@article{Adamsky_2005, title={Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1}, volume={28}, DOI={10.1080/01402390500393977}, number={5}, journal={Journal of Strategic Studies}, author={Adamsky, Dima P.}, year={2005}, month=oct, pages={803–831} }
@article{Aid_Wiebes_2001, title={Introduction on The Importance of Signals Intelligence in the Cold War}, volume={16}, DOI={10.1080/714002838}, number={1}, journal={Intelligence and National Security}, author={Aid, Matthew M. and Wiebes, Cees}, year={2001}, month=mar, pages={1–26} }
@misc{ title={Tortured Reasoning}, url={http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655}, author={Alan Dershowitz} }
@article{Alex J. Bellamy_2006, title={No Pain, No Gain? Torture and Ethics in the War on Terror}, volume={82}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133}, number={1}, journal={International Affairs (Royal Institute of International Affairs 1944-)}, publisher={Wiley}, author={Alex J. Bellamy}, year={2006}, pages={1944–148} }
@article{Barbara Harlow, title={‘Extraordinary renditions’: tales of Guantánamo, a review article}, volume={52}, url={http://rac.sagepub.com.ezproxy3.lib.le.ac.uk/content/52/4.toc}, author={Barbara Harlow}, pages={1–29} }
@article{Bauman_Bigo_Esteves_Guild_Jabri_Lyon_Walker_2014, title={After Snowden: Rethinking the Impact of Surveillance}, volume={8}, DOI={10.1111/ips.12048}, number={2}, journal={International Political Sociology}, author={Bauman, Zygmunt and Bigo, Didier and Esteves, Paulo and Guild, Elspeth and Jabri, Vivienne and Lyon, David and Walker, R. B. J.}, year={2014}, month=june, pages={121–144} }
@article{Bellaby_2012, title={What’s the Harm? The Ethics of Intelligence Collection}, volume={27}, DOI={10.1080/02684527.2012.621600}, number={1}, journal={Intelligence and National Security}, author={Bellaby, Ross}, year={2012}, month=feb, pages={93–117} }
@article{Boraz_2006, title={Establishing Democratic Control of Intelligence in Colombia}, volume={19}, DOI={10.1080/08850600500177168}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Boraz, Steven C.}, year={2006}, month=jan, pages={84–109} }
@article{Borch_2003, title={Comparing Pearl Harbor and ‘9/11’: Intelligence Failure? American Unpreparedness? Military Responsibility?}, volume={67}, DOI={10.1353/jmh.2003.0201}, number={3}, journal={The Journal of Military History}, author={Borch, Frederic L.}, year={2003}, pages={845–860} }
@article{Byman_2014, title={The Intelligence War on Terrorism}, volume={29}, DOI={10.1080/02684527.2013.851876}, number={6}, journal={Intelligence and National Security}, author={Byman, Daniel}, year={2014}, month=nov, pages={837–863} }
@article{Canton_2008, title={The Active Management of Uncertainty}, volume={21}, DOI={10.1080/08850600802046939}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Canton, Belinda}, year={2008}, month=may, pages={487–518} }
@article{Champion_2008, title={Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations}, volume={21}, DOI={10.1080/08850600701651268}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Champion, Brian}, year={2008}, month=may, pages={530–564} }
@article{Cogan_2004, title={Hunters not Gatherers: Intelligence in the Twenty-First Century}, volume={19}, DOI={10.1080/0268452042000302010}, number={2}, journal={Intelligence and National Security}, author={Cogan, Charles}, year={2004}, month=june, pages={304–321} }
@article{Danchev_2004, title={The Reckoning: Official Inquiries and the Iraq War}, volume={19}, DOI={10.1080/0268452042000316232}, number={3}, journal={Intelligence and National Security}, author={Danchev, Alex}, year={2004}, month=sept, pages={436–466} }
@misc{2007a, title={Torture and Democracy}, url={http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494}, author={Darius Rejali}, year={2007} }
@article{David J. Garrow_1988, title={FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects}, volume={10}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3377831}, number={4}, journal={The Public Historian}, publisher={University of California Press}, author={David J. Garrow}, year={1988}, pages={5–18} }
@article{David Kahn_2006, title={The Rise of Intelligence}, volume={85}, url={http://ezproxy.lib.le.ac.uk/login?url=https://www.jstor.org/stable/20032075?origin=crossref&seq=1#metadata_info_tab_contents}, number={5}, journal={Foreign Affairs}, author={David Kahn}, year={2006} }
@article{Davies_2004, title={Intelligence culture and intelligence failure in Britain and the United States}, volume={17}, DOI={10.1080/0955757042000298188}, number={3}, journal={Cambridge Review of International Affairs}, author={Davies, Philip}, year={2004}, month=oct, pages={495–520} }
@article{2011a, title={The Limits of Intelligence: Iraq’s Lessons}, url={http://ezproxy.lib.le.ac.uk/login?url=https://www.tandfonline.com/doi/abs/10.1080/00396338.2004.9688605}, DOI={10.1080/00396338.2004.9688605}, author={Dennis M. Gormley}, year={2011} }
@article{Diamond_2001, title={Re-examining Problems and Prospects in U.S. Imagery Intelligence}, volume={14}, DOI={10.1080/08850600150501308}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Diamond, John M.}, year={2001}, month=jan, pages={1–24} }
@article{Díaz Fernández_2006, title={Halfway down the road to supervision of the Spanish intelligence services}, volume={21}, DOI={10.1080/02684520600750687}, number={3}, journal={Intelligence and National Security}, author={Díaz Fernández, Antonio M.}, year={2006}, month=june, pages={440–456} }
@misc{2007b, title={Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html}, author={Douglas J. MacEachin}, year={2007} }
@article{Dunn Cavelty_Mauer_2009, title={Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence}, volume={40}, DOI={10.1177/0967010609103071}, number={2}, journal={Security Dialogue}, author={Dunn Cavelty, M. and Mauer, V.}, year={2009}, month=apr, pages={123–144} }
@article{Dupont_2003, title={Intelligence for the Twenty-First Century}, volume={18}, DOI={10.1080/02684520310001688862}, number={4}, journal={Intelligence and National Security}, author={Dupont, Alan}, year={2003}, month=dec, pages={15–39} }
@article{Erskine_2004, title={‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering}, volume={19}, DOI={10.1080/0268452042000302047}, number={2}, journal={Intelligence and National Security}, author={Erskine, Toni}, year={2004}, month=june, pages={359–381} }
@article{Evans_2009, title={Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle}, volume={9}, DOI={10.1080/14702430701811987}, number={1}, journal={Defence Studies}, author={Evans, Geraint}, year={2009}, month=mar, pages={22–46} }
@article{Farson_2000, title={Parliament and its servants: Their role in scrutinizing Canadian intelligence}, volume={15}, DOI={10.1080/02684520008432609}, number={2}, journal={Intelligence and National Security}, author={Farson, Stuart}, year={2000}, month=june, pages={225–258} }
@article{Friedman_Zeckhauser_2012, title={Assessing Uncertainty in Intelligence}, volume={27}, DOI={10.1080/02684527.2012.708275}, number={6}, journal={Intelligence and National Security}, author={Friedman, Jeffrey A. and Zeckhauser, Richard}, year={2012}, month=dec, pages={824–847} }
@article{Gendron_2005, title={Just War, Just Intelligence: An Ethical Framework for Foreign Espionage}, volume={18}, DOI={10.1080/08850600590945399}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Gendron, Angela}, year={2005}, month=oct, pages={398–434} }
@article{Gentry_2015, title={Warning Analysis: Focusing on Perceptions of Vulnerability}, volume={28}, DOI={10.1080/08850607.2014.962354}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Gentry, John A.}, year={2015}, month=jan, pages={64–88} }
@article{Gill_2007a, title={Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’}, volume={22}, DOI={10.1080/02684520701200756}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2007}, month=feb, pages={14–37} }
@article{Gill_2007b, title={Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’}, volume={22}, DOI={10.1080/02684520701200756}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2007}, month=feb, pages={14–37} }
@article{Gill_2009a, title={Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’?}, volume={24}, DOI={10.1080/02684520902756929}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2009}, month=feb, pages={78–102} }
@article{Gill_2009b, title={Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’?}, volume={24}, DOI={10.1080/02684520902756929}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2009}, month=feb, pages={78–102} }
@article{Gill_2012, title={Intelligence, Threat, Risk and the Challenge of Oversight}, volume={27}, DOI={10.1080/02684527.2012.661643}, number={2}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2012}, month=apr, pages={206–222} }
@inbook{Gill, Peter_Peter Gill & Mark Phythian_2006, address={Cambridge}, title={Chapter 1: ‘What is Intelligence?’ (inc. notes)}, booktitle={Intelligence in an insecure world}, publisher={Polity Press}, author={Gill, Peter and Peter Gill & Mark Phythian}, year={2006} }
@article{Glees_Davies_2006, title={Intelligence, Iraq and the limits of legislative accountability during political crisis}, volume={21}, DOI={10.1080/02684520600957787}, number={5}, journal={Intelligence and National Security}, author={Glees, Anthony and Davies, Philip H.J.}, year={2006}, month=oct, pages={848–883} }
@article{Goodman_2003, title={9/11: The Failure of Strategic Intelligence}, volume={18}, DOI={10.1080/02684520310001688871}, number={4}, journal={Intelligence and National Security}, author={Goodman, Melvin A}, year={2003}, month=dec, pages={59–71} }
@article{Hastedt_2013, title={The Politics of Intelligence and the Politicization of Intelligence: The American Experience}, volume={28}, DOI={10.1080/02684527.2012.749062}, number={1}, journal={Intelligence and National Security}, author={Hastedt, Glenn}, year={2013}, month=feb, pages={5–31} }
@article{Hatlebrekke_Smith_2010, title={Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure}, volume={25}, DOI={10.1080/02684527.2010.489274}, number={2}, journal={Intelligence and National Security}, author={Hatlebrekke, Kjetil Anders and Smith, M. L.R.}, year={2010}, month=apr, pages={147–182} }
@article{Heazle_2010, title={Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters}, volume={25}, DOI={10.1080/02684527.2010.489780}, number={3}, journal={Intelligence and National Security}, author={Heazle, Michael}, year={2010}, month=june, pages={290–308} }
@article{Hedley_2005, title={Learning from Intelligence Failures}, volume={18}, DOI={10.1080/08850600590945416}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Hedley, John Hollister}, year={2005}, month=oct, pages={435–450} }
@article{Herman_2004, title={Ethics and Intelligence after September 2001}, volume={19}, DOI={10.1080/0268452042000302038}, number={2}, journal={Intelligence and National Security}, author={Herman, Michael}, year={2004}, month=june, pages={342–358} }
@article{Herman_2011, title={What Difference Did It Make?}, volume={26}, DOI={10.1080/02684527.2011.619802}, number={6}, journal={Intelligence and National Security}, author={Herman, Michael}, year={2011}, month=dec, pages={886–901} }
@misc{Heuer, title={Psychology of Intelligence Analysis}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf}, author={Heuer, Richards} }
@article{Heuer_2005, title={Limits of Intelligence Analysis}, volume={49}, DOI={10.1016/j.orbis.2004.10.007}, number={1}, journal={Orbis}, author={Heuer, Richards J.}, year={2005}, month=dec, pages={75–94} }
@article{Hillebrand_2012, title={The Role of News Media in Intelligence Oversight}, volume={27}, DOI={10.1080/02684527.2012.708521}, number={5}, journal={Intelligence and National Security}, author={Hillebrand, Claudia}, year={2012}, month=oct, pages={689–706} }
@article{Hulnick_2006, title={What’s wrong with the Intelligence Cycle}, volume={21}, DOI={10.1080/02684520601046291}, number={6}, journal={Intelligence and National Security}, author={Hulnick, Arthur S.}, year={2006}, month=dec, pages={959–979} }
@misc{2009a, title={Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan}, url={http://www.hrw.org/reports/2009/11/24/cruel-britannia-0}, author={Human Rights Watch}, year={2009} }
@inbook{Ian Leigh, title={Democratic Accountability of Intelligence Services}, url={https://www.sipri.org/yearbook/2007/05}, booktitle={SIPRI Yearbook 2007}, author={Ian Leigh, Hans Born} }
@misc{ title={Sherman Kent and the Profession of Intelligence Analysis}, url={https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm}, author={Jack Davis} }
@misc{2011b, title={Entangling alliances? The UK’s complicity in torture in the global war on terrorism}, volume={87}, url={http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1111/j.1468-2346.2011.01012.x}, number={4}, author={James Gaskarth}, year={2011} }
@article{Jane Mayer_The New Yorker_2005, title={OUTSOURCING TORTURE}, volume={81}, url={http://gl9sn3dh2u.search.serialssolutions.com/?V=1.0&N=50&L=GL9SN3DH2U&S=A_T_B&C=new+yorker}, number={1}, author={Jane Mayer and The New Yorker, 2005}, year={2005}, month=feb }
@article{Jervis_2006, title={Reports, politics, and intelligence failures: The case of Iraq}, volume={29}, DOI={10.1080/01402390600566282}, number={1}, journal={Journal of Strategic Studies}, author={Jervis, Robert}, year={2006}, pages={3–52} }
@article{JOHNSON_2003a, title={Bricks and Mortar for a Theory of Intelligence*}, volume={22}, DOI={10.1080/01495930390130481}, number={1}, journal={Comparative Strategy}, author={JOHNSON, LOCH}, year={2003}, month=jan, pages={1–28} }
@article{Johnson_2010, title={Evaluating "Humint”: The Role of Foreign Agents in U.S. Security}, volume={29}, DOI={10.1080/01495933.2010.509635}, number={4}, journal={Comparative Strategy}, author={Johnson, Loch}, year={2010}, month=oct, pages={308–332} }
@article{JOHNSON_2003b, title={Preface to a Theory of Strategic Intelligence}, volume={16}, DOI={10.1080/716100470}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={JOHNSON, LOCH K.}, year={2003}, month=oct, pages={638–663} }
@article{Johnson_2008a, title={The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability}, volume={23}, DOI={10.1080/02684520801977337}, number={2}, journal={Intelligence and National Security}, author={Johnson, Loch K.}, year={2008}, pages={198–225} }
@article{Johnson_2008b, title={Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate}, volume={23}, DOI={10.1080/02684520802121257}, number={3}, journal={Intelligence and National Security}, author={Johnson, Loch K.}, year={2008}, month=june, pages={333–370} }
@article{Johnson_2011, title={National Security Intelligence in the United States: A Performance Checklist}, volume={26}, DOI={10.1080/02684527.2011.604198}, number={5}, journal={Intelligence and National Security}, author={Johnson, Loch K.}, year={2011}, month=oct, pages={607–615} }
@article{Johnson_Aldrich_Moran_Barrett_Hastedt_Jervis_Krieger_McDermott_Omand_Phythian_et al._2014, title={An                              Special Forum: Implications of the Snowden Leaks}, volume={29}, DOI={10.1080/02684527.2014.946242}, number={6}, journal={Intelligence and National Security}, author={Johnson, Loch K. and Aldrich, Richard J. and Moran, Christopher and Barrett, David M. and Hastedt, Glenn and Jervis, Robert and Krieger, Wolfgang and McDermott, Rose and Omand, David and Phythian, Mark and Wark, Wesley K.}, year={2014}, month=nov, pages={793–810} }
@article{Julie Clarke_2005, title={Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable}, url={http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr39&id=593&collection=journals&index=journals/usflr}, author={Julie Clarke, Mirko Bagaric}, year={2005} }
@article{Julie Clarke_2006, title={Tortured Responses (A Reply to Our Critics)}, url={http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr40&id=711&collection=journals&index=journals/usflr}, author={Julie Clarke, Mirko Bagaric}, year={2006} }
@article{Kahn, title={The Intelligence Failure of Pearl Harbor, Foreign Affairs}, url={http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/fora70&id=1004&collection=journals&index=journals/fora}, author={Kahn, D} }
@article{Kahn_2001, title={An historical theory of intelligence}, volume={16}, DOI={10.1080/02684520412331306220}, number={3}, journal={Intelligence and National Security}, author={Kahn, David}, year={2001}, month=sept, pages={79–92} }
@article{Kern_2009, title={Torture and Intelligence in the Global War on Terror}, volume={24}, DOI={10.1080/02684520903037022}, number={3}, journal={Intelligence and National Security}, author={Kern, Gary}, year={2009}, month=june, pages={429–457} }
@article{LEFEBVRE_2004, title={A Look at Intelligence Analysis}, volume={17}, DOI={10.1080/08850600490274908}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={LEFEBVRE, STÉPHANE}, year={2004}, month=jan, pages={231–264} }
@article{Leigh_2012, title={Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11}, volume={27}, DOI={10.1080/02684527.2012.708525}, number={5}, journal={Intelligence and National Security}, author={Leigh, Ian}, year={2012}, month=oct, pages={722–738} }
@article{Lucas_2011, title={Recognising Politicization: The CIA and the Path to the 2003 War in Iraq}, volume={26}, DOI={10.1080/02684527.2011.559141}, number={2–3}, journal={Intelligence and National Security}, author={Lucas, Scott}, year={2011}, month=apr, pages={203–227} }
@article{MARRIN_2004, title={Preventing Intelligence Failures by Learning from the Past}, volume={17}, DOI={10.1080/08850600490496452}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={MARRIN, STEPHEN}, year={2004}, month=dec, pages={655–672} }
@article{Marrin_2011, title={The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis}, volume={26}, DOI={10.1080/02684527.2011.559140}, number={2–3}, journal={Intelligence and National Security}, author={Marrin, Stephen}, year={2011}, month=apr, pages={182–202} }
@article{Marrin_2012, title={Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure?}, volume={27}, DOI={10.1080/02684527.2012.699290}, number={6}, journal={Intelligence and National Security}, author={Marrin, Stephen}, year={2012}, month=dec, pages={896–912} }
@misc{2002, title={Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html}, author={Michael Warner}, year={2002} }
@misc{2001, title={Central Intelligence Origin and Evolution in the US}, url={https://www.cia.gov/static/2116cfec5d478f1e6fcc67f910759625/Origin-and-Evolution.pdf}, author={Michael Warner (eds)}, year={2001} }
@article{Moran_2010a, title={Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland}, volume={25}, DOI={10.1080/02684521003588070}, number={1}, journal={Intelligence and National Security}, author={Moran, Jon}, year={2010}, month=feb, pages={1–23} }
@article{Moran_2010b, title={Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland}, volume={25}, DOI={10.1080/02684521003588070}, number={1}, journal={Intelligence and National Security}, author={Moran, Jon}, year={2010}, month=feb, pages={1–23} }
@book{Moran_Phythian_2008, address={Basingstoke}, title={Intelligence, security and policing post-9/11: The UK’s response to the war on terror}, url={http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/book/10.1057/9780230583542}, publisher={Palgrave Macmillan}, author={Moran, Jonathan and Phythian, Mark}, year={2008} }
@article{Müller-Wille_2006, title={Improving the democratic accountability of EU intelligence}, volume={21}, DOI={10.1080/02684520600568394}, number={1}, journal={Intelligence and National Security}, author={Müller-Wille, Björn}, year={2006}, month=feb, pages={100–128} }
@article{Odom_2008, title={Intelligence Analysis}, volume={23}, DOI={10.1080/02684520802121216}, number={3}, journal={Intelligence and National Security}, author={Odom, William E.}, year={2008}, month=june, pages={316–332} }
@article{Omand_Bartlett_Miller_2012, title={Introducing Social Media Intelligence (SOCMINT)}, volume={27}, DOI={10.1080/02684527.2012.716965}, number={6}, journal={Intelligence and National Security}, author={Omand, David and Bartlett, Jamie and Miller, Carl}, year={2012}, month=dec, pages={801–823} }
@article{Omand GCB_2006, title={Ethical Guidelines in Using Secret Intelligence for Public Security}, volume={19}, DOI={10.1080/09557570601003338}, number={4}, journal={Cambridge Review of International Affairs}, author={Omand GCB, Sir David}, year={2006}, month=dec, pages={613–628} }
@article{Patterson_Casale_2005, title={Targeting Terror: The Ethical and Practical Implications of Targeted Killing}, volume={18}, DOI={10.1080/08850600590945407}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Patterson, Eric and Casale, Teresa}, year={2005}, month=dec, pages={638–652} }
@article{Paul R. Pillar_2006, title={Intelligence, Policy, and the War in Iraq}, volume={85}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20031908}, number={2}, journal={Foreign Affairs}, publisher={Council on Foreign Relations}, author={Paul R. Pillar}, year={2006}, pages={15–27} }
@article{2009b, title={The Intelligence and Security Committee and the Challenge of Security Networks}, volume={35}, url={http://ezproxy.lib.le.ac.uk/login?url=https://www.cambridge.org/core/journals/review-of-international-studies/article/intelligence-and-security-committee-and-the-challenge-of-security-networks/EE30C2105597F02BA24E95C0CDB46648}, number={4}, journal={Review of International Studies}, author={Peter Gill}, year={2009} }
@article{Pfaff_Tiel_2004, title={The ethics of espionage}, volume={3}, DOI={10.1080/15027570310004447}, number={1}, journal={Journal of Military Ethics}, author={Pfaff, Tony and Tiel, Jeffrey R.}, year={2004}, month=mar, pages={1–15} }
@misc{2010, title={Study on Targeted Killings, UN General Assembly Human Rights Council}, url={http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf}, author={Philip Alston}, year={2010} }
@misc{2008, title={Chapter Eight - The Torture Debate: A Perspective from the United Kingdom}, url={http://www.palgraveconnect.com.ezproxy3.lib.le.ac.uk/pc/doifinder/10.1057/9780230583542}, DOI={10.1057/9780230583542              9780230583542 PDF                                                                                      9780230551916 HB                          272 pp}, author={Philip N. S. Rumney}, year={2008} }
@article{Phythian_2006, title={The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction}, volume={34}, DOI={10.1111/j.1747-1346.2006.00019.x}, number={2}, journal={Politics  Policy}, author={Phythian, Mark}, year={2006}, month=june, pages={400–424} }
@article{Phythian_2007, title={The British experience with intelligence accountability}, volume={22}, DOI={10.1080/02684520701200822}, number={1}, journal={Intelligence and National Security}, author={Phythian, Mark}, year={2007}, month=feb, pages={75–99} }
@article{Phythian_2012, title={Policing Uncertainty: Intelligence, Security and Risk}, volume={27}, DOI={10.1080/02684527.2012.661642}, number={2}, journal={Intelligence and National Security}, author={Phythian, Mark}, year={2012}, month=apr, pages={187–205} }
@article{Phythian, Mark, title={Intelligence Theory : Key Questions and Debates}, url={http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=nlebk&AN=236476&site=ehost-live}, journal={Intelligence Theory : Key Questions and Debates}, author={Phythian, Mark and Stephen, Gill} }
@article{Pillar_2006, title={Good literature and bad history: The 9/11 commission’s tale of strategic intelligence}, volume={21}, DOI={10.1080/02684520601046366}, number={6}, journal={Intelligence and National Security}, author={Pillar, Paul R.}, year={2006}, month=dec, pages={1022–1044} }
@article{Poynting_2010, title={Render unto Caesar}, volume={82}, DOI={10.1080/09627251.2010.525919}, number={1}, journal={Criminal Justice Matters}, author={Poynting, Scott}, year={2010}, month=dec, pages={14–15} }
@article{Puyvelde_2013, title={Intelligence Accountability and the Role of Public Interest Groups in the United States}, volume={28}, DOI={10.1080/02684527.2012.735078}, number={2}, journal={Intelligence and National Security}, author={Puyvelde, Damien Van}, year={2013}, month=apr, pages={139–158} }
@article{Quinlan_2007, title={Just intelligence: Prolegomena to an ethical theory}, volume={22}, DOI={10.1080/02684520701200715}, number={1}, journal={Intelligence and National Security}, author={Quinlan, Michael}, year={2007}, month=feb, pages={1–13} }
@article{Richard J. Aldrich_2004, title={Transatlantic Intelligence and Security Cooperation}, volume={80}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569532}, number={4}, journal={International Affairs (Royal Institute of International Affairs 1944-)}, publisher={Wiley}, author={Richard J. Aldrich}, year={2004}, pages={1944–753} }
@article{Richard K. Betts_1978, title={Analysis, War, and Decision: Why Intelligence Failures Are inevitable}, volume={31}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/2009967}, number={1}, journal={World Politics}, publisher={Cambridge University Press}, author={Richard K. Betts}, year={1978}, pages={61–89} }
@article{Richard K. Betts_2002, title={Fixing Intelligence}, volume={81}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20033002}, number={1}, journal={Foreign Affairs}, publisher={Council on Foreign Relations}, author={Richard K. Betts}, year={2002}, pages={43–59} }
@article{Richard L. Russell_2002, title={CIA’s Strategic Intelligence in Iraq}, volume={117}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/798180}, number={2}, journal={Political Science Quarterly}, publisher={The Academy of Political Science}, author={Richard L. Russell}, year={2002}, pages={191–207} }
@misc{ title={Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian}, url={http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy}, author={Richard Norton-Taylor} }
@article{Richards_2012, title={Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy}, volume={27}, DOI={10.1080/02684527.2012.708528}, number={5}, journal={Intelligence and National Security}, author={Richards, Julian}, year={2012}, month=oct, pages={761–780} }
@article{Roberts_2007a, title={Review Essay: Torture and Incompetence in the ‘War on Terror’}, volume={49}, DOI={10.1080/00396330701254693}, number={1}, journal={Survival}, author={Roberts, Adam}, year={2007}, month=mar, pages={199–212} }
@article{Roberts_2007b, title={Review Essay: Torture and Incompetence in the ‘War on Terror’}, volume={49}, DOI={10.1080/00396330701254693}, number={1}, journal={Survival}, author={Roberts, Adam}, year={2007}, month=mar, pages={199–212} }
@misc{Rumsfeld_2002a, title={Press Conference}, url={https://www.nato.int/docu/speech/2002/s020606g.htm}, publisher={NATO}, author={Rumsfeld, Donald}, year={2002}, month=june }
@misc{Rumsfeld_2002b, title={Press Conference}, url={https://www.nato.int/docu/speech/2002/s020606g.htm}, publisher={NATO}, author={Rumsfeld, Donald}, year={2002}, month=june }
@article{Russell_2005, title={A weak pillar for American national security: The CIA’s dismal performance against WMD threats}, volume={20}, DOI={10.1080/02684520500268954}, number={3}, journal={Intelligence and National Security}, author={Russell, Richard L.}, year={2005}, month=sept, pages={466–485} }
@misc{2004a, title={Torture : A Collection}, url={https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER}, author={Sanford Levinson (ed)}, year={2004} }
@article{Schwarz_2007, title={The Church Committee and a new era of intelligence oversight}, volume={22}, DOI={10.1080/02684520701303881}, number={2}, journal={Intelligence and National Security}, author={Schwarz, Frederick A.O.}, year={2007}, pages={270–297} }
@article{Scott_2004a, title={Secret Intelligence, Covert Action and Clandestine Diplomacy}, volume={19}, DOI={10.1080/0268452042000302029}, number={2}, journal={Intelligence and National Security}, author={Scott, Len}, year={2004}, month=june, pages={322–341} }
@article{Scott_2004b, title={Secret Intelligence, Covert Action and Clandestine Diplomacy}, volume={19}, DOI={10.1080/0268452042000302029}, number={2}, journal={Intelligence and National Security}, author={Scott, Len}, year={2004}, month=june, pages={322–341} }
@article{Scott_Jackson_2004, title={The Study of Intelligence in Theory and Practice}, volume={19}, DOI={10.1080/0268452042000302930}, number={2}, journal={Intelligence and National Security}, author={Scott, Len and Jackson, Peter}, year={2004}, month=june, pages={139–169} }
@misc{2004b, title={Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq}, url={http://hdl.handle.net/2027/umn.31951d02406334o}, author={Select Committee on Intelligence United States Senate}, year={2004} }
@misc{ title={Estimates and Influence}, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html}, author={Sherman Kent} }
@article{Shore_2006, title={Intelligence Review and Oversight in Post-9/11 Canada}, volume={19}, DOI={10.1080/08850600600656350}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Shore, Jacques J.M.}, year={2006}, pages={456–479} }
@article{Sims_2007, title={Intelligence to counter terror: The importance of all-source fusion}, volume={22}, DOI={10.1080/02684520701200772}, number={1}, journal={Intelligence and National Security}, author={Sims, Jennifer}, year={2007}, month=feb, pages={38–56} }
@article{Sims_2006, title={Foreign Intelligence Liaison: Devils, Deals, and Details}, volume={19}, DOI={10.1080/08850600500483657}, number={2}, journal={International Journal of Intelligence and CounterIntelligence}, author={Sims, Jennifer E.}, year={2006}, month=may, pages={195–217} }
@article{Spielmann_2012, title={Strengthening Intelligence Threat Analysis}, volume={25}, DOI={10.1080/08850607.2012.623035}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Spielmann, Karl}, year={2012}, month=mar, pages={19–43} }
@article{Spielmann_2014, title={Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration}, volume={27}, DOI={10.1080/08850607.2014.842810}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Spielmann, Karl}, year={2014}, month=mar, pages={132–155} }
@article{Steven Lukes_2006, title={Liberal Democratic Torture}, volume={36}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313}, number={1}, journal={British Journal of Political Science}, publisher={Cambridge University Press}, author={Steven Lukes}, year={2006}, pages={1–16} }
@article{Strachan-Morris_2012, title={Threat and Risk: What Is the Difference and Why Does It Matter?}, volume={27}, DOI={10.1080/02684527.2012.661641}, number={2}, journal={Intelligence and National Security}, author={Strachan-Morris, David}, year={2012}, month=apr, pages={172–186} }
@misc{ title={MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched}, url={http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html}, author={Telegraph} }
@article{Uri Bar-Joseph and Arie W. Kruglanski_2003, title={Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise}, volume={24}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3792511}, number={1}, journal={Political Psychology}, publisher={International Society of Political Psychology}, author={Uri Bar-Joseph and Arie W. Kruglanski}, year={2003}, pages={75–99} }
@article{Zegart_2007, title={9/11 and the FBI: The organizational roots of failure}, volume={22}, DOI={10.1080/02684520701415123}, number={2}, journal={Intelligence and National Security}, author={Zegart, Amy}, year={2007}, month=apr, pages={165–184} }
@misc{Torture: Ends, means and barbarity | The Economist_2003, url={http://www.economist.com/node/1522792}, year={2003} }
@misc{Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction_2003, url={http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm}, year={2003} }
@misc{9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States_2004, url={http://www.9-11commission.gov/}, year={2004} }
@misc{Review of Intelligence on Weapons of Mass Destruction - Butler Report_2004, url={https://www.files.ethz.ch/isn/7078/doc_7085_290_en.pdf}, year={2004} }
@article{A Symposium on Intelligence Ethics_2009, volume={24}, DOI={10.1080/02684520903036958}, number={3}, journal={Intelligence and National Security}, year={2009}, pages={366–386} }
@misc{Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005_2009, url={https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0}, year={2009} }
@article{Making Sense of Snowden_2013, volume={84}, DOI={10.1111/j.1467-923X.2013.12053.x}, number={4}, journal={The Political Quarterly}, year={2013}, month=oct, pages={433–435} }
@misc{History | MI5 - The Security Service, url={https://www.mi5.gov.uk/history} }
@misc{A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis, url={https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf}, publisher={Central Intelligence Agency} }
@misc{A Risk Management Standard, url={https://theirm.org/media/886059/ARMS_2002_IRM.pdf}, publisher={Institute of Risk Management} }
@misc{‘Confidential Informants in National Security Investigations’ by Daniel V. Ward, url={http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/} }
@misc{Torture prosecutions against MI5 and MI6 unlikely to be pursued, url={http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6} }
@misc{Articles on Rendition at The Guardian, url={http://www.guardian.co.uk/world/rendition} }
@misc{All Party Parliamentary Group on Extraordinary Rendition, url={http://www.extraordinaryrendition.org/} }
@misc{Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian, url={http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5} }
@misc{U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program, url={http://www.intelligence.senate.gov/study2014.html}, publisher={US Senate Select Committee on Intelligence} }
@misc{Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction, url={http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf}, publisher={American Enterprise Institute} }
@misc{Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency, url={https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm} }
@misc{Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, url={http://govinfo.library.unt.edu/wmd/about.html} }
@misc{Report of the Inquiry into Australian Intelligence Agencies (Flood Report), url={https://catalogue.nla.gov.au/Record/3308786} }
@misc{The Failure by Thomas Powers | The New York Review of Books, url={http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false} }
@misc{Canadian Security Intelligence Review Committee, url={http://www.sirc-csars.gc.ca/index-eng.html} }
@misc{U.S. Senate Select Committee on Intelligence, url={http://www.intelligence.senate.gov/} }
@misc{National security and intelligence - Inside Government - GOV.UK, url={https://www.gov.uk/government/organisations/national-security} }
@misc{UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies, url={https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf} }
@misc{How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian, url={http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7} }
@misc{7/7 leader: more evidence reveals what police knew | UK news | The Guardian, url={http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3} }
@misc{Internet jihad: A world wide web of terror | The Economist, url={http://www.economist.com/node/9472498} }
@misc{US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings, url={https://homeland.house.gov/sites/homeland.house.gov/files/documents/Boston-Bombings-Report.pdf} }
@misc{OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings, url={http://www.justice.gov/oig/reports/2014/s1404.pdf} }
@misc{Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com, url={http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0} }
@misc{Russia: Boston bombing report is effort to ‘whitewash US intelligence failures’ - RT News, url={http://rt.com/news/russia-boston-bombing-report-180/}, publisher={RT News} }