7/7 leader: more evidence reveals what police knew | UK news | The Guardian (no date). Available at: http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3.
9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (2004). Available at: http://www.9-11commission.gov/.
‘A Risk Management Standard’ (no date). Institute of Risk Management. Available at: https://theirm.org/media/886059/ARMS_2002_IRM.pdf.
‘A Symposium on Intelligence Ethics’ (2009) Intelligence and National Security, 24(3), pp. 366–386. Available at: https://doi.org/10.1080/02684520903036958.
‘A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis’ (no date). Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf.
Adamsky, D.P. (2005) ‘Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1’, Journal of Strategic Studies, 28(5), pp. 803–831. Available at: https://doi.org/10.1080/01402390500393977.
Aid, M.M. and Wiebes, C. (2001) ‘Introduction on The Importance of Signals Intelligence in the Cold War’, Intelligence and National Security, 16(1), pp. 1–26. Available at: https://doi.org/10.1080/714002838.
Alan Dershowitz (no date) Tortured Reasoning. Available at: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655.
Alex J. Bellamy (2006) ‘No Pain, No Gain? Torture and Ethics in the War on Terror’, International Affairs (Royal Institute of International Affairs 1944-), 82(1), pp. 1944–148. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133.
All Party Parliamentary Group on Extraordinary Rendition (no date). Available at: http://www.extraordinaryrendition.org/.
Articles on Rendition at The Guardian (no date). Available at: http://www.guardian.co.uk/world/rendition.
Barbara Harlow (no date) ‘“Extraordinary renditions”: tales of Guantánamo, a review article’, 52, pp. 1–29. Available at: http://rac.sagepub.com.ezproxy3.lib.le.ac.uk/content/52/4.toc.
Bauman, Z. et al. (2014) ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology, 8(2), pp. 121–144. Available at: https://doi.org/10.1111/ips.12048.
Bellaby, R. (2012) ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, 27(1), pp. 93–117. Available at: https://doi.org/10.1080/02684527.2012.621600.
Boraz, S.C. (2006) ‘Establishing Democratic Control of Intelligence in Colombia’, International Journal of Intelligence and CounterIntelligence, 19(1), pp. 84–109. Available at: https://doi.org/10.1080/08850600500177168.
Borch, F.L. (2003) ‘Comparing Pearl Harbor and “9/11”: Intelligence Failure? American Unpreparedness? Military Responsibility?’, The Journal of Military History, 67(3), pp. 845–860. Available at: https://doi.org/10.1353/jmh.2003.0201.
Byman, D. (2014) ‘The Intelligence War on Terrorism’, Intelligence and National Security, 29(6), pp. 837–863. Available at: https://doi.org/10.1080/02684527.2013.851876.
Canadian Security Intelligence Review Committee (no date). Available at: http://www.sirc-csars.gc.ca/index-eng.html.
Canton, B. (2008) ‘The Active Management of Uncertainty’, International Journal of Intelligence and CounterIntelligence, 21(3), pp. 487–518. Available at: https://doi.org/10.1080/08850600802046939.
Champion, B. (2008) ‘Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations’, International Journal of Intelligence and CounterIntelligence, 21(3), pp. 530–564. Available at: https://doi.org/10.1080/08850600701651268.
Cogan, C. (2004) ‘Hunters not Gatherers: Intelligence in the Twenty-First Century’, Intelligence and National Security, 19(2), pp. 304–321. Available at: https://doi.org/10.1080/0268452042000302010.
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (no date). Available at: http://govinfo.library.unt.edu/wmd/about.html.
‘Confidential Informants in National Security Investigations’ by Daniel V. Ward (no date). Available at: http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/.
Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005 (2009). Available at: https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0.
Danchev, A. (2004) ‘The Reckoning: Official Inquiries and the Iraq War’, Intelligence and National Security, 19(3), pp. 436–466. Available at: https://doi.org/10.1080/0268452042000316232.
Darius Rejali (2007) Torture and Democracy. Available at: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494.
David J. Garrow (1988) ‘FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects’, The Public Historian, 10(4), pp. 5–18. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3377831.
David Kahn (2006) ‘The Rise of Intelligence’, Foreign Affairs, 85(5). Available at: http://ezproxy.lib.le.ac.uk/login?url=https://www.jstor.org/stable/20032075?origin=crossref&seq=1#metadata_info_tab_contents.
Davies, P. (2004) ‘Intelligence culture and intelligence failure in Britain and the United States’, Cambridge Review of International Affairs, 17(3), pp. 495–520. Available at: https://doi.org/10.1080/0955757042000298188.
Dennis M. Gormley (2011) ‘The Limits of Intelligence: Iraq’s Lessons’. Available at: https://doi.org/10.1080/00396338.2004.9688605.
Diamond, J.M. (2001) ‘Re-examining Problems and Prospects in U.S. Imagery Intelligence’, International Journal of Intelligence and CounterIntelligence, 14(1), pp. 1–24. Available at: https://doi.org/10.1080/08850600150501308.
Díaz Fernández, A.M. (2006) ‘Halfway down the road to supervision of the Spanish intelligence services’, Intelligence and National Security, 21(3), pp. 440–456. Available at: https://doi.org/10.1080/02684520600750687.
Douglas J. MacEachin (2007) Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html.
Dunn Cavelty, M. and Mauer, V. (2009) ‘Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence’, Security Dialogue, 40(2), pp. 123–144. Available at: https://doi.org/10.1177/0967010609103071.
Dupont, A. (2003) ‘Intelligence for the Twenty-First Century’, Intelligence and National Security, 18(4), pp. 15–39. Available at: https://doi.org/10.1080/02684520310001688862.
Erskine, T. (2004) ‘“As Rays of Light to the Human Soul”? Moral Agents and Intelligence Gathering’, Intelligence and National Security, 19(2), pp. 359–381. Available at: https://doi.org/10.1080/0268452042000302047.
Evans, G. (2009) ‘Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle’, Defence Studies, 9(1), pp. 22–46. Available at: https://doi.org/10.1080/14702430701811987.
Farson, S. (2000) ‘Parliament and its servants: Their role in scrutinizing Canadian intelligence’, Intelligence and National Security, 15(2), pp. 225–258. Available at: https://doi.org/10.1080/02684520008432609.
Friedman, J.A. and Zeckhauser, R. (2012) ‘Assessing Uncertainty in Intelligence’, Intelligence and National Security, 27(6), pp. 824–847. Available at: https://doi.org/10.1080/02684527.2012.708275.
Gendron, A. (2005) ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, 18(3), pp. 398–434. Available at: https://doi.org/10.1080/08850600590945399.
Gentry, J.A. (2015) ‘Warning Analysis: Focusing on Perceptions of Vulnerability’, International Journal of Intelligence and CounterIntelligence, 28(1), pp. 64–88. Available at: https://doi.org/10.1080/08850607.2014.962354.
Gill, P. (2007a) ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, 22(1), pp. 14–37. Available at: https://doi.org/10.1080/02684520701200756.
Gill, P. (2007b) ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, 22(1), pp. 14–37. Available at: https://doi.org/10.1080/02684520701200756.
Gill, P. (2009a) ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, 24(1), pp. 78–102. Available at: https://doi.org/10.1080/02684520902756929.
Gill, P. (2009b) ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, 24(1), pp. 78–102. Available at: https://doi.org/10.1080/02684520902756929.
Gill, P. (2012) ‘Intelligence, Threat, Risk and the Challenge of Oversight’, Intelligence and National Security, 27(2), pp. 206–222. Available at: https://doi.org/10.1080/02684527.2012.661643.
Gill, Peter and Peter Gill & Mark Phythian (2006) ‘Chapter 1: “What is Intelligence?” (inc. notes)’, in Intelligence in an insecure world. Cambridge: Polity Press.
Glees, A. and Davies, P.H.J. (2006) ‘Intelligence, Iraq and the limits of legislative accountability during political crisis’, Intelligence and National Security, 21(5), pp. 848–883. Available at: https://doi.org/10.1080/02684520600957787.
Goodman, M.A. (2003) ‘9/11: The Failure of Strategic Intelligence’, Intelligence and National Security, 18(4), pp. 59–71. Available at: https://doi.org/10.1080/02684520310001688871.
Hastedt, G. (2013) ‘The Politics of Intelligence and the Politicization of Intelligence: The American Experience’, Intelligence and National Security, 28(1), pp. 5–31. Available at: https://doi.org/10.1080/02684527.2012.749062.
Hatlebrekke, K.A. and Smith, M.L.R. (2010) ‘Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure’, Intelligence and National Security, 25(2), pp. 147–182. Available at: https://doi.org/10.1080/02684527.2010.489274.
Heazle, M. (2010) ‘Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters’, Intelligence and National Security, 25(3), pp. 290–308. Available at: https://doi.org/10.1080/02684527.2010.489780.
Hedley, J.H. (2005) ‘Learning from Intelligence Failures’, International Journal of Intelligence and CounterIntelligence, 18(3), pp. 435–450. Available at: https://doi.org/10.1080/08850600590945416.
Herman, M. (2004) ‘Ethics and Intelligence after September 2001’, Intelligence and National Security, 19(2), pp. 342–358. Available at: https://doi.org/10.1080/0268452042000302038.
Herman, M. (2011) ‘What Difference Did It Make?’, Intelligence and National Security, 26(6), pp. 886–901. Available at: https://doi.org/10.1080/02684527.2011.619802.
Heuer, R. (no date) ‘Psychology of Intelligence Analysis’. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf.
Heuer, R.J. (2005) ‘Limits of Intelligence Analysis’, Orbis, 49(1), pp. 75–94. Available at: https://doi.org/10.1016/j.orbis.2004.10.007.
Hillebrand, C. (2012) ‘The Role of News Media in Intelligence Oversight’, Intelligence and National Security, 27(5), pp. 689–706. Available at: https://doi.org/10.1080/02684527.2012.708521.
History | MI5 - The Security Service (no date). Available at: https://www.mi5.gov.uk/history.
How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian (no date). Available at: http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7.
Hulnick, A.S. (2006) ‘What’s wrong with the Intelligence Cycle’, Intelligence and National Security, 21(6), pp. 959–979. Available at: https://doi.org/10.1080/02684520601046291.
Human Rights Watch (2009) ‘Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan’. Available at: http://www.hrw.org/reports/2009/11/24/cruel-britannia-0.
Ian Leigh, H.B. (no date) ‘Democratic Accountability of Intelligence Services’, in SIPRI Yearbook 2007. Available at: https://www.sipri.org/yearbook/2007/05.
Internet jihad: A world wide web of terror | The Economist (no date). Available at: http://www.economist.com/node/9472498.
Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency (no date). Available at: https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm.
Jack Davis (no date) Sherman Kent and the Profession of Intelligence Analysis. Available at: https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm.
James Gaskarth (2011) ‘Entangling alliances? The UK’s complicity in torture in the global war on terrorism’. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1111/j.1468-2346.2011.01012.x.
Jane Mayer and The New Yorker, 2005 (2005) ‘OUTSOURCING TORTURE’, 81(1). Available at: http://gl9sn3dh2u.search.serialssolutions.com/?V=1.0&N=50&L=GL9SN3DH2U&S=A_T_B&C=new+yorker.
Jervis, R. (2006) ‘Reports, politics, and intelligence failures: The case of Iraq’, Journal of Strategic Studies, 29(1), pp. 3–52. Available at: https://doi.org/10.1080/01402390600566282.
JOHNSON, L. (2003) ‘Bricks and Mortar for a Theory of Intelligence*’, Comparative Strategy, 22(1), pp. 1–28. Available at: https://doi.org/10.1080/01495930390130481.
Johnson, L. (2010) ‘Evaluating "Humint”: The Role of Foreign Agents in U.S. Security’, Comparative Strategy, 29(4), pp. 308–332. Available at: https://doi.org/10.1080/01495933.2010.509635.
JOHNSON, L.K. (2003) ‘Preface to a Theory of Strategic Intelligence’, International Journal of Intelligence and CounterIntelligence, 16(4), pp. 638–663. Available at: https://doi.org/10.1080/716100470.
Johnson, L.K. (2008a) ‘Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate’, Intelligence and National Security, 23(3), pp. 333–370. Available at: https://doi.org/10.1080/02684520802121257.
Johnson, L.K. (2008b) ‘The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability’, Intelligence and National Security, 23(2), pp. 198–225. Available at: https://doi.org/10.1080/02684520801977337.
Johnson, L.K. (2011) ‘National Security Intelligence in the United States: A Performance Checklist’, Intelligence and National Security, 26(5), pp. 607–615. Available at: https://doi.org/10.1080/02684527.2011.604198.
Johnson, L.K. et al. (2014) ‘An                              Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, 29(6), pp. 793–810. Available at: https://doi.org/10.1080/02684527.2014.946242.
Julie Clarke, M.B. (2005) ‘Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable’. Available at: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr39&id=593&collection=journals&index=journals/usflr.
Julie Clarke, M.B. (2006) ‘Tortured Responses (A Reply to Our Critics)’. Available at: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr40&id=711&collection=journals&index=journals/usflr.
Kahn, D. (2001) ‘An historical theory of intelligence’, Intelligence and National Security, 16(3), pp. 79–92. Available at: https://doi.org/10.1080/02684520412331306220.
Kahn, D. (no date) ‘The Intelligence Failure of Pearl Harbor, Foreign Affairs’. Available at: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/fora70&id=1004&collection=journals&index=journals/fora.
Kern, G. (2009) ‘Torture and Intelligence in the Global War on Terror’, Intelligence and National Security, 24(3), pp. 429–457. Available at: https://doi.org/10.1080/02684520903037022.
LEFEBVRE, S. (2004) ‘A Look at Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, 17(2), pp. 231–264. Available at: https://doi.org/10.1080/08850600490274908.
Leigh, I. (2012) ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11’, Intelligence and National Security, 27(5), pp. 722–738. Available at: https://doi.org/10.1080/02684527.2012.708525.
Lucas, S. (2011) ‘Recognising Politicization: The CIA and the Path to the 2003 War in Iraq’, Intelligence and National Security, 26(2–3), pp. 203–227. Available at: https://doi.org/10.1080/02684527.2011.559141.
‘Making Sense of Snowden’ (2013) The Political Quarterly, 84(4), pp. 433–435. Available at: https://doi.org/10.1111/j.1467-923X.2013.12053.x.
MARRIN, S. (2004) ‘Preventing Intelligence Failures by Learning from the Past’, International Journal of Intelligence and CounterIntelligence, 17(4), pp. 655–672. Available at: https://doi.org/10.1080/08850600490496452.
Marrin, S. (2011) ‘The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis’, Intelligence and National Security, 26(2–3), pp. 182–202. Available at: https://doi.org/10.1080/02684527.2011.559140.
Marrin, S. (2012) ‘Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure?’, Intelligence and National Security, 27(6), pp. 896–912. Available at: https://doi.org/10.1080/02684527.2012.699290.
Michael Warner (2002) Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html.
Michael Warner (eds) (2001) ‘Central Intelligence Origin and Evolution in the US’. Available at: https://www.cia.gov/static/2116cfec5d478f1e6fcc67f910759625/Origin-and-Evolution.pdf.
Moran, J. (2010a) ‘Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland’, Intelligence and National Security, 25(1), pp. 1–23. Available at: https://doi.org/10.1080/02684521003588070.
Moran, J. (2010b) ‘Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland’, Intelligence and National Security, 25(1), pp. 1–23. Available at: https://doi.org/10.1080/02684521003588070.
Moran, J. and Phythian, M. (2008) Intelligence, security and policing post-9/11: The UK’s response to the war on terror. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/book/10.1057/9780230583542.
Müller-Wille, B. (2006) ‘Improving the democratic accountability of EU intelligence’, Intelligence and National Security, 21(1), pp. 100–128. Available at: https://doi.org/10.1080/02684520600568394.
National security and intelligence - Inside Government - GOV.UK (no date). Available at: https://www.gov.uk/government/organisations/national-security.
Odom, W.E. (2008) ‘Intelligence Analysis’, Intelligence and National Security, 23(3), pp. 316–332. Available at: https://doi.org/10.1080/02684520802121216.
‘OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings’ (no date). Available at: http://www.justice.gov/oig/reports/2014/s1404.pdf.
Omand, D., Bartlett, J. and Miller, C. (2012) ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security, 27(6), pp. 801–823. Available at: https://doi.org/10.1080/02684527.2012.716965.
Omand GCB, S.D. (2006) ‘Ethical Guidelines in Using Secret Intelligence for Public Security’, Cambridge Review of International Affairs, 19(4), pp. 613–628. Available at: https://doi.org/10.1080/09557570601003338.
Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction (2003). Available at: http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm.
Patterson, E. and Casale, T. (2005) ‘Targeting Terror: The Ethical and Practical Implications of Targeted Killing’, International Journal of Intelligence and CounterIntelligence, 18(4), pp. 638–652. Available at: https://doi.org/10.1080/08850600590945407.
Paul R. Pillar (2006) ‘Intelligence, Policy, and the War in Iraq’, Foreign Affairs, 85(2), pp. 15–27. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20031908.
Peter Gill (2009) ‘The Intelligence and Security Committee and the Challenge of Security Networks’, Review of International Studies, 35(4). Available at: http://ezproxy.lib.le.ac.uk/login?url=https://www.cambridge.org/core/journals/review-of-international-studies/article/intelligence-and-security-committee-and-the-challenge-of-security-networks/EE30C2105597F02BA24E95C0CDB46648.
Pfaff, T. and Tiel, J.R. (2004) ‘The ethics of espionage’, Journal of Military Ethics, 3(1), pp. 1–15. Available at: https://doi.org/10.1080/15027570310004447.
Philip Alston (2010) ‘Study on Targeted Killings, UN General Assembly Human Rights Council’. Available at: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf.
Philip N. S. Rumney (2008) Chapter Eight - The Torture Debate: A Perspective from the United Kingdom. Available at: https://doi.org/10.1057/9780230583542              9780230583542 PDF                                                                                      9780230551916 HB                          272 pp.
Phythian, M. (2006) ‘The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction’, Politics  Policy, 34(2), pp. 400–424. Available at: https://doi.org/10.1111/j.1747-1346.2006.00019.x.
Phythian, M. (2007) ‘The British experience with intelligence accountability’, Intelligence and National Security, 22(1), pp. 75–99. Available at: https://doi.org/10.1080/02684520701200822.
Phythian, M. (2012) ‘Policing Uncertainty: Intelligence, Security and Risk’, Intelligence and National Security, 27(2), pp. 187–205. Available at: https://doi.org/10.1080/02684527.2012.661642.
Phythian, Mark and Stephen, Gill (no date) ‘Intelligence Theory : Key Questions and Debates’, Intelligence Theory : Key Questions and Debates [Preprint]. Available at: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=nlebk&AN=236476&site=ehost-live.
Pillar, P.R. (2006) ‘Good literature and bad history: The 9/11 commission’s tale of strategic intelligence’, Intelligence and National Security, 21(6), pp. 1022–1044. Available at: https://doi.org/10.1080/02684520601046366.
Poynting, S. (2010) ‘Render unto Caesar’, Criminal Justice Matters, 82(1), pp. 14–15. Available at: https://doi.org/10.1080/09627251.2010.525919.
Puyvelde, D.V. (2013) ‘Intelligence Accountability and the Role of Public Interest Groups in the United States’, Intelligence and National Security, 28(2), pp. 139–158. Available at: https://doi.org/10.1080/02684527.2012.735078.
Quinlan, M. (2007) ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, 22(1), pp. 1–13. Available at: https://doi.org/10.1080/02684520701200715.
Report of the Inquiry into Australian Intelligence Agencies (Flood Report) (no date). Available at: https://catalogue.nla.gov.au/Record/3308786.
‘Review of Intelligence on Weapons of Mass Destruction - Butler Report’ (2004). Available at: https://www.files.ethz.ch/isn/7078/doc_7085_290_en.pdf.
Richard J. Aldrich (2004) ‘Transatlantic Intelligence and Security Cooperation’, International Affairs (Royal Institute of International Affairs 1944-), 80(4), pp. 1944–753. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569532.
Richard K. Betts (1978) ‘Analysis, War, and Decision: Why Intelligence Failures Are inevitable’, World Politics, 31(1), pp. 61–89. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/2009967.
Richard K. Betts (2002) ‘Fixing Intelligence’, Foreign Affairs, 81(1), pp. 43–59. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20033002.
Richard L. Russell (2002) ‘CIA’s Strategic Intelligence in Iraq’, Political Science Quarterly, 117(2), pp. 191–207. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/798180.
Richard Norton-Taylor (no date) Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian. Available at: http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy.
Richards, J. (2012) ‘Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy’, Intelligence and National Security, 27(5), pp. 761–780. Available at: https://doi.org/10.1080/02684527.2012.708528.
Roberts, A. (2007a) ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, 49(1), pp. 199–212. Available at: https://doi.org/10.1080/00396330701254693.
Roberts, A. (2007b) ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, 49(1), pp. 199–212. Available at: https://doi.org/10.1080/00396330701254693.
Rumsfeld, D. (2002a) Press Conference. NATO. Available at: https://www.nato.int/docu/speech/2002/s020606g.htm.
Rumsfeld, D. (2002b) Press Conference. NATO. Available at: https://www.nato.int/docu/speech/2002/s020606g.htm.
Russell, R.L. (2005) ‘A weak pillar for American national security: The CIA’s dismal performance against WMD threats’, Intelligence and National Security, 20(3), pp. 466–485. Available at: https://doi.org/10.1080/02684520500268954.
Russia: Boston bombing report is effort to ‘whitewash US intelligence failures’ - RT News (no date). RT News. Available at: http://rt.com/news/russia-boston-bombing-report-180/.
Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com (no date). Available at: http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0.
Sanford Levinson (ed) (2004) Torture : A Collection. Available at: https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER.
Schwarz, F.A.O. (2007) ‘The Church Committee and a new era of intelligence oversight’, Intelligence and National Security, 22(2), pp. 270–297. Available at: https://doi.org/10.1080/02684520701303881.
Scott, L. (2004a) ‘Secret Intelligence, Covert Action and Clandestine Diplomacy’, Intelligence and National Security, 19(2), pp. 322–341. Available at: https://doi.org/10.1080/0268452042000302029.
Scott, L. (2004b) ‘Secret Intelligence, Covert Action and Clandestine Diplomacy’, Intelligence and National Security, 19(2), pp. 322–341. Available at: https://doi.org/10.1080/0268452042000302029.
Scott, L. and Jackson, P. (2004) ‘The Study of Intelligence in Theory and Practice’, Intelligence and National Security, 19(2), pp. 139–169. Available at: https://doi.org/10.1080/0268452042000302930.
Select Committee on Intelligence United States Senate (2004) ‘Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq’. Available at: http://hdl.handle.net/2027/umn.31951d02406334o.
Sherman Kent (no date) Estimates and Influence. Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html.
Shore, J.J.M. (2006) ‘Intelligence Review and Oversight in Post-9/11 Canada’, International Journal of Intelligence and CounterIntelligence, 19(3), pp. 456–479. Available at: https://doi.org/10.1080/08850600600656350.
Sims, J. (2007) ‘Intelligence to counter terror: The importance of all-source fusion’, Intelligence and National Security, 22(1), pp. 38–56. Available at: https://doi.org/10.1080/02684520701200772.
Sims, J.E. (2006) ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, 19(2), pp. 195–217. Available at: https://doi.org/10.1080/08850600500483657.
Spielmann, K. (2012) ‘Strengthening Intelligence Threat Analysis’, International Journal of Intelligence and CounterIntelligence, 25(1), pp. 19–43. Available at: https://doi.org/10.1080/08850607.2012.623035.
Spielmann, K. (2014) ‘Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration’, International Journal of Intelligence and CounterIntelligence, 27(1), pp. 132–155. Available at: https://doi.org/10.1080/08850607.2014.842810.
Steven Lukes (2006) ‘Liberal Democratic Torture’, British Journal of Political Science, 36(1), pp. 1–16. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313.
Strachan-Morris, D. (2012) ‘Threat and Risk: What Is the Difference and Why Does It Matter?’, Intelligence and National Security, 27(2), pp. 172–186. Available at: https://doi.org/10.1080/02684527.2012.661641.
Telegraph (no date) MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched. Available at: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html.
The Failure by Thomas Powers | The New York Review of Books (no date). Available at: http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false.
Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian (no date). Available at: http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5.
Torture: Ends, means and barbarity | The Economist (2003). Available at: http://www.economist.com/node/1522792.
Torture prosecutions against MI5 and MI6 unlikely to be pursued (no date). Available at: http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6.
UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies (no date). Available at: https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf.
Uri Bar-Joseph and Arie W. Kruglanski (2003) ‘Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise’, Political Psychology, 24(1), pp. 75–99. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3792511.
‘US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings’ (no date). Available at: https://homeland.house.gov/sites/homeland.house.gov/files/documents/Boston-Bombings-Report.pdf.
U.S. Senate Select Committee on Intelligence (no date). Available at: http://www.intelligence.senate.gov/.
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program (no date). US Senate Select Committee on Intelligence. Available at: http://www.intelligence.senate.gov/study2014.html.
‘Watching “Zero Dark Thirty” with the CIA: Separating Fact from Fiction’ (no date). American Enterprise Institute. Available at: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf.
Zegart, A. (2007) ‘9/11 and the FBI: The organizational roots of failure’, Intelligence and National Security, 22(2), pp. 165–184. Available at: https://doi.org/10.1080/02684520701415123.