| Restructuring structured analytic techniques in intelligence |
9 |
| Unforgiven: Russian intelligence vengeance as political theater and strategic messaging |
7 |
| Theory and practice |
6 |
| Eyes on the street: Civilian Joint Task Force and the surveillance of Boko Haram in northeastern Nigeria |
6 |
| The efficacy of ACH in mitigating serial position effects and confirmation bias in an intelligence analysis scenario |
6 |
| Shared secrecy in a digital age and a transnational world |
5 |
| Coming in from the cold: bringing the Intelligence and Security Committee into Parliament |
4 |
| Intelligence is as intelligence does |
4 |
| Intelligence theory from the margins: questions ignored and debates not had |
4 |
| The other hidden hand: Soviet and Cuban intelligence in Allende's Chile |
4 |
| Fusing algorithms and analysts: open-source intelligence in the age of 'Big Data' |
4 |
| Cyber operations and useful fools: the approach of Russian hybrid intelligence |
4 |
| Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology |
3 |
| Improving information evaluation for intelligence production |
3 |
| The way ahead in explaining intelligence organization and process |
3 |
| Critical epistemology for Analysis of Competing Hypotheses |
3 |
| Towards an evidence-based approach to communicating uncertainty in intelligence analysis |
3 |
| From cold to cyber warriors: the origins and expansion of NSA's Tailored Access Operations (TAO) to Shadow Brokers |
3 |
| Is social media intelligence private? Privacy in public and the nature of social media intelligence |
3 |
| From madness to wisdom: intelligence and the digital crowd |
3 |
| Three concepts of intelligence communication: awareness, advice or co-production? |
2 |
| A new role for 'the public'? Exploring cyber security controversies in the case of WannaCry |
2 |
| Project Abstract: an Anglo-American intelligence operation in 1947 to recover guided weapon technical documentation buried in Germany |
2 |
| The use of intelligence to determine attribution of the 2010 Haiti cholera disaster |
2 |
| Positivism and its limitations for strategic intelligence: a non-constructivist info-gap critique |
2 |
| Combatting terror in Europe: Euro-Israeli counterterrorism intelligence cooperation in the Club de Berne (1971-1972) |
2 |
| Ambivalent heroes: Russian defectors and American power in the early Cold War |
2 |
| Evaluating intelligence theories: current state of play |
2 |
| Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community |
2 |
| Intelligence expertise in the age of information sharing: public-private 'collection' and its challenges to democratic control and accountability |
2 |
| The operational code approach to profiling political leaders: understanding Vladimir Putin |
2 |
| Cold War counter-terrorism: the evolution of international counter-terrorism in the RCMP Security Service, 1972-1984 |
2 |
| Intelligence in war: how important is it? How do we know? |
2 |
| A confusion, not a system: the organizational evolution of strategic intelligence assessment in Canada, 1943 to 2003 |
2 |
| The price of alliance: Anglo-American intelligence cooperation and Imperial Japan's criminal biological warfare programme, 1944-1947 |
1 |
| Historical reconstruction of the community response, and related epidemiology, of a suspected biological weapon attack in Ningbo, China (1940) |
1 |
| Protecting secrets: British diplomatic cipher machines in the early Cold War, 1945-1970 |
1 |
| The US stay-behind operation in Iran, 1948-1953 |
1 |
| Post factum clarity: failure to identify spontaneous threats |
1 |
| A most pervasive memoir: R. V. Jones and his Most Secret War |
1 |
| TEMPEST and the Bank of England |
1 |
| Post-9/11 wartime intelligence analysis |
1 |
| Witness testimony from the Church Committee hearings on covert action, 1975 |
1 |
| From laboratory to the WMD Commission: how academic research influences intelligence agencies |
1 |
| The cultural turn in intelligence studies |
1 |
| Interdisciplinary, cross-sector collaboration in the US intelligence community: lessons learned from past and present efforts |
1 |
| Spies and scholars in the United States: winds of ambivalence in the groves of academe |
1 |
| Placebo scrutiny ? Far-right extremism and intelligence accountability in Germany |
1 |
| What do judges say on the protection of intelligence secrets ? |
1 |
| The trouble with (supply-side) counts: the potential and limitations of counting sites, vendors or products as a metric for threat trends on the Dark Web |
1 |