Intelligence and National Security

Papers
(The TQCC of Intelligence and National Security is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
The academic-practitioner divide in intelligence studies19
Medieval military medicine: from the Vikings to the High Middle Ages10
The theatre of the real: the actor/spy relationship in le Carré’s Tinker Tailor Soldier Spy and The Little Drummer Girl8
Deciphering intelligence analysis: the synthetic nature of the core intelligence function7
Intelligence and alliance politics: America, Britain, and the strategic Defense Initiative6
Reluctant revolutionaries: Czechoslovak support of revolutionary violence between decolonization and détente6
The real special relationship: the true story of how the British and US secret services work together5
‘An anarchy of treason’: public history, insider knowledge and the early spy novels of John le Carré5
Sea, sex, and spies: on Gérard de Villiers’ relations with the covert world4
Pinochet’s poisons: examining Chile’s historical interest in chemical and biological weapons4
Advancing intelligence analysis: using natural language processing on East Pakistani intelligence documents4
Probability or confidence, a distinction without a difference?4
‘The weatherman and the umbrella’: a case of complex and multilayered defence intelligence relations in the Netherlands4
Canadian Military Intelligence: operations and evolution from the October crisis to the war in Afghanistan4
Fact, fake or fiction?: the disguised spy novels of Bernard Newman in the 1930s4
A new theory of surprise – unraveling the logic of uncertainty and knowledge4
Intelligence leadership and governance3
‘Familiar but not intimate’: executive oversight of the UK intelligence and security agencies3
The declassification engine: what history reveals about America’s top secrets The declassification engine: what history reveals about America’s top secrets , Matthew Con3
Agents, attachés, and intelligence failures: the Imperial Japanese Navy’s efforts to establish espionage networks in the United States before Pearl Harbor3
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace3
Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism Avoiding the terrorist trap: why respect for human rights is the key to defeating terrorism3
Cold War in the Islamic world: Saudi Arabia, Iran and the struggle for supremacy3
“The hyena who stalks the capitalist deserts”: imagining the ‘anti-Bond’ in the works of John le Carré3
Introduction3
Nothing is beyond our reach: America’s techno-spy empire Nothing is beyond our reach: America’s techno-spy empire , Kristie Macrakis, Washington D.C., Georgetown Univers3
Contemporary French security policy in Africa: on ideas and wars3
Of life, liberty and the pursuit of ‘All persons found lurking within our lines’: the Continental Congress’ Committee on Spies and the path to American independence2
Spying and the crown: the secret relationship between British intelligence and the royals Spying and the crown: the secret relationship between British intelligence and the royals 2
Quantum espionage: a phenomenology of the Snowden affair2
Sigint and cyber power down under Revealing Secrets: An Unofficial History of Australian Signals Intelligence and the Advent of Cyber , John Blaxland and Clare Birgin, (2
A delicate truth: John le Carré, spy fiction and intelligence​2
Stay-behind networks and interim flexible strategy: the ‘Gladio’ case and US covert intervention in Italy in the Cold War2
Intelligence power and practice Intelligence power and practice , by Michael Herman and David Schaefer, foreword by Lord Butler, Intelligence Power in Pra2
The evolution of the Al-Shabaab jihadist intelligence structure2
Cyber intelligence and international security: breaking the legal and diplomatic silence?2
National security intelligence activity: a philosophical analysis2
Finding a match: the revolution in recruitment and its application to selecting intelligence analysts2
‘Making the intelligence product of greater use to those for whom it is produced’: lessons from the National Security Council Intelligence Committee, 1971–19762
New evidence and new methods for analyzing the Iranian revolution as an intelligence failure2
Restricted data: the history of nuclear secrecy in the United States2
The Sisson Documents and their ‘distinguished place’ in the history of disinformation2
Secret partners: the national reconnaissance office and the intelligence-industrial-academic complex2
Warship 20232
The governance of covert action: asymmetric power and the British plan to overthrow Saddam2
Critical review of the Analysis of Competing Hypotheses technique: lessons for the intelligence community2
Great Britain, international law, and the evolution of maritime strategic thought, 1856-19142
The perils of presidential openness: strikes, secrecy and performative opacity2
Australian intelligence oversight and accountability: efficacy and contemporary challenges2
Investigating an authoritarian intelligence apparatus: the case of Myanmar2
Advanced introduction to American Foreign Policy2
India’s intelligence culture and strategic surprises: spying for South block2
A risk science perspective on how to evaluate the quality of intelligence assessments2
‘Profiles in intelligence’: an interview with 8th Mossad chief Danny Yatom2
Caught off guard? Evaluating how external experts in Germany warned about Russia’s war on Ukraine2
Philosophical foundations of intelligence collection and analysis: a defense of ontological realism2
Neutering the CIA: why US intelligence versus Trump has long-term consequences1
Resisting the KGB Mythmakers: Willy Fisher, spy fiction, and the myth of Rudolf Abel1
A blue ribbon goat: the Rockefeller Commission, public opinion, and the Ford Administration’s intelligence reform failure1
Towards intelligence accountability as a virtue1
The bitskrieg that was and wasn’t: the military and intelligence implications of cyber operations during Russia’s war on Ukraine1
Correction1
Root values and root skills: a new model for intelligence education1
‘A bald exposition of the essential facts’: information and reconnaissance in The Riddle of the Sands1
Editor’s Note:1
The many realisms of John le Carré1
The evolution of historical scholarship and the rise of the visible and accountable national security state: tales from a life in Intelligence Studies1
Assessing intelligence oversight: the case of Sweden1
Shadows of power beneath the threshold: where covert action, organized crime and irregular warfare converge1
Analytical innovation in intelligence systems: the US national security establishment and the craft of ‘net assessment’1
Ian Fleming’s Soviet rival: Roman Kim and Soviet spy fiction during the early Cold War1
The Chinese Communist Party’s exploitation of the Second United Front: intelligence and counterintelligence on a middle force territory1
Memoir of an Indian spymaster A life in the shadows: a memoir , by A. S. Dulat, Gurugram, HarperCollins India, 2023, 264 pp., ₹699.00 (hardcover), ISBN 978-93562959641
The spymaster of Baghdad: a true story of bravery, family, and patriotism in the battle against ISIS1
Critical Intelligence Studies: a new framework for analysis1
Politics and intelligence analysis: the Canadian experience1
Policy for promoting analytic rigor in intelligence: professionals’ views and their psychological correlates1
Beyond counterintelligence: understanding the SBU’s social media outreach on Telegram during wartime1
The multifaceted norm of objectivity in intelligence practices1
Methodological and epistemological reflections on elite interviews and the study of Israel’s intelligence history: interview with Efraim Halevy1
Modelling the intelligence requirements and priorities process: the US response to the Rwandan genocide1
Public knowledge of intelligence agencies among university students in Spain1
‘All the heroes are dead:’ U.S. covert operations in Ukraine, 1949-19531
Oversight and governance of the Danish intelligence community1
Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity1
Innovating in a secret world: the future of national security and global leadership1
American zealots: inside right-wing domestic terrorism1
Assessing the FBI’s pre-1979 counterintelligence operations against China1
Learning to think and talk like the locals: the Soviet political police’s efforts to adapt in Lithuania and Ukraine, 1944-19491
Unravelling effectiveness in intelligence: a systematic review1
Secrecy and the politics of selective disclosures: the US government’s intervention in Guatemala1
Visualizing versus verbalizing uncertainty in intelligence analysis1
‘A sad story of delay and obstructionism’: the impact of external relationships on the resourcing and development of Bletchley Park during the Second World War1
The COVID-19 intelligence failure. Why warning was not enough1
Correction1
Spying in South Asia: Britain, the United States, and India’s Secret Cold War1
Listening to Cairo: British radio monitoring and intelligence gathering, c. 1953-19671
The regulation of intelligence activities under international law1
Rethinking intelligence practices and processes: three sociological concepts for the study of intelligence1
Project Spaceman: early British computer security and automatic data processing1
Relationships, power, and ambiguity: how do U.S. intelligence officer responses to toxicity affect support to the core mission?1
CIA/SOF convergence and congressional oversight1
Spies, lies, and algorithms: the history and future of American intelligence1
Partisanship and congressional intelligence oversight: the case of the Russia inquiries, 2017-20201
The Palgrave handbook of national security1
Britain’s key counter-subversion instrument before the 1971 withdrawal from the Gulf: Voice of the Coast [Sawt Al Saahil] Arabic radio station1
The Bridge in the Parks: The Five Eyes and Cold War Counter-Intelligence1
0.072824001312256