9,187
Views
1
CrossRef citations to date
0
Altmetric

References

  • Abrahamsen, R. Democracy and Global Governance: Power, Justice and the Discourse of Development. London: Zed, 2000.
  • Atkinson, C. “Patriarchy, Gender, Infantilisation: A Cultural Account of Police Intelligence Work in Scotland.” Australian & New Zealand Journal of Criminology 50, no. 2 (2016): 234–251. doi:10.1177/0004865815626964.
  • Baker-Beall, C. “The Threat of the ‘Returning Foreign Fighters’: The Securitization of EU Migration and Border Control Policy.” Security Dialogue 50, no. 5 (2019): 1–17. doi:10.1177/0967010619857048.
  • Balzacq, T. “A Theory of Securitization: Origins, Core Assumptions and Variants.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by T. Balzacq, 1–30. London: Routledge, 2011.
  • Bar-Joseph, U., and J. S. Levy. “Conscious Action and Intelligence Failure.” Political Science Quarterly 124, no. 3 (2009): 461–488. doi:10.1002/j.1538-165X.2009.tb00656.x.
  • Barnard, E., L. K. Johnson, and J. Porter. “Environmental Security Intelligence: The Role of US Intelligence Agencies and Science Advisory Groups in Anticipating Climate Security Threats.” Journal of Intelligence History published online (Dec. 2021). doi:10.1080/16161262.2021.2021687 1–16.
  • Basham, V. M., A. Belkin, and J. Gifkins. “What is Critical Military Studies?” Critical Military Studies 1, no. 1 (2015): 1–2. doi:10.1080/23337486.2015.1006879.
  • Bean, H. “Intelligence Theory from the Margins: Questions Ignored and Debates Not Had.” Intelligence and National Security 33, no. 4 (2018): 527–540. doi:10.1080/02684527.2018.1452544.
  • Bean, H., P. de Werd, and C. Ivan. “Critical Intelligence Studies: Introduction to the Special Issue.” Intelligence and National Security 36, no. 4 (2021): 467–475. doi:10.1080/02684527.2021.1893068.
  • Ben Jaffel, H., A. Hoffmann, O. Kearns, and S. Larsson. “Collective Discussion: Toward Critical Approaches to Intelligence as a Social Phenomenon.” International Political Sociology 14, no. 3 (2020): 323–344. doi:10.1093/ips/olaa015.
  • Betts, R. K. “Analysis, War, and Decision: Why Intelligence Failures are Inevitable.” World Politics 31, no. 1 (1978): 61–89. doi:10.2307/2009967.
  • Bigo, D. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives: Global, Local, Political 27, no. 1_suppl (2002): 63–92. doi:10.1177/03043754020270S105.
  • Booth, K. “Security and Emancipation.” Review of International Studies 17, no. 4 (1991): 313–326. doi:10.1017/S0260210500112033.
  • Booth, K. Theory of World Security. Cambridge: Cambridge University Press, 2007.
  • Buckley, J. “Intelligence and Organised Crime – Paradigms and Paradoxes.” In The Palgrave Handbook of Security, Risk and Intelligence, edited by R. Dover, H. Dylan, and M. S. Goodman, 137–154. London: Palgrave, 2017.
  • Buzan, B. People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. 2nd ed. Boulder: Lynne Rienner, 1991.
  • Buzan, B., and O. Waever. Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press, 2003.
  • Buzan, B., O. Waever, and J. De-Wilde. Security: A New Framework for Analysis. London: Boulder, 1998.
  • Cabral, E. “No Going Back. Mexican Women Find Opportunity and Obstacles in a Changing Economy.” Human Development Report 25, no. 3 (1994): 11–17.
  • Collins, A. Contemporary Security Studies. Oxford: Oxford University Press, 2007.
  • Dragonfly’s Security Intelligence & Analysis Service. “Al Qaeda Revived by Taliban Takeover.” 19 August 2021. https://www.dragonflyintelligence.com/news/global-al-qaeda-revived-by-taliban-takeover/
  • Duvenage, M. A. “The Professional Identity of Security Risk Intelligence Analysts in the Private Sector: An International Perspective.” PhD thesis, University of Portsmouth (2021).
  • Elbe, S. “Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security.” International Studies Quarterly 50, no. 1 (2006): 119–144. doi:10.1111/j.1468-2478.2006.00395.x.
  • Europol. European Union Serious and Organised Crime Threat Assessment (SOCTA). 2021.
  • Fleisher, C. S., and D. L. Blenkhorn, edited by. Managing Frontiers in Competitive Intelligence. Connecticut: Quorum Books, 2000.
  • Gill, P. “Organised Crime.” In Routledge Companion to Intelligence Studies, edited by R. Dover, M. S. Goodman, and C. Hillebrand, 313–320. Abingdon: Routledge, 2013.
  • Gill, P., and M. Phythian. Intelligence in an Insecure World. 2nd ed. Cambridge: Polity Press, 2012.
  • Gioe, D. V. “Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence.” Intelligence and National Security 33, no. 7 (2018): 954–973. doi:10.1080/02684527.2018.1479345.
  • Goldman, J. “The Ethics of Research in Intelligence Studies: Scholarship in an Emerging Discipline.” International Journal of Intelligence and CounterIntelligence 31, no. 2 (2018): 342–356. doi:10.1080/08850607.2018.1417638.
  • Gradon, K., and W. R. Moy. “COVID-19 Response – Lessons from Secret Intelligence Failures.” The International Journal of Intelligence, Security, and Public Affairs 23, no. 3 (2021): 161–179. doi:10.1080/23800992.2021.1956776.
  • Gressang, D. S., and J. J. Wirtz. “Rethinking Warning: Intelligence, Novel Events, and the COVID-19 Pandemic.” International Journal of Intelligence and CounterIntelligence 35, no. 1 (2022): 131–146. doi:10.1080/08850607.2021.1913023.
  • Hanrieder, T., and C. Kreuder-Sonnen. “WHO Decides on the Exception? Securitization and Emergency Governance in Global Health.” Security Dialogue 45, no. 4 (2014): 331–348. doi:10.1177/0967010614535833.
  • Hedin, H., I. Hirvensalo, and M. Vaarnas. The Handbook of Market Intelligence: Understand, Compete and Grow in Global Markets, 2nd. Chichester: Wiley, 2014.
  • Herman, M., and D. Schaefer. Intelligence Power in Practice. Edinburgh: Edinburgh University Press, 2022.
  • Intelligence and Security Committee. Annual Report 2017/18. HC 1692, 2018
  • Intelligence and Security Committee. The 2017 Attacks: What Needs to Change?. Westminster, Manchester Arena, London Bridge: Finsbury Park, Parsons Green. HC1694, 2018.
  • Intelligence and Security Committee. Russia. HC 632, 2020.
  • Ivan, C., I. Chiru, and R. Arcos. “A Whole of Society Intelligence Approach: Critical Reassessment of the Tools and Means Used to Counter Information Warfare in the Digital Age.” Intelligence and National Security 36, no. 4 (2021): 495–511. doi:10.1080/02684527.2021.1893072.
  • Jervis, R. I. L. K. J., and A. M. Shelton. “Thoughts on the State of Intelligence Studies: A Survey Report.” Intelligence and National Security 28, no. 1 (2013): 109–120. doi:10.1080/02684527.2012.748368.
  • Johnson, L. K. “Introduction.” In Handbook of Intelligence Studies, edited by L. K. Johnson, 1–14. Abingdon: Routledge, 2007.
  • Johnson, L. K. “The Development of Intelligence Studies.” In Routledge Companion to Intelligence Studies, edited by R. Dover, M. S. Goodman, and C. Hillebrand, 3–22. Abingdon: Routledge, 2013.
  • Johnson, L. K., and A. M. Shelton. “Thoughts on the State of Intelligence Studies: A Survey Report.” Intelligence and National Security 28, no. 1 (2013): 109–120. doi:10.1080/02684527.2012.748368.
  • Kahn, D. “The Intelligence Failure of Pearl Harbour.” Foreign Affairs 70, no. 5 (1991): 138–152. doi:10.2307/20045008.
  • Kamradt-Scott, A., and C. McInnes. “The Securitization of Pandemic Influenza: Framing, Security and Public Policy.” Global Public Health 7, no. 2 (2012): 95–110. doi:10.1080/17441692.2012.725752.
  • Klein Goldewijk, B. “Why Still Critical? Critical Intelligence Studies Positioned in Scholarship on Security, War, and International Relations.” Intelligence and National Security 36, no. 4 (2021): 476–494. doi:10.1080/02684527.2021.1893071.
  • Lander, S. “International Intelligence Cooperation: An Inside Perspective.” Cambridge Review of International Affairs 17, no. 3 (2004): 481–493. doi:10.1080/0955757042000296964.
  • Lefebvre, S. “The Difficulties and Dilemmas of International Intelligence Cooperation.” International Journal of Intelligence and Counter Intelligence 16, no. 4 (2003): 527–542. doi:10.1080/716100467.
  • Lentzos, F., M. S. Goodman, and J. M. Wilson. “Health Security Intelligence: Engaging Across Disciplines and Sectors.” Intelligence and National Security 35, no. 4 (2020): 465–476. doi:10.1080/02684527.2020.1750166.
  • Leonard, S. “EU Border Security and Migration into the European Union: FRONTEX and Securitization Through Practices.” European Security 19, no. 2 (2010): 231–254. doi:10.1080/09662839.2010.526937.
  • Leonard, S., and C. Kaunert. “Reconceptualising the Audience in Securitization Theory.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by T. Balzacq, 56–73. London: Routledge, 2011.
  • Leonard, S., and C. Kaunert. Refugees, Security and the European Union. Abingdon: Routledge, 2019.
  • Lomas, D., and C. J. Murphy. Intelligence and Espionage: Secrets and Spies. London: Routledge, 2019.
  • Lowenthal, M. M. Intelligence: From Secrets to Policy. 7th ed. Thousand Oaks: CQ Press, 2017.
  • Marrin, S. “Intelligence Studies Centers: Making Scholarship on Intelligence Analysis Useful.” Intelligence and National Security 27, no. 3 (2012): 398–422. doi:10.1080/02684527.2012.668082.
  • Marrin, S. “Improving Intelligence Studies as an Academic Discipline.” Intelligence and National Security 31, no. 2 (2016): 266–279. doi:10.1080/02684527.2014.952932.
  • McCombie, S., A. J. Uhlmann, and S. Morrison. “The US 2016 Presidential Election & Russia’s Troll Farms.” Intelligence and National Security 35, no. 1 (2020): 95–114. doi:10.1080/02684527.2019.1673940.
  • McInnes, C., and S. Rushton. “HIV/AIDS and Securitization Theory.” European Journal of International Relations 19, no. 1 (2011): 115–138. doi:10.1177/1354066111425258.
  • McSweeny, B. “Durkheim and the Copenhagen School: A Response to Buzan and Waever.” Review of International Studies 24, no. 1 (1998): 137–140. doi:10.1017/S0260210598001375.
  • Mobley, B. Terrorism and Counter-Intelligence: How Terrorist Groups Elude Detection. New York: Columbia University Press, 2012.
  • Mobley, B. W., and T. Ray. “The Cali Cartel and Counterintelligence.” International Journal of Intelligence and CounterIntelligence 32, no. 1 (2019): 30–53. doi:10.1080/08850607.2018.1522218.
  • Murphy, C. Competitive Intelligence: Gathering, Analysing and Putting It to Work. Aldershot: Gower Publishing Company, 2005.
  • Nelke, M., and C. Håkansson. Competitive Intelligence for Information Professionals. Massachusetts: Chandos Publishing, 2015.
  • Newbery, S. “Official Inquiries and Their Sources of Evidence.” Writing The ‘Troubles’, 3 July 2018, https://writingthetroublesweb.wordpress.com/2018/07/03/official-inquiries-and-their-sources-of-evidence/
  • Newbery, S. “Inter- and Intra-Agency Intelligence Liaison During ‘The Troubles’.” Small Wars & Insurgencies 32, no. 4–5 (2021): 687–713. doi:10.1080/09592318.2020.1853998.
  • Newbery, S. “The SOC Endgame? Intelligence as a Service.” Second Annual SOC of the Future Europe Forum, 10 March 2022.
  • Office of the Director of National Intelligence, National Intelligence Council. Updated Assessment on COVID-19 Origins. August 2021. https://www.dni.gov/index.php/newsroom/reports-publications/reports-publications-2021/item/2263-declassified-assessment-on-covid-19-origins
  • Omand, D. Securing the State. London: Hurst, 2010.
  • Phythian, M. “Intelligence Theory and Theories of International Relations: Shared World or Separate Worlds?” In Intelligence Theory: Key Questions and Debates, edited by P. Gill, S. Marrin, and M. Phythian, 54–72. London: Routledge, 2009.
  • Ratcliffe, J. Intelligence-Led Policing. Collompton: Willan Publishing, 2008.
  • Regulation of Investigatory Powers Act 2000.
  • Report of the Select Committee on Intelligence, United States Senate, Covering the Period January 3, 2017 to January 3, 2019. 28 March 2019. https://www.intelligence.senate.gov/publications/report-select-committee-intelligence-united-states-senate-covering-period-january-3
  • Robson Morrow, M. A. “Private Sector Intelligence: On the Long Path of Professionalization.” Intelligence and National Security 37, no. 3 (2022): 402–420. doi:10.1080/02684527.2022.2029099.
  • Security Service Act 1989
  • Sims, J. E. “Foreign Intelligence Liaison: Devils, Deals, and Details.” International Journal of Intelligence and CounterIntelligence 19, no. 2 (2006): 195–217. doi:10.1080/08850600500483657.
  • Sims, J. “Theory and Philosophy of Intelligence.” In Routledge Companion to Intelligence Studies, edited by R. Dover, M. S. Goodman, and C. Hillebrand, 42–49. Abingdon: Routledge, 2013.
  • Sjostedt, R. “Health Issues and Securitization: The Construction of HIV/AIDS as a US National Threat.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by T. Balzacq, 150–169. London: Routledge, 2011.
  • Smith, M., and P. Walsh. “Improving Health Security and Intelligence Capabilities to Mitigate Biological Threats.” The International Journal of Intelligence, Security, and Public Affairs 23, no. 2 (2021): 139–155. doi:10.1080/23800992.2021.1953826.
  • Statement by President Joe Biden on the Investigation into the Origins of COVID-⁠19, 27 Aug. 2021. https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/27/statement-by-president-joe-biden-on-the-investigation-into-the-origins-of-covid-%e2%81%a019/
  • Stetter, S., E. Herschinger, T. Tiechler, and M. Albert. “Conflict About Water: Securitization in a Global Context.” Cooperation and Conflict 46, no. 4 (2011): 441–459. doi:10.1177/0010836711422462.
  • Stewart, B., and S. Newbery. Why Spy?: The Art of Intelligence. London: Hurst, 2015.
  • Waever, O. “Securitization and De-Securitization.” In On Security, edited by R. D. Lipschutz, 46–86. New York: Columbia University Press, 1995.
  • Waever, O., B. Buzan, M. Kelstrup, and P. Lemaitre. Identity, Migration and the New Security Agenda in Europe. London: Continuum International Publishing, 1993.
  • Warner, M. “Theories of Intelligence.” In Routledge Companion to Intelligence Studies, edited by R. Dover, M. S. Goodman, and C. Hillebrand, 25–32. Abingdon: Routledge, 2013.
  • Weiss, A. “Corporate Intelligence.” In The Palgrave Handbook of Security, Risk and Intelligence, edited by R. Dover, H. Dylan, and M. S. Goodman, 373–392. London: Palgrave, 2017.
  • Wolfers, A. “’National Security’ as an Ambiguous Symbol.” Political Science Quarterly 67, no. 4 (1952): 481–502. doi:10.2307/2145138.