1.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
2.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
3.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
4.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
5.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective. (Praeger, 2012).
6.
Davies, P. H. J. MI6 and the machinery of spying. (Frank Cass, 2003).
7.
Warner, M. The rise and fall of intelligence: an international security history. (Georgetown University Press, 2014).
8.
Intelligence and National Security.
9.
International Journal of Intelligence and CounterIntelligence.
10.
Studies in Intelligence.
11.
Agrell, W. When everything is intelligence - nothing is intelligence. Sherman Kent Center for Intelligence Analysis: Occasional Papers vol. 1 (2002).
12.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
13.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
14.
Shulsky, A. N. & Schmitt, G. J. Silent warfare: understanding the world of intelligence. (Potomac Books, Inc, 2002).
15.
Warner, M. Wanted: a definition of ‘Intelligence’. (2002).
16.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
17.
Berkowitz, B. D. & Goodman, A. E. Strategic intelligence for American national security. in Strategic intelligence for American national security 30–39 (Princeton University Press, 1989).
18.
Berkowitz, B. D. & Goodman, A. E. Best truth: intelligence in the information age. in Best truth: intelligence in the information age 58–98 (Yale University Press, 2000).
19.
Davies, P. Ideas of intelligence: divergent national concepts and institutions. Harvard international review 24, 62–66 (1AD).
20.
Farson, S. Schools of thought: national perceptions of intelligence’. Conflict Quarterly 9, 52–104 (1989).
21.
Herman, M. Intelligence and policy: a comment. Intelligence and National security .
22.
Herman, M. Intelligence services in the information age: theory and practice. vol. Cass series--studies in intelligence (Frank Cass, 2001).
23.
Berkowitz, B. D. & Goodman, A. E. Strategic intelligence for American national security. in Strategic intelligence for American national security 185–192 (Princeton University Press, 1989).
24.
Hibbert, R. Intelligence and policy. Intelligence and national security.
25.
Intelligence and Security Committee. Annual Report 2003-2004. vol. Cm 6240 (2004).
26.
Laqueur, W. World of secrets: the uses and limits of intelligence. in World of secrets: the uses and limits of intelligence vol. A Twentieth Century Fund book 20–27 (Weidenfeld and Nicolson, 1985).
27.
Omand, D. Securing the state. in Securing the state vol. Intelligence and security 113–137 (Hurst & Company, 2010).
28.
Robertson, K. G. Intelligence, terrorism and civil liberties. Journal of Conflict Studies 7, (1987).
29.
Turner, M. A. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence 17, 42–61 (2004).
30.
Berkowitz, B. D. & Goodman, A. E. Strategic intelligence for American national security. (Princeton University Press, 1989).
31.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
32.
Berkowitz, B. D. & Goodman, A. E. Strategic intelligence for American national security. (Princeton University Press, 1989).
33.
Understanding the intelligence cycle. vol. Studies in intelligence (Routledge, Taylor & Francis Group, 2014).
34.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
35.
Evans, G. Rethinking military intelligence failure – putting the wheels back on the intelligence cycle. Defence Studies 9, 22–46 (2009).
36.
Hulnick, A. S. What’s wrong with the Intelligence Cycle. Intelligence and National Security 21, 959–979 (2006).
37.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
38.
George, R. Z., Bruce, J. B., & Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. (Georgetown University Press, 2008).
39.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
40.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
41.
Katz, J. I. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence 19, 577–585 (2006).
42.
Morrison, J. N. L. British Intelligence Failures in Iraq. Intelligence and National Security 26, 509–520 (2011).
43.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
44.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
45.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
46.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
47.
Butler, F. E. R. & Great Britain. Review of intelligence on weapons of mass destruction. vol. HC (The Stationery Office, 2004).
48.
Pribbenow, M. l. The man in the snow white cell: limits to interrogation. Studies in intelligence 48, (2004).
49.
Center for Strategic Intelligence Research (U.S.), United States. Intelligence Science Board, & Federation of American Scientists. Educing information: interrogation--science and art : foundations for the future : phase 1 report. (Center for Strategic Intelligence Research, National Defense Intelligence College, 2006).
50.
Jeffery, K. MI6: the history of the Secret Intelligence Service, 1909-1949. (Bloomsbury, 2011).
51.
Jones, K. From the horse’s mouth: POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security 15, 60–80 (2000).
52.
Royden, B. G. Tolkachev, A Worthy Successor to Penkovsky. Studies in intelligence 47, (2003).
53.
Shulsky, A. N. & Schmitt, G. J. Silent warfare: understanding the world of intelligence. (Potomac Books, Inc, 2002).
54.
Butler, L. R. Review of Intelligence on Weapons of Mass Destruction. (2004).
55.
Davies, P. H. J. A Critical Look at Britain’s Spy Machinery — Central Intelligence Agency.
56.
Davies, P. H. J. & Gustafson, K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security 1–15 (2017) doi:10.1080/02684527.2017.1328860.
57.
Aid, M. M. All glory is fleeting: SIGINT and the fight against international terrorism. Intelligence and National Security 18, 72–120 (2003).
58.
Diffie, W. & Landau, S. Brave new world of wiretapping. Scientific American 299, (1AD).
59.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
60.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
61.
Day, D. A. Ferrets above: American signals intelligence satellites during the 1960s. International Journal of Intelligence and CounterIntelligence 17, 449–467 (2004).
62.
Aid, M. M. & Wiebes, C. INS Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. Intelligence and National Security 16, (2001).
63.
Aldrich, R. J. GCHQ: the uncensored story of Britain’s most secret intelligence agency. (Harper Press, 2010).
64.
Alvarez, D. INS Special Issue on Allied and Axis Signals Intelligence in World War II. Intelligence and National Security 14, (1999).
65.
Alvarez, D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security 15, 169–176 (2000).
66.
Bamford, J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. (Century, 2001).
67.
Clayton, A. The enemy is listening. vol. Espionage intelligence library (Ballantine, 1982).
68.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
69.
Richelson, J. & Ball, D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. (Allen & Unwin, 1985).
70.
Rudner, M. Canada’s communications security establishment, signals intelligence and counter-terrorism. Intelligence and National Security 22, 473–490 (2007).
71.
Smith, M. New cloak, old dagger: how Britain’s spies came in from the cold. in New cloak, old dagger: how Britain’s spies came in from the cold 165–177 (V. Gollancz, 1996).
72.
West, N. GCHQ: the secret wireless war, 1900-86. (Weidenfeld and Nicolson, 1986).
73.
Anderson, D. A Question of Trust: Report of the Investigatory Powers Review. (2015).
74.
Intelligence and Security Committee. Privacy and Security: A modern and transparent legal framework. (2015).
75.
A Democratic Licence to Operate: Report of the Independent Surveillance Review. (2015).
76.
The KGB, the Computer, and Me (Complete) - YouTube.
77.
Stoll, C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. (Pan Books, 1991).
78.
Investigatory Powers Act - GOV.UK. https://www.gov.uk/government/collections/investigatory-powers-bill (2015).
79.
Brugioni, D. A. The art and science of photoreconnaissance. Scientific American 56–63 (1996).
80.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
81.
Johnson-Freese, J. & Gatling, L. Security implications of Japan’s Information Gathering Satellite (IGS) system. Intelligence and National Security 19, 538–552 (2004).
82.
Oxlee, G. J. Aerospace reconnaissance. (Brassey’s, 1997).
83.
Berkowitz, B. The National Reconnaissance Office at 50 Years: A Brief History. (2011).
84.
David, J. E. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security 32, 768–781 (2017).
85.
Finnegan, T. J. & Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. ([For sale by the Supt. of Docs., U.S. G.P.O., 2006).
86.
Radcliffe, W. W. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Studies in intelligence 54, (2010).
87.
Remote Sensing and Photogrammetry Society. http://www.rspsoc.org/.
88.
Short, N. The Remote Sensing Tutorial.
89.
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 1 (via the Wayback Machine). https://web.archive.org/web/20180131220426/https://lta.cr.usgs.gov/declass_1.
90.
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 2 (via the Wayback Machine). https://web.archive.org/web/20170710082642/https://lta.cr.usgs.gov/declass_2.
91.
Zorn, E. L. Israel’s quest for satellite intelligence. Studies Archive Indexes 44, (2001).
92.
Davies, P. H. J. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies 35, (2009).
93.
Davies, P. H. J. Information warfare and the future of the spy. Information, Communication & Society 2, 115–133 (1999).
94.
Omand, D., Bartlett, J. & Miller, C. Introducing social media intelligence (SOCMINT). Intelligence and National Security 27, 801–823 (2012).
95.
Richards, P. G. & Won-Young, K. Monitoring for nuclear explosions. Scientific American 300, 70–77 (2009).
96.
Richelson, J. T. MASINT: the new kid in town. International Journal of Intelligence and CounterIntelligence 14, 149–192 (2001).
97.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
98.
Denning, D. E. R. Information warfare and security. (ACM Press, 1999).
99.
Mitnick, K. D. & Simon, W. L. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers. (Wiley, 2005).
100.
Omand, D., Bartlett, J. & Miller, C. #Intelligence. (2012).
101.
Shoham, D. & Jacobsen, S. M. Technical intelligence in retrospect: the 2001 anthrax letters powder. International Journal of Intelligence and CounterIntelligence 20, 79–105 (2007).
102.
Stoll, C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. (Pan Books, 1991).
103.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
104.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
105.
Johnson, L. K. Spies. Foreign Policy 18–26 doi:10.2307/1149708.
106.
Mercado, S. C. Sailing the sea of OSINT in the information age: a venerable source in a new era. Studies in intelligence vol. 48 (2004).
107.
Olcott, A. Open source intelligence in a networked world. vol. Continuum intelligence studies (Continuum, 2012).
108.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
109.
Stottlemyre, S. A. HUMINT, OSINT, or something new? Defining crowdsourced intelligence. International Journal of Intelligence and CounterIntelligence 28, 578–589 (2015).
110.
bellingcat - MH17 - The Open Source Evidence - bellingcat. https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/.
111.
Davis, J. The Kent-Kendall Debate of 1949. Studies Archive Indexes vol. 35 (1991).
112.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
113.
Lowenthal, M. M. & Marks, R. A. Intelligence analysis: is it as good as it gets? International Journal of Intelligence and CounterIntelligence 28, 662–665 (2015).
114.
‘The Typical CIA Analyst and What He Does’, NFAC paper to House Permanent Select Committee on Intelligence. (1978).
115.
The Tradecraft of Analysis. US Intelligence at the Crossroads. (1995).
116.
Watanabe, F. Fifteen axioms for intelligence analysts: how to succeed in the DI. Studies in Intelligence 45–47 (1997).
117.
Cradock, P. Know your enemy: how the Joint Intelligence Committee saw the world. in Know your enemy: how the Joint Intelligence Committee saw the world 290–303 (John Murray, 2002).
118.
Marrin, S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence 20, 401–414 (2007).
119.
Clark, R. M. Intelligence analysis : a target-centric approach. (CQ Press, 2016).
120.
Cradock, P. Know your enemy: how the Joint Intelligence Committee saw the world. in Know your enemy: how the Joint Intelligence Committee saw the world 281–289 (John Murray, 2002).
121.
Davis, J. Improving CIA analytic performance: DI analytic priorities. Kent Center Occasional Papers vol. 1 (2002).
122.
George, R. Z., Bruce, J. B., & Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations. (Georgetown University Press, 2008).
123.
Godson, R., National Strategy Information Center, & Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: Analysis and Estimates , Vol. 2. (1986).
124.
Marrin, S. Improving intelligence analysis: bridging the gap between scholarship and practice. vol. Studies in intelligence series (Routledge, 2011).
125.
Rovner, J. Fixing the facts: national security and the politics of intelligence. vol. Cornell studies in security affairs (Cornell University Press, 2015).
126.
Muller, D. G. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence 21, 1–12 (2008).
127.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. (2011).
128.
Grabo, C. M. Anticipating surprise. (2002).
129.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
130.
Hughes-Wilson, J. Military intelligence blunders and cover-ups. (Robinson, 2004).
131.
Wirtz, J. J. Indications and warning in an age of uncertainty. International Journal of Intelligence and CounterIntelligence 26, 550–562 (2013).
132.
Heuer, R. J. & Pherson, R. H. Structured analytic techniques for intelligence analysis. in Structured analytic techniques for intelligence analysis 133–135 (SAGE, 2015).
133.
Heuer, R. J. & Pherson, R. H. Structured analytic techniques for intelligence analysis. in Structured analytic techniques for intelligence analysis 149–156 (SAGE, 2015).
134.
Heuer, R. J. & Pherson, R. H. Structured analytic techniques for intelligence analysis. in Structured analytic techniques for intelligence analysis 133–140 (SAGE, 2015).
135.
Heuer, R. J. & Pherson, R. H. Structured analytic techniques for intelligence analysis. in Structured analytic techniques for intelligence analysis 119–121 (SAGE, 2015).
136.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
137.
Davies, P. H. J. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security 15, 55–76 (2000).
138.
Johnson, L. K. Covert action and accountability: decision-making for America’s secret foreign policy. International Studies Quarterly 33, (1989).
139.
Hicks, D. B. Lifting the arms embargo on the Bosnian Muslims: secret diplomacy or covert action? International Journal of Intelligence and CounterIntelligence 18, 246–261 (2005).
140.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
141.
Daugherty, W. J. Executive secrets: covert action and the presidency. (The University Press of Kentucky, 2006).
142.
Fraser, A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security 20, 486–508 (2005).
143.
Gustafson, K. Hostile intent: U.S. covert operations in Chile, 1964-1974. (Potomac, 2007).
144.
Holland, M. Operation PBHISTORY: the aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence 17, 300–332 (2004).
145.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
146.
Schlesinger, S. C., Kinzer, S. & Coatsworth, J. H. Bitter fruit: the story of the American coup in Guatemala. vol. David Rockefeller Center series on Latin American studies (Harvard University Press, 2005).
147.
Shulsky, A. N. & Schmitt, G. J. Silent warfare: understanding the world of intelligence. (Potomac Books, Inc, 2002).
148.
Steiner, J. E. Restoring the red line between intelligence and policy on covert action’. International Journal of Intelligence and CounterIntelligence 19, 156–165 (2006).
149.
Treverton, G. Covert action: the CIA and the limits of American intervention in the postwar world. (Tauris, 1988).
150.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
151.
Kramer, L. A. & Heuer, R. J. America’s increased vulnerability to insider espionage. International Journal of Intelligence and CounterIntelligence 20, 50–64 (2007).
152.
Northcott, C. The role, organization, and methods of MI5. International Journal of Intelligence and CounterIntelligence 20, 453–479 (2007).
153.
Olso, J. M. The Ten Commandments of counterintelligence: a never-ending necessity. Studies in Intelligence.
154.
Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation - The Bellows Report.
155.
Brook-Shepherd, G. The storm birds: Soviet postwar defectors. (Weidenfield and Nicolson, 1988).
156.
Glees, A. The secrets of the service: a story of Soviet subversion of western intelligence. (Carroll and Graf, 1987).
157.
Godson, R., National Strategy Information Center, & Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. (1986).
158.
Hinsley, F. H. & Simkins, C. A. G. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. vol. History of the Second World War (H.M.S.O.).
159.
Hunter, R. W. Spy hunter: inside the FBI investigation of the Walker espionage case. (Naval Institute Press, 1999).
160.
Masterman, J. C. The double-cross system in the war of 1939 to 1945. (Yale University Press, 1972).
161.
Wise, D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. (Random House, 1988).
162.
Davies, P. H. J. The missing dimension’s missing dimension. Public Policy and Administration 25, 5–9 (2010).
163.
Gill, P., Marrin, S. & Phythian, M. Intelligence theory: key questions and debates. (Routledge, 2009).
164.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
165.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
166.
Davies, P. H. J. MI6 and the machinery of spying. (Frank Cass, 2003).
167.
Orton, D. & Callahan, J. L. Important ‘folk theories’ in intelligence reorganization. International Journal of Intelligence and CounterIntelligence 8, 411–429 (1995).
168.
Riebling, M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. (Simon & Schuster, 2002).
169.
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. (Norton, 2004).
170.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
171.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
172.
Pringle, R. W. Modernization of terror: the transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence 17, 113–123 (2004).
173.
Thomas, S. T. The CIA’s bureaucratic dimensions. International Journal of Intelligence and CounterIntelligence 12, 399–413 (1999).
174.
Weber, M., Gerth, H. & Mills, C. W. From Max Weber: essays in sociology. vol. Routledge classics in sociology (Routledge, 2009).
175.
Blau, P. M. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. (University of Chicago Press, 1963).
176.
Dandeker, C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. (Polity, 1990).
177.
Morgan, G. Images of organization. (SAGE, 2006).
178.
Parker, G. M. Cross-functional teams: working with allies, enemies, and other strangers. vol. The Jossey-Bass business&management series (Jossey-Bass, 2003).
179.
Powell, W. W. & DiMaggio, P. J. The new institutionalism in organizational analysis. (University of Chicago Press, 1991).
180.
Weber, M., Roth, G. & Wittich, C. Economy and society: an outline of interpretive sociology, Vol.1. (University of California Press, 1978).
181.
Weber, M., Roth, G. & Wittich, C. Economy and society: an outline of interpretive sociology, Vol.2. (University of California Press, 1978).
182.
Pugh, D. S. Organization theory: selected classic readings. (Penguin, 2007).
183.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
184.
Herman, M. Intelligence power in peace and war. (Royal Institute of International Affairs, 1996).
185.
Burns, T. & Stalker, G. M. The management of innovation. (Oxford University Press, 1994).
186.
Cringely, R. X. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. (Viking, 1992).
187.
Knight, K. Matrix management. in Matrix management vol. Gower Press special study 1–12 (Gower Press, 1977).
188.
Lawrence, Paul R., Lorsch, Jay W., & Harvard University. Organization and environment: managing differentiation and integration. (Division of Research, Graduate School of Business Administration, Harvard University, 1967).
189.
Lorsch, J. W. & Allen, S. A. Managing diversity and interdependence: an organizational study of multidivisional firms. in Managing diversity and interdependence: an organizational study of multidivisional firms 53–79 (Harvard University, Graduate School of Business Administration, Division of Research, 1973).
190.
Parker, G. M. Cross-functional teams: working with allies, enemies, and other strangers. vol. The Jossey-Bass business&management series (Jossey-Bass, 2003).
191.
Pitt, D. & Smith, B. C. Government departments: an organizational perspective. vol. Routledge direct editions (Routledge and Kegan Paul, 1981).
192.
Allison, G. T. Conceptual models and the Cuban Missile Crisis. American Political Science Review 63, 689–718 (1969).
193.
Cohen, M. D., March, J. G. & Olsen, J. P. A garbage can model of organizational choice. Administrative Science Quarterly 17, 1–25 (1972).
194.
Davies, P. H. J. Intelligence and the machinery of government: conceptualizing the intelligence community. Public Policy and Administration 25, 29–46 (2010).
195.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
196.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. vol. Praeger security international (Praeger, 2012).
197.
Kaufman, S. J. Organizational politics and change in Soviet military policy. World politics 46, 355–382 (1AD).
198.
Smith, M. J. Intelligence and the core Executive. Public Policy and Administration 25, 11–28 (2010).
199.
Zegart, A. B. An empirical analysis of failed intelligence reforms before September 11. Political Science Quarterly 121, 33–60 (2006).
200.
Allison, G. T. Essence of decision: explaining the Cuban missile crisis. (Little, Brown and Co, 1971).
201.
Cyert, R. M. & March, J. G. A behavioral theory of the firm. (Blackwell, 1992).
202.
Davies, P. H. J. MI6 and the machinery of spying. vol. Cass series--studies in intelligence (Frank Cass, 2003).
203.
Hannan, M. T. & Freeman, J. The population ecology of organizations. American Journal of Sociology 82, 929–964 (1977).
204.
Mescall, P. N. A creature of compromise: the establishment of the DIA. International Journal of Intelligence and CounterIntelligence 7, 251–274 (1994).
205.
Morgan, G. Images of organization. (SAGE, 2006).
206.
Powell, W. W. & DiMaggio, P. J. The new institutionalism in organizational analysis. (University of Chicago Press, 1991).
207.
Rhodes, R. A. W. (Roderick A. W. & Dunleavy, P. Prime Minister, cabinet and core executive. (Macillan, 1995).
208.
Smith, M. J. The core executive in Britain. (Macmillan, 1999).
209.
Al Masashi, I. Iraq’s security and intelligence network: a guide and analysis. Middle East Review of International Affairs vol. 6 (2002).
210.
Dziak, J. J. Chekisty: a history of the KGB. in Chekisty: a history of the KGB 1–17 (Lexington Books, 1988).
211.
Shukman, H. Agents for change: intelligence services in the 21st century. in Agents for change: intelligence services in the 21st century 16–22 (St Ermin’s, 2000).
212.
Chapman, B. Police state. in Police state 106–115 (Macmillan, 1971).
213.
Farson, A. S. & Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. in PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa 479–497 (Praeger Security International, 2008).
214.
Andrew, C. M. & Gordievsky, O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. in KGB: the inside story of its foreign operations from Lenin to Gorbachev 1–42 (Hodder & Stoughton, 1990).
215.
Renz, B. Putin’s militocracy? An alternative interpretation of Siloviki in contemporary Russian politics. Europe-Asia Studies 58, 903–924 (2006).
216.
Raeff, M. The well-ordered police state and the development of modernity in Seventeenth- and Eighteenth-Century Europe: an attempt at a comparative approach. The American Historical Review 80, (1975).
217.
Rathmell, A. Syria’s intelligence services: origins and development. Journal of Conflict Studies 16, (1996).
218.
Davies, P. H. J. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs 17, 495–520 (2004).
219.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
220.
Duyvesteyn, I. Intelligence and strategic culture: some observations. Intelligence and National Security 26, 521–530 (2011).
221.
Gray, C. S. Strategic culture as context: the first generation of theory strikes back. Review of International Studies 25, 49–69 (1999).
222.
Pugh, D. S. Organization theory: selected classic readings. (Penguin, 2007).
223.
Morgan, G. Images of organization. in Images of organization 115–147 (SAGE, 2006).
224.
Turner, M. A. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence 17, 42–61 (2004).
225.
Westerfield, B. American exceptionalism and American intelligence. Freedom review 28,.
226.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. in Secret intelligence: a reader 140–153 (Routledge, 2009).
227.
Westerfield, H. B. America and the world of intelligence liaison. Intelligence and National Security 11, 523–560 (1996).
228.
Aldrich, R. J. Dangerous Liaisons: Post September 11 Intelligence Alliances. Harvard International Review 24, 50–54 (2002).
229.
Richelson, J. T. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence 4, 307–323 (1990).
230.
Sims, J. E. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence 19, 195–217 (2006).
231.
James Igoe Walsh. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy 27, (2007).
232.
Lander, S. S. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs 17, 481–493 (2004).
233.
Champion, B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security 13, 123–143 (1998).
234.
Clough, C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 17, 601–613 (2004).
235.
Hulnick, A. S. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence 5, 455–465 (1991).
236.
Lefebvre, S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 16, 527–542 (2003).
237.
Müller-Wille, B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies 46, 49–73 (2007).
238.
RUDNER, M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence 17, 193–230 (2004).
239.
Walsh, P. F. & Miller, S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security 31, 345–368 (2016).
240.
Warner, M. Transformation and Intelligence Liaison. SAIS Review 24, 77–89 (2004).
241.
Aldrich, R. J. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations 11, 122–139 (2009).
242.
CLOUGH, C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 17, 601–613 (2004).
243.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
244.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
245.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
246.
Hastedt, G. P. Towards the comparative study of intelligence. Journal of Conflict Studies 11, (1991).
247.
O’Connell, K. M. Thinking about intelligence comparatively. Brown Journal of World Affairs 11, (2005).
248.
Crosston, M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence 29, 110–131 (2016).
249.
Godson, R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. in Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World 115–155 (Pergamon-Brassey’s International Defense Publishers, 1988).
250.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community. vol. Praeger security international (Praeger, 2012).
251.
Davies, P. H. J. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community. vol. Praeger security international (Praeger, 2012).
252.
Gill, P. Policing politics: security intelligence and the liberal democratic state. vol. Cass series--studies in intelligence (F. Cass, 1994).
253.
Herman, M. Intelligence services in the information age: theory and practice. vol. Cass series--studies in intelligence (Frank Cass, 2001).
254.
Skocpol, T. States and social revolutions: a comparative analysis of France, Russia and China. in States and social revolutions: a comparative analysis of France, Russia and China 3–43 (Cambridge University Press, 1979).
255.
Müller-Wille, B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy 23, 61–86 (2002).
256.
Eftimiades, N. China’s Ministry of State Security: coming of age in the international arena. Maryland Series in Contemporary Asian Studies (1992).
257.
Inkster, N. Chinese intelligence in the cyber age. Survival 55, 45–66 (2013).
258.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
259.
Farson, A. S. & Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. (Praeger Security International, 2008).
260.
Shaffer, R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence 30, 522–531 (2017).
261.
India. Kargil Review Committee. From surprise to reckoning. (Sage Publications, 2000).
262.
Kingsbury, D. PSI handbook of global security and intelligence: Vol. 1: national approaches. in PSI handbook of global security and intelligence: Vol. 1: national approaches vol. Intelligence and the quest for security 247–262 (Praeger Security International, 2008).
263.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
264.
Javedanfar, M. PSI handbook of global security and intelligence: Vol. 2: national approaches. in PSI handbook of global security and intelligence: Vol. 2: national approaches vol. Intelligence and the quest for security 533–550 (Praeger Security International, 2008).
265.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
266.
Congressional Research Service. Iran: Internal Politics and U.S. Policy and Options.
267.
Farson, A. S. & Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. vol. Intelligence and the quest for security (Praeger Security International, 2008).
268.
Kobayashi, Y. Assessing reform of the Japanese intelligence community. International Journal of Intelligence and CounterIntelligence 28, 717–733 (2015).
269.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
270.
Farson, A. S. & Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. vol. Intelligence and the quest for security (Praeger Security International, 2008).
271.
Davies, P. H. J. & Gustafson, K. Intelligence elsewhere: spies and espionage outside the anglosphere. (Georgetown University Press, 2013).
272.
Bradley, A. W. & Ewing, K. D. Constitutional and administrative law. in Constitutional and administrative law 552–577 (Pearson Longman, 2011).
273.
Bradley, A. W. & Ewing, K. D. Constitutional and administrative law. in Constitutional and administrative law 476–500 (Pearson Longman, 2011).
274.
Goold, B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law 5–14 (2009).
275.
Benjamin, V. O. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review 637–648 (2007).
276.
Jones, B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial. Westminster Law Review 2, (2012).
277.
El Masri v. "the former Yugoslav Republic of Macedonia”. (2012).
278.
Wadham, J. The Intelligence Services Act 1994. The Modern Law Review 57, 916–927 (1994).
279.
Aldrich, R. J. Global intelligence co-operation versus accountability: new facets to an old problem. Intelligence and National Security 24, 26–56 (2009).
280.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
281.
Gill, P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security 22, 14–37 (2007).
282.
Glees, A. & Davies, P. H. J. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security 21, 848–883 (2006).
283.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
284.
Baldino, D. Democratic oversight of intelligence services. (Federation Press, 2010).
285.
Born, H., Leigh, I., & Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
286.
Gill, P. Policing politics: security intelligence and the liberal democratic state. vol. Cass series--studies in intelligence (F. Cass, 1994).
287.
Gill, P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security 11, 313–331 (1996).
288.
Glees, A., Davies, P. H. J., Morrison, J. N. L., & Social Affairs Unit. The open side of secrecy: Britain’s Intelligence and Security Committee. in The open side of secrecy: Britain’s Intelligence and Security Committee 51–89 (The Social Affairs Unit, 2006).
289.
Glees, A., Davies, P. H. J., Morrison, J. N. L., & Social Affairs Unit. The open side of secrecy: Britain’s Intelligence and Security Committee. (The Social Affairs Unit, 2006).
290.
U.S. House of Representatives Permanent Select Committee on Intelligence. http://intelligence.house.gov/.
291.
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/.
292.
Johnson, L. K. A season of inquiry: the Senate intelligence investigation. (University Press of Kentucky, 1985).
293.
Johnson, L. K. Handbook of intelligence studies. (Routledge, 2009).
294.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
295.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
296.
Rempel, R. Canada’s Parliamentary oversight of security and intelligence. International Journal of Intelligence and CounterIntelligence 17, 634–654 (2004).
297.
Robertson, K. G. Accountable intelligence: the British experience’. Conflict Quarterly 8, (1988).
298.
Robertson, K. G. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security 13, 144–158 (1998).
299.
Security Intelligence Review Committee (Canada). http://www.sirc-csars.gc.ca/index-eng.html.
300.
U.S. Senate Select Committee on Intelligence. http://www.intelligence.senate.gov/?
301.
U.S. House of Representatives Permanent Select Committee on Intelligence. https://intelligence.house.gov/.
302.
The Intelligence and Security Committee of Parliament. http://isc.independent.gov.uk/.
303.
Bar-Joseph, U. The professional ethics of intelligence analysis. International Journal of Intelligence and CounterIntelligence 24, 22–43 (2010).
304.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
305.
Omand, S. D. & Phythian, M. Ethics and intelligence: a debate. International Journal of Intelligence and CounterIntelligence 26, 38–63 (2013).
306.
Quinlan, M. Just intelligence: prolegomena to an ethical theory. Intelligence and National Security 22, 1–13 (2007).
307.
Diderichsen, A. & Rønn, K. V. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security 32, 479–493 (2017).
308.
Vrist Ronn, K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence 29, 760–784 (2016).
309.
Herman, M. Secret intelligence: a reader. in Secret intelligence: a reader 382–394 (Routledge, 2009).
310.
Herman, M. Intelligence services in the information age: theory and practice. vol. Cass series--studies in intelligence (Frank Cass, 2001).
311.
Olson, J. M. Fair play: the moral dilemmas of spying. (Potomac Books, Inc, 2008).
312.
Perry, D. Repugnant philosophy: ethics, espionage and covert action. Journal of conflict studies.
313.
Andrew, C. M., Aldrich, R. J. & Wark, W. K. Secret intelligence: a reader. (Routledge, 2009).
314.
Gendron, A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence 18, 398–434 (2005).
315.
Pfaff, T. & Tiel, J. R. The ethics of espionage. Journal of Military Ethics 3, 1–15 (2004).
316.
Shulsky, A. N. & Schmitt, G. J. Silent warfare: understanding the world of intelligence. (Potomac Books, Inc, 2002).