‘A Democratic Licence to Operate: Report of the Independent Surveillance Review’ (2015). Available at: https://rusi.org/publication/whitehall-reports/democratic-licence-operate-report-independent-surveillance-review.
Agrell, W. (2002) ‘When everything is intelligence - nothing is intelligence’, Sherman Kent Center for Intelligence Analysis: Occasional Papers. Central Intelligence Agency. Available at: https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm.
Aid, M.M. (2003) ‘All glory is fleeting: SIGINT and the fight against international terrorism’, Intelligence and National Security, 18(4), pp. 72–120. Available at: https://doi.org/10.1080/02684520310001688880.
Aid, M.M. and Wiebes, C. (2001) ‘INS Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond’, Intelligence and National Security, 16(1). Available at: http://www.tandfonline.com/toc/fint20/16/1?nav=tocList.
Al Masashi, I. (2002) ‘Iraq’s security and intelligence network: a guide and analysis’, Middle East Review of International Affairs. Herzliya, Israel: Rubin Center for Research in International Affairs. Available at: https://web.archive.org/web/20170815104820/http://www.rubincenter.org/2002/09/al-marashi-2002-09-01/.
Aldrich, R.J. (2002) ‘Dangerous Liaisons: Post September 11 Intelligence Alliances’, Harvard International Review, 24(Issue 3), pp. 50–54. Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049.
Aldrich, R.J. (2009a) ‘Global intelligence co-operation versus accountability: new facets to an old problem’, Intelligence and National Security, 24(1), pp. 26–56. Available at: https://doi.org/10.1080/02684520902756812.
Aldrich, R.J. (2009b) ‘US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion’, The British Journal of Politics and International Relations, 11(1), pp. 122–139. Available at: https://doi.org/10.1111/j.1467-856x.2008.00353.x.
Aldrich, R.J. (2010) GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press.
Allison, G.T. (1969) ‘Conceptual models and the Cuban Missile Crisis’, American Political Science Review, 63(03), pp. 689–718. Available at: https://doi.org/10.2307/1954423.
Allison, G.T. (1971) Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown and Co.
Alvarez, D. (1999) ‘INS Special Issue on Allied and Axis Signals Intelligence in World War II’, Intelligence and National Security, 14(1). Available at: http://www.tandfonline.com/toc/fint20/14/1?nav=tocList.
Alvarez, D. (2000) ‘American signals intelligence and the Cuban missile crisis’, Intelligence and National Security, 15(1), pp. 169–176. Available at: https://doi.org/10.1080/02684520008432591.
Anderson, D. (2015) ‘A Question of Trust: Report of the Investigatory Powers Review’. Available at: https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Web-Accessible1.pdf.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009a) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009b) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009c) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009d) ‘Secret intelligence: a reader’, in Secret intelligence: a reader. London: Routledge, pp. 140–153. Available at: https://contentstore.cla.co.uk/secure/link?id=3f7061de-282a-e911-80cd-005056af4099.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009e) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009f) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009g) Secret intelligence: a reader. London: Routledge.
Andrew, C.M., Aldrich, R.J. and Wark, W.K. (2009h) Secret intelligence: a reader. London: Routledge.
Andrew, C.M. and Gordievsky, O. (1990) ‘KGB: the inside story of its foreign operations from Lenin to Gorbachev’, in KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton, pp. 1–42.
Baldino, D. (2010) Democratic oversight of intelligence services. Annandale, NSW: Federation Press.
Bamford, J. (2001) Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century.
Bar-Joseph, U. (2010) ‘The professional ethics of intelligence analysis’, International Journal of Intelligence and CounterIntelligence, 24(1), pp. 22–43. Available at: https://doi.org/10.1080/08850607.2011.519222.
bellingcat - MH17 - The Open Source Evidence - bellingcat (no date). Available at: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
Benjamin, V.O. (2007) ‘Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights’, European Human Rights Law Review, (6), pp. 637–648. Available at: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=3.
Berkowitz, B. (2011) ‘The National Reconnaissance Office at 50 Years: A Brief History’. Available at: https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf.
Berkowitz, B.D. and Goodman, A.E. (1989a) ‘Strategic intelligence for American national security’, in Strategic intelligence for American national security. Guildford: Princeton University Press, pp. 30–39. Available at: https://contentstore.cla.co.uk/secure/link?id=98bf3135-272a-e911-80cd-005056af4099.
Berkowitz, B.D. and Goodman, A.E. (1989b) ‘Strategic intelligence for American national security’, in Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press, pp. 185–192. Available at: https://contentstore.cla.co.uk/secure/link?id=4004b09d-2a2a-e911-80cd-005056af4099.
Berkowitz, B.D. and Goodman, A.E. (1989c) Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press.
Berkowitz, B.D. and Goodman, A.E. (1989d) Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press.
Berkowitz, B.D. and Goodman, A.E. (2000) ‘Best truth: intelligence in the information age’, in Best truth: intelligence in the information age. London: Yale University Press, pp. 58–98. Available at: https://contentstore.cla.co.uk/secure/link?id=ce1dc751-ae02-e811-80cd-005056af4099.
Blau, P.M. (1963) The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: University of Chicago Press.
Born, H., Leigh, I., and Geneva Centre for the Democratic Control of Armed Forces (no date) Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
Bradley, A.W. and Ewing, K.D. (2011a) ‘Constitutional and administrative law’, in Constitutional and administrative law. 15th edn. Harlow: Pearson Longman, pp. 552–577. Available at: https://contentstore.cla.co.uk/secure/link?id=0f477a47-2d00-e811-80cd-005056af4099.
Bradley, A.W. and Ewing, K.D. (2011b) ‘Constitutional and administrative law’, in Constitutional and administrative law. 15th edn. Harlow: Pearson Longman, pp. 476–500. Available at: https://contentstore.cla.co.uk/secure/link?id=652bd127-2b00-e811-80cd-005056af4099.
Brook-Shepherd, G. (1988) The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson.
Brugioni, D.A. (1996) ‘The art and science of photoreconnaissance’, Scientific American, pp. 56–63. Available at: https://contentstore.cla.co.uk/secure/link?id=de9330fc-bb23-e911-80cd-005056af4099.
Burns, T. and Stalker, G.M. (1994) The management of innovation. Rev. ed. Oxford: Oxford University Press.
Butler, F.E.R. and Great Britain (2004) Review of intelligence on weapons of mass destruction. London: The Stationery Office. Available at: http://webarchive.nationalarchives.gov.uk/20131205100653/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf.
Butler, L.R. (2004) ‘Review of Intelligence on Weapons of Mass Destruction’. Available at: https://webarchive.nationalarchives.gov.uk/20131205114730/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf.
Center for Strategic Intelligence Research (U.S.), United States. Intelligence Science Board, and Federation of American Scientists (2006) Educing information: interrogation--science and art : foundations for the future : phase 1 report. Washington, DC: Center for Strategic Intelligence Research, National Defense Intelligence College. Available at: https://fas.org/irp/dni/educing.pdf.
Champion, B. (1998) ‘A review of selected cases of industrial espionage and economic spying, 1568–1945’, Intelligence and National Security, 13(2), pp. 123–143. Available at: https://doi.org/10.1080/02684529808432480.
Chapman, B. (1971) ‘Police state’, in Police state. London: Macmillan, pp. 106–115. Available at: https://contentstore.cla.co.uk/secure/link?id=655cf0fc-142a-e911-80cd-005056af4099.
Clark, R.M. (2016) Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: CQ Press.
Clayton, A. (1982) The enemy is listening. New York: Ballantine.
Clough, C. (2004) ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 601–613. Available at: https://doi.org/10.1080/08850600490446736.
CLOUGH, C. (2004) ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 601–613. Available at: https://doi.org/10.1080/08850600490446736.
Cohen, M.D., March, J.G. and Olsen, J.P. (1972) ‘A garbage can model of organizational choice’, Administrative Science Quarterly, 17(1), pp. 1–25. Available at: https://doi.org/10.2307/2392088.
Congressional Research Service (no date) ‘Iran: Internal Politics and U.S. Policy and Options’. Available at: https://fas.org/sgp/crs/mideast/RL32048.pdf.
Cradock, P. (2002a) ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray, pp. 290–303. Available at: https://contentstore.cla.co.uk/secure/link?id=dcf15b7f-202a-e911-80cd-005056af4099.
Cradock, P. (2002b) ‘Know your enemy: how the Joint Intelligence Committee saw the world’, in Know your enemy: how the Joint Intelligence Committee saw the world. London: John Murray, pp. 281–289. Available at: https://contentstore.cla.co.uk/secure/link?id=6ce51d31-bb2a-e911-80cd-005056af4099.
Cringely, R.X. (1992) Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking.
Crosston, M. (2016) ‘Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China’, International Journal of Intelligence and CounterIntelligence, 29(1), pp. 110–131. Available at: https://doi.org/10.1080/08850607.2015.1083337.
Cyert, R.M. and March, J.G. (1992) A behavioral theory of the firm. 2nd ed. Cambridge, Mass: Blackwell.
Dandeker, C. (1990) Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity.
Daugherty, W.J. (2006) Executive secrets: covert action and the presidency. Pbk ed. Lexington: The University Press of Kentucky.
David, J.E. (2017) ‘How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory’, Intelligence and National Security, 32(6), pp. 768–781. Available at: https://doi.org/10.1080/02684527.2017.1294372.
Davies, P. (1AD) ‘Ideas of intelligence: divergent national concepts and institutions’, Harvard international review, 24(3), pp. 62–66. Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. (1999) ‘Information warfare and the future of the spy’, Information, Communication & Society, 2(2), pp. 115–133. Available at: https://doi.org/10.1080/136911899359664.
Davies, P.H.J. (2000) ‘From special operations to special political action: The “rump SOE” and SIS post‐war covert action capability 1945–1977’, Intelligence and National Security, 15(3), pp. 55–76. Available at: https://doi.org/10.1080/02684520008432617.
Davies, P.H.J. (2003a) MI6 and the machinery of spying. London: Frank Cass. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site.
Davies, P.H.J. (2003b) MI6 and the machinery of spying. London: Frank Cass. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site.
Davies, P.H.J. (2003c) MI6 and the machinery of spying. London: Frank Cass. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site.
Davies, P.H.J. (2004) ‘Intelligence culture and intelligence failure in Britain and the United States’, Cambridge Review of International Affairs, 17(3), pp. 495–520. Available at: http://www.tandfonline.com/doi/full/10.1080/0955757042000298188.
Davies, P.H.J. (2009) ‘Imagery in the UK: Britain’s troubled imagery intelligence architecture’, Review of International Studies, 35(4). Available at: https://www.jstor.org/stable/40588096?pq-origsite=summon&seq=1#metadata_info_tab_contents.
Davies, P.H.J. (2010a) ‘Intelligence and the machinery of government: conceptualizing the intelligence community’, Public Policy and Administration, 25(1), pp. 29–46. Available at: https://doi.org/10.1177/0952076709347073.
Davies, P.H.J. (2010b) ‘The missing dimension’s missing dimension’, Public Policy and Administration, 25(1), pp. 5–9. Available at: https://doi.org/10.1177/0952076709347071.
Davies, P.H.J. (2012a) Intelligence and government in Britain and the United States: a comparative perspective. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012b) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012c) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012d) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012e) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012f) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012g) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012h) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012i) Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012j) Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (2012k) Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: Praeger. Available at: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity.
Davies, P.H.J. (no date) ‘A Critical Look at Britain’s Spy Machinery — Central Intelligence Agency’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm.
Davies, P.H.J. and Gustafson, K. (2013a) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013b) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013c) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013d) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013e) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013f) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2013g) Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049.
Davies, P.H.J. and Gustafson, K. (2017) ‘Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise’, Intelligence and National Security, pp. 1–15. Available at: https://doi.org/10.1080/02684527.2017.1328860.
Davis, J. (1991) ‘The Kent-Kendall Debate of 1949’, Studies Archive Indexes. Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/html/v35i2a06p_0001.htm.
Davis, J. (2002) ‘Improving CIA analytic performance: DI analytic priorities’, Kent Center Occasional Papers. Central Intelligence Agency. Available at: https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm.
Day, D.A. (2004) ‘Ferrets above: American signals intelligence satellites during the 1960s’, International Journal of Intelligence and CounterIntelligence, 17(3), pp. 449–467. Available at: https://doi.org/10.1080/08850600490446835.
Denning, D.E.R. (1999) Information warfare and security. New York, N.Y.: ACM Press.
Diderichsen, A. and Rønn, K.V. (2017) ‘Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics’, Intelligence and National Security, 32(4), pp. 479–493. Available at: https://doi.org/10.1080/02684527.2016.1270622.
Diffie, W. and Landau, S. (1AD) ‘Brave new world of wiretapping’, Scientific American, 299(3). Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049.
Duyvesteyn, I. (2011) ‘Intelligence and strategic culture: some observations’, Intelligence and National Security, 26(4), pp. 521–530. Available at: https://doi.org/10.1080/02684527.2011.580605.
Dziak, J.J. (1988) ‘Chekisty: a history of the KGB’, in Chekisty: a history of the KGB. Lexington, Mass: Lexington Books, pp. 1–17. Available at: https://contentstore.cla.co.uk/secure/link?id=2d8a02df-a902-e811-80cd-005056af4099.
Eftimiades, N. (1992) ‘China’s Ministry of State Security: coming of age in the international arena’, Maryland Series in Contemporary Asian Studies [Preprint], (2). Available at: http://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1.
‘El Masri v. "the former Yugoslav Republic of Macedonia”’ (2012). European Court of Human Rights. Available at: http://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0ahUKEwiVn_Tb3eHPAhUhLMAKHbp8DFUQFgg9MAQ&url=http%3A%2F%2Fhudoc.echr.coe.int%2Fapp%2Fconversion%2Fpdf%2F%3Flibrary%3DECHR%26id%3D002-7324%26filename%3D002-7324.pdf%26TID%3Dthkbhnilzk&usg=AFQjCNGrOnih2tRDdRDFRDbCAHAGr2Pf9A.
Evans, G. (2009) ‘Rethinking military intelligence failure – putting the wheels back on the intelligence cycle’, Defence Studies, 9(1), pp. 22–46. Available at: https://doi.org/10.1080/14702430701811987.
Farson, A.S. and Praeger Security International (2008a) PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008b) ‘PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa’, in PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: Praeger Security International, pp. 479–497. Available at: https://contentstore.cla.co.uk/secure/link?id=9b3d84b1-2e2a-e911-80cd-005056af4099.
Farson, A.S. and Praeger Security International (2008c) PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: Praeger Security International.
Farson, A.S. and Praeger Security International (2008d) PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: Praeger Security International.
Farson, S. (1989) ‘Schools of thought: national perceptions of intelligence’’, Conflict Quarterly, 9(2), pp. 52–104. Available at: https://journals.lib.unb.ca/index.php/JCS/article/download/14845/15914.
‘Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation - The Bellows Report’ (no date).
Finnegan, T.J. and Center for Strategic Intelligence Research (U.S.) (2006) Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Washington, D.C.]: [For sale by the Supt. of Docs., U.S. G.P.O.
Fraser, A. (2005) ‘Architecture of a broken dream: The CIA and Guatemala, 1952–54’, Intelligence and National Security, 20(3), pp. 486–508. Available at: https://doi.org/10.1080/02684520500269010.
Gendron, A. (2005) ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, 18(3), pp. 398–434. Available at: https://doi.org/10.1080/08850600590945399.
George, R.Z., Bruce, J.B., and Georgetown University. Center for Peace and Security Studies (2008a) Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site.
George, R.Z., Bruce, J.B., and Georgetown University. Center for Peace and Security Studies (2008b) Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site.
Gill, P. (1994a) Policing politics: security intelligence and the liberal democratic state. London: F. Cass.
Gill, P. (1994b) Policing politics: security intelligence and the liberal democratic state. London: F. Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity.
Gill, P. (1996) ‘Reasserting control: Recent changes in the oversight of the UK intelligence community’, Intelligence and National Security, 11(2), pp. 313–331. Available at: https://contentstore.cla.co.uk/secure/link?id=05e70f56-eb86-e611-80c6-005056af4099.
Gill, P. (2007) ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, 22(1), pp. 14–37. Available at: https://doi.org/10.1080/02684520701200756.
Gill, P., Marrin, S. and Phythian, M. (2009) Intelligence theory: key questions and debates. London: Routledge. Available at: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874.
Glees, A. (1987) The secrets of the service: a story of Soviet subversion of western intelligence. NewYork: Carroll and Graf.
Glees, A. et al. (2006a) ‘The open side of secrecy: Britain’s Intelligence and Security Committee’, in The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit, pp. 51–89. Available at: https://contentstore.cla.co.uk/secure/link?id=c106b1ad-1f2a-e911-80cd-005056af4099.
Glees, A. et al. (2006b) The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit.
Glees, A. and Davies, P.H.J. (2006) ‘Intelligence, Iraq and the limits of legislative accountability during political crisis’, Intelligence and National Security, 21(5), pp. 848–883. Available at: https://doi.org/10.1080/02684520600957787.
Godson, R. (1988) ‘Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World’, in Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. London: Pergamon-Brassey’s International Defense Publishers, pp. 115–155. Available at: https://contentstore.cla.co.uk/secure/link?id=1b4ed62b-052a-e911-80cd-005056af4099.
Godson, R., National Strategy Information Center, and Consortium for the Study of Intelligence (1986a) Intelligence requirements for the 1980’s: Analysis and Estimates , Vol. 2. Lexington, MA.
Godson, R., National Strategy Information Center, and Consortium for the Study of Intelligence (1986b) Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.
Goold, B. (2009) ‘Liberty and others v The United Kingdom: a new chance for another missed opportunity’, Public Law, (January), pp. 5–14. Available at: http://login.westlaw.co.uk/maf/wluk/ext/app/document?crumb-action=reset&docguid=I0C3A5710E1F511DD93AEE69B09385F41.
Grabo, C.M. (2002) ‘Anticipating surprise’. Defence Technical Information Centre. Available at: http://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf.
Gray, C.S. (1999) ‘Strategic culture as context: the first generation of theory strikes back’, Review of International Studies, 25(1), pp. 49–69. Available at: http://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#page_scan_tab_contents.
Gustafson, K. (2007) Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Poole: Potomac.
Hannan, M.T. and Freeman, J. (1977) ‘The population ecology of organizations’, American Journal of Sociology, 82(5), pp. 929–964. Available at: http://www.jstor.org/stable/2777807?Search=yes&resultItemClick=true&searchText=Hannah,&searchText=Michael&searchText=T&searchText=ecology&searchUri=%2Faction%2FdoBasicSearch%3FQuery%3DHannah%252C%2BMichael%2BT%2Becology%26amp%3Bfilter%3Djid%253A10.2307%252Fj100067&seq=1#page_scan_tab_contents.
Hastedt, G.P. (1991) ‘Towards the comparative study of intelligence’, Journal of Conflict Studies, 11(3). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14966.
Herman, M. (1996a) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996b) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996c) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996d) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996e) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996f) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996g) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996h) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996i) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996j) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996k) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996l) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996m) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (1996n) Intelligence power in peace and war. Cambridge: Royal Institute of International Affairs. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site.
Herman, M. (2001a) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Herman, M. (2001b) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Herman, M. (2001c) Intelligence services in the information age: theory and practice. London: Frank Cass. Available at: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity.
Herman, M. (2009) ‘Secret intelligence: a reader’, in Secret intelligence: a reader. London: Routledge, pp. 382–394. Available at: https://contentstore.cla.co.uk/secure/link?id=fbf6a0cc-b2fa-e711-80cd-005056af4099.
Herman, M. (no date) ‘Intelligence and policy: a comment’, Intelligence and National security [Preprint].
Heuer, R.J. and Pherson, R.H. (2015a) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. 2nd edn. Los Angeles: SAGE, pp. 133–135. Available at: https://contentstore.cla.co.uk/secure/link?id=c7e47fa3-6e33-e911-80cd-005056af4099.
Heuer, R.J. and Pherson, R.H. (2015b) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. 2nd edn. Los Angeles: SAGE, pp. 149–156. Available at: https://contentstore.cla.co.uk/secure/link?id=2189e06b-6f33-e911-80cd-005056af4099.
Heuer, R.J. and Pherson, R.H. (2015c) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. Second Edition. Los Angeles: SAGE, pp. 133–140. Available at: https://contentstore.cla.co.uk/secure/link?id=bb7350c3-7033-e911-80cd-005056af4099.
Heuer, R.J. and Pherson, R.H. (2015d) ‘Structured analytic techniques for intelligence analysis’, in Structured analytic techniques for intelligence analysis. Second Edition. Los Angeles: SAGE, pp. 119–121. Available at: https://contentstore.cla.co.uk/secure/link?id=dd9ab219-7033-e911-80cd-005056af4099.
Hibbert, R. (no date) ‘Intelligence and policy’, Intelligence and national security [Preprint].
Hicks, D.B. (2005) ‘Lifting the arms embargo on the Bosnian Muslims: secret diplomacy or covert action?’, International Journal of Intelligence and CounterIntelligence, 18(2), pp. 246–261. Available at: https://doi.org/10.1080/08850600590911954.
Hinsley, F.H. and Simkins, C.A.G. (no date) British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: H.M.S.O.
Holland, M. (2004) ‘Operation PBHISTORY: the aftermath of SUCCESS’, International Journal of Intelligence and CounterIntelligence, 17(2), pp. 300–332. Available at: https://doi.org/10.1080/08850600490274935.
Hughes-Wilson, J. (2004) Military intelligence blunders and cover-ups. Rev. and updated ed. London: Robinson. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site.
Hulnick, A.S. (1991) ‘Intelligence cooperation in the post‐cold war era: A new game plan?’, International Journal of Intelligence and CounterIntelligence, 5(4), pp. 455–465. Available at: https://doi.org/10.1080/08850609108435194.
Hulnick, A.S. (2006) ‘What’s wrong with the Intelligence Cycle’, Intelligence and National Security, 21(6), pp. 959–979. Available at: https://doi.org/10.1080/02684520601046291.
Hunter, R.W. (1999) Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press.
India. Kargil Review Committee. (2000) From surprise to reckoning. New Delhi: Sage Publications.
Inkster, N. (2013) ‘Chinese intelligence in the cyber age’, Survival, 55(1), pp. 45–66. Available at: https://doi.org/10.1080/00396338.2013.767405.
‘Intelligence and National Security’ (no date).
Intelligence and Security Committee (2004) ‘Annual Report 2003-2004’. London: TSO. Available at: http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf.
Intelligence and Security Committee (2015) ‘Privacy and Security: A modern and transparent legal framework’. Available at: https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20150312_ISC_P%2BS%2BRpt%28web%29.pdf?attachauth=ANoY7coqammF4tVkLQIO-N0UEZQ1tcfnvoaObjJ-AoDY-tVBMv2I6jKUw2ivWZCUZF9YUTjh8rlbkF-jd_wq9FP8390hcnLT-mbPCIipRcMRoMuluz-319BeI9lVZZDWMuE6BrJ7cDAoBalTjJnnnGKB_Rw4mZMJgVRCJ8irbNTjOEciM5Ph5Osa6RUznM19yZI42LuyVu8qWsJURGC9F9G1n05y-621vRF-vkhXXY2pdhpM7EQzX-WKMsszUqLYKwrMBhtif99y&attredirects=0.
‘International Journal of Intelligence and CounterIntelligence’ (no date).
Investigatory Powers Act - GOV.UK (2015). Available at: https://www.gov.uk/government/collections/investigatory-powers-bill.
James Igoe Walsh (2007) ‘Defection and Hierarchy in International Intelligence Sharing’, Journal of Public Policy, 27(2). Available at: https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents.
Javedanfar, M. (2008) ‘PSI handbook of global security and intelligence: Vol. 2: national approaches’, in PSI handbook of global security and intelligence: Vol. 2: national approaches. Westport, Conn: Praeger Security International, pp. 533–550. Available at: https://contentstore.cla.co.uk/secure/link?id=620b00d9-2317-e811-80cd-005056af4099.
Jeffery, K. (2011) MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury.
Johnson, L.K. (1985) A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky.
Johnson, L.K. (1989) ‘Covert action and accountability: decision-making for America’s secret foreign policy’, International Studies Quarterly, 33(1). Available at: https://doi.org/10.2307/2600495.
Johnson, L.K. (2009a) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009b) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009c) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009d) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009e) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009f) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009g) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009h) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009i) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009j) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009k) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009l) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (2009m) Handbook of intelligence studies. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049.
Johnson, L.K. (no date) ‘Spies’, Foreign Policy, (120), pp. 18–26. Available at: https://doi.org/10.2307/1149708.
Johnson-Freese, J. and Gatling, L. (2004) ‘Security implications of Japan’s Information Gathering Satellite (IGS) system’, Intelligence and National Security, 19(3), pp. 538–552. Available at: https://doi.org/10.1080/0268452042000316278.
Jones, B. (2012) ‘The Justice and Security Bill: “focused and proportionate”, or a derogation of the right to a fair trial’, Westminster Law Review, 2(2). Available at: https://web.archive.org/web/20170814150309/http://www.westminsterlawreview.org/Volume2/Issue2/wlr12.php.
Jones, K. (2000) ‘From the horse’s mouth: POWs as sources for air ministry intelligence during the battle of Britain’, Intelligence and National Security, 15(4), pp. 60–80. Available at: https://doi.org/10.1080/02684520008432628.
Katz, J.I. (2006) ‘Deception and Denial in Iraq: The Intelligent Adversary Corollary’, International Journal of Intelligence and CounterIntelligence, 19(4), pp. 577–585. Available at: https://doi.org/10.1080/08850600600829767.
Kaufman, S.J. (1AD) ‘Organizational politics and change in Soviet military policy’, World politics, 46(3), pp. 355–382. Available at: https://doi.org/10.2307/2950686.
Kingsbury, D. (2008) ‘PSI handbook of global security and intelligence: Vol. 1: national approaches’, in PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: Praeger Security International, pp. 247–262. Available at: https://contentstore.cla.co.uk/secure/link?id=6da4e860-2617-e811-80cd-005056af4099.
Knight, K. (1977) ‘Matrix management’, in Matrix management. Farnborough, Hants: Gower Press, pp. 1–12. Available at: https://contentstore.cla.co.uk/secure/link?id=b91089c0-172a-e911-80cd-005056af4099.
Kobayashi, Y. (2015) ‘Assessing reform of the Japanese intelligence community’, International Journal of Intelligence and CounterIntelligence, 28(4), pp. 717–733. Available at: https://doi.org/10.1080/08850607.2015.1051453.
Kramer, L.A. and Heuer, R.J. (2007) ‘America’s increased vulnerability to insider espionage’, International Journal of Intelligence and CounterIntelligence, 20(1), pp. 50–64. Available at: https://doi.org/10.1080/08850600600888698.
Lander, S.S. (2004) ‘International intelligence cooperation: an inside perspective’, Cambridge Review of International Affairs, 17(3), pp. 481–493. Available at: https://doi.org/10.1080/0955757042000296964.
Laqueur, W. (1985) ‘World of secrets: the uses and limits of intelligence’, in World of secrets: the uses and limits of intelligence. London: Weidenfeld and Nicolson, pp. 20–27. Available at: https://contentstore.cla.co.uk/secure/link?id=e39afeec-ad02-e811-80cd-005056af4099.
Lawrence, Paul R., Lorsch, Jay W., and Harvard University (1967) Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University.
Lefebvre, S. (2003) ‘The Difficulties and Dilemmas of International Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 16(4), pp. 527–542. Available at: https://doi.org/10.1080/716100467.
Lorsch, J.W. and Allen, S.A. (1973) ‘Managing diversity and interdependence: an organizational study of multidivisional firms’, in Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: Harvard University, Graduate School of Business Administration, Division of Research, pp. 53–79. Available at: https://contentstore.cla.co.uk/secure/link?id=cad0d107-fd0f-e811-80cd-005056af4099.
Lowenthal, M.M. and Marks, R.A. (2015) ‘Intelligence analysis: is it as good as it gets?’, International Journal of Intelligence and CounterIntelligence, 28(4), pp. 662–665. Available at: https://doi.org/10.1080/08850607.2015.1051410.
Marrin, S. (2007) ‘At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers’, International Journal of Intelligence and CounterIntelligence, 20(3), pp. 401–414. Available at: https://doi.org/10.1080/08850600701249733.
Marrin, S. (2011) Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: Routledge.
Masterman, J.C. (1972) The double-cross system in the war of 1939 to 1945. New Haven: Yale University Press.
Mercado, S.C. (2004) ‘Sailing the sea of OSINT in the information age: a venerable source in a new era’, Studies in intelligence. Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html.
Mescall, P.N. (1994) ‘A creature of compromise: the establishment of the DIA’, International Journal of Intelligence and CounterIntelligence, 7(3), pp. 251–274. Available at: https://doi.org/10.1080/08850609408435250.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011a) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence. Available at: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011b) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence. Available at: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011c) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence. Available at: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011d) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence. Available at: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf.
Ministry of Defence : Development, Concepts and Doctrine Centre (2011e) ‘Understanding and Intelligence Support to Joint Operations’. Ministry of Defence. Available at: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf.
Mitnick, K.D. and Simon, W.L. (2005) The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: Wiley. Available at: http://lib.myilibrary.com/browse/open.asp?id=25257&entityid=https://idp.brunel.ac.uk/entity.
Morgan, G. (2006a) Images of organization. Updated ed. London: SAGE.
Morgan, G. (2006b) Images of organization. Updated ed. London: SAGE.
Morgan, G. (2006c) ‘Images of organization’, in Images of organization. Updated ed. London: SAGE, pp. 115–147. Available at: https://contentstore.cla.co.uk/secure/link?id=ddd37c6f-e9f9-e711-80cd-005056af4099.
Morrison, J.N.L. (2011) ‘British Intelligence Failures in Iraq’, Intelligence and National Security, 26(4), pp. 509–520. Available at: https://doi.org/10.1080/02684527.2011.580604.
Muller, D.G. (2008) ‘Intelligence Analysis in Red and Blue’, International Journal of Intelligence and CounterIntelligence, 21(1), pp. 1–12. Available at: https://doi.org/10.1080/08850600701648652.
Müller-Wille, B. (2002) ‘EU Intelligence Co-operation. A Critical Analysis’, Contemporary Security Policy, 23(2), pp. 61–86. Available at: https://doi.org/10.1080/713999737.
Müller-Wille, B. (2007) ‘The Effect of International Terrorism on EU Intelligence Co-operation’, JCMS: Journal of Common Market Studies, 46(1), pp. 49–73. Available at: https://doi.org/10.1111/j.1468-5965.2007.00767.x.
National Commission on Terrorist Attacks upon the United States (2004) The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton. Available at: https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf.
Northcott, C. (2007) ‘The role, organization, and methods of MI5’, International Journal of Intelligence and CounterIntelligence, 20(3), pp. 453–479. Available at: https://doi.org/10.1080/08850600701249758.
O’Connell, K.M. (2005) ‘Thinking about intelligence comparatively’, Brown Journal of World Affairs, 11(1). Available at: http://bjwa.brown.edu/11-1/thinking-about-intelligence-comparatively/.
Olcott, A. (2012) Open source intelligence in a networked world. London: Continuum. Available at: http://lib.myilibrary.com/browse/open.asp?id=360727&entityid=https://idp.brunel.ac.uk/entity.
Olso, J.M. (no date) ‘The Ten Commandments of counterintelligence: a never-ending necessity’, Studies in Intelligence [Preprint], (fall_winter_2001). Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html.
Olson, J.M. (2008) Fair play: the moral dilemmas of spying. Washington, D.C.: Potomac Books, Inc.
Omand, D. (2010) ‘Securing the state’, in Securing the state. London: Hurst & Company, pp. 113–137. Available at: http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity.
Omand, D., Bartlett, J. and Miller, C. (2012a) ‘#Intelligence’. London: Demos. Available at: https://www.google.com/url?q=http://www.demos.co.uk/files/_Intelligence_-_web.pdf%3F1335197327&sa=U&ved=0ahUKEwjaqYfsusjPAhVrK8AKHZVEDLIQFggFMAA&client=internal-uds-cse&usg=AFQjCNHJ0dsS-5qOg2d2ZoGZhlvy6XbZ-A.
Omand, D., Bartlett, J. and Miller, C. (2012b) ‘Introducing social media intelligence (SOCMINT)’, Intelligence and National Security, 27(6), pp. 801–823. Available at: https://doi.org/10.1080/02684527.2012.716965.
Omand, S.D. and Phythian, M. (2013) ‘Ethics and intelligence: a debate’, International Journal of Intelligence and CounterIntelligence, 26(1), pp. 38–63. Available at: https://doi.org/10.1080/08850607.2012.705186.
Orton, D. and Callahan, J.L. (1995) ‘Important “folk theories” in intelligence reorganization’, International Journal of Intelligence and CounterIntelligence, 8(4), pp. 411–429. Available at: https://contentstore.cla.co.uk/secure/link?id=ad9950dd-ec86-e611-80c6-005056af4099.
Oxlee, G.J. (1997) Aerospace reconnaissance. London: Brassey’s.
Parker, G.M. (2003a) Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: Jossey-Bass.
Parker, G.M. (2003b) Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: Jossey-Bass. Available at: http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity.
Perry, D. (no date) ‘Repugnant philosophy: ethics, espionage and covert action’, Journal of conflict studies [Preprint].
Pfaff, T. and Tiel, J.R. (2004) ‘The ethics of espionage’, Journal of Military Ethics, 3(1), pp. 1–15. Available at: https://doi.org/10.1080/15027570310004447.
Phythian, M. (ed.) (2014) Understanding the intelligence cycle. London: Routledge, Taylor & Francis Group. Available at: http://lib.myilibrary.com/browse/open.asp?id=495363&entityid=https://idp.brunel.ac.uk/entity.
Pitt, D. and Smith, B.C. (1981) Government departments: an organizational perspective. London: Routledge and Kegan Paul.
Powell, W.W. and DiMaggio, P.J. (1991a) The new institutionalism in organizational analysis. Chicago: University of Chicago Press.
Powell, W.W. and DiMaggio, P.J. (1991b) The new institutionalism in organizational analysis. Chicago: University of Chicago Press.
Pribbenow, M. l. (2004) ‘The man in the snow white cell: limits to interrogation’, Studies in intelligence, 48(1). Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html.
Pringle, R.W. (2004) ‘Modernization of terror: the transformation of Stalin’s NKVD, 1934–1941’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 113–123. Available at: https://doi.org/10.1080/08850600490252687.
Pugh, D. S. (2007) Organization theory: selected classic readings. 5th ed. London: Penguin.
Pugh, Derek Salman (2007) Organization theory: selected classic readings. 5th ed. London: Penguin.
Quinlan, M. (2007) ‘Just intelligence: prolegomena to an ethical theory’, Intelligence and National Security, 22(1), pp. 1–13. Available at: https://doi.org/10.1080/02684520701200715.
Radcliffe, W.W. (2010) ‘Origins and Current State of Japan’s Reconnaissance Satellite Program (U)’, Studies in intelligence, 54(3). Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html.
Raeff, M. (1975) ‘The well-ordered police state and the development of modernity in Seventeenth- and Eighteenth-Century Europe: an attempt at a comparative approach’, The American Historical Review, 80(5). Available at: https://doi.org/10.2307/1852058.
Rathmell, A. (1996) ‘Syria’s intelligence services: origins and development’, Journal of Conflict Studies, 16(2). Available at: https://journals.lib.unb.ca/index.php/jcs/article/view/11815/12636.
Remote Sensing and Photogrammetry Society (no date). Available at: http://www.rspsoc.org/.
Rempel, R. (2004) ‘Canada’s Parliamentary oversight of security and intelligence’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 634–654. Available at: https://doi.org/10.1080/08850600490496443.
Renz, B. (2006) ‘Putin’s militocracy? An alternative interpretation of Siloviki in contemporary Russian politics’, Europe-Asia Studies, 58(6), pp. 903–924. Available at: http://www.jstor.org/stable/20451267?pq-origsite=summon&seq=1#page_scan_tab_contents.
Rhodes, R.A.W. (Roderick A.W. and Dunleavy, P. (1995) Prime Minister, cabinet and core executive. Basingstoke: Macillan.
Richards, P.G. and Won-Young, K. (2009) ‘Monitoring for nuclear explosions’, Scientific American, 300, pp. 70–77. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049.
Richelson, J. and Ball, D. (1985) The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin.
Richelson, J.T. (1990) ‘The calculus of intelligence cooperation’, International Journal of Intelligence and CounterIntelligence, 4(3), pp. 307–323. Available at: https://doi.org/10.1080/08850609008435147.
Richelson, J.T. (2001) ‘MASINT: the new kid in town’, International Journal of Intelligence and CounterIntelligence, 14(2), pp. 149–192. Available at: https://doi.org/10.1080/088506001300063136.
Riebling, M. (2002) Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster.
Robertson, K.G. (1987) ‘Intelligence, terrorism and civil liberties’, Journal of Conflict Studies, 7(2). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14756.
Robertson, K.G. (1988) ‘Accountable intelligence: the British experience’’, Conflict Quarterly, 8(1). Available at: https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855.
Robertson, K.G. (1998) ‘Recent reform of intelligence in the UK: Democratization or risk management?’, Intelligence and National Security, 13(2), pp. 144–158. Available at: https://doi.org/10.1080/02684529808432481.
Rovner, J. (2015) Fixing the facts: national security and the politics of intelligence. Ithaca: Cornell University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity.
Royden, B.G. (2003) ‘Tolkachev, A Worthy Successor to Penkovsky’, Studies in intelligence, 47(3). Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html.
RUDNER, M. (2004) ‘Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism’, International Journal of Intelligence and CounterIntelligence, 17(2), pp. 193–230. Available at: https://doi.org/10.1080/08850600490274890.
Rudner, M. (2007) ‘Canada’s communications security establishment, signals intelligence and counter-terrorism’, Intelligence and National Security, 22(4), pp. 473–490. Available at: https://doi.org/10.1080/02684520701640449.
Schlesinger, S.C., Kinzer, S. and Coatsworth, J.H. (2005) Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Cambridge, Mass: Harvard University Press.
Security Intelligence Review Committee (Canada) (no date). Available at: http://www.sirc-csars.gc.ca/index-eng.html.
Shaffer, R. (2017) ‘Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence’, International Journal of Intelligence and CounterIntelligence, 30(3), pp. 522–531. Available at: https://doi.org/10.1080/08850607.2017.1263529.
Shoham, D. and Jacobsen, S.M. (2007) ‘Technical intelligence in retrospect: the 2001 anthrax letters powder’, International Journal of Intelligence and CounterIntelligence, 20(1), pp. 79–105. Available at: https://doi.org/10.1080/08850600600889027.
Short, N. (no date) ‘The Remote Sensing Tutorial’. Federation Of American Scientists. Available at: https://web.archive.org/web/20160326161839/http://fas.org/irp/imint/docs/rst/Front/tofc.html.
Shukman, H. (2000) ‘Agents for change: intelligence services in the 21st century’, in Agents for change: intelligence services in the 21st century. London: St Ermin’s, pp. 16–22. Available at: https://contentstore.cla.co.uk/secure/link?id=ccca3611-cf2a-e911-80cd-005056af4099.
Shulsky, A.N. and Schmitt, G.J. (2002a) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002b) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002c) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Shulsky, A.N. and Schmitt, G.J. (2002d) Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site.
Sims, J.E. (2006) ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, 19(2), pp. 195–217. Available at: https://doi.org/10.1080/08850600500483657.
Skocpol, T. (1979) ‘States and social revolutions: a comparative analysis of France, Russia and China’, in States and social revolutions: a comparative analysis of France, Russia and China. Cambridge (etc.): Cambridge University Press, pp. 3–43. Available at: https://contentstore.cla.co.uk/secure/link?id=08a3957b-cd2a-e911-80cd-005056af4099.
Smith, M. (1996) ‘New cloak, old dagger: how Britain’s spies came in from the cold’, in New cloak, old dagger: how Britain’s spies came in from the cold. London: V. Gollancz, pp. 165–177. Available at: https://contentstore.cla.co.uk/secure/link?id=0b176b23-ad02-e811-80cd-005056af4099.
Smith, M.J. (1999) The core executive in Britain. Basingstoke: Macmillan.
Smith, M.J. (2010) ‘Intelligence and the core Executive’, Public Policy and Administration, 25(1), pp. 11–28. Available at: https://doi.org/10.1177/0952076709347072.
Steiner, J.E. (2006) ‘Restoring the red line between intelligence and policy on covert action’’, International Journal of Intelligence and CounterIntelligence, 19(1), pp. 156–165. Available at: https://doi.org/10.1080/08850600500332532.
Stoll, C. (1991a) The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books.
Stoll, C. (1991b) The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books.
Stottlemyre, S.A. (2015) ‘HUMINT, OSINT, or something new? Defining crowdsourced intelligence’, International Journal of Intelligence and CounterIntelligence, 28(3), pp. 578–589. Available at: https://doi.org/10.1080/08850607.2015.992760.
Studies in Intelligence (no date). Central Intelligence Agency.
The Intelligence and Security Committee of Parliament (no date a). Available at: http://isc.independent.gov.uk/.
The Intelligence and Security Committee of Parliament (no date b). Available at: http://isc.independent.gov.uk/.
‘The KGB, the Computer, and Me (Complete) - YouTube’ (no date). Available at: https://www.youtube.com/watch?v=EcKxaq1FTac.
‘The Tradecraft of Analysis. US Intelligence at the Crossroads’ (1995).
‘“The Typical CIA Analyst and What He Does”, NFAC paper to House Permanent Select Committee on Intelligence’ (1978).
Thomas, S.T. (1999) ‘The CIA’s bureaucratic dimensions’, International Journal of Intelligence and CounterIntelligence, 12(4), pp. 399–413. Available at: https://doi.org/10.1080/088506099304972.
Treverton, G. (1988) Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris.
Turner, M.A. (2004a) ‘A distinctive U.S. intelligence identity’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 42–61. Available at: https://doi.org/10.1080/08850600490252650.
Turner, M.A. (2004b) ‘A distinctive U.S. intelligence identity’, International Journal of Intelligence and CounterIntelligence, 17(1), pp. 42–61. Available at: https://doi.org/10.1080/08850600490252650.
• US Geological Survey Earth Resource Observation and Science Center (no date a) Declassified Satellite Imagery - 1 (via the Wayback Machine). Available at: https://web.archive.org/web/20180131220426/https://lta.cr.usgs.gov/declass_1.
• US Geological Survey Earth Resource Observation and Science Center (no date b) Declassified Satellite Imagery - 2 (via the Wayback Machine). Available at: https://web.archive.org/web/20170710082642/https://lta.cr.usgs.gov/declass_2.
U.S. House of Representatives Permanent Select Committee on Intelligence (no date a). Available at: http://intelligence.house.gov/.
U.S. House of Representatives Permanent Select Committee on Intelligence (no date b). Available at: https://intelligence.house.gov/.
U.S. Senate Select Committee on Intelligence (no date). Available at: http://www.intelligence.senate.gov/?
Vrist Ronn, K. (2016) ‘Intelligence Ethics: A Critical Review and Future Perspectives’, International Journal of Intelligence and CounterIntelligence, 29(4), pp. 760–784. Available at: https://doi.org/10.1080/08850607.2016.1177399.
Wadham, J. (1994) ‘The Intelligence Services Act 1994’, The Modern Law Review, 57(6), pp. 916–927. Available at: http://www.jstor.org/stable/1096888?pq-origsite=summon&seq=1#page_scan_tab_contents.
Walsh, P.F. and Miller, S. (2016) ‘Rethinking “Five Eyes” Security Intelligence Collection Policies and Practice Post Snowden’, Intelligence and National Security, 31(3), pp. 345–368. Available at: https://doi.org/10.1080/02684527.2014.998436.
Warner, M. (2002) ‘Wanted: a definition of “Intelligence”’. Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol46no3/html/v46i3a02p.htm.
Warner, M. (2004) ‘Transformation and Intelligence Liaison’, SAIS Review, 24(1), pp. 77–89. Available at: https://doi.org/10.1353/sais.2004.0024.
Warner, M. (2014) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Watanabe, F. (1997) ‘Fifteen axioms for intelligence analysts: how to succeed in the DI’, Studies in Intelligence, pp. 45–47. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf.
Weber, M., Gerth, H. and Mills, C.W. (2009) From Max Weber: essays in sociology. London: Routledge. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780203452196.
Weber, M., Roth, G. and Wittich, C. (1978a) Economy and society: an outline of interpretive sociology, Vol.1. Berkeley (etc): University of California Press.
Weber, M., Roth, G. and Wittich, C. (1978b) Economy and society: an outline of interpretive sociology, Vol.2. Berkeley (etc): University of California Press.
West, N. (1986) GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson.
Westerfield, B. (no date) ‘American exceptionalism and American intelligence’, Freedom review, 28(2). Available at: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049.
Westerfield, H.B. (1996) ‘America and the world of intelligence liaison’, Intelligence and National Security, 11(3), pp. 523–560. Available at: https://doi.org/10.1080/02684529608432375.
Wirtz, J.J. (2013) ‘Indications and warning in an age of uncertainty’, International Journal of Intelligence and CounterIntelligence, 26(3), pp. 550–562. Available at: https://doi.org/10.1080/08850607.2013.780558.
Wise, D. (1988) The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House.
Zegart, A.B. (2006) ‘An empirical analysis of failed intelligence reforms before September 11’, Political Science Quarterly, 121(1), pp. 33–60. Available at: http://www.jstor.org/stable/20202644?pq-origsite=summon&seq=1#page_scan_tab_contents.
Zorn, E.L. (2001) ‘Israel’s quest for satellite intelligence’, Studies Archive Indexes, 44(5). Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm.