7/7 leader: more evidence reveals what police knew | UK news | The Guardian. (n.d.). http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3
9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States. (2004). http://www.9-11commission.gov/
A Risk Management Standard. (n.d.). Institute of Risk Management. https://theirm.org/media/886059/ARMS_2002_IRM.pdf
A Symposium on Intelligence Ethics. (2009). Intelligence and National Security, 24(3), 366–386. https://doi.org/10.1080/02684520903036958
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis. (n.d.). Central Intelligence Agency. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
Adamsky, D. P. (2005). Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1. Journal of Strategic Studies, 28(5), 803–831. https://doi.org/10.1080/01402390500393977
Aid, M. M., & Wiebes, C. (2001). Introduction on The Importance of Signals Intelligence in the Cold War. Intelligence and National Security, 16(1), 1–26. https://doi.org/10.1080/714002838
Alan Dershowitz. (n.d.-a). Tortured Reasoning. http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655
Alex J. Bellamy. (2006). No Pain, No Gain? Torture and Ethics in the War on Terror. International Affairs (Royal Institute of International Affairs 1944-), 82(1), 1944–148. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133
All Party Parliamentary Group on Extraordinary Rendition. (n.d.). http://www.extraordinaryrendition.org/
Articles on Rendition at The Guardian. (n.d.). http://www.guardian.co.uk/world/rendition
Barbara Harlow. (n.d.). ‘Extraordinary renditions’: tales of Guantánamo, a review article. 52, 1–29. http://rac.sagepub.com.ezproxy3.lib.le.ac.uk/content/52/4.toc
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J. (2014). After Snowden: Rethinking the Impact of Surveillance. International Political Sociology, 8(2), 121–144. https://doi.org/10.1111/ips.12048
Bellaby, R. (2012). What’s the Harm? The Ethics of Intelligence Collection. Intelligence and National Security, 27(1), 93–117. https://doi.org/10.1080/02684527.2012.621600
Boraz, S. C. (2006). Establishing Democratic Control of Intelligence in Colombia. International Journal of Intelligence and CounterIntelligence, 19(1), 84–109. https://doi.org/10.1080/08850600500177168
Borch, F. L. (2003). Comparing Pearl Harbor and ‘9/11’: Intelligence Failure? American Unpreparedness? Military Responsibility? The Journal of Military History, 67(3), 845–860. https://doi.org/10.1353/jmh.2003.0201
Byman, D. (2014). The Intelligence War on Terrorism. Intelligence and National Security, 29(6), 837–863. https://doi.org/10.1080/02684527.2013.851876
Canadian Security Intelligence Review Committee. (n.d.). http://www.sirc-csars.gc.ca/index-eng.html
Canton, B. (2008). The Active Management of Uncertainty. International Journal of Intelligence and CounterIntelligence, 21(3), 487–518. https://doi.org/10.1080/08850600802046939
Champion, B. (2008). Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations. International Journal of Intelligence and CounterIntelligence, 21(3), 530–564. https://doi.org/10.1080/08850600701651268
Cogan, C. (2004). Hunters not Gatherers: Intelligence in the Twenty-First Century. Intelligence and National Security, 19(2), 304–321. https://doi.org/10.1080/0268452042000302010
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. (n.d.). http://govinfo.library.unt.edu/wmd/about.html
‘Confidential Informants in National Security Investigations’ by Daniel V. Ward. (n.d.). http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/
Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005. (2009). https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0
Danchev, A. (2004). The Reckoning: Official Inquiries and the Iraq War. Intelligence and National Security, 19(3), 436–466. https://doi.org/10.1080/0268452042000316232
Darius Rejali. (2007a). Torture and Democracy. http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494
David J. Garrow. (1988). FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects. The Public Historian, 10(4), 5–18. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3377831
David Kahn. (2006). The Rise of Intelligence. Foreign Affairs, 85(5). http://ezproxy.lib.le.ac.uk/login?url=https://www.jstor.org/stable/20032075?origin=crossref&seq=1#metadata_info_tab_contents
Davies, P. (2004). Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs, 17(3), 495–520. https://doi.org/10.1080/0955757042000298188
Dennis M. Gormley. (2011a). The Limits of Intelligence: Iraq’s Lessons. https://doi.org/10.1080/00396338.2004.9688605
Diamond, J. M. (2001). Re-examining Problems and Prospects in U.S. Imagery Intelligence. International Journal of Intelligence and CounterIntelligence, 14(1), 1–24. https://doi.org/10.1080/08850600150501308
Díaz Fernández, A. M. (2006). Halfway down the road to supervision of the Spanish intelligence services. Intelligence and National Security, 21(3), 440–456. https://doi.org/10.1080/02684520600750687
Douglas J. MacEachin. (2007b). Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html
Dunn Cavelty, M., & Mauer, V. (2009). Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence. Security Dialogue, 40(2), 123–144. https://doi.org/10.1177/0967010609103071
Dupont, A. (2003). Intelligence for the Twenty-First Century. Intelligence and National Security, 18(4), 15–39. https://doi.org/10.1080/02684520310001688862
Erskine, T. (2004). ‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering. Intelligence and National Security, 19(2), 359–381. https://doi.org/10.1080/0268452042000302047
Evans, G. (2009). Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies, 9(1), 22–46. https://doi.org/10.1080/14702430701811987
Farson, S. (2000). Parliament and its servants: Their role in scrutinizing Canadian intelligence. Intelligence and National Security, 15(2), 225–258. https://doi.org/10.1080/02684520008432609
Friedman, J. A., & Zeckhauser, R. (2012). Assessing Uncertainty in Intelligence. Intelligence and National Security, 27(6), 824–847. https://doi.org/10.1080/02684527.2012.708275
Gendron, A. (2005). Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence, 18(3), 398–434. https://doi.org/10.1080/08850600590945399
Gentry, J. A. (2015). Warning Analysis: Focusing on Perceptions of Vulnerability. International Journal of Intelligence and CounterIntelligence, 28(1), 64–88. https://doi.org/10.1080/08850607.2014.962354
Gill, P. (2007a). Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security, 22(1), 14–37. https://doi.org/10.1080/02684520701200756
Gill, P. (2007b). Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security, 22(1), 14–37. https://doi.org/10.1080/02684520701200756
Gill, P. (2009a). Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security, 24(1), 78–102. https://doi.org/10.1080/02684520902756929
Gill, P. (2009b). Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security, 24(1), 78–102. https://doi.org/10.1080/02684520902756929
Gill, P. (2012). Intelligence, Threat, Risk and the Challenge of Oversight. Intelligence and National Security, 27(2), 206–222. https://doi.org/10.1080/02684527.2012.661643
Gill, Peter & Peter Gill & Mark Phythian. (2006). Chapter 1: ‘What is Intelligence?’ (inc. notes). In Intelligence in an insecure world. Polity Press.
Glees, A., & Davies, P. H. J. (2006). Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security, 21(5), 848–883. https://doi.org/10.1080/02684520600957787
Goodman, M. A. (2003). 9/11: The Failure of Strategic Intelligence. Intelligence and National Security, 18(4), 59–71. https://doi.org/10.1080/02684520310001688871
Hastedt, G. (2013). The Politics of Intelligence and the Politicization of Intelligence: The American Experience. Intelligence and National Security, 28(1), 5–31. https://doi.org/10.1080/02684527.2012.749062
Hatlebrekke, K. A., & Smith, M. L. R. (2010). Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure. Intelligence and National Security, 25(2), 147–182. https://doi.org/10.1080/02684527.2010.489274
Heazle, M. (2010). Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters. Intelligence and National Security, 25(3), 290–308. https://doi.org/10.1080/02684527.2010.489780
Hedley, J. H. (2005). Learning from Intelligence Failures. International Journal of Intelligence and CounterIntelligence, 18(3), 435–450. https://doi.org/10.1080/08850600590945416
Herman, M. (2004). Ethics and Intelligence after September 2001. Intelligence and National Security, 19(2), 342–358. https://doi.org/10.1080/0268452042000302038
Herman, M. (2011). What Difference Did It Make? Intelligence and National Security, 26(6), 886–901. https://doi.org/10.1080/02684527.2011.619802
Heuer, R. (n.d.). Psychology of Intelligence Analysis. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf
Heuer, R. J. (2005). Limits of Intelligence Analysis. Orbis, 49(1), 75–94. https://doi.org/10.1016/j.orbis.2004.10.007
Hillebrand, C. (2012). The Role of News Media in Intelligence Oversight. Intelligence and National Security, 27(5), 689–706. https://doi.org/10.1080/02684527.2012.708521
History | MI5 - The Security Service. (n.d.). https://www.mi5.gov.uk/history
How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian. (n.d.). http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7
Hulnick, A. S. (2006). What’s wrong with the Intelligence Cycle. Intelligence and National Security, 21(6), 959–979. https://doi.org/10.1080/02684520601046291
Human Rights Watch. (2009a). Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan. http://www.hrw.org/reports/2009/11/24/cruel-britannia-0
Ian Leigh, H. B. (n.d.). Democratic Accountability of Intelligence Services. In SIPRI Yearbook 2007. https://www.sipri.org/yearbook/2007/05
Internet jihad: A world wide web of terror | The Economist. (n.d.). http://www.economist.com/node/9472498
Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency. (n.d.). https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm
Jack Davis. (n.d.-b). Sherman Kent and the Profession of Intelligence Analysis. https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm
James Gaskarth. (2011b). Entangling alliances? The UK’s complicity in torture in the global war on terrorism (Vol. 87, Issue 4). http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1111/j.1468-2346.2011.01012.x
Jane Mayer, & The New Yorker, 2005. (2005). OUTSOURCING TORTURE. 81(1). http://gl9sn3dh2u.search.serialssolutions.com/?V=1.0&N=50&L=GL9SN3DH2U&S=A_T_B&C=new+yorker
Jervis, R. (2006). Reports, politics, and intelligence failures: The case of Iraq. Journal of Strategic Studies, 29(1), 3–52. https://doi.org/10.1080/01402390600566282
JOHNSON, L. (2003). Bricks and Mortar for a Theory of Intelligence*. Comparative Strategy, 22(1), 1–28. https://doi.org/10.1080/01495930390130481
Johnson, L. (2010). Evaluating "Humint”: The Role of Foreign Agents in U.S. Security. Comparative Strategy, 29(4), 308–332. https://doi.org/10.1080/01495933.2010.509635
JOHNSON, L. K. (2003). Preface to a Theory of Strategic Intelligence. International Journal of Intelligence and CounterIntelligence, 16(4), 638–663. https://doi.org/10.1080/716100470
Johnson, L. K. (2008a). Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate. Intelligence and National Security, 23(3), 333–370. https://doi.org/10.1080/02684520802121257
Johnson, L. K. (2008b). The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability. Intelligence and National Security, 23(2), 198–225. https://doi.org/10.1080/02684520801977337
Johnson, L. K. (2011). National Security Intelligence in the United States: A Performance Checklist. Intelligence and National Security, 26(5), 607–615. https://doi.org/10.1080/02684527.2011.604198
Johnson, L. K., Aldrich, R. J., Moran, C., Barrett, D. M., Hastedt, G., Jervis, R., Krieger, W., McDermott, R., Omand, D., Phythian, M., & Wark, W. K. (2014). An                              Special Forum: Implications of the Snowden Leaks. Intelligence and National Security, 29(6), 793–810. https://doi.org/10.1080/02684527.2014.946242
Julie Clarke, M. B. (2005). Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable. http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr39&id=593&collection=journals&index=journals/usflr
Julie Clarke, M. B. (2006). Tortured Responses (A Reply to Our Critics). http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr40&id=711&collection=journals&index=journals/usflr
Kahn, D. (n.d.). The Intelligence Failure of Pearl Harbor, Foreign Affairs. http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/fora70&id=1004&collection=journals&index=journals/fora
Kahn, D. (2001). An historical theory of intelligence. Intelligence and National Security, 16(3), 79–92. https://doi.org/10.1080/02684520412331306220
Kern, G. (2009). Torture and Intelligence in the Global War on Terror. Intelligence and National Security, 24(3), 429–457. https://doi.org/10.1080/02684520903037022
LEFEBVRE, S. (2004). A Look at Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 17(2), 231–264. https://doi.org/10.1080/08850600490274908
Leigh, I. (2012). Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11. Intelligence and National Security, 27(5), 722–738. https://doi.org/10.1080/02684527.2012.708525
Lucas, S. (2011). Recognising Politicization: The CIA and the Path to the 2003 War in Iraq. Intelligence and National Security, 26(2–3), 203–227. https://doi.org/10.1080/02684527.2011.559141
Making Sense of Snowden. (2013). The Political Quarterly, 84(4), 433–435. https://doi.org/10.1111/j.1467-923X.2013.12053.x
MARRIN, S. (2004). Preventing Intelligence Failures by Learning from the Past. International Journal of Intelligence and CounterIntelligence, 17(4), 655–672. https://doi.org/10.1080/08850600490496452
Marrin, S. (2011). The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis. Intelligence and National Security, 26(2–3), 182–202. https://doi.org/10.1080/02684527.2011.559140
Marrin, S. (2012). Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security, 27(6), 896–912. https://doi.org/10.1080/02684527.2012.699290
Michael Warner. (2002). Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html
Michael Warner (eds). (2001). Central Intelligence Origin and Evolution in the US. https://www.cia.gov/static/2116cfec5d478f1e6fcc67f910759625/Origin-and-Evolution.pdf
Moran, J. (2010a). Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security, 25(1), 1–23. https://doi.org/10.1080/02684521003588070
Moran, J. (2010b). Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security, 25(1), 1–23. https://doi.org/10.1080/02684521003588070
Moran, J., & Phythian, M. (2008). Intelligence, security and policing post-9/11: The UK’s response to the war on terror. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/book/10.1057/9780230583542
Müller-Wille, B. (2006). Improving the democratic accountability of EU intelligence. Intelligence and National Security, 21(1), 100–128. https://doi.org/10.1080/02684520600568394
National security and intelligence - Inside Government - GOV.UK. (n.d.). https://www.gov.uk/government/organisations/national-security
Odom, W. E. (2008). Intelligence Analysis. Intelligence and National Security, 23(3), 316–332. https://doi.org/10.1080/02684520802121216
OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings. (n.d.). http://www.justice.gov/oig/reports/2014/s1404.pdf
Omand, D., Bartlett, J., & Miller, C. (2012). Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security, 27(6), 801–823. https://doi.org/10.1080/02684527.2012.716965
Omand GCB, S. D. (2006). Ethical Guidelines in Using Secret Intelligence for Public Security. Cambridge Review of International Affairs, 19(4), 613–628. https://doi.org/10.1080/09557570601003338
Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction. (2003). http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm
Patterson, E., & Casale, T. (2005). Targeting Terror: The Ethical and Practical Implications of Targeted Killing. International Journal of Intelligence and CounterIntelligence, 18(4), 638–652. https://doi.org/10.1080/08850600590945407
Paul R. Pillar. (2006). Intelligence, Policy, and the War in Iraq. Foreign Affairs, 85(2), 15–27. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20031908
Peter Gill. (2009b). The Intelligence and Security Committee and the Challenge of Security Networks. Review of International Studies, 35(4). http://ezproxy.lib.le.ac.uk/login?url=https://www.cambridge.org/core/journals/review-of-international-studies/article/intelligence-and-security-committee-and-the-challenge-of-security-networks/EE30C2105597F02BA24E95C0CDB46648
Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1–15. https://doi.org/10.1080/15027570310004447
Philip Alston. (2010). Study on Targeted Killings, UN General Assembly Human Rights Council. http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf
Philip N. S. Rumney. (2008). Chapter Eight - The Torture Debate: A Perspective from the United Kingdom. https://doi.org/10.1057/9780230583542              9780230583542 PDF                                                                                      9780230551916 HB                          272 pp
Phythian, M. (2006). The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction. Politics  Policy, 34(2), 400–424. https://doi.org/10.1111/j.1747-1346.2006.00019.x
Phythian, M. (2007). The British experience with intelligence accountability. Intelligence and National Security, 22(1), 75–99. https://doi.org/10.1080/02684520701200822
Phythian, M. (2012). Policing Uncertainty: Intelligence, Security and Risk. Intelligence and National Security, 27(2), 187–205. https://doi.org/10.1080/02684527.2012.661642
Phythian, Mark, & Stephen, Gill. (n.d.). Intelligence Theory : Key Questions and Debates. Intelligence Theory : Key Questions and Debates. http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=nlebk&AN=236476&site=ehost-live
Pillar, P. R. (2006). Good literature and bad history: The 9/11 commission’s tale of strategic intelligence. Intelligence and National Security, 21(6), 1022–1044. https://doi.org/10.1080/02684520601046366
Poynting, S. (2010). Render unto Caesar. Criminal Justice Matters, 82(1), 14–15. https://doi.org/10.1080/09627251.2010.525919
Puyvelde, D. V. (2013). Intelligence Accountability and the Role of Public Interest Groups in the United States. Intelligence and National Security, 28(2), 139–158. https://doi.org/10.1080/02684527.2012.735078
Quinlan, M. (2007). Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security, 22(1), 1–13. https://doi.org/10.1080/02684520701200715
Report of the Inquiry into Australian Intelligence Agencies (Flood Report). (n.d.). https://catalogue.nla.gov.au/Record/3308786
Review of Intelligence on Weapons of Mass Destruction - Butler Report. (2004). https://www.files.ethz.ch/isn/7078/doc_7085_290_en.pdf
Richard J. Aldrich. (2004). Transatlantic Intelligence and Security Cooperation. International Affairs (Royal Institute of International Affairs 1944-), 80(4), 1944–753. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569532
Richard K. Betts. (1978). Analysis, War, and Decision: Why Intelligence Failures Are inevitable. World Politics, 31(1), 61–89. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/2009967
Richard K. Betts. (2002). Fixing Intelligence. Foreign Affairs, 81(1), 43–59. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20033002
Richard L. Russell. (2002). CIA’s Strategic Intelligence in Iraq. Political Science Quarterly, 117(2), 191–207. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/798180
Richard Norton-Taylor. (n.d.-c). Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian. http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy
Richards, J. (2012). Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy. Intelligence and National Security, 27(5), 761–780. https://doi.org/10.1080/02684527.2012.708528
Roberts, A. (2007a). Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival, 49(1), 199–212. https://doi.org/10.1080/00396330701254693
Roberts, A. (2007b). Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival, 49(1), 199–212. https://doi.org/10.1080/00396330701254693
Rumsfeld, D. (2002a, June 6). Press Conference. NATO. https://www.nato.int/docu/speech/2002/s020606g.htm
Rumsfeld, D. (2002b, June 6). Press Conference. NATO. https://www.nato.int/docu/speech/2002/s020606g.htm
Russell, R. L. (2005). A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence and National Security, 20(3), 466–485. https://doi.org/10.1080/02684520500268954
Russia: Boston bombing report is effort to ‘whitewash US intelligence failures’ - RT News. (n.d.). RT News. http://rt.com/news/russia-boston-bombing-report-180/
Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com. (n.d.). http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0
Sanford Levinson (ed). (2004a). Torture : A Collection. https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER
Schwarz, F. A. O. (2007). The Church Committee and a new era of intelligence oversight. Intelligence and National Security, 22(2), 270–297. https://doi.org/10.1080/02684520701303881
Scott, L. (2004a). Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security, 19(2), 322–341. https://doi.org/10.1080/0268452042000302029
Scott, L. (2004b). Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security, 19(2), 322–341. https://doi.org/10.1080/0268452042000302029
Scott, L., & Jackson, P. (2004). The Study of Intelligence in Theory and Practice. Intelligence and National Security, 19(2), 139–169. https://doi.org/10.1080/0268452042000302930
Select Committee on Intelligence United States Senate. (2004b). Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq. http://hdl.handle.net/2027/umn.31951d02406334o
Sherman Kent. (n.d.-d). Estimates and Influence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html
Shore, J. J. M. (2006). Intelligence Review and Oversight in Post-9/11 Canada. International Journal of Intelligence and CounterIntelligence, 19(3), 456–479. https://doi.org/10.1080/08850600600656350
Sims, J. (2007). Intelligence to counter terror: The importance of all-source fusion. Intelligence and National Security, 22(1), 38–56. https://doi.org/10.1080/02684520701200772
Sims, J. E. (2006). Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence, 19(2), 195–217. https://doi.org/10.1080/08850600500483657
Spielmann, K. (2012). Strengthening Intelligence Threat Analysis. International Journal of Intelligence and CounterIntelligence, 25(1), 19–43. https://doi.org/10.1080/08850607.2012.623035
Spielmann, K. (2014). Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration. International Journal of Intelligence and CounterIntelligence, 27(1), 132–155. https://doi.org/10.1080/08850607.2014.842810
Steven Lukes. (2006). Liberal Democratic Torture. British Journal of Political Science, 36(1), 1–16. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313
Strachan-Morris, D. (2012). Threat and Risk: What Is the Difference and Why Does It Matter? Intelligence and National Security, 27(2), 172–186. https://doi.org/10.1080/02684527.2012.661641
Telegraph. (n.d.-e). MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html
The Failure by Thomas Powers | The New York Review of Books. (n.d.). http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false
Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian. (n.d.). http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5
Torture: Ends, means and barbarity | The Economist. (2003). http://www.economist.com/node/1522792
Torture prosecutions against MI5 and MI6 unlikely to be pursued. (n.d.). http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6
UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies. (n.d.). https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf
Uri Bar-Joseph and Arie W. Kruglanski. (2003). Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise. Political Psychology, 24(1), 75–99. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3792511
US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings. (n.d.). https://homeland.house.gov/sites/homeland.house.gov/files/documents/Boston-Bombings-Report.pdf
U.S. Senate Select Committee on Intelligence. (n.d.). http://www.intelligence.senate.gov/
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program. (n.d.). US Senate Select Committee on Intelligence. http://www.intelligence.senate.gov/study2014.html
Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction. (n.d.). American Enterprise Institute. http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf
Zegart, A. (2007). 9/11 and the FBI: The organizational roots of failure. Intelligence and National Security, 22(2), 165–184. https://doi.org/10.1080/02684520701415123