1.
Carr EH, Evans RJ. What is history? What is history? [Internet]. [Rev. 2nd ed.]. Basingstoke: Palgrave; 2001. p. 1–24. Available from: https://contentstore.cla.co.uk/secure/link?id=25295f7d-4ef9-e811-80cd-005056af4099
2.
Neustadt RE, May ER. Thinking in time: the uses of history for decision-makers. Thinking in time: the uses of history for decision-makers [Internet]. London: Free Press; 1986. p. 1–16. Available from: https://contentstore.cla.co.uk/secure/link?id=963a9f22-aef4-e811-80cd-005056af4099
3.
Evans RJ, Evans RJ. In defense of history. In defense of history [Internet]. London: W.W. Norton; 2000. p. 39–63. Available from: https://contentstore.cla.co.uk/secure/link?id=1a218aa2-8490-e611-80c7-005056af4099
4.
Gaddis JL. The landscape of history: how historians map the past [Internet]. Oxford: Oxford University Press; 2004. Available from: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053
5.
Neville Morley. Writing ancient history. Writing ancient history [Internet]. London: Duckworth; 1999. p. 53–95. Available from: https://contentstore.cla.co.uk/secure/link?id=0fe7a01f-fdee-e811-80cd-005056af4099
6.
Gaddis JL. The landscape of history: how historians map the past [Internet]. Oxford: Oxford University Press; 2004. Available from: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053
7.
Evans RJ, Evans RJ. In defense of history. London: W.W. Norton; 2000.
8.
Gaddis JL. The landscape of history: how historians map the past [Internet]. Oxford: Oxford University Press; 2004. Available from: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053
9.
Evans RJ, Evans RJ. In defense of history. London: W.W. Norton; 2000.
10.
Bradley J, Cowley R. What if? 2: eminent historians imagine what might have been : essays. New York: Berkley; 2002.
11.
Hedley JH. Learning from intelligence failures. International journal of intelligence and counter intelligence. 2005 Oct;18(3):435–450.
12.
Dahl EJ. Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902
13.
Gaddis JL. The landscape of history: how historians map the past [Internet]. New York: Oxford University Press; 2004. Available from: http://www.vlebooks.com/vleweb/product/openreader?id=Brunel&isbn=9780195362053
14.
Moran CR. The pursuit of intelligence history: methods, sources, and trajectories in the United Kingdom. Studies in intelligence. 2011;55(2):33–55.
15.
Turner MA. Why secret intelligence fails [Internet]. Revised edition. Washington, D.C.: Potomac Books, Inc; 2006. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=388735
16.
Betts RK. Enemies of intelligence: knowledge and power in American national security [Internet]. New York: Columbia University Press; 2007. Available from: http://lib.myilibrary.com/browse/open.asp?id=287204&entityid=https://idp.brunel.ac.uk/entity
17.
Dahl EJ. Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902
18.
Jervis R. Why intelligence fails: lessons from the Iranian Revolution and the Iraq War [Internet]. Ithaca: Cornell University Press; 2010. Available from: http://lib.myilibrary.com/browse/open.asp?id=759694&entityid=https://idp.brunel.ac.uk/entity
19.
Goodman MS. The official history of the Joint Intelligence Committee: Volume I: From the approach of the Second World War to the Suez crisis [Internet]. London: Routledge, Taylor & Francis Group; 2016. Available from: http://lib.myilibrary.com/browse/open.asp?id=620262&entityid=https://idp.brunel.ac.uk/entity
20.
Betts RK. Enemies of intelligence: knowledge and power in American national security [Internet]. New York: Columbia University Press; 2007. Available from: http://lib.myilibrary.com/browse/open.asp?id=287204&entityid=https://idp.brunel.ac.uk/entity
21.
Dahl EJ. Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902
22.
Eiran E. The Three Tensions of Investigating Intelligence Failures. Intelligence and National Security. 2016 Jun 6;31(4):598–618.
23.
MARRIN S. Preventing Intelligence Failures by Learning from the Past. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):655–672.
24.
Meszerics T, Littvay L. Pseudo-Wisdom and Intelligence Failures. International Journal of Intelligence and CounterIntelligence. 2009 Dec 3;23(1):133–147.
25.
Major JS. Communicating with intelligence: writing and briefing for national security [Internet]. Second edition. Lanham: Rowman & Littlefield; 2014. Available from: http://lib.myilibrary.com/browse/open.asp?id=620194&entityid=https://idp.brunel.ac.uk/entity
26.
Jeffery K. MI6: the history of the Secret Intelligence Service, 1909-1949. London: Bloomsbury; 2011.
27.
Richelson J. A century of spies: intelligence in the twentieth century [Internet]. New York: Oxford University Press; 1995. Available from: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity
28.
Sergeev E. Russian military intelligence in the war with Japan, 1904-05: secret operations on land and at sea [Internet]. London: Routledge; 2012. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=nlebk&AN=190423&site=ehost-live&scope=site&custid=s1123049
29.
Richelson J. A century of spies: intelligence in the twentieth century [Internet]. New York: Oxford University Press; 1995. Available from: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity
30.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
31.
Larsen D. Intelligence in the First World War: The State of the Field. Intelligence and National Security. 2014 Mar 4;29(2):282–302.
32.
Markus  Pöhlmann. German Intelligence at War, 1914–1918. Journal of Intelligence History [Internet]. Taylor & Francis Group; 2005;5(2):25–54. Available from: http://www.tandfonline.com/doi/abs/10.1080/16161262.2005.10555116
33.
Smith M. SIX: a history of Britain’s secret intelligence service, Part 1: Murder and mayhem 1909-1939 [Internet]. London: Dialogue; 2010. Available from: http://lib.myilibrary.com/browse/open.asp?id=861718&entityid=https://idp.brunel.ac.uk/entity
34.
Andrew CM, Mitrokhin V. The Mitrokhin archive: the KGB in Europe and the West. The Mitrokhin archive: the KGB in Europe and the West [Internet]. London: Penguin Books; 2000. p. 73–88. Available from: https://contentstore.cla.co.uk/secure/link?id=a1e41e21-feee-e811-80cd-005056af4099
35.
Andrew CM. The defence of the realm: the authorized history of MI5. The defence of the realm: the authorized history of MI5 [Internet]. Updated. London: Penguin; 2010. p. 160–185. Available from: https://contentstore.cla.co.uk/secure/link?id=de5a1959-a14a-e611-80bd-0cc47a6bddeb
36.
Budiansky S. Battle of wits: the complete story of codebreaking in World War II. New York: Free Press; 2000.
37.
Richelson J. A century of spies: intelligence in the twentieth century [Internet]. New York: Oxford University Press; 1995. Available from: http://lib.myilibrary.com/browse/open.asp?id=311330&entityid=https://idp.brunel.ac.uk/entity
38.
Haslam J. Near and distant neighbors: a new history of Soviet intelligence [Internet]. First edition. New York: Farrar, Straus and Giroux; 2015. Available from: https://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=4083316
39.
Hinsley FH. British intelligence in the Second World War: its influence on strategy and operations, Vol. 2. New York: Cambridge University Press; 1981.
40.
Richelson J. Spying on the bomb: American nuclear intelligence, from Nazi Germany to Iran and North Korea. Updated [ed.]. New York: W. W. Norton; 2007.
41.
Schneer J. Ministers at war: Winston Churchill and his war cabinet 1940-45 [Internet]. Richmond: Oneworld; 2015. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=986239
42.
Overy RJ. The bombing war: Europe 1939-1945. London: Allen Lane; 2013.
43.
Goodman MS. The official history of the Joint Intelligence Committee: Volume I: From the approach of the Second World War to the Suez crisis [Internet]. London: Routledge, Taylor & Francis Group; 2016. Available from: http://lib.myilibrary.com/browse/open.asp?id=620262&entityid=https://idp.brunel.ac.uk/entity
44.
The other ultra: Signal Intelligence and the Battle to Supply Rommel’s Attack toward Suez. Naval War College review [Internet]. 1AD;66(3):117–138. Available from: http://cm7ly9cu9w.search.serialssolutions.com/?ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info:sid/summon.serialssolutions.com&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=THE+OTHER+ULTRA%3A+Signal+Intelligence+and+the+Battle+to+Supply+Rommel%27s+Attack+toward+Suez&rft.jtitle=Naval+War+College+Review&rft.au=Vincent+P+O%27Hara&rft.au=Enrico+Cernuschi&rft.date=2013-07-01&rft.pub=Superintendent+of+Documents%2C+U.S.+Naval+War+College&rft.issn=0028-1484&rft.volume=66&rft.issue=3&rft.spage=117&rft.externalDocID=3006168771&paramdict=en-UK
45.
Howard M, Hinsley FH. British intelligence in the Second World War: Volume 5: Strategic deception. London: H.M.S.O.; 1990.
46.
ferris J. Worthy of some better enemy? The British estimate of the Imperial Japanese Army 1919-1941, and the fall of Singapore. The Canadian Journal of History [Internet]. 28. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=a9h&AN=9311193889&site=ehost-live&scope=site&custid=s1123049
47.
Wilford T. Watching the North Pacific: British and Commonwealth intelligence before Pearl Harbor. Intelligence and National Security. 2002 Dec;17(4):131–164.
48.
Porter P. Military orientalism: Eastern war through Western eyes. New York: Columbia University Press; 2009.
49.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
50.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
51.
Aldrich RJ. The hidden hand: Britain, America and Cold War Secret Intelligence. Woodstock: The Overlook Press; 2002.
52.
James H. Lebovic. Perception and Politics in Intelligence Assessment: U.S. Estimates of the Soviet and "Rogue-State” Nuclear Threats. International Studies Perspectives [Internet]. The Oxford University Press; 2009;10(4):394–412. Available from: http://cm7ly9cu9w.search.serialssolutions.com/?ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Perception+and+Politics+in+Intelligence+Assessment%3A+U.S.+Estimates+of+the+Soviet+and+%E2%80%9CRogue-State%E2%80%9D+Nuclear+Threats&rft.jtitle=International+Studies+Perspectives&rft.au=Lebovic%2C+James+H&rft.date=2009-11-01&rft.issn=1528-3577&rft.eissn=1528-3585&rft.volume=10&rft.issue=4&rft.spage=394&rft.epage=412&rft_id=info:doi/10.1111%2Fj.1528-3585.2009.00385.x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1111_j_1528_3585_2009_00385_x&paramdict=en-UK
53.
Bukharin O. US Atomic Energy Intelligence Against the Soviet Target, 1945-1970. Intelligence and National Security. 2004 Dec;19(4):655–679.
54.
Garthoff RL. Estimating Soviet Military Intentions and Capabilities. 2003; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/watching-the-bear-essays-on-cias-analysis-of-the-soviet-union/article05.html
55.
Comber L. The Malayan Security Service (1945–1948). Intelligence and National Security. 2003 Sep;18(3):128–153.
56.
Hack K. British intelligence and counter‐insurgency in the era of decolonisation: the example of Malaya. Intelligence and National Security. 1999 Jun;14(2):124–155.
57.
Hack K. Corpses, prisoners of war and captured documents: British and communist narratives of the Malayan emergency, and the dynamics of intelligence transformation. Intelligence and National Security. 1999 Dec;14(4):211–241.
58.
Walton C. Empire of secrets: British intelligence, the Cold War and the twilight of empire. Empire of secrets: British intelligence, the Cold War and the twilight of empire [Internet]. London: William Collins; 2014. p. 163–209. Available from: https://contentstore.cla.co.uk/secure/link?id=f9f5f02a-edf5-e711-80cd-005056af4099
59.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
60.
Lebovic JH. Perception and politics in intelligence assessment: U.S. estimates of the Soviet and "rogue-state” nuclear threats. International Studies Perspectives. 2009 Nov;10(4):394–412.
61.
Bukharin O. US atomic energy intelligence against the Soviet target, 1945-1970. Intelligence and National Security. 2004 Dec;19(4):655–679.
62.
David S. Operation Thunderbolt: Flight 139 and the raid on Entebbe Airport, the most audacious hostage rescue mission in history. London: Hodder; 2016.
63.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
64.
MacEachin DJ. CIA assessments of the Soviet Union: the record vs. the charges. Soviet Union [Internet]. :57–65. Available from: https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=1&ved=0ahUKEwjpm4f02-zJAhUIShQKHT-kAy4QFgggMAA&url=https%3A%2F%2Fwww.cia.gov%2Flibrary%2Fcenter-for-the-study-of-intelligence%2Fkent-csi%2Fvol40no5%2Fpdf%2Fv40i5a08p.pdf&usg=AFQjCNHOe5k4OCMEnAiRKI7e3hYpQqox2w&sig2=4Cv_U4PFpaOzFxvrC4zTjg
65.
Arbel D, Edelist R, ProQuest (Firm). Western intelligence and the collapse of the Soviet Union, 1980-1990: ten years that did not shake the world [Internet]. London: Frank Cass; 2003. Available from: http://ebookcentral.proquest.com/lib/brunelu/detail.action?docID=214543
66.
Aldrich RJ, Cormac R. The black door: spies, secret intelligence and British prime ministers. The black door: spies, secret intelligence and British prime ministers [Internet]. London: William Collins; 2016. p. 353–383. Available from: https://contentstore.cla.co.uk/secure/link?id=f589ee27-7b90-e611-80c7-005056af4099
67.
Axworthy M. Revolutionary Iran: a history of the Islamic Republic. Updated [edition]. London: Penguin Books; 2014.
68.
Grey S. The new spymasters: inside espionage from the Cold War to global terror. UK: Penguin Books; 2016.
69.
John Nixon. Debriefing the President: The Interrogation of Saddam Hussein [Internet]. Corgi; 10AD. Available from: https://www.amazon.co.uk/Debriefing-President-Interrogation-Saddam-Hussein/dp/0552173355/ref=sr_1_1?s=books&ie=UTF8&qid=1504460451&sr=1-1&keywords=debriefing+the+president+the+interrogation+of+saddam+hussein
70.
Warner M. The rise and fall of intelligence: an international security history [Internet]. Washington, DC: Georgetown University Press; 2014. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=766382
71.
Ilardi GJ. The 9/11 attacks—a study of Al Qaeda’s use of intelligence and counterintelligence. Studies in Conflict & Terrorism. 2009 Mar 24;32(3):171–187.
72.
Dahl EJ. Intelligence and surprise attack: failure and success from Pearl Harbor to 9/11 and beyond [Internet]. Washington, DC: Georgetown University Press; 2013. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=634902
73.
Hayden MV. Playing to the edge: American intelligence in the age of terror [Internet]. New York: Penguin Press; 2016. Available from: http://lib.myilibrary.com/browse/open.asp?id=895207&entityid=https://idp.brunel.ac.uk/entity
74.
Grey S. The new spymasters: inside espionage from the Cold War to global terror. UK: Penguin Books; 2016.
75.
Corera G. MI6: life and death in the British Secret Service. London: Phoenix; 2012.
76.
Butler R. Review of intelligence on weapons of mass destruction. London: TSO; 2004; Available from: http://webarchive.nationalarchives.gov.uk/20060105191702/http://www.butlerreview.org.uk/report/report.pdf
77.
Richelson J. Spying on the bomb: American nuclear intelligence, from Nazi Germany to Iran and North Korea. Updated [ed.]. New York: W. W. Norton; 2007.
78.
Phythian M. The perfect intelligence failure? U.S. pre-war intelligence on Iraqi weapons of mass destruction. Politics  Policy. 2006 Jun;34(2):400–424.
79.
Jervis R. Why intelligence fails: lessons from the Iranian Revolution and the Iraq War [Internet]. Ithaca: Cornell University Press; 2010. Available from: http://lib.myilibrary.com/browse/open.asp?id=759694&entityid=https://idp.brunel.ac.uk/entity
80.
Grey S. The new spymasters: inside espionage from the Cold War to global terror. The new spymasters: inside espionage from the Cold War to global terror [Internet]. UK: Viking; 2015. p. 200–219. Available from: https://contentstore.cla.co.uk/secure/link?id=2e4bb95c-8390-e611-80c7-005056af4099
81.
Ricks TE. Fiasco: the American military adventure in Iraq. Fiasco: the American military adventure in Iraq [Internet]. London: Penguin; 2007. p. 189–202. Available from: https://contentstore.cla.co.uk/secure/link?id=21a928bd-ecf5-e711-80cd-005056af4099
82.
Ledwidge F. Losing small wars: British military failure in Iraq and Afghanistan. New Haven: Yale University Press; 2011.
83.
Svendsen ADM. Intelligence cooperation and the war on terror: Anglo-American security relations after 9/11 [Internet]. London: Routledge; 2010. Available from: http://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s1123049&direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=295465
84.
Aid MM. Intel wars: the secret history of the fight against terror. Intel wars: the secret history of the fight against terror [Internet]. Paperback edition. New York: Bloomsbury Press; 2013. p. 70–98. Available from: https://contentstore.cla.co.uk/secure/link?id=43b5e833-90f4-e811-80cd-005056af4099
85.
Cohen A, Hamilton RE. The Russian military and the Georgia war: lessons and implications. [Rochester, New York]: Scholar’s Choice; 2015.