Aid, M.M. (2013) ‘Intel wars: the secret history of the fight against terror’, in Intel wars: the secret history of the fight against terror. Paperback edition. New York: Bloomsbury Press, pp. 70–98. Available at: https://contentstore.cla.co.uk/secure/link?id=43b5e833-90f4-e811-80cd-005056af4099.
Aldrich, R.J. (2002) The hidden hand: Britain, America and Cold War Secret Intelligence. Woodstock: The Overlook Press.
Aldrich, R.J. and Cormac, R. (2016) ‘The black door: spies, secret intelligence and British prime ministers’, in The black door: spies, secret intelligence and British prime ministers. London: William Collins, pp. 353–383. Available at: https://contentstore.cla.co.uk/secure/link?id=f589ee27-7b90-e611-80c7-005056af4099.
Andrew, C.M. (2010) ‘The defence of the realm: the authorized history of MI5’, in The defence of the realm: the authorized history of MI5. Updated. London: Penguin, pp. 160–185. Available at: https://contentstore.cla.co.uk/secure/link?id=de5a1959-a14a-e611-80bd-0cc47a6bddeb.
Andrew, C.M. and Mitrokhin, V. (2000) ‘The Mitrokhin archive: the KGB in Europe and the West’, in The Mitrokhin archive: the KGB in Europe and the West. London: Penguin Books, pp. 73–88. Available at: https://contentstore.cla.co.uk/secure/link?id=a1e41e21-feee-e811-80cd-005056af4099.
Arbel, D., Edelist, R., and ProQuest (Firm) (2003) Western intelligence and the collapse of the Soviet Union, 1980-1990: ten years that did not shake the world. London: Frank Cass. Available at: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=214543.
Axworthy, M. (2014) Revolutionary Iran: a history of the Islamic Republic. Updated [edition]. London: Penguin Books.
Betts, R.K. (2007a) Enemies of intelligence: knowledge and power in American national security. New York: Columbia University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=287204&entityid=https://idp.brunel.ac.uk/entity.
Betts, R.K. (2007b) Enemies of intelligence: knowledge and power in American national security. New York: Columbia University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=287204&entityid=https://idp.brunel.ac.uk/entity.
Bradley, J. and Cowley, R. (2002) What if? 2: eminent historians imagine what might have been : essays. New York: Berkley.
Budiansky, S. (2000) Battle of wits: the complete story of codebreaking in World War II. New York: Free Press.
Bukharin, O. (2004a) ‘US Atomic Energy Intelligence Against the Soviet Target, 1945-1970’, Intelligence and National Security, 19(4), pp. 655–679. Available at: https://doi.org/10.1080/0268452042000327555.
Bukharin, O. (2004b) ‘US atomic energy intelligence against the Soviet target, 1945-1970’, Intelligence and National Security, 19(4), pp. 655–679. Available at: https://doi.org/10.1080/0268452042000327555.
Butler, R. (2004) ‘Review of intelligence on weapons of mass destruction’. Available at: http://webarchive.nationalarchives.gov.uk/20060105191702/http://www.butlerreview.org.uk/report/report.pdf.
Carr, E.H. and Evans, R.J. (2001) ‘What is history?’, in What is history? [Rev. 2nd ed.]. Basingstoke: Palgrave, pp. 1–24. Available at: https://contentstore.cla.co.uk/secure/link?id=25295f7d-4ef9-e811-80cd-005056af4099.
Cohen, A. and Hamilton, R.E. (2015) The Russian military and the Georgia war: lessons and implications. [Rochester, New York]: Scholar’s Choice.
Comber, L. (2003) ‘The Malayan Security Service (1945–1948)’, Intelligence and National Security, 18(3), pp. 128–153. Available at: https://doi.org/10.1080/02684520412331306950.
Corera, G. (2012) MI6: life and death in the British Secret Service. London: Phoenix.
Dahl, E.J. (2013a) Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902.
Dahl, E.J. (2013b) Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902.
Dahl, E.J. (2013c) Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902.
Dahl, E.J. (2013d) Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902.
David, S. (2016) Operation Thunderbolt: Flight 139 and the raid on Entebbe Airport, the most audacious hostage rescue mission in history. London: Hodder.
Eiran, E. (2016) ‘The Three Tensions of Investigating Intelligence Failures’, Intelligence and National Security, 31(4), pp. 598–618. Available at: https://doi.org/10.1080/02684527.2015.1044293.
Evans, R.J. and Evans, R.J. (2000a) ‘In defense of history’, in In defense of history. London: W.W. Norton, pp. 39–63. Available at: https://contentstore.cla.co.uk/secure/link?id=1a218aa2-8490-e611-80c7-005056af4099.
Evans, R.J. and Evans, R.J. (2000b) In defense of history. London: W.W. Norton.
Evans, R.J. and Evans, R.J. (2000c) In defense of history. London: W.W. Norton.
ferris, J. (no date) ‘Worthy of some better enemy? The British estimate of the Imperial Japanese Army 1919-1941, and the fall of Singapore’, The Canadian Journal of History, 28. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9311193889&site=ehost-live&scope=site&custid=s1123049.
Gaddis, J.L. (2004a) The landscape of history: how historians map the past. Oxford: Oxford University Press. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053.
Gaddis, J.L. (2004b) The landscape of history: how historians map the past. Oxford: Oxford University Press. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053.
Gaddis, J.L. (2004c) The landscape of history: how historians map the past. Oxford: Oxford University Press. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053.
Gaddis, J.L. (2004d) The landscape of history: how historians map the past. New York: Oxford University Press. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053.
Garthoff, R.L. (2003) ‘Estimating Soviet Military Intentions and Capabilities’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/watching-the-bear-essays-on-cias-analysis-of-the-soviet-union/article05.html.
Goodman, M.S. (2016a) The official history of the Joint Intelligence Committee: Volume I: From the approach of the Second World War to the Suez crisis. London: Routledge, Taylor & Francis Group. Available at: http://lib.myilibrary.com/browse/open.asp?id=620262&entityid=https://idp.brunel.ac.uk/entity.
Goodman, M.S. (2016b) The official history of the Joint Intelligence Committee: Volume I: From the approach of the Second World War to the Suez crisis. London: Routledge, Taylor & Francis Group. Available at: http://lib.myilibrary.com/browse/open.asp?id=620262&entityid=https://idp.brunel.ac.uk/entity.
Grey, S. (2015) ‘The new spymasters: inside espionage from the Cold War to global terror’, in The new spymasters: inside espionage from the Cold War to global terror. UK: Viking, pp. 200–219. Available at: https://contentstore.cla.co.uk/secure/link?id=2e4bb95c-8390-e611-80c7-005056af4099.
Grey, S. (2016a) The new spymasters: inside espionage from the Cold War to global terror. UK: Penguin Books.
Grey, S. (2016b) The new spymasters: inside espionage from the Cold War to global terror. UK: Penguin Books.
Hack, K. (1999a) ‘British intelligence and counter‐insurgency in the era of decolonisation: the example of Malaya’, Intelligence and National Security, 14(2), pp. 124–155. Available at: https://doi.org/10.1080/02684529908432542.
Hack, K. (1999b) ‘Corpses, prisoners of war and captured documents: British and communist narratives of the Malayan emergency, and the dynamics of intelligence transformation’, Intelligence and National Security, 14(4), pp. 211–241. Available at: https://doi.org/10.1080/02684529908432578.
Haslam, J. (2015) Near and distant neighbors: a new history of Soviet intelligence. First edition. New York: Farrar, Straus and Giroux. Available at: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=4083316.
Hayden, M.V. (2016) Playing to the edge: American intelligence in the age of terror. New York: Penguin Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=895207&entityid=https://idp.brunel.ac.uk/entity.
Hedley, J.H. (2005) ‘Learning from intelligence failures’, International journal of intelligence and counter intelligence, 18(3), pp. 435–450. Available at: https://doi.org/10.1080/08850600590945416.
Hinsley, F.H. (1981) British intelligence in the Second World War: its influence on strategy and operations, Vol. 2. New York: Cambridge University Press.
Howard, M. and Hinsley, F.H. (1990) British intelligence in the Second World War: Volume 5: Strategic deception. London: H.M.S.O.
Ilardi, G.J. (2009) ‘The 9/11 attacks—a study of Al Qaeda’s use of intelligence and counterintelligence’, Studies in Conflict & Terrorism, 32(3), pp. 171–187. Available at: https://doi.org/10.1080/10576100802670803.
James H. Lebovic (2009) ‘Perception and Politics in Intelligence Assessment: U.S. Estimates of the Soviet and "Rogue-State” Nuclear Threats’, International Studies Perspectives, 10(4), pp. 394–412. Available at: http://cm7ly9cu9w.search.serialssolutions.com/?ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Perception+and+Politics+in+Intelligence+Assessment%3A+U.S.+Estimates+of+the+Soviet+and+%E2%80%9CRogue-State%E2%80%9D+Nuclear+Threats&rft.jtitle=International+Studies+Perspectives&rft.au=Lebovic%2C+James+H&rft.date=2009-11-01&rft.issn=1528-3577&rft.eissn=1528-3585&rft.volume=10&rft.issue=4&rft.spage=394&rft.epage=412&rft_id=info:doi/10.1111%2Fj.1528-3585.2009.00385.x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1111_j_1528_3585_2009_00385_x&paramdict=en-UK.
Jeffery, K. (2011) MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury.
Jervis, R. (2010a) Why intelligence fails: lessons from the Iranian Revolution and the Iraq War. Ithaca: Cornell University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=759694&entityid=https://idp.brunel.ac.uk/entity.
Jervis, R. (2010b) Why intelligence fails: lessons from the Iranian Revolution and the Iraq War. Ithaca: Cornell University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=759694&entityid=https://idp.brunel.ac.uk/entity.
John Nixon (10AD) Debriefing the President: The Interrogation of Saddam Hussein. Corgi. Available at: https://www.amazon.co.uk/Debriefing-President-Interrogation-Saddam-Hussein/dp/0552173355/ref=sr_1_1?s=books&ie=UTF8&qid=1504460451&sr=1-1&keywords=debriefing+the+president+the+interrogation+of+saddam+hussein.
Larsen, D. (2014) ‘Intelligence in the First World War: The State of the Field’, Intelligence and National Security, 29(2), pp. 282–302. Available at: https://doi.org/10.1080/02684527.2012.727070.
Lebovic, J.H. (2009) ‘Perception and politics in intelligence assessment: U.S. estimates of the Soviet and "rogue-state” nuclear threats’, International Studies Perspectives, 10(4), pp. 394–412. Available at: https://doi.org/10.1111/j.1528-3585.2009.00385.x.
Ledwidge, F. (2011) Losing small wars: British military failure in Iraq and Afghanistan. New Haven: Yale University Press.
MacEachin, D.J. (no date) ‘CIA assessments of the Soviet Union: the record vs. the charges’, Soviet Union, pp. 57–65. Available at: https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=1&ved=0ahUKEwjpm4f02-zJAhUIShQKHT-kAy4QFgggMAA&url=https%3A%2F%2Fwww.cia.gov%2Flibrary%2Fcenter-for-the-study-of-intelligence%2Fkent-csi%2Fvol40no5%2Fpdf%2Fv40i5a08p.pdf&usg=AFQjCNHOe5k4OCMEnAiRKI7e3hYpQqox2w&sig2=4Cv_U4PFpaOzFxvrC4zTjg.
Major, J.S. (2014) Communicating with intelligence: writing and briefing for national security. Second edition. Lanham: Rowman & Littlefield. Available at: http://lib.myilibrary.com/browse/open.asp?id=620194&entityid=https://idp.brunel.ac.uk/entity.
Markus  Pöhlmann (2005) ‘German Intelligence at War, 1914–1918’, Journal of Intelligence History, 5(2), pp. 25–54. Available at: https://doi.org/10.1080/16161262.2005.10555116.
MARRIN, S. (2004) ‘Preventing Intelligence Failures by Learning from the Past’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 655–672. Available at: https://doi.org/10.1080/08850600490496452.
Meszerics, T. and Littvay, L. (2009) ‘Pseudo-Wisdom and Intelligence Failures’, International Journal of Intelligence and CounterIntelligence, 23(1), pp. 133–147. Available at: https://doi.org/10.1080/08850600903347798.
Moran, C.R. (2011) ‘The pursuit of intelligence history: methods, sources, and trajectories in the United Kingdom’, Studies in intelligence, 55(2), pp. 33–55.
Neustadt, R.E. and May, E.R. (1986) ‘Thinking in time: the uses of history for decision-makers’, in Thinking in time: the uses of history for decision-makers. London: Free Press, pp. 1–16. Available at: https://contentstore.cla.co.uk/secure/link?id=963a9f22-aef4-e811-80cd-005056af4099.
Neville Morley (1999) ‘Writing ancient history’, in Writing ancient history. London: Duckworth, pp. 53–95. Available at: https://contentstore.cla.co.uk/secure/link?id=0fe7a01f-fdee-e811-80cd-005056af4099.
Overy, R.J. (2013) The bombing war: Europe 1939-1945. London: Allen Lane.
Phythian, M. (2006) ‘The perfect intelligence failure? U.S. pre-war intelligence on Iraqi weapons of mass destruction’, Politics  Policy, 34(2), pp. 400–424. Available at: https://doi.org/10.1111/j.1747-1346.2006.00019.x.
Porter, P. (2009) Military orientalism: Eastern war through Western eyes. New York: Columbia University Press.
Richelson, J. (1995a) A century of spies: intelligence in the twentieth century. New York: Oxford University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity.
Richelson, J. (1995b) A century of spies: intelligence in the twentieth century. New York: Oxford University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity.
Richelson, J. (1995c) A century of spies: intelligence in the twentieth century. New York: Oxford University Press. Available at: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity.
Richelson, J. (2007a) Spying on the bomb: American nuclear intelligence, from Nazi Germany to Iran and North Korea. Updated [ed.]. New York: W. W. Norton.
Richelson, J. (2007b) Spying on the bomb: American nuclear intelligence, from Nazi Germany to Iran and North Korea. Updated [ed.]. New York: W. W. Norton.
Ricks, T.E. (2007) ‘Fiasco: the American military adventure in Iraq’, in Fiasco: the American military adventure in Iraq. London: Penguin, pp. 189–202. Available at: https://contentstore.cla.co.uk/secure/link?id=21a928bd-ecf5-e711-80cd-005056af4099.
Schneer, J. (2015) Ministers at war: Winston Churchill and his war cabinet 1940-45. Richmond: Oneworld. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=986239.
Sergeev, E. (2012) Russian military intelligence in the war with Japan, 1904-05: secret operations on land and at sea. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=190423&site=ehost-live&scope=site&custid=s1123049.
Smith, M. (2010) SIX: a history of Britain’s secret intelligence service, Part 1: Murder and mayhem 1909-1939. London: Dialogue. Available at: http://lib.myilibrary.com/browse/open.asp?id=861718&entityid=https://idp.brunel.ac.uk/entity.
Svendsen, A.D.M. (2010) Intelligence cooperation and the war on terror: Anglo-American security relations after 9/11. London: Routledge. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=295465.
‘The other ultra: Signal Intelligence and the Battle to Supply Rommel’s Attack toward Suez’ (1AD) Naval War College review, 66(3), pp. 117–138. Available at: http://cm7ly9cu9w.search.serialssolutions.com/?ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info:sid/summon.serialssolutions.com&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=THE+OTHER+ULTRA%3A+Signal+Intelligence+and+the+Battle+to+Supply+Rommel%27s+Attack+toward+Suez&rft.jtitle=Naval+War+College+Review&rft.au=Vincent+P+O%27Hara&rft.au=Enrico+Cernuschi&rft.date=2013-07-01&rft.pub=Superintendent+of+Documents%2C+U.S.+Naval+War+College&rft.issn=0028-1484&rft.volume=66&rft.issue=3&rft.spage=117&rft.externalDocID=3006168771&paramdict=en-UK.
Turner, M.A. (2006) Why secret intelligence fails. Revised edition. Washington, D.C.: Potomac Books, Inc. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=388735.
Walton, C. (2014) ‘Empire of secrets: British intelligence, the Cold War and the twilight of empire’, in Empire of secrets: British intelligence, the Cold War and the twilight of empire. London: William Collins, pp. 163–209. Available at: https://contentstore.cla.co.uk/secure/link?id=f9f5f02a-edf5-e711-80cd-005056af4099.
Warner, M. (2014a) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Warner, M. (2014b) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Warner, M. (2014c) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Warner, M. (2014d) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Warner, M. (2014e) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Warner, M. (2014f) The rise and fall of intelligence: an international security history. Washington, DC: Georgetown University Press. Available at: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382.
Wilford, T. (2002) ‘Watching the North Pacific: British and Commonwealth intelligence before Pearl Harbor’, Intelligence and National Security, 17(4), pp. 131–164. Available at: https://doi.org/10.1080/02684520412331306670.