2,108
Views
4
CrossRef citations to date
0
Altmetric
Research Article

Adding value to the intelligence community: what role for expert external advice?

Bibliography

  • Adam, D. “Special Report: The Simulations Driving the World’s Response to COVID-19.” Nature 580, no. 7803 (2020): 316–318. doi:10.1038/d41586-020-01003-6.
  • Aldrich, R., P. Müller, D. Ridd, and E. Schmidt-Eenboom. “Operation Rubicon: Sixty Years of German-American Success in Signals Intelligence.” Intelligence and National Security 35, no. 5 (2020): 603–607. doi:10.1080/02684527.2020.1774849.
  • Andrew, C. The Defence of the Realm: The Authorised History of MI5. London: Penguin, 2010.
  • Barber, B. Jihad Vs McWorld. New York: Times Books, 1995.
  • Bendixen, C., and J. C. Jacobsen. “Nullifying Quality: The Marketisation of Higher Education.” Quality in Higher Education 23, no. 1 (2017): 20–34. doi:10.1080/13538322.2017.1294406.
  • Betsch, C., L. Wieler, and K. Habersaat. “Monitoring Behavioural Insights Related to COVID-19.” The Lancet 395, no. 10232 (2020): 1255–1265. doi:10.1016/S0140-6736(20)30729-7.
  • Butler. Review of Intelligence on Weapons of Mass Destruction. London: HMSO, 2004.
  • Carter, J. G., and D. L. Carter. “Law Enforcement Intelligence: Implications for Self-radicalized Terrorism.” Police Practice and Research 13, no. 2 (2012): 138–154. doi:10.1080/15614263.2011.596685.
  • Chilcot, J. The Iraq Inquiry. London: HMSO, 2016.
  • Clarke, J., and J. Newman. “People in This Country Have Had Enough of Experts’: Brexit and the Paradoxes of Populism.” Critical Policy Studies 11, no. 1 (2017): 101–116. doi:10.1080/19460171.2017.1282376.
  • Cudworth, E., and S. Hobden. Posthuman International Relations: Complexity, Ecologism and Global Politics. London: Zed Books, 2011.
  • Davies, P. “Intelligence Culture and Intelligence Failure in Britain and the United States.” Cambridge Review of International Affairs 17, no. 3 (2004): 495–520. doi:10.1080/0955757042000298188.
  • Davies, P., and K. Gustafson. “Complexity, Uncertainty and a Military Intelligence Doctrine for the 21st Century.” Political Studies Association Conference (2015): 1–20.
  • Department of Defense, Defense Technical Information Centre. Joint Publication 2-0, Joint Intelligence. Createspace: Washington, DC, 2013.
  • Dobson, M. “Operation Rubicon: Germany as an Intelligence ‘Great Power’?” Intelligence and National Security 35, no. 5 (2020): 608–622. doi:10.1080/02684527.2020.1774852.
  • Dodge, T. What Were the Causes and Consequences of Iraq’s Descent into Violence after the Initial Invasion? London: The Iraq Inquiry, 2009. https://webarchive.nationalarchives.gov.uk/20120215203302/http://www.iraqinquiry.org.uk/articles.aspx.
  • Dover, R., and M. Goodman. Learning Lessons from the Secret Past. Washington: Georgetown University Press, 2011.
  • Dover, R., and M. Goodman. “The Public Policy Role of Intelligence Scholars.” In The Routledge International Handbook of Universities, Security and Intelligence Studies, edited by L. Gearon, 342–351. Abingdon: Routledge, 2019.
  • Dover, R., M. Goodman, and M. White. “Chapter 25: Two Worlds, One Common Pursuit: Why Greater Engagement with the Academic Community Could Benefit the UK’s National Security.” In The Palgrave Handbook of Security, Risk and Intelligence, edited by R. Dover, H. Dylan, and M. Goodman, 461–477. London: Palgrave, 2017.
  • Dudley, C. “Information-Centric Intelligence: The Struggle in Defining National Security Issues.” International Journal of Intelligence and CounterIntelligence 31, no. 4 (2018): 758–768. doi:10.1080/08850607.2018.1488503.
  • Dymydiuk, J. “RUBICON and Revelation: The Curious Robustness of the ‘Secret’ CIA-BND Operation with Crypto AG.” Intelligence and National Security 35, no. 5 (2020): 641–658. doi:10.1080/02684527.2020.1774853.
  • Eldridge, C., C. Hobbs, and M. Moran. “Fusing Algorithms and Analysts: Open-source Intelligence in the Age of ‘Big Data.” Intelligence and National Security 33, no. 3 (2018): 391–406. doi:10.1080/02684527.2017.1406677.
  • EUCOM. 2020. “Welcome to the United States European Command.” Accessed July 3 2020. https://www.eucom.mil/
  • Galloway, C. “Blink and They’re Gone: PR and the Battle for Attention.” Public Relations Review 43, no. 5 (2017): 969–977. doi:10.1016/j.pubrev.2017.06.010.
  • Gentry, J. “The “Professionalization” of Intelligence Analysis: A Skeptical Perspective.” International Journal of Intelligence and CounterIntelligence 29, no. 4 (2016): 643–676. doi:10.1080/08850607.2016.1177393.
  • Gibson, S. “Open Source Intelligence.” The RUSI Journal 149, no. 1 (2004): 16–22. doi:10.1080/03071840408522977.
  • Gibson, S. “Exploring the Role and Value of Open Source Intelligence.” In Open Source Intelligence in the Twenty-First Century New Approaches and Opportunities, edited by C. Hobbs, M. Moran, and D. Salisbury, 9–23. Basingstoke: Palgrave, 2018.
  • Gill, P. “Of Intelligence Oversight and the Challenge of Surveillance Corporatism.” Intelligence and National Security (2020): 1–20. doi:10.1080/02684527.2020.1783875.
  • Glees, A. “The Stasi’s UK Operations: Subversion and Espionage’, 1973–1989.” The Journal of Intelligence History 7, no. 1 (2007): 61–82. doi:10.1080/16161262.2007.10555139.
  • Goodman, M. 2015. Writing the Official History of the Joint Intelligence Committee. Partnership for Conflict, Crime and Security Research. Accessed November 7 2016. www.paccsresearch.org.uk/blog/writing-the-official-history-of-the-joint-intelligence-committee/
  • Goodman, M. The Official History of the Joint Intelligence Committee: 1. Abingdon: Routledge, 2015.
  • Goodman, M., and D. Omand. “What Analysts Need to Understand: The Kings Intelligence Studies Programme.” Studies in Intelligence 52/4 (2008): 57–65. (December 2008).
  • Graham, M., S. Ojanperä, and M. Dittus. “Internet Geographies.” Society and the Internet: How Networks of Information and Communication are Changing Our Lives edited by Dutton, W & Graham, M, 58 (2019): 58-79. Oxford University Press: Oxford.
  • Harvey, A., and G. Russell-Mundine. “Decolonising the Curriculum: Using Graduate Qualities to Embed Indigenous Knowledges at the Academic Cultural Interface.” Teaching in Higher Education 24, no. 6 (2019): 789–808. doi:10.1080/13562517.2018.1508131.
  • Hellmich, C. “Creating the Ideology of Al Qaeda: From Hypocrites to Salafi-Jihadists.” Studies in Conflict & Terrorism 31, no. 2 (2008): 111–124. doi:10.1080/10576100701812852.
  • Herman, M. Intelligence Power in Peace and War. Cambridge: Cambridge University Press, 1996.
  • Heuer, R., and R. Pherson. Structured Analytic Techniques for Intelligence Analysis. New York: CQ Press, 2010.
  • Hulnick, A. “The Downside of Open Source Intelligence.” International Journal of Intelligence and CounterIntelligence 15, no. 4 (2002): 565–579. doi:10.1080/08850600290101767.
  • Hulnick, A. “The Dilemma of Open Sources Intelligence: Is OSINT Really Intelligence?” In The Oxford Handbook of National Security Intelligence, edited by L. Johnson, 229–241. Oxford: Oxford University Press, 2010.
  • Jervis, R. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. New York: Cornell University Press, 2010.
  • Jin, J., K. Kanagaretnam, and G. Lobo. “Ability of Accounting and Audit Quality Variables to Predict Bank Failure during the Financial Crisis.” Journal of Banking & Finance 35/11 (2011): 2811–2819. doi:10.1016/j.jbankfin.2011.03.005.
  • Joffe, G. Iraq and Its Environment before March 2003. London: The Iraq Inquiry, 2009. https://webarchive.nationalarchives.gov.uk/20120215210701/http://www.iraqinquiry.org.uk/articles/environment.aspx.
  • Johnson, L. K., R. J. Aldrich, C. Moran, D. Barrett, G. Hastedt, R. Jervis, W. Krieger, et al. “An INS Special Forum: Implications of the Snowden Leaks.” Intelligence and National Security 29, no. 6 (2014): 793–810. doi:10.1080/02684527.2014.946242.
  • Johnston, R. Analytic Culture in the US Intelligence Community: An Ethnographic Study. Langley: CIA, 2005.
  • Kamali, S. “Informants, Provocateurs, and Entrapment: Examining the Histories of the FBI’s PATCON and the NYPD’s Muslim Surveillance Program.” Surveillance & Society 15, no. 1 (2017): 68–78. doi:10.24908/ss.v15i1.5254.
  • Kent, S. Strategic Intelligence for American World Policy. Princeton: Princeton University Press, 1949.
  • Lancaster University. 2015. National Centre for Research and evidence on Security Threats. Accessed November 5 2015. www.lancaster.ac.uk/security-lancaster/news-and-events/news/2015/national-centre-for-research-and-evidence-on-security-threats/
  • Lentzos, F., M. S. Goodman, and J. M. Wilson. “Health Security Intelligence: Engaging across Disciplines and Sectors.” Intelligence and National Security 35, no. 4 (2020): 465–476. doi:10.1080/02684527.2020.1750166.
  • Mahbubani, K. Has China Won?: The Chinese Challenge to American Primacy. New York: Ingram Publishers, 2020.
  • Manget, F. “Intelligence and Law Enforcement.” In The Oxford Handbook of National Security Intelligence, edited by L. Johnson, 189–211. Oxford: Oxford University Press, 2010.
  • Marret, J. L. “Al-Qaeda in Islamic Maghreb: A “Glocal” Organization.” Studies in Conflict & Terrorism 31, no. 6 (2008): 541–552. doi:10.1080/10576100802111824.
  • McCarthy, K. After Blowing $100m to Snoop on Americans’ Phone Call Logs for Four Years, What Did the NSA Get? Just One Lead. Accessed June 24 2020. San Francisco: The Register, 2020. https://www.theregister.com/2020/02/26/nsa_calllogging_program/last
  • Miller, B. Narratives of Guilt and Compliance in Unified Germany: Stasi Informers and Their Impact on Society. Abingdon: Routledge, 1999.
  • Miller, B. H. “Open Source Intelligence (OSINT): An Oxymoron?” International Journal of Intelligence and CounterIntelligence 31, no. 4 (2018): 702–719. doi:10.1080/08850607.2018.1492826.
  • National Crime Agency. Special Officer Scheme. Accessed June 1 2020. www.nationalcrimeagency.gov.uk/careers/specials
  • Nielsen, R. P. “Reformed National Security Internal Whistleblowing Systems and External Whistleblowing as Countervailing Ethics Methods.” Administration & Society 52, no. 5 (2020): 660–689. doi:10.1177/0095399718760583.
  • Nunan, J., Stanier, I., Milne, R., Shawyer, A., & Walsh, D. (2020). Eliciting human intelligence: Police source handlers’ perceptions and experiences of rapport during CHIS interactions. Psychiatry, Psychology and Law, 1-27.
  • Parker, G. Dominic Cummings Job Ad Opens Number 10 to ‘Wild Cards’ and ‘Assorted Weirdos. London: Financial Times, 2020. January 2.
  • Porter, P. Military Orientalism: Eastern War Through Western Eyes. London: Hurst, 2009.
  • Rosenberg, J. “Globalization Theory: A Post Mortem.” International Politics 42 (2005): 2–74. doi:10.1057/palgrave.ip.8800098.
  • Rosenberg, J. “International Relations — The ‘Higher Bullshit’: A Reply to the Globalization Theory Debate.” International Politics 44 (2007): 450–482. doi:10.1057/palgrave.ip.8800200.
  • Samtani, S., M. Abate, V. Benjamin, and W. Li. “Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective.” In The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by T. Holt and A. Bossler, 135–154. 2020. Palgrave: Basingstoke.
  • Scott, P. “The Contemporary Security Vetting Landscape.” Intelligence and National Security 35, no. 1 (2020): 54–71. doi:10.1080/02684527.2019.1665688.
  • Sims, J. “What Is Intelligence? Information for Decision Makers.” In U.S. Intelligence at the Crossroads: Agenda for Reform, edited by R. Godson, E. May, and G. Schmitt, pp. 3-17. Washington DC: Brasseys, 1995.
  • Steele, R. D. On Intelligence: Spies and Secrecy in an Open World. Fairfax VA: AFCEA International Press, 2000.
  • Steele, R. “Open Source Intelligence (Operational).” In Handbook of Intelligence Studies, edited by L. Johnson ( Chapter 10), 129–147. NY: Routledge, 2008.
  • Stern, N. Research Excellence Framework Review: Building on Success and Learning from Experience. London: HMSO, 2016.
  • Stollemyre, S. “HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence.” International Journal of Intelligence and CounterIntelligence 28, no. 3 (2015): 578–589. doi:10.1080/08850607.2015.992760.
  • Syed, M. Rebel Ideas: The Power of Diverse Thinking. London: John Murray, 2019.
  • The Daily Telegraph. 2020 14 June. ‘Boris Johnson ‘Scrapped Cabinet Pandemic Committee Six Months before Coronavirus Hit UK’, The Daily Telegraph: London.
  • The Times. 2020 June 22. ”Professor Rosemary Hollis Obituary”, The Times. London. https://www.thetimes.co.uk/article/professor-rosemary-hollis-obituary-5sb528gb2
  • UK Cabinet Office. 2015. The Cross-Government Trial Advice Panel. London: HMSO. Accessed November 6 2015. www.gov.uk/government/uploads/system/uploads/attachment_data/file/451336/the_Cross-Government_Trial_Advice_Panel.pdf
  • UK Cabinet Office. 2019. “Head of the Intelligence Assessment Academy.” Accessed June 24 2020. https://cabinetofficejobs.tal.net/vx/mobile-0/appcentre-1/brand-2/candidate/so/pm/1/pl/16/opp/3977-3977-Head-of-the-Intelligence-Assessment-Academy/en-GB
  • UK Government. August 2015. The What Works Network. London: HMSO. Accessed November 6 2015. www.gov.uk/guidance/what-works-network
  • UK Government. 2015. “Open Government Blog.” Accessed November 6 2015. https://openpolicy.blog.gov.uk/tools-and-techniques/
  • UK Government. 2016. Horizon Scanning Programme Team. Accessed November 7 2016. www.gov.uk/government/groups/horizon-scanning-programme-team
  • UK Government Office for Science. Blackett Review of High Impact Low Probability Risks. Ref: BIS/12/519. London: HMSO, 2012.
  • UK Parliament. Intelligence and Security Committee: Diversity and Inclusion in the UK Intelligence Community - 2018 Report. London: HMSO, 2018.
  • UK Parliament. 2020. “UK Parliamentary Office for Science and Technology.” Accessed June 24 2020. https://post.parliament.uk/category/analysis/covid-19/
  • UK Research and Innovation. “Get Funding for Ideas that Address COVID-19.” Accessed June 24 2020. https://www.ukri.org/funding/funding-opportunities/ukri-open-call-for-research-and-innovation-ideas-to-address-covid-19/
  • Walsh, P., and S. Miller. “Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden.” Intelligence and National Security 31, no. 3 (2016): 345–368. doi:10.1080/02684527.2014.998436.
  • Wells, D., and H. Gibson. “OSINT from a UK Perspective: Considerations from the Law Enforcement and Military Domains.” In Proceedings Estonian Academy of Security Sciences, 16: From Research to Security Union edited by Maasing, H,  84–113. Estonian Academy of Security Sciences, 2017.
  • Williams, H., and I. Blum. Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. California: RAND Corporation, 2018.
  • Wolf, M., and A. McElvoy. Man without a Face: The Autobiography of Communism’s Greatest Spymaster, 365. New York: Times Books, 1997.
  • Zegart, A., and M. Morrell. “Spies, Lies, and Algorithms: Why U.S. Intelligence Agencies Must Adapt or Fail.” Foreign Affairs May/June 2019 (2019): 83–96.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.