1,631
Views
6
CrossRef citations to date
0
Altmetric
Research Article

Reflexive intelligence and converging knowledge regimes

Bibliography

  • Agrell, W., and G. F. Treverton. National Intelligence and Science, beyond the Great Divide in Analysis and Policy. Oxford: Oxford University Press, 2015.
  • Aradau, C., and J. Huysmans. “Critical Methods in International Relations, the Politics of Techniques, Devices and Acts.” European Journal of International Relations 20, no. 3 (2014): 596–619. doi:10.1177/1354066112474479.
  • Aradau, C., and J. Huysmans. “Assembling Credibility: Knowledge, Method and Critique in Times of ‘Post-truth’.” Security Dialogue 50, no. 1 (2019): 40–58. doi:10.1177/0967010618788996.
  • Aradau, C., J. Huysmans, A. Neal, and N. Voelkner, eds. Critical Security Methods, New Frameworks for Analysis. New York: Routledge, 2015.
  • Artner, S., R. S. Girven, and J. B. Bruce. Assessing the Value of Structured Analytic Techniques in the U.S. Intelligence Community. Washington, DC: RAND, 2016.
  • Bean, H. No More Secrets: Open Source Information and the Reshaping of U.S. Intelligence. Santa Monica, CA: Praeger, 2011.
  • Bean, H. “Rhetorical and Critical/Cultural Intelligence Studies.” Intelligence and National Security 28, no. 4 (2013): 495–519.  doi: 10.1080/02684527.2012.699284
  • Bean, H. “Intelligence Theory from the Margins: Questions Ignored and Debates Not Had.” Intelligence and National Security 33, no. 4 (2018): 527–540. doi:10.1080/02684527.2018.1452544.
  • Bellingcat. “JIT Indictments and Reactions: Analyzing New Evidence Linking Separatists and Russian Officials to MH17.” July 17, 2019. https://www.bellingcat.com/news/uk-and-europe/2019/07/17/jit-indictments-and-reactions-analyzing-new-evidence-linking-separatists-and-russian-officials-to-mh17/
  • Bellingcat. “Bellingcat Policy Plan 2019–2020.” 2020. https://www.bellingcat.com/about/attachment/bellingcat-policy-plan-2019-2021/
  • Ben Jaffel, H. Anglo-European Intelligence Cooperation: Britain in Europe, Europe in Britain. London: Routledge, 2019.
  • Ben Jaffel, H., A. Hoffmann, O. Kearns, and S. Larsson. “Collective Discussion: Toward Critical Approaches to Intelligence as a Social Phenomenon.” International Political Sociology 14, no. 3 (2020): 323–344. doi:10.1093/ips/olaa015.
  • Cavelty, M. D., and V. Mauer. “Postmodern Intelligence, Strategic Warning in an Age of Reflexive Intelligence.” Security Dialogue 40, no. 2 (2009): 123–144. doi:10.1177/0967010609103071.
  • Chang, W., E. Berdini, D. R. Mandel, and P. E. Tetlock. “Restructuring Structured Analytic Techniques in Intelligence.” Intelligence and National Security 33, no. 3 (2018): 337–356. doi:10.1080/02684527.2017.1400230.
  • Coulthart, S. J. “An Evidence-Based Evaluation of 12 Core Structured Analytic Techniques.” International Journal of Intelligence and CounterIntelligence 30, no. 2 (2017): 368–391. doi:10.1080/08850607.2016.1230706.
  • CTIVD. 2019. “De gegevensverstrekking door de AIVD over het Cornelius Haga Lyceum.” No. 67. November 20.
  • Davids, W. J. M. Rapport Commissie van onderzoek besluitvorming Irak. Den Haag: Boom, 2010.
  • de Graaff, B. 2010. “Inlichtingen- en veiligheidsdiensten als schaamlap.” Openbaar Bestuur, April.
  • de Graaff, B., and C. Wiebes. Villa Maarheze: De geschiedenis van de inlichtingendienst buitenland. Den Haag: SDU, 1999.
  • de Jong, B. “Russische spionagepraktijken in de 21e eeuw: de zaak-Raymond P.” Internationale Spectator 67, no. 10 (2013): 47–51.
  • de Valk, G. G. “All-source Intelligence.” In Inlichtingen en veiligheidsdiensten, edited by B. A. de Graaf, E. R. Muller, and J. A. van Reijn, 507–533. Alphen aan den Rijn: Kluwer, 2010.
  • de Werd, P. US Intelligence and Al Qaeda: Analysis by Contrasting Narratives. Edinburgh: Edinburgh University Press, 2020.
  • Delanty, G., and P. Strydom, eds. Philosophies of Social Science: The Classic and Contemporary Readings. Philadelphia: Open University Press, 2003.
  • Durbin, B. “The Scholar-Practitioner Divide in Intelligence.” In Researching National Security Intelligence: Multidisciplinary Approaches, edited by S. Coulthart, M. Landon-Murray, and D. Van Puyvelde, 179–192. Washington, DC: Georgetown University Press, 2019.
  • Eriksson, G. Swedish Military Intelligence. Edinburgh: Edinburgh University Press, 2018.
  • Eriksson, G. “A Theoretical Reframing of the Intelligence-policy Relation.” Intelligence and National Security 33, no. 4 (2018): 553–561. doi:10.1080/02684527.2018.1452558.
  • Furlong, P., and D. Marsh. “A Skin Not A Sweater, Ontology and Epistemology in Political Science.” In Theory and Methods in Political Science, edited by D. Marsh and G. Stoker, 184–211. 3rd ed. New York, NY: Palgrave Macmillan, 2010.
  • Gill, P. “Intelligence, Threat, Risk and the Challenge of Oversight.” Intelligence and National Security 27, no. 2 (2012): 206–222. doi:10.1080/02684527.2012.661643.
  • Gill, P., and M. Phythian. Intelligence in an Insecure World. 2nd ed. Cambridge: Polity Press, 2012.
  • Girard, J., and J. Girard. “Defining Knowledge Management: Toward an Applied Compendium.” Online Journal of Applied Knowledge Management 3, no. 1 (2015): 1–20.
  • Heuer, R. J., Jr., and R. H. Pherson. Structured Analytic Techniques For Intelligence Analysis. 3rd ed. Washington, DC: CQ Press, 2021.
  • Hitz, F. P., and B. J. Weiss. “Helping the CIA and FBI Connect the Dots in the War on Terror.” International Journal of Intelligence and Counterintelligence 17, no. 1 (2004): 1–41. doi:10.1080/08850600490252641.
  • Hulnick, A. S. “Intelligence and Law Enforcement: The “Spies are Not Cops” Problem.” International Journal of Intelligence and Counterintelligence 10, no. 3 (1997): 269–286. doi:10.1080/08850609708435350.
  • Hulnick, A. S. “Intelligence Reform 2007: Fix or Fizzle?” International Journal of Intelligence and Counterintelligence 20, no. 4 (2007): 567–582. doi:10.1080/08850600701472939.
  • Jones, N. “Critical Epistemology for Analysis of Competing Hypotheses.” Intelligence and National Security 33, no. 2 (2018): 273–289. doi:10.1080/02684527.2017.1395948.
  • Mandel, D. R. “The Occasional Maverick of Analytic Tradecraft.” Intelligence and National Security 35, no. 3 (2020): 438–443. doi:10.1080/02684527.2020.1723830.
  • Marrin, S. “Intelligence Analysis and Decision-making, Methodological Challenges.” In Intelligence Theory: Key Questions and Debates, edited by P. Gill, S. Marrin, and M. Phythian, 131–150. London: Routledge, 2009.
  • Marrin, S. Improving Intelligence Analysis. London: Routledge, 2011.
  • Marrin, S. “Is Intelligence Analysis an Art or a Science?” International Journal of Intelligence and CounterIntelligence 25, no. 3 (2012): 529–545. doi:10.1080/08850607.2012.678690.
  • Marrin, S. “Why Strategic Intelligence Analysis Has Limited Influence on American Foreign Policy.” Intelligence and National Security 32, no. 6 (2017): 725–742. doi:10.1080/02684527.2016.1275139.
  • Marrin, S. “Analytic Objectivity and Science: Evaluating the U.S. Intelligence Community’s Approach to Applied Epistemology.” Intelligence and National Security 35, no. 3 (2020): 350–366. doi:10.1080/02684527.2019.1710806.
  • Modderkolk, H. 2017. “Syriër die opdook in debatcentrum De Balie ontkent oud-IS strijder te zijn.” De Volkskrant, December 12. https://www.volkskrant.nl/nieuws-achtergrond/syrier-die-opdook-in-debatcentrum-de-balie-ontkent-oud-is-strijder-te-zijn~ba9c7a42/
  • Moore, D. T. Sensemaking, A Structure for an Intelligence Revolution. Washington, DC: National Defense Intelligence College, 2011.
  • Nolan, B. R. “Ethnographic Research in the Intelligence Community: Opportunities and Challenges.” Secrecy and Society 2, no. 1 (2018): 1–31.
  • Nolan, B. R. “A Sociological Approach to Intelligence Studies.” In Researching National Security Intelligence: Multidisciplinary Approaches, edited by S. Coulthart, M. Landon-Murray, and D. Van Puyvelde, 79–94. Washington, DC: Georgetown University Press, 2019.
  • Phythian, M. “Policing Uncertainty: Intelligence, Security and Risk.” Intelligence and National Security 27, no. 2 (2012): 187–205. doi:10.1080/02684527.2012.661642.
  • Phythian, M., ed. Understanding the Intelligence Cycle. London: Routledge, 2013.
  • Räsänen, M., and J. M. Nyce. “The Raw Is Cooked: Data in Intelligence Practice.” Science, Technology & Human Values 38, no. 5 (2013): 655–677. doi:10.1177/0162243913480049.
  • Ratcliffe, J. H. Intelligence-led Policing. 2nd ed. New York: Routledge, 2016.
  • Rietjens, S. “Unraveling Disinformation: The Case of Malaysia Airlines Flight MH17.” The International Journal of Intelligence, Security, and Public Affairs 21, no. 3 (2019): 195–218. doi:10.1080/23800992.2019.1695666.
  • Salter, M. B., and C. E. Mutlu. Research Methods in Critical Security Studies. London: Routledge, 2013.
  • Splidsboel Hansen, F. “An Argument for Reflexivity in Intelligence Work.” Intelligence and National Security 27, no. 3 (2012): 349–370. doi:10.1080/02684527.2012.668077.
  • Tang, J. “How Do We Know? What Intelligence Analysis Can Learn from the Sociology of Science.” Intelligence and National Security 32, no. 5 (2017): 663–674. doi:10.1080/02684527.2017.1311473.
  • US Office of the Director of National Intelligence. “Intelligence Community Directive 203.” January, 2015. https://www.dni.gov/files/documents/ICD/ICD%20203%20Analytic%20Standards.pdf
  • van der Geest, C. Van Daderschap naar Intentie. Utrecht: Universiteit Utrecht, 2008.
  • van Es, A., and A. Stoffelen. 2019. “Wat hebben Fatah en Aziz in Syrië gedaan?” De Volkskrant, April 5. https://www.volkskrant.nl/kijkverder/v/2019/wat-hebben-fatah-en-aziz-in-syrie-gedaan/
  • Vrist Rønn, K., and S. Høffding. “The Epistemic Status of Intelligence: An Epistemological Contribution to the Understanding of Intelligence.” Intelligence and National Security 28, no. 5 (2013): 694–716. doi:10.1080/02684527.2012.701438.
  • Warner, M. “Fragile and Provocative: Notes on Secrecy and Intelligence.” Intelligence and National Security 27, no. 2 (2012): 223–240. doi:10.1080/02684527.2012.661644.
  • Woodard, N. “Tasting the Forbidden Fruit, Unlocking the Potential of Positive Politicization.” Intelligence and National Security 28, no. 1 (2013): 91–108. doi:10.1080/02684527.2012.749066.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.