Intelligence and National Security

Papers
(The median citation count of Intelligence and National Security is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem12
Critical intelligence studies: introduction to the special issue10
Australian intelligence oversight and accountability: efficacy and contemporary challenges10
Of intelligence oversight and the challenge of surveillance corporatism9
A whole of society intelligence approach: critical reassessment of the tools and means used to counter information warfare in the digital age8
The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability, and management8
Operation Rubicon: sixty years of German-American success in signals intelligence7
Britain’s European connection in counter-terrorism intelligence cooperation: everyday practices of police liaison officers7
Hard target espionage in the information era: new challenges for the second oldest profession6
Reflexive intelligence and converging knowledge regimes6
Circulation, not cooperation: towards a new understanding of intelligence agencies as transnationally constituted knowledge providers5
Michael Polanyi and the epistemology of intelligence analysis5
RUBICON and revelation: the curious robustness of the ‘secret’ CIA-BND operation with Crypto AG5
Why still critical? Critical intelligence studies positioned in scholarship on security, war, and international relations5
#ForgetJamesBond: diversity, inclusion and the UK’s intelligence agencies5
Operation Rubicon: Germany as an intelligence ‘Great Power’?5
From sigint to cyber: a hundred years of Britain’s biggest intelligence agency5
Division D: Operation Rubicon and the CIA’s secret SIGINT empire4
Explaining the depth and breadth of international intelligence cooperation: towards a comprehensive understanding4
Can United States intelligence community analysts telework?4
Integrating intelligence theory with philosophy: introduction to the special issue4
Queering intelligence studies4
Adding value to the intelligence community: what role for expert external advice?4
A prominent spy: Mehdi Ben Barka, Czechoslovak intelligence, and Eastern Bloc espionage in the Third World during the Cold War4
Small state or minor power? New Zealand’s Five Eyes membership, intelligence reforms, and Wellington’s response to China’s growing Pacific role4
On the critical utility of complexity theory in intelligence studies4
“Don’t keep mum”: critical approaches to the narratives of women intelligence professionals3
The limited influence of competitive intelligence over corporate strategy in Israel: historical, organizational, conceptual, and cultural explanations3
‘Familiar but not intimate’: executive oversight of the UK intelligence and security agencies3
Strategic intelligence practice in the Australian intelligence community: evolution, constraints and progress3
A fundamental re-conceputalization of intelligence: cognitive activity and the pursuit of advantage3
The UK National Security Council and misuse of intelligence by policy makers: reducing the risk?3
Flexible versus structured support for reasoning: enhancing analytical reasoning through a flexible analytic technique3
Moshe Dayan in the Yom Kippur War: a Reassessment3
Deciphering intelligence analysis: the synthetic nature of the core intelligence function3
The Red Brigades and communist Czechoslovakia: a troubling legacy full of ambiguities3
The third eye: Canada’s development of autonomous signals intelligence to contribute to Five Eyes intelligence sharing3
Justified true belief theory for intelligence analysis3
Strange bedfellows in the arms trade: Polish intelligence, Monzer al-Kassar and the Iran-Contra affair3
Party politics and intelligence: the Labour Party, British intelligence and oversight, 1979-19943
CIA support to policymakers: the 2007 National Intelligence Estimate on Iran’s Nuclear Intentions and Capabilities3
The Iran nuclear archive: impressions and implications3
New evidence and new methods for analyzing the Iranian revolution as an intelligence failure3
‘No, we don’t know where Tupac is’: critical intelligence studies and the CIA on social media3
Espionage by Europeans: treason and counterintelligence in post-Cold War Europe3
Intelligence under democracy and authoritarianism: a philosophical analysis3
Conclusion: the development of critical intelligence studies2
State preferences, viable alternatives, and American covert action, 1946-19892
Understanding the complexity of intelligence problems2
Private sector intelligence: on the long path of professionalization2
The many realisms of John le Carré2
Rethinking intelligence practices and processes: three sociological concepts for the study of intelligence2
City council and national security: oversight of local counterterrorism and security intelligence2
What philosophy can do for intelligence2
Arming Iran from the heart of Westminster? The Iranian military procurement offices, rumours and intelligence, 1981–19872
Intelligence and culture: an introduction2
Epidemiological intelligence fusion centers: health security and COVID-19 in the Dominican Republic2
The good, the bad, and the tradecraft: HUMINT and the ethics of psychological manipulation2
The multifaceted norm of objectivity in intelligence practices2
Policy for promoting analytic rigor in intelligence: professionals’ views and their psychological correlates2
‘An anarchy of treason’: public history, insider knowledge and the early spy novels of John le Carré2
Transforming the Australian intelligence community: mapping change, impact and challenges2
Twenty years on: Intelligence and Security Committee and investigating torture in the 'war on terror'2
Devil’s Advocacy within Dutch military intelligence (2008-2020): an effective instrument for quality assurance?2
The Yom Kippur intelligence failure after fifty years: what lessons can be learned?2
Adopting and improving a new forecasting paradigm2
Intelligence analysis as cryptic hermeneutics2
Oversight and governance of the Danish intelligence community2
Public knowledge of intelligence agencies among university students in Spain2
Philosophical foundations of intelligence collection and analysis: a defense of ontological realism2
Reluctant revolutionaries: Czechoslovak support of revolutionary violence between decolonization and détente2
Michael Herman: doyen of intelligence studies2
Secrecy, evidence, and fear: exploring the construction of intelligence power with Actor-Network Theory (ANT)1
The Rooseboom operation: uncovering the embryonic German intelligence network in South Africa, 1940-19421
The essential inevitability of worrying about the bomb: new writing on the Cuban missile crisis1
French paramilitary actions during the Algerian War of Independence, 1956-19581
Critical Intelligence Studies: a new framework for analysis1
Robust-satisficing ethics in intelligence1
Making intelligence telework work: mitigating distraction, maintaining focus1
Stay-behind networks and interim flexible strategy: the ‘Gladio’ case and US covert intervention in Italy in the Cold War1
John le Carré’s The Looking Glass War: imagining the Special Operations Executive – Secret Intelligence Service rivalry as post-war counterfactual history1
Sharing empire: Great Britain, Fascist Italy, and (anti-) colonial intelligence networks in the Palestine Mandate, 1933-19401
The evolution of historical scholarship and the rise of the visible and accountable national security state: tales from a life in Intelligence Studies1
Intelligence warning in the Ukraine war, Autumn 2021 – Summer 20221
Compartmentalized minds: the Communist security services’ understanding of the Western espionage threat to the Communist bloc during the Cold War1
Growth, diversification, and disconnection: an analysis of 70 years of intelligence scholarship (1950-2020)1
The intelligence war against the IRA1
Quantum espionage: a phenomenology of the Snowden affair1
Finding a match: the revolution in recruitment and its application to selecting intelligence analysts1
Effectiveness fettered by bureaucracy : why surveillance technology is not evaluated1
Tradecraft, the PIAB, and the 2007 NIE on Iran’s Nuclear Intentions and Capabilities1
How surprising was ISIS’ rise to power for the German intelligence community? Reconstructing estimates of likelihood prior to the fall of Mosul1
The best of both worlds? a hybrid approach to intelligence and research1
Arms exports and intelligence: the case of Sweden1
Feminist philosophy and the problem of intelligence analysis: standpoint, measurement, and motivation1
The handbook of Asian intelligence cultures1
The evolution of the Al-Shabaab jihadist intelligence structure1
Towards a better framework for estimative intelligence – addressing quality through a systematic approach to uncertainty handling1
Intelligence-exalting strategic cultures: a case study of the Russian approach1
Analytical innovation in intelligence systems: the US national security establishment and the craft of ‘net assessment’1
Where to submit: a guide to publishing intelligence studies articles1
Dealing with data: coming to grips with the Information Age in Intelligence Studies journals1
The Sisson Documents and their ‘distinguished place’ in the history of disinformation1
Leviathan’s Heirs: sovereignty, intelligence, and the modern state1
The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–19701
The Security Intelligence Agencies in New Zealand: evolution, challenges and progress1
Methodological and epistemological reflections on elite interviews and the study of Israel’s intelligence history: interview with Efraim Halevy1
National security intelligence activity: a philosophical analysis1
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace1
The intelligence politics of early congressional oversight of CIA1
British geographic intelligence during the Second World War: a case study of the Canary Islands1
Is sunlight the best counterintelligence technique? the effectiveness of covert operation exposure in blunting the Russian intervention in the 2020 U.S. election1
Overcoming the inertia of ‘old ways of producing intelligence’—the IC’s development and use of new analytic methods in the 1970s1
Reappraising the effectiveness of intelligence methods of a violent non-state sovereignty: a case-study of the SPLA insurgency in the Sudan (1983 – 2005)1
British intelligence and the Dardanelles: the 1906 Taba affair revisited1
Assessing intelligence oversight: the case of Sweden1
All the world’s a stage: covert action as theatrical performance1
Nikolay Dolgopolov: the storyteller of Soviet intelligence history1
Stolen focus: why you can’t pay attention - and how to think deeply again1
‘The tortuousness of our Albanian allies’: Special Operations Executive in Albania through the eyes of Anthony Quayle’s Eight hours from England1
CIA/SOF convergence and congressional oversight1
Reflections on conveying uncertainty1
Getting it right: Canadian intelligence assessments on Iraq, 2002-20031
A delicate truth: John le Carré, spy fiction and intelligence​1
The Phantom Eye: New Zealand and the Five Eyes1
Robert Jervis: remembering the dean of intelligence studies1
The sad loss of Michael Herman (1929–2021)1
The perils of presidential openness: strikes, secrecy and performative opacity1
‘Extremely valuable work’: British intelligence and the interrogation of refugees in London, 1941–451
Expanding on the concept of telework in the IC: a response to Gioe, Hatfield & Stout1
Health security intelligence capabilities post COVID-19: resisting the passive “new normal” within the Five Eyes1
Project Spaceman: early British computer security and automatic data processing0
Spy stories: inside the secret world of the RAW and the ISI0
Canadian Military Intelligence: operations and evolution from the October crisis to the war in Afghanistan0
The Chinese Communist Party’s exploitation of the Second United Front: intelligence and counterintelligence on a middle force territory0
Secret partners: the national reconnaissance office and the intelligence-industrial-academic complex0
Correction0
Reflections on the 2007 Iran NIE controversy0
‘A sad story of delay and obstructionism’: the impact of external relationships on the resourcing and development of Bletchley Park during the Second World War0
Fact, fake or fiction?: the disguised spy novels of Bernard Newman in the 1930s0
The FAN TAN file: Quebec separatism and security service resistance to politicization 1971–720
A new theory of surprise – unraveling the logic of uncertainty and knowledge0
Ian Fleming’s Soviet rival: Roman Kim and Soviet spy fiction during the early Cold War0
Probability or confidence, a distinction without a difference?0
Profiles in intelligence: an interview with Gill Bennett0
Intelligence and alliance politics: America, Britain, and the strategic Defense Initiative0
Modelling the intelligence requirements and priorities process: the US response to the Rwandan genocide0
State Department cipher machines and communications security in the early Cold War, 1944–19650
The spymaster of Baghdad: a true story of bravery, family, and patriotism in the battle against ISIS0
Restricted data: the history of nuclear secrecy in the United States0
The Eurospy boom and the evolution of Europe’s transnational identity0
Introduction0
Towards intelligence accountability as a virtue0
India’s foreign intelligence history and future challenges0
Intelligence power and practice Intelligence power and practice , by Michael Herman and David Schaefer, foreword by Lord Butler, Intelligence Power in Pra0
Beyond counterintelligence: understanding the SBU’s social media outreach on Telegram during wartime0
The Moscow rules: the secret CIA tactics that helped America win the Cold War0
Agents, attachés, and intelligence failures: the Imperial Japanese Navy’s efforts to establish espionage networks in the United States before Pearl Harbor0
Resisting the KGB Mythmakers: Willy Fisher, spy fiction, and the myth of Rudolf Abel0
Seapower states: maritime culture, continental empires, and the conflict that made the modern world0
The governance of covert action: asymmetric power and the British plan to overthrow Saddam0
Secrecy and the politics of selective disclosures: the US government’s intervention in Guatemala0
Venice’s secret service: organizing intelligence in the Renaissance0
The treacherous path0
The COVID-19 intelligence failure. Why warning was not enough The COVID-19 intelligence failure. Why warning was not enough , by Erik J. Dahl, Washington DC, Georgetown 0
Health security warning intelligence during first contact with COVID: an operations perspective0
Nothing is beyond our reach: America’s techno-spy empire Nothing is beyond our reach: America’s techno-spy empire , Kristie Macrakis, Washington D.C., Georgetown Univers0
Spy pilot: Francis Gary Powers, the U-2 incident, and a controversial Cold War legacy0
Winner of the Polly Corrigan Book Prize0
Medieval military medicine: from the Vikings to the High Middle Ages0
Assessing the FBI’s pre-1979 counterintelligence operations against China0
India’s intelligence culture and strategic surprises: spying for South block0
Unlikely ally: how the military fights climate change and protects the environment0
Advancing intelligence analysis: using natural language processing on East Pakistani intelligence documents0
Relationships, power, and ambiguity: how do U.S. intelligence officer responses to toxicity affect support to the core mission?0
‘Profiles in intelligence’: an interview with 8th Mossad chief Danny Yatom0
Correction0
A Chinese spy manual (from the Qing dynasty)0
American zealots: inside right-wing domestic terrorism0
Sea, sex, and spies: on Gérard de Villiers’ relations with the covert world0
Obstacles to harnessing analytic innovations in foreign policy analysis: a case study of crowdsourcing in the U.S. intelligence community0
Intelligence in the national security enterprise: an introduction0
Learning to think and talk like the locals: the Soviet political police’s efforts to adapt in Lithuania and Ukraine, 1944-19490
Who wants to be the next James Bond or Anna Chapman? exploring the correlates of a willingness to enter the Centro Nacional de Inteligencia (CNI) among Spanish university students0
Pinochet’s poisons: examining Chile’s historical interest in chemical and biological weapons0
The politics of intelligence failures: power, rationality, and the intelligence process0
Russian covert operations: using history to establish motivations and bounds0
Sigint and cyber power down under Revealing Secrets: An Unofficial History of Australian Signals Intelligence and the Advent of Cyber , John Blaxland and Clare Birgin, (0
Profiles in intelligence: an interview with Vappala Balachandran0
Plotting for peace: American peacemakers, British codebreakers, and Britain at War, 1914-170
Advanced introduction to American Foreign Policy0
Ken Robertson 1947–2021: foundations, innovations and legacies0
Spying and the crown: the secret relationship between British intelligence and the royals Spying and the crown: the secret relationship between British intelligence and the royals 0
The targeter: my life in the CIA, hunting for terrorists, and challenging the White House0
The November 2007 Iran nuclear NIE: immediate aftermath0
The academic-practitioner divide in intelligence studies0
The bitskrieg that was and wasn’t: the military and intelligence implications of cyber operations during Russia’s war on Ukraine0
No shadows in the desert: murder, vengeance, and espionage in the war against ISIS0
Contemporary French security policy in Africa: on ideas and wars0
Listening to Cairo: British radio monitoring and intelligence gathering, c. 1953-19670
Israeli Defense Intelligence (IDI): adaptive evolution in the interaction between collection and analysis0
Cold War in the Islamic world: Saudi Arabia, Iran and the struggle for supremacy0
Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity Countering cyberterrorism: the confluence 0
Reconnecting the dots: state-terrorist relations during the Cold War0
Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism0
Diplomacy and intelligence in the nineteenth-century Mediterranean world0
The dragons and the snakes: how the rest learned to fight the West0
‘The weatherman and the umbrella’: a case of complex and multilayered defence intelligence relations in the Netherlands0
Partisanship and congressional intelligence oversight: the case of the Russia inquiries, 2017-20200
Politics and intelligence analysis: the Canadian experience0
A clear case of genius: room 40’s code-breaking pioneer0
Head of the Mossad: in pursuit of a safe and secure Israel0
Britain’s key counter-subversion instrument before the 1971 withdrawal from the Gulf: Voice of the Coast [Sawt Al Saahil] Arabic radio station0
Soviet defectors: revelations of renegade intelligence officers, 1924–19540
Intelligence operations, Indigenous cultures, and early U.S. Ambassadors to Native American polities0
The real special relationship: the true story of how the British and US secret services work together0
American Spy: wry reflections on my life in the CIA0
Caught off guard? Evaluating how external experts in Germany warned about Russia’s war on Ukraine0
The strange survival of liberal Britain: politics and power before the First World War The strange survival of liberal Britain: politics and power before the First World War 0
Of life, liberty and the pursuit of ‘All persons found lurking within our lines’: the Continental Congress’ Committee on Spies and the path to American independence0
The Palgrave handbook of national security0
Critical review of the analysis of competing hypotheses technique: lessons for the intelligence community0
Predator’s Progress: the bureaucratic challenges to the Clinton administration’s development and deployment of Unmanned Aerial Vehicles (1993-2001)0
Great Britain, international law, and the evolution of maritime strategic thought, 1856-19140
Neutering the CIA: why US intelligence versus Trump has long-term consequences Neutering the CIA: why US intelligence versus Trump has long-term consequences , by John A0
Blood, toil, tears, and spies0
We Never Expected That: a comparative study of failures in national and business intelligence0
Agents of influence: a British campaign, a Canadian spy, and the secret plot to bring America into World War II0
Anglo-European intelligence cooperation0
Stress tested: the COVID-19 pandemic and Canadian national security0
Warship 2023 Warship 2023 , edited by John Jordan, London, Osprey, 2023, 224 pp., Illustrated throughout with black-and-white photographs, £45 (hbk), ISBN: 97814728571320
Thatcher’s spy: my life as an MI5 agent inside sinn féin0
The regulation of intelligence activities under international law The regulation of intelligence activities under international law , edited by, Sophie Duroy, Cheltenham0
The Pinkerton Pause: how opposition to pinkertonism delayed the advent of the privatized security state0
‘Making the intelligence product of greater use to those for whom it is produced’: lessons from the National Security Council Intelligence Committee, 1971–19760
Winners and losers in Russia’s information war0
“The hyena who stalks the capitalist deserts”: imagining the ‘anti-Bond’ in the works of John le Carré0
‘A bald exposition of the essential facts’: information and reconnaissance in The Riddle of the Sands0
Refugees, security and the European Union0
Courier, traitor, bigamist, fabulist: behind the mythology of a superspy0
Memoir of an Indian spymaster A life in the shadows: a memoir , by A. S. Dulat, Gurugram, HarperCollins India, 2023, 264 pp., ₹699.00 (hardcover), ISBN 978-93562959640
Attributing Digital Covert Action: the curious case of WikiSaudileaks0
Intelligence leadership and governance0
Correction0
A Unified Theory for Intelligence Analysis0
The declassification engine: what history reveals about America’s top secrets The declassification engine: what history reveals about America’s top secrets , Matthew Con0
Innovating in a secret world: the future of national security and global leadership0
Profiles in Intelligence: an interview with Professor Loch K. Johnson0
The theatre of the real: the actor/spy relationship in le Carré’s Tinker Tailor Soldier Spy and The Little Drummer Girl0
The Bridge in the Parks: The Five Eyes and Cold War Counter-Intelligence0
0.026213884353638