[1]
David Kahn, ‘The Rise of Intelligence’, Foreign Affairs, vol. 85, no. 5, 2006, Available: http://ezproxy.lib.le.ac.uk/login?url=https://www.jstor.org/stable/20032075?origin=crossref&seq=1#metadata_info_tab_contents
[2]
Phythian, Mark and Stephen, Gill, ‘Intelligence Theory : Key Questions and Debates’, Intelligence Theory : Key Questions and Debates, Available: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=nlebk&AN=236476&site=ehost-live
[3]
D. Kahn, ‘An historical theory of intelligence’, Intelligence and National Security, vol. 16, no. 3, pp. 79–92, Sept. 2001, doi: 10.1080/02684520412331306220
[4]
L. JOHNSON, ‘Bricks and Mortar for a Theory of Intelligence*’, Comparative Strategy, vol. 22, no. 1, pp. 1–28, Jan. 2003, doi: 10.1080/01495930390130481
[5]
L. K. JOHNSON, ‘Preface to a Theory of Strategic Intelligence’, International Journal of Intelligence and CounterIntelligence, vol. 16, no. 4, pp. 638–663, Oct. 2003, doi: 10.1080/716100470
[6]
L. Scott and P. Jackson, ‘The Study of Intelligence in Theory and Practice’, Intelligence and National Security, vol. 19, no. 2, pp. 139–169, June 2004, doi: 10.1080/0268452042000302930
[7]
Michael Warner, ‘Wanted: A Definition of “Intelligence” — Central Intelligence Agency’, 2002. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html
[8]
A. S. Hulnick, ‘What’s wrong with the Intelligence Cycle’, Intelligence and National Security, vol. 21, no. 6, pp. 959–979, Dec. 2006, doi: 10.1080/02684520601046291
[9]
Michael Warner (eds), ‘Central Intelligence Origin and Evolution in the US’. 2001. Available: https://www.cia.gov/static/2116cfec5d478f1e6fcc67f910759625/Origin-and-Evolution.pdf
[10]
‘History | MI5 - The Security Service’. Available: https://www.mi5.gov.uk/history
[11]
Gill, Peter and Peter Gill & Mark Phythian, ‘Chapter 1: “What is Intelligence?” (inc. notes)’, in Intelligence in an insecure world, Cambridge: Polity Press, 2006.
[12]
L. K. Johnson, ‘National Security Intelligence in the United States: A Performance Checklist’, Intelligence and National Security, vol. 26, no. 5, pp. 607–615, Oct. 2011, doi: 10.1080/02684527.2011.604198
[13]
J. Moran, ‘Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland’, Intelligence and National Security, vol. 25, no. 1, pp. 1–23, Feb. 2010, doi: 10.1080/02684521003588070
[14]
C. Cogan, ‘Hunters not Gatherers: Intelligence in the Twenty-First Century’, Intelligence and National Security, vol. 19, no. 2, pp. 304–321, June 2004, doi: 10.1080/0268452042000302010
[15]
J. M. Diamond, ‘Re-examining Problems and Prospects in U.S. Imagery Intelligence’, International Journal of Intelligence and CounterIntelligence, vol. 14, no. 1, pp. 1–24, Jan. 2001, doi: 10.1080/08850600150501308
[16]
D. Omand, J. Bartlett, and C. Miller, ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security, vol. 27, no. 6, pp. 801–823, Dec. 2012, doi: 10.1080/02684527.2012.716965
[17]
A. Dupont, ‘Intelligence for the Twenty-First Century’, Intelligence and National Security, vol. 18, no. 4, pp. 15–39, Dec. 2003, doi: 10.1080/02684520310001688862
[18]
J. E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 2, pp. 195–217, May 2006, doi: 10.1080/08850600500483657
[19]
L. Scott, ‘Secret Intelligence, Covert Action and Clandestine Diplomacy’, Intelligence and National Security, vol. 19, no. 2, pp. 322–341, June 2004, doi: 10.1080/0268452042000302029
[20]
Richard J. Aldrich, ‘Transatlantic Intelligence and Security Cooperation’, International Affairs (Royal Institute of International Affairs 1944-), vol. 80, no. 4, pp. 1944–753, 2004, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569532
[21]
M. M. Aid and C. Wiebes, ‘Introduction on The Importance of Signals Intelligence in the Cold War’, Intelligence and National Security, vol. 16, no. 1, pp. 1–26, Mar. 2001, doi: 10.1080/714002838
[22]
B. Champion, ‘Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations’, International Journal of Intelligence and CounterIntelligence, vol. 21, no. 3, pp. 530–564, May 2008, doi: 10.1080/08850600701651268
[23]
L. Johnson, ‘Evaluating "Humint”: The Role of Foreign Agents in U.S. Security’, Comparative Strategy, vol. 29, no. 4, pp. 308–332, Oct. 2010, doi: 10.1080/01495933.2010.509635
[24]
L. Scott, ‘Secret Intelligence, Covert Action and Clandestine Diplomacy’, Intelligence and National Security, vol. 19, no. 2, pp. 322–341, June 2004, doi: 10.1080/0268452042000302029
[25]
‘A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis’. Central Intelligence Agency. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
[26]
R. Heuer, ‘Psychology of Intelligence Analysis’. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf
[27]
W. E. Odom, ‘Intelligence Analysis’, Intelligence and National Security, vol. 23, no. 3, pp. 316–332, June 2008, doi: 10.1080/02684520802121216
[28]
L. K. Johnson, ‘Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate’, Intelligence and National Security, vol. 23, no. 3, pp. 333–370, June 2008, doi: 10.1080/02684520802121257
[29]
R. J. Heuer, ‘Limits of Intelligence Analysis’, Orbis, vol. 49, no. 1, pp. 75–94, Dec. 2005, doi: 10.1016/j.orbis.2004.10.007
[30]
S. LEFEBVRE, ‘A Look at Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 2, pp. 231–264, Jan. 2004, doi: 10.1080/08850600490274908
[31]
S. Marrin, ‘Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure?’, Intelligence and National Security, vol. 27, no. 6, pp. 896–912, Dec. 2012, doi: 10.1080/02684527.2012.699290
[32]
K. Spielmann, ‘Strengthening Intelligence Threat Analysis’, International Journal of Intelligence and CounterIntelligence, vol. 25, no. 1, pp. 19–43, Mar. 2012, doi: 10.1080/08850607.2012.623035
[33]
Sherman Kent, ‘Estimates and Influence’. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html
[34]
Jack Davis, ‘Sherman Kent and the Profession of Intelligence Analysis’. Available: https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm
[35]
D. Rumsfeld, ‘Press Conference’, June 06, 2002. Available: https://www.nato.int/docu/speech/2002/s020606g.htm
[36]
J. A. Gentry, ‘Warning Analysis: Focusing on Perceptions of Vulnerability’, International Journal of Intelligence and CounterIntelligence, vol. 28, no. 1, pp. 64–88, Jan. 2015, doi: 10.1080/08850607.2014.962354
[37]
K. Spielmann, ‘Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration’, International Journal of Intelligence and CounterIntelligence, vol. 27, no. 1, pp. 132–155, Mar. 2014, doi: 10.1080/08850607.2014.842810
[38]
G. Hastedt, ‘The Politics of Intelligence and the Politicization of Intelligence: The American Experience’, Intelligence and National Security, vol. 28, no. 1, pp. 5–31, Feb. 2013, doi: 10.1080/02684527.2012.749062
[39]
D. Strachan-Morris, ‘Threat and Risk: What Is the Difference and Why Does It Matter?’, Intelligence and National Security, vol. 27, no. 2, pp. 172–186, Apr. 2012, doi: 10.1080/02684527.2012.661641
[40]
M. Phythian, ‘Policing Uncertainty: Intelligence, Security and Risk’, Intelligence and National Security, vol. 27, no. 2, pp. 187–205, Apr. 2012, doi: 10.1080/02684527.2012.661642
[41]
P. Gill, ‘Intelligence, Threat, Risk and the Challenge of Oversight’, Intelligence and National Security, vol. 27, no. 2, pp. 206–222, Apr. 2012, doi: 10.1080/02684527.2012.661643
[42]
B. Canton, ‘The Active Management of Uncertainty’, International Journal of Intelligence and CounterIntelligence, vol. 21, no. 3, pp. 487–518, May 2008, doi: 10.1080/08850600802046939
[43]
M. Dunn Cavelty and V. Mauer, ‘Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence’, Security Dialogue, vol. 40, no. 2, pp. 123–144, Apr. 2009, doi: 10.1177/0967010609103071
[44]
J. A. Friedman and R. Zeckhauser, ‘Assessing Uncertainty in Intelligence’, Intelligence and National Security, vol. 27, no. 6, pp. 824–847, Dec. 2012, doi: 10.1080/02684527.2012.708275
[45]
M. Heazle, ‘Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters’, Intelligence and National Security, vol. 25, no. 3, pp. 290–308, June 2010, doi: 10.1080/02684527.2010.489780
[46]
D. Rumsfeld, ‘Press Conference’, June 06, 2002. Available: https://www.nato.int/docu/speech/2002/s020606g.htm
[47]
‘A Risk Management Standard’. Institute of Risk Management. Available: https://theirm.org/media/886059/ARMS_2002_IRM.pdf
[48]
R. Bellaby, ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, vol. 27, no. 1, pp. 93–117, Feb. 2012, doi: 10.1080/02684527.2012.621600
[49]
‘“Confidential Informants in National Security Investigations” by Daniel V. Ward’. Available: http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/
[50]
M. Quinlan, ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, vol. 22, no. 1, pp. 1–13, Feb. 2007, doi: 10.1080/02684520701200715
[51]
T. Erskine, ‘“As Rays of Light to the Human Soul”? Moral Agents and Intelligence Gathering’, Intelligence and National Security, vol. 19, no. 2, pp. 359–381, June 2004, doi: 10.1080/0268452042000302047
[52]
David J. Garrow, ‘FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects’, The Public Historian, vol. 10, no. 4, pp. 5–18, 1988, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3377831
[53]
M. Herman, ‘Ethics and Intelligence after September 2001’, Intelligence and National Security, vol. 19, no. 2, pp. 342–358, June 2004, doi: 10.1080/0268452042000302038
[54]
A. Gendron, ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 3, pp. 398–434, Oct. 2005, doi: 10.1080/08850600590945399
[55]
E. Patterson and T. Casale, ‘Targeting Terror: The Ethical and Practical Implications of Targeted Killing’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 4, pp. 638–652, Dec. 2005, doi: 10.1080/08850600590945407
[56]
T. Pfaff and J. R. Tiel, ‘The ethics of espionage’, Journal of Military Ethics, vol. 3, no. 1, pp. 1–15, Mar. 2004, doi: 10.1080/15027570310004447
[57]
P. Gill, ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, vol. 24, no. 1, pp. 78–102, Feb. 2009, doi: 10.1080/02684520902756929
[58]
‘A Symposium on Intelligence Ethics’, Intelligence and National Security, vol. 24, no. 3, pp. 366–386, 2009, doi: 10.1080/02684520903036958
[59]
S. D. Omand GCB, ‘Ethical Guidelines in Using Secret Intelligence for Public Security’, Cambridge Review of International Affairs, vol. 19, no. 4, pp. 613–628, Dec. 2006, doi: 10.1080/09557570601003338
[60]
J. Moran, ‘Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland’, Intelligence and National Security, vol. 25, no. 1, pp. 1–23, Feb. 2010, doi: 10.1080/02684521003588070
[61]
Philip Alston, ‘Study on Targeted Killings, UN General Assembly Human Rights Council’. 2010. Available: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf
[62]
‘Torture prosecutions against MI5 and MI6 unlikely to be pursued’. Available: http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6
[63]
‘Articles on Rendition at The Guardian’. Available: http://www.guardian.co.uk/world/rendition
[64]
‘All Party Parliamentary Group on Extraordinary Rendition’. Available: http://www.extraordinaryrendition.org/
[65]
Telegraph, ‘MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched’. Available: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html
[66]
James Gaskarth, ‘Entangling alliances? The UK’s complicity in torture in the global war on terrorism’, vol. 87, no. 4. 2011. Available: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1111/j.1468-2346.2011.01012.x
[67]
Barbara Harlow, ‘“Extraordinary renditions”: tales of Guantánamo, a review article’, vol. 52, pp. 1–29, Available: http://rac.sagepub.com.ezproxy3.lib.le.ac.uk/content/52/4.toc
[68]
‘Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian’. Available: http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5
[69]
Richard Norton-Taylor, ‘Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian’. Available: http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy
[70]
S. Poynting, ‘Render unto Caesar’, Criminal Justice Matters, vol. 82, no. 1, pp. 14–15, Dec. 2010, doi: 10.1080/09627251.2010.525919
[71]
Sanford Levinson (ed), ‘Torture : A Collection’, 2004. Available: https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER
[72]
Alan Dershowitz, ‘Tortured Reasoning’. Available: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655
[73]
‘Torture: Ends, means and barbarity | The Economist’, 2003. Available: http://www.economist.com/node/1522792
[74]
Human Rights Watch, ‘Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan’. 2009. Available: http://www.hrw.org/reports/2009/11/24/cruel-britannia-0
[75]
Jane Mayer and 2005 The New Yorker, ‘OUTSOURCING TORTURE’, vol. 81, no. 1, Feb. 2005, Available: http://gl9sn3dh2u.search.serialssolutions.com/?V=1.0&N=50&L=GL9SN3DH2U&S=A_T_B&C=new+yorker
[76]
Darius Rejali, ‘Torture and Democracy’, 2007. Available: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494
[77]
M. B. Julie Clarke, ‘Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable’, 2005, Available: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr39&id=593&collection=journals&index=journals/usflr
[78]
M. B. Julie Clarke, ‘Tortured Responses (A Reply to Our Critics)’, 2006, Available: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr40&id=711&collection=journals&index=journals/usflr
[79]
Philip N. S. Rumney, ‘Chapter Eight - The Torture Debate: A Perspective from the United Kingdom’, 2008. doi: 10.1057/9780230583542 9780230583542 PDF 9780230551916 HB 272 pp. Available: http://www.palgraveconnect.com.ezproxy3.lib.le.ac.uk/pc/doifinder/10.1057/9780230583542
[80]
A. Roberts, ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, vol. 49, no. 1, pp. 199–212, Mar. 2007, doi: 10.1080/00396330701254693
[81]
Alex J. Bellamy, ‘No Pain, No Gain? Torture and Ethics in the War on Terror’, International Affairs (Royal Institute of International Affairs 1944-), vol. 82, no. 1, pp. 1944–148, 2006, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133
[82]
G. Kern, ‘Torture and Intelligence in the Global War on Terror’, Intelligence and National Security, vol. 24, no. 3, pp. 429–457, June 2009, doi: 10.1080/02684520903037022
[83]
Steven Lukes, ‘Liberal Democratic Torture’, British Journal of Political Science, vol. 36, no. 1, pp. 1–16, 2006, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313
[84]
‘U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program’. Available: http://www.intelligence.senate.gov/study2014.html
[85]
‘Watching “Zero Dark Thirty” with the CIA: Separating Fact from Fiction’. American Enterprise Institute. Available: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf
[86]
A. Roberts, ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, vol. 49, no. 1, pp. 199–212, Mar. 2007, doi: 10.1080/00396330701254693
[87]
D. Kahn, ‘The Intelligence Failure of Pearl Harbor, Foreign Affairs’, Available: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/fora70&id=1004&collection=journals&index=journals/fora
[88]
M. Herman, ‘What Difference Did It Make?’, Intelligence and National Security, vol. 26, no. 6, pp. 886–901, Dec. 2011, doi: 10.1080/02684527.2011.619802
[89]
F. L. Borch, ‘Comparing Pearl Harbor and “9/11”: Intelligence Failure? American Unpreparedness? Military Responsibility?’, The Journal of Military History, vol. 67, no. 3, pp. 845–860, 2003, doi: 10.1353/jmh.2003.0201
[90]
Uri Bar-Joseph and Arie W. Kruglanski, ‘Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise’, Political Psychology, vol. 24, no. 1, pp. 75–99, 2003, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3792511
[91]
‘9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States’, 2004. Available: http://www.9-11commission.gov/
[92]
Richard K. Betts, ‘Analysis, War, and Decision: Why Intelligence Failures Are inevitable’, World Politics, vol. 31, no. 1, pp. 61–89, 1978, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/2009967
[93]
Richard K. Betts, ‘Fixing Intelligence’, Foreign Affairs, vol. 81, no. 1, pp. 43–59, 2002, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20033002
[94]
M. A. Goodman, ‘9/11: The Failure of Strategic Intelligence’, Intelligence and National Security, vol. 18, no. 4, pp. 59–71, Dec. 2003, doi: 10.1080/02684520310001688871
[95]
Douglas J. MacEachin, ‘Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency’, 2007. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html
[96]
S. MARRIN, ‘Preventing Intelligence Failures by Learning from the Past’, International Journal of Intelligence and CounterIntelligence, vol. 17, no. 4, pp. 655–672, Dec. 2004, doi: 10.1080/08850600490496452
[97]
P. R. Pillar, ‘Good literature and bad history: The 9/11 commission’s tale of strategic intelligence’, Intelligence and National Security, vol. 21, no. 6, pp. 1022–1044, Dec. 2006, doi: 10.1080/02684520601046366
[98]
D. P. Adamsky, ‘Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1’, Journal of Strategic Studies, vol. 28, no. 5, pp. 803–831, Oct. 2005, doi: 10.1080/01402390500393977
[99]
A. Zegart, ‘9/11 and the FBI: The organizational roots of failure’, Intelligence and National Security, vol. 22, no. 2, pp. 165–184, Apr. 2007, doi: 10.1080/02684520701415123
[100]
J. H. Hedley, ‘Learning from Intelligence Failures’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 3, pp. 435–450, Oct. 2005, doi: 10.1080/08850600590945416
[101]
K. A. Hatlebrekke and M. L. R. Smith, ‘Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure’, Intelligence and National Security, vol. 25, no. 2, pp. 147–182, Apr. 2010, doi: 10.1080/02684527.2010.489274
[102]
G. Evans, ‘Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle’, Defence Studies, vol. 9, no. 1, pp. 22–46, Mar. 2009, doi: 10.1080/14702430701811987
[103]
‘Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency’. Available: https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm
[104]
‘Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction’. Available: http://govinfo.library.unt.edu/wmd/about.html
[105]
‘Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction’, 2003. Available: http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm
[106]
A. Danchev, ‘The Reckoning: Official Inquiries and the Iraq War’, Intelligence and National Security, vol. 19, no. 3, pp. 436–466, Sept. 2004, doi: 10.1080/0268452042000316232
[107]
P. Davies, ‘Intelligence culture and intelligence failure in Britain and the United States’, Cambridge Review of International Affairs, vol. 17, no. 3, pp. 495–520, Oct. 2004, doi: 10.1080/0955757042000298188
[108]
‘Report of the Inquiry into Australian Intelligence Agencies (Flood Report)’. Available: https://catalogue.nla.gov.au/Record/3308786
[109]
Dennis M. Gormley, ‘The Limits of Intelligence: Iraq’s Lessons’, 2011, doi: 10.1080/00396338.2004.9688605. Available: http://ezproxy.lib.le.ac.uk/login?url=https://www.tandfonline.com/doi/abs/10.1080/00396338.2004.9688605
[110]
R. Jervis, ‘Reports, politics, and intelligence failures: The case of Iraq’, Journal of Strategic Studies, vol. 29, no. 1, pp. 3–52, 2006, doi: 10.1080/01402390600566282
[111]
M. Phythian, ‘The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction’, Politics Policy, vol. 34, no. 2, pp. 400–424, June 2006, doi: 10.1111/j.1747-1346.2006.00019.x
[112]
Paul R. Pillar, ‘Intelligence, Policy, and the War in Iraq’, Foreign Affairs, vol. 85, no. 2, pp. 15–27, 2006, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20031908
[113]
S. Marrin, ‘The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis’, Intelligence and National Security, vol. 26, no. 2–3, pp. 182–202, Apr. 2011, doi: 10.1080/02684527.2011.559140
[114]
S. Lucas, ‘Recognising Politicization: The CIA and the Path to the 2003 War in Iraq’, Intelligence and National Security, vol. 26, no. 2–3, pp. 203–227, Apr. 2011, doi: 10.1080/02684527.2011.559141
[115]
‘The Failure by Thomas Powers | The New York Review of Books’. Available: http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false
[116]
‘Review of Intelligence on Weapons of Mass Destruction - Butler Report’. 2004. Available: https://www.files.ethz.ch/isn/7078/doc_7085_290_en.pdf
[117]
Richard L. Russell, ‘CIA’s Strategic Intelligence in Iraq’, Political Science Quarterly, vol. 117, no. 2, pp. 191–207, 2002, Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/798180
[118]
R. L. Russell, ‘A weak pillar for American national security: The CIA’s dismal performance against WMD threats’, Intelligence and National Security, vol. 20, no. 3, pp. 466–485, Sept. 2005, doi: 10.1080/02684520500268954
[119]
Select Committee on Intelligence United States Senate, ‘Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq’. 2004. Available: http://hdl.handle.net/2027/umn.31951d02406334o
[120]
S. Farson, ‘Parliament and its servants: Their role in scrutinizing Canadian intelligence’, Intelligence and National Security, vol. 15, no. 2, pp. 225–258, June 2000, doi: 10.1080/02684520008432609
[121]
‘Canadian Security Intelligence Review Committee’. Available: http://www.sirc-csars.gc.ca/index-eng.html
[122]
J. J. M. Shore, ‘Intelligence Review and Oversight in Post-9/11 Canada’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 3, pp. 456–479, 2006, doi: 10.1080/08850600600656350
[123]
F. A. O. Schwarz, ‘The Church Committee and a new era of intelligence oversight’, Intelligence and National Security, vol. 22, no. 2, pp. 270–297, 2007, doi: 10.1080/02684520701303881
[124]
L. K. Johnson, ‘The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability’, Intelligence and National Security, vol. 23, no. 2, pp. 198–225, 2008, doi: 10.1080/02684520801977337
[125]
‘U.S. Senate Select Committee on Intelligence’. Available: http://www.intelligence.senate.gov/
[126]
B. Müller-Wille, ‘Improving the democratic accountability of EU intelligence’, Intelligence and National Security, vol. 21, no. 1, pp. 100–128, Feb. 2006, doi: 10.1080/02684520600568394
[127]
S. C. Boraz, ‘Establishing Democratic Control of Intelligence in Colombia’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 1, pp. 84–109, Jan. 2006, doi: 10.1080/08850600500177168
[128]
A. M. Díaz Fernández, ‘Halfway down the road to supervision of the Spanish intelligence services’, Intelligence and National Security, vol. 21, no. 3, pp. 440–456, June 2006, doi: 10.1080/02684520600750687
[129]
Peter Gill, ‘The Intelligence and Security Committee and the Challenge of Security Networks’, Review of International Studies, vol. 35, no. 4, 2009, Available: http://ezproxy.lib.le.ac.uk/login?url=https://www.cambridge.org/core/journals/review-of-international-studies/article/intelligence-and-security-committee-and-the-challenge-of-security-networks/EE30C2105597F02BA24E95C0CDB46648
[130]
P. Gill, ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, vol. 22, no. 1, pp. 14–37, Feb. 2007, doi: 10.1080/02684520701200756
[131]
M. Phythian, ‘The British experience with intelligence accountability’, Intelligence and National Security, vol. 22, no. 1, pp. 75–99, Feb. 2007, doi: 10.1080/02684520701200822
[132]
A. Glees and P. H. J. Davies, ‘Intelligence, Iraq and the limits of legislative accountability during political crisis’, Intelligence and National Security, vol. 21, no. 5, pp. 848–883, Oct. 2006, doi: 10.1080/02684520600957787
[133]
H. B. Ian Leigh, ‘Democratic Accountability of Intelligence Services’, in SIPRI Yearbook 2007, Available: https://www.sipri.org/yearbook/2007/05
[134]
D. V. Puyvelde, ‘Intelligence Accountability and the Role of Public Interest Groups in the United States’, Intelligence and National Security, vol. 28, no. 2, pp. 139–158, Apr. 2013, doi: 10.1080/02684527.2012.735078
[135]
I. Leigh, ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11’, Intelligence and National Security, vol. 27, no. 5, pp. 722–738, Oct. 2012, doi: 10.1080/02684527.2012.708525
[136]
C. Hillebrand, ‘The Role of News Media in Intelligence Oversight’, Intelligence and National Security, vol. 27, no. 5, pp. 689–706, Oct. 2012, doi: 10.1080/02684527.2012.708521
[137]
‘National security and intelligence - Inside Government - GOV.UK’. Available: https://www.gov.uk/government/organisations/national-security
[138]
D. Byman, ‘The Intelligence War on Terrorism’, Intelligence and National Security, vol. 29, no. 6, pp. 837–863, Nov. 2014, doi: 10.1080/02684527.2013.851876
[139]
J. Moran and M. Phythian, Intelligence, security and policing post-9/11: The UK’s response to the war on terror. Basingstoke: Palgrave Macmillan, 2008. Available: http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/book/10.1057/9780230583542
[140]
J. Sims, ‘Intelligence to counter terror: The importance of all-source fusion’, Intelligence and National Security, vol. 22, no. 1, pp. 38–56, Feb. 2007, doi: 10.1080/02684520701200772
[141]
‘Making Sense of Snowden’, The Political Quarterly, vol. 84, no. 4, pp. 433–435, Oct. 2013, doi: 10.1111/j.1467-923X.2013.12053.x
[142]
L. K. Johnson et al., ‘An Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, vol. 29, no. 6, pp. 793–810, Nov. 2014, doi: 10.1080/02684527.2014.946242
[143]
Z. Bauman et al., ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology, vol. 8, no. 2, pp. 121–144, June 2014, doi: 10.1111/ips.12048
[144]
‘UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies’. Available: https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf
[145]
J. Richards, ‘Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy’, Intelligence and National Security, vol. 27, no. 5, pp. 761–780, Oct. 2012, doi: 10.1080/02684527.2012.708528
[146]
P. Gill, ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, vol. 22, no. 1, pp. 14–37, Feb. 2007, doi: 10.1080/02684520701200756
[147]
P. Gill, ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, vol. 24, no. 1, pp. 78–102, Feb. 2009, doi: 10.1080/02684520902756929
[148]
‘How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian’. Available: http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7
[149]
‘7/7 leader: more evidence reveals what police knew | UK news | The Guardian’. Available: http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3
[150]
‘Internet jihad: A world wide web of terror | The Economist’. Available: http://www.economist.com/node/9472498
[151]
‘Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005’, 2009. Available: https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0
[152]
‘US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings’. Available: https://homeland.house.gov/sites/homeland.house.gov/files/documents/Boston-Bombings-Report.pdf
[153]
‘OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings’. Available: http://www.justice.gov/oig/reports/2014/s1404.pdf
[154]
‘Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com’. Available: http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0
[155]
‘Russia: Boston bombing report is effort to “whitewash US intelligence failures” - RT News’. Available: http://rt.com/news/russia-boston-bombing-report-180/