Review Committee (Canada) [Internet]. Available from: http://www.sirc-csars.gc.ca/
276.
U.S. Senate Select Committee on Intelligence [Internet]. Available from: https://www.intelligence.senate.gov/
277.
Bar-Joseph U. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 2011 Jan 2;24(1):22–43.
278.
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 2017 Jun 7;32(4):479–93.
279.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. In: Secret intelligence: a reader [Internet]. London: Routledge; 2009. p. 395–410. Available from: https://contentstore.cla.co.uk/secure/link?id=5b4c29b3-8a33-e911-80cd-005056af4099
280.
Omand SD, Phythian M. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 2013 Mar;26(1):38–63.
281.
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 2007 Feb;22(1):1–13.
282.
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 2016 Oct;29(4):760–84.
283.
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005 Oct;18(3):398–434.
284.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
285.
Herman M. Intelligence services in the information age: theory and practice [Internet]. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
286.
Olson JM. Fair play: the moral dilemmas of spying [Internet]. Washington, D.C.: Potomac Books, Inc; 2008. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=388650&site=ehost-live&scope=site&custid=s1123049
287.
Perry DL. ‘Repugnant Philosophy’: Ethics, Espionage, and Covert Action. Journal of Conflict Studies [Internet]. 1995;15(1). Available from: https://journals.lib.unb.ca/index.php/jcs/article/view/4597/5438
288.
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004 Mar;3(1):1–15.
289.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
290.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
291.
Butler of Brockwell FERB, Great Britain. Privy Council, Great Britain. Parliament. House of Commons. Review of intelligence on weapons of mass destruction [Internet]. Vol. 898. London: The Stationery Office; 2004. Available from: https://web.archive.org/web/20131029134634/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
292.
Davies PHJ. A Critical Look at Britain’s Spy Machinery: Collection and Analysis on Iraq. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
293.
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 2017 Jul 10;1–15.
294.
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 2017 Jul 10;1–15.
295.
Understanding and intelligence support to joint operations (JDP 2-00) - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/jdp-2-00-understanding-and-intelligence-support-to-joint-operations
296.
Grabo CM. Anticipating Surprise: Analysis for Strategic Warning [Internet]. 2002. Available from: https://apps.dtic.mil/dtic/tr/fulltext/u2/a476752.pdf
297.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
298.
Hughes-Wilson J. Military intelligence blunders and cover-ups [Internet]. Rev. and updated ed. London: Robinson; 2004. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
299.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. Second Edition. Los Angeles: SAGE; 2015. p. 119–21. Available from: https://contentstore.cla.co.uk/secure/link?id=8d77c6a8-9233-e911-80cd-005056af4099
300.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. Second Edition. Los Angeles: SAGE; 2015. p. 133–40. Available from: https://contentstore.cla.co.uk/secure/link?id=11ab1b44-9333-e911-80cd-005056af4099
301.
Wirtz JJ. Indications and Warning in an Age of Uncertainty. International Journal of Intelligence and CounterIntelligence. 2013 Sep;26(3):550–62.