• Home
  • About
    • Who We Are
    • Curriculum Vitae
    • Professional Memberships
  • Our Work
    • Services
    • Projects
    • Publications
    • Links
  • Resources
  • Publications & Reports
  • Partners & Clients
  • Contact Us
  • Reality of BW Threats
  • More
    • Home
    • About
      • Who We Are
      • Curriculum Vitae
      • Professional Memberships
    • Our Work
      • Services
      • Projects
      • Publications
      • Links
    • Resources
    • Publications & Reports
    • Partners & Clients
    • Contact Us
    • Reality of BW Threats
  • Home
  • About
    • Who We Are
    • Curriculum Vitae
    • Professional Memberships
  • Our Work
    • Services
    • Projects
    • Publications
    • Links
  • Resources
  • Publications & Reports
  • Partners & Clients
  • Contact Us
  • Reality of BW Threats

Resources

Carus, W.S., (2001) Bioterrorism and biocrimes: the illicit use of biological agents since 1900 (pdf)Download
Carus, W.S., (2017) A short history of biological warfare: from from pre-history to the 21st century (pdf)Download
Carus, W. S., (2015) The history of biological weapons use: what we know and what we don't (pdf)Download

Bibliographies

Biological Weapons

  • A, S., & Sj, K. (2021). 9th Review Conference: Strengthening of Biological Weapons Convention. American Journal of Bioterrorism, Biosecurity and Biodefense. https://doi.org/10.26420/americanjbioterrorbiosecurbiodefens.2021.1009
  • Abramova FA, Grinberg LM, Yampolskaya OV, Walker DH. Pathology of inhalational anthrax in 42 cases from the Sverdlovsk outbreak of 1979. Proc Natl Acad Sci U S A. 1993;90:2291–2314. [PMC free article] [PubMed] [Google Scholar]
  • Agustin, D., Mantoro, T., & Yulivan, I. (2022). Historical Study of the Development of the Misuse of Biological Weapons Technology. International Conference Computing Engineering and Design. https://doi.org/10.1109/icced56140.2022.10010443
  • Alibek K, Handelman S (2000). Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World – Told from Inside by the Man Who Ran it. Delta. ISBN 978-0-385-33496-9.
  • Appel JM (July 2009). "Is all fair in biological warfare? The controversy over genetically engineered biological weapons". Journal of Medical Ethics. 35(7): 429–32. doi:10.1136/jme.2008.028944. PMID 19567692. S2CID 1643086.
  • Aucouturier E (2020). Biological Warfare: Another French Connexion. Matériologiques. ISBN 978-2-37361-239-4.
  • Balmer, B. (2001b). Britain and Biological Warfare: Expert Advice and Science Policy, 1930-65. Null. https://doi.org/null
  • Balmer, B., & Balmer, B. (2002). Biological warfare: The threat in historical perspective. Medicine, Conflict and Survival. https://doi.org/10.1080/13623690208409619
  • Carter GB. Biological warfare and biological defence in the United Kingdom 1940–1979. Royal United Service Institute Journal. 1992;137:67–74. [Google Scholar]
  • Caudle LC., III . The biological warfare threat. In: Sidell FR, Takafuji ET, Franz DR, editors. Medical Aspects of Chemical and Biological Warfare. Washington, DC: Office of the Surgeon General, Borden Institute, Walter Reed Army Medical Center; 1997. pp. 451–466. Available at http://www.bordeninstitute.army.mil/cwbw/default_index.htm;  [Google Scholar]
  • Chevrier MI, Chomiczewski K, Garrigue H, eds. (2004). The Implementation of Legally Binding Measures to Strengthen the Biological and Toxin Weapons Convention: Proceedings of the NATO Advanced Study Institute, Held in Budapest, Hungary, 2001. Vol. 150 of NATO science series: Mathematics, physics, and chemistry (illustrated ed.). Springer. ISBN 978-1402020971.
  • Cho, S. (2020). A Study on History of CBRN Weapons and New TERRORISM. Journal of Instrumentation. https://doi.org/10.22471/terrorism.2020.5.2.40
  • Christopher GW, Cieslak TJ, Pavlin JA, Eitzen EM. Biological warfare. A historical perspective. JAMA. 1997;278:412–417. [PubMed] [Google Scholar]
  • Cole, L. A. (n.d.). The Specter of Biological Weapons. Bioterrorism: The History of a Crisis in American Society. https://doi.org/10.4324/9781003123644-13
  • Croddy, E., Perez-Armendariz, C., & Hart, J. (2002). Biological Warfare: A Brief History. Null. https://doi.org/10.1007/978-1-4613-0025-0_8
  • Cross G (2017). Dirty War: Rhodesia and Chemical Biological Warfare, 1975–1980. Helion & Company. ISBN 978-1-911512-12-7.
  • Dando, M. (1997). A New Form of Warfare: The Rise of Non-Lethal Weapons. Null. https://doi.org/null
  • Dando, M. (2015a). Bioregulators and Toxins. Null. https://doi.org/10.1057/9781137381828_9
  • Dando, M. (2015b). Neuroscience and CBW. Null. https://doi.org/10.1057/9781137381828_1
  • Dando, M., Pearson, G. S., Tóth, T., Technical, & Convention, T. W. (2000). Verification of the biological and toxin weapons convention. Null. https://doi.org/10.1007/978-94-017-3643-5
  • Darling, R. G., & Noste, E. E. (2016). Chapter 80 – Future Biological and Chemical Weapons. Null. https://doi.org/10.1016/b978-0-323-28665-7.00080-7
  • Davis JA, Schneider B (April 2002). The Gathering Biological Warfare Storm (2nd ed.). USAF Counterproliferation Center.
  • Davison, N. (2005). The Role of Scientific Discovery in the Establishment of the First Biological Weapons Programmes. Null. https://doi.org/null
  • Dembek Z, ed. (2007). Medical Aspects of Biological Warfare. Washington, DC: Borden Institute. 
  • Dembek, Z. F., & Dembek, Z. F. (2006). The History and Threat of Biological Weapons and Bioterrorism. Null. https://doi.org/10.1016/b978-012088440-7/50004-5
  • Derbes VJ. De Mussis and the great plague of 1348. A forgotten episode of bacteriological warfare. JAMA. 1966;196:59–62. [PubMed] [Google Scholar]
  • Domaradskiĭ, I. V., Domaradskiĭ, I. V., Orent, W., Domaradskij, I. V., & Orent, W. (2003). Biowarrior: Inside the Soviet/Russian Biological War Machine. Null. https://doi.org/null
  • Donohue, L. K. (2013). Pandemic Disease, Biological Weapons, and War. Law and War. https://doi.org/10.11126/stanford/9780804787420.003.0004
  • Eitzen EM, Jr, Takafuji ET. (1997) Historical overview of biological warfare. In: Sidell FR, Takafuji ET, Franz DR, editors. Medical Aspects of Chemical and Biological Warfare. Washington, DC: Office of the Surgeon General, Borden Institute, Walter Reed Army Medical Center;  pp. 415–423. Available at http://www.bordeninstitute.army.mil/cwbw/default_index.htm.  [Google Scholar]
  • Fenn EA (2000). "Biological Warfare in Eighteenth-Century North America: Beyond Jeffery Amherst". Journal of American History. 86 (4): 1552–1580. doi:10.2307/2567577. JSTOR 2567577. PMID 18271127.
  • Geissler, E. (1999). Biological warfare activities in Germany, 1923-45. Null. https://doi.org/null
  • Geissler, E., Guillemin, J. (2010). German flooding of the Pontine Marshes in World War II. Politics and the Life Sciences. https://doi.org/10.2990/29_1_2
  • Guillemin, J. (1999a). Anthrax: The investigation of a deadly outbreak. Null. https://doi.org/null
  • Guillemin, J. (1999b). Biological Weapons and Political Outbreaks. Null. https://doi.org/10.1525/california/9780520222045.003.0018
  • Guillemin, J. (1999c). The Threat of Bioweapons. Null. https://doi.org/10.1525/california/9780520222045.003.0024
  • Guillemin, J. (2001). Detecting Anthrax: What We Learned from the 1979 Sverdlovsk Outbreak. Null. https://doi.org/10.1007/978-94-010-0830-3_8
  • Guillemin, J.(2002a). Anthrax and Smallpox: Comparison of Two Outbreaks. Null. https://doi.org/null
  • Guillemin, J.(2002b). The 1979 anthrax epidemic in the USSR: applied science and political controversy. Null. https://doi.org/null
  • Guillemin, J. (2004). Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism. Null. https://doi.org/null
  • Guillemin, J. (2005). Biological weapons and secrecy. The FASEB Journal. https://doi.org/10.1096/fj.05-1102ufm
  • Guillemin, J. (2012). Presumed guilt in the anthrax case. Science. https://doi.org/10.1126/science.336.6082.669-a
  • Guillemin, J. (2013). The soviet biological weapons program a history the soviet biological weapons program. Politics and the Life Sciences. https://doi.org/10.2990/32_1_102
  • Guillemin, J. (2017a). Hidden Atrocities: Japanese Germ Warfare and American Obstruction of Justice at the Tokyo Trial. Null. https://doi.org/null
  • Guillemin, J. (2017b). The 1925 Geneva Protocol: China’s CBW Charges Against Japan at the Tokyo War Crimes Tribunal. Null. https://doi.org/10.1007/978-3-319-51664-6_15
  • Guillemin, J. (2006). Scientists and the history of biological weapons. A brief historical overview of the development of biological weapons in the twentieth century. EMBO Reports. https://doi.org/10.1038/sj.embor.7400689
  • Guillemin, J., Meselson, M., Robinson, J. P., & Sims, N. (2016). Witness Seminar: Origins of the Biological Weapons Convention. Null. https://doi.org/10.1142/9781783269488_0021
  • Handelman, S., Alibek, K., Alibek, K., Handelman, S., Handelman, S., Alibek, K., & Handelman, S. (1999). Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World–Told from the Inside by the Man Who Ran It. Null. https://doi.org/null
  • Harris S. (1992) Japanese biological warfare research on humans: a case study of microbiology and ethics. Ann N Y Acad Sci. 666:21–52. [PubMed] [Google Scholar]
  • Harris SH. (1994) Factories of Death. New York: Routledge. [Google Scholar]
  • Harris, S. (1993). Factories of Death: Japanese Biological Warfare, 1932-45, and the American Cover-up. Null. https://doi.org/null
  • Henderson DA, Inglesby TV, Bartlett JG, Ascher MS, Eitzen E, Jahrling PB, Hauer J, Layton M, McDade J, Osterholm MT, O'Toole T, Parker G, Perl T, Russell PK, Tonat K. (1999) Smallpox as a biological weapon: medical and public health management. Working Group on Civilian Biodefense. JAMA. 281:2127–2137. [PubMed] [Google Scholar]
  • Henschel AW. Dokument für Geschichte des schwarzen Todes. Archives fur die gesammte Median. 1842;2:26–59. [Google Scholar]
  • Hugh-Jones M. (1992) Wickham Steed and German biological warfare research. Intelligence and National Security. 7:379–402. [Google Scholar]
  • Kadlec RP, Zelicoff AP, Vrtis AM. (1997) Biological weapons control. Prospects and implications for the future. JAMA. 278:351–356. [PubMed] [Google Scholar]
  • Kaufer, A., Kaufer, A. M., Theis, T., Lau, K. A., Gray, J. L., & Rawlinson, W. D. (2020). Biological warfare: The history of microbial pathogens, biotoxins and emerging threats. Microbiology Australia. https://doi.org/10.1071/ma20031
  • Kelle, A., Nixdorff, K., & Dando, M. (2006). Controlling Biochemical Weapons: Adapting Multilateral Arms Control for the 21st Century. Null. https://doi.org/null
  • Kelle, A., Nixdorff, K., & Dando, M. (2008). A Paradigm Shift in the CBW Proliferation Problem: Devising Effective Restraint on the Evolving Biochemical Threat. Null. https://doi.org/null
  • Kelle, A., Nixdorff, K., & Dando, M. (2010). Strengthening BWC Prevention of State-Sponsored Bioweapons. Bulletin of The Atomic Scientists. https://doi.org/10.2968/066001003
  • Kelle, A., Nixdorff, K., & Dando, M. (2012a). Arms Dynamics, the Changing Threat Environment, and the Chemical and Biological Weapons Prohibition Regimes. Null. https://doi.org/10.11126/stanford/9780804782753.003.0001
  • Kelle, A., Nixdorff, K., & Dando, M. (2012b). Evolution of the BW Prohibition Regime. Null. https://doi.org/10.11126/stanford/9780804782753.003.0007
  • Kelle, A., Nixdorff, K., & Dando, M. (2012c). Preventing a Biochemical Arms Race. Null. https://doi.org/null
  • Knollenberg B (1954). "General Amherst and Germ Warfare". Mississippi Valley Historical Review. 41 (3): 489–494. doi:10.2307/1897495. JSTOR 1897495. British war against Indians in 1763
  • Koblentz, G. D. (2019). Historical Aspects of Biological Weapons Development and Use. Defense Against Biological Attacks. https://doi.org/10.1007/978-3-030-03053-7_1
  • Leitenberg, M. (1991). A return to Sverdlovsk: Allegations of Soviet activities related to biological weapons. Contemporary Security Policy. https://doi.org/10.1080/01440389108403950
  • Leitenberg, M. (1998a). Resolution of the Korean War Biological Warfare Allegations. Critical Reviews in Microbiology. https://doi.org/10.1080/10408419891294271
  • Leitenberg, M. (1998b). The Possibilities and Limitations of Biological Weapons Conversion. Null. https://doi.org/10.1007/978-94-011-5306-5_10
  • Leitenberg, M. (1999). Aum Shinrikyo’s efforts to produce biological weapons: A case study in the serial propagation of misinformation. Terrorism and Political Violence. https://doi.org/10.1080/09546559908427537
  • Leitenberg, M. (2001). Biological weapons in the twentieth century: A review and analysis. Critical Reviews in Microbiology. https://doi.org/10.1080/20014091096774
  • Leitenberg, M. (2003). Distinguishing offensive from defensive biological weapons research. Critical Reviews in Microbiology. https://doi.org/10.1080/713610450
  • Leitenberg, M. (2005). Assessing The Biological Weapons And Bioterrorism Threat. Null. https://doi.org/null
  • Leitenberg, M. (2021). False allegations of biological-weapons use from Putin’s Russia. The Nonproliferation Review. https://doi.org/10.1080/10736700.2021.1964755
  • Leitenberg, Milton; Zilinskas, Raymond A. (2012). The Soviet Biological Weapons Program: A History. Harvard University Press.
  • Lentzos, Filippa, ed. (2016) Biologial Threats in the 21st Century: The Politics, People, Science, and Historical Roots. https://doi.org/10.1142/p1081
  • Lockwood, J. A. (2012). Insects as Weapons of War, Terror, and Torture. Annual Review of Entomology. https://doi.org/10.1146/annurev-ento-120710-100618
  • Malet, D., Malet, D., & Malet, D. (2021). The Pursuit and Use of Biological Weapons by States. Null. https://doi.org/10.1093/acrefore/9780190846626.013.604
  • Manchee RJ, Stewart R. The decontamination of Gruinard Island. Chem Br. 1988;24:690–691. [Google Scholar]
  • Mangold T, Goldberg J (1999). Plague Wars: a true story of biological warfare. Macmillan, London. ISBN 978-0-333-71614-4.
  • Martin, J. (2005). The History of Biological Weapons. Null. https://doi.org/10.1201/9781420038118.ch1
  • Martin, J. (2012). History of Biological Agents as Weapons. Null. https://doi.org/10.1201/b11523-2
  • Marty, C. A. M. (2001). History of the development and use of biological weapons. Clinics in Laboratory Medicine. https://doi.org/10.1016/s0272-2712(18)30017-9
  • Mayor A (2009). Greek Fire, Poison Arrows & Scorpion Bombs: Biological and Chemical Warfare in the Ancient World (revised ed.). Overlook. ISBN 978-1-58567-348-3.
  • Meselson M, Guillemin J, Hugh-Jones M, Langmuir A, Popova I, Shelokov A, Yampolskaya O. (1994) The Sverdlovsk anthrax outbreak of 1979. Science. 266:1202–1208. [PubMed] [Google Scholar]
  • Mitscherlich A, Mielke F. Medizin ohne Menschlichkeit: Dokumente des Nürnberger ärzteprozesses. Frankfurt am Main, Germany: Fischer Taschenbuchverlag; 1983. [Google Scholar]
  • National Academies of Sciences, Engineering, and Medicine (2018). Biodefense in the Age of Synthetic Biology. National Academies Press. doi:10.17226/24890. ISBN 978-0-309-46518-2. PMID 30629396. S2CID 90767286.
  • Norris J. (1977) East or west? The geographic origin of the Black Death. Bull Hist Med. 51:1–24. [PubMed] [Google Scholar]
  • Orent W (2004). Plague, The Mysterious Past and Terrifying Future of the World's Most Dangerous Disease. New York, NY: Simon & Schuster, Inc. ISBN 978-0-7432-3685-0.
  • Pala C (12 January 2003). "Anthrax Island". The New York Times.
  • Pearson, G. S. (2020). The Regime To Prevent Biological Weapons: Opportunities For A Safer, Healthier, More Prosperous World. Bioterrorism: The History of a Crisis in American Society. https://doi.org/10.4324/9781003123644-40
  • Poupard JA, Miller LA. (1992) History of biological warfare: catapults to capsomeres. Ann NY Acad Sci. 666:9–20. [PubMed] [Google Scholar]
  • Preston R (2002). The Demon in the Freezer. New York: Random House.
  • Price, B. B. (2012). 7. Biological Weapons and Toxins: A Short History and Look at the Future. Toxicon. https://doi.org/10.1016/j.toxicon.2012.04.008
  • Rasnake, J. A. (2000). History of Biological Weapons and an Analysis of the Actual Threat to the United States. Null. https://doi.org/null
  • Robertson AG, Robertson LJ. (1995) From asps to allegations: biological warfare in history. Mil Med. 160:369–373. [PubMed] [Google Scholar]
  • Robinson, J. P., Guillemin, J., & Meselson, M. (1987). Yellow Rain: The Story Collapses. Foreign Policy. https://doi.org/10.2307/1148733
  • Rosebury, T., & Rosebury, T. (2018). Peace or Pestilence: Biological Warfare and How to Avoid It. Null. https://doi.org/null
  • Scharf, M. P. (1999). Clear and Present Danger: Enforcing the International Ban on Biological and Chemical Weapons Through Sanctions, Use of Force, and Criminalization. Michigan Journal of International Law. https://doi.org/10.4324/9781003123644-39
  • Schmelzer, C. D. (2014). Ambivalent Multilateralism: The United States and the Biological Weapons Convention. Null. https://doi.org/null
  • Schneider, J. K. (2014). The BWC’s Prohibition of Biological Weapons: Reality or Rhetoric? Null. https://doi.org/10.1515/jbbbl-2014-0010
  • Sims, N. A. (2011). A simple treaty, a complex fulfillment: A short history of the Biological Weapons Convention Review Conferences. Bulletin of The Atomic Scientists. https://doi.org/10.1177/0096340211407400
  • Sipe CH. (1929) The Indian Wars of Pennsylvania. Harrisburg, PA: Telegraph Press. [Google Scholar]
  • Stockholm International Peace Research Institute (SIPRI)  (1971) The Problem of Chemical and Biological Warfare, Vol 5: Technical Aspects of Early Warning and Verification. New York: Humanities Press. [Google Scholar]
  • Stockholm International Peace Research Institute (SIPRI)  (1971) The Problem of Chemical and Biological Warfare, Vol I: The Rise of CB Weapons. New York: Humanities Press.  [Google Scholar]
  • Stockholm International Peace Research Institute (SIPRI) (1971) The Problem of Chemical and Biological Warfare, Vol 4: CB Disarmament Negotiations, 1920–1970. New York: Humanities Press. Google Scholar]
  • Stockholm International Peace Research Institute (SIPRI) (1973) The Problem of Chemical and Biological Warfare, Vol 3: CBW and the Law of War. New York: Humanities Press. [Google Scholar]
  • US Arms Control and Disarmament Agency.  (1996) Arms Control and Disarmament Agreements: Texts and Histories of the Negotiations. Washington, DC: US Arms Control and Disarmament Agency. [Google Scholar]
  • US Army Medical Research Institute for Infectious Diseases. (2001) Medical Management of Biological Casualties Handbook. 4th ed. Frederick, MD: Fort Detrick. [Google Scholar]
  • US Department of the Army. (1977) US Army Activity in the US Biological Warfare Programs. Washington, DC: US Department of the Army; Publication DTIC B193427 L. [Google Scholar]
  • Walsh, P. F. (2018). The Biosecurity Threat Environment. Null. https://doi.org/10.1057/978-1-137-51700-5_2
  • Warner J, Ramsbotham J, Tunia E, Vadez JJ (May 2011). Analysis of the Threat of Genetically Modified Organisms for Biological Warfare. Washington, DC: National Defense University. 
  • Wheelis M. Biological warfare at the 1346 siege of Caffa. (2002)  Emerg Infect Dis. 8:971–975. [PMC free article] [PubMed] [Google Scholar]
  • Wheelis, M. L. (2004). A Short History of Biological Warfare and Weapons. Null. https://doi.org/10.1007/1-4020-2098-8_3
  • Wheelis, M., Rosza, L., & Dando, M., eds. (2006) Deadly Cultures: Biological Weapons since 1945 (Cambridge: Harvard University Press)
  • Whitby, S. M., Rogers, P., Whitby, S., & Dando, M. (1999). Biological Warfare Against Crops. Scientific American. https://doi.org/10.1038/scientificamerican0699-70
  • WHO Group of Consultants. (1970)  Health Aspects of Chemical and Biological Weapons. Geneva, Switzerland: World Health Organization. [Google Scholar]
  • Woods JB, ed. (April 2005). USAMRIID's Medical Management of Biological Casualties Handbook (PDF) (6th ed.). Fort Detrick, Maryland: U.S. Army Medical Institute of Infectious Diseases. 
  • Yu VL. Serratia marcescens: historical perspective and clinical review. N Engl J Med. 979;300:887–893. [PubMed] [Google Scholar]
  • Zelicoff A, Bellomo M (2005). Microbe: Are we Ready for the Next Plague?. AMACOM Books, New York, NY. ISBN 978-0-8144-0865-0.
  • Zilinskas RA. (1997)  Iraq's biological weapons. The past as future? JAMA. 278:418–424. [PubMed] [Google Scholar]
  • Zilinskas, R. A. (2006). The anti-plague system and the Soviet biological warfare program. Critical Reviews in Microbiology. https://doi.org/10.1080/10408410500496896
  • Zilinskas, R. A. (2017). A brief history of biological weapons programmes and the use of animal pathogens as biological warfare agents. Revue Scientifique Et Technique De L Office International Des Epizooties. https://doi.org/10.20506/rst.36.2.2662

Biosecurity

  • An efficient and Practical approach to Biosecurity. (n.d.). 276.
  • An introduction to biopreparedness. (n.d.). 269.
  • Antosia, R. E., & Cahill, J. D. (2006). Handbook of bioterrorism and disaster medicine. Springer.
  • Becker, G. (2012). The “H5N1 publication case” and its conclusions. Acta Biochimica Polonica, 59(3). https://doi.org/10.18388/abp.2012_2135
  • Berger, K. M., DiEuliis, D., Meyer, C., & Rao, V. (n.d.). ROADMAP FOR IMPEMENTING BIOSECURITY AND BIODEFENSE POLICY IN THE UNITED STATES. 109.
  • Biosafety and Biohazard Evaluation. (n.d.). 33.
  • Biosecurity Challenges of the Global Expansion of High-Containment Biological Laboratories (p. 13315). (2012). National Academies Press. https://doi.org/10.17226/13315
  • Biosecurity Working Group. (2007). A code of conduct for biosecurity. Royal Netherlands Academy of Sciences.
  • Board on Life Sciences, Division on Earth and Life Studies, & National Academies of Sciences, Engineering, and Medicine. (2018). Governance of Dual Use Research in the Life Sciences: Advancing Global Consensus on Research Oversight: Proceedings of a Workshop (J. Revill, J. Husbands, & K. Bowman, Eds.; p. 25154). National Academies Press. https://doi.org/10.17226/25154
  • Butler, C. D. (n.d.). ‘Gain of function’ research can create experimental viruses. In light of COVID, it should be more strictly regulated – or banned. 4.
  • Chyba, C. F. (2002). Toward Biological Security. Foreign Affairs, 81(3), 122. https://doi.org/10.2307/20033167
  • Clevestig, P. (2009). Handbook of applied biosecurity for life science laboratories. SIPRI, Stockholm International Peace Research Institute.
  • Commission on a Global Health Risk Framework for the Future & National Academy of Medicine, Secretariat. (2016). The Neglected Dimension of Global Security: A Framework to Counter Infectious Disease Crises (p. 21891). National Academies Press. https://doi.org/10.17226/21891
  • Criminal Investigation Handbook for Agroterrorism. (n.d.). 98.
  • Dando, M. (n.d.-a). Biological Weapons and the Biological Weapons Convention: History of Misuse and Assimilation into Security Apparatus. 6.
  • Dando, M. (n.d.-b). The Dutch experiment with a biosecurity code of conduct. 12.
  • DiEuliis, D., & Giordano, J. (2022). The Need for Modernization of Biosecurity in the Post-COVID World. MSphere, 7(2), e00025-22. https://doi.org/10.1128/msphere.00025-22
  • Drew, T. W., & Mueller-Doblies, U. U. (2017). Dual use issues in research – A subject of increasing concern? Vaccine, 35(44), 5990–5994. https://doi.org/10.1016/j.vaccine.2017.07.109
  • Du, L., Li, Y., Gao, J., Zhou, Y., & Jiang, S. (2012). Potential strategies and biosafety protocols used for dual-use research on highly pathogenic influenza viruses: Biosafety protocols for dual-use research on H5N1. Reviews in Medical Virology, 22(6), 412–419. https://doi.org/10.1002/rmv.1729
  • Edwards, B., Revill, J., & Bezuidenhout, L. (2014). From Cases to Capacity? A Critical Reflection on the Role of ‘Ethical Dilemmas’ in the Development of Dual-Use Governance. Science and Engineering Ethics, 20(2), 571–582. https://doi.org/10.1007/s11948-013-9450-7
  • Ehrlich, S. A. (2014). H5N1: A Cautionary Tale. Frontiers in Public Health, 2. https://doi.org/10.3389/fpubh.2014.00117
  • Engel-Glatter, S. (2014). Dual-use research and the H5N1 bird flu: Is restricting publication the solution to biosecurity issues? Science and Public Policy, 41(3), 370–383. https://doi.org/10.1093/scipol/sct064
  • Engel-Glatter, S., & Ienca, M. (2018). Life scientists’ views and perspectives on the regulation of dual-use research of concern. Science and Public Policy, 45(1), 92–102. https://doi.org/10.1093/scipol/scx050
  • Evans, N. G. (2013). Contrasting Dual-Use Issues in Biology and Nuclear Science. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects. ANU Press. https://doi.org/10.22459/DUSE.12.2013.16
  • Evans, S. W. (n.d.). Biosecurity Governance for the Real World. 6.
  • Falkow, S. (2012). The Lessons of Asilomar and the H5N1 “Affair.” MBio, 3(5), e00354-12. https://doi.org/10.1128/mBio.00354-12
  • Fauci, A. S. (2012). Dual Use Research of Concern: Balancing Benefits and Risks. 13.
  • Final report on potential breaches of biosecurity at the Pirbright site 2007. (2007). 79.
  • Gaudioso, J. (n.d.-a). Biosecurity Risk Assessment. 24.
  • Gaudioso, J. (n.d.-b). Bioterrorism and Biosecurity in the United States. 21.
  • Gronvall, G. K. (2014). National-Level Biosafety Norms Needed for Dual-Use Research. Frontiers in Public Health, 2. https://doi.org/10.3389/fpubh.2014.00084
  • Gronvall, G. K., Wang, L., McGrath, P. F., Cicero, A. J., Yuan, Y., Parker, M. I., Zhang, W., Sun, Y., Xue, Y., Zhang, J., Zhang, X., Yu, L., Song, J., & Trotochaud, M. (2022). The Biological Weapons Convention should endorse the Tianjin Biosecurity Guidelines for Codes of Conduct. Trends in Microbiology, 30(12), 1119–1120. https://doi.org/10.1016/j.tim.2022.09.014
  • Hagerman, A. D., & McCarl, B. A. (2008). Effects of Biosecurity Risk and Food Scare Events on Food Prices and Demand: Discussion. American Journal of Agricultural Economics, 90(5,), 1287–1288.
  • Hansen, M. B., Lilly, D., D’Esopo, M., & Fox, J. (n.d.). Editorial and Design Team. 45.
  • Hobson, P. T., Sundaram, L. S., Aldridge, D., Christie, A., Edwards, B., Dando, M., Petrovan, S., Shang, L., & Sutherland, W. (n.d.). Submission of Evidence to The Cabinet Office Enquiry on The Biological Security Strategy. 23.
  • Holtcamp, W. (2012). One Study, Two Paths: The Challenge of Dual-Use Research. Environmental Health Perspectives, 120(6). https://doi.org/10.1289/ehp.120-a238
  • Hunter, P. (2012). H5N1 infects the biosecurity debate: Governments and life scientists are waking up to the problem of dual‐use research. EMBO Reports, 13(7), 604–607. https://doi.org/10.1038/embor.2012.80
  • Hvistendahl, M. (n.d.-a). Experimenting With Disaster Part. 20.
  • Hvistendahl, M. (n.d.-b). Experimenting With Disaster Part 2. 6.
  • Hvistendahl, M. (n.d.-c). Experimenting With Disaster Part 3. 21.
  • Improving Security through International Biosafety Norms. (n.d.). 42.
  • Ismajani, D. D., & Mertens, D. E. (n.d.). Strengthen Biosafety and Biosecurity Training for the Biosafety and Biosecurity Initiative of the Africa CDC Platforms for in-person and virtual training. 10.
  • Koblentz, G. D. (2014). Dual-Use Research as a Wicked Problem. Frontiers in Public Health, 2. https://doi.org/10.3389/fpubh.2014.00113
  • Koblentz, G. D. (2018). A Critical Analysis of the Scientific and Commercial Rationales for the De Novo Synthesis of Horsepox Virus. MSphere, 3(2), e00040-18. https://doi.org/10.1128/mSphere.00040-18
  • Lentzos, F. (n.d.-a). In mehr als 60 Hochsicherheitslaboren auf der ganzen Welt forschen Wissenschaftler an den gefährlichsten Viren und Bakterien, die es gibt. Die nächste Pandemie könnte aus einer dieser Einrichtungen kommen. 18.
  • Lentzos, F. (n.d.-b). The horror from the laboratory. 15.
  • MacIntyre, C. R. (2015). Biopreparedness in the Age of Genetically Engineered Pathogens and Open Access Science: An Urgent Need for a Paradigm Shift. Military Medicine, 180(9), 943–949. https://doi.org/10.7205/MILMED-D-14-00482
  • Marris, C. (n.d.). Synthetic biology and biosecurity: Challenging the “myths.” Frontiers in Public Health, 15.
  • Marris, C., Jefferson, C., & Lentzos, F. (2014). Negotiating the dynamics of uncomfortable knowledge: The case of dual use and synthetic biology. BioSocieties, 9(4), 393–420. https://doi.org/10.1057/biosoc.2014.32
  • Martinez, C. K. (2007). Biodefense research supporting the DoD: A new strategic vision. Strategic Studies Institute, U.S. Army War College.
  • McLeish, C., Spelling, A., & Balmer, B. (n.d.). The problems of prohibition: Chemical weapons and the Syrian conflict. 8.
  • Miller, S. (2013). Moral Responsibility, Collective-Action Problems and the Dual-Use Dilemma in Science and Technology. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects. ANU Press. https://doi.org/10.22459/DUSE.12.2013.12
  • Millett, P., & Snyder-Beattie, A. (2017). Existential Risk and Cost-Effective Biosecurity. Health Security, 15(4), 373–383. https://doi.org/10.1089/hs.2017.0028
  • Patrone, D., Resnik, D., & Chin, L. (2012). Biosecurity and the Review and Publication of Dual-Use Research of Concern. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 10(3), 290–298. https://doi.org/10.1089/bsp.2012.0011
  • Pearson, G. S. (n.d.). Strengthening the. 32.
  • Perkins, D., Danskin, K., Rowe, A. E., & Livinski, A. A. (2019). The Culture of Biosafety, Biosecurity, and Responsible Conduct in the Life Sciences: A Comprehensive Literature Review. Applied Biosafety, 24(1), 34–45. https://doi.org/10.1177/1535676018778538
  • Pilch, R., & Pomper, M. (n.d.). A GUIDE TO GETTING SERIOUS ABOUT BIO-LAB SAFETY. 12.
  • Purkitt, H. E. (2005). Biowarfare Lessons, Emerging Biosecurity Issues, and Ways to Monitor Dual-Use Biotechnology Trends in the Future: Defense Technical Information Center. https://doi.org/10.21236/ADA460394
  • Rambhia, K. J., Ribner, A. S., & Gronvall, G. K. (2011). Everywhere You Look: Select Agent Pathogens. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 9(1), 69–71. https://doi.org/10.1089/bsp.2011.0321
  • Recommended Policy Guidance for Departmental Development of Review Mechanisms for. (2017). 6.
  • Resnik, D. B. (2013). H5N1 Avian Flu Research and the Ethics of Knowledge. Hastings Center Report, 43(2), 22–33. https://doi.org/10.1002/hast.143
  • Rethinking biosecurity. (n.d.). 5.
  • Ryan, J. R. (2016). Biosecurity and bioterrorism: Containing and preventing biological threats (Second edition). Elsevier/BH, Butterworth-Heinemann is an imprint of Elsevier.
  • Salerno, R. M. (n.d.-a). Biosecurity and Bioterrorism. 17.
  • Salerno, R. M. (n.d.-b). The Status of International Biosecurity. 23.
  • Schuerger, C., Abdulla, S., & Puglisi, A. (2022). Mapping Biosafety Level-3 Laboratories by Publications. Center for Security and Emerging Technology. https://doi.org/10.51593/20220019
  • Shang, L., Mprah, M., Ravi, I., & Dando, M. (2022). Key issues in the implementation of the Tianjin Biosecurity Guidelines for Codes of Conduct for Scientists: A survey of biosecurity education projects. Biosafety and Health, 4(5), 339–346. https://doi.org/10.1016/j.bsheal.2022.08.003
  • Stemerding, D., & Murdock, K. (n.d.). Implementing biosecurity in (bio-)scientific research in the Netherlands. 5.
  • Suk, J. E., Vogel, K. M., & Ozin, A. J. (Eds.). (2015). Dual-Use Life Science Research and Biosecurity in the 21st Century: Social, Technical, Policy, and Ethical Challenges. Frontiers Media SA. https://doi.org/10.3389/978-2-88919-568-8
  • Suk, J. E., Zmorzynska, A., Hunger, I., Biederbick, W., Sasse, J., Maidhof, H., & Semenza, J. C. (2011). Dual-Use Research and Technological Diffusion: Reconsidering the Bioterrorism Threat Spectrum. PLoS Pathogens, 7(1), e1001253. https://doi.org/10.1371/journal.ppat.1001253
  • Testimony of Daniel M. (n.d.). 6.
  • The Tianjin Biosecurity Guidelines for Codes of Conduct for Scientists. (n.d.). 3.
  • Tucker, J. B. (n.d.). Double-Edged Innovations:346.
  • Uhlenhaut, C., Burger, R., & Schaade, L. (2013). Protecting society: Biological security and dual‐use dilemma in the life sciences—status quo and options for the future. EMBO Reports, 14(1), 25–30. https://doi.org/10.1038/embor.2012.195
  • United States Government Policy for Oversight of Life Sciences Dual Use Research of Concern. (n.d.). 4.
  • van Courtland Moon, J. E. (2008). The development of the norm against the use of poison: What literature tells us. Politics and the Life Sciences, 27(1), 55–77. https://doi.org/10.2990/27_1_55
  • Vennis, I. M., Boskovic, M., Bleijs, D. A., & Rutjes, S. A. (2022). Complementarity of International Instruments in the Field of Biosecurity. Frontiers in Public Health, 10, 894389. https://doi.org/10.3389/fpubh.2022.894389
  • Vogel, K. M. (2008). Framing biosecurity: An alternative to the biotech revolution model? Science and Public Policy, 35(1), 45–54. https://doi.org/10.3152/030234208X270513
  • Vogel, K. M., Ozin, A. J., & Suk, J. E. (2015). Biosecurity and Dual-Use Research: Gaining Function – But at What Cost? Frontiers in Public Health, 3. https://doi.org/10.3389/fpubh.2015.00013
  • Webster, R. G. (2012). Mammalian-Transmissible H5N1 Influenza: The Dilemma of Dual-Use Research. MBio, 3(1), e00005-12. https://doi.org/10.1128/mBio.00005-12
  • World Health Organization. (2020). WHO guidance on implementing regulatory requirements for biosafety and biosecurity in biomedical laboratories: A stepwise approach. World Health Organization. https://apps.who.int/iris/handle/10665/332244
  • World Health Organization. (2022). Global guidance framework for the responsible use of the life sciences: Mitigating biorisks and governing dual-use research. World Health Organization. https://apps.who.int/iris/handle/10665/362313
  • Zmorzynska, A., Suk, J. E., Biederbick, W., Maidhof, H., Sasse, J., Semenza, J. C., & Hunger, I. (2011). Unfinished Business: Efforts to Define Dual-Use Research of Bioterrorism Concern. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 9(4), 372–378. https://doi.org/10.1089/bsp.2011.0021

Intelligence Analysis

  • Acuff, J. M., Craft, L., Ferrero, C. J., Fitsanakis, J., Kilroy, Jr, R. K., & Smith, J. (2021). Introduction to Intelligence: Institutions, Operations, and Analysis. SAGE Publishing. https://us.sagepub.com/en-us/nam/introduction-to-intelligence/book265154
  • Agrell, W., & Treverton, G. F. (2015). National Intelligence and Science: Beyond the Great Divide in Analysis and Policy. Oxford University Press. https://global.oup.com/academic/product/national-intelligence-and-science-9780199360864
  • Aldrich, R. J. (2015). The 100 billion dollar brain: central intelligence machinery in the UK and the US. International Affairs, 91(2), 393–403. https://doi.org/10.1111/1468-2346.12242
  • Aldrich, R. J. (2017). Strategic culture as a constraint: intelligence analysis, memory and organizational learning in the social sciences and history. Intelligence and National Security, 32(5), 625–635. https://doi.org/10.1080/02684527.2017.1310977
  • Bang, M. (2016). Pitfalls in Military Quantitative Intelligence Analysis: Incident Reporting in a Low Intensity Conflict. Intelligence and National Security, 31(1), 49–73. https://doi.org/10.1080/02684527.2014.930584
  • Barnea, A., & Meshulach, A. (2021). Forecasting for Intelligence Analysis: Scenarios to Abort Strategic Surprise. International Journal of Intelligence and CounterIntelligence, 34(1), 106–133. https://doi.org/10.1080/08850607.2020.1793600
  • Barnes, A. (2016). Making Intelligence Analysis More Intelligent: Using Numeric Probabilities. Intelligence and National Security, 31(3), 327–344. https://doi.org/10.1080/02684527.2014.994955
  • Barnes, A. (2020). Getting it right: Canadian intelligence assessments on Iraq, 2002-2003. Intelligence and National Security, 35(7), 925–953. https://doi.org/10.1080/02684527.2020.1771934
  • Ben-Haim, Y. (2022). What Strategic Analysts and Planners for National Security Need to Know. International Journal of Intelligence and CounterIntelligence, 35(1), 57–72. https://doi.org/10.1080/08850607.2020.1822101
  • Ben-Israel, I. (1989). Philosophy and methodology of intelligence: The logic of estimate process. Intelligence and National Security, 4(4), 660–718. https://doi.org/10.1080/02684528908432023
  • Betts, R. K. (1978). Analysis, War, and Decision: Why Intelligence Failures Are inevitable. World Politics, 31(1), 61–89. https://doi.org/10.2307/2009967
  • Betts, R. K. (1988). Policy‐makers and intelligence analysts: Love, hate or indifference? Intelligence and National Security, 3(1), 184–189. https://doi.org/10.1080/02684528808431934
  • Blagden, D. (2018). The flawed promise of National Security Risk Assessment: nine lessons from the British approach. Intelligence and National Security, 33(5), 716–736. https://doi.org/10.1080/02684527.2018.1449366
  • Brand, M. (2019). Mind games: cognitive bias, US intelligence and the 1968 Soviet invasion of Czechoslovakia. Intelligence and National Security, 34(5), 743–757. https://doi.org/10.1080/02684527.2019.1580000
  • Brunel Centre for Intelligence & Security Studies (BCISS). (2023). Findings of a Round-Table in support of the Secretary of State’s Office of Net Assessment and Challenge (SONAC), Ministry of Defence. Brunel Centre for Intelligence & Security Studies (BCISS). https://www.brunel.ac.uk/research/Centres/Intelligence-and-Security-Studies/pdfs/Brunel-BCISS-SONAC-Roundtable.pdf
  • Carvin, S., & Juneau, T. (2021). Intelligence Analysis and Policy Making: The Canadian Experience. Stanford University Press.
  • Chang, W., & Tetlock, P. E. (2016). Rethinking the training of intelligence analysts. Intelligence and National Security, 31(6), 903–920. https://doi.org/10.1080/02684527.2016.1147164
  • Chang, W., Berdini, E., Mandel, D. R., & Tetlock, P. E. (2018). Restructuring structured analytic techniques in intelligence. Intelligence and National Security, 33(3), 337–356. https://doi.org/10.1080/02684527.2017.1400230
  • Charters, D., Farson, S., & Hastedt, G. P. (Eds.). (1996). Intelligence Analysis and Assessment (1st edition). Routledge. https://www.routledge.com/Intelligence-Analysis-and-Assessment/Charters-Farson-Hastedt/p/book/9780714642499
  • Claver, A. (2021). Devil’s advocacy and cyber space. In support of quality assurance and decision making. Journal of Intelligence History, 20(1), 88–102. https://doi.org/10.1080/16161262.2020.1864863
  • Coletta, G. (2018). Politicising intelligence: what went wrong with the UK and US assessments on Iraqi WMD in 2002. Journal of Intelligence History, 17(1), 65–78. https://doi.org/10.1080/16161262.2017.1397400
  • Conway, P. (2012). Red Team: How the Neoconservatives Helped Cause the Iraq Intelligence Failure. Intelligence and National Security, 27(4), 488–512. https://doi.org/10.1080/02684527.2012.688304
  • Cook, S. (2023, May 6). A Guide to Structured Analytic Techniques (SATs) for Intelligence. Grey Dynamics. https://greydynamics.com/structured-analytic-techniques-basics-and-applications-for-intelligence-analysts/
  • Coulthart, S. (2016). Why do analysts use structured analytic techniques? An in-depth study of an American intelligence agency. Intelligence and National Security, 31(7), 933–948. https://doi.org/10.1080/02684527.2016.1140327
  • Coulthart, S. (2017). What’s the problem? Frameworks and methods from policy analysis for analyzing complex problems. Intelligence and National Security, 32(5), 636–648. https://doi.org/10.1080/02684527.2017.1310983
  • Coulthart, S. J. (2017). An Evidence-Based Evaluation of 12 Core Structured Analytic Techniques. International Journal of Intelligence and CounterIntelligence, 30(2), 368–391. https://doi.org/10.1080/08850607.2016.1230706
  • Dahl, E. J. (2017). Getting beyond analysis by anecdote: improving intelligence analysis through the use of case studies. Intelligence and National Security, 32(5), 563–578. https://doi.org/10.1080/02684527.2017.1310967
  • Davies, P. H. J., & Gustafson, K. (2017). Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security, 32(7), 905–919. https://doi.org/10.1080/02684527.2017.1328860
  • Devanny, J., Dover, R., Goodman, M. S., & Omand, D. (2018). Why the British Government Must Invest in the Next Generation of Intelligence Analysts. The RUSI Journal, 163(6), 78–89. https://doi.org/10.1080/03071847.2018.1562027
  • Dhami, M. K. (2018). Towards an evidence-based approach to communicating uncertainty in intelligence analysis. Intelligence and National Security, 33(2), 257–272. https://doi.org/10.1080/02684527.2017.1394252
  • Dhami, M. K., & Careless, K. E. (2021). Intelligence Analysis Support Guide: Development and Validation. International Journal of Intelligence and CounterIntelligence. https://doi.org/10.1080/08850607.2021.1966589
  • Dickens, T. (2022). Why Intelligence Analysts Need to Write Long Papers. In R. Dover, H. Dylan, & M. S. Goodman (Eds.), A Research Agenda for Intelligence Studies and Government (pp. 127–140). Edward Elgar Publishing. https://www.elgaronline.com/view/book/9781800378803/book-part-9781800378803-18.xml
  • Doubleday, J. (2023, January 25). CIA official ‘doesn’t envision’ chatbots replacing human analysts. Federal News Network. https://federalnewsnetwork.com/artificial-intelligence/2023/01/cia-official-doesnt-envision-chatbots-replacing-human-analysts/
  • Dyson, S. B., & Duelfer, C. A. (2020). Assessing How the U.S. Intelligence Community Analyzes Foreign Leaders. International Journal of Intelligence and CounterIntelligence, 33(4), 768–796. https://doi.org/10.1080/08850607.2020.1733544
  • Firehock, R. B., Gentry, J. A., Rogers, J. W., & Jr, J. M. S. (2018). Negotiating the review process: a CIA guide to intelligence analysis, 1970. Intelligence and National Security, 33(5), 774–783. https://doi.org/10.1080/02684527.2018.1470072
  • Frank, A. (2017). Computational social science and intelligence analysis. Intelligence and National Security, 32(5), 579–599. https://doi.org/10.1080/02684527.2017.1310968
  • Freedman, L. (1997). The CIA and the soviet threat: The politicization of estimates, 1966-1977. Intelligence and National Security, 12(1), 122–142. https://doi.org/10.1080/02684529708432402
  • Friedman, J. A., & Zeckhauser, R. (2016). Why Assessing Estimative Accuracy is Feasible and Desirable. Intelligence and National Security, 31(2), 178–200. https://doi.org/10.1080/02684527.2014.980534
  • Gazit, S. (1988). Intelligence estimates and the decision‐maker. Intelligence and National Security, 3(3), 261–287. https://doi.org/10.1080/02684528808431963
  • Gentry, J. A. (2016). Managers of Analysts: The Other Half of Intelligence Analysis. Intelligence and National Security, 31(2), 154–177. https://doi.org/10.1080/02684527.2014.961244
  • George, A. L., & Stern, E. K. (2002). Harnessing Conflict in Foreign Policy Making: From Devil’s to Multiple Advocacy. Presidential Studies Quarterly, 32(3), 484–505. https://doi.org/10.1111/j.1741-5705.2002.tb00003.x
  • Gioe, D. V., Hatfield, J. M., & Stout, M. (2020). Can United States intelligence community analysts telework? Intelligence and National Security, 35(6), 885–901. https://doi.org/10.1080/02684527.2020.1767389
  • Gustafson, K. (2010). Strategic Horizons: Futures Forecasting and the British Intelligence Community. Intelligence and National Security, 25(5), 589–610. https://doi.org/10.1080/02684527.2010.537118
  • Hare, N., & Coghill, P. (2016). The future of the intelligence analysis task. Intelligence and National Security, 31(6), 858–870. https://doi.org/10.1080/02684527.2015.1115238
  • Hart, D., & Simon, S. (2006). Thinking straight and talking straight: Problems of intelligence analysis. Survival, 48(1), 35–60. https://doi.org/10.1080/00396330600594231
  • Heazle, M. (2010). Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters. Intelligence and National Security, 25(3), 290–308. https://doi.org/10.1080/02684527.2010.489780
  • Hendrickson, N. (2022). How to explain the value of intelligence analysis: external consequences or internal characteristics? Intelligence and National Security. https://doi.org/10.1080/02684527.2022.2076336
  • Herman, M. (1995). Assessment machinery: British and American models. Intelligence and National Security, 10(4), 13–33. https://doi.org/10.1080/02684529508432323
  • Heuer, R. (1981). Strategic deception and counter-deception. A cognitive process approach. International Studies Quarterly, 25(2), 294–327. https://doi.org/10.2307/2600359
  • Heuer, Richard J. (2007). Psychology of Intelligence Analysis. Center for the Study of Intelligence - Central Intelligence Agency. https://www.cia.gov/resources/csi/books-monographs/psychology-of-intelligence-analysis-2/
  • Hijzen, C. W. (2021). Intelligence analysis in a changing world, an introduction. Journal of Intelligence History, 20(1), 1–6. https://doi.org/10.1080/16161262.2020.1746142
  • House, J. M. (2022). Intelligence and the State: Analysts and Decision Makers. U.S. Naval Institute Press. https://www.usni.org/press/books/intelligence-and-state
  • Irwin, D., & Mandel, D. R. (2019). Improving information evaluation for intelligence production. Intelligence and National Security, 34(4), 503–525. https://doi.org/10.1080/02684527.2019.1569343
  • Jones, N. (2018). Critical epistemology for Analysis of Competing Hypotheses. Intelligence and National Security, 33(2), 273–289. https://doi.org/10.1080/02684527.2017.1395948
  • Jr, R. J. H., & Pherson, R. H. (2010). Structured Analytic Techniques for Intelligence Analysis (Revised edition). CQ Press.
  • Kahneman, D., & Klein, G. (2009). Conditions for intuitive expertise: a failure to disagree.(Author abstract)(Report). The American Psychologist, 64(6), 515–526. https://doi.org/10.1037/a0016755
  • Kamien, D. (2023, April 5). ChatGPT and Intelligence Analysis. https://www.youtube.com/watch?v=eopEuGWk3W4
  • Keene, B. (2019, May 16). The Intelligence Trap. Medium. https://medium.com/@benkeene/the-intelligence-trap-9114f892d527
  • Knack, A., Carter, R., & Babuta, A. (2022). Human-Machine Teaming in Intelligence Analysis. The Alan Turing Institute: Centre for Emerging Technology and Security. https://cetas.turing.ac.uk/publications/human-machine-teaming-intelligence-analysis
  • Kreuzer, M. P. (2016). Professionalizing Intelligence Analysis: An Expertise and Responsibility Centered Approach. Intelligence and National Security, 31(4), 579–597. https://doi.org/10.1080/02684527.2015.1039228
  • Lowenthal, M. M. (2021). Intelligence is NOT About “Telling Truth to Power.” International Journal of Intelligence and CounterIntelligence, 34(4), 795–798. https://doi.org/10.1080/08850607.2021.1928438
  • Lutsch, A. (2020). Focusing on Practices of Intelligence Analysis within the EU. International Journal of Intelligence and CounterIntelligence, 33(3), 499–505. https://doi.org/10.1080/08850607.2020.1754671
  • M. Isaksen, B. G., & McNaught, K. R. (2023). Towards a better framework for estimative intelligence – addressing quality through a systematic approach to uncertainty handling. Intelligence and National Security, 0(0), 1–24. https://doi.org/10.1080/02684527.2023.2216963
  • Mandel, D. R. (2020). The occasional maverick of analytic tradecraft. Intelligence and National Security, 35(3), 438–443. https://doi.org/10.1080/02684527.2020.1723830
  • Mandel, D. R., & Irwin, D. (2021). Uncertainty, Intelligence, and National Security Decisionmaking. International Journal of Intelligence and CounterIntelligence, 34(3), 558–582. https://doi.org/10.1080/08850607.2020.1809056
  • Manjikian, M. (2013). Positivism, Post-Positivism, and Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 26(3), 563–582. https://doi.org/10.1080/08850607.2013.758002
  • Marrin, S. (2007a). At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and Counterintelligence, 20(3), 401–414. https://doi.org/10.1080/08850600701249733
  • Marrin, S. (2007b). Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities. Intelligence and National Security, 22(6), 821–846. https://doi.org/10.1080/02684520701770634
  • Marrin, S. (2012a). Is Intelligence Analysis an Art or a Science? International Journal of Intelligence and CounterIntelligence, 25(3), 529–545. https://doi.org/10.1080/08850607.2012.678690
  • Marrin, S. (2012b). Intelligence Studies Centers: Making Scholarship on Intelligence Analysis Useful. Intelligence and National Security, 27(3), 398–422. https://doi.org/10.1080/02684527.2012.668082
  • Marrin, S. (2012c). Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security, 27(6), 896–912. https://doi.org/10.1080/02684527.2012.699290
  • Marrin, S. (2017a). Understanding and improving intelligence analysis by learning from other disciplines. Intelligence and National Security, 32(5), 539–547. https://doi.org/10.1080/02684527.2017.1310913
  • Marrin, S. (2017b). Why strategic intelligence analysis has limited influence on American foreign policy. Intelligence and National Security, 32(6), 725–742. https://doi.org/10.1080/02684527.2016.1275139
  • Marrin, S. (2020). Analytic objectivity and science: evaluating the US Intelligence Community’s approach to applied epistemology. Intelligence and National Security, 35(3), 350–366. https://doi.org/10.1080/02684527.2019.1710806
  • Marrin, S., & Clemente, J. D. (2006). Modeling an Intelligence Analysis Profession on Medicine. International Journal of Intelligence and CounterIntelligence, 19(4), 642–665. https://doi.org/10.1080/08850600600829882
  • Marrin, S., & Torres, E. (2017). Improving how to think in intelligence analysis and medicine. Intelligence and National Security, 32(5), 649–662. https://doi.org/10.1080/02684527.2017.1311472
  • Mitchell, G. R. (2006). Team B Intelligence Coups. Quarterly Journal of Speech, 92(2), 144–173. https://doi.org/10.1080/00335630600817993
  • Muller, D. G. (2008). Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence, 21(1), 1–12. https://doi.org/10.1080/08850600701648652
  • O’Sullivan, T., & Ramsay, J. (2023). Science and Stovepipes: The Covid/Climate Mandate for Intelligence Analysis and Education. Journal of Security, Intelligence, and Resilience Education, 16(14), 1–7. https://jsire.org/no-14-science-and-stovepipes-the-covid-climate-mandate-for-intelligence-analysis-and-education/
  • Omand, D. (2020). How Spies Think: Ten Lessons in Intelligence. Penguin. https://uk.bookshop.org/books/how-spies-think-ten-lessons-in-intelligence/9780241385180
  • Pascovich, E. (2018). The devil’s advocate in intelligence: the Israeli experience. Intelligence and National Security, 33(6), 854–865. https://doi.org/10.1080/02684527.2018.1470062
  • Pedersen, T., & Jansen, P. T. (2019). Seduced by secrecy – perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidence. Intelligence and National Security, 34(6), 881–898. https://doi.org/10.1080/02684527.2019.1628453
  • Peltz, V. (2023, January 25). Using REASON to Improve Intel Analysis. Intelligence Advanced Research Projects Activity. https://www.iarpa.gov/newsroom/article/reason-showcase-using-reason-to-improve-intel-analysis
  • Phythian, M. (2017). Intelligence analysis and social science methods: exploring the potential for and possible limits of mutual learning. Intelligence and National Security, 32(5), 600–612. https://doi.org/10.1080/02684527.2017.1310972
  • Pili, G. (2021). Why HAL 9000 is not the future of intelligence analysis: Intelligence analysis in the 21st century. The Journal of Intelligence, Conflict, and Warfare, 4(1), 45–65. https://doi.org/10.21810/jicw.v4i1.2566
  • Pili, G. (2023). Deciphering intelligence analysis: the synthetic nature of the core intelligence function. Intelligence and National Security, 38(1), 128–142. https://doi.org/10.1080/02684527.2022.2041947
  • Pronk, D. (2021). Anticipating surprise in an era of global technology advances: a framework for scientific & technical intelligence analysis. Journal of Intelligence History, 20(1), 60–71. https://doi.org/10.1080/16161262.2020.1746141
  • Rosenberg, J. (2008). The Interpretation of Probability in Intelligence Estimation and Strategic Assessment. Intelligence and National Security, 23(2), 139–152. https://doi.org/10.1080/02684520801977238
  • Shaffer, R., & Shearn, B. (2023). Advancing intelligence analysis: using natural language processing on East Pakistani intelligence documents. Intelligence and National Security, 0(0), 1–24. https://doi.org/10.1080/02684527.2023.2170744
  • Shakoor, T. R. (2023). Unwinding the Intelligence Cycle in Denmark. International Journal of Intelligence and CounterIntelligence, 0(0), 1–19. https://doi.org/10.1080/08850607.2023.2193133
  • Shapira, I., & Siman-Tov, D. (2022). Israeli defense intelligence (IDI): adaptive evolution in the interaction between collection and analysis. Intelligence and National Security. https://doi.org/10.1080/02684527.2022.2110652
  • Sharfman, P. (1995). Intelligence analysis in an age of electronic dissemination. Intelligence and National Security, 10(4), 201–211. https://doi.org/10.1080/02684529508432333
  • Sherman. Kent. (1966). Strategic intelligence for American world policy. Princeton University Press. http://www.jstor.org/stable/10.2307/j.ctt183q0qt
  • Shultz, R. (2018). Post-9/11 wartime intelligence analysis. Intelligence and National Security, 33(7), 974–998. https://doi.org/10.1080/02684527.2018.1489998
  • Smallman, E. (2020, November 4). Thinking like a spy can help us sort truth from lies, says former head of GCHQ. Inews.Co.Uk. https://inews.co.uk/inews-lifestyle/people/thinking-like-a-spy-truth-lies-former-head-of-gchq-david-omand-748465
  • Stenslie, S., Haugom, L., & Vaage, B. H. (Eds.). (2021). Intelligence Analysis in the Digital Age. Routledge. https://www.routledge.com/Intelligence-Analysis-in-the-Digital-Age/Stenslie-Haugom-Vaage/p/book/9780367766993
  • Tang, J. (2017). How do we know? What intelligence analysis can learn from the sociology of science. Intelligence and National Security, 32(5), 663–674. https://doi.org/10.1080/02684527.2017.1311473
  • Teirilä, O. J. (2023). The Optimal Analyst: Balancing the Width and Depth in Strategic Intelligence. International Journal of Intelligence and CounterIntelligence, 0(0), 1–12. https://doi.org/10.1080/08850607.2022.2152765
  • United States Government. (2009). A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis. United States Government. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
  • Vandepeer, C. (2018). Intelligence and knowledge development: what are the questions intelligence analysts ask? Intelligence and National Security, 33(6), 785–803. https://doi.org/10.1080/02684527.2018.1454029
  • Vogel, K. M. (2022). The Impact of Technology on Intelligence Analysis. In R. Dover, H. Dylan, & M. S. Goodman (Eds.), A Research Agenda for Intelligence Studies and Government (pp. 113–124). Edward Elgar Publishing. https://www.elgaronline.com/view/book/9781800378803/book-part-9781800378803-16.xml
  • Vogel, K. M., Reid, G., Kampe, C., & Jones, P. (2021). The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability, and management. Intelligence and National Security, 36(6), 827–848. https://doi.org/10.1080/02684527.2021.1946952
  • Walsh, P. F. (2017). Improving strategic intelligence analytical practice through qualitative social research. Intelligence and National Security, 32(5), 548–562. https://doi.org/10.1080/02684527.2017.1310948
  • Warner, M. (2017). Analysis as history, and history as analysis: a search for common goals and standards. Intelligence and National Security, 32(5), 613–624. https://doi.org/10.1080/02684527.2017.1310974
  • Whitesmith, M. (2020). Experimental Research in Reducing the Risk of Cognitive Bias in Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 33(2), 380–405. https://doi.org/10.1080/08850607.2019.1690329
  • Whitesmith, M. (2022). Justified true belief theory for intelligence analysis. Intelligence and National Security. https://doi.org/10.1080/02684527.2022.2076332
  • Zenko, M. (2015). Red Team: how to succeed by thinking like the enemy. Basic Books.


Copyright © 2024 Crossbow Analytics LLC - All Rights Reserved.

  • Disclaimer

Powered by

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close