1
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
2
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
3
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.
4
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
5
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
6
Davies PHJ. MI6 and the machinery of spying. London: : Frank Cass 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
7
Warner M. The rise and fall of intelligence: an international security history. Washington, DC: : Georgetown University Press 2014. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
8
Intelligence and National Security.
9
International Journal of Intelligence and CounterIntelligence.
10
Studies in Intelligence.
11
Agrell W. When everything is intelligence - nothing is intelligence. Sherman Kent Center for Intelligence Analysis: Occasional Papers. 2002;1.https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
12
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
13
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
14
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
15
Warner M. Wanted: a definition of ‘Intelligence’. 2002.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol46no3/html/v46i3a02p.htm
16
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
17
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. In: Strategic intelligence for American national security. Guildford: : Princeton University Press 1989. 30–9.https://contentstore.cla.co.uk/secure/link?id=98bf3135-272a-e911-80cd-005056af4099
18
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. In: Best truth: intelligence in the information age. London: : Yale University Press 2000. 58–98.https://contentstore.cla.co.uk/secure/link?id=ce1dc751-ae02-e811-80cd-005056af4099
19
Davies P. Ideas of intelligence: divergent national concepts and institutions. Harvard international review 1AD;24:62–6.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
20
Farson S. Schools of thought: national perceptions of intelligence’. Conflict Quarterly 1989;9:52–104.https://journals.lib.unb.ca/index.php/JCS/article/download/14845/15914
21
Herman M. Intelligence and policy: a comment. Intelligence and National security
22
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
23
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. In: Strategic intelligence for American national security. Princeton, N.J.: : Princeton University Press 1989. 185–92.https://contentstore.cla.co.uk/secure/link?id=4004b09d-2a2a-e911-80cd-005056af4099
24
Hibbert R. Intelligence and policy. Intelligence and national security
25
Intelligence and Security Committee. Annual Report 2003-2004. 2004;Cm 6240.http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
26
Laqueur W. World of secrets: the uses and limits of intelligence. In: World of secrets: the uses and limits of intelligence. London: : Weidenfeld and Nicolson 1985. 20–7.https://contentstore.cla.co.uk/secure/link?id=e39afeec-ad02-e811-80cd-005056af4099
27
Omand D. Securing the state. In: Securing the state. London: : Hurst & Company 2010. 113–37.http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
28
Robertson KG. Intelligence, terrorism and civil liberties. Journal of Conflict Studies 1987;7.https://journals.lib.unb.ca/index.php/JCS/article/view/14756
29
Turner MA. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence 2004;17:42–61. doi:10.1080/08850600490252650
30
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: : Princeton University Press 1989.
31
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
32
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: : Princeton University Press 1989.
33
Phythian M, editor. Understanding the intelligence cycle. London: : Routledge, Taylor & Francis Group 2014. http://lib.myilibrary.com/browse/open.asp?id=495363&entityid=https://idp.brunel.ac.uk/entity
34
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
35
Evans G. Rethinking military intelligence failure – putting the wheels back on the intelligence cycle. Defence Studies 2009;9:22–46. doi:10.1080/14702430701811987
36
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security 2006;21:959–79. doi:10.1080/02684520601046291
37
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
38
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: : Georgetown University Press 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
39
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
40
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
41
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence 2006;19:577–85. doi:10.1080/08850600600829767
42
Morrison JNL. British Intelligence Failures in Iraq. Intelligence and National Security 2011;26:509–20. doi:10.1080/02684527.2011.580604
43
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
44
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
45
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
46
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
47
Butler FER, Great Britain. Review of intelligence on weapons of mass destruction. London: : The Stationery Office 2004. http://webarchive.nationalarchives.gov.uk/20131205100653/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
48
Pribbenow M l. The man in the snow white cell: limits to interrogation. Studies in intelligence 2004;48.https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
49
Center for Strategic Intelligence Research (U.S.), United States. Intelligence Science Board, Federation of American Scientists. Educing information: interrogation--science and art : foundations for the future : phase 1 report. Washington, DC: : Center for Strategic Intelligence Research, National Defense Intelligence College 2006. https://fas.org/irp/dni/educing.pdf
50
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: : Bloomsbury 2011.
51
Jones K. From the horse’s mouth: POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security 2000;15:60–80. doi:10.1080/02684520008432628
52
Royden BG. Tolkachev, A Worthy Successor to Penkovsky. Studies in intelligence 2003;47.https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
53
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
54
Butler LR. Review of Intelligence on Weapons of Mass Destruction. 2004.https://webarchive.nationalarchives.gov.uk/20131205114730/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
55
Davies PHJ. A Critical Look at Britain’s Spy Machinery — Central Intelligence Agency. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
56
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security 2017;:1–15. doi:10.1080/02684527.2017.1328860
57
Aid MM. All glory is fleeting: SIGINT and the fight against international terrorism. Intelligence and National Security 2003;18:72–120. doi:10.1080/02684520310001688880
58
Diffie W, Landau S. Brave new world of wiretapping. Scientific American 1AD;299.http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049
59
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
60
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
61
Day DA. Ferrets above: American signals intelligence satellites during the 1960s. International Journal of Intelligence and CounterIntelligence 2004;17:449–67. doi:10.1080/08850600490446835
62
Aid MM, Wiebes C. INS Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. Intelligence and National Security 2001;16.http://www.tandfonline.com/toc/fint20/16/1?nav=tocList
63
Aldrich RJ. GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: : Harper Press 2010.
64
Alvarez D. INS Special Issue on Allied and Axis Signals Intelligence in World War II. Intelligence and National Security 1999;14.http://www.tandfonline.com/toc/fint20/14/1?nav=tocList
65
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security 2000;15:169–76. doi:10.1080/02684520008432591
66
Bamford J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: : Century 2001.
67
Clayton A. The enemy is listening. New York: : Ballantine 1982.
68
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
69
Richelson J, Ball D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: : Allen & Unwin 1985.
70
Rudner M. Canada’s communications security establishment, signals intelligence and counter-terrorism. Intelligence and National Security 2007;22:473–90. doi:10.1080/02684520701640449
71
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. In: New cloak, old dagger: how Britain’s spies came in from the cold. London: : V. Gollancz 1996. 165–77.https://contentstore.cla.co.uk/secure/link?id=0b176b23-ad02-e811-80cd-005056af4099
72
West N. GCHQ: the secret wireless war, 1900-86. London: : Weidenfeld and Nicolson 1986.
73
Anderson D. A Question of Trust: Report of the Investigatory Powers Review. 2015.https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Web-Accessible1.pdf
74
Intelligence and Security Committee. Privacy and Security: A modern and transparent legal framework. 2015.https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20150312_ISC_P%2BS%2BRpt%28web%29.pdf?attachauth=ANoY7coqammF4tVkLQIO-N0UEZQ1tcfnvoaObjJ-AoDY-tVBMv2I6jKUw2ivWZCUZF9YUTjh8rlbkF-jd_wq9FP8390hcnLT-mbPCIipRcMRoMuluz-319BeI9lVZZDWMuE6BrJ7cDAoBalTjJnnnGKB_Rw4mZMJgVRCJ8irbNTjOEciM5Ph5Osa6RUznM19yZI42LuyVu8qWsJURGC9F9G1n05y-621vRF-vkhXXY2pdhpM7EQzX-WKMsszUqLYKwrMBhtif99y&attredirects=0
75
A Democratic Licence to Operate: Report of the Independent Surveillance Review. 2015.https://rusi.org/publication/whitehall-reports/democratic-licence-operate-report-independent-surveillance-review
76
The KGB, the Computer, and Me (Complete) - YouTube. https://www.youtube.com/watch?v=EcKxaq1FTac
77
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: : Pan Books 1991.
78
Investigatory Powers Act - GOV.UK. 2015.https://www.gov.uk/government/collections/investigatory-powers-bill
79
Brugioni DA. The art and science of photoreconnaissance. Scientific American 1996;:56–63.https://contentstore.cla.co.uk/secure/link?id=de9330fc-bb23-e911-80cd-005056af4099
80
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
81
Johnson-Freese J, Gatling L. Security implications of Japan’s Information Gathering Satellite (IGS) system. Intelligence and National Security 2004;19:538–52. doi:10.1080/0268452042000316278
82
Oxlee GJ. Aerospace reconnaissance. London: : Brassey’s 1997.
83
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History. 2011.https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
84
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security 2017;32:768–81. doi:10.1080/02684527.2017.1294372
85
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Washington, D.C.]: : [For sale by the Supt. of Docs., U.S. G.P.O. 2006.
86
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Studies in intelligence 2010;54.https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
87
Remote Sensing and Photogrammetry Society. http://www.rspsoc.org/
88
Short N. The Remote Sensing Tutorial. https://web.archive.org/web/20160326161839/http://fas.org/irp/imint/docs/rst/Front/tofc.html
89
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 1 (via the Wayback Machine). https://web.archive.org/web/20180131220426/https://lta.cr.usgs.gov/declass_1
90
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 2 (via the Wayback Machine). https://web.archive.org/web/20170710082642/https://lta.cr.usgs.gov/declass_2
91
Zorn EL. Israel’s quest for satellite intelligence. Studies Archive Indexes 2001;44.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
92
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies 2009;35.https://www.jstor.org/stable/40588096?pq-origsite=summon&seq=1#metadata_info_tab_contents
93
Davies PHJ. Information warfare and the future of the spy. Information, Communication & Society 1999;2:115–33. doi:10.1080/136911899359664
94
Omand D, Bartlett J, Miller C. Introducing social media intelligence (SOCMINT). Intelligence and National Security 2012;27:801–23. doi:10.1080/02684527.2012.716965
95
Richards PG, Won-Young K. Monitoring for nuclear explosions. Scientific American 2009;300:70–7.http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049
96
Richelson JT. MASINT: the new kid in town. International Journal of Intelligence and CounterIntelligence 2001;14:149–92. doi:10.1080/088506001300063136
97
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
98
Denning DER. Information warfare and security. New York, N.Y.: : ACM Press 1999.
99
Mitnick KD, Simon WL. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. Indianapolis, IN: : Wiley 2005. http://lib.myilibrary.com/browse/open.asp?id=25257&entityid=https://idp.brunel.ac.uk/entity
100
Omand D, Bartlett J, Miller C. #Intelligence. 2012.https://www.google.com/url?q=http://www.demos.co.uk/files/_Intelligence_-_web.pdf%3F1335197327&sa=U&ved=0ahUKEwjaqYfsusjPAhVrK8AKHZVEDLIQFggFMAA&client=internal-uds-cse&usg=AFQjCNHJ0dsS-5qOg2d2ZoGZhlvy6XbZ-A
101
Shoham D, Jacobsen SM. Technical intelligence in retrospect: the 2001 anthrax letters powder. International Journal of Intelligence and CounterIntelligence 2007;20:79–105. doi:10.1080/08850600600889027
102
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: : Pan Books 1991.
103
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
104
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
105
Johnson LK. Spies. Foreign Policy;:18–26. doi:10.2307/1149708
106
Mercado SC. Sailing the sea of OSINT in the information age: a venerable source in a new era. Studies in intelligence. 2004;48.https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html
107
Olcott A. Open source intelligence in a networked world. London: : Continuum 2012. http://lib.myilibrary.com/browse/open.asp?id=360727&entityid=https://idp.brunel.ac.uk/entity
108
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
109
Stottlemyre SA. HUMINT, OSINT, or something new? Defining crowdsourced intelligence. International Journal of Intelligence and CounterIntelligence 2015;28:578–89. doi:10.1080/08850607.2015.992760
110
bellingcat - MH17 - The Open Source Evidence - bellingcat. https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
111
Davis J. The Kent-Kendall Debate of 1949. Studies Archive Indexes. 1991;35.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/html/v35i2a06p_0001.htm
112
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
113
Lowenthal MM, Marks RA. Intelligence analysis: is it as good as it gets? International Journal of Intelligence and CounterIntelligence 2015;28:662–5. doi:10.1080/08850607.2015.1051410
114
‘The Typical CIA Analyst and What He Does’, NFAC paper to House Permanent Select Committee on Intelligence. 1978.
115
The Tradecraft of Analysis. US Intelligence at the Crossroads. 1995.
116
Watanabe F. Fifteen axioms for intelligence analysts: how to succeed in the DI. Studies in Intelligence 1997;:45–7.https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
117
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. London: : John Murray 2002. 290–303.https://contentstore.cla.co.uk/secure/link?id=dcf15b7f-202a-e911-80cd-005056af4099
118
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence 2007;20:401–14. doi:10.1080/08850600701249733
119
Clark RM. Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: : CQ Press 2016.
120
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world. London: : John Murray 2002. 281–9.https://contentstore.cla.co.uk/secure/link?id=6ce51d31-bb2a-e911-80cd-005056af4099
121
Davis J. Improving CIA analytic performance: DI analytic priorities. Kent Center Occasional Papers. 2002;1.https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
122
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. Washington D.C.: : Georgetown University Press 2008. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
123
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: Analysis and Estimates , Vol. 2. Lexington, MA.: 1986.
124
Marrin S. Improving intelligence analysis: bridging the gap between scholarship and practice. Abingdon: : Routledge 2011.
125
Rovner J. Fixing the facts: national security and the politics of intelligence. Ithaca: : Cornell University Press 2015. http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
126
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence 2008;21:1–12. doi:10.1080/08850600701648652
127
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 2011.http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
128
Grabo CM. Anticipating surprise. 2002.http://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf
129
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
130
Hughes-Wilson J. Military intelligence blunders and cover-ups. Rev. and updated ed. London: : Robinson 2004. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
131
Wirtz JJ. Indications and warning in an age of uncertainty. International Journal of Intelligence and CounterIntelligence 2013;26:550–62. doi:10.1080/08850607.2013.780558
132
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 133–5.https://contentstore.cla.co.uk/secure/link?id=c7e47fa3-6e33-e911-80cd-005056af4099
133
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 149–56.https://contentstore.cla.co.uk/secure/link?id=2189e06b-6f33-e911-80cd-005056af4099
134
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 133–40.https://contentstore.cla.co.uk/secure/link?id=bb7350c3-7033-e911-80cd-005056af4099
135
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis. Los Angeles: : SAGE 2015. 119–21.https://contentstore.cla.co.uk/secure/link?id=dd9ab219-7033-e911-80cd-005056af4099
136
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
137
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security 2000;15:55–76. doi:10.1080/02684520008432617
138
Johnson LK. Covert action and accountability: decision-making for America’s secret foreign policy. International Studies Quarterly 1989;33. doi:10.2307/2600495
139
Hicks DB. Lifting the arms embargo on the Bosnian Muslims: secret diplomacy or covert action? International Journal of Intelligence and CounterIntelligence 2005;18:246–61. doi:10.1080/08850600590911954
140
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
141
Daugherty WJ. Executive secrets: covert action and the presidency. Pbk ed. Lexington: : The University Press of Kentucky 2006.
142
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security 2005;20:486–508. doi:10.1080/02684520500269010
143
Gustafson K. Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Poole: : Potomac 2007.
144
Holland M. Operation PBHISTORY: the aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence 2004;17:300–32. doi:10.1080/08850600490274935
145
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
146
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Cambridge, Mass: : Harvard University Press 2005.
147
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
148
Steiner JE. Restoring the red line between intelligence and policy on covert action’. International Journal of Intelligence and CounterIntelligence 2006;19:156–65. doi:10.1080/08850600500332532
149
Treverton G. Covert action: the CIA and the limits of American intervention in the postwar world. London: : Tauris 1988.
150
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
151
Kramer LA, Heuer RJ. America’s increased vulnerability to insider espionage. International Journal of Intelligence and CounterIntelligence 2007;20:50–64. doi:10.1080/08850600600888698
152
Northcott C. The role, organization, and methods of MI5. International Journal of Intelligence and CounterIntelligence 2007;20:453–79. doi:10.1080/08850600701249758
153
Olso JM. The Ten Commandments of counterintelligence: a never-ending necessity. Studies in Intelligencehttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
154
Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation - The Bellows Report.
155
Brook-Shepherd G. The storm birds: Soviet postwar defectors. London: : Weidenfield and Nicolson 1988.
156
Glees A. The secrets of the service: a story of Soviet subversion of western intelligence. NewYork: : Carroll and Graf 1987.
157
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.: 1986.
158
Hinsley FH, Simkins CAG. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. London: : H.M.S.O.
159
Hunter RW. Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: : Naval Institute Press 1999.
160
Masterman JC. The double-cross system in the war of 1939 to 1945. New Haven: : Yale University Press 1972.
161
Wise D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: : Random House 1988.
162
Davies PHJ. The missing dimension’s missing dimension. Public Policy and Administration 2010;25:5–9. doi:10.1177/0952076709347071
163
Gill P, Marrin S, Phythian M. Intelligence theory: key questions and debates. London: : Routledge 2009. http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
164
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
165
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
166
Davies PHJ. MI6 and the machinery of spying. London: : Frank Cass 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
167
Orton D, Callahan JL. Important ‘folk theories’ in intelligence reorganization. International Journal of Intelligence and CounterIntelligence 1995;8:411–29.https://contentstore.cla.co.uk/secure/link?id=ad9950dd-ec86-e611-80c6-005056af4099
168
Riebling M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: : Simon & Schuster 2002.
169
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. New York: : Norton 2004. https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
170
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
171
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
172
Pringle RW. Modernization of terror: the transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence 2004;17:113–23. doi:10.1080/08850600490252687
173
Thomas ST. The CIA’s bureaucratic dimensions. International Journal of Intelligence and CounterIntelligence 1999;12:399–413. doi:10.1080/088506099304972
174
Weber M, Gerth H, Mills CW. From Max Weber: essays in sociology. London: : Routledge 2009. http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780203452196
175
Blau PM. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: : University of Chicago Press 1963.
176
Dandeker C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: : Polity 1990.
177
Morgan G. Images of organization. Updated ed. London: : SAGE 2006.
178
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: : Jossey-Bass 2003.
179
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: : University of Chicago Press 1991.
180
Weber M, Roth G, Wittich C. Economy and society: an outline of interpretive sociology, Vol.1. Berkeley (etc): : University of California Press 1978.
181
Weber M, Roth G, Wittich C. Economy and society: an outline of interpretive sociology, Vol.2. Berkeley (etc): : University of California Press 1978.
182
Pugh DS. Organization theory: selected classic readings. 5th ed. London: : Penguin 2007.
183
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
184
Herman M. Intelligence power in peace and war. Cambridge: : Royal Institute of International Affairs 1996. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
185
Burns T, Stalker GM. The management of innovation. Rev. ed. Oxford: : Oxford University Press 1994.
186
Cringely RX. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: : Viking 1992.
187
Knight K. Matrix management. In: Matrix management. Farnborough, Hants: : Gower Press 1977. 1–12.https://contentstore.cla.co.uk/secure/link?id=b91089c0-172a-e911-80cd-005056af4099
188
Lawrence, Paul R., Lorsch, Jay W., Harvard University. Organization and environment: managing differentiation and integration. Boston, Mass: : Division of Research, Graduate School of Business Administration, Harvard University 1967.
189
Lorsch JW, Allen SA. Managing diversity and interdependence: an organizational study of multidivisional firms. In: Managing diversity and interdependence: an organizational study of multidivisional firms. Boston: : Harvard University, Graduate School of Business Administration, Division of Research 1973. 53–79.https://contentstore.cla.co.uk/secure/link?id=cad0d107-fd0f-e811-80cd-005056af4099
190
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. San Francisco, CA: : Jossey-Bass 2003. http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
191
Pitt D, Smith BC. Government departments: an organizational perspective. London: : Routledge and Kegan Paul 1981.
192
Allison GT. Conceptual models and the Cuban Missile Crisis. American Political Science Review 1969;63:689–718. doi:10.2307/1954423
193
Cohen MD, March JG, Olsen JP. A garbage can model of organizational choice. Administrative Science Quarterly 1972;17:1–25. doi:10.2307/2392088
194
Davies PHJ. Intelligence and the machinery of government: conceptualizing the intelligence community. Public Policy and Administration 2010;25:29–46. doi:10.1177/0952076709347073
195
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
196
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
197
Kaufman SJ. Organizational politics and change in Soviet military policy. World politics 1AD;46:355–82. doi:10.2307/2950686
198
Smith MJ. Intelligence and the core Executive. Public Policy and Administration 2010;25:11–28. doi:10.1177/0952076709347072
199
Zegart AB. An empirical analysis of failed intelligence reforms before September 11. Political Science Quarterly 2006;121:33–60.http://www.jstor.org/stable/20202644?pq-origsite=summon&seq=1#page_scan_tab_contents
200
Allison GT. Essence of decision: explaining the Cuban missile crisis. Boston: : Little, Brown and Co 1971.
201
Cyert RM, March JG. A behavioral theory of the firm. 2nd ed. Cambridge, Mass: : Blackwell 1992.
202
Davies PHJ. MI6 and the machinery of spying. London: : Frank Cass 2003. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
203
Hannan MT, Freeman J. The population ecology of organizations. American Journal of Sociology 1977;82:929–64.http://www.jstor.org/stable/2777807?Search=yes&resultItemClick=true&searchText=Hannah,&searchText=Michael&searchText=T&searchText=ecology&searchUri=%2Faction%2FdoBasicSearch%3FQuery%3DHannah%252C%2BMichael%2BT%2Becology%26amp%3Bfilter%3Djid%253A10.2307%252Fj100067&seq=1#page_scan_tab_contents
204
Mescall PN. A creature of compromise: the establishment of the DIA. International Journal of Intelligence and CounterIntelligence 1994;7:251–74. doi:10.1080/08850609408435250
205
Morgan G. Images of organization. Updated ed. London: : SAGE 2006.
206
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: : University of Chicago Press 1991.
207
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, cabinet and core executive. Basingstoke: : Macillan 1995.
208
Smith MJ. The core executive in Britain. Basingstoke: : Macmillan 1999.
209
Al Masashi I. Iraq’s security and intelligence network: a guide and analysis. Middle East Review of International Affairs. 2002;6.https://web.archive.org/web/20170815104820/http://www.rubincenter.org/2002/09/al-marashi-2002-09-01/
210
Dziak JJ. Chekisty: a history of the KGB. In: Chekisty: a history of the KGB. Lexington, Mass: : Lexington Books 1988. 1–17.https://contentstore.cla.co.uk/secure/link?id=2d8a02df-a902-e811-80cd-005056af4099
211
Shukman H. Agents for change: intelligence services in the 21st century. In: Agents for change: intelligence services in the 21st century. London: : St Ermin’s 2000. 16–22.https://contentstore.cla.co.uk/secure/link?id=ccca3611-cf2a-e911-80cd-005056af4099
212
Chapman B. Police state. In: Police state. London: : Macmillan 1971. 106–15.https://contentstore.cla.co.uk/secure/link?id=655cf0fc-142a-e911-80cd-005056af4099
213
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. In: PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. Westport, Conn: : Praeger Security International 2008. 479–97.https://contentstore.cla.co.uk/secure/link?id=9b3d84b1-2e2a-e911-80cd-005056af4099
214
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: : Hodder & Stoughton 1990. 1–42.
215
Renz B. Putin’s militocracy? An alternative interpretation of Siloviki in contemporary Russian politics. Europe-Asia Studies 2006;58:903–24.http://www.jstor.org/stable/20451267?pq-origsite=summon&seq=1#page_scan_tab_contents
216
Raeff M. The well-ordered police state and the development of modernity in Seventeenth- and Eighteenth-Century Europe: an attempt at a comparative approach. The American Historical Review 1975;80. doi:10.2307/1852058
217
Rathmell A. Syria’s intelligence services: origins and development. Journal of Conflict Studies 1996;16.https://journals.lib.unb.ca/index.php/jcs/article/view/11815/12636
218
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs 2004;17:495–520.http://www.tandfonline.com/doi/full/10.1080/0955757042000298188
219
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
220
Duyvesteyn I. Intelligence and strategic culture: some observations. Intelligence and National Security 2011;26:521–30. doi:10.1080/02684527.2011.580605
221
Gray CS. Strategic culture as context: the first generation of theory strikes back. Review of International Studies 1999;25:49–69.http://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#page_scan_tab_contents
222
Pugh DS. Organization theory: selected classic readings. 5th ed. London: : Penguin 2007.
223
Morgan G. Images of organization. In: Images of organization. London: : SAGE 2006. 115–47.https://contentstore.cla.co.uk/secure/link?id=ddd37c6f-e9f9-e711-80cd-005056af4099
224
Turner MA. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence 2004;17:42–61. doi:10.1080/08850600490252650
225
Westerfield B. American exceptionalism and American intelligence. Freedom review;28.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
226
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. In: Secret intelligence: a reader. London: : Routledge 2009. 140–53.https://contentstore.cla.co.uk/secure/link?id=3f7061de-282a-e911-80cd-005056af4099
227
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security 1996;11:523–60. doi:10.1080/02684529608432375
228
Aldrich RJ. Dangerous Liaisons: Post September 11 Intelligence Alliances. Harvard International Review 2002;24:50–4.https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
229
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence 1990;4:307–23. doi:10.1080/08850609008435147
230
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence 2006;19:195–217. doi:10.1080/08850600500483657
231
James Igoe Walsh. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy 2007;27.https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents
232
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs 2004;17:481–93. doi:10.1080/0955757042000296964
233
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security 1998;13:123–43. doi:10.1080/02684529808432480
234
Clough C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 2004;17:601–13. doi:10.1080/08850600490446736
235
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence 1991;5:455–65. doi:10.1080/08850609108435194
236
Lefebvre S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 2003;16:527–42. doi:10.1080/716100467
237
Müller-Wille B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies 2007;46:49–73. doi:10.1111/j.1468-5965.2007.00767.x
238
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence 2004;17:193–230. doi:10.1080/08850600490274890
239
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security 2016;31:345–68. doi:10.1080/02684527.2014.998436
240
Warner M. Transformation and Intelligence Liaison. SAIS Review 2004;24:77–89. doi:10.1353/sais.2004.0024
241
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations 2009;11:122–39. doi:10.1111/j.1467-856x.2008.00353.x
242
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 2004;17:601–13. doi:10.1080/08850600490446736
243
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
244
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
245
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
246
Hastedt GP. Towards the comparative study of intelligence. Journal of Conflict Studies 1991;11.https://journals.lib.unb.ca/index.php/JCS/article/view/14966
247
O’Connell KM. Thinking about intelligence comparatively. Brown Journal of World Affairs 2005;11.http://bjwa.brown.edu/11-1/thinking-about-intelligence-comparatively/
248
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence 2016;29:110–31. doi:10.1080/08850607.2015.1083337
249
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. London: : Pergamon-Brassey’s International Defense Publishers 1988. 115–55.https://contentstore.cla.co.uk/secure/link?id=1b4ed62b-052a-e911-80cd-005056af4099
250
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
251
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. Santa Barbara, Calif: : Praeger 2012. http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
252
Gill P. Policing politics: security intelligence and the liberal democratic state. London: : F. Cass 1994.
253
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
254
Skocpol T. States and social revolutions: a comparative analysis of France, Russia and China. In: States and social revolutions: a comparative analysis of France, Russia and China. Cambridge (etc.): : Cambridge University Press 1979. 3–43.https://contentstore.cla.co.uk/secure/link?id=08a3957b-cd2a-e911-80cd-005056af4099
255
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy 2002;23:61–86. doi:10.1080/713999737
256
Eftimiades N. China’s Ministry of State Security: coming of age in the international arena. Maryland Series in Contemporary Asian Studies Published Online First: 1992.http://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1
257
Inkster N. Chinese intelligence in the cyber age. Survival 2013;55:45–66. doi:10.1080/00396338.2013.767405
258
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
259
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: : Praeger Security International 2008.
260
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence 2017;30:522–31. doi:10.1080/08850607.2017.1263529
261
India. Kargil Review Committee. From surprise to reckoning. New Delhi: : Sage Publications 2000.
262
Kingsbury D. PSI handbook of global security and intelligence: Vol. 1: national approaches. In: PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: : Praeger Security International 2008. 247–62.https://contentstore.cla.co.uk/secure/link?id=6da4e860-2617-e811-80cd-005056af4099
263
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
264
Javedanfar M. PSI handbook of global security and intelligence: Vol. 2: national approaches. In: PSI handbook of global security and intelligence: Vol. 2: national approaches. Westport, Conn: : Praeger Security International 2008. 533–50.https://contentstore.cla.co.uk/secure/link?id=620b00d9-2317-e811-80cd-005056af4099
265
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
266
Congressional Research Service. Iran: Internal Politics and U.S. Policy and Options. https://fas.org/sgp/crs/mideast/RL32048.pdf
267
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: : Praeger Security International 2008.
268
Kobayashi Y. Assessing reform of the Japanese intelligence community. International Journal of Intelligence and CounterIntelligence 2015;28:717–33. doi:10.1080/08850607.2015.1051453
269
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
270
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. Westport, Conn: : Praeger Security International 2008.
271
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC: : Georgetown University Press 2013. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
272
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law. Harlow: : Pearson Longman 2011. 552–77.https://contentstore.cla.co.uk/secure/link?id=0f477a47-2d00-e811-80cd-005056af4099
273
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law. Harlow: : Pearson Longman 2011. 476–500.https://contentstore.cla.co.uk/secure/link?id=652bd127-2b00-e811-80cd-005056af4099
274
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law 2009;:5–14.http://login.westlaw.co.uk/maf/wluk/ext/app/document?crumb-action=reset&docguid=I0C3A5710E1F511DD93AEE69B09385F41
275
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review 2007;:637–48.https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=3
276
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial. Westminster Law Review 2012;2.https://web.archive.org/web/20170814150309/http://www.westminsterlawreview.org/Volume2/Issue2/wlr12.php
277
El Masri v. "the former Yugoslav Republic of Macedonia”. 2012.http://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0ahUKEwiVn_Tb3eHPAhUhLMAKHbp8DFUQFgg9MAQ&url=http%3A%2F%2Fhudoc.echr.coe.int%2Fapp%2Fconversion%2Fpdf%2F%3Flibrary%3DECHR%26id%3D002-7324%26filename%3D002-7324.pdf%26TID%3Dthkbhnilzk&usg=AFQjCNGrOnih2tRDdRDFRDbCAHAGr2Pf9A
278
Wadham J. The Intelligence Services Act 1994. The Modern Law Review 1994;57:916–27.http://www.jstor.org/stable/1096888?pq-origsite=summon&seq=1#page_scan_tab_contents
279
Aldrich RJ. Global intelligence co-operation versus accountability: new facets to an old problem. Intelligence and National Security 2009;24:26–56. doi:10.1080/02684520902756812
280
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
281
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security 2007;22:14–37. doi:10.1080/02684520701200756
282
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security 2006;21:848–83. doi:10.1080/02684520600957787
283
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
284
Baldino D. Democratic oversight of intelligence services. Annandale, NSW: : Federation Press 2010.
285
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
286
Gill P. Policing politics: security intelligence and the liberal democratic state. London: : F. Cass 1994. http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
287
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security 1996;11:313–31.https://contentstore.cla.co.uk/secure/link?id=05e70f56-eb86-e611-80c6-005056af4099
288
Glees A, Davies PHJ, Morrison JNL, et al. The open side of secrecy: Britain’s Intelligence and Security Committee. In: The open side of secrecy: Britain’s Intelligence and Security Committee. London: : The Social Affairs Unit 2006. 51–89.https://contentstore.cla.co.uk/secure/link?id=c106b1ad-1f2a-e911-80cd-005056af4099
289
Glees A, Davies PHJ, Morrison JNL, et al. The open side of secrecy: Britain’s Intelligence and Security Committee. London: : The Social Affairs Unit 2006.
290
U.S. House of Representatives Permanent Select Committee on Intelligence. http://intelligence.house.gov/
291
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/
292
Johnson LK. A season of inquiry: the Senate intelligence investigation. Lexington, Ky: : University Press of Kentucky 1985.
293
Johnson LK. Handbook of intelligence studies. London: : Routledge 2009. http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
294
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
295
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
296
Rempel R. Canada’s Parliamentary oversight of security and intelligence. International Journal of Intelligence and CounterIntelligence 2004;17:634–54. doi:10.1080/08850600490496443
297
Robertson KG. Accountable intelligence: the British experience’. Conflict Quarterly 1988;8.https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
298
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security 1998;13:144–58. doi:10.1080/02684529808432481
299
Security Intelligence Review Committee (Canada). http://www.sirc-csars.gc.ca/index-eng.html
300
U.S. Senate Select Committee on Intelligence. http://www.intelligence.senate.gov/?
301
U.S. House of Representatives Permanent Select Committee on Intelligence. https://intelligence.house.gov/
302
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/
303
Bar-Joseph U. The professional ethics of intelligence analysis. International Journal of Intelligence and CounterIntelligence 2010;24:22–43. doi:10.1080/08850607.2011.519222
304
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
305
Omand SD, Phythian M. Ethics and intelligence: a debate. International Journal of Intelligence and CounterIntelligence 2013;26:38–63. doi:10.1080/08850607.2012.705186
306
Quinlan M. Just intelligence: prolegomena to an ethical theory. Intelligence and National Security 2007;22:1–13. doi:10.1080/02684520701200715
307
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security 2017;32:479–93. doi:10.1080/02684527.2016.1270622
308
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence 2016;29:760–84. doi:10.1080/08850607.2016.1177399
309
Herman M. Secret intelligence: a reader. In: Secret intelligence: a reader. London: : Routledge 2009. 382–94.https://contentstore.cla.co.uk/secure/link?id=fbf6a0cc-b2fa-e711-80cd-005056af4099
310
Herman M. Intelligence services in the information age: theory and practice. London: : Frank Cass 2001. http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
311
Olson JM. Fair play: the moral dilemmas of spying. Washington, D.C.: : Potomac Books, Inc 2008.
312
Perry D. Repugnant philosophy: ethics, espionage and covert action. Journal of conflict studies
313
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: : Routledge 2009.
314
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence 2005;18:398–434. doi:10.1080/08850600590945399
315
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics 2004;3:1–15. doi:10.1080/15027570310004447
316
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence. 3rd ed. Washington, D.C.: : Potomac Books, Inc 2002. http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site