1.
David Kahn. The Rise of Intelligence. Foreign Affairs [Internet]. 2006;85(5). Available from: http://ezproxy.lib.le.ac.uk/login?url=https://www.jstor.org/stable/20032075?origin=crossref&seq=1#metadata_info_tab_contents
2.
Phythian, Mark, Stephen, Gill. Intelligence Theory : Key Questions and Debates. Intelligence Theory : Key Questions and Debates [Internet]. Available from: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=nlebk&AN=236476&site=ehost-live
3.
Kahn D. An historical theory of intelligence. Intelligence and National Security. 2001 Sept;16(3):79–92.
4.
JOHNSON L. Bricks and Mortar for a Theory of Intelligence*. Comparative Strategy. 2003 Jan;22(1):1–28.
5.
JOHNSON LK. Preface to a Theory of Strategic Intelligence. International Journal of Intelligence and CounterIntelligence. 2003 Oct;16(4):638–663.
6.
Scott L, Jackson P. The Study of Intelligence in Theory and Practice. Intelligence and National Security. 2004 June;19(2):139–169.
7.
Michael Warner. Wanted: A Definition of ‘Intelligence’ — Central Intelligence Agency [Internet]. 2002. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html
8.
Hulnick AS. What’s wrong with the Intelligence Cycle. Intelligence and National Security. 2006 Dec;21(6):959–979.
9.
Michael Warner (eds). Central Intelligence Origin and Evolution in the US [Internet]. 2001. Available from: https://www.cia.gov/static/2116cfec5d478f1e6fcc67f910759625/Origin-and-Evolution.pdf
10.
History | MI5 - The Security Service [Internet]. Available from: https://www.mi5.gov.uk/history
11.
Gill, Peter, Peter Gill & Mark Phythian. Chapter 1: ‘What is Intelligence?’ (inc. notes). Intelligence in an insecure world. Cambridge: Polity Press; 2006.
12.
Johnson LK. National Security Intelligence in the United States: A Performance Checklist. Intelligence and National Security. 2011 Oct;26(5):607–615.
13.
Moran J. Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security. 2010 Feb;25(1):1–23.
14.
Cogan C. Hunters not Gatherers: Intelligence in the Twenty-First Century. Intelligence and National Security. 2004 June;19(2):304–321.
15.
Diamond JM. Re-examining Problems and Prospects in U.S. Imagery Intelligence. International Journal of Intelligence and CounterIntelligence. 2001 Jan;14(1):1–24.
16.
Omand D, Bartlett J, Miller C. Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security. 2012 Dec;27(6):801–823.
17.
Dupont A. Intelligence for the Twenty-First Century. Intelligence and National Security. 2003 Dec;18(4):15–39.
18.
Sims JE. Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence. 2006 May;19(2):195–217.
19.
Scott L. Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security. 2004 June;19(2):322–341.
20.
Richard J. Aldrich. Transatlantic Intelligence and Security Cooperation. International Affairs (Royal Institute of International Affairs 1944-) [Internet]. Wiley; 2004;80(4):1944–753. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569532
21.
Aid MM, Wiebes C. Introduction on The Importance of Signals Intelligence in the Cold War. Intelligence and National Security. 2001 Mar;16(1):1–26.
22.
Champion B. Spies (Look) Like Us: The Early Use of Business and Civilian Covers in Covert Operations. International Journal of Intelligence and CounterIntelligence. 2008 May 19;21(3):530–564.
23.
Johnson L. Evaluating "Humint”: The Role of Foreign Agents in U.S. Security. Comparative Strategy. 2010 Oct 13;29(4):308–332.
24.
Scott L. Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security. 2004 June;19(2):322–341.
25.
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis [Internet]. Central Intelligence Agency; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
26.
Heuer R. Psychology of Intelligence Analysis [Internet]. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf
27.
Odom WE. Intelligence Analysis. Intelligence and National Security. 2008 June;23(3):316–332.
28.
Johnson LK. Glimpses into the Gems of American Intelligence: The President’s Daily Brief and the National Intelligence Estimate. Intelligence and National Security. 2008 June;23(3):333–370.
29.
Heuer RJ. Limits of Intelligence Analysis. Orbis. 2005 Dec;49(1):75–94.
30.
LEFEBVRE S. A Look at Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 2004 Jan;17(2):231–264.
31.
Marrin S. Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security. 2012 Dec;27(6):896–912.
32.
Spielmann K. Strengthening Intelligence Threat Analysis. International Journal of Intelligence and CounterIntelligence. 2012 Mar;25(1):19–43.
33.
Sherman Kent. Estimates and Influence [Internet]. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates-collected-essays/4estimates.html
34.
Jack Davis. Sherman Kent and the Profession of Intelligence Analysis [Internet]. Available from: https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm
35.
Rumsfeld D. Press Conference [Internet]. NATO; 2002. Available from: https://www.nato.int/docu/speech/2002/s020606g.htm
36.
Gentry JA. Warning Analysis: Focusing on Perceptions of Vulnerability. International Journal of Intelligence and CounterIntelligence. 2015 Jan 2;28(1):64–88.
37.
Spielmann K. Using Enhanced Analytic Techniques for Threat Analysis: A Case Study Illustration. International Journal of Intelligence and CounterIntelligence. 2014 Mar;27(1):132–155.
38.
Hastedt G. The Politics of Intelligence and the Politicization of Intelligence: The American Experience. Intelligence and National Security. 2013 Feb;28(1):5–31.
39.
Strachan-Morris D. Threat and Risk: What Is the Difference and Why Does It Matter? Intelligence and National Security. 2012 Apr;27(2):172–186.
40.
Phythian M. Policing Uncertainty: Intelligence, Security and Risk. Intelligence and National Security. 2012 Apr;27(2):187–205.
41.
Gill P. Intelligence, Threat, Risk and the Challenge of Oversight. Intelligence and National Security. 2012 Apr;27(2):206–222.
42.
Canton B. The Active Management of Uncertainty. International Journal of Intelligence and CounterIntelligence. 2008 May 19;21(3):487–518.
43.
Dunn Cavelty M, Mauer V. Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence. Security Dialogue. 2009 Apr 1;40(2):123–144.
44.
Friedman JA, Zeckhauser R. Assessing Uncertainty in Intelligence. Intelligence and National Security. 2012 Dec;27(6):824–847.
45.
Heazle M. Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters. Intelligence and National Security. 2010 June;25(3):290–308.
46.
Rumsfeld D. Press Conference [Internet]. NATO; 2002. Available from: https://www.nato.int/docu/speech/2002/s020606g.htm
47.
A Risk Management Standard [Internet]. Institute of Risk Management; Available from: https://theirm.org/media/886059/ARMS_2002_IRM.pdf
48.
Bellaby R. What’s the Harm? The Ethics of Intelligence Collection. Intelligence and National Security. 2012 Feb;27(1):93–117.
49.
‘Confidential Informants in National Security Investigations’ by Daniel V. Ward [Internet]. Available from: http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/5/
50.
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 2007 Feb;22(1):1–13.
51.
Erskine T. ‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering. Intelligence and National Security. 2004 June;19(2):359–381.
52.
David J. Garrow. FBI Political Harassment and FBI Historiography: Analyzing Informants and Measuring the Effects. The Public Historian [Internet]. University of California Press; 1988;10(4):5–18. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3377831
53.
Herman M. Ethics and Intelligence after September 2001. Intelligence and National Security. 2004 June;19(2):342–358.
54.
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005 Oct;18(3):398–434.
55.
Patterson E, Casale T. Targeting Terror: The Ethical and Practical Implications of Targeted Killing. International Journal of Intelligence and CounterIntelligence. 2005 Dec;18(4):638–652.
56.
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004 Mar;3(1):1–15.
57.
Gill P. Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security. 2009 Feb;24(1):78–102.
58.
A Symposium on Intelligence Ethics. Intelligence and National Security. 2009;24(3):366–386.
59.
Omand GCB SD. Ethical Guidelines in Using Secret Intelligence for Public Security. Cambridge Review of International Affairs. 2006 Dec;19(4):613–628.
60.
Moran J. Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland. Intelligence and National Security. 2010 Feb;25(1):1–23.
61.
Philip Alston. Study on Targeted Killings, UN General Assembly Human Rights Council [Internet]. 2010. Available from: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf
62.
Torture prosecutions against MI5 and MI6 unlikely to be pursued [Internet]. Available from: http://www.guardian.co.uk/law/2012/jan/12/decision-torture-charges-mi5-mi6
63.
Articles on Rendition at The Guardian [Internet]. Available from: http://www.guardian.co.uk/world/rendition
64.
All Party Parliamentary Group on Extraordinary Rendition [Internet]. Available from: http://www.extraordinaryrendition.org/
65.
Telegraph. MI5 and MI6 cleared of torture allegations after more than three years - but further inquiry is launched [Internet]. Available from: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9010223/MI5-and-MI6-cleared-of-torture-allegations-after-more-than-three-years-but-further-inquiry-is-launched.html
66.
James Gaskarth. Entangling alliances? The UK’s complicity in torture in the global war on terrorism [Internet]. 2011. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1111/j.1468-2346.2011.01012.x
67.
Barbara Harlow. ‘Extraordinary renditions’: tales of Guantánamo, a review article. 52:1–29. Available from: http://rac.sagepub.com.ezproxy3.lib.le.ac.uk/content/52/4.toc
68.
Top judge: Binyam Mohamed case shows MI5 to be devious, dishonest and complicit in torture | World news | The Guardian [Internet]. Available from: http://www.guardian.co.uk/world/2010/feb/10/binyam-mohamed-torture-mi5
69.
Richard Norton-Taylor. Role of MI5 and MI6 in rendition has been mired by secrecy and cover-up | World news | The Guardian [Internet]. Available from: http://www.guardian.co.uk/world/2012/jan/12/mi5-mi6-rendition-secrecy
70.
Poynting S. Render unto Caesar. Criminal Justice Matters. 2010 Dec;82(1):14–15.
71.
Sanford Levinson (ed). Torture : A Collection [Internet]. 2004. Available from: https://library.le.ac.uk/uhtbin/cgisirsi/x/0/0/57/5/3?searchdata1=1149401{CKEY}&searchfield1=GENERAL^SUBJECT^GENERAL^^&user_id=WEBSERVER
72.
Alan Dershowitz. Tortured Reasoning [Internet]. Available from: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10263655
73.
Torture: Ends, means and barbarity | The Economist [Internet]. 2003. Available from: http://www.economist.com/node/1522792
74.
Human Rights Watch. Britannia: British Complicity in the Torture and Ill-Treatment of Terror Suspects in Pakistan [Internet]. 2009. Available from: http://www.hrw.org/reports/2009/11/24/cruel-britannia-0
75.
Jane Mayer, The New Yorker 2005. OUTSOURCING TORTURE. 2005 Feb 14;81(1). Available from: http://gl9sn3dh2u.search.serialssolutions.com/?V=1.0&N=50&L=GL9SN3DH2U&S=A_T_B&C=new+yorker
76.
Darius Rejali. Torture and Democracy [Internet]. 2007. Available from: http://site.ebrary.com/lib/leicester/docDetail.action?docID=10320494
77.
Julie Clarke MB. Not Enough Official Torture in the World? The Circumstances in which Torture is Morally Justifiable. 2005; Available from: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr39&id=593&collection=journals&index=journals/usflr
78.
Julie Clarke MB. Tortured Responses (A Reply to Our Critics). 2006; Available from: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/usflr40&id=711&collection=journals&index=journals/usflr
79.
Philip N. S. Rumney. Chapter Eight - The Torture Debate: A Perspective from the United Kingdom [Internet]. 2008. Available from: http://www.palgraveconnect.com.ezproxy3.lib.le.ac.uk/pc/doifinder/10.1057/9780230583542
80.
Roberts A. Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival. 2007 Mar;49(1):199–212.
81.
Alex J. Bellamy. No Pain, No Gain? Torture and Ethics in the War on Terror. International Affairs (Royal Institute of International Affairs 1944-) [Internet]. Wiley; 2006;82(1):1944–148. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133
82.
Kern G. Torture and Intelligence in the Global War on Terror. Intelligence and National Security. 2009 June;24(3):429–457.
83.
Steven Lukes. Liberal Democratic Torture. British Journal of Political Science [Internet]. Cambridge University Press; 2006;36(1):1–16. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313
84.
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program [Internet]. US Senate Select Committee on Intelligence; Available from: http://www.intelligence.senate.gov/study2014.html
85.
Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction [Internet]. American Enterprise Institute; Available from: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf
86.
Roberts A. Review Essay: Torture and Incompetence in the ‘War on Terror’. Survival. 2007 Mar;49(1):199–212.
87.
Kahn D. The Intelligence Failure of Pearl Harbor, Foreign Affairs. Available from: http://heinonline.org.ezproxy3.lib.le.ac.uk/HOL/Page?handle=hein.journals/fora70&id=1004&collection=journals&index=journals/fora
88.
Herman M. What Difference Did It Make? Intelligence and National Security. 2011 Dec;26(6):886–901.
89.
Borch FL. Comparing Pearl Harbor and ‘9/11’: Intelligence Failure? American Unpreparedness? Military Responsibility? The Journal of Military History. 2003;67(3):845–860.
90.
Uri Bar-Joseph and Arie W. Kruglanski. Intelligence Failure and Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise. Political Psychology [Internet]. International Society of Political Psychology; 2003;24(1):75–99. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3792511
91.
9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States [Internet]. 2004. Available from: http://www.9-11commission.gov/
92.
Richard K. Betts. Analysis, War, and Decision: Why Intelligence Failures Are inevitable. World Politics [Internet]. Cambridge University Press; 1978;31(1):61–89. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/2009967
93.
Richard K. Betts. Fixing Intelligence. Foreign Affairs [Internet]. Council on Foreign Relations; 2002;81(1):43–59. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20033002
94.
Goodman MA. 9/11: The Failure of Strategic Intelligence. Intelligence and National Security. 2003 Dec;18(4):59–71.
95.
Douglas J. MacEachin. Predicting the Soviet Invasion of Afghanistan: The Intelligence Community’s Record — Central Intelligence Agency [Internet]. 2007. Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record/predicting-the-soviet-invasion-of-afghanistan-the-intelligence-communitys-record.html
96.
MARRIN S. Preventing Intelligence Failures by Learning from the Past. International Journal of Intelligence and CounterIntelligence. 2004 Dec;17(4):655–672.
97.
Pillar PR. Good literature and bad history: The 9/11 commission’s tale of strategic intelligence. Intelligence and National Security. 2006 Dec;21(6):1022–1044.
98.
Adamsky DP. Disregarding the Bear: How US Intelligence Failed to Estimate the Soviet Intervention in the Egyptian–Israeli War of Attrition 1. Journal of Strategic Studies. 2005 Oct;28(5):803–831.
99.
Zegart A. 9/11 and the FBI: The organizational roots of failure. Intelligence and National Security. 2007 Apr;22(2):165–184.
100.
Hedley JH. Learning from Intelligence Failures. International Journal of Intelligence and CounterIntelligence. 2005 Oct;18(3):435–450.
101.
Hatlebrekke KA, Smith MLR. Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure. Intelligence and National Security. 2010 Apr;25(2):147–182.
102.
Evans G. Rethinking Military Intelligence Failure – Putting the Wheels Back on the Intelligence Cycle. Defence Studies. 2009 Mar;9(1):22–46.
103.
Iraq’s Weapons of Mass Destruction Programs — Central Intelligence Agency [Internet]. Available from: https://www.cia.gov/library/reports/general-reports-1/iraq_wmd/Iraq_Oct_2002.htm
104.
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction [Internet]. Available from: http://govinfo.library.unt.edu/wmd/about.html
105.
Parliamentary Joint Committee on ASIO, ASIS and DSD, Intelligence on Iraq’s Weapons of Mass Destruction [Internet]. 2003. Available from: http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcaad/wmd/report.htm
106.
Danchev A. The Reckoning: Official Inquiries and the Iraq War. Intelligence and National Security. 2004 Sept;19(3):436–466.
107.
Davies P. Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs. 2004 Oct 1;17(3):495–520.
108.
Report of the Inquiry into Australian Intelligence Agencies (Flood Report) [Internet]. Available from: https://catalogue.nla.gov.au/Record/3308786
109.
Dennis M. Gormley. The Limits of Intelligence: Iraq’s Lessons. 2011; Available from: http://ezproxy.lib.le.ac.uk/login?url=https://www.tandfonline.com/doi/abs/10.1080/00396338.2004.9688605
110.
Jervis R. Reports, politics, and intelligence failures: The case of Iraq. Journal of Strategic Studies. 2006;29(1):3–52.
111.
Phythian M. The Perfect Intelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons of Mass Destruction. Politics  Policy. 2006 June;34(2):400–424.
112.
Paul R. Pillar. Intelligence, Policy, and the War in Iraq. Foreign Affairs [Internet]. Council on Foreign Relations; 2006;85(2):15–27. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/20031908
113.
Marrin S. The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis. Intelligence and National Security. 2011 Apr;26(2–3):182–202.
114.
Lucas S. Recognising Politicization: The CIA and the Path to the 2003 War in Iraq. Intelligence and National Security. 2011 Apr;26(2–3):203–227.
115.
The Failure by Thomas Powers | The New York Review of Books [Internet]. Available from: http://www.nybooks.com/articles/archives/2004/apr/29/the-failure/?pagination=false
116.
Review of Intelligence on Weapons of Mass Destruction - Butler Report [Internet]. 2004. Available from: https://www.files.ethz.ch/isn/7078/doc_7085_290_en.pdf
117.
Richard L. Russell. CIA’s Strategic Intelligence in Iraq. Political Science Quarterly [Internet]. The Academy of Political Science; 2002;117(2):191–207. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/798180
118.
Russell RL. A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence and National Security. 2005 Sept;20(3):466–485.
119.
Select Committee on Intelligence United States Senate. Report on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq [Internet]. 2004. Available from: http://hdl.handle.net/2027/umn.31951d02406334o
120.
Farson S. Parliament and its servants: Their role in scrutinizing Canadian intelligence. Intelligence and National Security. 2000 June;15(2):225–258.
121.
Canadian Security Intelligence Review Committee [Internet]. Available from: http://www.sirc-csars.gc.ca/index-eng.html
122.
Shore JJM. Intelligence Review and Oversight in Post-9/11 Canada. International Journal of Intelligence and CounterIntelligence. 2006;19(3):456–479.
123.
Schwarz FAO. The Church Committee and a new era of intelligence oversight. Intelligence and National Security. 2007;22(2):270–297.
124.
Johnson LK. The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability. Intelligence and National Security. 2008;23(2):198–225.
125.
U.S. Senate Select Committee on Intelligence [Internet]. Available from: http://www.intelligence.senate.gov/
126.
Müller-Wille B. Improving the democratic accountability of EU intelligence. Intelligence and National Security. 2006 Feb;21(1):100–128.
127.
Boraz SC. Establishing Democratic Control of Intelligence in Colombia. International Journal of Intelligence and CounterIntelligence. 2006 Jan;19(1):84–109.
128.
Díaz Fernández AM. Halfway down the road to supervision of the Spanish intelligence services. Intelligence and National Security. 2006 June;21(3):440–456.
129.
Peter Gill. The Intelligence and Security Committee and the Challenge of Security Networks. Review of International Studies [Internet]. 2009;35(4). Available from: http://ezproxy.lib.le.ac.uk/login?url=https://www.cambridge.org/core/journals/review-of-international-studies/article/intelligence-and-security-committee-and-the-challenge-of-security-networks/EE30C2105597F02BA24E95C0CDB46648
130.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007 Feb;22(1):14–37.
131.
Phythian M. The British experience with intelligence accountability. Intelligence and National Security. 2007 Feb;22(1):75–99.
132.
Glees A, Davies PHJ. Intelligence, Iraq and the limits of legislative accountability during political crisis. Intelligence and National Security. 2006 Oct;21(5):848–883.
133.
Ian Leigh HB. Democratic Accountability of Intelligence Services. SIPRI Yearbook 2007 [Internet]. Available from: https://www.sipri.org/yearbook/2007/05
134.
Puyvelde DV. Intelligence Accountability and the Role of Public Interest Groups in the United States. Intelligence and National Security. 2013 Apr;28(2):139–158.
135.
Leigh I. Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11. Intelligence and National Security. 2012 Oct;27(5):722–738.
136.
Hillebrand C. The Role of News Media in Intelligence Oversight. Intelligence and National Security. 2012 Oct;27(5):689–706.
137.
National security and intelligence - Inside Government - GOV.UK [Internet]. Available from: https://www.gov.uk/government/organisations/national-security
138.
Byman D. The Intelligence War on Terrorism. Intelligence and National Security. 2014 Nov 2;29(6):837–863.
139.
Moran J, Phythian M. Intelligence, security and policing post-9/11: The UK’s response to the war on terror [Internet]. Basingstoke: Palgrave Macmillan; 2008. Available from: http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/book/10.1057/9780230583542
140.
Sims J. Intelligence to counter terror: The importance of all-source fusion. Intelligence and National Security. 2007 Feb;22(1):38–56.
141.
Making Sense of Snowden. The Political Quarterly. 2013 Oct;84(4):433–435.
142.
Johnson LK, Aldrich RJ, Moran C, Barrett DM, Hastedt G, Jervis R, Krieger W, McDermott R, Omand D, Phythian M, Wark WK. An                              Special Forum: Implications of the Snowden Leaks. Intelligence and National Security. 2014 Nov 2;29(6):793–810.
143.
Bauman Z, Bigo D, Esteves P, Guild E, Jabri V, Lyon D, Walker RBJ. After Snowden: Rethinking the Impact of Surveillance. International Political Sociology. 2014 June;8(2):121–144.
144.
UK Intelligence and Security Committee - Transcript of Evidence Provided by Heads of UK Intelligence Agencies [Internet]. Available from: https://isc.independent.gov.uk/wp-content/uploads/2021/01/20131107_ISC_uncorrected_transcript.pdf
145.
Richards J. Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy. Intelligence and National Security. 2012 Oct;27(5):761–780.
146.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007 Feb;22(1):14–37.
147.
Gill P. Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security. 2009 Feb;24(1):78–102.
148.
How MI5 missed the links to the July 7 suicide bombers | UK news | The Guardian [Internet]. Available from: http://www.guardian.co.uk/uk/2007/may/01/topstories3.july7
149.
7/7 leader: more evidence reveals what police knew | UK news | The Guardian [Internet]. Available from: http://www.guardian.co.uk/uk/2007/may/03/july7.topstories3
150.
Internet jihad: A world wide web of terror | The Economist [Internet]. Available from: http://www.economist.com/node/9472498
151.
Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks of July 7 2005 [Internet]. 2009. Available from: https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20090519_ISC_7-7_Review.pdf?attachauth=ANoY7cqKdpgFYNagKwMI8gbLThBWwW_FZ_XpRKBFWRfOo8hX4vYnK7bIWs0Q6k1UGleR7FNPXWt3FVKGMkaaALWq4bJxLOjyAAfoqllRoEuchxfJXqLRN4RFGcpPedSpyyStqjuT_x_9TxbldxjXvKfolzHa4vyIUwwY3V1KQc_0ky3meEYh5ec70ROdFGCFftIP7xTYO9BIbJVESCk6cAqSsBfY3lQzEb834gfXv7v-eqzBBk3ZaAg%3D&attredirects=0
152.
US House of Representatives Homeland Security Committee Report - The Road to Boston: Counterterrorism Challenges and Lessons from the Marathon Bombings [Internet]. Available from: https://homeland.house.gov/sites/homeland.house.gov/files/documents/Boston-Bombings-Report.pdf
153.
OIG Report - Unclassified Summary of Information Handling and Sharing Prior to the April 15, 2013 Boston Marathon Bombings [Internet]. Available from: http://www.justice.gov/oig/reports/2014/s1404.pdf
154.
Russia Didn’t Share All Details on Boston Bombing Suspect, Report Says - NYTimes.com [Internet]. Available from: http://www.nytimes.com/2014/04/10/us/russia-failed-to-share-details-on-boston-marathon-bombing-suspect.html?_r=0
155.
Russia: Boston bombing report is effort to ‘whitewash US intelligence failures’ - RT News [Internet]. RT News; Available from: http://rt.com/news/russia-boston-bombing-report-180/