176
Views
1
CrossRef citations to date
0
Altmetric
Research Article

‘Vital and irreplaceable facilities’: explaining leverage when states host great powers’ spying operations

Pages 841-863 | Received 09 Jun 2023, Accepted 30 Nov 2023, Published online: 25 Dec 2023

Bibliography

  • Aldrich, R. J. GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. London: HarperPress, 2010.
  • Bateman, A. “Trust but Verify: Satellite Reconnaissance, Secrecy and Arms Control During the Cold War.” Journal of Strategic Studies 46, no. 5 (2023): 1037–1061. doi:10.1080/01402390.2022.2161522.
  • Bernard, R. L. The Foreign Missile and Space TELEMETRY Collection Story – the First 50 Years: Part One: The 1950s and 1960s. Ft. Meade, MD: National Security Agency Center for Cryptologic History, 2004.
  • Bock, R. E. “Anglo-Soviet Intelligence Cooperation, 1941–45: Normative Insights from the Dyadic Democratic Peace Literature.” Intelligence & National Security 30, no. 6 (2015): 890–912. doi:10.1080/02684527.2014.900267.
  • Bolsinger, D. “Not at Any Price: LBJ, Pakistan, and Bargaining in an Asymmetric Intelligence Relationship.” Texas National Security Review 5, no. 1 (2021/2022): 55–80. doi:10.15781/FHQ7-5868.
  • Bolsinger, D. “Deception and Manipulation in an Intelligence Liaison Relationship: U.S.–Pakistani Negotiations and the 1980s Afghan Program.” International Journal of Intelligence & CounterIntelligence 37, no. 1 (2024): 49–70. doi:10.1080/08850607.2022.2157687.
  • Brown, J. N., and A. Farrington. “Democracy and the Depth of Intelligence Sharing: Why Regime Type Hardly Matters.” Intelligence & National Security 32, no. 1 (2017): 68–84. doi:10.1080/02684527.2016.1208379.
  • Brown, J. N., D. L. Lupton, and A. Farrington. “Embedded Deception: Interpersonal Trust, Cooperative Expectations, and the Sharing of Fabricated Intelligence.” Journal of Global Security Studies 4, no. 2 (2019): 209–226. doi:10.1093/jogss/ogy026.
  • Burr, W., and D. A. Rosenberg. “Nuclear Competition in an Era of Stalemate, 1963-1975.” In The Cambridge History of the Cold War: Volume II: Crises and Détente, edited by M. P. Leffler and O. A. Westad, 88–111. Cambridge, UK: Cambridge University Press, 2010.
  • Carnegie, A., and A. Carson. “The Disclosure Dilemma: Nuclear Intelligence and International Organizations.” American Journal of Political Science 63, no. 2 (2019): 269–285. doi:10.1111/ajps.12426.
  • Cherry, P. J. “U.S. intelligence and the Shah 1957-1979: a case study of asymmetric intelligence liaison.” MA thesis, Georgetown University, 2010. https://repository.library.georgetown.edu/handle/10822/553466.
  • Coe, A. J., and J. Vaynman. “Why Arms Control is so Rare.” American Political Science Review 114, no. 2 (2020): 342–355. doi:10.1017/S000305541900073X.
  • Cooley, A., and H. Spruyt. Contracting States: Sovereign Transfers in International Relations. Princeton, NJ: Princeton University Press, 2009.
  • Crawford, T. W. “Intelligence Cooperation.” In Oxford Research Encyclopedia for International Studies. Oxford, UK: Oxford University Press, 2019. doi:10.1093/acrefore/9780190846626.013.404.
  • Daugherty, W. J. In the Shadow of the Ayatollah: A CIA Hostage in Iran. Annapolis, MD: Naval Institute Press, 2001.
  • Grimes, B. The History of Big Safari. Bloomington, IN: Archway, 2014.
  • Haas, M., and K. Yarhi-Milo. “To Disclose or Deceive? Sharing Secret Information Between Aligned States.” International Security 45, no. 3 (2021): 122–161. doi:10.1162/isec_a_00402.
  • Hanyok, R. J. Spartans in Darkness: American SIGINT and the Indochina War, 1945-1975. Ft. Meade, MD: National Security Agency Center for Cryptologic History, 2002.
  • Harris, G. Troubled Alliance: Turkish-American Problems in Historical Perspective, 1945-1971. Washington, DC: American Enterprise Institute, 1972.
  • Helms, R., and W. Hood. A Look Over My Shoulder: A Life in the Central Intelligence Agency. New York, NY: Random House, 2003.
  • Hoffmann, S. “Circulation, Not Cooperation: Towards a New Understanding of Intelligence Agencies as Transnationally Constituted Knowledge Providers.” Intelligence & National Security 36, no. 6 (2021): 807–826. doi:10.1080/02684527.2021.1938371.
  • Johns, A. L. “The Johnson Administration, the Shah of Iran, and the Changing Pattern of U.S.-Iranian Relations, 1965–1967: ‘Tired of Being Treated Like a Schoolboy.” Journal of Cold War Studies 9, no. 2 (2007): 64–94. doi:10.1162/jcws.2007.9.2.64.
  • Lake, D. A. “Anarchy, Hierarchy, and the Variety of International Relations.” International Organization 50, no. 1 (1996): 1–33. doi:10.1017/S002081830000165X.
  • Lefebvre, S. “The Difficulties and Dilemmas of International Intelligence Cooperation.” International Journal of Intelligence & CounterIntelligence 16, no. 4 (2003): 527–542. doi:10.1080/716100467.
  • Lenczowski, G. “United States’ Support for Iran’s Independence and Integrity, 1945-1959.” The Annals of the American Academy of Political and Social Science 401, no. 1 (1972): 45–55. doi:10.1177/000271627240100106.
  • Long, A., and B. Rittenhouse Green. “Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy.” Journal of Strategic Studies 38, no. 1–2 (2015): 38–73. doi:10.1080/01402390.2014.958150.
  • Mainwaring, S., and R. J. Aldrich. “The Secret Empire of Signals Intelligence: GCHQ and the Persistence of the Colonial Presence.” The International History Review 43, no. 1 (2021): 54–71. doi:10.1080/07075332.2019.1675082.
  • McGlinchey, S. US Arms Policies Towards the Shah’s Iran. London: Routledge, 2014.
  • Odinga, S. “‘We Recommend Compliance’: Bargaining and Leverage in Ethiopian–US Intelligence Cooperation.” Review of African Political Economy 44, no. 153 (2017): 432–448. doi:10.1080/03056244.2017.1368472.
  • O’Neil, A. “Australia and the ‘Five Eyes’ Intelligence Network: The Perils of an Asymmetric Alliance.” Australian Journal of International Affairs 71, no. 5 (2017): 529–543. doi:10.1080/10357718.2017.1342763.
  • Poteat, G. “Stealth, Countermeasures, and ELINT, 1960-1975.” Studies in Intelligence 42, no. 1 (1998): 51–59.
  • Richelson, J. T. “The Calculus of Intelligence Cooperation.” International Journal of Intelligence & CounterIntelligence 4, no. 3 (1990): 307–323. doi:10.1080/08850609008435147.
  • Richelson, J. T. The Wizards of Armageddon: Inside the CIA’s Directorate of Science and Technology. Boulder, CO: Westview Press, 2001.
  • Richelson, J. T. The U.S. Intelligence Community. 7th ed. Boulder, CO: Westview Press, 2016.
  • Rovner, J. Fixing the Facts: National Security and the Politics of Intelligence. Ithaca, NY: Cornell University Press, 2011.
  • Rubin, B. Paved with Good Intentions: The American Experience in Iran. New York, NY: Penguin, 1981.
  • Sims, J. E. “Foreign Intelligence Liaison: Devils, Deals, and Details.” International Journal of Intelligence & CounterIntelligence 19, no. 2 (2006): 195–217. doi:10.1080/08850600500483657.
  • Sullivan, W. H. Mission to Iran. New York, NY: Norton, 1981.
  • Takeyh, R. The Last Shah: America, Iran, and the Fall of the Pahlavi Dynasty. New Haven, CT: Yale University Press, 2021.
  • Tuinier, P. “Explaining the Depth and Breadth of International Intelligence Cooperation: Towards a Comprehensive Understanding.” Intelligence & National Security 36, no. 1 (2021): 116–138. doi:10.1080/02684527.2020.1821461.
  • Walsh, J. I. The International Politics of Intelligence Sharing. New York, NY: Columbia University Press, 2010.
  • Wheelon, A. D. “Technology and Intelligence.” Technology in Society 26, no. 2 (2004): 245–255. doi:10.1016/j.techsoc.2004.01.026.
  • Wheelon, A. D., and S. N. Graybeal. “Intelligence for the Space Race.” Studies in Intelligence 5, no. 3 (1961): 1–13.
  • Zak, A. “The ‘K’ Project: Soviet Nuclear Tests in Space.” The Nonproliferation Review 13, no. 1 (2006): 143–150. doi:10.1080/10736700600861418.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.