1.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
2.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
3.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations. 3rd. Ministry of Defence; 2011.
4.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
5.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective [Internet]. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
6.
Davies PHJ. MI6 and the machinery of spying [Internet]. London: Frank Cass; 2003. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
7.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
8.
Intelligence and National Security.
9.
International Journal of Intelligence and CounterIntelligence.
10.
Studies in Intelligence. Central Intelligence Agency;
11.
Agrell W. When everything is intelligence - nothing is intelligence [Internet]. Vol. 1, Sherman Kent Center for Intelligence Analysis: Occasional Papers. Central Intelligence Agency; 2002. Available from: https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm
12.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
13.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
14.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
15.
Warner M. Wanted: a definition of ‘Intelligence’ [Internet]. Central Intelligence Agency; 2002. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol46no3/html/v46i3a02p.htm
16.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations [Internet]. 3rd ed. Ministry of Defence; 2011. Available from: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
17.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. In: Strategic intelligence for American national security [Internet]. Guildford: Princeton University Press; 1989. p. 30–9. Available from: https://contentstore.cla.co.uk/secure/link?id=98bf3135-272a-e911-80cd-005056af4099
18.
Berkowitz BD, Goodman AE. Best truth: intelligence in the information age. In: Best truth: intelligence in the information age [Internet]. London: Yale University Press; 2000. p. 58–98. Available from: https://contentstore.cla.co.uk/secure/link?id=ce1dc751-ae02-e811-80cd-005056af4099
19.
Davies P. Ideas of intelligence: divergent national concepts and institutions. Harvard international review [Internet]. 1AD;24(3):62–6. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238078&site=ehost-live&scope=site&custid=s1123049
20.
Farson S. Schools of thought: national perceptions of intelligence’. Conflict Quarterly [Internet]. 1989;9(2):52–104. Available from: https://journals.lib.unb.ca/index.php/JCS/article/download/14845/15914
21.
Herman M. Intelligence and policy: a comment. Intelligence and National security .
22.
Herman M. Intelligence services in the information age: theory and practice [Internet]. Vol. Cass series--studies in intelligence. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
23.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. In: Strategic intelligence for American national security [Internet]. Princeton, N.J.: Princeton University Press; 1989. p. 185–92. Available from: https://contentstore.cla.co.uk/secure/link?id=4004b09d-2a2a-e911-80cd-005056af4099
24.
Hibbert R. Intelligence and policy. Intelligence and national security.
25.
Intelligence and Security Committee. Annual Report 2003-2004 [Internet]. Vol. Cm 6240. London: TSO; 2004. Available from: http://isc.independent.gov.uk/files/2003-2004_ISC_AR.pdf
26.
Laqueur W. World of secrets: the uses and limits of intelligence. In: World of secrets: the uses and limits of intelligence [Internet]. London: Weidenfeld and Nicolson; 1985. p. 20–7. Available from: https://contentstore.cla.co.uk/secure/link?id=e39afeec-ad02-e811-80cd-005056af4099
27.
Omand D. Securing the state. In: Securing the state [Internet]. London: Hurst & Company; 2010. p. 113–37. Available from: http://lib.myilibrary.com/browse/open.asp?id=895889&entityid=https://idp.brunel.ac.uk/entity
28.
Robertson KG. Intelligence, terrorism and civil liberties. Journal of Conflict Studies [Internet]. 1987;7(2). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14756
29.
Turner MA. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Jan;17(1):42–61. Available from: http://www.tandfonline.com/doi/full/10.1080/08850600490252650?scroll=top&needAccess=true
30.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press; 1989.
31.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
32.
Berkowitz BD, Goodman AE. Strategic intelligence for American national security. Princeton, N.J.: Princeton University Press; 1989.
33.
Phythian M, editor. Understanding the intelligence cycle [Internet]. Vol. Studies in intelligence. London: Routledge, Taylor & Francis Group; 2014. Available from: http://lib.myilibrary.com/browse/open.asp?id=495363&entityid=https://idp.brunel.ac.uk/entity
34.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations [Internet]. 3rd ed. Ministry of Defence; 2011. Available from: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
35.
Evans G. Rethinking military intelligence failure – putting the wheels back on the intelligence cycle. Defence Studies [Internet]. 2009 Mar;9(1):22–46. Available from: http://www.tandfonline.com/doi/abs/10.1080/14702430701811987
36.
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security [Internet]. 2006 Dec;21(6):959–79. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520601046291
37.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations [Internet]. 3rd ed. Ministry of Defence; 2011. Available from: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
38.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations [Internet]. Washington D.C.: Georgetown University Press; 2008. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
39.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
40.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
41.
Katz JI. Deception and Denial in Iraq: The Intelligent Adversary Corollary. International Journal of Intelligence and CounterIntelligence. 2006 Dec;19(4):577–85.
42.
Morrison JNL. British Intelligence Failures in Iraq. Intelligence and National Security. 2011 Aug;26(4):509–20.
43.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
44.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
45.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
46.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
47.
Butler FER, Great Britain. Review of intelligence on weapons of mass destruction [Internet]. Vol. HC. London: The Stationery Office; 2004. Available from: http://webarchive.nationalarchives.gov.uk/20131205100653/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
48.
Pribbenow M l. The man in the snow white cell: limits to interrogation. Studies in intelligence [Internet]. 2004;48(1). Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no1/article06.html
49.
Center for Strategic Intelligence Research (U.S.), United States. Intelligence Science Board, Federation of American Scientists. Educing information: interrogation--science and art : foundations for the future : phase 1 report [Internet]. Washington, DC: Center for Strategic Intelligence Research, National Defense Intelligence College; 2006. Available from: https://fas.org/irp/dni/educing.pdf
50.
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury; 2011.
51.
Jones K. From the horse’s mouth: POWs as sources for air ministry intelligence during the battle of Britain. Intelligence and National Security [Internet]. 2000 Dec;15(4):60–80. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520008432628
52.
Royden BG. Tolkachev, A Worthy Successor to Penkovsky. Studies in intelligence [Internet]. 2003;47(3). Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article02.html
53.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
54.
Butler LR. Review of Intelligence on Weapons of Mass Destruction [Internet]. 2004. Available from: https://webarchive.nationalarchives.gov.uk/20131205114730/http://www.archive2.official-documents.co.uk/document/deps/hc/hc898/898.pdf
55.
Davies PHJ. A Critical Look at Britain’s Spy Machinery — Central Intelligence Agency [Internet]. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Spy_Machinery_4.htm
56.
Davies PHJ, Gustafson K. Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security. 2017 Jul 10;1–15.
57.
Aid MM. All glory is fleeting: SIGINT and the fight against international terrorism. Intelligence and National Security [Internet]. 2003 Dec;18(4):72–120. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520310001688880
58.
Diffie W, Landau S. Brave new world of wiretapping. Scientific American [Internet]. 1AD;299(3). Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=33624995&site=ehost-live&scope=site&custid=s1123049
59.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
60.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
61.
Day DA. Ferrets above: American signals intelligence satellites during the 1960s. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Sep;17(3):449–67. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600490446835
62.
Aid MM, Wiebes C. INS Special Issue on Secrets of Signals Intelligence During the Cold War and Beyond. Intelligence and National Security [Internet]. 2001 Mar;16(1). Available from: http://www.tandfonline.com/toc/fint20/16/1?nav=tocList
63.
Aldrich RJ. GCHQ: the uncensored story of Britain’s most secret intelligence agency. London: Harper Press; 2010.
64.
Alvarez D. INS Special Issue on Allied and Axis Signals Intelligence in World War II. Intelligence and National Security [Internet]. 1999 Mar;14(1). Available from: http://www.tandfonline.com/toc/fint20/14/1?nav=tocList
65.
Alvarez D. American signals intelligence and the Cuban missile crisis. Intelligence and National Security [Internet]. 2000 Mar;15(1):169–76. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520008432591
66.
Bamford J. Body of secrets: how America’s NSA and Britain’s GCHQ eavesdrop on the world. London: Century; 2001.
67.
Clayton A. The enemy is listening. Vol. Espionage intelligence library. New York: Ballantine; 1982.
68.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
69.
Richelson J, Ball D. The ties that bind: intelligence cooperation between the UKUSA countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand. Boston: Allen & Unwin; 1985.
70.
Rudner M. Canada’s communications security establishment, signals intelligence and counter-terrorism. Intelligence and National Security [Internet]. 2007 Aug;22(4):473–90. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520701640449
71.
Smith M. New cloak, old dagger: how Britain’s spies came in from the cold. In: New cloak, old dagger: how Britain’s spies came in from the cold [Internet]. London: V. Gollancz; 1996. p. 165–77. Available from: https://contentstore.cla.co.uk/secure/link?id=0b176b23-ad02-e811-80cd-005056af4099
72.
West N. GCHQ: the secret wireless war, 1900-86. London: Weidenfeld and Nicolson; 1986.
73.
Anderson D. A Question of Trust: Report of the Investigatory Powers Review [Internet]. 2015. Available from: https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Web-Accessible1.pdf
74.
Intelligence and Security Committee. Privacy and Security: A modern and transparent legal framework [Internet]. 2015. Available from: https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20150312_ISC_P%2BS%2BRpt%28web%29.pdf?attachauth=ANoY7coqammF4tVkLQIO-N0UEZQ1tcfnvoaObjJ-AoDY-tVBMv2I6jKUw2ivWZCUZF9YUTjh8rlbkF-jd_wq9FP8390hcnLT-mbPCIipRcMRoMuluz-319BeI9lVZZDWMuE6BrJ7cDAoBalTjJnnnGKB_Rw4mZMJgVRCJ8irbNTjOEciM5Ph5Osa6RUznM19yZI42LuyVu8qWsJURGC9F9G1n05y-621vRF-vkhXXY2pdhpM7EQzX-WKMsszUqLYKwrMBhtif99y&attredirects=0
75.
A Democratic Licence to Operate: Report of the Independent Surveillance Review [Internet]. 2015. Available from: https://rusi.org/publication/whitehall-reports/democratic-licence-operate-report-independent-surveillance-review
76.
The KGB, the Computer, and Me (Complete) - YouTube [Internet]. Available from: https://www.youtube.com/watch?v=EcKxaq1FTac
77.
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books; 1991.
78.
Investigatory Powers Act - GOV.UK [Internet]. 2015. Available from: https://www.gov.uk/government/collections/investigatory-powers-bill
79.
Brugioni DA. The art and science of photoreconnaissance. Scientific American [Internet]. 1996 Mar;56–63. Available from: https://contentstore.cla.co.uk/secure/link?id=de9330fc-bb23-e911-80cd-005056af4099
80.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
81.
Johnson-Freese J, Gatling L. Security implications of Japan’s Information Gathering Satellite (IGS) system. Intelligence and National Security [Internet]. 2004 Sep;19(3):538–52. Available from: http://www.tandfonline.com/doi/abs/10.1080/0268452042000316278
82.
Oxlee GJ. Aerospace reconnaissance. London: Brassey’s; 1997.
83.
Berkowitz B. The National Reconnaissance Office at 50 Years: A Brief History [Internet]. 2011. Available from: https://apps.dtic.mil/dtic/tr/fulltext/u2/a550140.pdf
84.
David JE. How much detail do we need to see? High and very high resolution photography, GAMBIT, and the Manned Orbiting Laboratory. Intelligence and National Security. 2017 Sep 19;32(6):768–81.
85.
Finnegan TJ, Center for Strategic Intelligence Research (U.S.). Shooting the front: allied aerial reconnaissance and photographic interpretation on the Western Front--World War I. Washington, D.C.]: [For sale by the Supt. of Docs., U.S. G.P.O.; 2006.
86.
Radcliffe WW. Origins and Current State of Japan’s Reconnaissance Satellite Program (U). Studies in intelligence [Internet]. 2010;54(3). Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-54-no.-3/origins-and-current-state-of-japan2019s.html
87.
Remote Sensing and Photogrammetry Society [Internet]. Available from: http://www.rspsoc.org/
88.
Short N. The Remote Sensing Tutorial [Internet]. Federation Of American Scientists; Available from: https://web.archive.org/web/20160326161839/http://fas.org/irp/imint/docs/rst/Front/tofc.html
89.
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 1 (via the Wayback Machine) [Internet]. Available from: https://web.archive.org/web/20180131220426/https://lta.cr.usgs.gov/declass_1
90.
• US Geological Survey Earth Resource Observation and Science Center. Declassified Satellite Imagery - 2 (via the Wayback Machine) [Internet]. Available from: https://web.archive.org/web/20170710082642/https://lta.cr.usgs.gov/declass_2
91.
Zorn EL. Israel’s quest for satellite intelligence. Studies Archive Indexes [Internet]. 2001;44(5). Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol44no5/html/v44i5a04p.htm
92.
Davies PHJ. Imagery in the UK: Britain’s troubled imagery intelligence architecture. Review of International Studies [Internet]. 2009;35(4). Available from: https://www.jstor.org/stable/40588096?pq-origsite=summon&seq=1#metadata_info_tab_contents
93.
Davies PHJ. Information warfare and the future of the spy. Information, Communication & Society [Internet]. 1999 Jan;2(2):115–33. Available from: http://www.tandfonline.com/doi/abs/10.1080/136911899359664
94.
Omand D, Bartlett J, Miller C. Introducing social media intelligence (SOCMINT). Intelligence and National Security [Internet]. 2012 Dec;27(6):801–23. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684527.2012.716965
95.
Richards PG, Won-Young K. Monitoring for nuclear explosions. Scientific American [Internet]. 2009;300:70–7. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=36394529&site=ehost-live&scope=site&custid=s1123049
96.
Richelson JT. MASINT: the new kid in town. International Journal of Intelligence and CounterIntelligence [Internet]. 2001 Apr;14(2):149–92. Available from: http://www.tandfonline.com/doi/abs/10.1080/088506001300063136
97.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
98.
Denning DER. Information warfare and security. New York, N.Y.: ACM Press; 1999.
99.
Mitnick KD, Simon WL. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers [Internet]. Indianapolis, IN: Wiley; 2005. Available from: http://lib.myilibrary.com/browse/open.asp?id=25257&entityid=https://idp.brunel.ac.uk/entity
100.
Omand D, Bartlett J, Miller C. #Intelligence [Internet]. London: Demos; 2012. Available from: https://www.google.com/url?q=http://www.demos.co.uk/files/_Intelligence_-_web.pdf%3F1335197327&sa=U&ved=0ahUKEwjaqYfsusjPAhVrK8AKHZVEDLIQFggFMAA&client=internal-uds-cse&usg=AFQjCNHJ0dsS-5qOg2d2ZoGZhlvy6XbZ-A
101.
Shoham D, Jacobsen SM. Technical intelligence in retrospect: the 2001 anthrax letters powder. International Journal of Intelligence and CounterIntelligence [Internet]. 2007 Dec;20(1):79–105. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600600889027
102.
Stoll C. The cuckoo’s egg: tracking a spy through the maze of computer espionage. London: Pan Books; 1991.
103.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations [Internet]. 3rd ed. Ministry of Defence; 2011. Available from: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
104.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
105.
Johnson LK. Spies. Foreign Policy [Internet]. (120):18–26. Available from: http://www.jstor.org/stable/1149708
106.
Mercado SC. Sailing the sea of OSINT in the information age: a venerable source in a new era [Internet]. Vol. 48, Studies in intelligence. Central Intelligence Agency; 2004. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html
107.
Olcott A. Open source intelligence in a networked world [Internet]. Vol. Continuum intelligence studies. London: Continuum; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=360727&entityid=https://idp.brunel.ac.uk/entity
108.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
109.
Stottlemyre SA. HUMINT, OSINT, or something new? Defining crowdsourced intelligence. International Journal of Intelligence and CounterIntelligence [Internet]. 2015 Jul 3;28(3):578–89. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850607.2015.992760
110.
bellingcat - MH17 - The Open Source Evidence - bellingcat [Internet]. Available from: https://www.bellingcat.com/news/uk-and-europe/2015/10/08/mh17-the-open-source-evidence/
111.
Davis J. The Kent-Kendall Debate of 1949 [Internet]. Vol. 35, Studies Archive Indexes. Central Intelligence Agency; 1991. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol35no2/html/v35i2a06p_0001.htm
112.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
113.
Lowenthal MM, Marks RA. Intelligence analysis: is it as good as it gets? International Journal of Intelligence and CounterIntelligence [Internet]. 2015 Oct 2;28(4):662–5. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850607.2015.1051410
114.
‘The Typical CIA Analyst and What He Does’, NFAC paper to House Permanent Select Committee on Intelligence. 1978.
115.
The Tradecraft of Analysis. US Intelligence at the Crossroads. 1995.
116.
Watanabe F. Fifteen axioms for intelligence analysts: how to succeed in the DI. Studies in Intelligence [Internet]. 1997;45–7. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a06p.pdf
117.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world [Internet]. London: John Murray; 2002. p. 290–303. Available from: https://contentstore.cla.co.uk/secure/link?id=dcf15b7f-202a-e911-80cd-005056af4099
118.
Marrin S. At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and CounterIntelligence. 2007 May 21;20(3):401–14.
119.
Clark RM. Intelligence analysis : a target-centric approach. Fifth edition. Thousand Oaks: CQ Press; 2016.
120.
Cradock P. Know your enemy: how the Joint Intelligence Committee saw the world. In: Know your enemy: how the Joint Intelligence Committee saw the world [Internet]. London: John Murray; 2002. p. 281–9. Available from: https://contentstore.cla.co.uk/secure/link?id=6ce51d31-bb2a-e911-80cd-005056af4099
121.
Davis J. Improving CIA analytic performance: DI analytic priorities [Internet]. Vol. 1, Kent Center Occasional Papers. Central Intelligence Agency; 2002. Available from: https://www.cia.gov/library/kent-center-occasional-papers/vol1no3.htm
122.
George RZ, Bruce JB, Georgetown University. Center for Peace and Security Studies. Analyzing intelligence: origins, obstacles, and innovations [Internet]. Washington D.C.: Georgetown University Press; 2008. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=228437&site=ehost-live&scope=site
123.
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: Analysis and Estimates , Vol. 2. Lexington, MA.; 1986.
124.
Marrin S. Improving intelligence analysis: bridging the gap between scholarship and practice. Vol. Studies in intelligence series. Abingdon: Routledge; 2011.
125.
Rovner J. Fixing the facts: national security and the politics of intelligence [Internet]. Vol. Cornell studies in security affairs. Ithaca: Cornell University Press; 2015. Available from: http://lib.myilibrary.com/browse/open.asp?id=768211&entityid=https://idp.brunel.ac.uk/entity
126.
Muller DG. Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence. 2008 Jan 2;21(1):1–12.
127.
Ministry of Defence : Development, Concepts and Doctrine Centre. Understanding and Intelligence Support to Joint Operations [Internet]. 3rd ed. Ministry of Defence; 2011. Available from: http://www.mod.uk/NR/rdonlyres/4169B1A1-179C-459D-B7AD-DABB63EA069E/0/20110830JDP2003rdEDweb.pdf
128.
Grabo CM. Anticipating surprise [Internet]. Defence Technical Information Centre; 2002. Available from: http://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf
129.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
130.
Hughes-Wilson J. Military intelligence blunders and cover-ups [Internet]. Rev. and updated ed. London: Robinson; 2004. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=699443&site=ehost-live&scope=site
131.
Wirtz JJ. Indications and warning in an age of uncertainty. International Journal of Intelligence and CounterIntelligence [Internet]. 2013 Sep;26(3):550–62. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850607.2013.780558
132.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. 2nd ed. Los Angeles: SAGE; 2015. p. 133–5. Available from: https://contentstore.cla.co.uk/secure/link?id=c7e47fa3-6e33-e911-80cd-005056af4099
133.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. 2nd ed. Los Angeles: SAGE; 2015. p. 149–56. Available from: https://contentstore.cla.co.uk/secure/link?id=2189e06b-6f33-e911-80cd-005056af4099
134.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. Second Edition. Los Angeles: SAGE; 2015. p. 133–40. Available from: https://contentstore.cla.co.uk/secure/link?id=bb7350c3-7033-e911-80cd-005056af4099
135.
Heuer RJ, Pherson RH. Structured analytic techniques for intelligence analysis. In: Structured analytic techniques for intelligence analysis [Internet]. Second Edition. Los Angeles: SAGE; 2015. p. 119–21. Available from: https://contentstore.cla.co.uk/secure/link?id=dd9ab219-7033-e911-80cd-005056af4099
136.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
137.
Davies PHJ. From special operations to special political action: The ‘rump SOE’ and SIS post‐war covert action capability 1945–1977. Intelligence and National Security [Internet]. 2000 Sep;15(3):55–76. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520008432617
138.
Johnson LK. Covert action and accountability: decision-making for America’s secret foreign policy. International Studies Quarterly [Internet]. 1989 Mar;33(1). Available from: http://www.jstor.org/stable/2600495?pq-origsite=summon&seq=1#page_scan_tab_contents
139.
Hicks DB. Lifting the arms embargo on the Bosnian Muslims: secret diplomacy or covert action? International Journal of Intelligence and CounterIntelligence [Internet]. 2005 Mar 2;18(2):246–61. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600590911954
140.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
141.
Daugherty WJ. Executive secrets: covert action and the presidency. Pbk ed. Lexington: The University Press of Kentucky; 2006.
142.
Fraser A. Architecture of a broken dream: The CIA and Guatemala, 1952–54. Intelligence and National Security [Internet]. 2005 Sep;20(3):486–508. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520500269010
143.
Gustafson K. Hostile intent: U.S. covert operations in Chile, 1964-1974. 1st ed. Poole: Potomac; 2007.
144.
Holland M. Operation PBHISTORY: the aftermath of SUCCESS. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Jan;17(2):300–32. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600490274935
145.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
146.
Schlesinger SC, Kinzer S, Coatsworth JH. Bitter fruit: the story of the American coup in Guatemala. Rev. ed. Vol. David Rockefeller Center series on Latin American studies. Cambridge, Mass: Harvard University Press; 2005.
147.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site
148.
Steiner JE. Restoring the red line between intelligence and policy on covert action’. International Journal of Intelligence and CounterIntelligence [Internet]. 2006 Jan;19(1):156–65. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600500332532
149.
Treverton G. Covert action: the CIA and the limits of American intervention in the postwar world. London: Tauris; 1988.
150.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
151.
Kramer LA, Heuer RJ. America’s increased vulnerability to insider espionage. International Journal of Intelligence and CounterIntelligence [Internet]. 2007 Dec;20(1):50–64. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600600888698
152.
Northcott C. The role, organization, and methods of MI5. International Journal of Intelligence and CounterIntelligence [Internet]. 2007 May 21;20(3):453–79. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600701249758
153.
Olso JM. The Ten Commandments of counterintelligence: a never-ending necessity. Studies in Intelligence [Internet]. (fall_winter_2001). Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/fall_winter_2001/article08.html
154.
Final Report of the Attorney General’s Review Team on the Handling of the Los Alamos National Laboratory Investigation - The Bellows Report.
155.
Brook-Shepherd G. The storm birds: Soviet postwar defectors. London: Weidenfield and Nicolson; 1988.
156.
Glees A. The secrets of the service: a story of Soviet subversion of western intelligence. NewYork: Carroll and Graf; 1987.
157.
Godson R, National Strategy Information Center, Consortium for the Study of Intelligence. Intelligence requirements for the 1980’s: domestic intelligence, Vol. 6]. Lexington, MA.; 1986.
158.
Hinsley FH, Simkins CAG. British intelligence in the Second World War: Vol. 4: Security and counter-intelligence. Vol. History of the Second World War. London: H.M.S.O.;
159.
Hunter RW. Spy hunter: inside the FBI investigation of the Walker espionage case. Annapolis, Md: Naval Institute Press; 1999.
160.
Masterman JC. The double-cross system in the war of 1939 to 1945. New Haven: Yale University Press; 1972.
161.
Wise D. The spy who got away: the inside story of Edward Lee Howard, the CIA agent who betrayed his country and escaped to Moscow. New York: Random House; 1988.
162.
Davies PHJ. The missing dimension’s missing dimension. Public Policy and Administration [Internet]. 2010 Jan 1;25(1):5–9. Available from: http://journals.sagepub.com/doi/abs/10.1177/0952076709347071
163.
Gill P, Marrin S, Phythian M. Intelligence theory: key questions and debates [Internet]. London: Routledge; 2009. Available from: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=355874
164.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
165.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
166.
Davies PHJ. MI6 and the machinery of spying [Internet]. London: Frank Cass; 2003. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
167.
Orton D, Callahan JL. Important ‘folk theories’ in intelligence reorganization. International Journal of Intelligence and CounterIntelligence [Internet]. 1995;8(4):411–29. Available from: https://contentstore.cla.co.uk/secure/link?id=ad9950dd-ec86-e611-80c6-005056af4099
168.
Riebling M. Wedge: from Pearl Harbor to 9/11 : how the secret war between the FBI and CIA has endangered national security. 1st Touchstone ed., Updated with a new epilogue. New York: Simon & Schuster; 2002.
169.
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States [Internet]. New York: Norton; 2004. Available from: https://web.archive.org/web/20060419012159/http://www.gpoaccess.gov/911/pdf/fullreport.pdf
170.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
171.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
172.
Pringle RW. Modernization of terror: the transformation of Stalin’s NKVD, 1934–1941. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Jan;17(1):113–23. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850600490252687
173.
Thomas ST. The CIA’s bureaucratic dimensions. International Journal of Intelligence and CounterIntelligence [Internet]. 1999 Dec;12(4):399–413. Available from: http://www.tandfonline.com/doi/abs/10.1080/088506099304972
174.
Weber M, Gerth H, Mills CW. From Max Weber: essays in sociology [Internet]. Vol. Routledge classics in sociology. London: Routledge; 2009. Available from: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780203452196
175.
Blau PM. The dynamics of bureaucracy: a study of interpersonal relations in two government agencies. 2nd ed. Chicago: University of Chicago Press; 1963.
176.
Dandeker C. Surveillance, power and modernity: bureaucracy and discipline from 1700 to the present day. Cambridge: Polity; 1990.
177.
Morgan G. Images of organization. Updated ed. London: SAGE; 2006.
178.
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers. 2nd ed., completely revised and updated. Vol. The Jossey-Bass business&management series. San Francisco, CA: Jossey-Bass; 2003.
179.
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press; 1991.
180.
Weber M, Roth G, Wittich C. Economy and society: an outline of interpretive sociology, Vol.1. Berkeley (etc): University of California Press; 1978.
181.
Weber M, Roth G, Wittich C. Economy and society: an outline of interpretive sociology, Vol.2. Berkeley (etc): University of California Press; 1978.
182.
Pugh DS. Organization theory: selected classic readings. 5th ed. London: Penguin; 2007.
183.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
184.
Herman M. Intelligence power in peace and war [Internet]. Cambridge: Royal Institute of International Affairs; 1996. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=616954&site=ehost-live&scope=site
185.
Burns T, Stalker GM. The management of innovation. Rev. ed. Oxford: Oxford University Press; 1994.
186.
Cringely RX. Accidental empires: how the boys of Silicon Valley make their millions, battle foreign competition, and still can’t get a date. London: Viking; 1992.
187.
Knight K. Matrix management. In: Matrix management [Internet]. Farnborough, Hants: Gower Press; 1977. p. 1–12. Available from: https://contentstore.cla.co.uk/secure/link?id=b91089c0-172a-e911-80cd-005056af4099
188.
Lawrence, Paul R., Lorsch, Jay W., Harvard University. Organization and environment: managing differentiation and integration. Boston, Mass: Division of Research, Graduate School of Business Administration, Harvard University; 1967.
189.
Lorsch JW, Allen SA. Managing diversity and interdependence: an organizational study of multidivisional firms. In: Managing diversity and interdependence: an organizational study of multidivisional firms [Internet]. Boston: Harvard University, Graduate School of Business Administration, Division of Research; 1973. p. 53–79. Available from: https://contentstore.cla.co.uk/secure/link?id=cad0d107-fd0f-e811-80cd-005056af4099
190.
Parker GM. Cross-functional teams: working with allies, enemies, and other strangers [Internet]. 2nd ed., completely revised and updated. Vol. The Jossey-Bass business&management series. San Francisco, CA: Jossey-Bass; 2003. Available from: http://lib.myilibrary.com/browse/open.asp?id=35134&entityid=https://idp.brunel.ac.uk/entity
191.
Pitt D, Smith BC. Government departments: an organizational perspective. Vol. Routledge direct editions. London: Routledge and Kegan Paul; 1981.
192.
Allison GT. Conceptual models and the Cuban Missile Crisis. American Political Science Review. 1969 Sep;63(03):689–718.
193.
Cohen MD, March JG, Olsen JP. A garbage can model of organizational choice. Administrative Science Quarterly. 1972;17(1):1–25.
194.
Davies PHJ. Intelligence and the machinery of government: conceptualizing the intelligence community. Public Policy and Administration [Internet]. 2010 Jan 1;25(1):29–46. Available from: http://journals.sagepub.com/doi/pdf/10.1177/0952076709347073
195.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
196.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
197.
Kaufman SJ. Organizational politics and change in Soviet military policy. World politics. 1AD;46(3):355–82.
198.
Smith MJ. Intelligence and the core Executive. Public Policy and Administration [Internet]. 2010 Jan 1;25(1):11–28. Available from: http://cm7ly9cu9w.search.serialssolutions.com/ctx?url_ver=Z39.88-2004&rft.jtitle=Public+Policy+and+Administration&rft.atitle=Intelligence+and+the+core+Executive&rft_id=info%3Adoi%2F10.1177%2F0952076709347072&rft.volume=25&rft.spage=11&rft.issn=0952-0767&rft.epage=28&rft.issue=1&rft.date=2010-01-01&rft.aufirst=M.+J.&rft.aulast=Smith
199.
Zegart AB. An empirical analysis of failed intelligence reforms before September 11. Political Science Quarterly [Internet]. 2006;121(1):33–60. Available from: http://www.jstor.org/stable/20202644?pq-origsite=summon&seq=1#page_scan_tab_contents
200.
Allison GT. Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown and Co; 1971.
201.
Cyert RM, March JG. A behavioral theory of the firm. 2nd ed. Cambridge, Mass: Blackwell; 1992.
202.
Davies PHJ. MI6 and the machinery of spying [Internet]. Vol. Cass series--studies in intelligence. London: Frank Cass; 2003. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&defaultdb=nlebk&AN=110653&site=ehost-live&scope=site
203.
Hannan MT, Freeman J. The population ecology of organizations. American Journal of Sociology [Internet]. 1977;82(5):929–64. Available from: http://www.jstor.org/stable/2777807?Search=yes&resultItemClick=true&searchText=Hannah,&searchText=Michael&searchText=T&searchText=ecology&searchUri=%2Faction%2FdoBasicSearch%3FQuery%3DHannah%252C%2BMichael%2BT%2Becology%26amp%3Bfilter%3Djid%253A10.2307%252Fj100067&seq=1#page_scan_tab_contents
204.
Mescall PN. A creature of compromise: the establishment of the DIA. International Journal of Intelligence and CounterIntelligence [Internet]. 1994 Sep;7(3):251–74. Available from: https://contentstore.cla.co.uk/secure/link?id=36b4c81a-ec1f-e911-80cd-005056af4099
205.
Morgan G. Images of organization. Updated ed. London: SAGE; 2006.
206.
Powell WW, DiMaggio PJ. The new institutionalism in organizational analysis. Chicago: University of Chicago Press; 1991.
207.
Rhodes RAW (Roderick AW, Dunleavy P. Prime Minister, cabinet and core executive. Basingstoke: Macillan; 1995.
208.
Smith MJ. The core executive in Britain. Basingstoke: Macmillan; 1999.
209.
Al Masashi I. Iraq’s security and intelligence network: a guide and analysis [Internet]. Vol. 6, Middle East Review of International Affairs. Herzliya, Israel: Rubin Center for Research in International Affairs; 2002. Available from: https://web.archive.org/web/20170815104820/http://www.rubincenter.org/2002/09/al-marashi-2002-09-01/
210.
Dziak JJ. Chekisty: a history of the KGB. In: Chekisty: a history of the KGB [Internet]. Lexington, Mass: Lexington Books; 1988. p. 1–17. Available from: https://contentstore.cla.co.uk/secure/link?id=2d8a02df-a902-e811-80cd-005056af4099
211.
Shukman H. Agents for change: intelligence services in the 21st century. In: Agents for change: intelligence services in the 21st century [Internet]. London: St Ermin’s; 2000. p. 16–22. Available from: https://contentstore.cla.co.uk/secure/link?id=ccca3611-cf2a-e911-80cd-005056af4099
212.
Chapman B. Police state. In: Police state [Internet]. London: Macmillan; 1971. p. 106–15. Available from: https://contentstore.cla.co.uk/secure/link?id=655cf0fc-142a-e911-80cd-005056af4099
213.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa. In: PSI handbook of global security and intelligence: national approaches, Volume 2: Europe, the Middle East, and South Africa [Internet]. Westport, Conn: Praeger Security International; 2008. p. 479–97. Available from: https://contentstore.cla.co.uk/secure/link?id=9b3d84b1-2e2a-e911-80cd-005056af4099
214.
Andrew CM, Gordievsky O. KGB: the inside story of its foreign operations from Lenin to Gorbachev. In: KGB: the inside story of its foreign operations from Lenin to Gorbachev. London: Hodder & Stoughton; 1990. p. 1–42.
215.
Renz B. Putin’s militocracy? An alternative interpretation of Siloviki in contemporary Russian politics. Europe-Asia Studies [Internet]. 2006;58(6):903–24. Available from: http://www.jstor.org/stable/20451267?pq-origsite=summon&seq=1#page_scan_tab_contents
216.
Raeff M. The well-ordered police state and the development of modernity in Seventeenth- and Eighteenth-Century Europe: an attempt at a comparative approach. The American Historical Review [Internet]. 1975 Dec;80(5). Available from: http://www.jstor.org/stable/1852058
217.
Rathmell A. Syria’s intelligence services: origins and development. Journal of Conflict Studies [Internet]. 1996;16(2). Available from: https://journals.lib.unb.ca/index.php/jcs/article/view/11815/12636
218.
Davies PHJ. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs [Internet]. 2004;17(3):495–520. Available from: http://www.tandfonline.com/doi/full/10.1080/0955757042000298188
219.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
220.
Duyvesteyn I. Intelligence and strategic culture: some observations. Intelligence and National Security [Internet]. 2011 Aug;26(4):521–30. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684527.2011.580605
221.
Gray CS. Strategic culture as context: the first generation of theory strikes back. Review of International Studies [Internet]. 1999;25(1):49–69. Available from: http://www.jstor.org/stable/20097575?pq-origsite=summon&seq=1#page_scan_tab_contents
222.
Pugh DS. Organization theory: selected classic readings. 5th ed. London: Penguin; 2007.
223.
Morgan G. Images of organization. In: Images of organization [Internet]. Updated ed. London: SAGE; 2006. p. 115–47. Available from: https://contentstore.cla.co.uk/secure/link?id=ddd37c6f-e9f9-e711-80cd-005056af4099
224.
Turner MA. A distinctive U.S. intelligence identity. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Jan;17(1):42–61. Available from: http://www.tandfonline.com/doi/full/10.1080/08850600490252650?scroll=top&needAccess=true
225.
Westerfield B. American exceptionalism and American intelligence. Freedom review [Internet]. 28(2). Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9711036030&site=ehost-live&scope=site&custid=s1123049
226.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. In: Secret intelligence: a reader [Internet]. London: Routledge; 2009. p. 140–53. Available from: https://contentstore.cla.co.uk/secure/link?id=3f7061de-282a-e911-80cd-005056af4099
227.
Westerfield HB. America and the world of intelligence liaison. Intelligence and National Security. 1996 Jul;11(3):523–60.
228.
Aldrich RJ. Dangerous Liaisons: Post September 11 Intelligence Alliances. Harvard International Review [Internet]. 2002;24(Issue 3):50–4. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=7238071&site=ehost-live&scope=site&custid=s1123049
229.
Richelson JT. The calculus of intelligence cooperation. International Journal of Intelligence and CounterIntelligence [Internet]. 1990 Jan;4(3):307–23. Available from: https://contentstore.cla.co.uk/secure/link?id=51deb1bb-2c1b-e911-80cd-005056af4099
230.
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 2006 May;19(2):195–217.
231.
James Igoe Walsh. Defection and Hierarchy in International Intelligence Sharing. Journal of Public Policy [Internet]. 2007;27(2). Available from: https://www.jstor.org/stable/40072019?pq-origsite=summon&seq=1#metadata_info_tab_contents
232.
Lander SS. International intelligence cooperation: an inside perspective. Cambridge Review of International Affairs. 2004 Oct;17(3):481–93.
233.
Champion B. A review of selected cases of industrial espionage and economic spying, 1568–1945. Intelligence and National Security. 1998 Jun;13(2):123–43.
234.
Clough C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):601–13.
235.
Hulnick AS. Intelligence cooperation in the post‐cold war era: A new game plan? International Journal of Intelligence and CounterIntelligence [Internet]. 1991 Dec;5(4):455–65. Available from: https://contentstore.cla.co.uk/secure/link?id=862e778e-f01f-e911-80cd-005056af4099
236.
Lefebvre S. The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2003 Oct;16(4):527–42.
237.
Müller-Wille B. The Effect of International Terrorism on EU Intelligence Co-operation. JCMS: Journal of Common Market Studies. 2007 Dec 10;46(1):49–73.
238.
RUDNER M. Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(2):193–230.
239.
Walsh PF, Miller S. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security. 2016 Apr 15;31(3):345–68.
240.
Warner M. Transformation and Intelligence Liaison. SAIS Review [Internet]. 2004;24(1):77–89. Available from: https://contentstore.cla.co.uk/secure/link?id=14da0bf9-ef1f-e911-80cd-005056af4099
241.
Aldrich RJ. US–European Intelligence Co-Operation on Counter-Terrorism: Low Politics and Compulsion. The British Journal of Politics and International Relations. 2009 Feb;11(1):122–39.
242.
CLOUGH C. Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):601–13.
243.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
244.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
245.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
246.
Hastedt GP. Towards the comparative study of intelligence. Journal of Conflict Studies [Internet]. 1991;11(3). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14966
247.
O’Connell KM. Thinking about intelligence comparatively. Brown Journal of World Affairs [Internet]. 2005;11(1). Available from: http://bjwa.brown.edu/11-1/thinking-about-intelligence-comparatively/
248.
Crosston M. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and CounterIntelligence. 2016 Jan 2;29(1):110–31.
249.
Godson R. Comparing foreign intelligence: the U.S., the USSR, the U.K., & the Third World. In: Comparing foreign intelligence: the US, the USSR, the UK, & the Third World [Internet]. London: Pergamon-Brassey’s International Defense Publishers; 1988. p. 115–55. Available from: https://contentstore.cla.co.uk/secure/link?id=1b4ed62b-052a-e911-80cd-005056af4099
250.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 1: Evolution of the U.S. intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
251.
Davies PHJ. Intelligence and government in Britain and the United States: a comparative perspective, Volume 2: Evolution of the UK intelligence community [Internet]. Vol. Praeger security international. Santa Barbara, Calif: Praeger; 2012. Available from: http://lib.myilibrary.com/browse/open.asp?id=601894&entityid=https://idp.brunel.ac.uk/entity
252.
Gill P. Policing politics: security intelligence and the liberal democratic state. Vol. Cass series--studies in intelligence. London: F. Cass; 1994.
253.
Herman M. Intelligence services in the information age: theory and practice [Internet]. Vol. Cass series--studies in intelligence. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
254.
Skocpol T. States and social revolutions: a comparative analysis of France, Russia and China. In: States and social revolutions: a comparative analysis of France, Russia and China [Internet]. Cambridge (etc.): Cambridge University Press; 1979. p. 3–43. Available from: https://contentstore.cla.co.uk/secure/link?id=08a3957b-cd2a-e911-80cd-005056af4099
255.
Müller-Wille B. EU Intelligence Co-operation. A Critical Analysis. Contemporary Security Policy. 2002 Aug;23(2):61–86.
256.
Eftimiades N. China’s Ministry of State Security: coming of age in the international arena. Maryland Series in Contemporary Asian Studies [Internet]. 1992;(2). Available from: http://digitalcommons.law.umaryland.edu/mscas/vol1992/iss2/1
257.
Inkster N. Chinese intelligence in the cyber age. Survival [Internet]. 2013 Mar;55(1):45–66. Available from: http://www.tandfonline.com/doi/full/10.1080/00396338.2013.767405?scroll=top&needAccess=true
258.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
259.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: national approaches, Volume  1: The Americas and Asia. Westport, Conn: Praeger Security International; 2008.
260.
Shaffer R. Significant Distrust and Drastic Cuts: The Indian Government’s Uneasy Relationship with Intelligence. International Journal of Intelligence and CounterIntelligence. 2017 Jul 3;30(3):522–31.
261.
India. Kargil Review Committee. From surprise to reckoning. New Delhi: Sage Publications; 2000.
262.
Kingsbury D. PSI handbook of global security and intelligence: Vol. 1: national approaches. In: PSI handbook of global security and intelligence: Vol 1: national approaches [Internet]. Westport, Conn: Praeger Security International; 2008. p. 247–62. Available from: https://contentstore.cla.co.uk/secure/link?id=6da4e860-2617-e811-80cd-005056af4099
263.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
264.
Javedanfar M. PSI handbook of global security and intelligence: Vol. 2: national approaches. In: PSI handbook of global security and intelligence: Vol 2: national approaches [Internet]. Westport, Conn: Praeger Security International; 2008. p. 533–50. Available from: https://contentstore.cla.co.uk/secure/link?id=620b00d9-2317-e811-80cd-005056af4099
265.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
266.
Congressional Research Service. Iran: Internal Politics and U.S. Policy and Options [Internet]. Available from: https://fas.org/sgp/crs/mideast/RL32048.pdf
267.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. Vol. Intelligence and the quest for security. Westport, Conn: Praeger Security International; 2008.
268.
Kobayashi Y. Assessing reform of the Japanese intelligence community. International Journal of Intelligence and CounterIntelligence [Internet]. 2015 Oct 2;28(4):717–33. Available from: http://www.tandfonline.com/doi/full/10.1080/08850607.2015.1051453?scroll=top&needAccess=true
269.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
270.
Farson AS, Praeger Security International. PSI handbook of global security and intelligence: Vol. 1: national approaches. Vol. Intelligence and the quest for security. Westport, Conn: Praeger Security International; 2008.
271.
Davies PHJ, Gustafson K. Intelligence elsewhere: spies and espionage outside the anglosphere [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=575822&site=ehost-live&scope=site&custid=s1123049
272.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law [Internet]. 15th ed. Harlow: Pearson Longman; 2011. p. 552–77. Available from: https://contentstore.cla.co.uk/secure/link?id=0f477a47-2d00-e811-80cd-005056af4099
273.
Bradley AW, Ewing KD. Constitutional and administrative law. In: Constitutional and administrative law [Internet]. 15th ed. Harlow: Pearson Longman; 2011. p. 476–500. Available from: https://contentstore.cla.co.uk/secure/link?id=652bd127-2b00-e811-80cd-005056af4099
274.
Goold B. Liberty and others v The United Kingdom: a new chance for another missed opportunity. Public Law [Internet]. 2009;(January):5–14. Available from: http://login.westlaw.co.uk/maf/wluk/ext/app/document?crumb-action=reset&docguid=I0C3A5710E1F511DD93AEE69B09385F41
275.
Benjamin VO. Interception of internet communications and the right to privacy: an evaluation of some provisions of the Regulation of Investigatory Powers Act against the jurisprudence of the European Court of Human Rights. European Human Rights Law Review [Internet]. 2007;(6):637–48. Available from: https://login.westlaw.co.uk/maf/wluk/app/document?access-method=toc&src=toce&docguid=IC91855519D4D11DCB62EFEF989A9D832&crumb-action=append&context=3
276.
Jones B. The Justice and Security Bill: ‘focused and proportionate’, or a derogation of the right to a fair trial. Westminster Law Review [Internet]. 2012;2(2). Available from: https://web.archive.org/web/20170814150309/http://www.westminsterlawreview.org/Volume2/Issue2/wlr12.php
277.
El Masri v. "the former Yugoslav Republic of Macedonia” [Internet]. European Court of Human Rights; 2012. Available from: http://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0ahUKEwiVn_Tb3eHPAhUhLMAKHbp8DFUQFgg9MAQ&url=http%3A%2F%2Fhudoc.echr.coe.int%2Fapp%2Fconversion%2Fpdf%2F%3Flibrary%3DECHR%26id%3D002-7324%26filename%3D002-7324.pdf%26TID%3Dthkbhnilzk&usg=AFQjCNGrOnih2tRDdRDFRDbCAHAGr2Pf9A
278.
Wadham J. The Intelligence Services Act 1994. The Modern Law Review [Internet]. 1994;57(6):916–27. Available from: http://www.jstor.org/stable/1096888?pq-origsite=summon&seq=1#page_scan_tab_contents
279.
Aldrich RJ. Global intelligence co-operation versus accountability: new facets to an old problem. Intelligence and National Security [Internet]. 2009 Feb;24(1):26–56. Available from: http://www.tandfonline.com/doi/full/10.1080/02684520902756812?scroll=top&needAccess=true
280.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
281.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security [Internet]. 2007 Feb;22(1):14–37. Available from: http://www.tandfonline.com/doi/full/10.1080/02684520701200756?scroll=top&needAccess=true
282.
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security [Internet]. 2006 Oct;21(5):848–83. Available from: http://www.tandfonline.com/doi/full/10.1080/02684520600957787?scroll=top&needAccess=true
283.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
284.
Baldino D. Democratic oversight of intelligence services. Annandale, NSW: Federation Press; 2010.
285.
Born H, Leigh I, Geneva Centre for the Democratic Control of Armed Forces. Making intelligence accountable: legal standards and best practice for oversight of intelligence agencies.
286.
Gill P. Policing politics: security intelligence and the liberal democratic state [Internet]. Vol. Cass series--studies in intelligence. London: F. Cass; 1994. Available from: http://lib.myilibrary.com/browse/open.asp?id=419717&entityid=https://idp.brunel.ac.uk/entity
287.
Gill P. Reasserting control: Recent changes in the oversight of the UK intelligence community. Intelligence and National Security [Internet]. 1996 Apr;11(2):313–31. Available from: https://contentstore.cla.co.uk/secure/link?id=05e70f56-eb86-e611-80c6-005056af4099
288.
Glees A, Davies PHJ, Morrison JNL, Social Affairs Unit. The open side of secrecy: Britain’s Intelligence and Security Committee. In: The open side of secrecy: Britain’s Intelligence and Security Committee [Internet]. London: The Social Affairs Unit; 2006. p. 51–89. Available from: https://contentstore.cla.co.uk/secure/link?id=c106b1ad-1f2a-e911-80cd-005056af4099
289.
Glees A, Davies PHJ, Morrison JNL, Social Affairs Unit. The open side of secrecy: Britain’s Intelligence and Security Committee. London: The Social Affairs Unit; 2006.
290.
U.S. House of Representatives Permanent Select Committee on Intelligence [Internet]. Available from: http://intelligence.house.gov/
291.
The Intelligence and Security Committee of Parliament [Internet]. Available from: http://isc.independent.gov.uk/
292.
Johnson LK. A season of inquiry: the Senate intelligence investigation. Lexington, Ky: University Press of Kentucky; 1985.
293.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&bquery=Handbook+%26quot%3bof%26quot%3b+Intelligence+Studies&type=1&site=ehost-live&scope=site&custid=s1123049
294.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
295.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
296.
Rempel R. Canada’s Parliamentary oversight of security and intelligence. International Journal of Intelligence and CounterIntelligence [Internet]. 2004 Dec;17(4):634–54. Available from: http://www.tandfonline.com/doi/full/10.1080/08850600490496443?scroll=top&needAccess=true
297.
Robertson KG. Accountable intelligence: the British experience’. Conflict Quarterly [Internet]. 1988;8(1). Available from: https://journals.lib.unb.ca/index.php/JCS/article/view/14786/15855
298.
Robertson KG. Recent reform of intelligence in the UK: Democratization or risk management? Intelligence and National Security [Internet]. 1998 Jun;13(2):144–58. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684529808432481
299.
Security Intelligence Review Committee (Canada) [Internet]. Available from: http://www.sirc-csars.gc.ca/index-eng.html
300.
U.S. Senate Select Committee on Intelligence [Internet]. Available from: http://www.intelligence.senate.gov/?
301.
U.S. House of Representatives Permanent Select Committee on Intelligence [Internet]. Available from: https://intelligence.house.gov/
302.
The Intelligence and Security Committee of Parliament [Internet]. Available from: http://isc.independent.gov.uk/
303.
Bar-Joseph U. The professional ethics of intelligence analysis. International Journal of Intelligence and CounterIntelligence [Internet]. 2010 Nov 30;24(1):22–43. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850607.2011.519222
304.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
305.
Omand SD, Phythian M. Ethics and intelligence: a debate. International Journal of Intelligence and CounterIntelligence [Internet]. 2013 Mar;26(1):38–63. Available from: http://www.tandfonline.com/doi/abs/10.1080/08850607.2012.705186
306.
Quinlan M. Just intelligence: prolegomena to an ethical theory. Intelligence and National Security [Internet]. 2007 Feb;22(1):1–13. Available from: http://www.tandfonline.com/doi/abs/10.1080/02684520701200715
307.
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 2017 Jun 7;32(4):479–93.
308.
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 2016 Oct;29(4):760–84.
309.
Herman M. Secret intelligence: a reader. In: Secret intelligence: a reader [Internet]. London: Routledge; 2009. p. 382–94. Available from: https://contentstore.cla.co.uk/secure/link?id=fbf6a0cc-b2fa-e711-80cd-005056af4099
310.
Herman M. Intelligence services in the information age: theory and practice [Internet]. Vol. Cass series--studies in intelligence. London: Frank Cass; 2001. Available from: http://lib.myilibrary.com/browse/open.asp?id=438065&entityid=https://idp.brunel.ac.uk/entity
311.
Olson JM. Fair play: the moral dilemmas of spying. Washington, D.C.: Potomac Books, Inc; 2008.
312.
Perry D. Repugnant philosophy: ethics, espionage and covert action. Journal of conflict studies.
313.
Andrew CM, Aldrich RJ, Wark WK. Secret intelligence: a reader. London: Routledge; 2009.
314.
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005 Oct;18(3):398–434.
315.
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004 Mar;3(1):1–15.
316.
Shulsky AN, Schmitt GJ. Silent warfare: understanding the world of intelligence [Internet]. 3rd ed. Washington, D.C.: Potomac Books, Inc; 2002. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&AN=388560&site=ehost-live&scope=site