Notes

1 Introduction: Intelligence Cooperation and Professionalization

1. Quoted in ‘Douglas Waller’s “Wild Bill Donovan,” on the OSS spymaster’, WP, 27 February 2011. 2. R. Heslop, ‘The modern professionals’, Jane’s Police Review Community, 29 October 2010. 3. See also sources, e.g., ‘“Narrative verdict” at Linda Norgrove inquest’, BBC, and J. Healy, ‘Popular Rage Is Met With Violence in Mideast’, NYT, 15/17 February 2011; ‘England riots: Police could get wider curfew powers’, BBC, 16 August 2011; ‘Foreign Secretary publishes review of consular evacuation procedures’, FCO.gov.uk, 21 February 2012. 4. See also UK Association of Chief Police Officers (ACPO), ‘Introduction to Intelligence-Led Policing’, ACPO Practice Advice, 2007; ‘Intelligence, Tips Drive Operations in Afghanistan’, US DoD, 17 September 2010; ‘Key role of intelli- gence’ in A. Nicoll (ed.), ‘US intensifies drone strikes in Pakistan’, IISS_SC, 16, 36, October 2010; ‘U.S. Kills bin Laden in Intelligence- driven Operation’ and ‘Brigade Leaders Cite Value of Intelligence’, Defense.gov, 2 May 2011. 5. Naturally a huge body of literature can be referenced here, especially as ‘professionalization’ or ‘professionalism’ elements, or at least strives to those ‘ends’, constitute such a large focus of several business studies texts. Notable examples of most relevant texts for this study, with a strong influence on ‘liai- son’-related concerns, are cited; see also ‘Government to Overhaul Anti- Terror Training By Spring’, WB, 8 December 2011. 6. A. MacVean, ‘What is a professional?’, Jane’s Police Review Community, 18 September 2009; see also ‘Editorial: Police leadership presents a bleak and depressing spectacle’, TO, 11 March 2012. 7. Heslop, ‘The modern professionals’. 8. L. Sherman, ‘On the evidence’, Jane’s Police Review Community, 3 December 2010. 9. See also ‘Spooks Get New Workout Routine… For Their Minds’, WB, 7 June 2011.

2 Contributing towards the professionalization of intelligence cooperation

1. See also ‘Legal Attachés’ (or ‘legats’) US FBI agents based abroad in US embas- sies to ‘liaise with foreign law enforcement agencies’ and to assist with crimi- nal investigations concerning the US in the host country – FBI, Legal Attaché Program, March 2004; US DIA, ‘Instructions for DIA Meeting with Soviet Attaché’, Undated/c. 1977–78, accessed on 13/06/2007 via US Declassified Documents Reference System (DDRS) in Georgetown University Library;

163 164 Notes

: Axing small embassies “false economy”’, BBC, 8 September 2010; for , ‘Budget cuts to force embassy closures: Bildt’, TL, 10 December 2010; F. Hanson, ‘The Digital Revolution Meets Diplomacy’, ISN, 11 January 2011; M. Mazzetti, ‘U.S. Expands Role of Diplomats in Spying’, NYT, 28 November 2010; ‘New Pentagon Intel Office to Target Nuclear, Extremist Threats’, GSN, 24 April 2012. 2. See also G. Corera, ‘Book tells of MI5’s secret past’, BBC, 5 October 2009; B. Porter, ‘Other People’s Mail’, LRB, 31, 22, 19 November 2009, pp. 15–17; G. Corera, ‘“Mole-hunter” breaks 30-year silence’, BBC, 26 January 2010; see also the other related texts cited throughout this study. 3. See also R. Norton- Taylor, ‘The secret servants’, GU, 11 July 2009; ‘Petraeus to officially retire to take CIA job’, CNN, 31 August 2011; ‘Police database will share data on 15 million people’, BBC, 22 June 2011; P. Dunleavy, ‘Intelligence versus evidence-gathering’, WT, 30 August 2011; ‘“Give police access to snoop agency intel”’, TL (Sweden), 8 December 2011; A. Goldman and M. Apuzzo, ‘Spy games come to New York for UN General Assembly’, AP, 4 October 2011; ‘Arab sanctions target Syrian leaders, intelligence’, Reuters, 1 December 2011; J. Lewis, ‘Syria releases the 7/7 “mastermind”’, DT, 4 February 2012. 4. See also Air Vice Marshal S. Hillier, ‘Information Superiority – the Vision’, RUSI Defence Systems, 13, 3, Spring 2011, pp. 56–57. 5. See also M. Rosen, ‘How English evolved into a global language’, BBC, 20 December 2010; for modern translation applications, see e.g., ‘NetBase Taps Basis Technology to Expand Foreign Language Capabilities in Its Enterprise Social Intelligence Platform’, MarketWatch, 14 March 2012. 6. ‘History of Security Monitoring: WWI to 1955’, declassified by the NSA 21/4/1982, PDF, p. 001; M. Streetly, ‘Alive and kicking: ground- based SIGINT proves its adaptability’, JIDR, 1 September 2006; ‘ rebels “hack into US drones”’, BBC, 17 December 2009; Ferris (2010); N. Perlroth, ‘Traveling Light in a Time of Digital Thievery’, NYT, 10 February 2012. 7. ‘History of Security Monitoring: WWI to 1955’, p. 007. 8. Wade’s book is part of the ‘Gale & Polden training series’, located in the special Bowen collection held at Georgetown University; ‘Strong Intelligence Material Housed at Georgetown’, Georgetown University News, 26 October 2010. 9. P. Heap, ‘Comment: The truth behind the MI6 façade’, GU, 20 October 2003; J. Stein, ‘British spy chief fretted over U.S. intelligence leaks’, SpyTalk, September 2010; M. Chulov, ‘SAS and MI6 officers released by Libya’s rebel commanders’, GU, 7 March 2011. 10. See also G. Corera, ‘How vital were Cold War spies?’, BBC, 5 August 2009. 11. For the documents released, see ‘Declassified UKUSA Agreement Documents Available’, NSA Press Release, and ‘UKUSA Agreement Release 1940–1956’, NSA/CSS website, 24 June 2010; ‘Newly released GCHQ files: UKUSA Agreement’, The (UK) National Archives, June 2010; see also G. Corera, ‘Details of secret US- UK “spying pact” released’, BBC, and R. Norton- Taylor, ‘Not so secret: deal at the heart of UK- US intelligence’, GU, and R.G. Satter, ‘Details of Cold War intelligence pact published’, AP, 25 June 2010; R. Aldrich, ‘Allied code-breakers co-operate – but not always’, GU, 24 June 2010. 12. See also P. Hennessy, ‘The Secret State: Preparing for the Worst, 1945–2010’, CH, 15 September 2010. Notes 165

13. See also K. O’Brien, ‘International: Managing information overload’, JIR, 1 March 2000; G. Witte, J. Markon and S. Hussain, ‘Terrorist recruiters lever- age the Web’, WP, T.L. Friedman, ‘www.jihad.com’, NYT, and M. Nance, ‘How al Qaeda Dupes Its Followers’, FP, 13/16/15 December 2009; P. Buxbaum, ‘Countering the Internet Jihad’, ISN_SW, and A.J. Rubin, ‘ Overhaul Image in Bid to Win Allies’, NYT, 21 January 2010; ‘Extremist websites “sky- rocketing” says Interpol’, JIW, 22 September 2010; J. Wolf, ‘Britain urges U.S. to take down extremist websites’, Reuters, 28 October 2010; J.F. Burns and M. Helft, ‘YouTube Withdraws Cleric’s Videos’, NYT, 3 November 2010; E. Nakashima, ‘Google to enlist NSA to help it ward off cyberattacks’, WP, and T. Claburn, ‘U.S. “Severely Threatened” By Cyber Attacks’, InformationWeek, 4/2 February 2010; ‘Over 5 billion mobile phone connections worldwide’, BBC, 9 July 2010; ‘Bin Laden’s low- tech lair belies al-Qaida’s sophisticated Internet campaign’, AP, 15 May 2011; E. Bumiller and T. Shanker, ‘War Evolves With Drones, Some Tiny as Bugs’, NYT, 19 June 2011; R. Norton- Taylor, ‘Menwith Hill base undergoes massive expansion’, GU, 1 March 2012. 14. See also F. Dyson, ‘How We Know’, NYRB, 10 March 2011; J. Lanier, ‘The First Church of Robotics’, NYT, 9 August 2010; ‘Northrop Grumman unveils new intelligence aircraft that can be flown unmanned or by pilot’, AP, 9 May 2011; A. Heller, ‘Israeli security head says authorities having tough time keeping up with tech- savvy terrorists’, CP, 2 November 2010; T. Espiner, ‘CESG: Government risks breaches through patchy audits’, ZDNet, 25 January 2011; ‘Hague: UK is under cyber-attack’, BBC, 4 February 2011; ‘“Investing in People is Key” at Cyber Command’, Defense.gov, 17 March 2011; ‘Technology Extends Stratcom’s Priorities’, Defense.gov, 30 March 2011; E. Dou, ‘Is Europe ready to put its data in the clouds?’, Reuters, and ‘Cloud computing’s growing pains: Break- ins and breakdowns’, Economist, 26/28 April 2011; A. Hudson, ‘Are there criminals in the cloud?’, BBC Click, 8 May 2011; M. Shiels, ‘Cisco predicts internet device boom’, BBC, 1 June 2011; ‘Armed Forces Minister – national security in the digital age’, UK MoD, 5 July 2011; N. Shachtman, ‘A crime wave in cyberspace’, WP, and P. Mason, ‘Murdoch: the network defeats the hierarchy’, BBC Blog, 23/10 July 2011; ‘NATO plan to set up online app store’, JDW, 26 August 2011; K.L. Jackson, ‘It’s Official! US Intelligence Community Is Moving To The Cloud!’, Forbes, 17 October 2011; E. Nakashima, ‘Cybersecurity bill promotes exchange of data…’, WP, 1 December 2011; R. Gottemoeller, ‘From Telegraph to Twitter: Arms Control Diplomacy in the Information Age’, State.gov, 17 January 2012; D. Barrie, ‘A signal of ongoing cooperation’, IISS Voices, C. Young, ‘Military Intelligence Redefined: Big Data in the Battlefield’, forbes.com, and E. Montalbano, ‘Army Tests Menu Of Battlefield Intelligence Apps’, InformationWeek, 7/12/14 March 2012; ‘UK “must be ready to deploy cyber weapons”’, JIR, 19 April 2012. 15. See also M. Ballard, ‘Government iPhone ban blamed on Apple secrecy’, ComputerWeekly.com, 22 December 2010; B. Wheeler, ‘How much privacy can smartphone owners expect?’, BBC, C. Williams, ‘Apple iTunes flaw “allowed government spying for 3 years”’, DT, and K. Wagstaff, ‘Will Your Mall Be Tracking Your Cellphone Today?’, TIME, 22–25 November 2011; T. Espiner, ‘CESG: How UK defends against cyberattacks’, ZDNet, 26 April 2011; ‘Regional cybercrime hubs launched across England’, BBC, 8 February 2012. 166 Notes

16. See also ‘Canada’s Participation in the Wideband Global Satellite Communications System’, Backgrounder: forces.gc.ca, 17 January 2012; C. Freeze, ‘Spy case could have done “grave injury” to Canada’s ties with allies’, G&M, 14 March 2012. 17. See also D.T. Dortch, ‘Being smart about intelligence careers’, WP, 12 May 2011. 18. Several further sources exist: P. Hess, ‘U.S. turns to contractors to fill intel- ligence gaps’, AP, 30 August 2008; ‘OSCE Centre supports meeting to promote public- private partnerships in Kyrgyzstan’s fight against terrorism, extremism and radicalisation’, OSCE, 13 August 2009; R.J. Smith and J. Warrick, ‘Blackwater tied to clandestine CIA raids’, WP, J. Miklaszewski, ‘More questions over private contractors’, MSNBC, ‘Blackwater denies covert CIA help’, BBC, and M. Cole, R. Esposito and B. Ross, ‘Mercenaries? CIA Says Expanded Role for Contractors Legitimate’, ABC, 11 December 2009; ‘Secret America Blog: Defense mergers on rise’, WP, September 2010; J. Glanz and A.W. Lehren, ‘Use of Contractors Added to War’s Chaos in Iraq’, NYT, 23 October 2010; E. Lane, ‘The rise of the UK’s private security companies’, BBC, 2 November 2010; ‘Civil service: the rise of the contractors’, JIDR, 9 November 2011; ‘US defence firm Lockheed Martin hit by cyber-attack’, BBC, and M. Censer, ‘“Insourcing” effort still under fire despite Pentagon’s gradual retreat from plan’, WP, 29 May 2011; S. Ackerman, ‘Pentagon’s War on Drugs Goes Mercenary’, WB, 22 November 2011; D.S. Cloud, ‘Civilian contractors playing key roles in U.S. drone operations’, LAT, and A. Entous and S. Gorman, ‘Tensions Rising Over Drone Secrecy’, WSJ, 30 December 2011; P. Dorling, ‘Private agency paid to monitor protest groups’, SMH, 7 January 2012; M. Dunigan, ‘US Control of Contractors in Iraq Is Vital’, The Hill, and R. Nordland, ‘Risks of Afghan War Shift From Soldiers to Contractors’, NYT, 1/11 February 2012; M. Kelly, ‘Police, magistrates and prisons by G4S. Is this what the British people want?’, OD, 6 March 2012. 19. See also ‘Former officer: We monitored Danes for US’, Politiken.dk, 11 November 2010; K. McVeigh, ‘British firm offered spying software to Egyptian regime – documents’, GU, and R. McPherson, ‘Tech Startups: Turn The U.S. Military Into Your Client’, HP, 28/26 April 2011; A. Jacobs and P. Bullock, ‘A U.S. Tie to Push in Chinese Cities’, NYT, 15 March 2012. For the ‘social media’ nexus: T. Claburn, ‘Cisco Security Report Sees Social Media Risk’, InformationWeek, and ‘Twitter Tapping’, NYT, 8/13 December 2009; Z. Kleinman, ‘Google boss Eric Schmidt warns on social use of media’, BBC, 18 August 2010; E. Nakashima, ‘Measure would force White House, private sector to collaborate in cyber-crisis’, WP, 17 March 2010; ‘Translator Shop Moves Into the Intelligence Biz’, WB, and C. Milmo, ‘Inside the hi- tech hub that’s tracking the bandits’, Independent, 30/28 September 2010; A. Howard, ‘Social data and geospatial mapping join the crisis response toolset’, radar. oreilly.com, and ‘Intelligence agencies urged to track social media sites’, BBC, 27–28 January 2011; ‘Darpa Apes Nick Fury to Map Social Networks’, WB, 3 May 2011; J. Markon, ‘FBI uses social media in search for long- time fugi- tive’, WP, and B. Stelter, ‘Upending Anonymity, These Days the Web Unmasks Everyone’, NYT, 20 June 2011; ‘Spies Want to Mine Your Tweets for Signs of the Next Tsunami’, WB, and J. Preston, ‘Social Media History Becomes a New Job Hurdle’, NYT, 7/20 July 2011; ‘How the US mines the world for intelligence to keep a nation safe from attack’, WP, 10 September 2011; Notes 167

M. Barakat, ‘University studies crowdsourcing for intelligence’, AP, 18 October 2011; S. Weinberger, ‘Spies to use Twitter as crystal ball’, Nature, 478, 301, 2011, pp. 566–568; M. Hosenball, ‘Lawmakers press Homeland Security on Internet monitoring’, Reuters, J. Wortham, ‘With Twitter, Blackouts and Demonstrations, Web Flexes Its Muscle’, NYT, and ‘Special Forces Get Social in New Psychological Operation Plan’, WB, 12/18/20 January 2012; J. Brockmeier, ‘Strata: Mixing the Social Data Cocktail’, readwriteweb.com, 2 March 2012; S. Clare, ‘Sir David Omand – Social media snooping powers out of date’, BBC, 24 April 2012. 20. See also M. Kabel, ‘ Wal- Mart recruits intelligence officers’, AP, 24 April 2007; Y.Q. Mui, ‘As growth in U.S. slows, Wal- Mart puts more emphasis on foreign stores’, WP, 8 June 2010; ‘Government- Private Partnership Key to Defeating Terrorism’, TWF, 20 April 2006; K. Hart, ‘Google Goes to Washington’, WP, 29 September 2008; D. Temple- Raston, ‘Google: A New Tool For U.S. Intelligence?’, NPR, 25 March 2011; ‘Exclusive: Darpa Director Bolts Pentagon for Google’ and ‘Google Adds More Links to the Pentagon’, WB, 12/14 March 2012. For wider issues, ‘Will Obama curb intelligence outsourcing?’, JID, 23 March 2009; E. Javers, ‘CIA moonlights in corporate world’, Politico, 1 February 2010; P. Muncaster, ‘Government considers offer- ing GCHQ skills to the private sector’, V3.co.uk, 2 December 2010; S. Sumner, ‘GCHQ to protect private infrastructure from cyber attack’, Computing.co.uk, 8 March 2011; N.D. Schwartz, ‘Facing WikiLeaks Threat, Bank Plays Defense’, NYT, 2 January 2011; C. Kang, ‘Promise by Google ends FTC’s privacy- breach probe’, WP, 28 October 2010; R. Evans and P. Lewis, ‘Revealed: how energy firms spy on environmental activists’, GU, and P. Bleksley, ‘Corporate hired spies are here to stay’, GU, 14/16 February 2011; ‘Sons of Blackwater Open Corporate Spying Shop’, WB, 12 May 2011; ‘Ikea “spied” on angry custom- ers: report’, TL, and J. Brightman, ‘PlayStation Network security tracking staff and user behavior’, gamesindustry.biz, 13–14 March 2012. 21. See also, sources, such as N. Shachtman, ‘Google, CIA Invest in “Future” of Web Monitoring’, ABC, 30 July 2010; R. Lakshmi, ‘As India overhauls homeland security, U.S. firms vie for its business’, WP, 18 September 2010; M. Mazzetti, ‘Former Spy With Agenda Operates a Private C.I.A.’, NYT, 22 January 2011; ‘He Never Left’, NYT, and ‘When U.S. Said No, Private Spy Ring Fed Bloggers Instead’, WB, 24 January 2011; ‘US official who ran alleged illegal spy ring resigns, investigations continue’, AP, 27 September 2011; ‘Leading Chief Security Officers Outline Roadmap to Combat Advanced Threats’, PRNewswire, 17 January 2012. 22. See also ‘Promoting high standards in the UK PMSC industry’, FCO.gov.uk, 21 June 2011; ‘MEPs call for private security companies to be regulated by EU’, JDIN, 17 March 2011; ‘Farewell to Public Arms?’, DIIS.dk, and ‘Psst, Military: There’s Already a Universal Translator in the App Store’, WB, 4/19 April 2011; M. Mazzetti and E.B. Hager, ‘Secret Desert Force Set Up by Blackwater’s Founder’, NYT, 14 May 2011; ‘Private military companies eye new markets in difficult times’, JDW, 9 June 2011; ‘Kenyan court “fines UK men arrested over terror claims”’, BBC, 26 September 2011; R. Norton- Taylor and S.K. Dehghan, ‘MI6 spoke to Adam Werritty after trips’, GU, I. Thomson, ‘NSA whistleblower details intelligence cock-ups’, Register, and S. Aftergood, ‘White House Nominations to Oversight Panels Lag’, 168 Notes

FAS_SN, 17/19/20 October 2011; R. Gallagher, ‘Governments turn to hacking techniques for surveillance of citizens’, GU, 1 November 2011; D. Meyer, ‘Wikileaks exposes surveillance deals in Spy Files’, ZDNetUK, 2 December 2011; ‘ GPS rival Beidou starts offering navigation data’, BBC, 27 December 2011. 23. Several sources exist: J. Warrick and R.J. Smith, ‘CIA Hired Firm for Assassin Program’, WP, M. Mazzetti, ‘C.I.A. Sought Blackwater’s Help to Kill Jihadists’, NYT, R.J. Smith and J. Warrick, ‘Blackwater Disclosure Adds to CIA Worries’, WP, J. Risen and M. Mazzetti, ‘C.I.A. Said to Use Outsiders to Put Bombs on Drones’, NYT, M.A. Landler and M. Mazzetti, ‘U.S. Still Using Security Firm It Broke With’, NYT, W. Pincus, ‘Reports Revive Debate on Contractor Use’, WP, J. Warrick and R.J. Smith, ‘CIA Used Gun, Drill in ’, WP, and ‘CIA “threatened” terror suspects’, BBC, 20–22 August 2009; ‘Privatized War, and Its Price’, NYT, 11 January 2010; D. Filkins and M. Mazzetti, ‘Contractors Tied to Effort to Track and Kill Militants’, NYT, and ‘Pentagon to review spy ring claim’, BBC, W. Pincus, ‘Defense investi- gates information- operations contractors’, WP, M. Telatin, ‘Are marketised states a threat to peace?’, OD, 14/15/29/31 March 2010; M. Mazzetti, ‘U.S. Is Still Using Private Spy Ring, Despite Doubts’, NYT, 15 May 2010; J. Warrick, ‘CIA honors 12 officers, contractors killed in action’, WP, 8 June 2010; ‘Pakistan Case Highlights US Reliance on Intelligence Contractors’, Voice of America, 1 March 2011; J. Tate, ‘CIA’s brain drain: Since 9/11, some top officials have moved to private sector’, WP, 12 April 2011; I. Cobain and B. Quinn, ‘How US firms profited from torture flights’, ‘Mundane bills bring CIA’s rendition network into sharper focus’, and C. Algar, ‘CiF: US court documents reveal inner workings of CIA renditions’, GU, 31 August 2011; J. Warrick, ‘Ten years later, CIA “rendition” program still divides N.C. town’, WP, and ‘Remedies for Misconduct in War Zones’, NYT, 10/6 February 2012. 24. Based on paraphrased information from a non- attributable source; see also A. Corrin, ‘NGA looks to open source to improve access, better analysis’, DefenseSystems, 17 October 2011. 25. See also ‘Secrecy slows probe of US embassy surveillance’, TL, 3 March 2011; C.S. Clark, ‘Intelligence agencies lauded for progress toward balanced use of contractors’, govexec.com, 20 September 2011; J. Markon, ‘FBI illegally using community outreach to gather intelligence, ACLU alleges’, WP, 2 December 2011. 26. CIA, ‘Program Accomplishments’, Annual Report, 1998. 27. Gen. M.V. Hayden, Director, Central Intelligence Agency, ‘Analysis’, Statement for the Record to the Senate Select Committee on Intelligence, 11 January 2007 (emphasis added); Immerman (2011). 28. US Central Intelligence Agency, ‘Reports: Chapter 7: External Analysis’, CIA. gov, June 2007. 29. UK ISC, Annual Report 2007–08, March 2009, p. 11. 30. ‘Education, Training and Outreach Programs’, Program for International & Homeland Security – Ohio State University, 2007; M. Moore, ‘China opens string of spy schools’, DT, 26 June 2011; ‘Obama Orders Government to Clean Up Terror Training’, WB, 29 November 2011; ‘Intelligence gets street smart: Marines with 2nd Intel Bn. run explosives lane’, DVIDS, 14 March 2012. Notes 169

31. For examples of outreach events, ‘Events: INSA Events’, INS Alliance, 2007; D.E. Kaplan, ‘Hey, Let’s Play Ball: The insular world of intelligence reaches out for a few new ideas’, USN&WR, and ‘U.S. Intelligence’s big analysis outreach’, UPI, 29 October 2006. More broadly, S. Wilson, ‘Obama’s outreach toward Muslims is limited at home’, WP, 6 September 2011; J. Markon, ‘Seeking cooperation, but also after convictions’, WP, 31 August 2011. 32. See also S. Aftergood, ‘New Intelligence Directive on Congressional Notification’, FAS_SN, 1 December 2011. 33. See also ‘Libya TV shows captured Dutch navy helicopter crew’, BBC, 4 March 2011; M. Chulov, P. Curtis and A. Fallon, ‘“SAS unit” captured in Libya’, TO, and ‘“No comment” from MoD over SAS men captured in Libya’, ‘Libya unrest: SAS members “arrested near Benghazi”’ and ‘Libya unrest: UK diplomatic team released by rebels’, BBC, 6 March 2011. 34. See also similar cases, e.g., I. Cobain, ‘Terrorist who alleged torture in custody loses appeal’, GU, D. Gardham, ‘Security and intelligence services cleared of complicity in torture of al- Qaeda commander’, DT, and A. Maniar, ‘Torture evidence: a secret between Britain and her allies?’, OD, 25/28 February 2011; R. Norton- Taylor, ‘Narrowing the definition of torture to the point of hypoc- risy’, GU, 3 March 2011; ‘: The biggest threat to Clegg lies over- seas’, Independent, 5 June 2011; O. Bowcott, ‘Legal advisers must not alter their opinions to suit politicians, says leading international lawyer’, GU, 5 October 2011. For the US, see prominent ‘wiretapping’ cases, e.g., C. Savage and J. Risen, ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’, NYT, 31 March 2010; S. Aftergood, ‘Warrantless Surveillance of Charity Ruled Unlawful’, FAS_SN, 2 April 2010; ‘Federal judge awards damages to Islamic charity in NSA wiretapping case’, Jurist, 22 December 2010; ‘Federal appeals court reinstates wiretapping suit’, Jurist, 21 March 2011; ‘DOJ petitions federal appeals court for rehearing in wiretapping decision’, Jurist, 15 May 2011; ‘Rights groups urge US appeals court to preserve suit over warrantless surveillance’, Jurist, 1 September 2011; L.J. Sweet, ‘U.S. seeks to contain “top secret” evidence in Mehanna trial’, bostonherald.com, and, for Canada, ‘Abdullah Khadr Extradition’, CP, 25/29 July 2011. 35. See, e.g., D. Gardham, ‘Britain and US resume full sharing of intelligence’, DT, 25 September 2011; M. Bentham, ‘Vital US intelligence tip- offs “could dry up after Binyam ruling”’, LondonEveningStandard, 27 January 2012; M. Beckford, ‘Lord Macdonald: Ministers wrong on CIA secret justice fears’, DT, ‘Agencies “avoiding embarrassment”, PA, and D. Rose, ‘Furtive briefings by MI5 and the Government’s BIG LIE over secret justice’, Mail, 13/17 March 2012; see also, e.g., the several refs cited below to the contested ‘legality’ of the killing of bin Laden by the US during a US Navy SEALs operation in early May 2011; I. Cobain, ‘Terror suspect claims abuse by British officer’, GU, 17 August 2011; D. Cole, ‘After September 11: What We Still Don’t Know’, NYRB, 29 September 2011. For Denmark, ‘Udvalg foreslår nye love om PET og FE’ (Translation: ‘Committee proposes new laws on PET and FE’), fmn. dk, 24 February 2012; ‘Editorial: Torture acceptance undermines “do as I do” foreign policy ideal’, cphpost.dk, 15 March 2012. 36. See also D. Casciani, ‘Terror watchdog says UK is “safe haven” for sus- pects’, BBC, ‘UK “should cut links to European Court of Human Rights”’, BBC, ‘UK government to press for European Court reform’, BBC, 3/7/20 170 Notes

February 2011; ‘UK troops in Iraq “governed by human rights code”’, BBC, 7 July 2011; ‘Sir Menzies Campbell warns against human rights changes’, BBC, 21 August 2011; D. Gardham, C. Coughlin and J. Kirkup, ‘Extremists plotting attacks on Britain freed from detention’, DT, 17 October 2011; R. Norton- Taylor, ‘Ken Clarke plans secret court hearings to avoid revealing intelligence’, GU, W. Johnson, ‘Terror payout cases to be secret’, Independent, A. McSmith and K. Sengupta, ‘Centuries of open justice threatened by secret courts’, Independent, and ‘A fair and just proposal’, DT, 19–20 October 2011; A. Maniar, ‘Britain’s own Guantanamo Bay’, OD, 2 November 2011; S. Chakrabarti, ‘CiF: Our human rights are not a fad. We don’t need this Botox bill’, and J. Rozenberg, ‘CiF: The justice and security green paper is an attack on liberty’, GU, 13/16 November 2011; O. Bowcott, ‘Government warned over secret hearings’, GU, 24 January 2012; R. Norton- Taylor, ‘Why Abu Qatada can’t be tried in the UK’, GU, 17 January 2012; A. Travis, ‘Abu Qatada: Theresa May arrives in Jordan for talks’, GU, 5 March 2012; T. Helm, ‘Human rights abuses could be covered up under new justice bill proposals’, I. Cobain, ‘How secret renditions shed light on MI6’s licence to kill and torture’, O. Bowcott, ‘Secret court procedures could damage UK’s reputation, critics claim’, GU, and J. Landale, ‘UK presses for European human rights convention changes’, BBC, 12–29 February 2012; R. Winnett, ‘Nick Clegg seeks assurances over secret court trial plans’ and ‘Secret terror trials protect our agents, says Cameron’, DT, and O. Bowcott, ‘Secret civil court hearings “would put government above the law”’, S. Chakrabarti, Liberty, D. Davis, MP, H. Kennedy, QC, Lord K. Macdonald, QC, Rev. N. Mercer, Human Rights Lawyer of the Year, D. Rose, QC, ‘Letter: Secrets and scrutiny’, and R. Norton- Taylor, ‘Clarke’s concerns: spies and satisfying the Americans’, GU, and ‘Ken Clarke defends “secret court cases” proposals’, BBC, 2/5–6 March 2012; C. Algar, ‘CiF: It’s not just torture victims who should fear the “justice and security” green paper’, GU, 18 April 2012. 37. See also, e.g., ‘Council of Europe demands truth on CIA “black sites”’, CNN, ‘Europe rights commissioner urges probes into secret prisons’, Jurist, and S. Aftergood, ‘European Council Offers Rebuke to U.S. Secrecy Policy’, FAS_ SN, 6/8 September 2011; I. Cobain, ‘Lithuania faces legal action over prisons set up for CIA rendition programme’, GU, 27 October 2011; ‘Greenland to investigate CIA renditions’, Politiken.dk, and ‘Finland seen to be reluctant to act on information on possible CIA prisoner flights’, Helsingin Sanomat, 2/c. 14 November 2011; ‘CIA operated secret prison in Romania: AP report’, Jurist, 8 December 2011; ‘Spanish judge resumes probe into Guantanamo abuse’, AP, 13 January 2012; J. Lewis, ‘Rendition: did UK play secret role?’, DT, 25 February 2012; European Parliament, ‘US secret prisons in Europe: a “law of silence” among governments’, Committee on Civil Liberties, Justice and Home Affairs – Press release, 26 March 2012; I. Cobain, ‘Kenyans allege British involvement in rendition and torture in Uganda’, GU, 25 April 2012. 38. See also M. Urban, ‘Could Britain have carried out Bin Laden raid?’, BBC Newsnight, 5 May 2011; ‘Mobile “pinging” claim raises legal questions’, BBC, 14 July 2011; E. Metcalfe, ‘Britain deserves better surveillance laws’, GU, 4 November 2011. 39. See also Dutch (Independent) Review Committee on the Intelligence and Security Services (CTIVD) and Faculty of Law Radboud University, Nijmengen, ‘Accountability of Intelligence and Security Agencies and Human Rights’, Notes 171

Report of International Symposium, The Hague, The Netherlands: 7–8 June 2007; see also ‘cooperation’ in the Norwegian Parliamentary Intelligence Oversight Committee (the EOS Committee), Annual Report 2007, Spring 2008, and its, Annual Report 2008, Spring 2009, p. 9. 40. K. Dozier and E. Werner, ‘Navy SEALs Feared Terrorist Leader Was Reaching For Weapon, Say U.S. Officials’, AP, S. Erlanger, ‘In Europe, Disquiet Over Bin Laden and U.S’, NYT, S. Jones and O. Bowcott, ‘Osama bin Laden’s death – killed in a raid or assassinated?’, GU, A. Lewis, ‘Legality of killing questioned’, BBC, ‘Holder: Bin Laden killing “lawful”’, Jurist, ‘Bin Laden sons protest to US over “arbitrary killing”’ and ‘Bin Laden death “not an assas- sination” – Eric Holder’, BBC, 4–12 May 2011; ‘Europe committed crimes during counter- terrorism efforts: rights chief’, Jurist, 1 September 2011. 41. See also ‘All eyes on MiT’s spys: Turkish intelligence agency in need of over- sight’, Zaman, 11 March 2012. 41. See also Erlanger, ‘In Europe, Disquiet Over Bin Laden and U.S’ and J. Perlez, ‘Pakistani Army Chief Warns U.S. on Another Raid’, NYT, and K. Brulliard and G. Miller, ‘Pakistanis disclose name of CIA operative’, WP, 5/9 May 2011; D. Walsh, ‘Pakistan Razing House Where Bin Laden Lived’, NYT, 25 February 2012. 43. See also R. Klein, ‘Donald Rumsfeld … Says Harsh Interrogation Helped “In Saving Lives”’, ABC, 8 February 2011; S. Aftergood, ‘Review of CIA Interrogation Program Still Unfinished’, FAS_SN, 23 March 2011; ‘Extraordinary rendition: a backstory’, GU, 31 August 2011; M. Urban, ‘The nature of Obama’s rendition programme’, BBC, 9 September 2011; R. Norton- Taylor and R. Evans, ‘Drone strikes prompt MoD to ponder ethics of killer robots’, GU, 17 April 2011; ‘Here’s Why the Government Thinks It Can Kill You Overseas’, WB, M. Zenko, ‘The Obama Administration and Targeted Killings: “Trust Us”’, CFR, and P. Van Buren, ‘We Take Care of Our Own: Eric Holder and the End of Rights’, HP, ‘William Hague facing legal action over drone strikes’, BBC, M. Townsend, ‘GCHQ civilian staff face war crimes charge over drone strikes in Pakistan’, GU, and A. Rosenthal, ‘Targeted Killing’, NYT Blog, 5–6/11/12 March 2012; M. Beckford, ‘Secret justice may be needed to hear “important” drone case, judge suggests’, DT, 30 April 2012; D. Cole, ‘No Accountability for Torture’, NYRB, 7 May 2012. 44. See also D. Gardham, ‘Intelligence officers could face court for “aiding and abetting torture” despite new guidelines’, DT, and D. Casciani, ‘Official guidance for questioning suspects held by foreign powers is unlawful’, BBC, 24/28 June 2011; UK ISC, AR 2010–2011, July 2011, p. 6, para. 16; D. Casciani, ‘Human rights torture challenge thrown out by High Court’, BBC, 3 October 2011; I. Cobain, ‘UK’s secret policy on torture revealed’ and ‘The secret interrogation policy that could never be made public’, GU, 4 August 2011; R. Norton- Taylor, ‘Torture prosecutions against MI5 and MI6 unlikely to be pursued’, GU, and D. Casciani, ‘Libya rendition claims to be investigated by UK police’, BBC, and ‘Britain’s reputation is in the dock over rendition’, Independent, 12–13 January 2012; R. Norton- Taylor, ‘UK’s role in rendition of terror suspects under fresh scrutiny’, GU, 19 April 2012; ‘Call for [UK] rendition “briefing” probe’, PA, 3 May 2012. 45. See also ‘Afghanistan: Drone missile “killed two US soldiers”’, BBC, and D.S. Cloud, ‘Anatomy of an Afghan war tragedy’, LAT, 12/10 April 2011; 172 Notes

‘America and Pakistan: Stuck with you’, Economist, and P. Constable, ‘Pakistan president, opponents mend fences over CIA contractor case’, WP, 3/23 March 2011; J. Perlez and I. Khan, ‘Pakistan Tells U.S. It Must Sharply Cut C.I.A. Activities’, NYT, and P. Wintour, ‘Cameron’s multi- million gamble to win Pakistani minds’, GU, 11/5 April 2011; see also D. Walsh, ‘Pakistan’s secret dirty war’, GU, 29 March 2011; R. Crilly, ‘Pakistan’s intelligence agencies “should have parliamentary scrutiny”’, DT, 13 January 2012; S. Shah, ‘Pakistan’s spy agency ISI faces court over disappearances’, GU, 9 February 2012. 46. See also ‘Intelligence and Security Committee’ in UK Parliament, Hansard – Commons Debates, 18 March 2010, col. 990–1075. 47. See also ‘Factbox: Britain’s intelligence services’, Reuters, 28 October 2010; R. Norton- Taylor, ‘Ministers’ role in the Libyan renditions must not be kept secret’, GU, 13 January 2012; Norton- Taylor, ‘UK’s role in rendition of terror suspects under fresh scrutiny’; ‘New buildings handed over to MOD’, UK MoD, 16 March 2012. 48. See, e.g., H. Mulholland, ‘William Hague: I take full responsibility for Libya mission’, GU, 7 March 2011; see also Svendsen (2010a, p. 201, fn. 355). For another difficult case involving UK SF (reportedly the ‘quick in- quick out’ SBS – SAS ‘units’ tend to be long(er)-term ‘embedded’ in their opera- tional spaces), G. Corera, ‘How pushed for time was Britain?’, BBC, R. Syal, R. Norton- Taylor and T. Kington, ‘Italians furious over Nigerian hostage raid deaths’, D. Pearse and agencies, ‘Nigeria hostages “shot dead in a toilet” as special forces fought to free them’, P. Wintour, ‘Italians were consulted, says defence secretary’, GU, and ‘Intelligence blames Nigeria raid on escaped ter- rorist’, AGI.it, 9–13 March 2012. 49. See also ‘MI5 inspector’s website shut down after security blunder’, DT, 23 October 2011; ‘Public spied on 1,500 times a day, report says’, Reuters, 10 August 2009; The Rt. Hon. Lord Justice Gross, Judiciary of England and Wales, ‘National Security and the Courts’, RUSI, 16 November 2010; ‘The Investigatory Powers Tribunal’ website, via http://www.ipt- uk.com/ 50. See also M. Taylor, ‘MI6 seeks recruits on Facebook’, GU, 29 September 2008; B. Carlin, ‘SAS set to lift veil of secrecy over elite operations’, Mail, 21 November 2009; M. Savage, ‘“Caution: Here comes the BBC”’, BBC, and G. Corera, ‘GCHQ in the digital age’, DT, 29 March 2010. 51. UK Intelligence and Security Committee (UK ISC), Intelligence Oversight, July 2002. 52. Also information from a non- attributable source. 53. See also A. Wills, H. Born et al., ‘Parliamentary Oversight of Security and Intelligence Agencies in the European Union’, Study PE 453.207, Brussels: EU Parliament, June 2011. 54. See also ‘7/7 inquests: Coroner rules victims unlawfully killed’ and ‘Key points from coroner’, BBC, 6 May 2011; A. Grice, ‘Yvette Cooper: Security services require greater scrutiny’, and ‘Attempts to open up the security services are still worth making’, Independent, 19 October 2011; R. Winnett, ‘Spy chiefs to be questioned in public for first time’, DT, 22 November 2011; ‘Canada: Intelligence Service Accused of Libya ’, AlertNet/ Reuters, and S. Sachs, ‘Former Gadhafi prisoner recounts interrogation by Canadians’, G&M, 28–29 September 2011; ‘Harper accepts spy watchdog’s resignation’, CBC, 10 November 2011; J. Davis, ‘Spy overseer’s office abol- ished’, Canada.com, 26 April 2012. Notes 173

55. HMG, Government Response to the ISC’s Report on Rendition, July 2007, p. 3 (emphasis added); see also P. Taylor, ‘Musharraf “not told of UK’s disapproval of torture”’, BBC, 14 March 2011; O. Bowcott, ‘Secret memorandum reveals Britain’s involvement in rendition’, GU, 23 June 2011. 56. Based in part on information from a non- attributable source. 57. See also ‘US pulls spy chief as Pakistani counterpart flies to Beijing’, JIW, 1 August 2011; ‘US withholds military aid from Pakistan’, JIW, 11 July 2011. 58. See also R. Norton- Taylor, ‘The media is not the enemy’, GU, 17 November 2008; C. Long, ‘Occupy Wall Street: NYPD Orders Officers Not To Interfere With Press’, AP, 23 November 2011; S. Shane, ‘A.C.L.U. Lawyers Mine Documents for Truth’, NYT, 30 August 2009; C. Savage, ‘Deal in Senate on Protecting News Sources’, NYT, 31 October 2009; S. Shane and R. Nixon, ‘Charges Against U.S.-Aided Groups Come With History of Distrust in ’, NYT, 6 February 2012. 59. ‘From: The Chairman, The Rt Hon Paul Murphy MP’, UK ISC 160/2007, 28 June 2007, letter reproduced at the front of (UK) Intelligence and Security Committee (UK ISC), Renditions, June 2007 (emphasis added). 60. See also, for official sources, UK ISC, AR 2007–08, p. 44; UK ISC, AR 2008–2009, Norwich: TSO, March 2010, pp. 41–47. 61. Information from a non- attributable source. 62. See also ‘Intelligence and Security Committee’ in Hansard. 63. UK ISC, Renditions, p. 53. 64. Ibid; on ‘safeguards’, see also ‘Argentina, US To Revive AML Intelligence- Sharing’, WSJ, 7 January 2011; ‘MPs demand extradition safeguards’, PA, 6 December 2011. 65. See, e.g., ‘Denmark: Authorities must come clean about renditions’, Amnesty Intl., 23 October 2007; ‘“Confession” indicates soldiers abetted torture’ and ‘Iraqis suing for complicity in torture’, cphpost.dk, ‘Former defence chief at ease over Iraq’, Politiken.dk, 19/23/28 December 2011; for the US, L. Hajjar, ‘Exposing the dark side’, aljazeera.net, 8 September 2011; ‘Peddling Fear’, NYT, 22 October 2011; ‘Prosecuting al- Qaeda: A tricky business’, Economist, 14 January 2012; M.L. Dudziak, ‘This War Is Not Over Yet’, NYT, and ‘Guantanamo detainee Majid Khan admits terror charges’, BBC, 15/29 February 2012; ‘Foreign Secretary meets representatives of Guantanamo detainee’, FCO.gov.uk, 1 March 2012; ‘US deal to hand Bagram and other prisons to Afghans’, BBC, 9 March 2012; ‘Arraignment Ends as Legal Teams Gird for Long 9/11 Trial’, Defense.gov, 6 May 2012. 66. UK ISC, Renditions, p. 53; R. Norton- Taylor, ‘Evidence of torture “buried by ministers”’, and I. Cobain and R. Norton- Taylor, ‘Whitehall devised torture policy for terror detainees’, GU, 5/16 February 2009; M. Seamark, ‘Tony Blair “knew of secret policy that allowed torture of Britons”’, Mail, 19 June 2009; F. Gardner, ‘Egypt violence exposes secret tools of state repression’, BBC, 4 February 2011; T. McVeigh, ‘Britain’s Guantánamo survivors are suffer- ing a toxic legacy’, TO, 1 January 2012; ‘Detainee abuse inquiry criticised’, BBC, 6 January 2012; Svendsen (2012c); ‘UK government “approved Abdel Hakim Belhaj’s rendition”’, BBC, 9 April 2012; ‘Canada’s use of torture data sparks outcry’, AFP, and R. DiLeonardo, ‘Canada security service authorized to use information obtained through torture’, Jurist, 8/9 February 2012; J. Bronskill, ‘CSIS can share info despite “substantial” torture risk’, ‘CSIS calls surprise work visits a “legitimate investigative strategy”’, and ‘Ottawa told to end policy that poses “risk” of torture’, CP, 2/4/7 March 2012. 174 Notes

67. See, e.g., I. Cobain and R. Norton- Taylor, ‘Lawyers to boycott UK torture inquiry as rights groups label it a sham’, GU, and ‘Report: UK police seek to question Guantanamo detainees over inquiry into torture allegations’, AP, 6/29 July 2011; ‘Campaigners to shun UK inquiry into detainee “torture”’, BBC, 4 August 2011. 68. ‘UK panel will not complete investigation into torture allegations’, Jurist, O. Bowcott, I. Cobain and R. Norton- Taylor, ‘Gibson inquiry into MI5 and MI6 torture collusion claims abandoned’, and Editorial, ‘The Gibson inquiry: good riddance’, GU, 18/19 January 2012; Peter Gill, University of Liverpool and Professor Mark Phythian, University of Leicester, authors of Intelligence in an Insecure World, ‘Letter: Intelligence oversight not fit for purpose’, GU, ‘“The UK needs a rendition inquiry with real clout”’, defencemanagement. com, E. Jones Parry, ‘Why the UK government must get to the bottom of any complicity in torture’, OD, and R. Brant, ‘Fears over security service cases “held in secret”’, BBC, 20/30–31 January 2012. 69. See, e.g., B. Brady, ‘Torture inquiry will “not cover US rendition”’, IoS, 15 May 2011; J. Rozenberg, ‘Torture inquiry will cover rendition, pledges QC’, GU, 9 June 2011. 70. See the UK Intelligence Services Act (1994), especially ‘Schedule 3, paragraphs 3 and 4’. 71. For the limits on UK ISC oversight ability, P. Gill, ‘Democratic and Parliamentary Accountability of Intelligence Service After September 11th’, Geneva Centre for the Democratic Control of Armed Forces (DCAF) Working Paper No. 103, Geneva: January 2003; C. Ames, ‘CiF: Toothless, clawless and clueless’, GU, 11 September 2008; R. Norton- Taylor, ‘7/7 inquest verdict: MI5 cannot be blamed’, GU, 7 May 2011; ‘Intelligence and Security Committee wants more power’ and G. Corera, ‘Spies facing budget squeeze and more oversight’, BBC, 13 July 2011. 72. UK ISC, Intelligence Oversight. 73. For restrictions on New Zealand’s ISC, see, e.g., A. Vance, ‘Israeli spy claims: Goff dismisses PM’s “excuse”’, Stuff.co.nz, 25 July 2011. 74. This is when a second party party cannot, without the permission of the first, pass details of a liaison on to a third party – Sims (2006, p. 205). 75. From a non- attributable source. 76. See also cases, e.g., as reported in H. McDonald, ‘Defence fights to keep 1975 secrets’, SMH, 13 September 2010; C. Woods, ‘Government should stop state secrets being aired in court, says spy watchdog’, GU, 6 January 2012; L. Tickle, ‘Gathering intelligence on the recruitment and use of informers’, GU, 12 March 2012. 77. Also based on paraphrased information from a non- attributable source. 78. UK ISC, AR 2007–08, p. 23, para. 81. 79. UK ISC, AR 2010–2011, July 2011, p. 33, para. 113. 80. See also ‘The exchange of intelligence’ in UK ISC, AR 2009–2010, Norwich: TSO, March 2010, pp. 17–19; Sir Richard Dearlove, former Chief (‘C’) SIS/ MI6 (1999–2004), Testimony to Chilcot Iraq Inquiry, 16 June 2010, from p. 13, see esp. fn. 5. 81. F.M. Kaiser, ‘Congressional Oversight of Intelligence’, CRS, 15 February 2007; ‘Intelligence oversight in the new US Congress’, JID, 19 January 2007; see also ‘Cheney “ordered CIA to hide plan”’, BBC, 12 July 2009; CIA Director L. Panetta, ‘Op- Ed: Congress and the CIA: Time to Move On’, WP, 2 August Notes 175

2009; W. Pincus, ‘On Hill, a question of intelligence intelligence’, WP, and P. Hess, ‘Some intel notifications to Congress lagging’, AP, 28 October 2009; ‘Overlooking Oversight’, NYT, 4 June 2011. 82. See also several sources, e.g., P. Hess, ‘ Ex- CIA Chiefs Slowed Torture Memos Release’, AP, 18 April 2009; V. Hansen and L. Friedman, ‘Supervising Intelligence: A Checked and Balanced Approach to National Security’, Jurist, 22 March 2010; S.R. Weissman, ‘Accountability for CIA’s covert acts’, Politico, 26 August 2010; ‘IG nominee may expand reviews of CIA covert operations’, federaltimes.com, and G. Miller, ‘With bill at Obama’s desk, Congress aims to renew oversight of CIA operations’, WP, 22/30 September 2010; A. Goldman and M. Apuzzo, ‘At CIA, mistakes by officers are often overlooked’ and ‘At CIA, Grave Mistakes Led To Promotions’, AP, 9 February 2011; ‘New scrutiny of CIA torture, botched rendition’, CBS, 14 June 2011; L.C. Baldor, ‘Senators say military cyber ops not disclosed’, AP, 12 January 2011. 83. See also K. Dilanian, ‘Senate panel inquiry may shed light on hunt for Bin Laden’, LAT, 13 May 2011; G. Miller, ‘Intel panels to take stock of post-9/11 progress’, WP, 17 August 2011. 84. See e.g., D. Welch, ‘Wilkie to oversee agencies’, SMH, 18 November 2010; D. Welch, ‘Gillard eyes spooks in review’, SMH, 24 December 2010; D. Flitton, ‘Taking stock of our spies’, and G. Henderson, ‘The intelligence and the luck that saves us from murderers’, SMH, 4 January 2011; D. Welch, ‘Crimes agency caught bypassing law’, SMH, 24 March 2011. 85. See, e.g., J. Bronskill, ‘Spy agency CSIS raps itself for policy violations, says new rules now in place’, CP, 4 January 2011; I. Macleod, ‘Security agen- cies still not sharing data’, VancouverSun, and C. Freeze, ‘Give politicians access to top- secret security data, Senate urges’, G&M, 25/23 March 2011; A. Woods, ‘Tory MP’s Chinese crush likely “sexpionage,” former spies say’, TorontoStar, 30 November 2011; ‘“Don’t talk” campaign denounces CSIS tactics’, CP, 30 January 2012. 86. See, e.g., A. Wiener, ‘ intelligence agency criticized for spying on lawmakers’, LAT, 1 February 2012. 87. ‘Evidence’ on the ‘Procedures’ webpage on the Butler Review website, last accessed: 10 July 2006. 88. US Commission’s ‘Frequently Asked Questions’, last accessed: 10 July 2006 (emphasis added). 89. For several later exposés, see M. Isikoff, ‘Sanctioned Degradation’, Newsweek, J. Warrick, ‘Intelligence Chief Says Methods Hurt U.S.’, WP, and ‘Bush policy “led to Abu Ghraib”’, BBC, 21–22 April 2009; P. Kane and J. Warrick, ‘House Panel to Investigate Canceled CIA Program’, WP, C. Savage, ‘To Critics, New Policy on Terror Looks Old’, NYT, K. Connolly, ‘CIA probes could derail Obama’s plans’ and H. Andersson, ‘Did America break its torture law?’, BBC, G. Miller, ‘CIA was a long way from Jason Bourne’, LAT, D. Byman, ‘Kill or Be Killed?’, WSJ, H. Shamsi, ‘No Longer A Debate About Targeted Killings’, CBS, and R.A. Clarke, ‘Targeting Terrorists’, WSJ, 2–21 July 2009; ‘The underside of war’, Economist, 27 August 2009; S. Shane, ‘Judging a Long, Deadly Reach’, NYT, 30 September 2011; N. Macdonald, ‘Extrajudicial executions from the sky’, CBC, and P. Smyth, ‘CiF: The British army has lost out in Libya’, GU, 4 October 2011; N. Hopkins, ‘Updated drones to pinpoint targets sought by Ministry of Defence’, GU, 27 September 2011; Donald H. Rumsfeld, ‘How 176 Notes

WikiLeaks vindicated Bush’s anti- terrorism strategy’, WP, 10 May 2011; ‘Dick Cheney Reveals Secret Resignation Letter In Memoir “In My Time”, Offers “No Regrets”’, HP, 24 August 2011; J. Warrick, ‘Cheney: After Yemen strike, Obama owes apology to Bush’, WP, and P. Sherwell, ‘Condoleezza Rice and Dick Cheney “clashed over treatment of terror suspects”, memoir claims’, DT, 2/22 October 2011; D. Ignatius, ‘The House intelligence committee: A rare example of bipartisanship’, WP, 3 March 2012. 90. Several sources exist: ‘Intelligence data pulled from websites’, BBC, 5 October 2001; N. Hentoff, ‘The dark Bush legacy on secrecy’, WT, 25 February 2008; ‘Fixing Abuses of State Secrets’, WP, 29 June 2009; C. Hayes, ‘Dealing With The Secret Government’, CBS, 27 August 2009; C. Johnson, ‘Obama to Set Higher Bar For Keeping State Secrets’, WP, and C. Savage, ‘Justice Dept. Plans to Limit Use of State Secrets Privilege’, NYT, L. Friedman and V. Hansen, ‘Obama’s Terrorism Policy: Change If Necessary, But Not Necessarily Change’, Jurist, S. Aftergood, ‘A Problematic New Policy on State Secrets’, FAS_SN, and ‘An Incomplete State Secrets Fix’, NYT, 23–29 September 2009; ‘New Obama Order Standardizes and Limits Pseudo-Secrets’, US NSAr Update, 4 November 2010. 91. See also J. Solomon, ‘In Intelligence World, A Mute Watchdog’, WP, 15 July 2007; J. Stein, ‘Obama Should Ditch the Intelligence Advisory Board’, CQ Politics, 21 September 2009; A. Morgan, ‘Obama signs executive order strengthening intelligence oversight panel’, Jurist, 30 October 2009; S. Aftergood, ‘GAO Gains a Foothold in Intelligence Oversight’, FAS_SN, and G. Miller, ‘With bill at Obama’s desk, Congress aims to renew oversight of CIA operations’, WP, 29–30 September 2010; S. Aftergood, ‘Intelligence Agencies Are Told to Cooperate with GAO’, FAS_SN, 16 May 2011; S. Aftergood, ‘GAO Completes an “Intelligence-Related” Review’, FAS_SN, 18 April 2012. 92. See also P. Mattingly and R. Schmidt, ‘Wall Street Sees Analysts Snagged by Political Intelligence Bill’, Bloomberg, and B. Montopoli, ‘Will “political intelligence” stay in the dark?’, CBS, 7/9 February 2012. 93. HMG, Government Response to … Rendition, p. 6. 94. See also D. Cannadine, ‘A Point of View: Churchill and the birth of the ’, BBC, 9 March 2012. 95. See, e.g., ‘Could Britain still defend the Falklands?’ and V. Barford, ‘What are the competing claims over the Falklands?’, BBC, 16–27 February 2012. 96. See also G. Corera, ‘Inspire magazine: Who was behind it?’, BBC, 21 November 2011. 97. See also G. Stewart, ‘Al- Qaeda, Victorian style’, Times, 5 August 2005; ‘The battle over stateless jihad’, JIAA, 22 February 2012. 98. See also ‘Dr responds to Defence Committee report on SDSR’, UK MoD, and ‘MPs warn cuts will limit UK armed forces capability’, BBC, 3 August 2011. 99. See also J. Clark, ‘GCHQ to take hub role in UK cybersecurity’, ZDNetUK, 25 November 2011. 100. See also Rt. Hon. Lord Howell of Guildford, ‘The Commonwealth: A Global Network for the 21st Century’, FCO, 10 March 2011. 101. See also ‘“Global reach is the Commonwealth’s global strength”’, FCO, 11 December 2009; P. Dorling, ‘Spies, lies and archives’, SMH, 23 April 2011; M. Bell, ‘Australia, UK to share defence research equipment and facilities’, JDI, 22 July 2011; ‘The Intelligence Cooperation Working Group’, Government Notes 177

of Canada, 23 January 2009; C. Blatchford, ‘MacKay says Canada, U.S. share intelligence better following 9/11’, and J. Press, ‘Leaked cable lays out Canadian, U.S. border concerns’, Postmedia, and ‘Canada to reimpose controversial anti- terrorism measures’, JIW, 9/8 September 2011; Moazzam Begg, ‘CiF: Why is Canada acting like a Guantánamo Bay camp guard’, GU, 14 October 2011; ‘Canada citizen removed from UN terrorist list’, Jurist, 2 December 2011. 102. See also, e.g., E. McCann, ‘Security services making a killing from the Troubles’, BelfastTelegraph, 27 January 2012. 103. See also, e.g., ‘New wave of retro-terrorism’, JTSM, 14 March 2007; ‘Terrorism in Northern Ireland: Resurgent’, Economist, and ‘Real IRA splinter threat’, JTSM, 10/30 December 2009; G. Corera, ‘MI5 head warns of serious risk of UK terrorist attack’, BBC, 17 September 2010; ‘PSNI and Irish police launch cross- border strategy’, BBC, 13 December 2010; M. Simpson, ‘Real IRA: Will NI dissident threat ever go away?’, BBC, 26 April 2011; ‘UK tightens security after bomb threat’, JIR, 20 May 2011; see also G. Hedgecoe, ‘ETA and the Basque Labyrinth’, OD/ISN_SW, 25 August 2009; ‘Eta: Kofi Annan in talks to discuss end of Basque group’, BBC, 17 October 2011; N. Kitsantonis, ‘Greece Halts Overseas Mail as Bombs Cross Borders’, NYT, 3 November 2010; D. Wood, ‘Afghan Troop Withdrawal’, HP, 22 June 2011. 104. See also ‘Spycraft: A tide turns’, Economist, 15 July 2010; J. Oates, ‘Airport security boss calls time on tech’, Register, 12 November 2010. 105. See also S. Shane, ‘Intelligence Bodies Faulted on Disclosure’, NYT, 18 November 2010.

3 ‘Poacher’ or ‘fellow-gamekeeper’? Researching intelligence and liaison, and accounting for wider general intelligence cooperation trends

1. See also E. Keymer, ‘Mapping the battlespace’, JDW, 30 June 2011; ‘Building a GIS Helps Managers Achieve Optimal Operations’, esri.com, 23 January 2012. 2. See also UK ISC, AR 2010–11, July 2011, pp. 75–76, para.EE. 3. A. Dyèvre, ‘Intelligence cooperation: The OSINT option’, Europolitics, 28 October 2008; P. Cohen, ‘Digital Keys for Unlocking the Humanities’ Riches’, NYT, 16 November 2010. 4. See also ‘White House Issues Open Government Directive’, US NSAr, 8 December 2009; ‘New 20-year rule on secret papers’, BBC, 25 February 2010; G. Edwards, ‘MI5 lifts lid on secret PM briefings’, BBC, 17 May 2010 R. Shields, ‘Secret services “must be made more transparent”’ and ‘The not- so secret service’, Independent, 29 August 2010; ‘Government departments warned over tardy FOI answers’, BBC, 1 October 2010; ‘OSCE trains government and media from Central Asia on improving access to information in the digital age’, OSCE, 18 May 2011; J. Palmer, ‘Internet’s memory effects quantified in computer study’, BBC, 16 July 2011; S. Aftergood, ‘Fundamental Review Yields Reduction in Scope of Secrecy’, FAS_SN, 3 October 2011; ‘Launch of new sin- gle government website’, UK MoD, 29 February 2012. 5. See also ‘It’s ours and it’s not evil, say spy- base masters’, nzherald.co.nz, 9 April 2010; ‘NZ denies US controls intel base’, BBC, 8 April 2010; K. Dozier, ‘CIA chief spices up spy shop’s image on reality TV’, AP, 31 August 178 Notes

2010; T. Shanker and E. Schmitt, ‘White House Issues Guides on Sept. 11 Observances’, NYT, 29 August 2011; G. Corera, ‘William Hague hails not so secret spies’, BBC, 16 November 2011; L. Shaughnessy, ‘Elite troops’ commander told: “Get the hell out of the media!”’, CNN, 7 February 2012; ‘“Act of Valor” takes Oscar weekend with $24.5 mil’, AP, 27 February 2012; ‘Foreign Secretary condemns blocking of the “UK for Iranians” website’, FCO.gov.uk, 18 March 2012. 6. See also C. Drew, ‘Military Taps Social Networking Skills’, NYT, 7 June 2010; ‘New website to open spy agency to public: CIA’, AFP, 9 February 2011; M. Calderone, ‘WikiLeaks’ Guantanamo Bay Documents: The Backstory On News Outlets’ Race To Publish Them’, HP, 25 April 2011. 7. J. Gleick, ‘How Google Dominates Us’, NYRB, 18 August 2011; C. Williams, ‘“Google effect” means spies work harder, says ex-GCHQ chief’, DT, 12 November 2011. 8. R. Cohen, ‘New Tweets, Old Needs’, NYT, 10 September 2009; Vis-à-vis the ability to publish on ‘sensitive’ subjects, R. Norton- Taylor and C. McGreal, ‘MI5 and MI6 unable to stop Secret Wars’ publication’, GU, 15 April 2009; for a book which was ‘banned’ in the UK by UK courts for a short time around June–October 2009, Hayman with Gilmore (2009). For a Danish case, ‘Case dropped against soldier-author’, politiken.dk, 20 October 2010. 9. M. Maneker, ‘E- books spark battle inside the publishing industry’, WP, 27 December 2009; M. Rich, ‘Math of Publishing Meets the E-Book’, NYT, 1 March 2010; J. Bosman, ‘The Bookstore’s Last Stand’, NYT, 28 January 2012; J.W. Peters, ‘A Newspaper, and a Legacy, Reordered’, NYT, 11 February 2012. 10. Several sources can be referenced: ‘Blogging ban for the armed forces’, BBC, 10 August 2007; L. Downes, ‘Veterans, Alone Together, Share Stories They Can’t Tell You’, NYT, 6 October 2008; G. Wong, ‘China set to tighten state secrets law forcing Internet firms to inform on users’, WP, 28 April 2010; ‘Why China Is Nervous About the Arab Uprisings’, NYT, and D.H. Paal, ‘China Reacts to Middle East Unrest’, Asia- Pacific Brief, 28 February 2011; E. Abrams, ‘Politicizing Intelligence on Syria’, CFR, C. Friedersdorf, ‘The Ongoing Effort to Sanitize Obama’s Image’, Atlantic, and R. Mackey, ‘Syria’s Losing Battle to Control the News’, NYT Blog, 11/13 March 2012. For mobile (cell) telephone factors, see also C. Sang- Hun, ‘North Koreans Use Cellphones to Bare Secrets’, NYT, 28 March 2010; H. Esfandiari, ‘Iran’s State of Fear’, NYRB, 3 March 2011; C. Rhoads and F. Fassihi, ‘Iran Vows to Unplug Internet’, WSJ, 28 May 2011; L. Sly, ‘Arab world transfixed by Egyptian protests’, WP, 31 January 2011; F. Gardner, ‘Egypt violence exposes secret tools of state repression’ and ‘Hacktivists target Egypt and Yemen regimes’, BBC, 4 February 2011; ‘Iran, China Block Outside Sites to Muzzle Mideast News’, WB, 3 February 2011; ‘Libya removes itself from the net’, BBC, 4 March 2011; M. Helft and V. Bajaj, ‘BlackBerry Security Stance Sows Anxiety’, NYT, 8 August 2010; V.S. Subrahmanian and A. Mannes, ‘Keeping Tabs on Terrorists’, WSJ, 22 August 2010; V. Bajaj and I. Austen, ‘India’s Surveillance Plan Said to Deter Business’, NYT, 27 September 2010; S. Shane, ‘Radical Cleric Still Speaks on YouTube’, NYT, 4 March 2011; I. Mackenzie, ‘Is tech- nology to blame for the riots?’, BBC, 8 August 2011; M. Goodman, ‘Killer apps – The revolution in network terrorism’, JIR, 16 June 2011; ‘Riots thwarted by BlackBerry and Twitter chat – police’, BBC, 16 August 2011. Notes 179

11. T. Weber, ‘Davos 2011: We’re all hyper- connected, now what?’, BBC, 29 January 2011; ‘Digital Nation’, PBS FRONTLINE, 8 February 2011; D. Emery, ‘Security risks of social networks’, BBC, 7 July 2009; L. Phillips, ‘EU to force social network sites to enhance privacy’, GU, 16 March 2011; ‘MOD launches personal online security awareness campaign’, MoD, 1 June 2011; ‘Social networks to meet home secretary over riots’, BBC, 19 August 2011; B. Friedman, ‘Privacy, Technology And Law’, NYT, and J. Villasenor, ‘Why the Supreme Court GPS Decision Won’t Stop Warrantless Digital Surveillance’, ScientificAmerican, 28/25 January 2012; ‘CIA Chief: We’ll Spy on You Through Your Dishwasher’, WB, 15 March 2012. 12. See also ‘Listen: Secret Libya Psyops, Caught by Online Sleuths’, WB, 20 March 2011; ‘Twitter, Facebook and Blackberry to attend riot summit’, BBC, and R. Somaiya, ‘In Britain, a Meeting on Limiting Social Media’, NYT, 25 August 2011. 13. See. e.g., the CIA’s job description for ‘Intelligence Officer, Classification Review’, ?c. 1970s, via CREST, CIA-RDP93B01100010003-6 (2002/05/07); J. Kelly, ‘At the Corner of Top Secret and Déjà vu’, WP, 7 October 2008; see also various related S. Aftergood entries in FAS_SN, e.g. 20 September 2010, 29 November 2010, 16 December 2010 and ‘Secrecy Overwhelms U.S. Historical Record’, FAS_SN, 20 April 2011; see also ‘Airmen, It’s Illegal for Your Kids to Read WikiLeaks’, WB, 7 February 2011; I. McPhedran, ‘Defence in spy plane cover-up’, DT (Australia), 1 September 2010; K. Jeffery, ‘A secret history: unravelling MI6’s past’, DT, 22 September 2010; ‘What’s Secret About World War II?’, NYT, 27 August 2011. 14. R. Norton- Taylor, ‘**** you too, pal: I thought I’d won my struggle against the military asterisk’, GU, 17 November 2000. 15. Ibid. 16. R. Singel, ‘Bush Spy Revelations Anticipated When Obama Is Sworn In’, Wired, 10 November 2008; S. Aftergood, ‘Confusion Reigns in Intelligence Secrecy Policy’, FAS_SN, 2 November 2009; ‘Classified material’, WP, 18 January 2010; ‘Reducing Over- Classification Act’, US Senate Committee on Homeland Security and Governmental Affairs Report, 27 May 2010; ‘Googling the Censors’, NYT, 28 September 2010; S. Aftergood, ‘Reducing Overclassification Through Accountability’, FAS_SN, 6 October 2011; R. Norton- Taylor, ‘Nuclear weapons are the great taboo of British politics’, GU, 21 February 2012; see also ‘bids’ by groups, e.g., ‘National Security Principles and the Right to Information’, right2info.org, accessed: March 2012. 17. ‘PM defends stance on Omagh bomb’, BBC, 16 March 2010. 18. See also N. Grimley, ‘D for discretion: Can the modern media keep a secret?’, BBC, 22 August 2011; ‘Leon Panetta concern over Bin Laden “informer” Shikal Afridi’, BBC, 28 January 2012; ‘3 Executed by Militants for Helping U.S. in Yemen’, Reuters, ‘Iran upholds death sentences for two men “linked to British spy”’, GU, and B. Moore- Bridger, ‘MI5 spy beaten up by Qatada thugs “is suing handlers”’, thisislondon.co.uk, 12/6/24 February 2012. 19. See also ‘Documents from “Donovan’s Girls”’, WP, 26 June 2011; P. Finn, ‘Intel analyst stripped of clearance settles with DIA, but still doesn’t know why he was fired’, WP, 22 November 2011. 20. See also ‘Row between Wikileaks and Guardian over security breach’, BBC, 1 September 2011; A.S. Brisbane, ‘An American in Pakistan’, NYT, 180 Notes

26 February 2011; S. Aftergood, ‘U.S. is “Incapable of Keeping a Secret,” Rumsfeld Concluded in 2005’, FAS_SN, 15 July 2011; S. Shane, ‘Leak Offers Look at Efforts by U.S. to Spy on ’, NYT, 5 September 2011; S. Aftergood, ‘Leaks, National Security, and Freedom of the Press’, FAS_SN, and ‘Judge allows secret surveillance evidence in July trial of Iraqi on terror- ism charges in Ky.’, AP, 8 February 2012. 21. http://www.mi6.gov.uk/output/glossary.html#L, accessed: 25 April 2012. 22. S. Aftergood, FAS_SN, 2002, 119, 3 December 2002; J. Stein, ‘Did U.S. Warn Pakistan – Not Just India – About Mumbai Attacks?’, SpyTalk, 2 December 2008; ‘US intel didn’t connect American to Mumbai attacks’, AP, 9 November 2010; S. Aftergood, ‘A New Directive for the National Reconnaissance Office’, FAS_SN, 15 July 2011. 23. See also D. Jurand, ‘UK parliament panel pushing for reporting restric- tions on security issues’, Jurist, and R. Norton- Taylor, ‘The media is not the enemy’, GU, 11/17 November 2008; ‘Freedom of the Press’, NYT, ‘The Media as a Force for Public Accountability’ and ‘CJR: Too Close for Comfort?’, CFR, 17/8/16 September 2009; C. Savage, ‘Judge Explains Letting a Reporter Protect His Source’, NYT, 3 August 2011. 24. See also M. Cieply, ‘Film About the Hunt for Bin Laden Leads to a Pentagon Investigation’, NYT, 6 January 2012; S. Aftergood, ‘There is No Reporter’s Privilege, Leak Prosecutors Insist’, FAS_SN, 29 February 2012. 25. There are other very occasional exceptions, see, e.g., B. Whitaker, ‘Conjecture over Bin Laden death’, GU, 25 September 2006; ‘Riksdag parties informed of arms deal: report’, TL, 8 March 2012. 26. For official efforts to attempt to stop ‘leaks’, K. Dozier, ‘Intelligence chief tells his spies to zip it’, AP, 27 August 2010; O. Lang, ‘How to spot a whistle-blower’, BBC, 7 January 2011; ‘Ministry of Defence leaks “could lead to prosecutions”’, BBC, 29 May 2011; W. Pincus, ‘Senate panel pro- poses that leakers of lose pensions’, WP, 6 April 2011; S. Shane, ‘U.S. Pressing Its Crackdown Against Leaks’, NYT, and S. Aftergood, ‘Two Cultures of Secrecy and Disclosure’, FAS_SN, 17/14 June 2011; T. Burridge, ‘Is the US government at war with whistleblowers?’, BBC, 16 July 2011; ‘Expert warns computer search bodes ill in spy case’, CP, 26 January 2012; S. Aftergood, ‘DoD Inspector General Tallies Leaks of Classified Intel’, FAS_SN, 2 March 2012. For a case, ‘Secret Saudi intelligence sent via Hotmail: report’ and ‘Secret documents reveal further arms coop- eration’, TL, 15/20 March 2012. 27. S.M. Kohn, ‘The Whistle- Blowers of 1777’, NYT, 12 June 2011; I. Cobain, ‘RAF helicopter death revelation leads to secret Iraq detention camp’, GU, and D. Welch, ‘Australian link to secret Iraq prisons “a nonsense”’, SMH, 7/9 February 2012. For ‘incompetence of handling’, e.g., P. Finn and J. Tate, ‘N.Y. billing dispute reveals details of secret CIA rendition flights’, WP, 31 August 2011; for Australian cases, D. Welch, ‘Backpack bungle as Defence aide allows spies to steal portable drive’, SMH, and D. Welch, ‘Defence IT department loses top secret papers’, SMH, 4/7 November 2011. For an unintentional release of intelligence information, R. Singel, ‘Spied- On Lawyers May Get Second Chance in NSA Lawsuit’, WB, 2 December 2008; ‘Whitehall accused of online blunders over secrets’, BBC, 18 April 2011; ‘Minister snapped leaving No 10 with Afghan memo’, BBC, 30 August 2011; for other revelations, S. Laville and agencies, Notes 181

‘MoD employee charged with breaching Official Secrets Act’, GU, 8 March 2012. 28. For contemporary US ‘memoir’ publication problems, S. Shane, ‘Pentagon Plan: Buying Books to Keep Secrets’, NYT, and S. Aftergood, ‘Behind the Censorship of Operation Dark Heart’, FAS_SN, 9/29 September 2010; S. Aftergood, ‘Army Seeks Increased Awareness of Subversion, Leaks’, FAS_SN, 5 October 2010; S. Shane, ‘C.I.A. Demands Cuts in Book About 9/11 and Terror Fight’, NYT, 25 August 2011; Y.J. Dreazen, ‘Spooks and Scribes: A Case of How the CIA and Media Can Get Too Cozy’, The Atlantic, and A. Rosenthal, ‘Get the Whistleblowers’, NYT Blog, 26 January 2012; J. Bosman, ‘A Wave of Military Memoirs With You-Are- There Appeal’, NYT, 18 March 2012. For UK ‘censorship’, B. Page, ‘MoD pays £150,000 to have military title pulped on security grounds’, GU, 4 March 2011. 29. See also ‘Afghan CIA bomber “fooled family”’, BBC, 5 January 2010; S. Aftergood, ‘Pre- Publication Review as a Secrecy Battleground’, FAS_SN, 16 November 2011; J. Stein, ‘NYU library acquires the papers of Philip Agee, renegade spy’, WP, 26 October 2010. 30. See also A. Duffy, ‘CSIS asks foreign spies to release’, OttawaCitizen, 17 August 2009; S.S. Hsu and C. Johnson, ‘TSA accidentally reveals airport security secrets’, WP, 9 December 2009. 31. S. Aftergood, ‘Chinese Think Tank Profiled by DNI Open Source Center’, FAS_SN, 3 October 2011. 32. See also S. Fish, ‘Anonymity and the Dark Side of the Internet’, NYT, 3 January 2011; S. Aftergood, ‘A New Milestone in Intelligence Budget Disclosure’, FAS_SN, and ‘White House, Intel Chief Can’t Agree on Budget Secrecy’, WB, 15 February 2011; D. Streitfeld, ‘Erasing the Boundaries’, NYT, 12 February 2012; P. Wargan, ‘The danger of inaccurate information in con- flict reporting’, OD, 7 March 2012. 33. ‘CIA to reveal decades of misdeeds’, BBC, 22 June 2007. 34. See the ‘Disposition Instructions’ outlined in Office of Basic and Geographic Intelligence, Office of the Director [of Central Intelligence], Records Control Schedule, 9 November 1971, via CREST, CIA-RDP78-07317A000100140001-8 (2001/07/12). 35. See also J.K. Elsea, ‘Intelligence Identities Protection Act’, CRS, 28 January 2011. 36. See also ‘Australia condemns “irresponsible” Wikileaks cable leak’, BBC, and ‘Flood of WikiLeaks cables includes identities of dozens of informants’, CNN, and P. Taylor and R. Knight, ‘What is it like to keep top state secrets?’, BBC, 30–31 August 2011; ‘Struggling Wikileaks stops publishing classified files’, BBC, 24 October 2011; K. Dozier, ‘CIA Declassifies World War I- Era Documents’, AP, 19 April 2011. 37. For details, see the court documents via the National Security Archive, based at The George Washington University (GWU), Washington, DC, via: http://www.gwu.edu/~nsarchiv/pdbnews/20050524/CIA_Reply_ Memo_51105.pdf, http://www.gwu.edu/~nsarchiv/pdbnews/CIA_Points_ and_Authorities_on_SJM.pdf, http://www.gwu.edu/~nsarchiv/pdbnews/ PDB_Judge_Levi_vs_Berman.pdf and http://www.gwu.edu/~nsarchiv/ pdbnews/20050524/CIA_Reply_Memo_51105.pdf, accessed: 25 April 2012; see also F. Gardner, ‘CIA killings a major blow to US’, BBC, 5 January 2010; W.J. Broad and D.E. Sanger, ‘C.I.A. Secrets Could Surface in Swiss Nuclear Case’, NYT, 23 December 2010. 182 Notes

38. See in cases, e.g., J. Jaffer, ‘Op- Ed: National security: When secrecy is a weapon’, LAT, 6 April 2011; ‘Hiding behind the “state secrets privilege”’, LAT, and E. Berman, ‘Will Rendition Always Remain a State Secret?’, HP, 18/27 May 2011; D. Cole, ‘Killing Our Citizens Without Trial’, NYRB, 24 November 2011. 39. See also E. Schmitt and C. Savage, ‘U.S. Military Scrutinizes Leaks for Risks to Afghans’, NYT, and B. Riedel, ‘WikiLeaks Will Make Intelligence Gathering in Afghanistan Harder’, Independent, 28 July 2010; P. Benson, ‘Clapper: WikiLeaks’ work a “big yellow flag” for intelligence’, CNN, and ‘Wikileaks’s leaks mostly confirm earlier Iraq reporting’, WP, 6/26 October 2010; S. Shane and A.W. Lehren, ‘Leaked Cables Offer Raw Look at U.S. Diplomacy’, NYT, 28 November 2010; M. Urban, ‘Wikileaks saga is not the David and Goliath tale one thinks’, BBC Newsnight, and ‘Archive Director Tom Blanton decries “Wikimania”’, US NSAr Update, 6/16 December 2010; D. Goodin, ‘WikiLeaks accused of tapping P2P [peer- to- peer] for secret docs’, Register, and B. Keller, ‘Dealing With Assange and the WikiLeaks Secrets’, NYT, 20/26 January 2011; ‘Spy Chief: Damage from WikiLeaks Is Unclear’, WB, 11 February 2011; S. Aftergood, ‘Agencies Boost Surveillance of Classified Networks’, FAS_SN, 14 March 2011; M. Ward, ‘Tracking the internal threats’, BBC, 6 April 2011; ‘Obama Announces New Classified Information Safeguards’, Defense.gov, 7 October 2011; P. Benson, ‘WikiLeaks forces change in intel community’, CNN, 26 January 2012; S. Aftergood, ‘Post- WikiLeaks Network Monitoring Takes Shape’, FAS_SN, 21 February 2012; B. Gatto, ‘UN torture chief accuses US of cruel and inhuman treatment towards WikiLeaks suspect’, Jurist, and P. Courson, ‘Bradley Manning’s lawyer tries, and fails, to get charges dismissed’, CNN, 13/16 March 2012. For ‘hacktivism’, ‘PBS victim of Tupac Shakur hacking hoax’, BBC, 30 May 2011; S. Shane, ‘F.B.I. Admits Hacker Group’s Eavesdropping’, NYT, ‘Wikileaks publishes confidential emails from Stratfor’, BBC, and D. Mitchell, ‘WikiLeaks 2.0: Time to be afraid?’, CNN, 3/27 February 2012; ‘Antisec hackers hit US police store after FBI arrests’, BBC, and M.S. Schmidt, ‘New Interest in Hacking as Threat to Security’, NYT, 10/13 March 2012. 40. See also A. Machon, ‘Annie Machon: my so- called life as a spy’, DT, 29 August 2010; J. Stewart, ‘Global data storage calculated at 295 exabytes’, BBC, 11 February 2011; G. Miller, ‘As al- Qaeda magazine goes quiet, intel- ligence analysts also lose a valuable resource’, WP, 9 February 2012. 41. See also Savage, ‘Judge Explains Letting a Reporter Protect His Source’; V. Dodd and L. Davies, ‘Met police to explain legal threat against Guardian to MPs in secret’, GU, 21 September 2011. 42. See also ‘Measuring the benefits from research’, Policy REsource, Cambridge, UK: RAND EUROPE, 2007. 43. See also B. Wheeler, ‘Post- It notes and the end of written history’, BBC, 1 July 2010. 44. See, e.g., ‘official texts’ discussed in Norton- Taylor and McGreal, ‘MI5 and MI6 unable to stop Secret Wars’ publication’; R. Norton- Taylor, ‘Defend the Realm: author marks 100 years of MI5 with official history’, GU, ‘Spying on the secret archives’, Economist, and ‘The Historical Intelligence Collection: Applying the Past to the Present and Future’, CIA.gov, 2/8/15 October 2009; G. Corera, ‘MI6 secrets revealed in first official history’, BBC, R. Norton- Taylor, ‘Graham Greene, Arthur Ransome and Somerset Maugham all spied for Britain, admits Notes 183

MI6’, GU, and P. Hennessy, ‘MI6: The History of the Secret Intelligence Service 1909–1949 by Keith Jeffery: review’, DT, 21/24 September 2010. 45. See also ‘OSCE expert workshop promotes voluntary co- operation between public actors, media in the fight against terrorism’, OSCE, 19 October 2009; M. Thomson, ‘The spin war in Northern Ireland’, Document – BBC Radio 4, 22 March 2010; N. Collins, ‘TV drama Spooks is recruiting agent for MI5’, DT, 8 November 2010. 46. See also G. Corera, ‘Spies like them’, BBC, 24 July 2009; R. McCrum, ‘Tinker, tailor, author, spy’, TO, 23 August 2009; B. Lilley, ‘Spies keeping an eye on CBC show’, TorontoSun, 7 January 2011; D. Gardham, ‘Author “nearly derailed MI6 operation with novel plot”’, DT, 1 June 2011. 47. See also E. Bumiller, ‘Gates Fears Wider Gap Between Country and Military’, NYT, 29 September 2010; I. Shapira, ‘For CIA family, a deadly suicide bomb- ing leads to painful divisions’, WP, 28 January 2012. 48. See also Overseas Development Institute (ODI), ‘Helping researchers become policy entrepreneurs’, Briefing Paper, 53, September 2009. 49. Based on paraphrased information from a non- attributable source. 50. See also J. Beale, ‘Spies “make relationship special”’, BBC, 16 October 2009. 51. See also ‘ASEAN agrees data- sharing to fight Islamic militants’, Reuters, 28 September 2011. 52. S. Fidler and M. Huband, ‘A Special Relationship? The US and UK spying alliance is put under the spotlight’, FT, 6 July 2004. 53. See also ‘Pakistan Gives U.S. Generals the Silent Treatment After Osama Raid’, WB, 10 May 2011; ‘Friends disunited – The US and Pakistan’s strained partnership’, JIR, 25 August 2011. 54. W. Maclean, ‘Europe, U.S. juggle divergent tolerance of risk’, Reuters, 5 October 2010; A. Ulbrich, ‘Sir Richard Dearlove, former Chief of the British Secret Service: “ Al- Qaeda ten years after 9/11”’, World Security Network, 10 October 2011; D. McElroy, ‘Pakistan Nato dispute “will not disrupt security co- operation with Britain for Olympics”’, DT, 20 February 2012. 55. See also ‘The Changing Face of Intelligence: NATO Advanced Research Workshop’, Report, The Pluscarden Programme for the Study of Global Terrorism and Intelligence, St Antony’s College, Oxford, 9–10 December 2005. 56. See also L.C. Baldor, ‘US, NATO were crucial, unseen hands in Libya fight’, AP, 23 August 2011; ‘Turkey will not allow NATO to share intelligence with Israel’, AFP, 18 February 2012. 57. Retired UK intelligence practitioner Michael Herman is a former senior Government Communications Headquarters (GCHQ) officer and was Secretary to the Joint Intelligence Committee ( JIC). He is the author of many prominent works as cited, including: ‘Intelligence after 9/11: A British View of the Effects’, Commentary No. 83 (a Canadian Security Intelligence Service [CSIS] publication), 17 July 2003. 58. N. Paton Walsh, ‘Ambassador defends diplomat in spying row’, GU, 1 February 2006; R. Norton- Taylor, ‘Police raid Riviera home of former MI6 officer’, GU, 29 June 2006; D. Gardham, ‘Stolen information worth £300m recovered by GCHQ’, DT, 5 September 2011. 59. http://www.mi6.gov.uk/output/glossary.html#L, accessed: 26 October 2009. 60. See also S. Aftergood, ‘Information Sharing: Feast or Famine’, FAS_SN, 27 October 2010. 184 Notes

61. For a more in- depth exploration of the literature as it existed around mid- 2008, see ‘Chapter 3: Literature Review’ in A.D.M. Svendsen, On a ‘continuum with expansion’: UK- US intelligence relations & wider reflections on international intelligence liaison, Coventry, UK: School of Politics and International Studies (PaIS), University of Warwick, PhD Thesis, 15 July 2008 (unpublished). 62. See, e.g., as covered in- depth in ibid. 63. See also J. Lawless, ‘Le Carre adapts style to new spy reality’, AP, 4 January 2009. 64. See also, and on the importance of the ‘social dimensions’ of intelligence, E. Thomas, ‘Books: A Spy We Loved’, Newsweek, 30 August 2008; C. Irvine, ‘Roald Dahl’s seductive work as a British spy’, ST, 31 August 2008; K. Jeffery, ‘The TLS and national security’, TLS, 22 September 2010. 65. N. Watt, ‘Was ’s view of Britain in the world shaped by ?’, GU, 2 March 2011. 66. See also ‘Public Affairs’, CIA website, 2007, and ‘Science & Technology: In the Community & Across the Nation’, CIA website, 2007. via https:// www.cia.gov/, accessed: October 2009; ‘USGIF – Outreach’, US Geospatial Intelligence Foundation, accessed: 26 October 2009; D.E. Kaplan, ‘Hey, Let’s Play Ball’, USN&WR, 29 October 2006; L. Kelion, ‘GCHQ- backed competition names Cyber Security Champion’, BBC, 11 March 2012. 67. See also B. McKibben, ‘Natural disasters?’, GU, 2 April 2011; ‘World “danger- ously unprepared” for future disasters’, BBC, 27 December 2011; ‘Chinese police free 24,000 abducted women and children’, BBC, 11 March 2012. 68. See also, e.g., ‘7/7 inquests: MI5 accepts coroner’s call to improve’, BBC, 19 July 2011; M. Hibbs, ‘5 Early Lessons From Japan’s Nuclear Crisis’, CNN, 17 March 2011; ‘UN: 2011 Disasters Costliest In History With Minimum Price Tag of $380 billion’, CP, 5 March 2012; M. Fackler, ‘Nuclear Disaster in Japan Was Avoidable, Critics Contend’, NYT, and ‘Norway police admit slow response to Breivik massacre’, BBC, 9/15 March 2012.

4 The professionalization of intelligence cooperation in action

1. See also B. Rosenberg, ‘Army aims for optimum quality control of geospatial products’, DefenseSystems, 1 September 2011; ‘Geospatial Intelligence for Fusion Centers’, Esri White Paper, April 2011; N. Singer, ‘Mission Control, Built for Cities’, NYT, M. Piesing, ‘Geospatial intelligence: mapping friction on the front line’, Wired.co.uk, and S. Kelly and P. Benson, ‘“Eye in the Sky”’, CNN, 3/5/9 March 2012. 2. See also cases, e.g., ‘PET helps U.S. to nail Swedish gangster’, Politiken.dk, 18 January 2012; C. Santos, ‘Terror suspects to stand trial in April’, cphpost. dk, and ‘Official: DOD Improves Posture on “Loose Nuke” Threat’, Defense. gov, 6/15 March 2012. 3. See also D. Butler, ‘Moves to question Turkish spy chiefs quashed’, Reuters, 20 February 2012; E. Klein, ‘Our Corrupt Politics: It’s Not All Money’, NYRB, 22 March 2012. 4. See also T. Fuller, ‘Myanmar Visit Is Possible for Petraeus’, NYT, 7 February 2012. Notes 185

5 Landscape changes: Actual and proposed

1. See also ‘Jeremy Browne: “torture violates human rights and human dignity”’, FCO.gov.uk, 1 February 2012. 2. See also T. Koppel, ‘Nine years after 9/11, let’s stop fulfilling bin Laden’s goals’, WP, 12 September 2010; ‘IAEA considers nuclear safety rules after Fukushima’, BBC, 20 June 2011. 3. Security in an Interdependent World, London: UK Cabinet Office (CabOff), and ‘Government Publishes First National Security Strategy’, UK CabOff CAB/033/08, M. Easton, ‘We’re safe – relatively speaking’ and G. Corera, ‘The diversity of modern security threats’, BBC, C. Black, ‘Comment: Smugness, not substance’, GU, and RUSI commentary on the NSS, 19–20 March 2008; ‘US embassy cables: Gordon Brown’s first national security strategy greeted by “collective yawn”’, GU, 2 December 2010. 4. National Risk Register, London: UK CabOff, and ‘UK “should shift security agenda”’, BBC, 27 November 2008; L. Baker, ‘UK forms new security body, weighs financial crisis’, Reuters, 9 March 2009. 5. See also ‘National Security Strategy – 2009 update published’, CAB046-09, and Update 2009: Security for the Next Generation and Cyber Security Strategy 2009, Norwich: TSO, and G. Corera, ‘Cyber- security strategy launched’, BBC, 25 June 2009; see also the 2010 UK Strategic Defence and Security Review (SDSR) and associated references; ‘National security and intelligence structure study’, UK CabOff, 28 January 2011; ‘Supporting the National Security Council: The central national security and intelligence machinery’, Recommendations Report of UK CabOff Study, 10 October 2011; see also National Risk Register of Civil Emergencies, London: UK CabOff, Updated: January 2012. For Australia, D. Welch, ‘Review justifies huge changes for spy agencies’, SMH, 25 January 2012. On the UK ‘PREVENT’ strategy, see, e.g., ‘Updated anti- extremism strategy published’ and M. Easton, ‘Is fight against terror about violence or extremism?’, BBC, 7 June 2011; UK ISC, AR 2010–2011, July 2011, pp. 37–39 and 41–47; J. Barclay, ‘Prevention methods – Islamist reaction to UK counter- terrorism plan’, JIR, 9 August 2011; ‘Think- tank says UK faces risk of lone wolf militants’, BBC, R. Pantucci, ‘The perils of leaderless jihad’ and J.M. Berger, ‘The Boy Who Cried Lone Wolf’, FP, and M. Daly, ‘Britain, US concern over Somali mili- tants’, SMH, 7/21/9 February 2012. 6. Based on paraphrased information from a non- attributable source. 7. See also A.E. Kornblut and M.A. Fletcher, ‘In Obama’s decision- making, a wide range of influences’, WP, 25 January 2010; ‘Good governance requires vibrant political parties, pluralism, participants at OSCE meeting say’, OSCE, 18 May 2011. 8. For ‘climate change’ debates, S. Brand, ‘Four Sides to Every Story’, NYT, 15 December 2009; see also ‘Encyclopedia essay on global conflict and secu- rity’, DIIS.dk, 16 March 2012. 9. See also ‘Gates: America Must Balance Idealism, Realism’, Defense.gov, 14 April 2011; ‘Britain abroad must temper idealism with pragmatism’, FCO. gov.uk, 17 June 2011; ‘Panetta Calls for Europe, NATO Defense Investment’, Defense.gov, and H. Binnendijk, ‘A Leaner NATO Needs a Tighter Focus’, NYT, 4/3 February 2012; ‘“Hybrid threats” to define US Army combat training’, JIDR, 12 March 2012. 186 Notes

10. See also M. Smith, ‘ Intelligence- sharing failures hamper war on terrorism’, JIR, 1 July 2005; ‘“Cops Fear Sharing Information”’, SkyNews, 12 November 2008; G. Corera, ‘Analysis: How big is the threat from Russian spies?’, BBC, 29 November 2011; N. Fielding, ‘The men who knew too little: reflections on the Zatuliveter case’, OD, 9 December 2011; ‘Medvedev urges Russian intelligence to improve international cooperation against terror’, AP, January 2012. 11. See also, e.g., R. Nordland, ‘In Libya, Former Enemy Is Recast in Role of Ally’, NYT, 1 September 2011; ‘US says it has no plans to link Libya return to jailing of freed Lockerbie bomber’, AP, 31 August 2011. 12. R.J. Aldrich, ‘The New Terrorism: The problem is balancing security, freedom and the globalising quest for luxury’, Independent, 10 July 2005. 13. See also N. Mathiason, ‘PM orders probe into security of food supply’, GU, 11 November 2007; Strategy Unit, ‘Food: an analysis of the issues’, UK CabOff, 2008; M. Kinver, ‘“Radical rethink” needed on food’, BBC, 10 August 2009; N. MacFarquhar, ‘Experts Worry as Population and Hunger Grow’, and V. Klinkenborg, ‘Food, Humanity, Habitat and How We Get to 2050’, NYT, 22/28 October 2009; ‘Ownership, Vulnerability and Access: Security Dimensions of the Global Food System’, Canadian Security Intelligence Service & Global Futures Forum, 24–25 January 2011; J. Warrick and J. Eilperin, ‘Warming Arctic opens way to competition for resources’, WP, 16 May 2011; E. Wyatt, ‘Behind the Blood Money’, NYT, 19 March 2012. On other ‘supply’-related issues, F. Barringer, ‘Groundwater Depletion Is Detected From Space’, NYT, 30 May 2011; S. Morrison, ‘A hard, dry future for the planet’, Independent, 12 March 2012; B. Varner, ‘World Population Forecast to Hit 10.1 Billion by 2100, UN Says’, Bloomberg, 3 May 2011; ‘Civil liberties pledge “abandoned”’, PA, 7 December 2011; N. Antelava, ‘Nato’s fraught roads to Afghanistan’, BBC, 14 December 2011. On cyber issues, ‘White House Launches U.S. International Cyber Strategy’, Defense.gov, and ‘US intelligence to set up cyber- focused office in Estonia’, AFP, 17–18 May 2011; L. Page, ‘Military set to lead on US domestic cyber-security’, Register, 25 May 2011; P. Manson, ‘On guard for cyberspace’, OttawaCitizen, 5 August 2011; D. Welch, ‘War in the shadows’, SMH, and T. Espiner, ‘UK cyber strategy to “join up” security efforts’, ZDNetUK, 24/30 September 2011; ‘GCHQ chief reports “disturbing” cyber- attacks on UK’, BBC, 31 October 2011; A. Croft, ‘UK conference seeks cooperation on cyberspace’, Reuters, ‘EU and US cybersecurity experts stress- test defences’ and ‘US: Russia, China steal- ing online from US companies’, BBC, 1/3 November 2011; ‘Risk of Major Cyber Attack Worries Secretary’, Defense.gov, E. Messmer, ‘Should US intel- ligence agency have a role in protecting electric grid?’, techworld.com.au, and J. Menn, ‘Civil libertarians slam McCain cybersecurity bill’, Reuters, 1/3/6 March 2012; D. Cassata, ‘A divided Congress confronts a rising cyberthreat’, AP, 23 April 2012. 14. See also H. Cooper, ‘Leaders Agree to Delay a Deal on Climate Change’, NYT, 15 November 2009; ‘Lovelock: “We can’t save the planet”’, BBC, 30 March 2010; J. Eilperin, ‘U.S. plays conflicted role in global climate debate’, and M. Bostrom, ‘How to stop global warming – even if you don’t believe in it’, WP, 1/14 November 2010; M. Kinver, ‘UN report: Cities ignore climate change at their peril’, BBC, 29 March 2011; R. Harrabin, ‘PM’s pledge of greenest government “vanishingly remote”’, BBC, 7 May 2011; R. Black, Notes 187

‘Climate change “grave threat” to security and health’, BBC, and ‘UN chief urges global lawmakers to confront finances by building trust, green energy sources’, AP, 16–17 October 2011; L. Howell, ‘The Failure of Governance in a Hyperconnected World’, NYT, and ‘Responsibility to Protect: Ban urges action to make UN- backed tool “a living reality”’, UN, and ‘Reducing Energy Demand Increases Effectiveness, Official Says’, Defense.gov, and T.L. Friedman, ‘The Politics of Dignity’, NYT, 10/18/31 January 2012; ‘A Second Front in the Climate War’, NYT, 17 February 2012; J. Gillis, ‘Rising Sea Levels Seen as Threat to Coastal U.S.’, NYT, 13 March 2012; ‘In the Climate Casino: An Exchange’, NYRB, 26 April 2012. Vis-à-vis jobs, L. Thomas, Jr., ‘For London Youth, Down and Out Is Way of Life’, NYT, 15 February 2012. 15. See also, e.g., ‘The Truth About the Doomsday Virus?’ and T.L. Friedman, ‘Take the Subway’, and N. Foster, ‘A Dream Grows in Copenhagen’, NYT, M. Otero, ‘Charting a New Course for Women in the Pursuit of Civilian Security’, State.gov, 3/5/8 March 2012. 16. PowerPoint presentation of Karen McFarlane, Convenor of the UK Intelligence Community Open Source Joint Working Group, 2007. 17. ‘National security and intelligence structure study’; ‘Supporting the National Security Council’. 18. UK ISC, AR 2007–08, March 2009, pp. 36–37. 19. Based on interpreted information from a non- attributable source. 20. HMG, Government Response to the ISC’s Annual Report 2007–2008, March 2009, p. 3, para.K. 21. See also ‘Jon Day appointed as Chair of Joint Intelligence Committee’, UK MoD, 2 March 2012. 22. See, e.g., refs to the UK Strategic Defence and Security Review (SDSR) from c.September 2010, and A. Croft, ‘Analysis – UK military to be stretched by long Libya campaign’, Reuters, 19 March 2011; see also the warnings by the UK National Security Adviser as reported in C. Hope, ‘MI5 and MI6 pay out £12m to Britons held in Guantánamo’, DT, 4 August 2011; ‘UK MPs warn defence cuts threaten military capacity’, JIR, 16 February 2012; D. Barrie, ‘A signal of ongoing cooperation’, IISS Voices, and ‘UK’s National Security Strategy fails to address long- term concerns, warns committee’, JDI, 7/8 March 2012. For Denmark, ‘Minister seeks to change military management’, Politiken.dk, 2 December 2011. 23. See also, e.g., the ‘O.S.S. philosophy’ as discussed in B. Pennington, ‘When the Rounds Were Ammo’, NYT, 12 June 2011; M. Mazzetti and T. Shanker, ‘U.S. War Game Sees Perils of Israeli Strike Against Iran’, NYT, 19 March 2012. 24. See also C. Irvine, ‘Spy school needed for Britain’s intelligence recruits, says thinktank’, DT, 19 September 2008; M. Moore, ‘China opens string of spy schools’, DT, 24 June 2012. 25. Based on information from a non- attributable source; see also ‘National security and intelligence structure study’; ‘Supporting the National Security Council’; ‘Police role plan for Army officers’, PA, 24 July 2011. 26. See also ‘NATO conducts annual Crisis Management Exercise (CMX)’, NATO, 23–30 March 2011; C. Savage, ‘U.S. Law May Allow Killings, Holder Says’, NYT, and G. Corera, ‘Licence to Kill: When governments choose to assas- sinate’, BBC, 5/17 March 2012. 188 Notes

27. See also E. Batha, ‘Disaster deaths soar in 2010 – UN’, Alertnet, 24 January 2011; ‘As risks from disasters rise, UN chief calls for better preparedness’, UN, and ‘UN chief Ban Ki- moon says the cost of natural disasters is soaring, creating a real economic threat’, AFP, 10/11 May 2011; ‘Social networks to meet home secretary over riots’, BBC, 19 August 2011; ‘Dangerous Depots’, State.gov, 23 January 2012; ‘Congo blast site too dangerous for rescue effort’, BBC, 5 March 2012; ‘Civil Unrest, Middle East/North Africa Pose Greatest Risks to International Business Travelers This Year…’, PRNewswire, 31 January 2012. 28. See also, e.g., M. Malhère, ‘Commission supports rapid alert system’, Europolitics, 27 January 2012. 29. US National Intelligence Council (NIC), http://www.dni.gov/nic/NIC_home. html, accessed: 25 April 2012. 30. NIC 2020 Project, http://www.dni.gov/nic/NIC_2020_project.html, accessed: 25 April 2012; R. Norton- Taylor, ‘Revolution, flashmobs, and brain chips. A grim vision of the future’, GU, 9 April 2007; ‘Global Trends 2025’, ODNI, and T. Fingar and M. Burrows, ‘Press Briefing’, ODNI, 20–21 November 2008. 31. R.S. Boyd, ‘Feds thinking outside the box to plug intelligence gaps’, McClatchy, 30 March 2010. 32. See also F. Dyson, ‘How to Dispel Your Illusions’, NYRB, 22 December 2011; ‘School of International Futures’, Wilton Park, 13–17 August 2012. 33. White House, ‘President’s Intelligence Advisory Board and Intelligence Oversight Board’, Executive Order 13462, 29 February 2008. 34. US President’s Foreign Intelligence Advisory Board (PFIAB), The White House website, 2007; S. Aftergood, ‘Obama Boosts White House Intel Advisory Board’, FAS_SN, 30 October 2009. 35. See also ‘Ashdown warning over Afghanistan’, BBC, 2 April 2008; P. Ashdown, ‘A strategy to save Afghanistan’, FT, 12 February 2008; R. Henry, ‘Lord Ashdown speaks out on Afghanistan’, Times, 5 September 2009; ‘Who does UK Grand Strategy?’, Written evidence submitted by the Institute for Government and the Libra Advisory Group (GS 06) to the UK House of Commons Select Committee on Public Administration (Session 2010–11); M. Urban, ‘Cameron faces sceptics with “new interventionism” call’, BBC, 22 September 2011; ‘Northcom Prioritizes Homeland Defense, Cyber, Partners’, Defense.gov, 13 March 2012. 36. ‘National Security Council Established’, FCO.gov.uk, ‘Establishment of a National Security Council’, Number10.gov.uk, ‘Cameron chairs security_ council’ and P. Reynolds, ‘Liberals will constrain Tories in British coalition’, BBC, 12 May 2010; N. Watt, ‘William Hague: yes we have spies round the world’, GU, and ‘Defence chiefs and ministers to debate strategic review’, BBC, 15/28 September 2010; J. Churcher, ‘Top security official could be axed’, PA, 28 January 2011; http://www.cabinetoffice.gov.uk/content/ national- security-council, accessed: 25 April 2012; UK ISC, AR 2010–2011, pp. 36–40; R. Norton- Taylor, ‘Government view of Britain’s role in the world unrealistic, says report’, GU, 8 March 2012. 37. See also ‘The Global Conflict Prevention Pool: A Joint UK Government Approach to Reducing Conflict’, ssrnetwork.net, 2003; ‘Disasters: Rapid response network ready if crises hit’, DfID.gov.uk, 7 March 2012. Notes 189

38. See also ‘DOD, State Department Present Budgets to Senate’, Defense.gov, 10 March 2011; ‘Boosting training and education with NATO’s partners’, NATO, 15–16 February 2012. 39. D.E. Sanger, ‘A Handpicked Team for a Foreign Policy Shift’, NYT, 1 December 2008. 40. See also S. Goldthorpe, ‘New tri- Service intelligence unit formed to support Afghanistan operations’, UK MoD, and ‘Close Coordination Keeps Nuclear Weapons from Terrorists, Official Says’, Defense.gov, 14/17 February 2012; ‘The Nuclear “Implementation Study”’, NYT, and ‘Nations Divided on Focus of Nuclear Summit’, GSN, J. Crawford, ‘Iranian general sanctioned as drug trafficker’, CNN, ‘U.S. Launches Joint Export Control Office’ and ‘NNSA, IAEA Offer Nuclear Forensics Training’, GSN, 11/6/7/9 March 2012. 41. See also ‘UK “must slash defence spending”’, BBC, 30 June 2009; S. Laville, ‘Anti- terror chief warns of budget cuts’, GU, 7 July 2009; J. Partlow, ‘Elaborate ruse behind vast Bank fraud’, WP, 1 July 2011; ‘Commission finds true cost of US wartime contracting’, JDIN, 1 September 2011; G. Miller, ‘Intel panel warns against cutting too deep’, and W. Pincus, ‘Another look at Clapper’s efforts’, WP, 19/25 October 2011; T. Zakaria, ‘U.S. spies to rely more on allies due to budget austerity’, Reuters, 26 January 2012; M. Rosenberg and G. Bowley, ‘Intractable Afghan Graft Hampering U.S. Strategy’, L. Wayne, ‘Hits, and Misses, in a War on Bribery’, NYT, and ‘High Tide: From Corporate Intelligence Following Probes To Being Fired For Not Paying Bribes’, Corruption Currents – WSJ, 7/10/14 March 2012; P. Marshall, ‘UK aid funded firms “linked to Nigeria fraudster Ibori”’, BBC Newsnight, 16 April 2012. 42. See also B. Graham, ‘Rumsfeld remains largely unapologetic in memoir’, WP, 3 February 2011; K. DeYoung, ‘Obama’s NSC Will Get New Power’, WP, 8 February 2009. 43. See also J.N. Hoover, ‘FEMA To Use Social Media For Emergency Response’, InformationWeek, 19 January 2011; T. Carmody, ‘Crowdsourcing As A Service’, Wired, B. Bajarin, ‘The Connected Human’, TIME, and J. Wolf, ‘CIA to software vendors: A revolution is coming’, Reuters, 20–21 February 2012; R. Fortmeyer, ‘Off the Map’, McGraw- Hill Construction, ‘U.S. Wants You to Hunt Fugitives With Twitter’, WB, ‘Google Analytics can help track social media success’, directmarketing.thomsonlocal.com, J. Herrman, ‘This App Hunts Terrorists’, BuzzFeed, J. Keller, ‘Four companies to help U.S. intel- ligence analysts determine the locations of photos and video’, militaryaero- space.com, and M. Silbey, ‘How to augment our intelligence as algorithms take over the world’, Smartplanet.com, 1/6/9 March 2012. 44. S. Condon, ‘Homeland Security lacking “open source” intelligence’, CNET, 12 September 2008. 45. See also T. Starks, ‘Intelligence: Reorganization Fatigue’, CQ Weekly, and B. Gertz, ‘Candidates eye better use of spies’, WT, 4/23 October 2008. 46. Securing an Open Society, April 2004; ‘Securing an Open Society’, Public Safety and Emergency Preparedness Canada, 3 February 2006. 47. See also Emergency Preparedness, London: UK CabOff, 2005; ‘Revised Chapters of Emergency Preparedness’, UK CabOff, 28 November 2011. 48. See also ‘Multinational Operation Targets Transnational Organized Crime’ and ‘Southern Command Targets Transnational Organized Crime’, Defense. gov, 8/13 February/March 2012; ‘OSCE Chairperson, addressing UN Security 190 Notes

Council, urges co- operation on transnational threats, good governance’, OSCE, 9 February 2012. 49. See also D. Leppard, ‘Labour’s war on terror is failing, says leaked report’, TST, 23 October 2005; ‘Thousands of anti- terror searches were illegal’, BBC, 10 June 2010. 50. ‘UK plans comprehensive terror law’, BBC, UK PM Gordon Brown, ‘We are about to take the war against terror to a new level’, TO, and ‘Threat of dirty bombs “increased”’, BBC, 21/22/24 March 2009; A. Travis, ‘Counter- terrorism strategy driven by “cyberjihad” threat’, GU, 13 July 2011; R. Brant, ‘Police “not ready for new counter-terror powers”’, BBC, 23 November 2011; B. Wheeler, ‘UK turns spotlight on far right after Norway killings’, BBC, 25 July 2011; see also sources on ‘PREVENT’ cited above; R. Gallagher, ‘London Olympics security report warns of extremist threat in host borough’, GU, and ‘Four men admit London Stock Exchange bomb plot’, BBC, 13/1 February 2012; ‘UK extremists sidestep law’, JT&SM, 5 March 2012; G. Miller, ‘Iran, perceiving threat from West, willing to attack on U.S. soil, U.S. intelligence report finds’, WP, and ‘PET: Denmark still top terrorist target’, cphpost.dk, 1 February 2012. 51. ‘Government’s Role in Public Safety’, Public Safety Canada, http://www. safecanada.ca/role_e.asp?DeptID=35, 2007; A. Kimery, ‘Transportation Security: US, Canada Announce Comprehensive Border Security Plan’, hstoday.us, 8 December 2011. 52. See, e.g., ‘Mass rallies for Norway victims’, BBC, 26 July 2011; ‘London riots “crisis” surprised police – Boris Johnson’, BBC, 6 September 2011; P. Apps, ‘Analysis: Is a winter of discontent on the way?’, Reuters, 16 October 2011; ‘Norway massacre: Breivik declared insane’, BBC, 29 November 2011; ‘Trust in government has “suffered a severe breakdown”’, BBC, 23 January 2012; C. Savage, ‘Democratic Senators Issue Strong Warning About Use of the Patriot Act’, NYT, 16 March 2012. 53. See also A. Mombelli, ‘Dick Marty puts values over interests’, swissinfo.ch, 7 October 2011; R. Nordland, ‘In Reactions to Two Incidents, a U.S.-Afghan Disconnect’, and T.B. Edsall, ‘The Uses of Polarization’, NYT, 14/19 March 2012. 54. See also ‘“Reaching Out” – Promoting Community Engagement’, and ‘A New Approach to Counter-Radicalization’, CFR, 1 April 2011; ‘Guard Tackles Deadly Storms, Fires, Floods’, Defense.gov, and K. Sack and T. Williams, ‘Government’s Disaster Response Wins Praise’, NYT, 29–30 April 2011; ‘The new WMD: “weapons of minimum destruction”’, JIDR, 14 November 2011; M. Rowling, ‘UN starts talks on 2015 disaster reduction plan’, Alertnet, 6 March 2012. 55. See also, e.g., ‘TSA to try out risk- based screening at 4 airports on passen- gers who volunteer more information’, AP, 4 October 2011; ‘Copenhagen stands security firm’, AirportTechnology, 29 February 2012; ‘TSA To Evaluate More Screening Procedures’, AviationNews.net, and ‘Italy arrests man over Milan synagogue “plot”’, BBC, 6/15 March 2012.

6 Thoughts for the future

1. See also, e.g., ‘How Special Ops Copied al- Qaida to Kill It’, WB, and J. Miller, ‘How the NYPD Foiled the Post-9/11 Terror Plots’, WSJ, 9–10 September 2011; Notes 191

see the Associated Press (AP) series on the NYPD and its intelligence activities (c.October 2011–March 2012) – e.g.: ‘Surveillance, Security and Civil Liberties’ and ‘The N.Y.P.D. and Muslims’, NYT, and ‘Editorial: Pure intel- ligence’, NY Daily News, and ‘FBI Says NYPD Monitoring Damaged Muslim’s Trust’, and M. Apuzzo, ‘Q&A: Legal issues in NYPD Muslim spying pro- gram’, AP, 3/6/8/12 March 2012; ‘FBI Crime Maps Now “Pinpoint” Average Muslims’, WB, 24 October 2011; ‘FBI Director visits Romania’, BusinessReview, 8 December 2011. For Australia, K. Dearne, ‘ASIO develops an anti- terrorism analytical tool to fight violent extremism’, TA, 12 October 2011. 2. S. Shane, ‘In Din Over Iran, Rattling Sabers Echo’, NYT, G. Rachman, ‘The drift towards war with Iran’, FT, J. Risen and M. Mazzetti, ‘U.S. Agencies See No Move by Iran to Build a Bomb’, NYT, and R. Pollard, ‘Calls for calm as Iran nuclear risk discounted’, SMH, 20/24/28 February 2012; ‘Israel’s ex- spy chief says more efforts needed before considering attack on Iran’, AP, ‘Doubts exist on quality of Iran intelligence’, LAT, J. Risen, ‘U.S. Faces a Tricky Task in Assessment of Data on Iran’, NYT, and ‘Iran Could Make Gross Misjudgment, Chairman Says’, Defense.gov, March 2012; Sir R. Dalton, ‘Expert Comment: Nuclear Diplomacy After Istanbul’, CH, 19 April 2012; ‘Iran undecided on nuclear bomb – Israel military chief’, BBC, 25 April 2012; J. Risen, ‘Experts Believe Iran Conflict Is Less Likely’, NYT, 30 April 2012. 3. ‘Transforming our counterproliferation efforts in Asia region’, SNS, 15 August 2005; see also R. Gottemoeller, ‘Arms Control in the Information Age: The “Getting to Zero” Toolbox’, and T. Countryman, ‘Global Threats, Collaborative Solutions’, State.gov, 18/27 February 2012. 4. ‘Activists warn against CSIS intimidation tactics’, CTV.ca, 29 January 2012; ‘German secret service “blind to far right”’, BBC, 14 February 2012. 5. For UK- US relations, ‘Families welcome Lockerbie review’, BBC, 25 October 2009; ‘Obama, Cameron Discuss Security Aspects of U.S., UK Ties’, and ‘Shared Values Define U.S.-U.K. Ties, Obama Tells Parliament’, Defense. gov, 25 May 2011. For another case, the US- PK intelligence relationship, ‘Pakistan wants to define US relationship in writing but American offi- cials are resisting’, AP, 1 September 2011; B.O. Riedel, ‘A New Pakistan Policy: Containment’, NYT, 14 October 2011; C. Allbritton, ‘Exclusive: How Pakistan helps the U.S. drone campaign’, Reuters, 22 January 2012; D. Walsh, E. Schmitt and I.T. Mehsud, ‘Drones at Issue as U.S. Rebuilds Ties to Pakistan’, NYT, 18 March 2012. 6. See also H. Kundnani and H. Pidd, ‘BND: The spies who silenced their crit- ics in war on terror’, GU, 18 March 2011; H. Stark, ‘Drone Killing Debate: Germany Limits Information Exchange with US Intelligence’, spiegel.de, 17 May 2011. 7. J. Warrick, ‘Secretive Agency Under the Spotlight’, WP, 5 July 2008; G. Weston, ‘Canada offered to aid Iraq invasion: WikiLeaks’, CBC.ca, 15 May 2011. 8. See also, e.g., as revealed in ‘Dick Cheney Memoir: VP Says He Urged Bush To Bomb Syria’, AP, 25 August 2011. 9. See also ‘Transatlantic relations in the 21st century’, FCO.gov.uk, 5 April 2011. 10. See also ‘Shall We Call It the “Bronze Standard”?’, and M.L. Wald, ‘Radioisotope Recipe Lacks One Ingredient: Cash’, NYT, 5/6 February 2012. 192 Notes

11. See also ‘FBI “overstated” evidence used in anthrax letters case’, BBC, 15 February 2011. 12. See also ‘Suspected Nuclear Facility Sighted in Syria’ and ‘Syrian Site Drew U.S. Atomic Suspicions for Years, Officials Assert’, GSN, 3 March 2011; C.P. Blair, ‘Fearful of a nuclear Iran? The real WMD nightmare is Syria’, BAS, and ‘Jordanian Troops May Secure Syrian WMD in Event of Peacekeeping Mission’, GSN, 1/9 March 2012; T. Arango, ‘In Uprooting of Kurds, Iraq Tests a Fragile National Unity’, NYT, 21 April 2012. 13. Several further sources exist, e.g.: ‘New dawn arrives for US and Iraq’, JIAA, 24 March 2011; ‘Iraq confronts security conundrum’, JIAA, 19 August 2011; E. Lake, ‘CIA’s Covert Iraq Mission’, TDB, 25 October 2011; ‘Iraq’s future: reasons to be fearful’, JIAA, and E. Schmitt and M.S. Schmidt, ‘U.S. Drones Patrolling Its Skies Provoke Outrage in Iraq’, NYT, 27/29 January 2012; ‘Deadly explosions in series of attacks on Iraqi cities’, BBC, 20 March 2012. 14. H. Yen, ‘Investigators: Millions in Iraq contracts never finished’, AP, 27 April 2008; ‘Iran Seeking “Intercontinental Missile,” British Leader Says’ and ‘Israeli Defense Chief Urges Prioritization of Missile Defense Work’, GSN, M. Rosenberg and G. Bowley, ‘Security Fears Lead Groups to Rethink Work in Afghanistan’, and J. Gettleman, ‘In Sudan’s Nuba Mountains, Government Rocket Attacks Sow Fear, Witnesses Say’, NYT, 7–13 March 2012. 15. See also ‘Dick Cheney Defends Iraq War, Skips Failures In Book’, AP, and W. Pincus, ‘Cheney’s recall is selective with “In My Time”’, WP, 5–6 September 2011. 16. See also M. Mazzetti, ‘Spy Agencies Say Iraq War Worsens Terrorism Threat’, NYT, and K. DeYoung, ‘Spy Agencies Say Iraq War Hurting U.S. Terror Fight’, WP, 24 September 2006; D. Stringer, ‘UK’s Iraq inquiry turns focus to Bush officials’, WP, 8 February 2010. 17. See also ‘NATO Command Pushes Alliance into New Fields, Capabilities’, Defense.gov, 22 November 2011; ‘NATO’s Special Forces Network’, NATO, 27 February 2012. 18. ‘ Pre- war Iraq “was no threat to UK”’, PA, 29 August 2011; ‘Manningham- Buller voices hopes for al- Qaeda peace talks’, BBC, 2 September 2011. 19. See also G. Kessler, ‘Hussein Pointed to Iranian Threat’, WP, 2 July 2009; ‘Israeli military intelligence chief says Iran deepening regional influence, meddling in Syria’, AP, 5 July 2011; F. Nureldine, ‘Saudi ex- spy chief says “all” options open on Iran’, AFP, 18 January 2012; L. Stack, ‘In Slap at Syria, Turkey Shelters Anti- Assad Fighters’, NYT, 27 October 2011; ‘Bahrain says terror suspects linked to Iran’s Revolutionary Guard’, AP, 14 November 2011; ‘Azerbaijan arrests 22 suspects in alleged Iran spy plot’, BBC, and E. Schmitt and R.F. Worth, ‘With Arms for Yemen Rebels, Iran Seeks Wider Mideast Role’, NYT, 14/15 March 2012; R.M. Gerecht and M. Dubowitz, ‘Don’t Give Up on Sanctions’, NYT, 18 November 2011; ‘Incidents Point to Shadow War Against Iran, Experts Say’, GSN, 5 December 2011; S. Shane, ‘Adversaries of Iran Said to Be Stepping Up Covert Actions’, NYT, and ‘Regional Ban Needed to Prevent Mideast Nuke Buildup: Saudi Prince’, GSN, 11/27 January 2012; W. Maclean, ‘Iran raid likely to drag in US, hurt global economy’, Reuters, A. Karim and S. Ketz, ‘Jihadists, weapons “moving from Iraq to Syria”’, AFP, J. Landay, ‘Al- Qaeda behind Syria blasts: US’, SMH, D. McGuinness, ‘Iran Notes 193

nuclear tensions put Caucasus on alert’, BBC, and L. Stack, ‘Iran Warns U.S. as Syria Intensifies Crackdown’, NYT, S.L. Myers and A. Cowell, ‘“Friends of Syria” to Intensify Pressure on Assad as Bombardment Continues’, and S. Erlanger, ‘Syrian Conflict Poses the Risk of Wider Strife’, NYT, 5/11/12/21/24/25 February 2012; ‘Smart Defence leads to smart Immersive Environments’, NATO ACT, 5 March 2012. 20. See also K. Brulliard, ‘In WikiLeaks cables from Pakistan, U.S. officials strug- gle for leverage’, WP, 7 December 2010; S.L. Myers, ‘In Fog of War, Rift Widens Between U.S. and Pakistan’, NYT, 27 November 2011; ‘Pakistani Backing for Extremist Attacks on India Risks Nuclear Conflict, U.S. Admiral Says’, GSN, 11 February 2012; D. Walsh and S. Masood, ‘Pakistan Picks New Director for Spy Agency’, NYT, 9 March 2012. 21. See also ‘U.S. Not Convinced of Libyan Claims on CW Efforts’, GSN, 4 March 2011; K. Allen, ‘On the trail of Libya’s missing missiles’, BBC, 18 November 2011; ‘Libya’s Muammar Gaddafi had chemical weapon cache’, BBC, 20 January 2012; A. Nossiter, ‘Qaddafi’s Weapons, Taken by Old Allies, Reinvigorate an Insurgent Army in Mali’, NYT, and G. Gatehouse, ‘The gun settles disputes in the new Libya’, BBC, 5/18 February 2012. 22. See also ‘CIA forced to curb spying in Lebanon’, LAT, and ‘“Pizza” Party Codeword May Have Doomed CIA Spies’, WB, 20–21 November 2011; N. Samaha, ‘Lebanon’s intelligence war’, AlJazeera, 2 December 2011. 23. See also ‘ATF official apologises over Mexico gun probe’, BBC, 26 July 2011. 24. See also as exposed in cases, e.g., S. Swann, ‘Rajib Karim: The terrorist inside British Airways’, and ‘BA worker Rajib Karim convicted of terror charges’, BBC, 28 February 2011; J.D. Goodman, ‘2 Hostages Die as Danish Navy Frees Ship Hijacked by Pirates’, NYT, 28 February 2012. 25. See also ‘Chilcot inquiry makes fact- finding visits to Iraq’, BBC, 13 October 2010; A. Vance and B. Stone, ‘Palantir, the War on Terror’s Secret Weapon’, Bloomberg- BusinessWeek, 22 November 2011. 26. See also ‘UK Iraq policy a “rank disaster”’, BBC, 8 November 2006. 27. See also G. Troiani, ‘FBI Head Says Globalization Accelerates Political, Economic Change’, executivegov.com, 18 November 2011; J.P. Bjelopera, ‘The FBI and Terrorism Investigations’, CRS, 28 December 2011; A. Budich, ‘FBI: Cyber threat might surpass terror threat’, CBS, and ‘Michael Douglas, star of Wall Street movie, to help FBI’, BBC, 2/28 February 2012; S. Rice, ‘FBI chief warns cyber crime on par with terrorism’, AFP, 2 March 2012. 28. See also Z. Haider, ‘Pakistan says nuclear safety concerns addressed’, Reuters, 8 May 2010; ‘Cool world response to Iran deal’, BBC, 17 May 2010; S. Sturdee, ‘World powers express “deep concern” on Iran’, AFP, 17 November 2011; T. Zakaria, ‘Iran keeping option open on nuclear weapon – U.S. spy chief’, and T. Zakaria and S. Cornwell, ‘Iran sanctions “biting” in recent weeks: CIA chief’, Reuters, 31 January 2012; R.F. Worth, ‘Iran’s Middle Class on Edge as World Presses In’, and S. Shane and R.F. Worth, ‘Aggressive Acts by Iran Signal Pressure on Its Leadership’, NYT, 6/15 February 2012; M. Asgari and J. Reynolds, ‘Iranians anxious over sanctions and mismanaged economy’, BBC, 1 March 2012. On NK, ‘N.Korea forges trade documents to dodge sanc- tions’, AFP, 31 August 2010; ‘Malaysia “may be WMD transit point”’, BBC, 194 Notes

22 March 2011; ‘North Korea Seen Edging Nearer to Nuclear- Capable Missile’, GSN, and ‘US intelligence expects NKorea under new leader to attempt more exports of weapons technology’, AP, 3/31 January 2012; ‘North Korea agrees to nuclear moratorium’, and A. Foster- Carter, ‘The denuclearisation dance resumes’, ‘North Korea rocket plan condemned as “provocation”’, ‘North Korea’s missile programme’ and ‘UN nuclear watch- dog invited to visit North Korea’, BBC, 29 February/16/19 March 2012; B. Kang Lim, ‘Exclusive – North Korea’s nuclear test ready “soon”’, Reuters, 24 April 2012. 29. See also ‘Looking back in anger’, Economist, P. Biles, ‘Spies in the spotlight over Iraq WMD claims’, and P. Reynolds, ‘Blair’s bombshell admission’, BBC, 3/11/12 December 2009; ‘Iraq inquiry: Day-by- day timeline’, BBC, 8 December 2010; J. Doward, ‘Iraq war inquiry report faces long delay as doubts on evidence persist’, GU, 16 October 2011; R. Norton- Taylor, ‘Iraq war inquiry report delayed’, GU, 16 November 2011. 30. See also E. Stourton, ‘Does America and Iran’s mutual mistrust mean war is inevitable?’, BBC, 19 March 2012. 31. See also M. Chulov and H. Pidd (et al.), ‘Exclusive: Defector admits to WMD lies that triggered Iraq war’, ‘Curveball’s lies – and the consequences’, ‘Curveball admissions vindicate suspicions of CIA’s former Europe chief’, ‘Curveball: How US was duped by Iraqi fantasist looking to topple Saddam’, C. Ross, ‘CiF: Curveball and the manufacture of a lie’, ‘Colin Powell demands answers over Curveball’s WMD lies’ and ‘Curveball could face jail for warmongering, says German MP’, and ‘Curveball doubts were shared with CIA, says ex- German foreign minister’, GU, 15–17 February 2011. 32. See also ‘“Iraq Inquiry should be comprehensive and independent”’, FCO. gov.uk, 24 June 2009; ‘“No whitewash” from Iraq inquiry’, BBC, 23 November 2009; S. Jenkins, ‘CiF: We are fighting Islamism from ignorance, as we did the cold war’, GU, 2 March 2012. 33. R. Norton- Taylor, ‘The response to al- Qaida and the “War on Terry”’, GU, 5 October 2009; T. Shanker and E. Bumiller, ‘Looking Back, Gates Says He’s Grown Wary of “Wars of Choice”’, NYT, 18 June 2011; ‘After a decade of war, the west is weak and in retreat’, NewStatesman, 1 September 2011; ‘A Few Big Ideas’, NYT, 31 December 2008; B. Keller, ‘Falling In and Out of War’, NYT, and C. Cratty, ‘FBI: Afghan civilian killings could spark attacks in U.S.’, CNN, 18/15 March 2012. 34. See also R. Cohen, ‘The Making of an Iran Policy’, NYT, 2 August 2009; R. Baer, ‘Iran’s Nuclear Program: Why We Know So Little’, TIME, 6 October 2009; J. Borger, ‘The west’s previous attempts to derail Iran’s nuclear pro- gramme’, GU, 2 November 2011; ‘US, Israel covert war against Iran sus- pected: report’, AFP, 5 December 2011; W. Maclean, ‘Analysis: Not-so- covert Iran war buys time but raises tension’, Reuters, 18 January 2012. 35. See also ‘Intelligence Chief Describes Complex Challenges’, Defense.gov, B. Bennett, ‘Al Qaeda weakened, Iran a threat, U.S. intelligence officials say’, LAT, ‘Military Has Crushed al- Qaida Since 9/11, Official Says’ and ‘Commandant: Coast Guard’s Wide- ranging Mission Set Increasing’, Defense. gov, 1/8/24 February 2012. 36. See also ‘US cyber war defences “very thin”, Pentagon warns’, BBC, 17 March 2011; P. Apps, ‘Disagreements on cyber risk East- West “Cold Notes 195

War”’, Reuters, 3 February 2012. On ‘habit(s)’, D. Brooks, ‘The Machiavellian Temptation’, NYT, 1 March 2012. 37. See also S. Rayment, ‘200 suicide bombers “planning attacks in UK”’, DT, 8 October 2011. More widely, ‘U.S. Must Prepare for Varied Threats, Gates Says’ and ‘Commanders Cite Unpredictable Future Threats’, Defense.gov, 4 March 2011. 38. See also I. Cobain, ‘Interrogation techniques at “Britain’s Abu Ghraib” revealed’, GU, 5 November 2010. 39. See also ‘Europe committed crimes during counter- terrorism efforts: rights chief’, Jurist, 1 September 2011; P.H. Gordon, ‘The United States and Europe: Meeting Global Challenges’, State.gov, 1 March 2012. 40. S. Kaufman, ‘U.S. Allies, Good Security Helped Prevent Cargo Bomb Attacks’, America.gov, 1 November 2010; J. Pawlak, ‘U.S. seeks help on transport secu- rity’, Reuters, 6 January 2011. 41. See also R. Hardy, ‘Eight years since the “dark day”’, BBC, 10 September 2009; E. Sullivan, ‘Security on rise nationwide for 9/11 anniversary’, AP, D. Byman, ‘Deterring Enemies in a Shaken World’, and R. Douthat, ‘It’s Still the 9/11 Era’, NYT, 1/4 September 2011; F. Gardner, ‘Al- Qaeda seeks new alliances, new con- flicts’, BBC, and ‘Conflict with al Qaeda Will Continue Into Its Third Decade, Although Tactics May Change’, RAND, 13/16 February 2012. 42. See also A. Zegart, ‘ Op- Ed: Al Qaeda is down, not out’, LAT, T. Zakaria, ‘Post-9/11 U.S. intelligence reforms take root, problems remain’ and ‘U.S. spy agencies struggle with post-9/11 languages’, Reuters, 7–8/19 September 2011. 43. See also M. Townsend, ‘“We will pull through,” say mourners in Oslo’, GU, 24 July 2011; ‘Danish right- wing extremists eye “race war”: police’, AP, and D. Crary, ‘Post-9/11 tradeoff: Security vs. civil liberties’, AP, 18–19 November 2011; ‘Norway police say future Breivik- style attacks possible’ and ‘Amnesty: Nato must probe Libya civilian deaths’, BBC, 16/19 March 2012. 44. See also S. Kleinman and M. Alexander, ‘Try a Little Tenderness’, NYT, 11 March 2009; D. Danzig, ‘How a U.S. Army “Gator” Gets Information in Less Than 10 Minutes’, HP, 22 March 2011; C. Cratty and P. Benson, ‘Special terror interrogation group used 14 times in last two years’, CNN, 7 March 2012. For cases, C. Johnson, ‘Christmas Day bomb suspect Abdulmutallab providing intelligence, sources say’, and W. Pincus and C. Johnson, ‘Interagency teams can now question terror suspects’, WP, 3/6 February 2010; A. Entous, ‘Obama starts deploying interrogation teams’, Reuters, 19 May 2010; S. Aftergood, ‘DNI Advisors Favor Non- Coercive “Intelligence Interviewing”’, FAS_SN, and W. Pincus, ‘Guide for interroga- tors tells how FBI agent turned suspect into informant’, WP, 27/30 August 2010; ‘UK should talk to al- Qaeda says former head of MI5’, BBC, 21 March 2011; ‘Ahmed Rashid: Why the US needs Mullah Omar alive’, BBC, and B. Wittes, ‘Are Harsh Interrogation Tactics Justified in the War on Terror?’, Brookings, 23/13 May 2011; ‘New Mission for Military’s “Human Terrain” Experts: Interrogation’, WB, 19 October 2011; ‘How The Pentagon’s Top Killers Became (Unaccountable) Spies’, WB, 13 February 2012; ‘Spy Blimp Caught Rogue Soldier on Tape After Shooting Spree’, WB, 14 March 2012. 45. See also C. Hoyt, ‘The Danger of Always Being On’, NYT, 11 April 2010; T. Egan, ‘In Defense of “Dithering”’, NYT, 24 March 2011. 196 Notes

46. See also D. Brooks, ‘The Problem With Partners’, NYT, 21 March 2011. 47. See also Prof. David Spiegelhalter, ‘Japan nuclear threat: The tsunami is the bigger tragedy’, BBC, 18 March 2011; ‘Terrorists Could Exploit Hurricane in U.S., Report Warns’, and ‘Senator Cites Threat to U.S. Food Supply’, GSN, 25/29 April 2011. 48. See also ‘Intel, Ops Fusion Aids Warfighters, Roughead Says’, Defense.gov, 23 March 2011; ‘U.S., Canada Expand Joint Planning, Operational Options’, Defense.gov, 1 February 2012. 49. See also P. Chalk, ‘What Is the Terrorism Threat Now? The Local Level’, NYT, 10 March 2011. 50. See also ‘Helsinki NATO event seeks to improve cooperation in crisis management’, NATO Update, 4 March 2010; H. Kumar, ‘Does India Need A National Counter- terrorism Center?’, NYT Blog, 28 February 2012. 51. See also M. Urban, ‘The difficulties of predicting future threats’, BBC Newsnight, and ‘Computer Models Have Increasing Value in Assessing Proliferation Risks, Nuclear Expert Says’, American Association for the Advancement of Science, 18/19 October 2010. 52. See also E. Montalbano, ‘CIA Invests In Secure Virtualization, Infrastructure Monitoring’, InformationWeek, 14 January 2011; ‘Osama bin Laden raid: last minute intelligence check raised doubts’, DT, 31 August 2011. 53. See also ‘QϩA- Hurdles to tackling complex crises’, and ‘Scenarios: How mega- crises may unfold’, Reuters, 24 September 2010; T.L. Friedman, ‘The Politics of Dignity’, NYT, 31 January 2012. 54. See also A. Rolington, ‘Keeping intelligence objective’, JIR, 1 December 2005. 55. See also ‘As disasters increase, risk reduction should a be a concern for all – UN chief’, UN, 13 October 2011; ‘Panetta: Military Will Be Smaller, More Agile, Deployable’, Defense.gov, 12 January 2012; E. Bumiller and J.H. Cushman, Jr., ‘Suspect’s Deployments Put Focus on War Strains’, NYT, 17 March 2012. 56. See also S. Watts, ‘Call for cyberwar “peacekeepers”’, BBC Newsnight, 26 January 2012. 57. ‘Measuring the benefits from research’, Policy REsource, Cambridge, UK: RAND EUROPE, 2007. 58. See also M.L. Wald, ‘New Process Eliminates a Fertilizer’s Blast Threat’, NYT, 23 September 2008; ‘Science for Peace and Security Programme’, NATO, 2009; ‘U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets’, WB, 19 October 2009. 59. See also M. Hosenball, ‘Should intelligence agencies chase tax evaders?’, Reuters, 11 November 2011. 60. See also K. Dozier, ‘Counterterrorist Pursuit Team: 3,000 Man CIA Paramilitary Force Hunts Militants In Afghanistan, Pakistan’, AP, 22 September 2010; E. Bumiller, ‘Soldier, Thinker, Hunter, Spy: Drawing a Bead on Al Qaeda’, NYT, 3 September 2011. 61. See also W. Pincus, ‘Britain’s MI6 operates a bit differently than CIA’, WP, 2 November 2010. 62. See also ‘Police intelligence group to be restructured’, ABC Melbourne, 17 May 2011; G. Thompson, ‘D.E.A. Launders Mexican Profits of Drug Cartels’, NYT, 3 December 2011. 63. See also ‘Taliban resistance “under-estimated” by Britain’, BBC, 11 May 2011; C. Rosenberg, ‘$744,000 buys cooperative captives a new soccer field’, MiamiHerald, and P. Finn, ‘Guantanamo detainee Majid Khan pleads guilty, Notes 197

promises cooperation’, WP, 28/29 February 2012; T. Frieden, ‘Holder: Not “assassination” to target Americans in terror hunt’, CNN, and ‘The Power to Kill’, NYT, 5/10 March 2012. 64. See also M. Hosenball and S. Cornwell, ‘U.S. assessing risks of Taliban transfer – Petraeus’, Reuters, 31 January 2012; M. Ryan and S. Cornwell, ‘Lawmakers warn of outcry against Taliban transfer’, Reuters, and P. Finn, ‘ High- value Guantanamo Bay detainee Majid Khan, in first, reaches plea deal’, WP, 2/22 February 2012; ‘Intelligence report finds only 16% of released Gitmo detainees rejoin terror war’, AP, and ‘Guantanamo Taliban inmates “agree to Qatar transfer”’, BBC, 5/10 March 2012. 65. See also R. Solholm, ‘Norwegian special forces to Afghanistan?’, NorwayPost, 11 January 2010; D. Priest and W.M. Arkin, ‘“Top Secret America”: A look at the military’s Joint Special Operations Command’, WP, R. Epstein, ‘The secret soldiers’, TAA, and R. Epstein, ‘Special forces step up secret Afghanistan attacks’, SMH, D. Cheng, ‘NZ military kept closer ties with US secret – Hager’, NZHerald, ‘Book claims Defence misled Govt over war activities’, RadioNZ, 1–5 September 2011. 66. Several sources exist: S.D. Naylor, ‘SOCom directive announces major changes’, ArmyTimes, 30 August 2009; K. DeYoung and J. Warrick, ‘Under Obama, more targeted killings than captures in counterterrorism efforts’, WP, 14 February 2010; ‘Gitmo Shutdown Means More Drone Strikes, Officials claim’, WB, and A. Entous, ‘Special Report: How the White House learned to love the drone’, Reuters, 18–19 May 2010; T. Mckelvey, ‘Inside the Killing Machine’, Newsweek, 13 February 2011; ‘CIA’s Drones Join Shadow War Over Yemen’, WB, and E. Bumiller and T. Shanker, ‘War Evolves With Drones, Some Tiny as Bugs’, NYT, 14/19 June 2011; ‘ Al- Qaeda – 10 years on’, JT&SM, 1 September 2011; ‘Events in Iraq, Libya Showcase American Leadership’, Defense.gov, 22 October 2011 S. Aftergood, ‘Special Operations Forces on the Rise’, FAS_SN, 2 May 2011; E. Schmitt, M. Mazzetti and T. Shanker, ‘Admiral Seeks Freer Hand in Deployment of Elite Forces’, NYT, K. Dozier, ‘Special ops teams first in, last out in Afghan war’, AP, ‘Official Cites Importance of Sustaining Special Ops Forces’, Defense.gov, L.C. Baldor, ‘Defense spending on cyber, special ops stays flat’, AP, 7–19 February 2012; ‘Socom Commander Discusses Progress in Afghanistan’, Defense.gov, and B. Starr, ‘High level meeting focuses on future of special ops in Afghanistan’, CNN, 6/7 March 2012. For extended issues, P. Worsnip, ‘U.N. official calls for study of ethics, legality of unmanned weapons’, WP, 24 October 2010; A. Entous, E. Perez and S. Gorman, ‘Drone Program Attacked by Human- Rights Groups’, WSJ, 9 December 2011; ‘Obama defends US drone strikes in Pakistan’, BBC, 31 January 2012; J.C. Henning, ‘Embracing the Drone’, NYT, 20 February 2012; ‘Yemen Airstrike: Dozens Killed By Suspected US Drones’, Reuters, and M.B. al- Shishani, ‘Profile: Ansar al- Sharia in Yemen’, BBC, 10/18 March 2012; B. Starr, ‘Intel influx leads to increased U.S. strikes in Yemen’, CNN, 19 April 2012. For the UK, P. Rogers, ‘Britain’s Security Future’, OD, 20 September 2010; M. Urban, ‘Inside story of the UK’s secret mission to beat Gaddafi’, BBC, 18 January 2012. For Australia, D. Welch and R. Epstein, ‘The secret soldiers’ and ‘Secret SAS squadron sent to spy in Africa’, and T. Lester, ‘SAS is involved in foreign intelligence work: Smith’, SMH, and ‘SAS soldiers hunt for terrorists in Africa’, AAP, 13 March 2012; G. Miller, ‘White House approves broader Yemen drone campaign’, WP, 26 April 2012. 198 Notes

67. See also S. Boazman, ‘You can run… but can you hide?’, BBC Panorama, 24 October 2008; S. Aftergood, ‘Surveillance Court Issues New Rules of Procedure’, FAS_SN, 3 November 2010. On operations, ‘Interview with William J. Fallon’, BostonGlobe, 25 November 2008; ‘Army Wants Spy Blimps to Psych Out Insurgents’, WB, and G. Thompson and M. Mazzetti, ‘U.S. Drones Fight Mexican Drug Trade’, NYT, 4/15 March 2011; S. Aftergood, ‘Domestic Intelligence Surveillance Grew in 2010’, FAS_SN, and ‘Surveillance, Not Waterboarding, Led to bin Laden’, WB, 6/3 May 2011; W. Maclean, ‘Hamburg Islamists disperse, police keep watch’, Reuters, and S. Aftergood, ‘A Spotlight on “Top Secret America”’, FAS_SN, 1–2 September 2011; ‘Flying Spy Surge’, WB, 19 October 2011; ‘Global Nature of Terrorism Drives Biosurveillance’, Defense.gov, 27 October 2011; ‘UK ramps up Afghan IMINT analysis’, JDW, 1 December 2011; ‘New U.S. strategy to keep up spy technology funding’, Reuters, W. Pincus, ‘Brave new world of weaponry’, WP, ‘Panetta, Dempsey Discuss Risks, Threats of the Future’, Defense.gov, K. Dozier, ‘Pentagon looks to bolster special operations units’, AP, ‘East Africa Is the New Epicenter of America’s Shadow War’, WB, 5/26–27 January 2012; ‘London con- ference backs Somalia terror fight’, BBC, 23 February 2012; ‘Badly Weakened Al-Qaeda Still Seen as Top Terrorist Threat to U.S.’, GSN, and ‘U.S. no-fly list doubles in year’, Reuters, 2/4 February 2012; K. DeYoung and L. Fadel, ‘Alias causes confusion as wrong man detained in Cairo’, WP, 1 March 2012. 68. See also D.S. Cloud, ‘Gates warns against future land wars like Iraq, Afghanistan’, LAT, 25 February 2011; J. Marcus, ‘Gaddafi vows “long war” in Libya’, BBC, 20 March 2011; K. Dilanian, ‘A key Sept. 11 legacy: more domestic surveillance’, LAT, J. Ukman, ‘A report card on post- Sept. 11 reforms’, WP, and ‘9/11 Commission heads issue security- gap warn- ing’, CNN, 29/31 August 2011; C. Savage, ‘Obama Adviser Discusses Using Military on Terrorists’, NYT, 16 September 2011; L. Fox, ‘Former Bush Staffer Says Obama Drones Destroy Good Terrorist Intelligence’, USN&WR, and ‘War Issue: Obama’s Secret Wars – An FP Special Report’, FP, 23/29 February 2012; J. Manthorpe, ‘Western intervention in Middle East has produced a harvest of dust and ashes’, VancouverSun, 9 March 2012. 69. See also ‘Lack of strategy “threatens UK national interest”’, BBC, and ‘Response to Public Administration Select Committee Report’, FCO, 18 October 2010; ‘Still Tinkering’, NYT, 31 December 2010; D. Cole, ‘Chewing Gum for Terrorists’, NYT, 2 January 2011; ‘Someone Tell Obama’s Counterterrorism Crew About The Internet’, WB, 30 June 2011; ‘Libya: Clinton urges Gaddafi to go, not issue threats’, BBC, 2 July 2011; ‘Norway intelligence admits pos- sible errors ahead of Anders Breivik attacks’, DT, 2 September 2011; ‘Bringing Special Forces Together’, NATOchannel.tv, 14 October 2011; D. Miles, ‘Panetta Defends Intelligence Operations’, Defense.gov, 14 December 2011; ‘Video: Inside NATO’s Special Forces network’, YouTube, and ‘Victoria Cross winner Ben Roberts-Smith’, DT (Australia), 22/24 February 2012; J. George, ‘ Canada- Denmark wrap up Greenland military exercise’, NunatsiaqOnline, 17 March 2012. 70. See also ‘Police tactics “risking support”’, BBC, 25 November 2009; W. Pincus, ‘Story of B-53 “bunker buster” is a lesson in managing nuclear weapons’, WP, 18 October 2010 (corrected version); P. Finn and A.E. Kornblut, ‘Obama creates indefinite detention system for prisoners Notes 199

at Guantanamo Bay’, WP, 8 March 2011; P. Finn, ‘Veto threatened over detention provisions’, WP, and ‘FBI director raises concerns with defense bill policy on handling suspected terrorists’, AP, 17/28 November 2011; J. Rizzo, ‘Lawmakers announce bill prohibiting indefinite detention in U.S.’, CNN, 8 March 2012; ‘New OSCE decision to prevent surplus ammunition falling into wrong hands’, OSCE, 23 March 2011. 71. See also R. Norton- Taylor, ‘Blair: man of faith, in his own ideas’, GU, 23 April 2009; ‘Tony Blair denies military action “radicalised” Muslims’, BBC, 10 September 2011. 72. W. Pincus, ‘Coalition urged to revamp intelligence gathering, distribution in Afghanistan’, WP, 6 January 2010. 73. See also ‘UK plans comprehensive terror law’, BBC, 21 March 2009; sources on ‘radicalization’, ‘homegrown terror(-ism/-ists)’ and ‘extremists/-ism’ risks and threats in particularly the UK, but also including, at times with connections, especially elsewhere in Europe, such as in France, the Netherlands, Germany and Scandinavia, and in the US, Canada and Australia; ‘The Islamic veil across Europe’, BBC, 11 April 2011; M. Hosenball, ‘US agencies say Libya attack may awaken al Qaeda’, Reuters, R. Brant, ‘Radicalisation review “to urge more student monitoring”’, BBC, and ‘Review of the Prevent strategy’, UK , 22/16 March 2011; A. Harrison, ‘Campus extremism “a grave concern” say MPs and peers’, BBC, 28 April 2011; ‘Updated anti- extremism strategy published’ and M. Easton, ‘Is fight against terror about violence or extremism?’, BBC, and A. McDuffee, ‘Google Ideas think tank gathering former extremists to bat- tle radicalization’, WP, 7/24 June 2011; O. Williams, ‘Robert Lambert: “We Should Work More Closely With Muslims To Combat Al Qaeda”’, HP, and ‘FBI’s Key Muslim Ally: Bigoted Briefings “Make My Job Harder”’, WB, 22/20 September 2011; ‘FBI Calls In The Army To Fix Its Counterterrorism Training’, WB, and ‘Magazine office burns as Islam issue hits stands’, CNN, 2–3 November 2011; ‘ “expels 161 foreign Muslim preachers”’, BBC, 22 January 2012. 74. See also R. Winthrop and A. Adams, ‘The U.S. Should Maintain Aid to Pakistan, Especially in Education’, Brookings, 12 May 2011; S. Hamdan, ‘Arab Spring Spawns Interest in Improving Quality of Higher Education’, NYT, 6 November 2011. 75. See also F. Guarascio, ‘No plans for EU secret intelligence operations’, public- serviceeurope.com, 23 September 2011; V. Dodd and M. Taylor, ‘Scotland Yard called in over Breivik’s claims he met “mentor” in UK’, GU, 25 July 2011. 76. See also ‘Gates Urges New Air Force Leaders to Think Creatively’, Defense.gov, 4 March 2011. 77. E. Schmitt, ‘A Variety of Sources Feed Into Taliban’s War Chest’, NYT, 19 October 2009; ‘New Strategy Calls for Redefined Leadership’, Defense.gov, 8 February 2011; T.L. Friedman, ‘Who’s the Decider?’, NYT, 15 November 2011; ‘Taliban resistance “under-estimated” by Britain’. 78. See also ‘UK report says Afghan COIN strategy is not working’, JDW, and K. Dilanian, ‘US intelligence questions the progress in Afghanistan’, LAT, 4/16 March 2011; ‘David Miliband warns Afghanistan is “forgotten war”’, BBC, 13 April 2011; D. Wood, ‘Beginning Of The End For Petraeus Counterinsurgency Strategy’, HP, and J.T. Mathews, ‘Another New Strategy in Afghanistan’, 200 Notes

Carnegie, and ‘Shift in US military intelligence in Afghanistan means pursu- ing Taliban, al- Qaida is priority’, AP, 22/26 June 2011; M. Hosenball and M. Ryan, ‘New Afghanistan assessment reflects split U.S. views’, Reuters, 12 January 2012; T. Shanker and E. Schmitt, ‘U.S. Plans Shift to Elite Units as It Winds Down in Afghanistan’, NYT, and ‘Joint Command Boss Says ISAF Has Momentum to Succeed’, Defense.gov, 4/8 February 2012. 79. Attempts are present, see e.g. R. Mikkelsen, ‘Mideast an “arc of instabil- ity” into 2025-US analyst’, Reuters, 19 November 2008; ‘Gorbachev: Nato victory in Afghanistan impossible’, BBC, 27 October 2010; P. Reynolds, ‘What does Nato hope to achieve?’, BBC, 18 November 2010; N. Fick and J. Nagl, ‘The “Long War” May Be Getting Shorter’, NYT, 20 February 2011; R. Chandrasekaran, ‘Cost of war in Afghanistan will be major factor in troop- reduction talks’, WP, 31 May 2011; L. Mogelson, ‘Bad Guys vs. Worse Guys in Afghanistan’, NYT, 19 October 2011; J. Steele, ‘Nato must rectify the errors it has made in Afghanistan’, GU, 4 December 2011; ‘Afghan confer- ence in Bonn as Nato troops eye exit’, BBC, 5 December 2011; ‘Beginning of the End’, NYT, and A. North, ‘Will Afghan Koran row prove Nato’s tipping point?’, BBC, M. Rosenberg and T. Shanker, ‘Violent Uproar in Afghanistan Casts Shadow on U.S. Pullout’ and ‘ Self- Inflicted Wounds’, NYT, 18/23/27 February 2012; K. Dozier, ‘US commanders: No plan to cede Afghan war to CIA’, AP, ‘Mattis Defends Afghan Strategy, Warns of Iran, Al- Qaida Threats’, Defense.gov, and R. Norton- Taylor, ‘The pressure grows for a quick Nato exit from Afghanistan’, GU, and D.E. Sanger, ‘In Assessing the Damage, Fears of an Emboldened Taliban’ and W. Yardley, ‘Killings Add to Worries at Soldier’s Home Base’, NYT, 6–11 March 2012; ‘Interview: Colonel John R. Jones, sen- ior intelligence officer, US Army Joint Multinational Readiness Center’ and ‘US Army units reconfigure for role change’, JIDR, 13/17 April 2012. 80. See also E. Bumiller, ‘Remembering Afghanistan’s Golden Age’, NYT, 18 October 2009; J. Brotton, ‘Why a map is a window on to history’, BBC, 3 May 2010; E. Montalbano, ‘NSA Wrestles With Phone Location Data Tracking’, InformationWeek, 28 July 2011; R. Chandrasekaran, ‘In Afghanistan, the rise and fall of “Little America”’, WP, 5 August 2011; M. Kakutani, ‘Surveying a Global Power Shift’, NYT, 29 January 2012. 81. See as argued in A.-M. Slaughter, ‘Fiddling While Libya Burns’, NYT, 13 March 2011; P. Quinn, ‘Afghanistan Night Raids Defended By Adm. William McRaven’, AP, M.E. O’Hanlon and J. Nagl, ‘Afghan Strategy Begins to Make Gains’, Politico, and ‘Afghanistan: the lost decade’, GU, 11/6–7 December 2011; A.-M. Slaughter, ‘How to Halt the Butchery in Syria’, NYT, 23 February 2012; O. Abdel- Razek, ‘Syrians still divided over country’s future’ and J. Marcus, ‘Analysis: Options for military intervention in Syria’, BBC, 12/14 March 2012. 82. See also ‘As risks from disasters rise, UN chief calls for better preparedness’, UN, 10 May 2011; J. Madslien, ‘Unanswered questions in Norway tragedy’, BBC, 26 July 2011; ‘ agency reports record number of suspected terror cases’, CP, 2 November 2011; ‘Goals in Afghanistan Remain the Same, Dempsey Says’, Defense.gov, 17 March 2012. 83. CSIS, ‘Counter-Terrorism’, Backgrounder Series, 8, August 2002, p. 11; D. Milmo, V. Dodd and R. Norton- Taylor, ‘UK airports on alert after dummy bomb runs warning’, GU, 17 December 2010. Notes 201

84. See also ‘Pacom Nominee Calls Regional Allies Bedrock of Strategy’, Defense. gov, and ‘Malaysia to help Philippines identify dead militants’, AFP, 9/11 February 2012; ‘Royal Marines practise urban combat skills’, UK MoD, P. Khanna, ‘The Future of Globalization’, CH, and ‘Five suspects killed in Bali anti- terror raids’, BBC, 14/15/19 March 2012. 85. See also, e.g., ‘“Green on Blue” Deaths Won’t Derail Strategy, Spokesman Says’, Defense.gov, and B. Sarwary, ‘Nato’s crisis of trust in Afghanistan’, BBC, 1–2 March 2012. 86. See also J. Perlez, ‘Soldier Deaths Draw Focus to U.S. in Pakistan’, NYT, 4 February 2010; ‘EU begins Somali training mission’, BBC, 7 April 2010; N. Watt, ‘Protests as UK security put at heart of government’s aid policy’, GU, 29 August 2010; ‘David Cameron hails “unbreakable” link with Pakistan’, BBC, 4 April 2011; E. Schmitt, ‘U.S. Africa Command Seen Taking Key Role’, NYT, 21 March 2011; ‘Training Kicks Off for NATO Mentors in Afghanistan’, Defense. gov, 10 January 2012; ‘Exercise Promotes U.S.-Guyana Special Ops Capabilities’, Defense.gov, 6 March 2012. 87. e.g. D. Filkins, ‘Afghan Militias Battle Taliban With Aid of U.S.’, NYT, 22 November 2009; R. Chandrasekaran, ‘U.S. training Afghan villagers to fight the Taliban’, WP, 27 April 2010; F. Karim, ‘Bangladeshi force trained by UK police “allowed to kill and torture”’, GU, 10 May 2011; ‘U.S. Built Its Own Secret Pakistani Spy Service’, WB, and J. Goldberg, ‘The Good ISI vs. the Bad ISI’, The Atlantic, 6 December 2011; A.J. Shapiro, ‘Expanding Private Sector Partnerships Against Piracy’, State.gov, 13 March 2012. 88. See also, e.g., T. Harding, ‘SAS trains Libyan troops’, DT, 11 September 2009; ‘Libya: Gaddafi regime’s US- UK spy links revealed’, BBC, R. Nordland, ‘Files Note Close C.I.A. Ties to Qaddafi Spy Unit’, NYT, ‘Qaddafi’s spy service had ties to German intelligence’, TL (Germany), J. Warrick, ‘Documents shed light on Gaddafi lobbying’, WP, 1–4 September 2011; S. Grey, ‘Nato turns to militias in Afghanistan battle’, Channel4News, 17 May 2010; ‘No quick fixes’, Economist, 4 November 2010; W. Maclean, ‘Analysis: Tunisia puts focus on West- Arab secu- rity ties’, Reuters, 16 January 2011; ‘Afghan pilot “kills six Nato soldiers at Kabul airport”’, BBC, 27 April 2011; R. Epstein and D. Oakes, ‘Rats in the ranks’, TAA, 2 June 2011; ‘UN panel sees “alarming resurgence” of mercenaries’, Reuters, 1 November 2011; A. Quinn, ‘Syria raises specter of proxy conflict for U.S., Russia’, Reuters, and J. Muir, ‘Analysis: Syria’s complex and bloody crisis’, BBC, 7/10 February 2012; K. Sengupta and S. Hughes, ‘Libyan human rights abuses “deeply concerns” Ban Ki-moon’, Independent, 12 March 2012. 89. See also, e.g., ‘Olympics security “top priority” for Channel police’, BBC, 17 June 2011; N. Hopkins and R. Norton- Taylor, ‘US officials worried about security at London 2012 Olympics’, and O. Gibson, ‘Five thousand troops to beef up security at London Olympics’, GU, 14 November 2011. 90. See, e.g., ‘Official: NATO Investment Critical Despite Fiscal Challenge’ and ‘NATO Head Discusses Afghan Violence, Syria, Chicago Summit’, Defense. gov, 28 February 2012; C.-C. Zhang and J. Mullen, ‘Chinese premier touches on military, economy’, CNN, 5 March 2012. Select Bibliography

Aaltola, M. (2012), ‘Contagious insecurity: war, SARS and global air mobility’, Contemporary Politics, 18, 1. Abrahamsen, R., and M.C. Williams (2010), Security Beyond the State: Private Security in International Politics (Cambridge: Cambridge University Press). Absher, K.M., M.C. Desch and R. Popadiuk (2010), ‘The President’s Foreign Intelligence Advisory Board’, ch. 11 in L.K. Johnson (ed.), The Oxford Handbook of National Security Intelligence (Oxford: Oxford University Press). Aday, S., H. Farrell, M. Lynch, and J. Sides (2010), ‘Advancing New Media Research’, United States Institute for Peace Special Report, 250 (September). Aftergood, S. (2010a), ‘National Security Secrecy: How the Limits Change’, Social Research, 77, 3 (Fall). Aftergood, S. (2010), ‘Telling Secrets’, Foreign Policy (18 October). Aftergood, S. (2012a), ‘Army Lawyers Face “Legal Intensity of Military Operations”’, FAS Secrecy News Blog (5 March). Aftergood, S. (2012b), ‘Special Ops Forces Create “Visible and Dramatic Effects”’, FAS Secrecy News Blog (7 March). Aftergood, S. (2012c) ‘CIA and Special Ops are “Deconflicted at All Levels”’, FAS Secrecy News Blog (21 February). Agrell, W. (2006), ‘Sweden and the Dilemmas of Neutral Intelligence Liaison’, Journal of Strategic Studies, 29, 4 (August). Agrell, W. (2012), ‘The Next 100 Years? Reflections on the Future of Intelligence’, Intelligence and National Security, 27, 1. Ahrens, J., and P.M. Rudolph (2006), ‘The Importance of Governance in Risk Reduction and Disaster Management’, Journal of Contingencies and Crisis Management, 14, 4 (December). Aid, M.M. (2009), The Secret Sentry: The Untold History of the (New York: Bloomsbury). Aid, M.M. (2012a), ‘INTEL WARS: The Lessons for U.S. Intelligence From Today’s Battlefields’, US National Security Archive Update (13 February). Aid, M.M. (2012b), Intel Wars (New York: Bloomsbury). Aitchinson, G. (2011), ‘Hackgate, Power Elites and the Limits of the “Corruption” Critique’, OD/ISN (20 July). Aldrich, R.J., and M.F. Hopkins (eds) (1994), Intelligence, Defence, and Diplomacy: British Policy in the Post- war World (London: Frank Cass). Aldrich, R.J. (1994), ‘Review Article: Intelligence, Anglo- American Relations and the Suez Crisis, 1956’, Intelligence and National Security, 9, 3 ( July). Aldrich, R.J. (1998a), ‘British intelligence and the Anglo- American “Special Relationship” during the Cold War’, Review of International Studies, 24. Aldrich, R.J. (1998b), ‘Did Waldegrave Work? The Impact of Open Government Upon British History’, Twentieth Century British History, 9, 1. Aldrich, R.J. (2000), Intelligence and the War Against Japan: Britain, America and the Politics of Secret Service (Cambridge: Cambridge University Press).

202 Select Bibliography 203

Aldrich, R.J. (2001), The Hidden Hand: Britain, America and Cold War Secret Intelligence (London: John Murray). Aldrich, R.J. (2002), ‘Dangerous Liaisons: Post- September 11 Intelligence Alliances’, Harvard International Review, 24, 3 (Fall). Aldrich, R.J. (2005a), ‘The Secret State’, ch. 19 in P. Addison and H. Jones (eds), A Companion to Contemporary Britain 1939–2000 (London: Blackwell). Aldrich, R.J. (2005b), ‘Whitehall and the Iraq War: The UK’s four intelligence enquiries’, Irish Studies in International Affairs, 16. Aldrich, R.J. (2006), ‘The UK–US Intelligence Alliance in 1975: Economies, Evaluations and Explanations’, Intelligence and National Security, 21, 4 (August). Aldrich, R.J. (2009a), ‘Global Intelligence Co- operation versus Accountability: New Facets to an Old Problem’, Intelligence and National Security, 24, 1 (February). Aldrich, R.J. (2009b), ‘US–European Intelligence Co- operation on Counter- Terrorism: Low Politics and Compulsion’, British Journal of Politics and International Relations, 11, 1 (February). Aldrich, R.J. (2009c), ‘Beyond the vigilant state: globalisation and intelligence’, Review of International Studies, 35, 4 (October). Aldrich, R.J. (2010), GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency (London: HarperPress). Aldrich, R.J. (2011a), ‘International intelligence cooperation in practice’, ch. 2 of H. Born, I. Leigh and A. Wills (eds), International Intelligence Cooperation and Accountability (London: Routledge/Studies in Intelligence Series). Aldrich, R.J. (2011b), ‘“A Profoundly Disruptive Force”: The CIA, Historiography and the Perils of Globalization’, Intelligence and National Security, 26, 2 & 3. Alexander, D. (2002), Principles of Emergency Planning and Management (Harpenden, Herts: Terra). Alexander, M.S. (1998), ‘Introduction: Knowing your friends, assessing your allies – perspectives on Intra- Alliance Intelligence’, Intelligence and National Security, 13, 1 (Spring). Alger, J. (2010), ‘Prioritizing Nuclear Nonproliferation’, ISN (7 December). Ambler, E (1940/2009), Journey into Fear (London: Penguin). Ambler-Edwards, S., K. Bailey, A. Kiff, T. Lang, R. Lee, T. Marsden, D. Simons, H. Tibbs (2009), ‘Food Futures: Rethinking UK Strategy’, Chatham House Report (February). Andersen, M.S., I.B. Neumann, L. Seabrooke and O.J. Sending (2010), ‘Global Changes and Norwegian Foreign- and Development Policy 2010–2020’, NUPI Report (Oslo: April). Andersen, T.J., and P.W. Schrøder (2010), Strategic Risk Management Practice: How to Deal Effectively with Major Corporate Exposures (Cambridge: Cambridge University Press). Andrew, C. (1977), ‘Whitehall, Washington and the Intelligence Services’, International Affairs, 53, 3 ( July). Andrew, C.M. and D. Dilks (eds) (1984), The Missing Dimension: Governments and Intelligence Communities in the 20th Century (Basingstoke: Palgrave Macmillan). Andrew, C. (1985), Secret Service: The Making of the British Intelligence Community (London: Heinemann). Andrew, C.M. (1987), ‘The Growth of Intelligence cooperation in the English Speaking World’, Wilson Center Working Paper, 83 (November). 204 Select Bibliography

Andrew, C. (1994), ‘The Making of the Anglo- American SIGINT Alliance’ in H.B. Peake and S. Halpern (eds), In the Name of Intelligence: Essays In Honor of Walter Pforzheimer (Washington, DC: NIBC Press). Andrew, C. (2002), ‘Cumming’ in M.R.D. Foot (selected), Secret Lives: Lifting the Lid on Worlds of Secret Intelligence (Oxford: Oxford University Press). Andrew, C. (2004), ‘Intelligence, International Relations and “Under-theorisa- tion”’ ch. 2 in L. Scott and P. Jackson (eds), Understanding Intelligence in the Twenty- First Century: Journeys in Shadows (London: Routledge). Andrew, C. (2009a), The Defence of the Realm (London: Allen Lane). Andrew, C. (2009b), ‘Reflections on Intelligence Historiography since 1939’, ch. 3 in G.F. Treverton and W. Agrell (eds), National Intelligence Systems (Cambridge: Cambridge University Press). Andrew, C., R.J. Aldrich and W.K. Wark (eds) (2009), Secret Intelligence: A Reader (London: Routledge). Aradau, C., and R. Van Munster (2011), Politics of Catastrophe: Genealogies of the Unknown (London: Routledge). Argomaniz, J. (2011), The EU and Counter- Terrorism (London: Routledge). Armstrong, S. (2008), ‘The new spies’, New Statesman (7 August). Arquilla, J. (2009), ‘How to Lose a Cyberwar’, Foreign Policy (12 December). Arquilla, J. (2011), ‘The New Seeds of Terror’, Foreign Policy (10 May). Arquilla, J., and D. Ronfeldt (eds) (2001), Networks and Netwars (Santa Monica, CA: RAND). Asal, V.H, G.A. Ackerman, and R.K. Rethemeyer (2012), ‘Connections Can Be Toxic: Terrorist Organizational Factors and the Pursuit of CBRN Weapons’, Studies in Conflict & Terrorism, 35, 3. Axelrod, R. (1997), The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration (Princeton, NJ: Princeton University Press). Axelrod, R. (2006), The Evolution of Cooperation (New York: Basic Books [rev. ed.]). Aydinli, E. (2008), ‘Before Jihadists There Were Anarchists: A Failed Case of Transnational Violence’, Studies in Conflict & Terrorism, 31, 10 (October). Aydinli, E., and M. Tuzuner (2011), ‘Quantifying intelligence cooperation: The United States International Intelligence Behavior (USIIB) dataset’, Journal of Peace Research, 48, 5 (September). Azari, E. (2010), ‘Iran reinvigorates a strategy for regional dominance’, OpenDemocracy (2 September). Badie, D. (2010), ‘Groupthink, Iraq, and the War on Terror: Explaining US Policy Shift toward Iraq’, Foreign Policy Analysis, 6, 4 (October). Baer, R. (2008), The Devil We Know (New York: Crown). Baer, R. (2010), ‘Havana’s Man in Havana’, Foreign Policy (9 November). Bailes, A.J.K., R. Dinesen, H. Haukkala, P. Joenniemi and S. De Spiegeleire (2011), ‘The Academia and Foreign Policy Making: Bridging the Gap’, DIIS Working Paper (May). Ball, D. and J. Richelson (1990), The Ties that Bind (Boston: Unwin Hyman [2ed]). Ball, K., and F. Webster (eds) (2003), The Intensification of Surveillance (London: Pluto). Ball, R. (2011), ‘The strategic utility of New Zealand Special Forces’, Small Wars & Insurgencies, 22, 1 (March). Bar-Joseph, U., and R. McDermott (2008), ‘Change the Analyst and Not the System: A Different Approach to Intelligence Reform’, Foreign Policy Analysis, 4. Select Bibliography 205

Barno, D., and T. Sharp (2012), ‘SOF Power’, Foreign Policy (14 February). Barrie, D., H. Boyd, and J. Hackett (2012), ‘Behind the latest Pentagon cutbacks’, IISS Voices (27 January). Bayer, R., and E.F. Keyman (2012), ‘Turkey: An Emerging Hub of Globalization and Internationalist Humanitarian Actor?’, Globalizations, 9, 1. Baylis, J. (ed.) (1997), Anglo-American Relations Since 1939: The Enduring Alliance (Manchester: Manchester University Press). Beach, J. (2007), ‘Origins of the special intelligence relationship? Anglo- American intelligence co- operation on the Western Front, 1917–18’, Intelligence and National Security, 22, 2 (April). Bellaby, R. (2012), ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, 27, 1. Bellinger III, J.B. (2011), ‘Revisiting a Stale Counterterrorism Law’, CFR (1 September). Bello- Bravo, J., I.B. Boukary and B.R. Pittendrigh (2012), ‘Animation Without Borders’, ISN Insights (15 March). Beninger, J.R. (1986), The Control Revolution (Cambridge, MA: Harvard University Press). Benjamin, D. (2012), ‘Countering Violent Extremism’, State.gov (25 January). Bennett, J.R. (2009), ‘Private Defense: Export Unknown’, ISN Security Watch (27 July). Bennett, J.R. (2010), ‘Good Year for Private Security’, ISN Security Watch (19 January). Bergner, J.D. (2012), ‘Going Nuclear: Does the Non- Proliferation Treaty Matter?’, Comparative Strategy, 31, 1. Berinsky, A.J. (2009), In Time of War: Understanding American Public Opinion from World War II to Iraq (Chicago, IL: University of Chicago Press). Bernkopf Tucker, N. (2008), ‘The Cultural Revolution in Intelligence: Interim Report’, The Washington Quarterly, 31, 2 (Spring). Berridge, G.R. (2010), Diplomacy: Theory and Practice (Basingstoke: Palgrave Macmillan [4ed.]). Berrington, H. (2008), ‘War Powers: Risk, Threat, Security – and Parliament’, RUSI Journal, 153, 1. Best, Jr., R.A. (2010), ‘Intelligence Reform After Five Years: The Role of the Director of National Intelligence (DNI)’, US Congressional Research Service Report (22 June). Black, J. (2006), The Dotted Red Line: Britain’s Defence Policy in the Modern World (London: The Social Affairs Unit). Black, J. (2009), Geopolitics (London: The Social Affairs Unit). Blakeley, R. (2011), ‘Dirty Hands, Clean Conscience? The CIA Inspector General’s Investigation of “Enhanced Interrogation Techniques” in the War on Terror and the Torture Debate’, Journal of Human Rights, 10, 4. Blaufarb, D.S. (1977), ‘Intelligence Bookshelf… Current books of interest to intel- ligence buffs’ in Periscope: Official Organ of the Association of Former Intelligence Officers, 3, 2 (Summer) – via CREST, CIA-RDP88-01315R000100480001-4 (2005/12/14). Block, L. (2010), ‘Bilateral Police Liaison Officers: Practices and European Policy’, Journal of Contemporary European Research, 6, 2. Boin, A, P. ’t Hart, E. Stern and B. Sundelius (2005), The Politics of Crisis Management (Cambridge: Cambridge University Press). 206 Select Bibliography

Bolt, N. (2010), ‘The Leak before the Storm: What WikiLeaks Tells us About Modern Communication’, RUSI Journal, 155, 4 (August). Bonds, T.M. et al. (2012), Army Network- Enabled Operations (Santa Monica, CA: RAND). Booth, K. (2007), Theory of World Security (Cambridge: Cambridge University Press). Born, H., I. Leigh, A. Wills (eds) (2011), International Intelligence Cooperation and Accountability (London: Routledge/Studies in Intelligence). Born, H., L.K. Johnson, I. Leigh (eds) (2005), Who’s Watching the Spies?: Establishing Intelligence Service Accountability (Dulles, Va.: Potomac). Bousquet, A (2008), ‘Chaoplexic warfare or the future of military organization’, International Affairs, 84, 5. Bousquet, A.J. (2009), The Scientific Way of Warfare (London: Hurst). Bousquet, A., and S. Curtis (2011), ‘Beyond models and metaphors: complex- ity theory, systems thinking and international relations’, Cambridge Review of International Affairs, 24, 1 (March). Bowen, W.Q., and A. Stewart (eds) (2005), ‘Terrorism in the UK: Broadening the Government’s Counter-Terrorist Response – CONTEST’, The Airey Neave Papers (Shrivenham: UK Defence Academy). Bowen, W.Q., M. Cottee and C. Hobbs (2012), ‘Multilateral cooperation and the prevention of nuclear terrorism: pragmatism over idealism’, International Affairs (March). Boyer, Y. (2006), ‘Intelligence Cooperation and Homeland Security’, ch. 9 in E. Brimmer (ed.), Transforming Homeland Security: U.S. and European Approaches (Washington, DC: Center for Transatlantic Relations, John Hopkins University). Bracken, P. (2008a), ‘How to build a warning system’, ch. 2 in his, I. Bremmer and D. Gordon (eds), Managing Strategic Surprise (Cambridge: Cambridge University Press). Bracken, P. (2008b), ‘Intelligence and risk management’, ISN/FPRI (16 December). Bracken, P., I. Bremmer and D. Gordon (eds) (2008), Managing Strategic Surprise: Lessons from Risk Management and Risk Assessment (Cambridge: Cambridge University Press). Breen- Smyth, M. (2009), ‘Between intelligence- gathering and social engineering’, RUSI (28 October). British Academy (2008), ‘Punching our weight: the humanities and social sciences in public policy making’, Report (September). Brooks, R.A. (2008), Shaping Strategy: The Civil-Military Politics of Strategic Assessment (Princeton, NJ: Princeton University Press). Brooks, R.A. (2011), ‘Muslim “Homegrown” Terrorism in the United States: How Serious Is the Threat?’, International Security, 36, 2 (Fall). Bruneau, T.C., and F.C. Matei (2010), ‘Intelligence in the Developing Democracies: The Quest for Transparency and Effectiveness’, ch. 45 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Bruneau, T.C., and S.C. Boraz (eds) (2007), Reforming intelligence: obstacles to democratic control and effectiveness (Austin, TX: University of Texas Press). Bryman, A. (2001), Social Research Methods (Oxford: Oxford University Press). Bürkli, D., J. Bubbers and E. Esenlik (2011), ‘Preventing or Enabling? Counter- radicalization Policy in a Divided Britain’, ISN (5 April). Builta, J.A., and E.N. Heller (2011), ‘Institutionalizing Best Practices: Reflections on 10 Years of Counterterrorism Analysis’, CIA Studies in Intelligence, 55, 3 (September). Select Bibliography 207

Burchill, S. (2001), ‘Realism and Neo- Realism, ch. 3 in his and A. Linklater, R. Devetak, J. Donnelly, M. Paterson, C. Reus- Smit and J. True, Theories of International Relations (Basingstoke: Palgrave Macmillan, 2ed.). Burgess, J.P. (2008), ‘ Non- Military Security Challenges’, ch. 4 in Snyder (ed.), Contemporary Security and Strategy. Burke, J. (2003), Al-Qaeda: Casting a Shadow of Terror (London: I.B. Tauris). Burkholder Smith, J. (1976), Portrait of a Cold Warrior (New York: Putnam’s). Burnham, P., K. Gilland Lutz, W. Grant and Z. Layton- Henry (2004), Research Methods in Politics (Basingstoke: Palgrave Macmillan). Burton, P. (2006), ‘Modernising The Policy Process: Making policy research more significant?’, Policy Studies, 27, 3 (September). Butler Committee (2004), Report into the Review of Intelligence on Weapons of Mass Destruction (14 July). Buzan, B., and L. Hansen (2009), The Evolution of International Security Studies (Cambridge: Cambridge University Press). Byers, M. (2005), War Law: Understanding International Law and Armed Conflict (New York: Grove). Byman, D.L. (2009), ‘Do Targeted Killings Work?’, Foreign Policy (14 July). Byman, D. (2011), ‘Plausible Culpability’, Foreign Policy (28 October). Byman, D.L. (2012), ‘Can We Help Syria without Making Things Worse?’, Brookings (10 February). Calhoun, C. (2008), ‘Cosmopolitanism and nationalism’, Nations & Nationalism, 14, 3. Calvocoressi, P. (1977), ‘The Value of Enigma’, The Listener (3 February). Cannadine, D. (2002), In Churchill’s Shadow: Confronting the Past in Modern Britain (London: Penguin). Catapano, P. (2011), ‘Freedom to Inflame’, NYT Blog (8 April). Carment, D., and M. Rudner (eds) (2006), Peacekeeping Intelligence: New Players, Extended Boundaries (London: Routledge). Carr, J. (2010), Inside Cyber Warfare (Sebastopol, CA: O’Reilly). Caryl, C. (2011a), ‘US Expert Says Robots Are Changing the Face of War’, Radio Free Europe/Radio Liberty (23 June). Caryl, C. (2011b), ‘Predators and Robots at War’, New York Review of Books (29 September). CFR (2008), ‘Interview: Presidents and the National Security Council’, CFR (12 November). CFR (2011), ‘“Reaching Out” – Promoting Community Engagement’, ‘A New Approach to Counter-Radicalization’, ‘U.K. and U.S. Approaches to Countering Radicalization: Intelligence, Communities and the Internet’ and ‘Closing Remarks’, CFR (1 April). Chalmers, M. (2011), ‘Keeping our Powder Dry? UK Defence Policy Beyond Afghanistan’, RUSI Journal, 56, 1 (February). Charmley, J. (1999), ‘Splendid Isolation’? Britain and the Balance of Power 1874–1914 (London: Hodder & Stoughton). Chellaney, B. (2012), ‘Asia’s Worsening Water Crisis’, Survival, 54, 2. CIA (2009), ‘Intelligence in Contemporary Media: Views of Intelligence Officers’, CIA Studies in Intelligence, 53, 2 (Summer Supplement). Clarke, R.A. (2008), Your Government Failed You (New York: Ecco Press). Clarke, R.A., and R.K. Knake (2010), Cyber War (New York: Ecco). 208 Select Bibliography

Clemmesen, Brig.-Gen. M. (2007), The Danish Armed Forces 1909–1918: Between politicians and strategic reality (Copenhagen, Denmark: Royal Danish Defence College/FAK). Chaudhuri, R., and T. Farrell (2011), ‘Campaign disconnect: operational prog- ress and strategic obstacles in Afghanistan, 2009–2011’, International Affairs, 87, 2 (March). Clapper, Jr., J.R. (2010), ‘The Role of Defense in Shaping U.S. Intelligence Reform’, ch. 38 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Clapper, J.R., US Director of National Intelligence (2012), Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence (31 January). Clarke, C. and H. Kassim (2012), ‘Introducing the “Too Difficult Box”’, The Political Quarterly, 83. Clauser, J. and J. Goldman (revised/ed.) (2008), An Introduction to Intelligence Research and Analysis (Lanham, MD: Scarecrow). Clemente, D. (2011), ‘WikiLeaks: Unsteady Drip’, The World Today (March). Clemente, J.D., and S. Marrin (2006-07), ‘Modeling an Intelligence Analysis Profession on Medicine’, International Journal of Intelligence and Counter- Intelligence, 19, 4 (Winter). Clemente, J.D., and S. Marrin (2005), ‘Improving Intelligence Analysis by Looking to the Medical Profession’, International Journal of Intelligence and CounterIntelligence, 18, 4. Clift, A.D. (2003), ‘Intelligence in the Internet Era: From Semaphore to Predator’, CIA Studies in Intelligence, 47, 3. Clift, A.D. (2010), ‘The Evolution of International Collaboration in the Global Intelligence Era’, ch. 13 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Clifton, J. (2011), The Coming Jobs War (US: Gallup Press). Cline, R.S. (1976), Secrets, Spies and Scholars: Blueprint of the Essential CIA (Washington, DC: Acropolis Books). Clough, C. (2004), ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, International Journal of Intelligence and CounterIntelligence, 17, 4. Clutterbuck, L. (2006), ‘Developing A Counter- Terrorism Network: Back to the Future?’, ch. 2 in P. Katona, J. Sullivan, M.D. Intriligator (eds), Countering Terrorism and WMD (London: Routledge). CNN (2011), ‘Book excerpt: “The Interrogator: An Education” by former CIA officer Glenn L. Carle’, CNN Blog (17 June). Cobb, A. (2011), ‘Intelligence Adaptation: The Bin Laden Raid and its Consequences for US Strategy’, RUSI Journal, 156, 4 (August). Cogan, C. (2004), ‘Hunters not Gatherers’, ch. 10 in L. Scott and P.D. Jackson (eds), Understanding Intelligence in the Twenty- First Century: Journeys in Shadows (London: Routledge). Cohen, M. (2011a), ‘Deck Chairs on the Titanic’, Foreign Policy (9 February). Cohen, S.P. (2011b), ‘Coping with a Failing Pakistan’, Brookings (February). Coker, C. (2009), War in an Age of Risk (Cambridge: Polity). Colaresi, M. (2012), ‘A Boom with Review: How Retrospective Oversight Increases the Foreign Policy Ability of Democracies’, American Journal of Political Science. Select Bibliography 209

Cole, D. (2011a), ‘Gitmo Forever? Congress’s Dangerous New Bill’, New York Review of Books (8 December). Cole, D. (2011b), ‘A Secret License to Kill’, New York Review of Books (19 September). Coll, S. (2011), ‘The Internet: For Better or for Worse’, New York Review of Books (7 April). Collins, P. (2002), Virtual and Networked Organizations (Oxford: Capstone). Comfort, L.K., A. Boin, and C.C. Demchak (eds) (2010), Designing Resilience: Preparing for Extreme Events (Pittsburgh, PA: University of Pittsburgh Press). Corera, G. (2011), The Art of Betrayal (London: W&N). Cornelissen, J. (2008), ‘Issue and Crisis Management’, ch. 10 in his, Corporate Communication (London: Sage, 2ed.). Cornish, P. (2010), ‘Technology, strategy and counterterrorism’, International Affairs, 86, 4 ( June). Cornish, P. and A.M. Dorman (2012), ‘Smart muddling through: rethinking UK national strategy beyond Afghanistan’, International Affairs, 88. Coulthart, S. (2012), ‘Social Cohesion and Counter- Terrorism: A Policy Contradiction?’, Journal of Comparative Policy Analysis: Research and Practice, 14, 1. Cowper- Coles, S. (2011), Cables from Kabul (London: Harperpress). Cox, M. (2005), ‘Empire by denial: the strange case of the United States’, International Affairs, 81, 1. Coyne, J.W., and P. Bell (2011), ‘Strategic intelligence in law enforcement: a review’, Journal of Policing, Intelligence and Counter Terrorism, 6, 1. Crawford, M. (2011), ‘Exploring the Maze: Counter- proliferation Intelligence’, Survival, 53, 2. Crelinsten, R.D. (2006), Intelligence and Counter- Terrorism in a Multi- Centric World (Stockholm: Swedish National Defence College – SNDC/FHS). Crocker, C.A., F. Osler Hampson and P. Aall (2011), ‘Collective conflict manage- ment: a new formula for global peace and security cooperation?’, International Affairs, 87, 1 ( January). Cronin, A.K. (2002/03), ‘Behind the Curve: Globalization and International Terrorism’, International Security, 27, 3 (Winter). Cronin, A.K. (2010), ‘The Evolution of Counterterrorism: Will Tactics Trump Strategy?’, International Affairs, 86, 4 ( June). Crooke, A. (2011), ‘Permanent Temporariness’, London Review of Books, 33, 5, 3 (March). Crow, A. (2011), ‘9/11 Ten Years On: A Risk Diffused’, Chatham House (1 September). Dalby, S. (2008), ‘Imperialism, Domination, Culture: The Continued Relevance of Critical Geopolitics’, Geopolitics, 13, 3. Dalby, S. (2011), ‘Critical Geopolitics and the Control of Arms in the 21st Century’, Contemporary Security Policy, 32, 1. Danchev, A. (1998), On Specialness: Essays in Anglo- American Relations (Basingstoke: Macmillan). Daniels, P., M. Bradshaw, D. Shaw and J. Sidaway (eds) (2008), An Introduction to Human Geography: Issues for the 21st Century (Harlow: Pearson [3ed.]). Davies, P.H.J. (2001), ‘Doing Politics: Spies as Informants: Triangulation and the Interpretation of Elite Interview Data in the Study of the Intelligence and Security Services’, Politics, 21, 1. 210 Select Bibliography

Davies, P.H.J. (2002), ‘Ideas of Intelligence: Divergent National Concepts and Institutions’, Harvard International Review, 24, 3 (Fall/September). Davies, P.H.J. (2004a), ‘Intelligence Culture and Intelligence Failure in Britain and the United States’, Cambridge Review of International Affairs, 17, 3 (October). Davies, P.H.J. (2004b), MI6 and the Machinery of Spying (London: Frank Cass). Davies, P.H.J. (2009a), ‘Theory and intelligence reconsidered’, ch. 11 in P. Gill, S. Marrin and M. Phythian (eds), Intelligence Theory: Key Questions and Debates (London: Routledge/Studies in Intelligence Series). Davies, P.H.J. (2009b), ‘Imagery in the UK: Britain’s troubled imagery intelligence architecture’, Review of International Studies, 35. Davies, P.H.J. (2011), ‘Twilight of Britain’s Joint Intelligence Committee?’, International Journal of Intelligence and CounterIntelligence, 24, 3. Davies, P.H.J. (2012), Intelligence and Government in Britain and the United States: A Comparative Perspective (Santa Barbara, CA: Praeger Security International). de Blij, H. (2009), The Power of Place: Geography, destiny and globalization’s rough landscape (Oxford: Oxford University Press). de Coning, C., H. Lurås, N.N. Schia and S. Ulriksen (2009), ‘Norway’s Whole- of- Government Approach and its Engagement with Afghanistan’, Security in Practice – NUPI Report, 8. de Wijze, S. (2009), ‘Targeted killing: a “dirty hands” analysis’, Contemporary Politics, 15, 3 (September). Dearlove KCMG OBE, Sir Richard (2009), ‘Our Changing Perceptions of National Security’, 2009 Peter Nailor Memorial Lecture on Defence (Gresham College, London, 25 November). DeGroot, G. (2011), ‘Killing the Wizard’, ISN (12 May). Dimitriu, G.R. (2012), ‘Winning the story war: Strategic communication and the conflict in Afghanistan’, Public Relations Review, 38. Dimmer, Jr, J.P. (aka. F.M. Begoum) (1962a), ‘Observations on the ’, CIA Studies in Intelligence, 6 (Winter). Dimmer, Jr, J.P. (aka. F.M. Begoum) (1962b), ‘You And Your Walk-In’, CIA Studies in Intelligence, 6 (Spring). Dodds, K. (2007), Geopolitics (Oxford: Oxford University Press). Dover, R. (2007), ‘For Queen and Company: The Role of Intelligence in the UK’s Arms Trade’, Political Studies, 55, 4. Dover, R. (2011), ‘Inside British Intelligence: 100 Years of MI5 and MI6’, Defence Studies, 11, 2 ( June). Dover, R., and M.S. Goodman (eds) (2009), Spinning Intelligence: Why Intelligence Needs the Media, Why the Media Needs Intelligence (London: Hurst). Dover, R., and M.S. Goodman (eds) (2011), Learning from the Secret Past: Cases in British Intelligence History (Washington, DC: Georgetown University Press). Dover, R., and M. Phythian (2011), ‘Lost Over Libya: The 2010 Strategic Defence and Security Review – An Obituary’, Defence Studies, 11, 3. Downes, C. (2010), ‘Unintentional Militarism: Over- reliance on Military Methods and Mindsets in US National Security and its Consequences’, Defense & Security Analysis, 26, 4. Drezner, D.W., G. Rachman, R. Kagan (2012), ‘The Rise or Fall of the American Empire’, Foreign Policy (14 February). Select Bibliography 211

Duchâtel, M., and B. Gill (2012), ‘Overseas citizen protection: a growing challenge for China’, SIPRI (12 February). Drumheller, T., with E. Monaghan (2007), On the Brink (London: Politico’s). Dujmovic, N. (2011), ‘Getting CIA History Right: The Informal Partnership Between Agency Historians and Outside Scholars’, Intelligence and National Security, 26, 2 & 3. Dupont, A., and W.J. Reckmeyer (2012), ‘Australia’s national security priorities: addressing strategic risk in a globalised world’, Australian Journal of International Affairs, 66, 1. Dutch Review Committee for the Intelligence and Security Services (2009), ‘On the cooperation of GISS [Dutch General Intelligence and Security Service (GISS/AIVD)] with foreign intelligence and/or security services’, Review Report CTIVD no. 22A. Dylan, H. and M.S. Alexander (2012), ‘Intelligence and National Security: A Century of British Intelligence’, Intelligence and National Security, 27, 1. Edmund- Davies, J.H. (2011), ‘On Her Majesty’s Commercial Service: Bribery, Public Officials and the UK Intelligence Services’, The Modern Law Review, 74, 6 (November). Edmunds, T. (2012), ‘British civil–military relations and the problem of risk’, International Affairs, 88. Edwards, C. (2006), ‘The case for a [UK] national security strategy’, Demos Report (February). Egeland, J. (2010), ‘War, Peace and Climate Change: A Billion Lives in the Balance’, ch. in M. Pilisuk and M.N. Nagler (eds), Peace Movements Worldwide: History, Psychology and Practices, Vol. I- III (Westport, CT: Praeger). Egnell, R., and P. Haldén (2010), ‘Contextualising international statebuilding’, Conflict, Security & Development, 10, 4 (September). Egnell, R. (2011), ‘Lessons from Helmand, Afghanistan: what now for British counterinsurgency?’, International Affairs, 87, 2 (March). Elsea, J.K. (2011), ‘Intelligence Identities Protection Act’, US Congressional Research Service Report (28 January). Enemark, C. (2011), ‘Drones over Pakistan: Secrecy, Ethics, and Counterinsurgency’, Asian Security, 7, 3. English, R. (2004), Armed Struggle: The History of the IRA (Basingstoke: Pan). Esfandiary, D., and E. Hokayem (2011), ‘Rising tensions in Iran and Saudi Arabia’s Cold War’, IISS Voices (27 October). Evans, G., and J. Newnham (1998), The Penguin Dictionary of International Relations (London: Penguin). Eznack, L. (2011), ‘Crises as Signals of Strength: The Significance of Affect in Close Allies’ Relationships’, Security Studies, 20, 2. Fägersten, B. (2010), ‘Bureaucratic Resistance to International Intelligence Cooperation – The Case of Europol’, Intelligence and National Security, 25, 4 (August). Falk, R. (2012) ‘The Menace of Present & Future Drone Warfare’, Foreign Policy Journal (13 February). Farson, S., and R. Whitaker (2010), ‘Accounting for the Future or the Past?: Developing Accountability and Oversight Systems to Meet Future Intelligence Needs’, ch. 41 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. 212 Select Bibliography

Faulkner, A., B. Lange and C. Lawless (2012), ‘Introduction: Material Worlds: Intersections of Law, Science, Technology, and Society’, Journal of Law and Society, 39, 1 (March). Fawcett, P., and C. Daugbjerg (2012), ‘Explaining Governance Outcomes: Epistemology, Network Governance and Policy Network Analysis’, Political Studies Review, 10. Ferguson, C.D. (2012), ‘Why Physicists Have a Responsibility to Society’, Federation of American Scientists (FAS), Presentation to the March Meeting of the American Physical Society (27 February). Ferris, E., and D. Petz (2011), ‘A Year of Living Dangerously: A Review of Natural Disasters in 2010’, Brookings (April). Ferris, J. (2010), ‘Signals Intelligence in War and Power Politics, 1914–2010’, ch. 10 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Fingar, T., Deputy Director for National Intelligence for Analysis and Chairman of the US National Intelligence Council (NIC) (2008), ‘5. TRANSCRIPT: Speech by Dr. Thomas Fingar at the Council on Foreign Relations’, Media Highlights (Wednesday, 19 March [UNCLASSIFIED]). Fingar, T. (2011), Reducing Uncertainty: Intelligence Analysis and National Security (Stanford, CA: Stanford University Press). Finlan, A. (2009a), Special Forces, Strategy and the War on Terror: Warfare by Other Means (London: Routledge/Routledge Military Studies series). Finlan, A (2009b), ‘The (Arrested) Development of UK Special Forces and the Global War on Terror’, Review of International Studies, 35. Finlay, B., and J. Bergenäs (2010), ‘The West Must Expend Resources Wisely in Yemen’, World Politics Review (12 October). Fisher, J. (2010a), ‘Gentleman Spies in Asia’, Asian Affairs, 41, 2 ( July). Fisher, L. (2010b), ‘Rethinking the State Secrets Privilege’, ch. 40 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Fisher, QC, J. (2012), Rescuing Human Rights, www.henryjacksonsociety.org (March). Fitz- Gerald, A.M. (2008), ‘A UK National Security Strategy: Institutional and Cultural Challenges’, Defence Studies, 8, 1. Fitzpatrick, M. (2011), ‘IAEA report puts Iran on back foot’, IISS Voices (9 November). Flanik, W. (2011), ‘“Bringing FPA Back Home:” Cognition, Constructivism, and Conceptual Metaphor’, Foreign Policy Analysis (20 July). Flint, C., and P. Taylor (2007), Political Geography: World- Economy, Nation- State and Locality (Harlow: Pearson). Flynn, S.E. (2007), The Edge of Disaster: Rebuilding a Resilient Nation (New York: Random House). Flynn, S.E. (2008), ‘America the Resilient: Defying Terrorism and Mitigating Natural Disasters’, Foreign Affairs (March/April). Foley, R.T., S. Griffin and H. McCartney (2011), ‘“Transformation in contact”: learning the lessons of modern war’, International Affairs, 87, 2 (March). Foot, M.R.D. (selected) (2002), Secret Lives: Lifting the Lid on Worlds of Secret Intelligence (Oxford: Oxford University Press). Foss, S.K., and K.A. Foss (2011), ‘Constricted and Constructed Potentiality: An Inquiry Into Paradigms of Change’, Western Journal of Communication, 75, 2 (March). Select Bibliography 213

Franke, V.C., and R.H. Dorff (eds) (2012), Conflict Management and “Whole of Government”: Useful Tools for U.S. National Security Strategy?, http://www. StrategicStudiesInstitute.army.mil/ (April). Frantz, C.M., and F.S. Mayer (2009), ‘The Emergency of Climate Change: Why Are We Failing to Take Action?’, Analyses of Social Issues and Public Policy, 9, 1 ( June). Frantzen, D. (2010), ‘Interrogation strategies, evidence, and the need for Miranda: a study of police ideologies’, Police Practice and Research, 11, 3 ( June). Frederiksen, H.D. (2009), ‘The World Water Crisis and International Security’, Middle East Policy, 16, 4 (December). Freedman, L. (1995), ‘Alliance and the British way in warfare’, Review of International Studies, 21. Freier, N. (2009), Toward a Risk Management Defense Strategy, http://www.Strategic StudiesInstitute.army.mil/ (August). Friedersdorf, C. (2011), ‘The Civil Liberties Primary: What Issues Matter Most?’, The Atlantic (April). Friedersdorf, C. (2012), ‘The Obama Administration’s Abject Failure on Transparency’, The Atlantic, (February). Fritsch, S. (2011), ‘Technology and Global Affairs’, International Studies Perspectives, 12, 1 (February). Froscher, T. (2010), ‘Indispensable Intelligence and Inevitable Failures’, The NonProliferation Review, 17, 2 ( July). Fulk, B. (2011), An Evaluation of counterinsurgency as a Strategy for Fighting the Long War, http://www.StrategicStudiesInstitute.army.mil/ (March). Fullilove, M. (2010), ‘WikiLeaks: Fruit of an Unhealthy Tree’, Brookings (16 December). Gagliardi, P. (2012), ‘Transnational organized crime and gun violence. A case for firearm forensic intelligence sharing’, International Review of Law, Computers & Technology, 26, 1. Galgano, F.A., and E.J. Palka (eds) (2011), Modern Military Geography (London: Routledge). Gallaher, C., C.T. Dahlman, M. Gilmartin, A. Mountz with P. Shirlow (2009), Key Concepts in Political Geography (London: Sage). Gaskarth, J. (2011), ‘Entangling alliances? The UK’s complicity in torture in the global war on terrorism’, International Affairs, 87, 4 ( July). Gates, R.M. (2009), ‘A Balanced Strategy: Reprogramming the Pentagon for a New Age’, Foreign Affairs ( January/February). Gearty, C. (2011), ‘Short Cuts: Counterterrorism’, London Review of Books, 33, 17 (8 September). George, R. (2010), ‘Intelligence and Strategy’, ch. 8 in J. Baylis, J.J. Wirtz and C.S. Gray (eds), Strategy in the Contemporary World (Oxford: Oxford University Press [3ed.]). George, R.Z. (2011), ‘Intelligence in Public Literature: In Defense of Irrelevance’, CIA Studies in Intelligence, 55, 4 (December). George, R.Z., and J.B. Bruce (eds) (2008), Analyzing Intelligence: Origins, Obstacles and Innovations (Washington, DC: Georgetown University Press). George, R.Z., and R.D. Kline (eds) (2005), Intelligence and the National Security Strategist: Enduring Issues and Challenges (New York: Rowman & Littlefield). George, R.Z., and H. Rishikof (eds) (2011), The National Security Enterprise: Navigating the Labyrinth (Washington, DC: Georgetown University Press). 214 Select Bibliography

Gerber, B. (2005), ‘Managing HUMINT: The Need for a New Approach’, ch. 11 in J. Sims and his (eds), Transforming U.S. Intelligence (Washington, DC: Georgetown University Press). Ghauri, P., and S. Powell (2008), Globalization (New York: DK). Ghemawat, P. (2007), ‘Why the World Isn’t Flat’, Foreign Policy (March/April). Giegerich, B., and A. Nicoll (2012), ‘The Struggle for Value in European Defence’, Survival, 54, 1. Gill, P., and M. Phythian (2006), Intelligence in an Insecure World (Cambridge: Polity). Gill, P. (2007) ‘Evaluating Intelligence Oversight Committees: The UK Intelligence and Security Committee and the “War on Terror”’, Intelligence and National Security, 22, 1 (February). Gill, P. (2009a), ‘The Intelligence and Security Committee and the challenge of security networks’, Review of International Studies, 35, 4 (October). Gill, P. (2009b), ‘Theories of intelligence: where we are, where should we go and how might we proceed?’, ch. 12 in his, Marrin and Phythian (eds), Intelligence Theory. Gill, P., S. Marrin and M. Phythian (eds) (2009c), Intelligence Theory: Key Questions and Debates (London: Routledge). Gilmore, M. (2011), ‘Secrecy and Transparency: Striking the Balance’, RUSI (October). Gills, B.K. (2010), ‘The Return of Crisis in the Era of Globalization: One Crisis, or Many?’, Globalizations, 7, 1–2. Gladwell, M. (2000), The Tipping Point (London: Little, Brown). Glaser, A. (2008), ‘Characteristics of the Gas Centrifuge for Uranium Enrichment and Their Relevance for Nuclear Weapon Proliferation’, Science & Global Security: The Technical Basis for Arms Control, Disarmament, and Nonproliferation Initiatives, 16, 1–2. Glees, A., P.H.J. Davies and J.N.L. Morrison (2006), The Open Side of Secrecy: Britain’s Intelligence and Security Committee (London: Social Affairs Unit). Glenny, M. (2011a), ‘Mobsters get homesick too’, London Review of Books, 33, 13 (30 June). Glenny, M. (2011b), Darkmarket (London: Bodley Head). Global Trends (2008), ‘Food Supply Project: UK Food Supply in the 21st Century: The New Dynamic’, Chatham House. Goerke, L. (2012), ‘ Enterprise- wide change: superior results through systems thinking’, Police Practice and Research, 13, 1. Goldman, J. (eds) (2006 & 2010), Ethics of Spying: Volumes 1 & 2 (Lanham, MD: Scarecrow). Goldstone, J.A. (2010), ‘The New Population Bomb’, Foreign Affairs ( January/ February). González Fuster, G., and R. Gellert (2012), ‘The fundamental right of data pro- tection in the European Union: in search of an uncharted right’, International Review of Law, Computers & Technology, 26, 1. Goodman, M.S. (2006), ‘Intelligence Education: Studying and Teaching About Intelligence: The Approach in the United Kingdom’, CIA Studies in Intelligence, 50, 2. Goodman, M.S. (2007), Spying on The Nuclear Bear: Anglo- American Intelligence and the Soviet Bomb (Stanford, CA: Stanford University Press). Select Bibliography 215

Goodman, M.S., and Sir D. Omand (2008), ‘Teaching Intelligence Analysts in the UK. What Analysts Need to Understand: The King’s Intelligence Studies Programme’, CIA Studies in Intelligence, 52, 4. Goodwin, M. (2011), ‘Right Response: Understanding and Countering Populist Extremism in Europe’, Chatham House Report (September). Gowing, N. (2009), ‘“Skyful of Lies” and Black Swans: The new tyranny of shifting information power in crises’, Challenges (Oxford: Reuters Institute for the Study of Journalism, University of Oxford, April). Graham, Senator B., with J. Nussbaum (2008), Intelligence Matters (University Press of Kansas). Graham, Jr., T., and K.A. Hansen (2009), Preventing Catastrophe (Stanford, CA: Stanford University Press). Grant, C. (2000), ‘Intimate relations: Can Britain play a leading role in European defence – and keep its special links to US intelligence?’, Centre for European Reform Working Paper (April). Grayling, A.C. (2009), Liberty in the Age of Terror (London: Bloomsbury). Gregory, D., R. Johnston, G. Pratt, M.J. Watts, S. Whatmore (eds) (2009), The Dictionary of Human Geography (Oxford: Wiley- Blackwell [5ed.]). Grethlein, J. (2010), ‘Experientiality and “Narrative Reference,” with thanks to Thucydides’, History and Theory, 49, 3 (October). Griffin, L. (2012), ‘Where is Power in Governance? Why Geography Matters in the Theory of Governance’, Political Studies Review, 10. Griffiths, M., and T. O’Callaghan (2002), International Relations: The Key Concepts (London: Routledge). Grob-Fitzgibbon, B. (2011), ‘Intelligence and Counter-Insurgency: Case Studies from Ireland, Malaya and the Empire’, RUSI Journal, 156, 1 (February). Guéhenno, J-M. (1998–99), ‘The Impact of Globalisation on Strategy’, Survival, 40, 4 (Winter). Gustafson, K. (2010), ‘Strategic Horizons: Futures Forecasting and the British Intelligence Community’, Intelligence and National Security, 25, 5 (October). Gwertzman, B., and J.B. Bellinger (2010), ‘Interview: The Legal Case against WikiLeaks’, CFR (13 December). Habegger, B. (2009a), ‘Horizon Scanning in Government: Concept, Country Experiences, and Models for Switzerland’, CSS/ETH Zürich (February). Habegger, B. (2009b), ‘Strategic foresight in public policy’, CSS/ETH Zürich (August). Haddick, R. (2010), ‘This Week at War: Obama vs. Team Surge’, Foreign Policy (24 September). Haddick, R. (2011), ‘Rise of the Irregulars’, Foreign Policy (10 June). Hall, I. (2006), ‘Review article: World government and empire: the international historian as theorist’, International Affairs, 82, 6. Handel, M.I. (2001), Masters of War: Classical Strategic Thought (London: Routledge [3ed.]). Hansen, P.H. (2011a), Second to None: US Intelligence Activities in Northern Europe, 1943–46 (Dordrecht, NL: Republic of Letters). Hansen, H.K. (2011b), ‘Managing corruption risks’, Review of International Political Economy, 18, 2. Hanson, F. (2011), ‘Harnessing the Power of Social Media in International Relations’, ISN (31 March). 216 Select Bibliography

Harnden, T. (2000), ‘Bandit Country’: The IRA & South Armagh (London: Hodder & Stoughton). Harris, S. (2006), ‘The First Amendment and Dangerous Information: Restrictions are justifiable’, The National Law Journal (7 December). Harris-Hogan, S. (2012), ‘Australian Neo-Jihadist Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence’, Studies in Conflict & Terrorism, 35, 4. Hastedt, G. (2010), ‘The Politics of Intelligence Accountability’, ch. 43 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Hawker, G. (2012), ‘The New Scramble for Africa’ and ‘Food Security’, Australian Journal of International Affairs, 66, 2. Hayman, A., with M. Gilmore (2009), The Terrorist Hunters (London: Bantam). Heazle, M. (2010), ‘Policy Lessons from Iraq on Managing Uncertainty in : Why the Strategic/Tactical Distinction Matters’, Intelligence and National Security, 25, 3 ( June). Hedström, P. (2005), Dissecting the Social: On the Principles of Analytical Sociology (Cambridge: Cambridge University Press). Hedström, P., and P. Bearman (eds.) (2009), The Oxford Handbook of Analytical Sociology (Oxford: Oxford University Press). Hegghammer, T. (2010), Jihad in Saudi Arabia: Violence and Pan- Islamism since 1979 (Cambridge: Cambridge University Press). Heisbourg, F. (2011), ‘Leaks and Lessons’, Survival, 53, 1 (February/March). Held, D., and A. McGrew (2007), Globalization/ Anti-Globalization: Beyond the Great Divide (Cambridge: Polity [2ed.]). Helfstein, S. (2011), ‘Backfire: Behavioral Decision Making and the Strategic Risks of Successful Surprise’, Foreign Policy Analysis. Helmus, T., and D.D. Kaye (2009), ‘Fighting Terror the Cold War Way’, Foreign Policy (14 October). Hennessey, P. (2009), The Junior Officers’ Reading Club (London: Allen Lane). Hennessy, P. (2003), The Secret State: Whitehall and the Cold War (London: Penguin). Hennessy, P. (2010), The Secret State: Preparing For The Worst 1945–2010 (London: Penguin). Hennessy, Lord Peter, Attlee Professor of Contemporary British History, Queen Mary, University of London (2011), ‘The Horizon Scanner’s Craft’, Lord Garden Memorial Lecture, Chatham House (23 June). Herman, M. (1996), Intelligence Power in Peace and War (Cambridge: Cambridge University Press/Chatham House – Royal Institute of International Affairs – RIIA). Herman, M. (2001a), Intelligence Services in the Information Age (London: Frank Cass). Herman, M. (2001b), ‘Sharing Secrets’, The World Today (December). Herman, M. (2002), ‘11 September: Legitimising Intelligence?’, International Relations, 16, 2. Herman, M. (2003), ‘Counter- Terrorism, Information Technology and Intelligence Change’, Intelligence and National Security, 18, 4 (Winter). Herman, M. (2004), ‘Ethics and Intelligence after September 2001’, Intelligence and National Security, 19, 2 ( June). Hermsmeyer, G.A. (2010), ‘Institutionalizing Security Sector Reform: Options for the U.S. Government’, USIP Special Report, 255 (October). Select Bibliography 217

Hersh, S.M. (2008), ‘Annals of National Security: Preparing the Battlefield: The Bush Administration steps up its secret moves against Iran’, The New Yorker (7 July). Heuser, B. (2010), The Evolution of Strategy: Thinking War from Antiquity to the Present (Cambridge: Cambridge University Press). Heuser, B. (2012), ‘Atrocities in Theory and Practice: An Introduction’, Civil Wars, 14, 1. Heyvaert, V. (2011), ‘Governing Climate Change: Towards a New Paradigm for Risk Regulation’, The Modern Law Review, 74, 6 (November). Hibbs, M. (2011), ‘Atomic Dreams’, Foreign Policy (9 November). Hill, C. (2003), The Changing Politics of Foreign Policy, Basingstoke: Palgrave Macmillan. Hill, C. (2010), ‘BRITISH FOREIGN POLICY PRIORITIES: Tough Choices’, The World Today (April). Hillebrand, C. (2011), ‘Guarding EU- wide Counter- terrorism Policing: The Struggle for Sound Parliamentary Scrutiny of Europol’, Journal of Contemporary European Research ( JCER), 7, 4. Hiltermann, J.R. (2009), ‘Iraq on the Edge’, New York Review of Books, 56, 18 (19 November). Hindle, G. (2010), ‘Is it time to give parliamentary oversight of intelligence some teeth?’, RUSI (22 February). Hinsley, F.H. (1979–90), British Intelligence in the Second World War (London: HMSO [5 vols.]). Hitz, F.P. (2005), The Great Game: The Myth and Reality of (New York: Knopf). Hitz, F.P. (2008), Why Spy? Espionage in an Age of Uncertainty (New York: St. Martin’s Press). Hoffman, B. (2006), Inside Terrorism (New York: Columbia University Press). Hollingsworth, M., and N. Fielding (1999), Defending the Realm: Inside MI5 and the War on Terrorism (London: André Deutsch). Holt, T.J. (2012), ‘Exploring the Intersections of Technology, Crime, and Terror’, Terrorism & Political Violence, 24, 2. Homans, C. (2011), ‘WikiLosers’, Foreign Policy (25 March). Hood, C., H. Rothstein and R. Baldwin (2004), The Government of Risk: Understanding Risk Regulation Regimes (Oxford: Oxford University Press). Hook, S.W. (2011), ‘Review: Understanding Foreign Policy Decision- Making – By Alex Mintz and Karl DeRouen; Groupthink Versus High- Quality Decision Making in International Relations – By Mark Schafer and Scott Crichlow’, Political Psychology ( June). Hough, P. (2004), Understanding Global Security (London: Routledge). Howard, M. (1989), The Continental Commitment (London: Ashfield Press). Howard, P. (2010), ‘Triangulating Debates Within the Field: Teaching International Relations Research Methodology’, International Studies Perspectives, early view issue (4 October). Hudson, L., C.S. Owens and M. Flannes (2011), ‘Drone Warfare: Blowback from the New American Way of War’, Middle East Policy, 18, 3 (Fall). Hughes, G. (2010), ‘The use of undercover military units in counter- terrorist operations: a historical analysis with reference to contemporary anti-terrorism’, Small Wars & Insurgencies, 21, 4. 218 Select Bibliography

Hughes, G. (2011a), ‘The Cold War and Counter-Insurgency’, Diplomacy & Statecraft, 22, 1 (March). Hughes, G. (2011b), ‘The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies’, The Letort Papers, http://www.Strategic StudiesInstitute.army.mil/ (May). Hughes, R.G., P. Jackson, L. Scott (eds) (2008), Exploring Intelligence Archives: Enquiries into the Secret State (London: Routledge). Hughes- Wilson, J. (2004), The Puppet Masters (London: Cassell). Hughes- Wilson, J. (2010), ‘Book Review: James Igoe Walsh, The International Politics of Intelligence Sharing, Columbia University Press, 2009’, RUSI Journal, 155, 2 (April/May). Hulnick, A.S. (1991-2) ‘Intelligence Cooperation in the Post- Cold War Era: A New Game Plan?’, International Journal of Intelligence and CounterIntelligence, 5, 4 (Winter). Hulnick, A.S. (2009), ‘Podcast: Past, Present and Future of OSINT’, ISN (21 October). IA (2009), ‘Tackling the resource challenges in the 21st century: avoiding worst case scenarios’, International Affairs, 85, 6 (November). Ignatieff, M. (2005), The Lesser Evil (Princeton, NJ: Princeton University Press). IISS (2008), IISS Strategic Survey 2008 (London: Routledge/IISS). IISS (2010), IISS Strategic Survey 2010 (London: Routledge/IISS). IISS (2011), ‘National Security in Practice: The first 18 months of The National Security Council’, IISS Voices (30 November). Immerman, R.H. (2011), ‘Transforming Analysis: The Intelligence Community’s Best Kept Secret’, Intelligence and National Security, 26, 2 & 3. Indyk, M.S., K.G. Lieberthal and Michael O’Hanlon (2012), Bending History: Barack Obama’s Foreign Policy (Washington, DC: Brookings). Ingebrigtsen, Norwegian State Secretary R. (2011), ‘From the High North to terrorism – Norwegian Perspectives’, egjeringen.no (24 November). Inkster, N. (2010), ‘Review Essay: Defending the Realm’, Survival, 52, 2 (April). Inkster, N. (2011a), ‘Balancing secrecy with openness and accountability’, IISS Voices (21 November). Inkster, N. (2011b), ‘9/11/11: A Decade of Intelligence’, Survival, 53, 6. Inkster, N. (2012), ‘The Enigma of Pakistan’, Survival, 54, 2. International Working Group on National Security (IWGNS) (2010), ‘National Values and National Interests in National Security Policy’, Global Policy Brief No.2 (September). Ishiyama, J., and M. Breuning (2012), ‘Educational Access and Peace Duration in Post- Conflict Countries’, International Interactions: Empirical and Theoretical Research in International Relations, 38, 1. ISN (2011), ‘Current Justifications of Classical Geopolitics’, ISN (28 November). ISN (2012a), ‘International Law and the Use of Force: The Case of Iraq’, ISN (24 January). ISN (2012b), ‘The Security- Development Nexus: An Illusion?’, ISN (10 February). Jackson, P., and J.L. Siegel (eds) (2005), Intelligence and Statecraft: The Use and Limits of Intelligence in International Society (Greenwood). Jakub, J. (1999), Spies and Saboteurs: Anglo- American Collaboration and Rivalry in Human Intelligence Collection and Special Operations, 1940–45 (New York: St. Martin’s). Select Bibliography 219

Jeffrey, K. (2010), MI6: The History of the Secret Intelligence Service 1909–1949 (London: Bloomsbury). Jeffreys- Jones, R. (2010), ‘The Rise and Fall of the CIA’, ch. 8 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Jenkins, B.M., and J.P. Godges (eds) (2011), The Long Shadow of 9/11: America’s Response to Terrorism (Santa Monica, CA: RAND). Jennings, W., and M. Lodge (2011), ‘Governing Mega- Events: Tools of Security Risk Management for the FIFA 2006 World Cup in Germany and London 2012 Olympic Games’, Government and Opposition, 46, 2 (April). Jensen, R.B. (2004), ‘Daggers, Rifles and Dynamite: Anarchist Terrorism in Nineteenth Century Europe’, Terrorism and Political Violence, 16, 1 (Spring). Jensen, R.B. (2009), ‘The International Campaign Against Anarchist Terrorism, 1880–1930s’, Terrorism and Political Violence, 21, 1 ( January). Jentleson, B.W., and E. Ratner (2011), ‘Bridging the Beltway–Ivory Tower Gap’, International Studies Review, 13, 1 (March). Jervis, R. (2010), Why Intelligence Fails (Ithaca, NY: Cornell University Press). Jervis, R., and reply by T. Powers (2010), ‘The CIA & Iraq – How the White House Got Its Way: An Exchange’, New York Review of Books (15 July). Johnson, L.K. (2003), ‘Bricks and Mortar for a Theory of Intelligence’, Comparative Strategy, 22, 1. Johnson, L. (2006), ‘The Liaison Arrangements of the Central Intelligence Agency’, ch. 2 in A.G. Theoharis and R.H. Immerman (eds), The Central Intelligence Agency: Security Under Scrutiny (US: Greenwood). Johnson, L.K. (ed.) (2007), Handbook of Intelligence Studies (London: Routledge). Johnson, L.K. (ed.) (2010), The Oxford Handbook of National Security Intelligence (Oxford: Oxford University Press). Johnson, L.K. (2011), ‘National Security Intelligence in the United States: A Performance Checklist’, Intelligence and National Security, 26, 5 (October). Johnson, W.R. (1976), ‘Clandestinity and Current Intelligence’, CIA Studies in Intelligence, 20, 3 (Fall). Jones, B. (2010), Failing Intelligence: The True Story of How We Were Fooled Into Going to War in Iraq (London: Dialogue). Jordan, J. (2012), ‘Analysis of Jihadi Terrorism Incidents in Western Europe, 2001–2010’, Studies in Conflict & Terrorism, 35, 5. Jorgensen, N. (2009), ‘Impunity and Oversight: When Do Governments Police Themselves?’, Journal of Human Rights, 8, 4 (October). JSCSC (2011), ‘Intelligence’, JSCSC Library Bibliography – Research Guide Series (Shrivenham, UK Defence Academy). Judd, A. (2000), The Quest for C (London: HarperCollins). Kabraji, R. (2011), ‘Pakistan: Educating For Tolerance’, The World Today (April). Kahn, D. (2001), ‘An historical theory of intelligence’, Intelligence and National Security, 16, 3. Kahneman, D. (2011), Thinking, Fast and Slow (London: Allen Lane). Kaiser, F.M. (2007), ‘Congressional Oversight of Intelligence: Current Structure and Alternatives’, US Congressional Research Service Report (15 February). Kapstein, E.B. (2012), ‘Measuring Progress in Modern Warfare’, Survival, 54, 1. 220 Select Bibliography

Kassel, W. (2009), ‘Terrorism and the International Anarchist Movement of the Late Nineteenth and Early Twentieth Centuries’, Studies in Conflict & Terrorism, 32, 3 (March). Katz, M.N. (2010), ‘Why Hasn’t the US Been Able to Foster Democracy in Iraq?’, ISN (8 December). Katzman, K. (2012), ‘Iran: U.S. Concerns and Policy Responses’, US Congressional Research Service (2 March). Kaye, D.D., A. Nader and P. Roshan (2011), Israel and Iran: A Dangerous Rivalry (Santa Monica, CA: RAND). Kaye, D.D., and E. Lorber (2012), ‘Containing Iran: What Does It Mean?’, Middle East Policy, XIX, 1 (Spring). Keefe, P.R. (2005), Chatter: Dispatches from the world of global eavesdropping (London: Random House). Keefe, P.R. (2010), ‘Privatized Spying: The Emerging Intelligence Industry’, ch. 18 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Kelley, R. (2012), ‘Jan. 12: Nuclear arms programme charge against Iran is no sure thing’, SIPRI Newsletter (January). Kenny, J. (2010), ‘Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence’, Journal of Applied Security Research, 5, 2. Kerbel, J. (2008), ‘Lost for Words: The Intelligence Community’s Struggle to Find its Voice’, Parameters (Summer). Kerbel, J. and A. Olcott (2010), ‘Synthesizing with Clients, Not Analyzing for Customers’, CIA Studies in Intelligence, 54, 4 (December). Khanna, P. (2009), The Second World (London: Penguin). Khattak, D. (2011), ‘Regional Powers Gear Up for Afghan Intrigue – Even as West Looks Away’, RFE/ISN (3 May). Kim, D. (2011), ‘Fukushima and the Seoul 2012 Nuclear Security Summit’, Bulletin of the Atomic Scientists (18 March). Kirchner, E.J., and J. Sperling (eds) (2007), Global Security Governance: Competing Perceptions of Security in the 21st Century (London: Routledge). Klarevas, L. (2011), ‘The Idiot Jihadist Next Door’, Foreign Policy (1 December). Knickmeyer, E. (2010), ‘Yemen’s Double Game’, Foreign Policy (7 December). Knightley, P. (1986), The Second Oldest Profession (London: Deutsch). Kriendler, J. (2006), NATO Intelligence and Early Warning (Shrivenham: UK Defence Academy, March). Krieger, W. (2009), ‘Oversight of Intelligence: A Comparative Approach’, ch. 9 in Treverton and Agrell (eds), National Intelligence Systems. Krieger, W. (2010), ‘The German Bundesnachrichtendienst (BND): Evolution and Current Policy Issues’, ch. 47 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Kutz, M.R. (2008), ‘Contextual Intelligence: An Emerging Competency for Global Leaders’, Regent Global Business Review (August). Kydd, A.H. (2011), ‘Terrorism and Profiling’, Terrorism & Political Violence, 23, 3. le Carré, J. (2006/1986), A Perfect Spy (London: Sceptre). le Carré, J. (2006/1968), A Small Town in Germany (London: Sceptre). le Carré, J. (1974), Tinker, Tailor, Soldier, Spy (London: Hodder & Stoughton). Lahneman, W.J. (2010), ‘The Need for a New Intelligence Paradigm’, International Journal of Intelligence and CounterIntelligence, 23, 2 ( June). Select Bibliography 221

Lambert, R. (2012), ‘Time to end exceptional security policies targeting Muslims’, OpenDemocracy (28 February). Lander, S. (2004), ‘International Intelligence Cooperation: An inside perspective’, Cambridge Review of International Affairs, 17, 3 (October). Landman, T. (2000), Issues and Methods in Comparative Politics: An Introduction (London: Routledge). Lantis, J.S. (2011), ‘Redefining the Nonproliferation Norm? Australian Uranium, the NPT, and the Global Nuclear Revival’, Australian Journal of Politics and History. Lawless, J. (2011), ‘Reflexive Governance: Redefining the Public Interest in a Pluralist World – Edited by Olivier De Schutter and Jaques Lenoble’, European Law Journal, 17, 3 (May). Ledwidge, F. (2011), Losing Small Wars (London: Yale University Press). Lee, D.S. (2012), ‘Causes of North Korean belligerence’, Australian Journal of International Affairs, 66, 2. Lefebvre, S. (2003), ‘The difficulties and dilemmas of international intelligence cooperation’, International Journal of Intelligence and CounterIntelligence, 16, 4. Lefebvre, S. (2010), ‘Canada’s Legal Framework for Intelligence’, International Journal of Intelligence and CounterIntelligence, 23, 2 (June). Lehmann, K. (2011), ‘Crisis foreign policy as a process of self-organization’, Cambridge Review of International Affairs, 24, 1 (March). Leifeld, P., and V. Schneider (2012), ‘Information Exchange in Policy Networks’, American Journal of Political Science. Leigh, D., and L. Harding (2011), WikiLeaks: Inside ’s War on Secrecy (London: Guardian Books). Leigh, I. (2007), ‘The accountability of security and intelligence agencies’, ch. 5 in Johnson (ed.), Handbook of Intelligence Studies. Leigh, I. (2009), ‘Changing the rules of the game: some necessary legal reforms to United Kingdom intelligence’, Review of International Studies, 35, 4 (October). Leigh, I. (2010), ‘Intelligence and the Law in the United Kingdom’, ch. 39 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Lewin, R. (1969), ‘Book review: Intelligence at the Top: The Recollections of an Intelligence Officer. By Major- General Sir Kenneth Strong. London: Cassell. 1968…’, International Affairs, 45, 2 (April). Lewin, R. (1978), Ultra Goes to War: The Secret Story (London: Hutchinson). Lewin, R. (1982), The Other Ultra: Codes, Ciphers and the Defeat of Japan (London: Hutchinson). Libicki, M.C. (2007), Conquest in Cyberspace (Cambridge: Cambridge University Press). Libicki, M.C. (2009), Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND). Lindgren, M., and H. Bandhold (2009), Scenario Planning, Basingstoke: Palgrave [rev. ed.]). Little, A. (2012), ‘Political Action, Error and Failure: The Epistemological Limits of Complexity’, Political Studies, 60, 1 (March). Liu, X., S. Hong, and Y. Liu (2012), ‘A Bibliometric Analysis of 20 Years of Globalization Research: 1990-2009’, Globalizations, 9, 2 (April). Lowenthal, M.M. (2006), Intelligence: From Secrets to Policy (Washington, DC: CQ Press [3ed./5ed. (2011)]). 222 Select Bibliography

Lucas, W.S. (1995), Divided We Stand: Britain, the US and the Suez Crisis (London: Hodder and Stoughton). Lynch, J. (2012), ‘Conflict interventions: the case for a multidisciplinary approach’, Australian Journal of International Affairs, 66, 2. Lynn- Jones, S.M. (2008), ‘Realism and Security Studies’, ch. 2 in C.A. Snyder (ed.), Contemporary Security and Strategy (Basingstoke: Palgrave, 2ed.). Lyon, D. (2007), Surveillance Studies: An Overview (Cambridge: Polity). Lyon, J. (ed.) (2004), ‘Introduction’ to J. Conrad, The Secret Agent (Oxford: Oxford University Press [1907]). McDowell, D. (2009), Strategic Intelligence: A Handbook for Practitioners, Managers, and Users (Lanham, MD: Scarecrow/Professional Intelligence Education). McEvoy Manjikian, M. (2010), ‘From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik’, International Studies Quarterly, 54, 2 ( June). McKern, B. (ed.) (2003), Managing the Global Network Corporation (London: Routledge). McKittrick, D., and D. McVea (2001), Making Sense of the Troubles (London: Penguin). McLachlan, D. (1968), Room 39: Naval Intelligence in Action 1939-45 (London: Weidenfeld & Nicolson). Mabee, B. (2009), The Globalization of Security: State Power, Security Provision and Legitimacy (Basingstoke: Palgrave Macmillan). Mac Ginty, R. (2010), ‘Social network analysis and counterinsurgency: a counter- productive strategy?’, Critical Studies on Terrorism, 3, 2. Mackby J., and P. Cornish (2008), U.S.-UK nuclear cooperation after 50 years (Washington, DC/London: Center for Strategic and International Studies/ Chatham House). Mackey, C., with G. Miller (2004), The Interrogator’s War (London: John Murray). Mackinlay, J. (2009), The Insurgent Archipelago (London: Hurst). Maior, G.C. (2012), ‘Managing Change: The Romanian Intelligence Service in the 21st Century’, International Journal of Intelligence and CounterIntelligence, 25, 2. Major, S. (2012), ‘Timing Is Everything: Economic Sanctions, Regime Type, and Domestic Instability’, International Interactions: Empirical and Theoretical Research in International Relations, 38, 1. Malley, R., K. Sadjadpour and Ö. Taspınar (2012), ‘Symposium: Israel, Turkey and Iran in the Changing Arab World’, Middle East Policy, XIX, 1 (Spring). Mankin, J. (2011), ‘Rotten to the Core’, Foreign Policy (10 May). Marrin, S. (2009a), ‘Intelligence analysis and decision- making: methodological challenges’, ch. 8 in his, Gill and Phythian (eds), Intelligence Theory. Marrin, S. (2009b), ‘Training and Educating U.S. Intelligence Analysts’, International Journal of Intelligence and CounterIntelligence, 22, 1, (March). Marrin, S. (2011), Improving Intelligence Analysis: Bridging the Gap between Scholarship and Practice (London: Routledge/Studies in Intelligence Series). Marshall, A. (2009), ‘Clearing the way: Civil Contingencies and National Security’, RUSI Homeland Security & Resilience Monitor (22 January). Martin, A., and P. Wilson (2008), ‘The Value of Non- Governmental Intelligence: Widening the Field’, Intelligence and National Security, 23, 6 (December). Masse, T., S. O’Neil and J. Rollins (2008), Information and Intelligence, including Terrorism Fusion Centers (US: Nova Science Pub Inc.). Select Bibliography 223

Massing, M. (2009), ‘The News About the Internet’, New York Review of Books, 56, 13 (13 August). Matei, F.C. (2009), ‘The Challenges of Intelligence Sharing in Romania’, Intelligence and National Security, 24, 4 (August). Matsumura, M. (2011), ‘Japan’s Earthquake: The Politics of Recovery’, Survival, 53, 3. Matthews, J.A., and D.T. Herbert (2008), Geography: A Very Short Introduction (Oxford: Oxford University Press). Mckelvey, T. (2011), ‘Inside the Killing Machine’, Newsweek (13 February). Mckenzie, A. (2012), ‘“New Wars” Fought “Amongst the People”: “Transformed” by Old Realities?’, Defence Studies, 11, 4. Mendelsohn, B. (2010), ‘International Cooperation in the War on Terrorism’, ISN (28 June). Menn, J. (2010), Fatal System Error (New York: PublicAffairs). Menthe, L. et al. (2012), The Future of Air Force Motion Imagery Exploitation: Lessons from the Commercial World (Santa Monica, CA: RAND). Michaels, J.D. (2008), ‘All the President’s Spies: Private- Public Intelligence Partnerships in the War on Terror’, California Law Review (August). Michaels, J.H. (2011), ‘Agents for Stability or Chaos: Conceptualizing Intelligence “Relevance” in Counterinsurgency’, Studies in Conflict & Terrorism, 34, 3 (March). Michaels, J.H., and M. Ford (2011), ‘Bandwagonistas: rhetorical re- description, strategic choice and the politics of counter-insurgency’, Small Wars & Insurgencies, 22, 2. Michaelsen, C. (2010), ‘Australia and the Threat of Terrorism in the Decade after 9/11’, Asian Journal of Political Science, 18, 3. Miller, B.H. (2011), ‘The Death of Secrecy: Need to Know…with Whom to Share’, CIA Studies in Intelligence, 55, 3 (September). Mills, G., and D. Richards (2010), ‘The Binds That Tie Us’, Foreign Affairs (24 November). Mintz, A., and K. DeRouen Jr. (2010), Understanding Foreign Policy Decision Making (Cambridge: Cambridge University Press). Mistry, K. (2011), ‘‘Special Issue on “The CIA and US Foreign Relations Since 1947: Reforms, Reflections and Reappraisals,” Intelligence and National Security 2–3 (April–June 2011), Response’, H-Diplo/ISSF Roundtable Reviews, III, 6 (December). Mitchell, W. (2011), ‘PROJECT KITAE: Battlespace Agility in Helmand: Network vs. Hierarchy C2’, Royal Danish Defence College Research Papers (August). Mithas, S. and J. Whitaker (2007), ‘Is the World Flat or Spiky? Information Intensity, Skills, and Global Service Disaggregation’, Information Systems Research, 18, 3. Mittelman, J.H. (2010), Hyperconflict: Globalization and Insecurity (Stanford, CA: Stanford University Press). Mitzen, J. and R.L. Schweller (2011), ‘Knowing the Unknown Unknowns: Misplaced Certainty and the Onset of War’, Security Studies, 20, 1 ( January). Mockaitis, T.R. (2011), Resolving Insurgencies, http://www.StrategicStudiesInstitute. army.mil/ ( June). Montgomery of Alamein, Field- Marshal Viscount B. (1968), A History of Warfare (London: Collins). 224 Select Bibliography

Montgomery Hyde, H. (1962), Room 3603: The Incredible True Story of Secret Intelligence Operations During World War II (Guildford, CT: The Lyons Press/The Globe Pequot Press). Mooney, A. and B. Evans (eds) (2007), Globalization: The Key Concepts (London: Routledge). Moran, C.R. (2012), Classified: Secrecy and the State in Postwar Britain (Cambridge: Cambridge University Press). Moran, C.R., and R. Johnson (2010), ‘Of Novels, Intelligence and Policymaking – In the Service of Empire: Imperialism and the British Spy Thriller 1901–1914’, CIA Studies in Intelligence, 54, 2 ( June). Moran, C.R. (2011), ‘The Pursuit of Intelligence History: Methods, Sources, and Trajectories in the United Kingdom’, CIA Studies in Intelligence, 55, 2 ( June). Moran, D. (2010), ‘Geography and Strategy’, ch. 6 in J. Baylis, J.J. Wirtz and C.S. Gray (eds), Strategy in the Contemporary World (Oxford: Oxford University Press [3ed.]). Morrison, J.N.L. (2011), ‘British Intelligence Failures in Iraq’, Intelligence and National Security, 26, 4 (August). Mudd, P. (2010), ‘Rethinking Objectives in Afghanistan’, Foreign Policy (17 November). Mulholland, W.R. (1973), ‘Trials, tribulations and some lingering doubts: Liaison Training’, CIA Studies in Intelligence, 17, 2 (Summer). Mullen, Admiral, U.S. Navy, M.G., Chairman of the US Joint Chiefs of Staff (2009), ‘From the Chairman: Strategic Communication: Getting Back to Basics’, Joint Forces Quarterly, 55 (4th Quarter). Mumford, A. (2011), The Counter- Insurgency Myth: The British Experience of Irregular Warfare (London: Routledge). Mumford, A. (2012), ‘Minimum Force meets Brutality: Detention, Interrogation and Torture in British CounterInsurgency Campaigns’, Journal of Military Ethics, 11, 1. Munton, D. (2009), ‘Intelligence Cooperation Meets International Studies Theory: Explaining Canadian Operations in Castro’s Cuba’, Intelligence National Security, 24, 1 (February). Møller, B. (2011), ‘Security Providers: a Pluralistic Approach?’ in F. Vrey, T. Mandrup and A. Esterhuyse (eds), On Strategy: Strategic Theory and Contemporary African Armed Conflicts (Stellenbosch, South Africa: SUN MeDIA). Neary, P.C. (2010), ‘The Post–9/11 Intelligence Community: Intelligence Reform, 2001-2009: Requiescat in Pace?’, CIA Studies in Intelligence, 54, 1 (March [Unclassified]). Negroponte, J.D. (2012), ‘United States Engagement with the World in the Wake of Conflicts in Iraq and Afghanistan’, American Foreign Policy Interests, 34, 1. Nelson, T. (2012), ‘Determinants of disaster aid: donor interest or recipient need?’, Global Change, Peace & Security, 24, 1 (February). Neumann, P., R. Evans, and R. Pantucci (2011), ‘Locating Al Qaeda’s Center of Gravity: The Role of Middle Managers’, Studies in Conflict & Terrorism, 34, 11. Neumann, I.B. (2012), At Home with the Diplomats: Inside a European Foreign Ministry (Cornell University Press). Nicander, L.D. (2011), ‘Understanding Intelligence Community Innovation in the Post-9/11 World’, International Journal of Intelligence and CounterIntelligence, 24, 3. Select Bibliography 225

Nicoll, A. (ed.) (2011a), ‘WikiLeaks: the price of sharing data’, IISS Strategic Comments, 17, 3 ( January). Nicoll, A. (ed.) (2011b), ‘Clear, hold, hand over: NATO’s Afghan transition plan’, IISS Strategic Comments, 17, 10 (March). Nicoll, A. (ed.) (2011c), ‘Libya: direct military hits, unclear political targets’, IISS Strategic Comments, 17, 12 (March). Nicoll A. (ed.) (2011d), ‘Nuclear security after Fukushima’, IISS Strategic Comments, 17, 26 (August). Nicoll, A. (ed.) (2012a), ‘Streamlined US military looks towards Asia’, IISS Strategic Comments (23 February). Nicoll, A. (ed.) (2012b), ‘Fukushima: the consequences’, IISS Strategic Comments, 18, 9 (March). NIC/ODNI (2008), Global Trends 2025: A Transformed World (Washington, DC: ODNI, November). NIC (US) and EU Institute for Security Studies (EUISS) (2010), Global Governance 2025: At a Critical Juncture (September). Nissen, T.E. (2012) Black and White and the 256 Shades of Grey in Between: Reflections on the Question of Attribution for Psychological Operations (Copenhagen: Royal Danish Defence College – FAK, March). Nolte, W. (2008), ‘Ongoing Reform in the Practice of American Intelligence’, Harvard Journal on Legislation, 45, 1. Nolte, W.M. (2011), ‘Valuing Intelligence: Opening a Conversation’, Intelligence and National Security, 26, 5 (October). Nooteboom, B. (2004), Inter-Firm Collaboration, Learning and Networks: An Integrated Approach (London: Routledge). Noonan, M.P. (2009), ‘Disrupting the Foreign Fighter Flow’, FPRI/ISN (20 October). Nordhaus, W.D. (2012), ‘Why the Global Warming Skeptics Are Wrong’, New York Review of Books (22 March). Norrlof, C. (2010), America’s Global Advantage: US Hegemony and International Cooperation (Cambridge: Cambridge University Press). Norton, J. (2007–08), ‘The crisis in our Critical National Infrastructure’, Public Policy Research (December-February). Noveck, B.S. (2009), Wiki Government (Washington, DC: Brookings). Nunn, S. (2012), ‘Away from a World of Peril’, Survival, 54, 1. Nwokora, Z. (2011), ‘Review Essay: Making Policy Choices in Uncertain Conditions’, Australian Journal of Political Science, 46, 3. Nye, Jr., J.S. (2011), ‘The Twenty- First Century Will Not Be a “Post-American” World’, International Studies Quarterly. O’Neil, A. (2011), ‘Conceptualising Future Threats to Australia’s Security’, Australian Journal of Political Science, 46, 1 (March). Özerdem, A. (2012), ‘A re- conceptualisation of ex- combatant reintegration: “social reintegration” approach’, Conflict, Security & Development, 12, 1. Olson, R.S., and V.T. Gawronski (2010), ‘From Disaster Event to Political Crisis: A “5CϩA” Framework for Analysis’, International Studies Perspectives, 11, 3 ( July). Omand, D. (2005), ‘Reflections on Secret Intelligence’, Gresham College Transcript (20 October). Omand, D. (2006), ‘Ethical Guidelines in Using Secret Intelligence for Public Security’, Cambridge Review of International Affairs, 19, 4 (December). 226 Select Bibliography

Omand, D. (2009), ‘Freely and with Confidence: Assessing Britain’s Security Strategy’, RUSI Homeland Security & Resilience Monitor (13 August). Omand, D. (2010a), Securing the State (London: Hurst). Omand, D. (2010b), ‘Securing the State: A Question of Balance’, Chatham House (8 June). Omand, Sir D., G. Herbert and N. Inkster (2011), ‘Controlling Information: Who Holds the Power in the Internet Age?’, Chatham House (13 April). Omand, Sir D. (2012), ‘Into the Future: A Comment on Agrell and Warner’, Intelligence and National Security, 27, 1. Oppermann, K., and A. Spencer (2011), ‘Thinking Alike? Salience and Metaphor Analysis as Cognitive Approaches to Foreign Policy Analysis’, Foreign Policy Analysis. OSCE (2007), Countering Terrorism, Protecting Human Rights: A Manual (: Organization for Security Cooperation Europe [OSCE]/Office for Democratic Institutions and Human Rights [ODIHR]). OSCE (2012), ‘OSCE Personal Representative urges participating States to take hate crimes against Muslims seriously’, OSCE Press Release (22 February). Oswald, B. (2012), ‘Dealing with disputes in Afghanistan: principles and rules for the tactical level’, Small Wars & Insurgencies, 23, 1. Ouagrham- Gormley, S.B. (2011), ‘Amerithrax review: Lessons for future investi- gations’, Bulletin of Atomic Scientists (1 November). Palttala, P. and M. Vos (2012), ‘Quality Indicators for Crisis Communication to Support Emergency Management by Public Authorities’, Journal of Contingencies and Crisis Management, 20. Pakenham, T. (1991) The Scramble for Africa (London: Abacus). Parasiliti, A. (2011), ‘Not a defeat just an end to “the wrong war”’, IISS Voices (3 November). Patel, R. (2010), ‘5 Things You Didn’t Know About… Supermarkets’, Foreign Policy (November). Patton, K. (2010), Sociocultural Intelligence: A New Discipline in Intelligence Studies (London: Continuum). Paxman, J. (2011), Empire (London: Viking). PBS (2006), ‘Interview: Tyler Drumheller’, PBS Frontline (15 February). Peake, H. (2011), ‘Review: Intelligence Cooperation and the War on Terror’, CIA Studies in Intelligence, 55, 1 (March). Perry, D.L. (2009), Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation (Lanham, MD: Scarecrow). Perry, D. (2012a) ‘Blackwater vs. bin Laden: The Private Sector’s Role in American Counterterrorism’, Comparative Strategy, 31, 1. Perry, M. (2012b), ‘’, Foreign Policy (13 January). Petersen, K.L. (2012), Corporate Risk and National Security Redefined (London: Routledge). Petersen, M. (2011), ‘What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers’, CIA Studies in Intelligence, 55, 1 (March – Unclassified). Pfaff, T. (2011), Resolving Ethical Challenges in an Era of Persistent Conflict, http:// www.StrategicStudiesInstitute.army.mil/ (April). Phillips, M. (2012), ‘Policy- making in Defence and Security: Lessons from the Strategic Defence and Security Review’, RUSI Journal, 157, 1 (February/March). Select Bibliography 227

Phythian, M. (2007), ‘The British Experience with Intelligence Accountability’, Intelligence and National Security, 22, 1 (February). Phythian, M. (2009), ‘Intelligence theory and theories of international relations: shared world or separate worlds?’, ch. 4 in Gill, Marrin and his (eds), Intelligence Theory. Phythian, M. (2010), ‘“A Very British Institution”: The Intelligence and Security Committee and Intelligence Accountability in the United Kingdom’, ch. 42 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Phythian, M. (2011), ‘The Problem of Intelligence Ethics’, ch. 8 in his and A. Bergman- Rosamond (eds), War, Ethics and Justice New Perspectives on a Post- 9/11 World (London: Routledge). Pillar, P.R. (2008a), ‘Predictive Intelligence: Policy Support or Spectator Sport?’, SAIS Review, XXVIII, 1 (Winter–Spring). Pillar, P.R. (2008b), ‘Intelligent Design? The Unending Saga of Intelligence Reform’, Foreign Affairs (March/April). Pillar, P.R. (2011a), Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform (Columbia University Press). Pillar, P.R. (2011b), ‘Bringing Closure to a Disruptive Decade’, ISN (31 May). Pinto, Lt.-Col. O. (1955), Spycatcher (London: Panther). Pollack, K.M. et al. (2011), The Arab Awakening (Washington, DC: Brookings). Ponte, S., P. Gibbon and J. Vestergaard (eds) (2011), Governing through Standards: Origins, Drivers and Limitations (Basingstoke: Palgrave Macmillan). Popplewell, R.J. (1995a), Intelligence and Imperial Defence: British Intelligence and the Defence of the Indian Empire, 1904–24 (London: Frank Cass). Popplewell, R. (1995b), ‘“Lacking Intelligence”: Some Reflections on Recent Approaches to British Counter- Insurgency, 1900–1960’, Intelligence and National Security, 10, 4 (October). Porch, D. (2011), ‘The dangerous myths and dubious promise of COIN’, Small Wars & Insurgencies, 22, 2. Porges, M.L. (2010), ‘Saving Yemen: Is Counterterrorism Enough?’, Foreign Affairs (16 November). Porter, P. (2009), Military Orientalism: Eastern War Through Western Eyes (London: Hurst). Porter, P. (2010a), ‘Geography, Strategy and the National Interest: The Maps are too Small’, The World Today (May). Porter, P. (2010b), ‘Why Britain doesn’t do grand strategy’, RUSI Journal, 155, 4 (August/September). Powers, T. (2008), ‘Iraq: Will We Ever Get Out?’, New York Review of Books, 55, 9 (29 May). Price, T.J. (1994), ‘Popular Perceptions of an Ally: “The Special Relationship” in the British Spy Novel’, Journal of Popular Culture, 28, 2. Prins, G., and R. Salisbury (2008), ‘Risk, Threat and Security: The Case of the United Kingdom’, RUSI Journal, 153, 1. Pry, P.V. (2012), ‘Ideology as a Factor in Deterrence’, Comparative Strategy, 31, 2. Rashid, A. (2009), ‘The Afghanistan Impasse’, New York Review of Books, 56, 15 (8 October). Rasmussen, M.V. (2006), The Risk Society at War (Cambridge: Cambridge University Press). Ratcliffe, J. (2008), Intelligence-Led Policing (Uffculme: Willan). 228 Select Bibliography

Rathbun, B.C. (2011a), ‘The “Magnificent Fraud”: Trust, International Cooperation, and the Hidden Domestic Politics of American Multilateralism after World War II’, International Studies Quarterly, 55, 1 (March). Rathbun, B.C. (2011b), Trust in International Cooperation (Cambridge: Cambridge University Press). Rayner, J. (2011), ‘Associate acted for APPGER over MoD information release’, Law Society Gazette (28 April). Rees, W. (2006), Transatlantic Counter- terrorism Cooperation (London: Routledge). Rees, W. (2011), The US- EU Security Relationship (Basingstoke: Palgrave Macmillan). Rees, W., and R.J. Aldrich (2005), ‘Contending cultures of counterterror- ism: transatlantic divergence or convergence?’, International Affairs, 81, 5 (October). Reiter, D. (1996), Crucible of Beliefs: Learning, Alliances and World Wars (Ithaca, NY: Cornell University Press). Reveron, D.S. (2006), ‘Old Allies, New Friends: Intelligence- Sharing in the War on Terror’, Orbis, 50, 3 (Summer). Richelson, J.T. (2008), The US Intelligence Community (Boulder, CO: Westview Press [5ed./6ed. (2011)]). Rid, T., and T. Keaney (eds) (2010), Understanding Counterinsurgency: Doctrine, operations, and challenges (London: Routledge). Ringland, G. (2006), Scenario Planning (London: Wiley, 2006 [2ed.]). Ripsman, N.M., and T.V. Paul (2010), Globalization and the National Security State (Oxford: Oxford University Press). Ritzer, G. (2009), Globalization: A Basic Text (Oxford: Wiley-Blackwell). Robb- Silberman Commission (2005), Report on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (31 March). Roberts, A. (2007), ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, 49, 1 (Spring). Roberts, A. (2008), ‘International Relations after the Cold War’, International Affairs, 84, 2. Roberts, A. (2012), ‘The Long Peace Getting Longer’, Survival, 54, 1. Roberts, A.S. (2006) Blacked Out: Government Secrecy in the Information Age (Cambridge: Cambridge University Press). Robinson, N., L. Valeri, J. Cave and T. Starkey (RAND Europe), H. Graux (time. lex), and S. Creese and P. Hopkins (University of Warwick) (2011), The Cloud: Understanding the Security, Privacy and Trust Challenges (Cambridge: RAND Europe/European Commission). Rogers, P. (2009), ‘Afghanistan: From Insurgency To Insurrection’, OpenDemocracy (9 October). Rogers, P. (2010a), ‘America in Iraq: Power, Hubris, Change’, OpenDemocracy (7 September). Rogers, P. (2010b), ‘Afghanistan’s decade of war, and the endgame’, OpenDemocracy (24 September). Rogers, P. (2011a), ‘Drone Warfare: Cost and Challenge’, OpenDemocracy (28 June). Rogers, P. (2011b), ‘The drone- war blowback’, OpenDemocracy (29 September). Rogers, P. (2012a), ‘America, Israel, Iran: signals of war’, OpenDemocracy (5 February). Rogers, P. (2012b), ‘Al- Qaida: An Open Endgame’, OpenDemocracy (12 January). Select Bibliography 229

Rose, G. (2010), How Wars End (New York: Simon & Schuster). Rossmiller, A.J. (2008), Still Broken: A Recruit’s Inside Account Of Intelligence Failures, From Baghdad To The Pentagon (New York: Presidio Press). Rothkopf, D. (2011), ‘A Special Relationship on the Rise Down Under?’, Foreign Policy (16 November). Rudner, M. (2004a), ‘Britain Betwixt and Between: UK SIGINT Alliance Strategy’s Transatlantic and European Connections’, Intelligence and National Security, 19, 4 (Winter). Rudner, M. (2004b), ‘Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism’, International Journal of Intelligence and CounterIntelligence, 17, 2. Rudner, M. (2007), ‘Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism’, Intelligence and National Security, 22, (August). RUSI (2011), ‘The British Way of Strategy- Making: Vital Lessons For Our Times’, RUSI (25 October). Russell, R.L. (2007a) ‘Achieving all- source fusion in the Intelligence Community’, ch. 14 in Johnson (ed.), Handbook of Intelligence Studies. Ruthven, M. (2011), ‘Why Are the Muhammad Cartoons Still Inciting Violence?’, New York Review of Books (9 February). Sabherwal, R., and I. Becerra- Fernandez (2011), Business Intelligence: Practices, Technologies, and Management (Hoboken, NJ: Wiley). Salerno, R.M., and R. Deger (2011), ‘Evolving Infectious Disease Risks Call for New Collaboration Models’, Public Interest Report (Fall). Sampson, A. (2004), ‘Secret Services: Security v. Accountability’, ch. 11 in his Who Runs This Place? The Anatomy of Britain in the Twenty- First Century (London: John Murray). Sanderson, I. (2009), ‘Intelligent Policy Making for a Complex World: Pragmatism, Evidence and Learning’, Policy Studies, 57, 4 ( June). Savill, M. (2011), ‘UK Security Strategy: Clarity or Compromise?’, Defence Studies, 11, 3. Schaub, Jr., G. (2010), ‘Civilian Combatants, Military Professionals? American Officer Judgments’, Defence Studies, 10, 3. Schnaubelt, C.M. (eds) (2011), Towards a Comprehensive Approach: Strategic and Operational Challenges, NDC Forum Paper (Rome, Italy: NATO Defense College, May). Scholte, J.A. (2005), Globalization: A Critical Introduction (Basingstoke: Palgrave, 2ed.). Scott, L., and P. Jackson (eds) (2004), Understanding Intelligence in the Twenty-First Century: Journeys in Shadows (London: Routledge). Scott, L. (2010), ‘British Strategic Intelligence and the Cold War’, ch. 9 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Scott, L.V., R.G. Hughes, and M.S. Alexander (eds) (2011), Intelligence and International Security: New Perspectives and Agendas (London: Routledge). Scruton, R. (2002), The West and the Rest (London: Continuum). Secrett, C. (2001), ‘What Steps should Governments be taking in Communicating with and Engaging the Public More Effectively on the range of Complex Risks that we all face?’, PIU Presentation (London: UK Cabinet Office, 14 December). 230 Select Bibliography

Sedra, M. (ed.) (2010), The Future of Security Sector Reform (Waterloo, Ontario: The Centre for International Governance Innovation (CIGI)). Sedra, M., and G. Burt (2011), ‘Security Sector Reform (SSR) and the Domestic- International Security Nexus: The Role of Public Safety Canada’, CIGI Special Report No.1 (May). Segal, A. (2011), ‘Cyberspace Governance: The Next Step’, CFR Policy Innovation Memorandum No. 2 (March). Sending, O.J., V. Pouliot, and I.B. Neumann (2011), ‘The Future of Diplomacy: Changing practices, evolving relationships’, International Journal (Summer). Sepp, K.I. (2010), ‘Special Forces’, ch. 10 in T. Rid and T. Keaney (eds), Understanding Counterinsurgency (London: Routledge). Serfaty, S. (2008), Architects of Delusion: Europe, America and the Iraq War (Philadelphia, PA: University of Pennsylvania Press). Sewall, S. (2010), ‘Ethics’, ch.15 in T. Rid and T. Keaney (eds), Understanding Counterinsurgency (London: Routledge). Sheehan, M. (2010), ‘The Evolution of Modern Warfare’, ch. 2 in J. Baylis, J.J. Wirtz and C.S. Gray (eds), Strategy in the Contemporary World (Oxford: OUP [3ed.]). Shell Global Business Environment (2003), ‘Scenarios: An Explorer’s Guide’, Exploring the Future (London: Shell International). Shell (2008), ‘What are scenarios?’, Shell website (accessed: 8/04/2008). Sherry, N. (1994), The Life of Graham Greene – Volume Two: 1939–1955 (London: Random House). Shirky, C. (2011), ‘The Political Power of Social Media’, Foreign Affairs ( January/ February). Shorrock, T. (2008), Spies for Hire: The Secret World of Intelligence Outsourcing (New York: Simon & Schuster). Shulsky, A.N., and G.J. Schmitt (2002), Silent Warfare: Understanding the World of Intelligence (Washington, DC: Potomac [3ed.]). Shukman, H. (ed.) (2000), Agents for Change (London: St Ermin’s). Sidebottom, H. (2004), Ancient Warfare (Oxford: Oxford University Press). Sims, J.E. (2006), ‘Foreign Intelligence Liaison: Devils, Deals and Details’, International Journal of Intelligence and CounterIntelligence, 19, 2 (Summer). Sims, J. (2007) ‘Intelligence to Counter Terror: The Importance of All- Source Fusion’, Intelligence and National Security, 22, 1 (February). Sims, J.E. (2009a), ‘A Theory of Intelligence and International Politics’, ch. 4 in Treverton and Agrell (eds), National Intelligence Systems. Sims, J. (2009b), ‘Defending adaptive realism: intelligence theory comes of age’, ch. 9 in Gill, Marrin and Phythian (eds), Intelligence Theory. Sims, J., and B. Gerber (eds) (2005), Transforming U.S. Intelligence (Washington, DC: Georgetown University Press). Sinclair, R.S. (2010), Thinking and Writing (Washington, DC: CIA CSI, February [ January 1984]). Singer, P.W. (2004), Corporate Warriors: The Rise of the Privatized Military Industry (Ithaca, NY: Cornell University Press). Singer, P.W. (2009), Wired for War: The Robotics Revolution and Conflict in the Twenty- First Century (London: Penguin). Slaughter, A.-M. (2011), ‘Interests vs. Values? Misunderstanding Obama’s Libya Strategy’, New York Review of Books (30 March). Select Bibliography 231

Sloan, G. (2012), ‘Military doctrine, command philosophy and the generation of fighting power: genesis and theory’, International Affairs, 88. Slusser, R.M. (1993), ‘An American at Bletchley Park’, ch. 9 in F.H. Hinsley and A. Stripp (eds), Code Breakers: The Inside Story of Bletchley Park (Oxford: Oxford University Press). Smith, B.F. (1995), ‘The Road to the Anglo- American Intelligence Partnership’, American Intelligence Journal, 16, 2/3 (Autumn/Winter). Smith, C.A., T. Bellier and J. Alticka (2011), ‘Ego- Panopticism: The Evolution of Individual Power’, New Political Science, 33, 1 (March). Smith, D., and D. Elliot (eds) (2006), Key Readings in Crisis Management (London: Routledge). Smith, M. (2004), The Spying Game (London: Politico’s). Smith, W. (2012), ‘Policing Civil Disobedience’, Political Studies. Snider, L.B. (2008), The Agency and The Hill: CIA’s Relationship with Congress, 1946–2004 (Washington, DC: CIA/The Center for the Study of Intelligence). Snyder, C.A. (ed.) (2008), Contemporary Security and Strategy (Basingstoke: Palgrave Macmillan [2ed.]). Soria, V. (2011), ‘Wanted: Looking for Clarity and Coherence in the UK Counter- Terrorism Landscape’, RUSI (October). Sperlich, Y., and S. Sperlich (2012), ‘Practical Tools for Monitoring Convergence, Integration and Development: Compare and Apply’, Journal of Comparative Policy Analysis: Research and Practice, 14, 1. Spielmann, K. (2012), ‘Strengthening Intelligence Threat Analysis’, International Journal of Intelligence and CounterIntelligence, 25, 1. Stafford, D., and R. Jeffreys-Jones (eds) (2000), American-British- Canadian Intelligence Relations 1939–2000 (London: Frank Cass). Stansfield, G. (2011), ‘Iraq: The Unstoppable Force and the Immovable Object’, The World Today (December). Stearns, M. (1973), ‘Making American Diplomacy Relevant’, Foreign Affairs (October). Stenersen, A. (2011), ‘Al Qaeda’s Foot Soldiers: A Study of the Biographies of Foreign Fighters Killed in Afghanistan and Pakistan Between 2002 and 2006’, Studies in Conflict & Terrorism, 34, 3 (March). Stern, E., and B. Sundelius (2002), ‘Crisis Management Europe: An Integrated Regional Research and Training Program’, International Studies Perspectives, 3, 1 (February). Stevenson, W. (1976), A Man Called Intrepid: The Secret War 1939-1945 (Basingstoke: Macmillan). Stewart, J., and K. Mackie (2011), ‘When Policy Goes Wrong: The Problem of Transmitted Risk’, Australian Journal of Political Science, 46, 4. Stewart, R. (2009), ‘The Irresistible Illusion’, London Review of Books (9 July). Stewart, R., and G. Knaus (2011), Can Intervention Work? (London: Norton). Stohl, C. (1995), Organizational Communication: Connectedness in Action (London: Sage). Stone, D. (2008), ‘Global Public Policy, Transnational Policy Communities, and Their Networks’, Policy Studies Journal, 36, 1. Strachan, H. (2010), ‘Strategy or Alibi? Obama, McChrystal and the Operational Level of War’, Survival, 52, 5 (October). 232 Select Bibliography

Strachan, H. (2011), ‘Strategy and contingency’, International Affairs, 87, 6. Strong, Maj.-Gen. Sir K. (1968), Intelligence at the Top (London: Cassell). Sullivan, A. (2010), ‘The Daily Dish: Bush’s Panicked, Incompetent, Illegal Renditions’, The Atlantic (18 October). Sutherland, B. (ed.) (2011), Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them (Oxford: Wiley/The Economist). Svendsen, A. (2008a), ‘The globalization of intelligence since 9/11: frameworks and operational parameters’, Cambridge Review of International Affairs, 21, 1 (March). Svendsen, A.D.M. (2008b), ‘ Research-originating Intelligence (RESINT) and Graduate Research in Intelligence Studies’, Intelligence Studies Review, 14, 2 ( July). Svendsen, A.D.M. (2008c) ‘The globalization of intelligence since 9/11: The optimization of intelligence liaison arrangements’, International Journal of Intelligence and CounterIntelligence, 21, 4 (December). Svendsen, A.D.M. (2009a), ‘“Friend” or “foe”? The CIA and the “Globalisation of Intelligence”’, paper presented at the ‘CIA & US Foreign Policy: Reform, Representations and New Approaches to Intelligence’ conference, Clinton Institute for American Studies, University College Dublin (UCD), Ireland (February [unpublished]). Svendsen, A.D.M. (2009b), ‘Painting rather than photography: Exploring spy fiction as a legitimate source concerning UK–US intelligence co-operation’, Journal of Transatlantic Studies, 7, 1 (March). Svendsen, A.D.M. (2009c), ‘Connecting intelligence and theory: Intelligence Liaison and International Relations’, Intelligence and National Security, 24, 5 (October). Svendsen, A.D.M. (2010a), Intelligence Cooperation and the War on Terror: Anglo- American Security Relations after 9/11 (London: Routledge/Studies in Intelligence Series). Svendsen, A.D.M. (2010b), ‘Strategy and disproportionality in contemporary conflicts’, Journal of Strategic Studies, 33, 3 ( June). Svendsen, A.D.M. (2010c), ‘ Re-fashioning risk: Comparing UK, US and Canadian security and intelligence efforts against terrorism’, Defence Studies, 10, 3 (September). Svendsen, A.D.M. (2010d), ‘Introducing “RESINT”: A “missing” and “underval- ued” “INT” in all- source intelligence efforts?’, 2nd International Conference of the International Society of Military Sciences Paper, Stockholm: Swedish National Defence College, SNDC/FHS (10-11 November [unpublished]). Svendsen, A.D.M. (2011a), ‘Intelligence Liaison: An essential navigation tool’, chapter in J. Schroefl, B.M. Rajaee and D. Muhr (eds), Hybrid and Cyber War as Consequences of the Asymmetry (Frankfurt a.M.: Peter Lang Intl.). Svendsen, A.D.M. (2011b), ‘The CIA and the “Globalisation of Intelligence”’, paper presented at ‘Landscapes of Secrecy: The CIA in History, Fiction and Memory’ Conference, East Midlands Conference Centre, University of Nottingham, UK (April [unpublished]). Svendsen, A.D.M. (2011c), ‘On “a continuum with expansion”? Intelligence co- operation in Europe in the early 21st century’, Journal of Contemporary European Research (JCER), 7, 4 (December). Svendsen, A.D.M. (2011d), ‘Special Issue on “The CIA and US Foreign Relations Since 1947: Reforms, Reflections and Reappraisals,” Intelligence and National Select Bibliography 233

Security 2–3 (April–June 2011), Section I: Challenges and Reform’, H-Diplo/ISSF Roundtable Reviews, III, 6 (December). Svendsen, A.D.M. (2011e), ‘NATO, Libya operations and intelligence co- operation – a step forward?’, Baltic Security & Defence Review, 13, 2 (December). Svendsen, A.D.M. (2012a), ‘On “a continuum with expansion”? Intelligence co- operation in Europe in the early 21st century’, chapter in C. Kaunert and S. Leonard (eds), European Security, Terrorism and Intelligence: Towards Europeanization of Security (Basingstoke: Palgrave Macmillan). Svendsen, A.D.M. (2012b), Understanding the ‘Globalization of Intelligence’ (Basingstoke: Palgrave Macmillan). Svendsen, A.D.M. (2012c), ‘“Strained” relations? Evaluating contemporary Anglo- American Intelligence and Security Co-operation’, chapter in S. Marsh and A. Dobson (eds), Contemporary Anglo- American Relations: A ‘Special Relationship’? (London: Routledge). Svendsen, A.D.M. (2012d), ‘1968 – “A year to remember” for the study of British Intelligence?’, chapter in C.R. Moran and C.J. Murphy (eds), Framing Intelligence History: The Historiography of British and American Secret Services since 1945 (Edinburgh, Scotland: Edinburgh University Press/Columbia University Press). Svendsen, A.D.M. (2012e), ‘Collective Intelligence’ in G. Moore (ed.), Encyclopaedia of U.S. Intelligence (EUSI) (New York: Routledge). Svendsen, A.D.M. (2012f), ‘The Federal Bureau of Investigation and change: Addressing US counter-terrorism intelligence’, Intelligence and National Security 27, 3 ( June). Swenson, R.G., with S.C. Lemozy (2003), Intelligence professionalism in the Americas (US Center for Strategic Intelligence Research, Joint Military Intelligence College). Tatham, MPhil, RN, Cdr S.A. (2008), ‘Strategic Communication: A Primer’, ARAG Special Series, 08/28 (Shrivenham: UK Defence Academy, December). Taylor, A.J.P. (1971), The Struggle for Mastery in Europe, 1848-1918 (Oxford Paperbacks). Taylor, P. (1998), Provos: The IRA & Sinn Fein (London: Bloomsbury). Taylor, P.J. (2004), World City Network: A Global Urban Analysis (London: Routledge). Taylor, S.A. (2007), ‘The Role of Intelligence in National Security’, ch. 14 in A. Collins (ed.), Contemporary Security Studies (Oxford: Oxford University Press). Taylor, S.A. (2010), ‘The Role of Intelligence in National Security’, ch. 18 in A. Collins (ed.), Contemporary Security Studies (Oxford: Oxford University Press [2ed.]). Taylor, T. (1993), ‘ Anglo- American signals intelligence co-operation’, ch. 8 in F.H. Hinsley and A. Stripp (eds), Code Breakers: The Inside Story of Bletchley Park (Oxford: Oxford University Press). Taylor, T. (2011), ‘Private security companies in Iraq and beyond’, International Affairs, 87, 2 (March). Teuten, R., Head of the Stabilisation Unit, UK (2010a), ‘Civilian- Military Collaboration: The Stabilisation Unit Coming of Age’, RUSI (4 February). Teuten, R. (2010b), ‘Whither Stabilisation and Reconstruction? A British Perspective’, USIP (15 July). Thomas, M. (2007), Empires of Intelligence (University of California Press). 234 Select Bibliography

Thomas, P. (2010), ‘Failed and Friendless: The UK’s “Preventing Violent Extremism” Programme’, British Journal of Politics and International Relations, 12, 3 ( July). Thomas, S.T. (1988), ‘Assessing Current Intelligence Studies’, International Journal of Intelligence and CounterIntelligence, 2, 2. Thornton, R. (2007), Asymmetric Warfare (Cambridge: Polity). Thrall, N. (2010), ‘Our Man in Palestine’, New York Review of Books (14 October). Thruelsen, P.D. (2011), ‘Security sector stabilisation in counterinsurgency opera- tions: the case of Afghanistan’, Small Wars & Insurgencies, 22, 4. Thucydides (431BC/2009AD), History of the Peloponnesian War, via: http://classics. mit.edu/Thucydides/pelopwar.html (accessed: 2009). Tickner, J.A., and A. Tsygankov (eds) (2008), ‘THE FORUM: Risks and Opportunities of Crossing the Academy/Policy Divide’, International Studies Review, 10. Tidd, J.M. (2008), ‘From Revolution to Reform: A Brief History of U.S. Intelligence’, SAIS Review, XXVIII, 1 (Winter–Spring). Tiessen, R. (2010), ‘Global Actors in Transnational and Virtual Spaces’, International Studies Review, 12, 2 ( June). Todd, P., and J. Bloch (2003), Global Intelligence (London: Zed). Tomkins, A. (2011), ‘Current Legal Problems: National Security and the Due Process of Law’, Oxford Journal of Law (April). Tomsen, P. (2011), The Wars of Afghanistan (London: PublicAffairs). Trachtenberg, M. (2006), The Craft of International History: A Guide to Method (Princeton, NJ: Princeton University Press). Treverton, G.F. (2003), Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge University Press). Treverton, G.F., S.G. Jones, S. Boraz and P. Lipscy (2006), Toward a Theory of Intelligence: Workshop Report (Santa Monica, CA: RAND). Treverton, G.F. (2009a), Approaches to ‘Outreach’ for Intelligence (Stockholm: Swedish National Defence College – SNDC/FHS). Treverton, G.F. (2009b), Intelligence for an Age of Terror (Cambridge: Cambridge University Press). Treverton, G.F., and J.J. Ghez (2012), Making Strategic Analysis Matter (Santa Monica, CA: RAND). Treverton, G.F. and W. Agrell (eds) (2009), National Intelligence Systems (Cambridge: Cambridge University Press). Treverton, G.F., E. Nemeth, and S. Srinivasan (2012), Threats Without Threateners? (Santa Monica, CA: RAND). Tripodi, C. (2010), ‘Grand Strategy and the Graveyard of Assumptions: Britain and Afghanistan, 1839–1919’, Journal of Strategic Studies, 33, 5 (October). Tucker, J.B. (2009), ‘The Rollback of Libya’s Chemical Weapons Program’, The Nonproliferation Review, 16, 3. Turner, Admiral Stansfield, Director of Central Intelligence (1980), ‘Address to Amherst, Smith, Vassar and Williams, Washington, D.C., Alumni Clubs (19 March 1980)’, Original Transcript (20 March) – via CREST, CIA- RDP80B01554R003100070001-4 (2005/11/23). Tuzuner, M. (eds) (2010), Intelligence Cooperation Practices in the 21st Century: Towards a Culture of Sharing ([Nato Science for Peace and Security- Sub- Series E: Human and Societal Dynamics], Washington, DC: Ios Pr Inc.). Twigge, S., E. Hampshire and G. Macklin (2008), British Intelligence: Secrets, Spies and Sources (Kew: UK National Archives). Select Bibliography 235

UK Her Majesty’s Government (HMG) (2010), A Strong Britain in an Age of Uncertainty (Norwich: TSO, 18 October). US House Permanent Select Committee on Intelligence (PSCI) and the Senate Select Committee on Intelligence (SSCI) (2002), Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001 (December). US JMIC (Joint Military Intelligence College) (1999), ‘Intelligence Essentials for Everyone’, Occasional Paper 6 ( June). US National Commission on Terrorist Attacks Upon the United States of America (2004), 9/11 Commission Report (22 July). Vagts, A. (1967), The Military Attaché (Princeton, NJ: Princeton University Press). Valtonen, V. (2010), ‘Collaboration of Security Actors – an Operational- Tactical Perspective’, 2nd International Conference of the International Society of Military Sciences Paper, Stockholm: Swedish National Defence College (SNDC/FHS) (10–11 November). Various (2011), ‘Martin Moore: Transparency collection’ section in The Political Quarterly, 82, 4 (October–December). Various (2012), ‘Forum on Joseph A. Camilleri and Jim Falk’s Worlds in Transition’, Global Change, Peace & Security, 24, 1 (February). Varrall, S. (2012), ‘The next nuclear wave: renaissance or proliferation risk?’, Global Change, Peace & Security, 24, 1 (February). Wade, Col. G.A. (?1942), Liaison and Intelligence (Aldershot, UK: Gale & Polden Ltd.). Walker, J., F. de Vivo and J. Shaw (2006), ‘A Dialogue on Spying in 17 th- Century Venice’, Rethinking History, 10, 3 (September). Walsh, J.I. (2009), The International Politics of Intelligence Sharing (New York: Columbia University Press). Walt, S.M. (2010), ‘Sleepwalking with Iran’, Foreign Policy (26 May). Walton, C.D. (2012), ‘Victory through Villainization: Atrocity, Global Opinion, and Insurgent Strategic Advantage’, Civil Wars, 14, 1. Wark, W. (1993), ‘The Study of Espionage: Past, Present, Future?’, Intelligence and National Security, 8, 3 ( July). Wark, W.K. (2003), ‘Introduction: “Learning to live with intelligence”’, Intelligence and National Security, 18, 4 (Winter). Warner, J.S. (1966), ‘The Watchdog Committee Question’, CIA Studies in Intelligence, 10, 3 (Summer) – via CREST, CIA-RDP78T03194A000200040001-9 (2005/02/10). Warner, M. (2007), ‘Sources and methods for the study of intelligence’, ch. 1 in Johnson (ed.), Handbook of Intelligence Studies. Warner, M. (2010), ‘The Rise of the U.S. Intelligence System, 1917-1977’, ch. 7 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Warner, M. (2012), ‘Reflections on Technology and Intelligence Systems’, Intelligence and National Security, 27, 1. Waters, C.P.M. (2008), ‘Is the Military Legally Encircled?’, Defence Studies, 8, 1. Watts, C., and J.E. Brennan (2011), ‘Hunting for Foxes: Capturing the Potential of Outlier Ideas in the Intelligence Community’, CIA Studies in Intelligence, 55, 4 (December). Watts, L.L. (2011), ‘Intelligence in Public Literature: A Mind War: Intelligence, Secret Services and Strategic Knowledge in the 21st Century’, CIA Studies in Intelligence, 55, 4 (Extracts, December). 236 Select Bibliography

Watters, B.S.C. (2011), ‘The Utility of Social Science and Management Theory on Military Operations: of Portacabins and Polo Fields’, Defence Studies, 11, 1. Waxman, M.C. (2012), ‘National Security Federalism in the Age of Terror’, Stanford Law Review (February). Weller, T. (2010), ‘The Victorian information age: Nineteenth century answers to today’s information policy questions?’, History & Policy ( June). West, D.M. (2011), The Next Wave: Using Digital Technology to Further Social and Political Innovation (Washington, DC: Brookings). Westerfield, H.B. (1996), ‘America and the World of Intelligence Liaison’, Intelligence and National Security, 11, 3 ( July). Westerfield, H.B. (ed.) (1995), Inside CIA’s Private World (New Haven, NJ: Yale University Press). Whetham, D. (ed.) (2011), Ethics, Law and Military Operations (Basingstoke: Palgrave Macmillan). White, D. (2002), ‘Kell’ in Foot (selected), Secret Lives. Weimer, D.L. (2012), ‘The Universal and the Particular in Policy Analysis and Training’, Journal of Comparative Policy Analysis: Research and Practice, 14, 1. Wilder, D.C. (2011), ‘An Educated Consumer Is Our Best Customer’, CIA Studies in Intelligence, 55, 2 ( June). Wiley, Jr., L. (2006), ‘FRONTLINE – The Dark Side’, FRONTLINE Bulletin (18 June). Wilkie, A. (2004), Axis of Deceit (Melbourne: Black Inc. Agenda). Williams, R. (2011), ‘Exclusive — Rowan Williams in conversation with William Hague’, New Statesman (17 June). Wilner, A. (2011), ‘From Radicalization to Terrorism’, ISN (8 June). Wilner, A.S. (2012), ‘Apocalypse Soon? Deterring Nuclear Iran and its Terrorist Proxies’, Comparative Strategy, 31, 1. Wilson, P. (2005), ‘The contribution of intelligence services to security sector reform’, Conflict, Security and Development, 5, 1 (April). Wilson, P. (2007) ‘Preparing to Meet New Challenges’, chapter 9 in S. Tsang (ed.), Intelligence and Human Rights in the Era of Global Terrorism (London: PSI). Winterbotham, Group Captain F.W. (1974), The Ultra Secret (London: Weidenfeld & Nicolson). Wippl, J.W. (2012), ‘Intelligence Exchange Through InterIntel’, International Journal of Intelligence and CounterIntelligence, 25, 1. Wirtz, J.J. (2010), ‘The Sources and Methods of Intelligence Studies’, ch. 4 in Johnson (ed.), The Oxford Handbook of National Security Intelligence. Withington, J. (2008), A Disastrous History of the World: Chronicles of War, Earthquake, Plague and Flood, London: Piatkus. Witlin, L. (2008), ‘Of Note: Mirror- Imaging and Its Dangers’, SAIS Review, XXVIII, 1 (Winter–Spring). Wolf, R.V. (2012), ‘The overlap between public health and law enforcement: sharing tools and data to foster healthier communities’, International Review of Law, Computers & Technology, 26, 1. Wolff, S. (2011), ‘Managing Ethnic Conflict: The Merits and Perils of Territorial Accommodation’, Political Studies Review, 9, 1 ( January). Woodward, B. (2006), State of Denial: Bush At War, Part III (London: Simon & Schuster). Select Bibliography 237

Yetiv, S. (2011), ‘History, International Relations, and Integrated Approaches: Thinking about Greater Interdisciplinarity’, International Studies Perspectives, 12, 2 (May). Zartman, I.W., and S. Touval (eds) (2010), International Cooperation (Cambridge: Cambridge University Press). Zegart, A.B. (2011), Eyes on Spies: Congress and the United States Intelligence Community (Stanford, CA: Hoover Institution Press). Zeller Jr., T. (2011), ‘Weather Extremes Hint At Public Health Impacts Of Climate Change’, Huffington Post (8 December). Zinn, J.O. (ed.) (2008), Social Theories of Risk and Uncertainty: An Introduction (Oxford: Blackwell). Zinn, J.O., and P. Taylor- Gooby (eds) (2006), Risk in Social Science (Oxford: Oxford University Press). Østensen, Å. (2011), ‘In from the cold? Self- legitimating the market for private security’, Global Change, Peace & Security, 23, 3. Index

Page numbers in bold indicate illustrations

9/11 (11 September 2001) 35 and BRUSA (Britain–USA), 18, 19, 39 after (impact), 33, 35, 139, 142, bureaucratic factors, 84, 128, 143 148, 156 9/11 Commission, 161 business/organization studies, 7, 71, A.Q. Khan nuclear network, 140, 141 154 accountability, 8–9, 25–7, 30, 33–6, business intelligence, 20–1 51, 60, 69, 80, 83, 101, 107, 121, see also privatization and private 126, 149, 155 intelligence aerial vehicles (AVs) or drones, 157 Butler Committee and Butler Report, Afghanistan, 45, 142, 157, 159 34, 119, 121 agility and adaptability, 22, 37, 113, bypassing experts, 114, 152 130, 155, 162 all- source, 127, 150 Canada/Canadian dimension, 19, 27, alliances, 16, 37–9, 44, 55, 73 33, 40, 131 amateur factors, 6, 7, 17, 41 Central Intelligence Agency (CIA), Anglo-Americana, 20, 37, 60, 62, 69, 21–2, 24, 28, 33, 50, 51–2, 74, 75, 138 83–111, 112, 118, 135, approaches (of studies), 3–4, 8, 9, 142–3, 156 11–12, 24–5, 44–5, 54–6, 58, Cheney, Dick (Richard), 35 59–61, 68, 69, 71, 73, 75, 77, 83, ‘cherry-picking’ see bypassing experts 117, 118, 122 China, 37, 47 Arab events, 47 CIA see Central Intelligence Agency architectural/(social) engineering/ civil contingency, 119, 127, 131 design, 10, 119, 121, 123–6, 132, civil liberties, 98, 120, 129 153, 155, 157, 159 civil protection, 131, see also and tinkering and tailoring, 91, preparedness 157, 159 climate change, 120 asymmetric opponents/adversaries, cognitive factors, 61, 70, 141 21, 47 see also decision-making Australia, 19, 33, 40, 116, 154 Cold War, 19, 23, 39, 62, 117, 118, 141, 146, 161 balance/imbalance (multi-context), 5, Collective Intelligence (COLINT), 20, 10, 11, 17, 63, 66, 67, 70, 78, 79, 127, 154, 155, 157 80, 113, 118, 122, 130, 137, 143, colonial/empire themes, 18, 37, 145, 148–9, 152, 154, 157–8 39–41 BBC Monitoring, 46 command- and-control (C2), 126 ‘behind the curve’, 45, 69, 125 see also governance best practice(s) see also standards, 8 communications, information and ‘blind-spots’ and ‘blanch-spots’ or technology revolutions, 20, 47 ‘white-outs’, 149, 191 n4 compartmentalization (stovepiping/ blowback (mainstream), 25, 146 silos), 93, 94, 100, 118–19, see also intelligence liaison blowback 152, 160

238 complacency, dangers of, 147, 148, 159 decision-makers, 38, 113, 122, 143 complexity, 3, 4, 22, 135, 139, 204, decision-making, 4, 46, 139, 141 206, 221 defence/military (etc.) attachés, 16, 19 complex coexistence plurality, 10, 54, Defence Intelligence Staff (DIS), 26, 63, 65, 68, 75, 115, 116–19, 137, 51, 119, 153 147 and Dr Brian Jones, 51, 153 comprehensive approach, 130–2 details/specifics (subtleties and compromise (e.g. of sources/ nuances), importance of, see operations), 49, 52, 114 context (and contextualization) COMSEC/INFOSEC/IA, 18, 20 detainees, 30 CONTEST, 131, 158 differences (e.g. of approaches), 25, containment, 50, 65, 140 43, 65, 137, 147, 154, 155, 156 context, 4, 10, 15–16, 19, 22, 28, 45, diplomacy, 16, 17, 26, 40, 52, 55, 89, 47, 52 59, 62, 92, 152 109, 141 and contextualization, 17, 22, and clandestine/covert/ 56, 60, 69, 115, 118, 142, 144, crypto- diplomacy and 154, 159 back- channels, 55, 93 and importance of, 21, 28, 35, 38, Director of National Intelligence 41, 49, 55, 64, 70, 80, 122, 151, (DNI), 135, 146 156, 160, 161 disarmament, 140, 145 and introduction/characterization disclosure, 31, 44, 48, 49, 51, 52, 83, of, 6, 9, 10–11, 27, 33, 44, 50, 57, 84, 100, 108–12 116, 140, 148, 155 doctrine, 8, 63 control of liaison see management of document(ary)–analysis/exploitation, liaison 4, 19, 28, 32, 50, 51, 52–3, 57–8, counter- insurgency (COIN), 140 72, 80, 83, 84, 96, 97, 101, 107, counter- intelligence (CI), 84, 85, 92, 111, 112–13, 119 114, 146, 155 Donovan, William J. (‘Wild Bill’), 3 counter- proliferation (CP), 67, 136, drug/narcotic operations, 99 139–40, 145, 146, 156, 159 Dutch, 27 counter- terrorism (CT), 32, 33, 67, 100, 116, 131, 137, 146, 156, 159 early warning, 19, 125, 141 see also CONTEST (UK CT strategy) education concerns, 7–8, 22, 23, 35, covert action, 78, 91 61, 122, 124, 138, 143, 144, 145 see also Special (Operations) Forces engagement, 6, 26, 47, 73, 91, 122, (SF/SOF) 124, 132, 150, 151, 156, 158, 160 crisis and/or emergency management, ethical and moral factors, 8, 21, 25, 50, 3, 10, 18, 115, 119–20, 122, 123, 89, 91, 93, 98, 135, 139, 147, 149 131, 148 see also secrecy/sharing dilemma critical information flows, 3, 80 European Convention on Human culture, 8, 20, 28, 54, 55, 57, 63, 78, Rights (ECHR), 24, 35 115, 123, 126, 132, 139, 152 European dimension, 24, 37–8, 76 Cumming, Sir Mansfield, 16 extraordinary rendition(s), 21, 24, 25, CURVEBALL, 145 28–9, 35, 37, 52, 78 Cyber-concerns, 20, 46, 52, 80, 86, see also torture 122, 141–2, 146 FBI see Federal Bureau of Investigation databases and computer systems, 20, 46 Federal Bureau of Investigation (FBI), Dearlove, Sir Richard, 122 94, 144 240 Index finished (pre-recorded) product, IMINT, 19–20, 93 150–1 India, 39, 40 forecasting, 152, 153–4, 215 informal liaison, 21, 113 see also prediction see also gift-giving Foreign and Commonwealth Office information assurance see COMSEC/ (FCO), 125, 126 INFOSEC/IA foreign liaison, 3, 22, 25, 29, 30, 31, information flows, 3, 128, 141, 155 33, 51, 52, 84, 85, 86, 87, 89, 90–6, information overload(ing), 47 99–101, 102, 103–4, 107, 108–11 informing, 61, 125, 141 see also related intelligence liaison in- progress (live) activities, 150–1 entries insider/outsider issues see poacher/ foreign policy, 38, 90, 128, 159 gamekeeper functionalism, predominance of, institutionalization, 16, 17, 37, 62–3, 65, 137–8 117 intelligence budgets and their impact, geopolitics, 45, 159 105 German Intelligence (also BND), 138 and professionalization, 4, 5, 11, Germany, 18, 33, 37, 141 16, 23, 24, 35, 37, 42, 44, 55, 56, Gibson inquiry or UK torture inquiry, 124, 125, 141, 156, 161 29, 31 and reform/change/transformation/ Gift- giving, 88, 113 innovation, 8, 10, 17, 24, 28, 70, globalization (writ large), 21, 27, 53, 119, 123, 124, 125, 128, 136, 156, 70, 74–5, 79, 117, 119, 122, 159, 160, 161 148, 155 fallout, 114, 139, 146 globalization of intelligence concept, see also Iraq and intelligence failure/ 4, 5, 9, 15, 17, 22–3, 27, 36–7, 39, policy failure importance of/value, 40–1, 43–4, 49, 54–5, 61–3, 66–7, 12, 17, 39, 59, 105, 113, 141 68–9, 70, 72–5, 77, 80, 113, 116, irrelevance of, 141 122, 144–5, 147, 149–52, 160 liaison blowback, 137 Globalized Strategic Risk (GSR) see also groupthink, liaison context, 4, 10–11, 80, 160 shortcomings overstretch/ glocalization, 160 overburden, 137, 142–3 governance, 5, 10, 35, 120, 128, 132, see also all- source, levels of analysis 156, 159 and lesser evils, 123 and experience and activity Government Communications and requirements, 30, 39–40, 86, Headquarters (GCHQ), 20, 22, 24, 88, 94, 105, 110, 113, 116, 122, 26, 48 127, 130, 144, 148, 155 groupthink, 137, 142, 143, 150, 151, intelligence analysis and assessment/ 152 estimate, 5, 10, 20, 21, 35, 53, Guantánamo Bay see legal and justice 123, 126, 129, 136, 143, 149–50, differences 151, 152, 153, 156, 161 Gun, Katharine, 50 and mirror- imaging, 149, 150 see also all- source, finished hegemony of intelligence power, (pre-recorded) product, 37–38, 40 in- progress (live) activities HUMINT (human intelligence), 149 Intelligence and Security Committee (ISC), 26, 27, 28, 31, 32, 78, 123, ideas war, 139 129 see also radicalization and its investigator, 29 Index 241 intelligence and security reach, 63, Iran, 47, 136, 140, 145, 146 65, 129, 137, 148, 150, 151 Iraq and intelligence failure/policy see also optimized intelligence and failure, 62, 145 security reach and Niger yellowcake uranium intelligence and security sector reform claims, 137 (SSR), 161 and supposed WMD, 136–45 intelligence and security outreach, 65, see also bypassing experts/ 142, 147, 148, 149, 154, 156, 160 cherry-picking see also optimized intelligence and security outreach Joint Intelligence Committee (JIC), intelligence collection, 18, 22, 89, 91, 97, 123–4, 129, 151 92, 100, 102, 156, 157 journalism/journalists, 28–9, 47, 53, intelligence consultancy, 35, 155 57, 74 intelligence convergence, 144, 151, 152 Kell, Major Vernon, 16 intelligence dynamics, 36, 41, 45, 64 kinetic, 120, 122, 123, 140, 157 intelligence emancipation, 130 knowing others, 65 intelligence fusion, 22, 129, 141, 144, knowing thyself, 44, 65 151, 152, 161 knowledge failure, 144 intelligence fusion centres, 152 and lowest common denominator, intelligence liaison 153, 155 and its history, 9, 15, 36–41 and its officers (ilo), 18–19 leaks and whistleblowing, 50, 104 and safeguards, 25, 29–30, 88, 111, see also WikiLeaks 137, 150, 152 legal and justice differences, 25, 99 and its theorization, 45, 55, 56–7, see also torture 59, 77 legal frameworks for intelligence, 23–5 as a force multiplier, 152 legally, ethically, and morally risks, 136, 149–50 controversial issues see ethical intelligence methodology, 156, 159 and moral factors intelligence optimization, 59, 158 lessons (e.g. from history), 6, 41, 56, intelligence paucities (disconnects), 80, 136 138, 143, 158 levels of analysis and experience intelligence percolation, 144 and activity, 6, 8, 28, 49, 53, intelligence recalibration, 149 57–8, 62–7, 64–5, 68, 84, 97, intelligence research (studies), 5, 11, 114, 117–18, 124, 125, 127, 138, 45, 55, 57, 59, 61, 70, 71, 72, 141–3, 144, 148 74, 78 liaison effects and outcomes, 113, Intelligence Services Act (1994) (UK), 139, 150, 159 24, 31 liaison shortcomings (deficits/ intelligence theory, 70–1 excesses/flaws), 129, 131, 137, intensive interrogation techniques, 142, 150, 151, 152 21, 25, 28, 149 see also groupthink, intelligence see also legal and justice differences liaison blowback, overreach, international relations (IR) theory, 55, under-reach 70, 79, 116–18 Libya and 2011 operations in, 21, 26, interviews, utility of, 53, 57, 149 157 IRA, Real IRA, and Northern Ireland, and Gaddafi (2003), 141 40–1 see also extraordinary rendition(s) 242 Index low politics (importance of), 62, 63, National Security Agency (NSA), 18, 66, 144 20, 92, 93, 101, 105, 106 National Security Council (NSC) (UK), management, see also strategic 125 management National Security Council (NSC) (US), impact/implications for, 8, 33, 35, 84, 85, 89, 92, 97, 98, 126 39–0, 58, 68, 114, 117, 122–3, National Security Strategy (NSS) (UK), 125, 128–9, 136, 144, 147, 150, 116 156, 162 new terrorism see terrorism of information and openness, New Zealand, 19, 40 51–2, 105, 107, see also WikiLeaks North Atlantic Treaty Organization and related issues (NATO), 21, 48, 69 perspective of, 5, 50, 71, 91–3, 112, North Korea, 47 158 nuclear weapons, 19, 140 practices/tools, 16, 18, 28, 29–0, 36, 37, 40–1, 65, 80, 83–5, 97, 103, Office of Strategic Services, 3, 127 110, 149 open source/OSINT, 20, 21, 46, 129 media factors, 20, 46, 47, 50, 53, 72, operational policy condition, 17, 78–9, 89, 112 64–5, 146 medicine, profession of, 8, 131 opportunity and possibility method out of mayhem, 5–6, 135, fashioning see architectural/ 162 (social) engineering/design methodological restraints, 51, 83, 108 optimized intelligence and security methodology (different contexts), 44, reach, 65 56–8, 60, 94, 126, 151, 153, 154, optimized intelligence and security 156, 159 outreach, 65, 148 MI5 see Security Service optimized outreach, 143, 148, 149 MI6 see Secret Intelligence Service optimum outreach, 136, 147–8 (SIS) originator control (ORCON), 31, 108 MILINT/MI, 19–20 outreach, 21–2, 67, 79, 113, 114, 136, mission accomplishment condition, 142, 147–9, 150, 151, 152, 154, 6, 18, 112, 118, 144 156, 160, 161 see also context overreach, 137, 142–3, see also Mohamed, Binyam, 24, 25, 32 groupthink, under-reach monitoring, 20, 132, 147, 162 over-reliance/dependency on liaison, Montgomery of Alamein, 33 Field-Marshal Viscount Bernard, oversight of intelligence, see 17, 23–4, 36 accountability multifunctional operations, 6, 21, overt intelligence, 55, 85, 92, 114, 161 128, 140, 155, 160 multilateral liaison, 39, 69 Pakistan, 118, 140, 157 mutual interests and/or values, 64, Pax Americana, 39 145, 161 Pax Britannica, 38, 39, 40 mutually assured destruction (MAD), peacekeeping intelligence (PKI), 63 19 poacher/gamekeeper debate also insider/outsider issues, 9, 43, 49, National Intelligence Council (NIC) 50, 51, 53, 59, 62, 65, 73, 78, (USA), 22, 126, 155 112, 137 National Risk Register (NRR) (UK), 116 policy failure, 145 Index 243 politicization and de- politicization, resilience model, 10, 116, 129, 120, 132, 178 n10 121, 125, 127 prediction, 11, 152 RESINT, 127, 154, 155, 157 and sensitivity, 61 Revolution in Military Affairs (RMA), see also forecasting 140 preparedness, 33, 86, 87, 106, 125, Risk- averse, 147 131, 154 risk management, 10, 37, 121, 123 PREVENT, 131, 158 risk pre- emption, 10, 132 privacy, 122, 149 risk resilience, 155 see also civil liberties risk thresholds, 10, 132 privatization and private intelligence, Robb–Silberman Commission, 34 21 Rollback, 140 problem-solving, 37 producer–consumer relationship Saddam Hussein, 140 factors see decision- makers, scale/size of us intelligence producers community, 5, 40 and producers, 58, 113, 138, 142 scenarios, 124, 127, 153–5 Professional Head of Intelligence schools of AngloAmerican relations Analysis (PHIA) (UK), 5, 35, 119, (functionalism, evangelicalism, 121–3 terminalism), 62, 75, 137–8 professionalization definition, 6–9; see also functionalism, tools, 22, 28, 29–30, 41, 47, 83, predominance of 97, 113, 116, 124 schools of intelligence liaison professionalization of intelligence literature, 75, 75–6 cooperation concept and Secret Intelligence Service (SIS/MI6), scepticism regarding/contested, 3, 16, 19, 24, 26, 27, 49, 73, 118, 124 29–30, 41 secret prisons, 24, 35 propaganda see ideas war see also legal and justice differences proportionality, 25, 63, 139, 232 Security Service (MI5), 16, 24, 26 public relations (PR), 47 Serious Organised Crime Agency public safety, 120, 131, 146, 190 n51, (SOCA), 112 229 sense-making, 21, 161 public safety, security and supply SIGINT (signals intelligence), 18, 19,

(PS3) concept, 10, 115, 120–31; 20, 39, 72, 93, 104 definition of, 120 see also TECHINT/IMINT, UKUSA secrecy/sharing dilemmas, 9, 50 radicalization, 190 n54, 199 n73, 206, see also WikiLeaks 207, 235, see also extremists, ideas securitization, 37, 130 war Shell, 124, 153–4 reach concept see intelligence and smart defence, 140 security reach Special (Operations) Forces (SF/SOF), reflection, 120, 124, 150, 151, 154, 202, 26, 44, 157 204, 206, 223, 225, 227, 232, 235 standards, 8, 23, 24, 25, 98, 111, 115 regionalization of intelligence, 27, State Department, 89, 90, 94, 102, 64, 160 103, 126, 137 resilience, 10–11, 116, 119, 120, 121, Steele, Robert David, 3, 41 123, 125, 127, 129, 130–2, 146, strategic management, 119, 123, 125, 155, 160 126, 128, see also management and definition of, 160 strategic surprise, 22 244 Index strategy paralysis, 145 uncertainty, 49, 139, 140, 146–7, strategy deficits and vacuums, 145–6 154 Suez Crisis (1956), 64, 138 under- reach, 137, 142 supply (of resources, etc.), 4, 10, 18, see also overreach 115, 119–20, 120–1, 125–6, 130, US Joint Inquiry into the Terrorist 131 Attacks of September 11, 2001 systems thinking, 60, 65, 142, 144 (2002), 33 US National Archives, 52 TECHINT, 18 users, customers, clients and see also IMINT/SIGINT consumers, etc. see technology factors, 20, 22, 47, 146, 154 decision-makers terrorism, 22, 30, 32, 39, 40, 41, 80, 98, 131, 152 values, 8, 64, 126, 145, 161 third party rule (or confidentiality verification, 51, 145, 151, 152 rule or control principle), 30, 31, vigilance, 147, 160, 161–2 84, 137 torture, 25, 28, 29, 30, 31, 35 War on Terror and Long War, 35, 41, see also legal and justice differences 62, 141 trust, 28, 30, 63, 64, 88, 145, 161 warning, 19, 125, 141 see also informing UK–US (Anglo-American) intelligence whole of government see relations, 15, 20, 28, 33, 39, 60, comprehensive approach 62, 65, 69, 74, 76, 78, 137, 138, WikiLeaks and related issues (e.g. 139, 147 OpenLeaks, hacktivist activities), UK National Archives, 52, 96–7, 49, 52 111–12 WMD proliferation see UKUSA, 19, 39, 40, 152 counter-proliferation see also BRUSA ULTRA, 18, 57–8, 72 Yemen, 157