[1]
Agrell, W. 2002. When everything is intelligence - nothing is intelligence. Sherman Kent Center for Intelligence Analysis: Occasional Papers. Central Intelligence Agency.
[2]
Aid, M.M. 2003. All glory is fleeting: SIGINT and the fight against international terrorism. Intelligence and National Security. 18, 4 (Dec. 2003), 72–120. DOI:https://doi.org/10.1080/02684520310001688880.
[3]
Aid, M.M. and Wiebes, C. 2001. INS Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. Intelligence and National Security. 16, 1 (Mar. 2001).
[4]
Al Masashi, I. 2002. Iraq’s security and intelligence network: a guide and analysis. Middle East Review of International Affairs. Rubin Center for Research in International Affairs.
[5]
Aldrich, R.J. 2002. Dangerous Liaisons: Post September 11 Intelligence Alliances. Harvard International Review. 24, Issue 3 (2002), 50–54.
[6]
Aldrich, R.J. 2010. GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press.
[7]
Aldrich, R.J. 2009. Global intelligence co-operation versus accountability: new facets to an old problem. Intelligence and National Security. 24, 1 (Feb. 2009), 26–56. DOI:https://doi.org/10.1080/02684520902756812.
[8]
Aldrich, R.J. 2009. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 11, 1 (Feb. 2009), 122–139. DOI:https://doi.org/10.1111/j.1467-856x.2008.00353.x.
[9]
Allison, G.T. 1969. Conceptual models and the Cuban Missile Crisis. American Political Science Review. 63, 03 (Sep. 1969), 689–718. DOI:https://doi.org/10.2307/1954423.
[10]
Allison, G.T. 1971. Essence of decision: explaining the Cuban missile crisis. Little, Brown and Co.
[11]
Alvarez, D. 2000. American signals intelligence and the Cuban missile crisis. Intelligence and National Security. 15, 1 (Mar. 2000), 169–176. DOI:https://doi.org/10.1080/02684520008432591.
[12]
Alvarez, D. 1999. INS Special Issue on Allied and Axis Signals Intelligence in World War II. Intelligence and National Security. 14, 1 (Mar. 1999).
[13]
Anderson, D. 2015. A Question of Trust: Report of the Investigatory Powers Review.
[14]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[15]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[16]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[17]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Secret intelligence: a reader. Routledge. 140–153.
[18]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[19]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[20]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[21]
Andrew, C.M. et al. 2009. Secret intelligence: a reader. Routledge.
[22]
Andrew, C.M. and Gordievsky, O. 1990. KGB: the inside story of its foreign operations from Lenin to Gorbachev. KGB: the inside story of its foreign operations from Lenin to Gorbachev. Hodder & Stoughton. 1–42.
[23]
Baldino, D. 2010. Democratic oversight of intelligence services. Federation Press.
[24]
Bamford, J. 2001. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. Century.
[25]
Bar-Joseph, U. 2010. The professional ethics of intelligence analysis. International Journal of Intelligence and CounterIntelligence. 24, 1 (Nov. 2010), 22–43. DOI:https://doi.org/10.1080/08850607.2011.519222.
[26]
bellingcat - MH17 - The Open Source Evidence - bellingcat: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
[27]
Benjamin, V.O. 2007. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review. 6 (2007), 637–648.
[28]
Berkowitz, B. 2011. The National Reconnaissance Office at 50 Years: A Brief History.
[29]
Berkowitz, B.D. and Goodman, A.E. 2000. Best truth: intelligence in the information age. Best truth: intelligence in the information age. Yale University Press. 58–98.
[30]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Strategic intelligence for American national security. Princeton University Press. 30–39.
[31]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Strategic intelligence for American national security. Princeton University Press. 185–192.
[32]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Princeton University Press.
[33]
Berkowitz, B.D. and Goodman, A.E. 1989. Strategic intelligence for American national security. Princeton University Press.
[34]
Blau, P.M. 1963. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. University of Chicago Press.
[35]
Born, H. et al. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
[36]
Bradley, A.W. and Ewing, K.D. 2011. Constitutional and administrative law. Constitutional and administrative law. Pearson Longman. 552–577.
[37]
Bradley, A.W. and Ewing, K.D. 2011. Constitutional and administrative law. Constitutional and administrative law. Pearson Longman. 476–500.
[38]
Brook-Shepherd, G. 1988. The storm birds: Soviet postwar defectors. Weidenfield and Nicolson.
[39]
Brugioni, D.A. 1996. The art and science of photoreconnaissance. Scientific American. (Mar. 1996), 56–63.
[40]
Burns, T. and Stalker, G.M. 1994. The management of innovation. Oxford University Press.
[41]
Butler, F.E.R. and Great Britain 2004. Review of intelligence on weapons of mass destruction. The Stationery Office.
[42]
Butler, L.R. 2004. Review of Intelligence on Weapons of Mass Destruction.
[43]
Center for Strategic Intelligence Research (U.S.) et al. 2006. Educing information: interrogation--science and art : foundations for the future : phase 1 report. Center for Strategic Intelligence Research, National Defense Intelligence College.
[44]
Champion, B. 1998. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 13, 2 (Jun. 1998), 123–143. DOI:https://doi.org/10.1080/02684529808432480.
[45]
Chapman, B. 1971. Police state. Police state. Macmillan. 106–115.
[46]
Clark, R.M. 2016. Intelligence analysis : a target-centric approach. CQ Press.
[47]
Clayton, A. 1982. The enemy is listening. Ballantine.
[48]
Clough, C. 2004. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 601–613. DOI:https://doi.org/10.1080/08850600490446736.
[49]
CLOUGH, C. 2004. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 601–613. DOI:https://doi.org/10.1080/08850600490446736.
[50]
Cohen, M.D. et al. 1972. A garbage can model of organizational choice. Administrative Science Quarterly. 17, 1 (1972), 1–25. DOI:https://doi.org/10.2307/2392088.
[51]
Congressional Research Service Iran: Internal Politics and U.S. Policy and Options.
[52]
Cradock, P. 2002. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. John Murray. 290–303.
[53]
Cradock, P. 2002. Know your enemy: how the Joint Intelligence Committee saw the world. Know your enemy: how the Joint Intelligence Committee saw the world. John Murray. 281–289.
[54]
Cringely, R.X. 1992. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. Viking.
[55]
Crosston, M. 2016. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 29, 1 (Jan. 2016), 110–131. DOI:https://doi.org/10.1080/08850607.2015.1083337.
[56]
Cyert, R.M. and March, J.G. 1992. A behavioral theory of the firm. Blackwell.
[57]
Dandeker, C. 1990. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Polity.
[58]
Daugherty, W.J. 2006. Executive secrets: covert action and the presidency. The University Press of Kentucky.
[59]
David, J.E. 2017. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 32, 6 (Sep. 2017), 768–781. DOI:https://doi.org/10.1080/02684527.2017.1294372.
[60]
Davies, P. 1AD. Ideas of intelligence: divergent national concepts and institutions. Harvard international review. 24, 3 (1AD), 62–66.
[61]
Davies, P.H.J. A Critical Look at Britain’s Spy Machinery — Central Intelligence Agency.
[62]
Davies, P.H.J. 2000. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security. 15, 3 (Sep. 2000), 55–76. DOI:https://doi.org/10.1080/02684520008432617.
[63]
Davies, P.H.J. 2009. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies. 35, 4 (2009).
[64]
Davies, P.H.J. 1999. Information warfare and the future of the spy. Information, Communication & Society. 2, 2 (Jan. 1999), 115–133. DOI:https://doi.org/10.1080/136911899359664.
[65]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective. Praeger.
[66]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[67]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[68]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[69]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[70]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[71]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[72]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[73]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Praeger.
[74]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger.
[75]
Davies, P.H.J. 2012. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Praeger.
[76]
Davies, P.H.J. 2010. Intelligence and the machinery of government: conceptualizing the intelligence community. Public Policy and Administration. 25, 1 (Jan. 2010), 29–46. DOI:https://doi.org/10.1177/0952076709347073.
[77]
Davies, P.H.J. 2004. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 17, 3 (2004), 495–520.
[78]
Davies, P.H.J. 2003. MI6 and the machinery of spying. Frank Cass.
[79]
Davies, P.H.J. 2003. MI6 and the machinery of spying. Frank Cass.
[80]
Davies, P.H.J. 2003. MI6 and the machinery of spying. Frank Cass.
[81]
Davies, P.H.J. 2010. The missing dimension’s missing dimension. Public Policy and Administration. 25, 1 (Jan. 2010), 5–9. DOI:https://doi.org/10.1177/0952076709347071.
[82]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[83]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[84]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[85]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[86]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[87]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[88]
Davies, P.H.J. and Gustafson, K. 2013. Intelligence elsewhere: spies and espionage outside the anglosphere. Georgetown University Press.
[89]
Davies, P.H.J. and Gustafson, K. 2017. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. (Jul. 2017), 1–15. DOI:https://doi.org/10.1080/02684527.2017.1328860.
[90]
Davis, J. 2002. Improving CIA analytic performance: DI analytic priorities. Kent Center Occasional Papers. Central Intelligence Agency.
[91]
Davis, J. 1991. The Kent-Kendall Debate of 1949. Studies Archive Indexes. Central Intelligence Agency.
[92]
Day, D.A. 2004. Ferrets above: American signals intelligence satellites during the 1960s. International Journal of Intelligence and CounterIntelligence. 17, 3 (Sep. 2004), 449–467. DOI:https://doi.org/10.1080/08850600490446835.
[93]
Declassified Satellite Imagery - 1 (via the Wayback Machine): https://web.archive.org/web/20180131220426/https://lta.cr.usgs.gov/declass_1.
[94]
Declassified Satellite Imagery - 2 (via the Wayback Machine): https://web.archive.org/web/20170710082642/https://lta.cr.usgs.gov/declass_2.
[95]
Denning, D.E.R. 1999. Information warfare and security. ACM Press.
[96]
Diderichsen, A. and Rønn, K.V. 2017. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 32, 4 (Jun. 2017), 479–493. DOI:https://doi.org/10.1080/02684527.2016.1270622.
[97]
Diffie, W. and Landau, S. 1AD. Brave new world of wiretapping. Scientific American. 299, 3 (1AD).
[98]
Duyvesteyn, I. 2011. Intelligence and strategic culture: some observations. Intelligence and National Security. 26, 4 (Aug. 2011), 521–530. DOI:https://doi.org/10.1080/02684527.2011.580605.
[99]
Dziak, J.J. 1988. Chekisty: a history of the KGB. Chekisty: a history of the KGB. Lexington Books. 1–17.
[100]
Eftimiades, N. 1992. China’s Ministry of State Security: coming of age in the international arena. Maryland Series in Contemporary Asian Studies. 2 (1992).
[101]
Evans, G. 2009. Rethinking military intelligence failure – putting the wheels back on the intelligence cycle. Defence Studies. 9, 1 (Mar. 2009), 22–46. DOI:https://doi.org/10.1080/14702430701811987.
[102]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Praeger Security International.
[103]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Praeger Security International. 479–497.
[104]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: Vol. 1: national approaches. Praeger Security International.
[105]
Farson, A.S. and Praeger Security International 2008. PSI handbook of global security and intelligence: Vol. 1: national approaches. Praeger Security International.
[106]
Farson, S. 1989. Schools of thought: national perceptions of intelligence’. Conflict Quarterly. 9, 2 (1989), 52–104.
[107]
Finnegan, T.J. and Center for Strategic Intelligence Research (U.S.) 2006. Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. [For sale by the Supt. of Docs., U.S. G.P.O.
[108]
Fraser, A. 2005. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security. 20, 3 (Sep. 2005), 486–508. DOI:https://doi.org/10.1080/02684520500269010.
[109]
Gendron, A. 2005. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 18, 3 (Oct. 2005), 398–434. DOI:https://doi.org/10.1080/08850600590945399.
[110]
George, R.Z. et al. 2008. Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press.
[111]
George, R.Z. et al. 2008. Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press.
[112]
Gill, P. 2007. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 22, 1 (Feb. 2007), 14–37. DOI:https://doi.org/10.1080/02684520701200756.
[113]
Gill, P. et al. 2009. Intelligence theory: key questions and debates. Routledge.
[114]
Gill, P. 1994. Policing politics: security intelligence and the liberal democratic state. F. Cass.
[115]
Gill, P. 1994. Policing politics: security intelligence and the liberal democratic state. F. Cass.
[116]
Gill, P. 1996. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security. 11, 2 (Apr. 1996), 313–331.
[117]
Glees, A. et al. 2006. The open side of secrecy: Britain’s Intelligence and Security Committee. The open side of secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit. 51–89.
[118]
Glees, A. et al. 2006. The open side of secrecy: Britain’s Intelligence and Security Committee. The Social Affairs Unit.
[119]
Glees, A. 1987. The secrets of the service: a story of Soviet subversion of western intelligence. Carroll and Graf.
[120]
Glees, A. and Davies, P.H.J. 2006. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 21, 5 (Oct. 2006), 848–883. DOI:https://doi.org/10.1080/02684520600957787.
[121]
Godson, R. 1988. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. Pergamon-Brassey’s International Defense Publishers. 115–155.
[122]
Godson, R. et al. 1986. Intelligence requirements for the 1980’s: Analysis and Estimates , Vol. 2.
[123]
Godson, R. et al. 1986. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6].
[124]
Goold, B. 2009. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law. January (2009), 5–14.
[125]
Grabo, C.M. 2002. Anticipating surprise. Defence Technical Information Centre.
[126]
Gray, C.S. 1999. Strategic culture as context: the first generation of theory strikes back. Review of International Studies. 25, 1 (1999), 49–69.
[127]
Gustafson, K. 2007. Hostile intent: U.S. covert operations in Chile, 1964-1974. Potomac.
[128]
Hannan, M.T. and Freeman, J. 1977. The population ecology of organizations. American Journal of Sociology. 82, 5 (1977), 929–964.
[129]
Hastedt, G.P. 1991. Towards the comparative study of intelligence. Journal of Conflict Studies. 11, 3 (1991).
[130]
Herman, M. Intelligence and policy: a comment. Intelligence and National security .
[131]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[132]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[133]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[134]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[135]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[136]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[137]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[138]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[139]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[140]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[141]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[142]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[143]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[144]
Herman, M. 1996. Intelligence power in peace and war. Royal Institute of International Affairs.
[145]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[146]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[147]
Herman, M. 2001. Intelligence services in the information age: theory and practice. Frank Cass.
[148]
Herman, M. 2009. Secret intelligence: a reader. Secret intelligence: a reader. Routledge. 382–394.
[149]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 133–135.
[150]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 149–156.
[151]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 133–140.
[152]
Heuer, R.J. and Pherson, R.H. 2015. Structured analytic techniques for intelligence analysis. Structured analytic techniques for intelligence analysis. SAGE. 119–121.
[153]
Hibbert, R. Intelligence and policy. Intelligence and national security.
[154]
Hicks, D.B. 2005. Lifting the arms embargo on the Bosnian Muslims: secret diplomacy or covert action? International Journal of Intelligence and CounterIntelligence. 18, 2 (Mar. 2005), 246–261. DOI:https://doi.org/10.1080/08850600590911954.
[155]
Hinsley, F.H. and Simkins, C.A.G. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. H.M.S.O.
[156]
Holland, M. 2004. Operation PBHISTORY: the aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence. 17, 2 (Jan. 2004), 300–332. DOI:https://doi.org/10.1080/08850600490274935.
[157]
Hughes-Wilson, J. 2004. Military intelligence blunders and cover-ups. Robinson.
[158]
Hulnick, A.S. 1991. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence. 5, 4 (Dec. 1991), 455–465. DOI:https://doi.org/10.1080/08850609108435194.
[159]
Hulnick, A.S. 2006. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 21, 6 (Dec. 2006), 959–979. DOI:https://doi.org/10.1080/02684520601046291.
[160]
Hunter, R.W. 1999. Spy hunter: inside the FBI investigation of the Walker espionage case. Naval Institute Press.
[161]
India. Kargil Review Committee. 2000. From surprise to reckoning. Sage Publications.
[162]
Inkster, N. 2013. Chinese intelligence in the cyber age. Survival. 55, 1 (Mar. 2013), 45–66. DOI:https://doi.org/10.1080/00396338.2013.767405.
[163]
Intelligence and Security Committee 2004. Annual Report 2003-2004. TSO.
[164]
Intelligence and Security Committee 2015. Privacy and Security: A modern and transparent legal framework.
[165]
Investigatory Powers Act - GOV.UK: 2015. https://www.gov.uk/government/collections/investigatory-powers-bill.
[166]
James Igoe Walsh 2007. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy. 27, 2 (2007).
[167]
Javedanfar, M. 2008. PSI handbook of global security and intelligence: Vol. 2: national approaches. PSI handbook of global security and intelligence: Vol. 2: national approaches. Praeger Security International. 533–550.
[168]
Jeffery, K. 2011. MI6: the history of the Secret Intelligence Service, 1909-1949. Bloomsbury.
[169]
Johnson, L.K. 1985. A season of inquiry: the Senate intelligence investigation. University Press of Kentucky.
[170]
Johnson, L.K. 1989. Covert action and accountability: decision-making for America’s secret foreign policy. International Studies Quarterly. 33, 1 (Mar. 1989). DOI:https://doi.org/10.2307/2600495.
[171]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[172]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[173]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[174]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[175]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[176]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[177]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[178]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[179]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[180]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[181]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[182]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[183]
Johnson, L.K. 2009. Handbook of intelligence studies. Routledge.
[184]
Johnson, L.K. Spies. Foreign Policy. 120, 18–26. DOI:https://doi.org/10.2307/1149708.
[185]
Johnson-Freese, J. and Gatling, L. 2004. Security implications of Japan’s Information Gathering Satellite (IGS) system. Intelligence and National Security. 19, 3 (Sep. 2004), 538–552. DOI:https://doi.org/10.1080/0268452042000316278.
[186]
Jones, B. 2012. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial. Westminster Law Review. 2, 2 (2012).
[187]
Jones, K. 2000. From the horse’s mouth: POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security. 15, 4 (Dec. 2000), 60–80. DOI:https://doi.org/10.1080/02684520008432628.
[188]
Katz, J.I. 2006. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 19, 4 (Dec. 2006), 577–585. DOI:https://doi.org/10.1080/08850600600829767.
[189]
Kaufman, S.J. 1AD. Organizational politics and change in Soviet military policy. World politics. 46, 3 (1AD), 355–382. DOI:https://doi.org/10.2307/2950686.
[190]
Kingsbury, D. 2008. PSI handbook of global security and intelligence: Vol. 1: national approaches. PSI handbook of global security and intelligence: Vol. 1: national approaches. Praeger Security International. 247–262.
[191]
Knight, K. 1977. Matrix management. Matrix management. Gower Press. 1–12.
[192]
Kobayashi, Y. 2015. Assessing reform of the Japanese intelligence community. International Journal of Intelligence and CounterIntelligence. 28, 4 (Oct. 2015), 717–733. DOI:https://doi.org/10.1080/08850607.2015.1051453.
[193]
Kramer, L.A. and Heuer, R.J. 2007. America’s increased vulnerability to insider espionage. International Journal of Intelligence and CounterIntelligence. 20, 1 (Dec. 2007), 50–64. DOI:https://doi.org/10.1080/08850600600888698.
[194]
Lander, S.S. 2004. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 17, 3 (Oct. 2004), 481–493. DOI:https://doi.org/10.1080/0955757042000296964.
[195]
Laqueur, W. 1985. World of secrets: the uses and limits of intelligence. World of secrets: the uses and limits of intelligence. Weidenfeld and Nicolson. 20–27.
[196]
Lawrence, Paul R. et al. 1967. Organization and environment: managing differentiation and integration. Division of Research, Graduate School of Business Administration, Harvard University.
[197]
Lefebvre, S. 2003. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 16, 4 (Oct. 2003), 527–542. DOI:https://doi.org/10.1080/716100467.
[198]
Lorsch, J.W. and Allen, S.A. 1973. Managing diversity and interdependence: an organizational study of multidivisional firms. Managing diversity and interdependence: an organizational study of multidivisional firms. Harvard University, Graduate School of Business Administration, Division of Research. 53–79.
[199]
Lowenthal, M.M. and Marks, R.A. 2015. Intelligence analysis: is it as good as it gets? International Journal of Intelligence and CounterIntelligence. 28, 4 (Oct. 2015), 662–665. DOI:https://doi.org/10.1080/08850607.2015.1051410.
[200]
Marrin, S. 2007. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 20, 3 (May 2007), 401–414. DOI:https://doi.org/10.1080/08850600701249733.
[201]
Marrin, S. 2011. Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge.
[202]
Masterman, J.C. 1972. The double-cross system in the war of 1939 to 1945. Yale University Press.
[203]
Mercado, S.C. 2004. Sailing the sea of OSINT in the information age: a venerable source in a new era. Studies in intelligence. Central Intelligence Agency.
[204]
Mescall, P.N. 1994. A creature of compromise: the establishment of the DIA. International Journal of Intelligence and CounterIntelligence. 7, 3 (Sep. 1994), 251–274. DOI:https://doi.org/10.1080/08850609408435250.
[205]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[206]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[207]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[208]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[209]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[210]
Ministry of Defence : Development, Concepts and Doctrine Centre 2011. Understanding and Intelligence Support to Joint Operations. Ministry of Defence.
[211]
Mitnick, K.D. and Simon, W.L. 2005. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Wiley.
[212]
Morgan, G. 2006. Images of organization. SAGE.
[213]
Morgan, G. 2006. Images of organization. SAGE.
[214]
Morgan, G. 2006. Images of organization. Images of organization. SAGE. 115–147.
[215]
Morrison, J.N.L. 2011. British Intelligence Failures in Iraq. Intelligence and National Security. 26, 4 (Aug. 2011), 509–520. DOI:https://doi.org/10.1080/02684527.2011.580604.
[216]
Muller, D.G. 2008. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 21, 1 (Jan. 2008), 1–12. DOI:https://doi.org/10.1080/08850600701648652.
[217]
Müller-Wille, B. 2002. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 23, 2 (Aug. 2002), 61–86. DOI:https://doi.org/10.1080/713999737.
[218]
Müller-Wille, B. 2007. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 46, 1 (Dec. 2007), 49–73. DOI:https://doi.org/10.1111/j.1468-5965.2007.00767.x.
[219]
National Commission on Terrorist Attacks upon the United States 2004. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. Norton.
[220]
Northcott, C. 2007. The role, organization, and methods of MI5. International Journal of Intelligence and CounterIntelligence. 20, 3 (May 2007), 453–479. DOI:https://doi.org/10.1080/08850600701249758.
[221]
O’Connell, K.M. 2005. Thinking about intelligence comparatively. Brown Journal of World Affairs. 11, 1 (2005).
[222]
Olcott, A. 2012. Open source intelligence in a networked world. Continuum.
[223]
Olso, J.M. The Ten Commandments of counterintelligence: a never-ending necessity. Studies in Intelligence. fall_winter_2001.
[224]
Olson, J.M. 2008. Fair play: the moral dilemmas of spying. Potomac Books, Inc.
[225]
Omand, D. et al. 2012. #Intelligence. Demos.
[226]
Omand, D. et al. 2012. Introducing social media intelligence (SOCMINT). Intelligence and National Security. 27, 6 (Dec. 2012), 801–823. DOI:https://doi.org/10.1080/02684527.2012.716965.
[227]
Omand, D. 2010. Securing the state. Securing the state. Hurst & Company. 113–137.
[228]
Omand, S.D. and Phythian, M. 2013. Ethics and intelligence: a debate. International Journal of Intelligence and CounterIntelligence. 26, 1 (Mar. 2013), 38–63. DOI:https://doi.org/10.1080/08850607.2012.705186.
[229]
Orton, D. and Callahan, J.L. 1995. Important ‘folk theories’ in intelligence reorganization. International Journal of Intelligence and CounterIntelligence. 8, 4 (1995), 411–429.
[230]
Oxlee, G.J. 1997. Aerospace reconnaissance. Brassey’s.
[231]
Parker, G.M. 2003. Cross-functional teams: working with allies, enemies, and other strangers. Jossey-Bass.
[232]
Parker, G.M. 2003. Cross-functional teams: working with allies, enemies, and other strangers. Jossey-Bass.
[233]
Perry, D. Repugnant philosophy: ethics, espionage and covert action. Journal of conflict studies.
[234]
Pfaff, T. and Tiel, J.R. 2004. The ethics of espionage. Journal of Military Ethics. 3, 1 (Mar. 2004), 1–15. DOI:https://doi.org/10.1080/15027570310004447.
[235]
Phythian, M. ed. 2014. Understanding the intelligence cycle. Routledge, Taylor & Francis Group.
[236]
Pitt, D. and Smith, B.C. 1981. Government departments: an organizational perspective. Routledge and Kegan Paul.
[237]
Powell, W.W. and DiMaggio, P.J. 1991. The new institutionalism in organizational analysis. University of Chicago Press.
[238]
Powell, W.W. and DiMaggio, P.J. 1991. The new institutionalism in organizational analysis. University of Chicago Press.
[239]
Pribbenow, M. l. 2004. The man in the snow white cell: limits to interrogation. Studies in intelligence. 48, 1 (2004).
[240]
Pringle, R.W. 2004. Modernization of terror: the transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 113–123. DOI:https://doi.org/10.1080/08850600490252687.
[241]
Pugh, D.S. 2007. Organization theory: selected classic readings. Penguin.
[242]
Pugh, D.S. 2007. Organization theory: selected classic readings. Penguin.
[243]
Quinlan, M. 2007. Just intelligence: prolegomena to an ethical theory. Intelligence and National Security. 22, 1 (Feb. 2007), 1–13. DOI:https://doi.org/10.1080/02684520701200715.
[244]
Radcliffe, W.W. 2010. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Studies in intelligence. 54, 3 (2010).
[245]
Raeff, M. 1975. The well-ordered police state and the development of modernity in Seventeenth- and Eighteenth-Century Europe: an attempt at a comparative approach. The American Historical Review. 80, 5 (Dec. 1975). DOI:https://doi.org/10.2307/1852058.
[246]
Rathmell, A. 1996. Syria’s intelligence services: origins and development. Journal of Conflict Studies. 16, 2 (1996).
[247]
Remote Sensing and Photogrammetry Society: http://www.rspsoc.org/.
[248]
Rempel, R. 2004. Canada’s Parliamentary oversight of security and intelligence. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 634–654. DOI:https://doi.org/10.1080/08850600490496443.
[249]
Renz, B. 2006. Putin’s militocracy? An alternative interpretation of Siloviki in contemporary Russian politics. Europe-Asia Studies. 58, 6 (2006), 903–924.
[250]
Rhodes, R.A.W. (Roderick A.W. and Dunleavy, P. 1995. Prime Minister, cabinet and core executive. Macillan.
[251]
Richards, P.G. and Won-Young, K. 2009. Monitoring for nuclear explosions. Scientific American. 300, (2009), 70–77.
[252]
Richelson, J. and Ball, D. 1985. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Allen & Unwin.
[253]
Richelson, J.T. 2001. MASINT: the new kid in town. International Journal of Intelligence and CounterIntelligence. 14, 2 (Apr. 2001), 149–192. DOI:https://doi.org/10.1080/088506001300063136.
[254]
Richelson, J.T. 1990. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence. 4, 3 (Jan. 1990), 307–323. DOI:https://doi.org/10.1080/08850609008435147.
[255]
Riebling, M. 2002. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. Simon & Schuster.
[256]
Robertson, K.G. 1988. Accountable intelligence: the British experience’. Conflict Quarterly. 8, 1 (1988).
[257]
Robertson, K.G. 1987. Intelligence, terrorism and civil liberties. Journal of Conflict Studies. 7, 2 (1987).
[258]
Robertson, K.G. 1998. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security. 13, 2 (Jun. 1998), 144–158. DOI:https://doi.org/10.1080/02684529808432481.
[259]
Rovner, J. 2015. Fixing the facts: national security and the politics of intelligence. Cornell University Press.
[260]
Royden, B.G. 2003. Tolkachev, A Worthy Successor to Penkovsky. Studies in intelligence. 47, 3 (2003).
[261]
Rudner, M. 2007. Canada’s communications security establishment, signals intelligence and counter-terrorism. Intelligence and National Security. 22, 4 (Aug. 2007), 473–490. DOI:https://doi.org/10.1080/02684520701640449.
[262]
RUDNER, M. 2004. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 17, 2 (Jan. 2004), 193–230. DOI:https://doi.org/10.1080/08850600490274890.
[263]
Schlesinger, S.C. et al. 2005. Bitter fruit: the story of the American coup in Guatemala. Harvard University Press.
[264]
Security Intelligence Review Committee (Canada): http://www.sirc-csars.gc.ca/index-eng.html.
[265]
Shaffer, R. 2017. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 30, 3 (Jul. 2017), 522–531. DOI:https://doi.org/10.1080/08850607.2017.1263529.
[266]
Shoham, D. and Jacobsen, S.M. 2007. Technical intelligence in retrospect: the 2001 anthrax letters powder. International Journal of Intelligence and CounterIntelligence. 20, 1 (Dec. 2007), 79–105. DOI:https://doi.org/10.1080/08850600600889027.
[267]
Short, N. The Remote Sensing Tutorial. Federation Of American Scientists.
[268]
Shukman, H. 2000. Agents for change: intelligence services in the 21st century. Agents for change: intelligence services in the 21st century. St Ermin’s. 16–22.
[269]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[270]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[271]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[272]
Shulsky, A.N. and Schmitt, G.J. 2002. Silent warfare: understanding the world of intelligence. Potomac Books, Inc.
[273]
Sims, J.E. 2006. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 19, 2 (May 2006), 195–217. DOI:https://doi.org/10.1080/08850600500483657.
[274]
Skocpol, T. 1979. States and social revolutions: a comparative analysis of France, Russia and China. States and social revolutions: a comparative analysis of France, Russia and China. Cambridge University Press. 3–43.
[275]
Smith, M. 1996. New cloak, old dagger: how Britain’s spies came in from the cold. New cloak, old dagger: how Britain’s spies came in from the cold. V. Gollancz. 165–177.
[276]
Smith, M.J. 2010. Intelligence and the core Executive. Public Policy and Administration. 25, 1 (Jan. 2010), 11–28. DOI:https://doi.org/10.1177/0952076709347072.
[277]
Smith, M.J. 1999. The core executive in Britain. Macmillan.
[278]
Steiner, J.E. 2006. Restoring the red line between intelligence and policy on covert action’. International Journal of Intelligence and CounterIntelligence. 19, 1 (Jan. 2006), 156–165. DOI:https://doi.org/10.1080/08850600500332532.
[279]
Stoll, C. 1991. The cuckoo’s egg: tracking a spy through the maze of computer espionage. Pan Books.
[280]
Stoll, C. 1991. The cuckoo’s egg: tracking a spy through the maze of computer espionage. Pan Books.
[281]
Stottlemyre, S.A. 2015. HUMINT, OSINT, or something new? Defining crowdsourced intelligence. International Journal of Intelligence and CounterIntelligence. 28, 3 (Jul. 2015), 578–589. DOI:https://doi.org/10.1080/08850607.2015.992760.
[282]
Studies in Intelligence: .
[283]
The Intelligence and Security Committee of Parliament: http://isc.independent.gov.uk/.
[284]
The Intelligence and Security Committee of Parliament: http://isc.independent.gov.uk/.
[285]
Thomas, S.T. 1999. The CIA’s bureaucratic dimensions. International Journal of Intelligence and CounterIntelligence. 12, 4 (Dec. 1999), 399–413. DOI:https://doi.org/10.1080/088506099304972.
[286]
Treverton, G. 1988. Covert action: the CIA and the limits of American intervention in the postwar world. Tauris.
[287]
Turner, M.A. 2004. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 42–61. DOI:https://doi.org/10.1080/08850600490252650.
[288]
Turner, M.A. 2004. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence. 17, 1 (Jan. 2004), 42–61. DOI:https://doi.org/10.1080/08850600490252650.
[289]
U.S. House of Representatives Permanent Select Committee on Intelligence: http://intelligence.house.gov/.
[290]
U.S. House of Representatives Permanent Select Committee on Intelligence: https://intelligence.house.gov/.
[291]
U.S. Senate Select Committee on Intelligence: http://www.intelligence.senate.gov/?
[292]
Vrist Ronn, K. 2016. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 29, 4 (Oct. 2016), 760–784. DOI:https://doi.org/10.1080/08850607.2016.1177399.
[293]
Wadham, J. 1994. The Intelligence Services Act 1994. The Modern Law Review. 57, 6 (1994), 916–927.
[294]
Walsh, P.F. and Miller, S. 2016. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 31, 3 (Apr. 2016), 345–368. DOI:https://doi.org/10.1080/02684527.2014.998436.
[295]
Warner, M. 2014. The rise and fall of intelligence: an international security history. Georgetown University Press.
[296]
Warner, M. 2004. Transformation and Intelligence Liaison. SAIS Review. 24, 1 (2004), 77–89. DOI:https://doi.org/10.1353/sais.2004.0024.
[297]
Warner, M. 2002. Wanted: a definition of ‘Intelligence’. Central Intelligence Agency.
[298]
Watanabe, F. 1997. Fifteen axioms for intelligence analysts: how to succeed in the DI. Studies in Intelligence. (1997), 45–47.
[299]
Weber, M. et al. 1978. Economy and society: an outline of interpretive sociology, Vol.1. University of California Press.
[300]
Weber, M. et al. 1978. Economy and society: an outline of interpretive sociology, Vol.2. University of California Press.
[301]
Weber, M. et al. 2009. From Max Weber: essays in sociology. Routledge.
[302]
West, N. 1986. GCHQ: the secret wireless war, 1900-86. Weidenfeld and Nicolson.
[303]
Westerfield, B. American exceptionalism and American intelligence. Freedom review. 28, 2.
[304]
Westerfield, H.B. 1996. America and the world of intelligence liaison. Intelligence and National Security. 11, 3 (Jul. 1996), 523–560. DOI:https://doi.org/10.1080/02684529608432375.
[305]
Wirtz, J.J. 2013. Indications and warning in an age of uncertainty. International Journal of Intelligence and CounterIntelligence. 26, 3 (Sep. 2013), 550–562. DOI:https://doi.org/10.1080/08850607.2013.780558.
[306]
Wise, D. 1988. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. Random House.
[307]
Zegart, A.B. 2006. An empirical analysis of failed intelligence reforms before September 11. Political Science Quarterly. 121, 1 (2006), 33–60.
[308]
Zorn, E.L. 2001. Israel’s quest for satellite intelligence. Studies Archive Indexes. 44, 5 (2001).
[309]
2015. A Democratic Licence to Operate: Report of the Independent Surveillance Review.
[310]
2012. El Masri v. "the former Yugoslav Republic of Macedonia”. European Court of Human Rights.
[311]
Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation - The Bellows Report.
[312]
Intelligence and National Security.
[313]
International Journal of Intelligence and CounterIntelligence.
[314]
The KGB, the Computer, and Me (Complete) - YouTube.
[315]
1995. The Tradecraft of Analysis. US Intelligence at the Crossroads.
[316]
1978. ‘The Typical CIA Analyst and What He Does’, NFAC paper to House Permanent Select Committee on Intelligence.