Intelligence and National Security

Papers
(The TQCC of Intelligence and National Security is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
The academic-practitioner divide in intelligence studies15
Medieval military medicine: from the Vikings to the High Middle Ages11
The theatre of the real: the actor/spy relationship in le Carré’s Tinker Tailor Soldier Spy and The Little Drummer Girl10
Deciphering intelligence analysis: the synthetic nature of the core intelligence function10
New evidence and new methods for analyzing the Iranian revolution as an intelligence failure7
Intelligence and alliance politics: America, Britain, and the strategic Defense Initiative6
‘An anarchy of treason’: public history, insider knowledge and the early spy novels of John le Carré6
Reluctant revolutionaries: Czechoslovak support of revolutionary violence between decolonization and détente6
Canadian Military Intelligence: operations and evolution from the October crisis to the war in Afghanistan5
On the critical utility of complexity theory in intelligence studies5
A Chinese spy manual (from the Qing dynasty)5
The real special relationship: the true story of how the British and US secret services work together5
Advancing intelligence analysis: using natural language processing on East Pakistani intelligence documents5
Fact, fake or fiction?: the disguised spy novels of Bernard Newman in the 1930s5
A new theory of surprise – unraveling the logic of uncertainty and knowledge4
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace4
The declassification engine: what history reveals about America’s top secrets The declassification engine: what history reveals about America’s top secrets , Matthew Con4
‘Familiar but not intimate’: executive oversight of the UK intelligence and security agencies4
Pinochet’s poisons: examining Chile’s historical interest in chemical and biological weapons4
Probability or confidence, a distinction without a difference?4
Nothing is beyond our reach: America’s techno-spy empire Nothing is beyond our reach: America’s techno-spy empire , Kristie Macrakis, Washington D.C., Georgetown Univers4
Sea, sex, and spies: on Gérard de Villiers’ relations with the covert world4
‘The weatherman and the umbrella’: a case of complex and multilayered defence intelligence relations in the Netherlands4
Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism4
Intelligence leadership and governance4
‘Making the intelligence product of greater use to those for whom it is produced’: lessons from the National Security Council Intelligence Committee, 1971–19763
The perils of presidential openness: strikes, secrecy and performative opacity3
Introduction3
Agents, attachés, and intelligence failures: the Imperial Japanese Navy’s efforts to establish espionage networks in the United States before Pearl Harbor3
Great Britain, international law, and the evolution of maritime strategic thought, 1856-19143
Of life, liberty and the pursuit of ‘All persons found lurking within our lines’: the Continental Congress’ Committee on Spies and the path to American independence3
A delicate truth: John le Carré, spy fiction and intelligence​3
Spying and the crown: the secret relationship between British intelligence and the royals Spying and the crown: the secret relationship between British intelligence and the royals 3
“The hyena who stalks the capitalist deserts”: imagining the ‘anti-Bond’ in the works of John le Carré3
Cold War in the Islamic world: Saudi Arabia, Iran and the struggle for supremacy3
Australian intelligence oversight and accountability: efficacy and contemporary challenges3
Contemporary French security policy in Africa: on ideas and wars3
Investigating an authoritarian intelligence apparatus: the case of Myanmar2
Warship 20232
Quantum espionage: a phenomenology of the Snowden affair2
The governance of covert action: asymmetric power and the British plan to overthrow Saddam2
Finding a match: the revolution in recruitment and its application to selecting intelligence analysts2
Modelling the intelligence requirements and priorities process: the US response to the Rwandan genocide2
Spies, lies, and algorithms: the history and future of American intelligence2
The multifaceted norm of objectivity in intelligence practices2
India’s intelligence culture and strategic surprises: spying for South block2
The Sisson Documents and their ‘distinguished place’ in the history of disinformation2
Cyber intelligence and international security: breaking the legal and diplomatic silence?2
A risk science perspective on how to evaluate the quality of intelligence assessments2
Critical review of the Analysis of Competing Hypotheses technique: lessons for the intelligence community2
National security intelligence activity: a philosophical analysis2
Project Spaceman: early British computer security and automatic data processing2
Neutering the CIA: why US intelligence versus Trump has long-term consequences2
A blue ribbon goat: the Rockefeller Commission, public opinion, and the Ford Administration’s intelligence reform failure2
Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity2
The evolution of the Al-Shabaab jihadist intelligence structure2
Intelligence power and practice Intelligence power and practice , by Michael Herman and David Schaefer, foreword by Lord Butler, Intelligence Power in Pra2
A whole of society intelligence approach: critical reassessment of the tools and means used to counter information warfare in the digital age2
Philosophical foundations of intelligence collection and analysis: a defense of ontological realism2
Caught off guard? Evaluating how external experts in Germany warned about Russia’s war on Ukraine2
‘Profiles in intelligence’: an interview with 8th Mossad chief Danny Yatom2
Listening to Cairo: British radio monitoring and intelligence gathering, c. 1953-19672
The evolution of historical scholarship and the rise of the visible and accountable national security state: tales from a life in Intelligence Studies2
Politics and intelligence analysis: the Canadian experience2
Critical Intelligence Studies: a new framework for analysis2
Secrecy and the politics of selective disclosures: the US government’s intervention in Guatemala1
The regulation of intelligence activities under international law1
Spy stories: inside the secret world of the RAW and the ISI1
Winner of the Polly Corrigan Book Prize1
The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability, and management1
‘A sad story of delay and obstructionism’: the impact of external relationships on the resourcing and development of Bletchley Park during the Second World War1
The spymaster of Baghdad: a true story of bravery, family, and patriotism in the battle against ISIS1
Correction1
Rethinking intelligence practices and processes: three sociological concepts for the study of intelligence1
Innovating in a secret world: the future of national security and global leadership1
Relationships, power, and ambiguity: how do U.S. intelligence officer responses to toxicity affect support to the core mission?1
Assessing the FBI’s pre-1979 counterintelligence operations against China1
The many realisms of John le Carré1
Resisting the KGB Mythmakers: Willy Fisher, spy fiction, and the myth of Rudolf Abel1
Oversight and governance of the Danish intelligence community1
From sigint to cyber: a hundred years of Britain’s biggest intelligence agency1
Secret partners: the national reconnaissance office and the intelligence-industrial-academic complex1
Towards intelligence accountability as a virtue1
‘A bald exposition of the essential facts’: information and reconnaissance in The Riddle of the Sands1
Learning to think and talk like the locals: the Soviet political police’s efforts to adapt in Lithuania and Ukraine, 1944-19491
‘All the Heroes are Dead:’ U.S. Covert Operations in Ukraine, 1949-19531
A clear case of genius: room 40’s code-breaking pioneer1
Feminist philosophy and the problem of intelligence analysis: standpoint, measurement, and motivation1
Memoir of an Indian spymaster A life in the shadows: a memoir , by A. S. Dulat, Gurugram, HarperCollins India, 2023, 264 pp., ₹699.00 (hardcover), ISBN 978-93562959641
The bitskrieg that was and wasn’t: the military and intelligence implications of cyber operations during Russia’s war on Ukraine1
The Chinese Communist Party’s exploitation of the Second United Front: intelligence and counterintelligence on a middle force territory1
Unravelling effectiveness in intelligence: a systematic review1
Britain’s key counter-subversion instrument before the 1971 withdrawal from the Gulf: Voice of the Coast [Sawt Al Saahil] Arabic radio station1
Spying in South Asia: Britain, the United States, and India’s Secret Cold War1
Spy pilot: Francis Gary Powers, the U-2 incident, and a controversial Cold War legacy1
Public knowledge of intelligence agencies among university students in Spain1
Methodological and epistemological reflections on elite interviews and the study of Israel’s intelligence history: interview with Efraim Halevy1
Assessing intelligence oversight: the case of Sweden1
Restricted data: the history of nuclear secrecy in the United States1
Shadows of power beneath the threshold: where covert action, organized crime and irregular warfare converge1
The COVID-19 intelligence failure. Why warning was not enough1
Analytical innovation in intelligence systems: the US national security establishment and the craft of ‘net assessment’1
Partisanship and congressional intelligence oversight: the case of the Russia inquiries, 2017-20201
Policy for promoting analytic rigor in intelligence: professionals’ views and their psychological correlates1
Unlikely ally: how the military fights climate change and protects the environment1
Root values and root skills: a new model for intelligence education1
Between the secret state and the public sphere: the writer as intermediary1
American zealots: inside right-wing domestic terrorism1
Beyond counterintelligence: understanding the SBU’s social media outreach on Telegram during wartime1
The Bridge in the Parks: The Five Eyes and Cold War Counter-Intelligence1
Ken Robertson 1947–2021: foundations, innovations and legacies1
The Palgrave handbook of national security1
CIA/SOF convergence and congressional oversight1
Ian Fleming’s Soviet rival: Roman Kim and Soviet spy fiction during the early Cold War1
Queering intelligence studies1
Sigint and cyber power down under Revealing Secrets: An Unofficial History of Australian Signals Intelligence and the Advent of Cyber , John Blaxland and Clare Birgin, (1
Stay-behind networks and interim flexible strategy: the ‘Gladio’ case and US covert intervention in Italy in the Cold War1
Advanced introduction to American Foreign Policy1
0.097280979156494