[1]
7/7 leader: more evidence reveals what police knew | UK news | The Guardian: http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3.
[2]
9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States: 2004. http://www.9-11commission.gov/.
[3]
Adamsky, D.P. 2005. Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1. Journal of Strategic Studies. 28, 5 (Oct. 2005), 803–831. https://doi.org/10.1080/01402390500393977.
[4]
Aid, M.M. and Wiebes, C. 2001. Introduction on The Importance of Signals Intelligence in the Cold War. Intelligence and National Security. 16, 1 (Mar. 2001), 1–26. https://doi.org/10.1080/714002838.
[5]
Alex J. Bellamy 2006. No Pain, No Gain? Torture and Ethics in the War on Terror. International Affairs (Royal Institute of International Affairs 1944-). 82, 1 (2006), 1944–148.
[6]
All Party Parliamentary Group on Extraordinary Rendition: http://www.extraordinaryrendition.org/.
[7]
Articles on Rendition at The Guardian: http://www.guardian.co.uk/world/rendition.
[8]
Barbara Harlow ‘Extraordinary renditions’: tales of Guantánamo, a review article. 52, 1–29.
[9]
Bauman, Z. et al. 2014. After Snowden: Rethinking the Impact of Surveillance. International Political Sociology. 8, 2 (June 2014), 121–144. https://doi.org/10.1111/ips.12048.
[10]
Bellaby, R. 2012. What’s the Harm? The Ethics of Intelligence Collection. Intelligence and National Security. 27, 1 (Feb. 2012), 93–117. https://doi.org/10.1080/02684527.2012.621600.
[11]
Boraz, S.C. 2006. Establishing Democratic Control of Intelligence in Colombia. International Journal of Intelligence and CounterIntelligence. 19, 1 (Jan. 2006), 84–109. https://doi.org/10.1080/08850600500177168.
[12]
Borch, F.L. 2003. Comparing Pearl Harbor and ‘9/11’: Intelligence Failure? American Unpreparedness? Military Responsibility? The Journal of Military History. 67, 3 (2003), 845–860. https://doi.org/10.1353/jmh.2003.0201.
[13]
Byman, D. 2014. The Intelligence War on Terrorism. Intelligence and National Security. 29, 6 (Nov. 2014), 837–863. https://doi.org/10.1080/02684527.2013.851876.
[14]
Canadian Security Intelligence Review Committee: http://www.sirc-csars.gc.ca/index-eng.html.
[15]
Canton, B. 2008. The Active Management of Uncertainty. International Journal of Intelligence and CounterIntelligence. 21, 3 (May 2008), 487–518. https://doi.org/10.1080/08850600802046939.
[16]
Champion, B. 2008. Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations. International Journal of Intelligence and CounterIntelligence. 21, 3 (May 2008), 530–564. https://doi.org/10.1080/08850600701651268.
[17]
Chapter Eight - The Torture Debate: A Perspective from the United Kingdom: 2008. http://www.palgraveconnect.com.ezproxy3.lib.le.ac.uk/pc/doifinder/10.1057/9780230583542.
[18]
Cogan, C. 2004. Hunters not Gatherers: Intelligence in the Twenty-First Century. Intelligence and National Security. 19, 2 (June 2004), 304–321. https://doi.org/10.1080/0268452042000302010.
[19]
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction: http://govinfo.library.unt.edu/wmd/about.html.
[20]
‘Confidential Informants in National Security Investigations’ by Daniel V. Ward: http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/.
[21]
Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005: 2009. https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0.
[22]
Danchev, A. 2004. The Reckoning: Official Inquiries and the Iraq War. Intelligence and National Security. 19, 3 (Sept. 2004), 436–466. https://doi.org/10.1080/0268452042000316232.
[23]
David J. Garrow 1988. FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects. The Public Historian. 10, 4 (1988), 5–18.
[24]
David Kahn 2006. The Rise of Intelligence. Foreign Affairs. 85, 5 (2006).
[25]
Davies, P. 2004. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 17, 3 (Oct. 2004), 495–520. https://doi.org/10.1080/0955757042000298188.
[26]
Dennis M. Gormley 2011. The Limits of Intelligence: Iraq’s Lessons. (2011). https://doi.org/10.1080/00396338.2004.9688605.
[27]
Diamond, J.M. 2001. Re-examining Problems and Prospects in U.S. Imagery Intelligence. International Journal of Intelligence and CounterIntelligence. 14, 1 (Jan. 2001), 1–24. https://doi.org/10.1080/08850600150501308.
[28]
Díaz Fernández, A.M. 2006. Halfway down the road to supervision of the Spanish intelligence services. Intelligence and National Security. 21, 3 (June 2006), 440–456. https://doi.org/10.1080/02684520600750687.
[29]
Dunn Cavelty, M. and Mauer, V. 2009. Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence. Security Dialogue. 40, 2 (Apr. 2009), 123–144. https://doi.org/10.1177/0967010609103071.
[30]
Dupont, A. 2003. Intelligence for the Twenty-First Century. Intelligence and National Security. 18, 4 (Dec. 2003), 15–39. https://doi.org/10.1080/02684520310001688862.
[31]
Erskine, T. 2004. ‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering. Intelligence and National Security. 19, 2 (June 2004), 359–381. https://doi.org/10.1080/0268452042000302047.
[32]
Estimates and Influence: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html.
[33]
Evans, G. 2009. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 9, 1 (Mar. 2009), 22–46. https://doi.org/10.1080/14702430701811987.
[34]
Farson, S. 2000. Parliament and its servants: Their role in scrutinizing Canadian intelligence. Intelligence and National Security. 15, 2 (June 2000), 225–258. https://doi.org/10.1080/02684520008432609.
[35]
Friedman, J.A. and Zeckhauser, R. 2012. Assessing Uncertainty in Intelligence. Intelligence and National Security. 27, 6 (Dec. 2012), 824–847. https://doi.org/10.1080/02684527.2012.708275.
[36]
Gendron, A. 2005. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 18, 3 (Oct. 2005), 398–434. https://doi.org/10.1080/08850600590945399.
[37]
Gentry, J.A. 2015. Warning Analysis: Focusing on Perceptions of Vulnerability. International Journal of Intelligence and CounterIntelligence. 28, 1 (Jan. 2015), 64–88. https://doi.org/10.1080/08850607.2014.962354.
[38]
Gill, P. 2007. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 22, 1 (Feb. 2007), 14–37. https://doi.org/10.1080/02684520701200756.
[39]
Gill, P. 2007. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 22, 1 (Feb. 2007), 14–37. https://doi.org/10.1080/02684520701200756.
[40]
Gill, P. 2012. Intelligence, Threat, Risk and the Challenge of Oversight. Intelligence and National Security. 27, 2 (Apr. 2012), 206–222. https://doi.org/10.1080/02684527.2012.661643.
[41]
Gill, P. 2009. Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security. 24, 1 (Feb. 2009), 78–102. https://doi.org/10.1080/02684520902756929.
[42]
Gill, P. 2009. Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security. 24, 1 (Feb. 2009), 78–102. https://doi.org/10.1080/02684520902756929.
[43]
Gill, Peter and Peter Gill & Mark Phythian 2006. Chapter 1: ‘What is Intelligence?’ (inc. notes). Intelligence in an insecure world. Polity Press.
[44]
Glees, A. and Davies, P.H.J. 2006. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 21, 5 (Oct. 2006), 848–883. https://doi.org/10.1080/02684520600957787.
[45]
Goodman, M.A. 2003. 9/11: The Failure of Strategic Intelligence. Intelligence and National Security. 18, 4 (Dec. 2003), 59–71. https://doi.org/10.1080/02684520310001688871.
[46]
Hastedt, G. 2013. The Politics of Intelligence and the Politicization of Intelligence: The American Experience. Intelligence and National Security. 28, 1 (Feb. 2013), 5–31. https://doi.org/10.1080/02684527.2012.749062.
[47]
Hatlebrekke, K.A. and Smith, M.L.R. 2010. Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure. Intelligence and National Security. 25, 2 (Apr. 2010), 147–182. https://doi.org/10.1080/02684527.2010.489274.
[48]
Heazle, M. 2010. Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters. Intelligence and National Security. 25, 3 (June 2010), 290–308. https://doi.org/10.1080/02684527.2010.489780.
[49]
Hedley, J.H. 2005. Learning from Intelligence Failures. International Journal of Intelligence and CounterIntelligence. 18, 3 (Oct. 2005), 435–450. https://doi.org/10.1080/08850600590945416.
[50]
Herman, M. 2004. Ethics and Intelligence after September 2001. Intelligence and National Security. 19, 2 (June 2004), 342–358. https://doi.org/10.1080/0268452042000302038.
[51]
Herman, M. 2011. What Difference Did It Make? Intelligence and National Security. 26, 6 (Dec. 2011), 886–901. https://doi.org/10.1080/02684527.2011.619802.
[52]
Heuer, R. Psychology of Intelligence Analysis.
[53]
Heuer, R.J. 2005. Limits of Intelligence Analysis. Orbis. 49, 1 (Dec. 2005), 75–94. https://doi.org/10.1016/j.orbis.2004.10.007.
[54]
Hillebrand, C. 2012. The Role of News Media in Intelligence Oversight. Intelligence and National Security. 27, 5 (Oct. 2012), 689–706. https://doi.org/10.1080/02684527.2012.708521.
[55]
History | MI5 - The Security Service: https://www.mi5.gov.uk/history.
[56]
How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian: http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7.
[57]
Hulnick, A.S. 2006. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 21, 6 (Dec. 2006), 959–979. https://doi.org/10.1080/02684520601046291.
[58]
Human Rights Watch 2009. Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan.
[59]
Ian Leigh, H.B. Democratic Accountability of Intelligence Services. SIPRI Yearbook 2007.
[60]
Internet jihad: A world wide web of terror | The Economist: http://www.economist.com/node/9472498.
[61]
Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency: https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm.
[62]
James Gaskarth 2011. Entangling alliances? The UK’s complicity in torture in the global war on terrorism.
[63]
Jane Mayer and The New Yorker, 2005 2005. OUTSOURCING TORTURE. 81, 1 (Feb. 2005).
[64]
Jervis, R. 2006. Reports, politics, and intelligence failures: The case of Iraq. Journal of Strategic Studies. 29, 1 (2006), 3–52. https://doi.org/10.1080/01402390600566282.
[65]
JOHNSON, L. 2003. Bricks and Mortar for a Theory of Intelligence*. Comparative Strategy. 22, 1 (Jan. 2003), 1–28. https://doi.org/10.1080/01495930390130481.
[66]
Johnson, L. 2010. Evaluating "Humint”: The Role of Foreign Agents in U.S. Security. Comparative Strategy. 29, 4 (Oct. 2010), 308–332. https://doi.org/10.1080/01495933.2010.509635.
[67]
Johnson, L.K. et al. 2014. An                              Special Forum: Implications of the Snowden Leaks. Intelligence and National Security. 29, 6 (Nov. 2014), 793–810. https://doi.org/10.1080/02684527.2014.946242.
[68]
Johnson, L.K. 2008. Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate. Intelligence and National Security. 23, 3 (June 2008), 333–370. https://doi.org/10.1080/02684520802121257.
[69]
Johnson, L.K. 2011. National Security Intelligence in the United States: A Performance Checklist. Intelligence and National Security. 26, 5 (Oct. 2011), 607–615. https://doi.org/10.1080/02684527.2011.604198.
[70]
JOHNSON, L.K. 2003. Preface to a Theory of Strategic Intelligence. International Journal of Intelligence and CounterIntelligence. 16, 4 (Oct. 2003), 638–663. https://doi.org/10.1080/716100470.
[71]
Johnson, L.K. 2008. The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability. Intelligence and National Security. 23, 2 (2008), 198–225. https://doi.org/10.1080/02684520801977337.
[72]
Julie Clarke, M.B. 2005. Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable. (2005).
[73]
Julie Clarke, M.B. 2006. Tortured Responses (A Reply to Our Critics). (2006).
[74]
Kahn, D. 2001. An historical theory of intelligence. Intelligence and National Security. 16, 3 (Sept. 2001), 79–92. https://doi.org/10.1080/02684520412331306220.
[75]
Kahn, D. The Intelligence Failure of Pearl Harbor, Foreign Affairs.
[76]
Kern, G. 2009. Torture and Intelligence in the Global War on Terror. Intelligence and National Security. 24, 3 (June 2009), 429–457. https://doi.org/10.1080/02684520903037022.
[77]
LEFEBVRE, S. 2004. A Look at Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 17, 2 (Jan. 2004), 231–264. https://doi.org/10.1080/08850600490274908.
[78]
Leigh, I. 2012. Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11. Intelligence and National Security. 27, 5 (Oct. 2012), 722–738. https://doi.org/10.1080/02684527.2012.708525.
[79]
Lucas, S. 2011. Recognising Politicization: The CIA and the Path to the 2003 War in Iraq. Intelligence and National Security. 26, 2–3 (Apr. 2011), 203–227. https://doi.org/10.1080/02684527.2011.559141.
[80]
Marrin, S. 2012. Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security. 27, 6 (Dec. 2012), 896–912. https://doi.org/10.1080/02684527.2012.699290.
[81]
MARRIN, S. 2004. Preventing Intelligence Failures by Learning from the Past. International Journal of Intelligence and CounterIntelligence. 17, 4 (Dec. 2004), 655–672. https://doi.org/10.1080/08850600490496452.
[82]
Marrin, S. 2011. The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis. Intelligence and National Security. 26, 2–3 (Apr. 2011), 182–202. https://doi.org/10.1080/02684527.2011.559140.
[83]
MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html.
[84]
Michael Warner (eds) 2001. Central Intelligence Origin and Evolution in the US.
[85]
Moran, J. 2010. Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security. 25, 1 (Feb. 2010), 1–23. https://doi.org/10.1080/02684521003588070.
[86]
Moran, J. 2010. Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security. 25, 1 (Feb. 2010), 1–23. https://doi.org/10.1080/02684521003588070.
[87]
Moran, J. and Phythian, M. 2008. Intelligence, security and policing post-9/11: The UK’s response to the war on terror. Palgrave Macmillan.
[88]
Müller-Wille, B. 2006. Improving the democratic accountability of EU intelligence. Intelligence and National Security. 21, 1 (Feb. 2006), 100–128. https://doi.org/10.1080/02684520600568394.
[89]
National security and intelligence - Inside Government - GOV.UK: https://www.gov.uk/government/organisations/national-security.
[90]
Odom, W.E. 2008. Intelligence Analysis. Intelligence and National Security. 23, 3 (June 2008), 316–332. https://doi.org/10.1080/02684520802121216.
[91]
Omand, D. et al. 2012. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 27, 6 (Dec. 2012), 801–823. https://doi.org/10.1080/02684527.2012.716965.
[92]
Omand GCB, S.D. 2006. Ethical Guidelines in Using Secret Intelligence for Public Security. Cambridge Review of International Affairs. 19, 4 (Dec. 2006), 613–628. https://doi.org/10.1080/09557570601003338.
[93]
Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction: 2003. http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm.
[94]
Patterson, E. and Casale, T. 2005. Targeting Terror: The Ethical and Practical Implications of Targeted Killing. International Journal of Intelligence and CounterIntelligence. 18, 4 (Dec. 2005), 638–652. https://doi.org/10.1080/08850600590945407.
[95]
Paul R. Pillar 2006. Intelligence, Policy, and the War in Iraq. Foreign Affairs. 85, 2 (2006), 15–27.
[96]
Peter Gill 2009. The Intelligence and Security Committee and the Challenge of Security Networks. Review of International Studies. 35, 4 (2009).
[97]
Pfaff, T. and Tiel, J.R. 2004. The ethics of espionage. Journal of Military Ethics. 3, 1 (Mar. 2004), 1–15. https://doi.org/10.1080/15027570310004447.
[98]
Philip Alston 2010. Study on Targeted Killings, UN General Assembly Human Rights Council.
[99]
Phythian, M. 2012. Policing Uncertainty: Intelligence, Security and Risk. Intelligence and National Security. 27, 2 (Apr. 2012), 187–205. https://doi.org/10.1080/02684527.2012.661642.
[100]
Phythian, M. 2007. The British experience with intelligence accountability. Intelligence and National Security. 22, 1 (Feb. 2007), 75–99. https://doi.org/10.1080/02684520701200822.
[101]
Phythian, M. 2006. The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction. Politics  Policy. 34, 2 (June 2006), 400–424. https://doi.org/10.1111/j.1747-1346.2006.00019.x.
[102]
Phythian, Mark and Stephen, Gill Intelligence Theory : Key Questions and Debates. Intelligence Theory : Key Questions and Debates.
[103]
Pillar, P.R. 2006. Good literature and bad history: The 9/11 commission’s tale of strategic intelligence. Intelligence and National Security. 21, 6 (Dec. 2006), 1022–1044. https://doi.org/10.1080/02684520601046366.
[104]
Poynting, S. 2010. Render unto Caesar. Criminal Justice Matters. 82, 1 (Dec. 2010), 14–15. https://doi.org/10.1080/09627251.2010.525919.
[105]
Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency: 2007. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html.
[106]
Press Conference: 2002. https://www.nato.int/docu/speech/2002/s020606g.htm.
[107]
Press Conference: 2002. https://www.nato.int/docu/speech/2002/s020606g.htm.
[108]
Puyvelde, D.V. 2013. Intelligence Accountability and the Role of Public Interest Groups in the United States. Intelligence and National Security. 28, 2 (Apr. 2013), 139–158. https://doi.org/10.1080/02684527.2012.735078.
[109]
Quinlan, M. 2007. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 22, 1 (Feb. 2007), 1–13. https://doi.org/10.1080/02684520701200715.
[110]
Report of the Inquiry into Australian Intelligence Agencies (Flood Report): https://catalogue.nla.gov.au/Record/3308786.
[111]
Richard J. Aldrich 2004. Transatlantic Intelligence and Security Cooperation. International Affairs (Royal Institute of International Affairs 1944-). 80, 4 (2004), 1944–753.
[112]
Richard K. Betts 1978. Analysis, War, and Decision: Why Intelligence Failures Are inevitable. World Politics. 31, 1 (1978), 61–89.
[113]
Richard K. Betts 2002. Fixing Intelligence. Foreign Affairs. 81, 1 (2002), 43–59.
[114]
Richard L. Russell 2002. CIA’s Strategic Intelligence in Iraq. Political Science Quarterly. 117, 2 (2002), 191–207.
[115]
Richards, J. 2012. Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy. Intelligence and National Security. 27, 5 (Oct. 2012), 761–780. https://doi.org/10.1080/02684527.2012.708528.
[116]
Roberts, A. 2007. Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival. 49, 1 (Mar. 2007), 199–212. https://doi.org/10.1080/00396330701254693.
[117]
Roberts, A. 2007. Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival. 49, 1 (Mar. 2007), 199–212. https://doi.org/10.1080/00396330701254693.
[118]
Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian: http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy.
[119]
Russell, R.L. 2005. A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence and National Security. 20, 3 (Sept. 2005), 466–485. https://doi.org/10.1080/02684520500268954.
[120]
Russia: Boston bombing report is effort to ‘whitewash US intelligence failures’ - RT News: http://rt.com/news/russia-boston-bombing-report-180/.
[121]
Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com: http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0.
[122]
Schwarz, F.A.O. 2007. The Church Committee and a new era of intelligence oversight. Intelligence and National Security. 22, 2 (2007), 270–297. https://doi.org/10.1080/02684520701303881.
[123]
Scott, L. 2004. Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security. 19, 2 (June 2004), 322–341. https://doi.org/10.1080/0268452042000302029.
[124]
Scott, L. 2004. Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security. 19, 2 (June 2004), 322–341. https://doi.org/10.1080/0268452042000302029.
[125]
Scott, L. and Jackson, P. 2004. The Study of Intelligence in Theory and Practice. Intelligence and National Security. 19, 2 (June 2004), 139–169. https://doi.org/10.1080/0268452042000302930.
[126]
Select Committee on Intelligence United States Senate 2004. Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq.
[127]
Sherman Kent and the Profession of Intelligence Analysis: https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm.
[128]
Shore, J.J.M. 2006. Intelligence Review and Oversight in Post-9/11 Canada. International Journal of Intelligence and CounterIntelligence. 19, 3 (2006), 456–479. https://doi.org/10.1080/08850600600656350.
[129]
Sims, J. 2007. Intelligence to counter terror: The importance of all-source fusion. Intelligence and National Security. 22, 1 (Feb. 2007), 38–56. https://doi.org/10.1080/02684520701200772.
[130]
Sims, J.E. 2006. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 19, 2 (May 2006), 195–217. https://doi.org/10.1080/08850600500483657.
[131]
Spielmann, K. 2012. Strengthening Intelligence Threat Analysis. International Journal of Intelligence and CounterIntelligence. 25, 1 (Mar. 2012), 19–43. https://doi.org/10.1080/08850607.2012.623035.
[132]
Spielmann, K. 2014. Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration. International Journal of Intelligence and CounterIntelligence. 27, 1 (Mar. 2014), 132–155. https://doi.org/10.1080/08850607.2014.842810.
[133]
Steven Lukes 2006. Liberal Democratic Torture. British Journal of Political Science. 36, 1 (2006), 1–16.
[134]
Strachan-Morris, D. 2012. Threat and Risk: What Is the Difference and Why Does It Matter? Intelligence and National Security. 27, 2 (Apr. 2012), 172–186. https://doi.org/10.1080/02684527.2012.661641.
[135]
The Failure by Thomas Powers | The New York Review of Books: http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false.
[136]
Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian: http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5.
[137]
Torture : A Collection: 2004. https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER.
[138]
Torture and Democracy: 2007. http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494.
[139]
Torture: Ends, means and barbarity | The Economist: 2003. http://www.economist.com/node/1522792.
[140]
Torture prosecutions against MI5 and MI6 unlikely to be pursued: http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6.
[141]
Tortured Reasoning: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655.
[142]
UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies: https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf.
[143]
Uri Bar-Joseph and Arie W. Kruglanski 2003. Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise. Political Psychology. 24, 1 (2003), 75–99.
[144]
U.S. Senate Select Committee on Intelligence: http://www.intelligence.senate.gov/.
[145]
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program: http://www.intelligence.senate.gov/study2014.html.
[146]
Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency: 2002. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html.
[147]
Zegart, A. 2007. 9/11 and the FBI: The organizational roots of failure. Intelligence and National Security. 22, 2 (Apr. 2007), 165–184. https://doi.org/10.1080/02684520701415123.
[148]
A Risk Management Standard. Institute of Risk Management.
[149]
2009. A Symposium on Intelligence Ethics. Intelligence and National Security. 24, 3 (2009), 366–386. https://doi.org/10.1080/02684520903036958.
[150]
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis. Central Intelligence Agency.
[151]
2013. Making Sense of Snowden. The Political Quarterly. 84, 4 (Oct. 2013), 433–435. https://doi.org/10.1111/j.1467-923X.2013.12053.x.
[152]
OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings.
[153]
2004. Review of Intelligence on Weapons of Mass Destruction - Butler Report.
[154]
US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings.
[155]
Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction. American Enterprise Institute.