Abramova FA, Grinberg LM, Yampolskaya OV, Walker DH. Pathology of inhalational anthrax in 42 cases from the Sverdlovsk outbreak of 1979. Proc Natl Acad Sci U S A. 1993;90:2291–2314. [PMC free article] [PubMed] [Google Scholar]
Agustin, D., Mantoro, T., & Yulivan, I. (2022). Historical Study of the Development of the Misuse of Biological Weapons Technology. International Conference Computing Engineering and Design. https://doi.org/10.1109/icced56140.2022.10010443
Alibek K, Handelman S (2000). Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World – Told from Inside by the Man Who Ran it. Delta. ISBN 978-0-385-33496-9.
Appel JM (July 2009). "Is all fair in biological warfare? The controversy over genetically engineered biological weapons". Journal of Medical Ethics. 35(7): 429–32. doi:10.1136/jme.2008.028944. PMID 19567692. S2CID 1643086.
Aucouturier E (2020). Biological Warfare: Another French Connexion. Matériologiques. ISBN 978-2-37361-239-4.
Balmer, B. (2001b). Britain and Biological Warfare: Expert Advice and Science Policy, 1930-65. Null. https://doi.org/null
Balmer, B., & Balmer, B. (2002). Biological warfare: The threat in historical perspective. Medicine, Conflict and Survival. https://doi.org/10.1080/13623690208409619
Chevrier MI, Chomiczewski K, Garrigue H, eds. (2004). The Implementation of Legally Binding Measures to Strengthen the Biological and Toxin Weapons Convention: Proceedings of the NATO Advanced Study Institute, Held in Budapest, Hungary, 2001. Vol. 150 of NATO science series: Mathematics, physics, and chemistry (illustrated ed.). Springer. ISBN 978-1402020971.
Dando, M., Pearson, G. S., Tóth, T., Technical, & Convention, T. W. (2000). Verification of the biological and toxin weapons convention. Null. https://doi.org/10.1007/978-94-017-3643-5
Derbes VJ. De Mussis and the great plague of 1348. A forgotten episode of bacteriological warfare. JAMA. 1966;196:59–62. [PubMed] [Google Scholar]
Domaradskiĭ, I. V., Domaradskiĭ, I. V., Orent, W., Domaradskij, I. V., & Orent, W. (2003). Biowarrior: Inside the Soviet/Russian Biological War Machine. Null. https://doi.org/null
Fenn EA (2000). "Biological Warfare in Eighteenth-Century North America: Beyond Jeffery Amherst". Journal of American History. 86 (4): 1552–1580. doi:10.2307/2567577. JSTOR 2567577. PMID 18271127.
Geissler, E. (1999). Biological warfare activities in Germany, 1923-45. Null. https://doi.org/null
Geissler, E., Guillemin, J. (2010). German flooding of the Pontine Marshes in World War II. Politics and the Life Sciences. https://doi.org/10.2990/29_1_2
Guillemin, J. (1999a). Anthrax: The investigation of a deadly outbreak. Null. https://doi.org/null
Guillemin, J. (2013). The soviet biological weapons program a history the soviet biological weapons program. Politics and the Life Sciences. https://doi.org/10.2990/32_1_102
Guillemin, J. (2017a). Hidden Atrocities: Japanese Germ Warfare and American Obstruction of Justice at the Tokyo Trial. Null. https://doi.org/null
Guillemin, J. (2006). Scientists and the history of biological weapons. A brief historical overview of the development of biological weapons in the twentieth century. EMBO Reports. https://doi.org/10.1038/sj.embor.7400689
Guillemin, J., Meselson, M., Robinson, J. P., & Sims, N. (2016). Witness Seminar: Origins of the Biological Weapons Convention. Null. https://doi.org/10.1142/9781783269488_0021
Handelman, S., Alibek, K., Alibek, K., Handelman, S., Handelman, S., Alibek, K., & Handelman, S. (1999). Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World–Told from the Inside by the Man Who Ran It. Null. https://doi.org/null
Harris S. (1992) Japanese biological warfare research on humans: a case study of microbiology and ethics. Ann N Y Acad Sci. 666:21–52. [PubMed] [Google Scholar]
Harris, S. (1993). Factories of Death: Japanese Biological Warfare, 1932-45, and the American Cover-up. Null. https://doi.org/null
Henderson DA, Inglesby TV, Bartlett JG, Ascher MS, Eitzen E, Jahrling PB, Hauer J, Layton M, McDade J, Osterholm MT, O'Toole T, Parker G, Perl T, Russell PK, Tonat K. (1999) Smallpox as a biological weapon: medical and public health management. Working Group on Civilian Biodefense. JAMA. 281:2127–2137. [PubMed] [Google Scholar]
Kadlec RP, Zelicoff AP, Vrtis AM. (1997) Biological weapons control. Prospects and implications for the future. JAMA. 278:351–356. [PubMed] [Google Scholar]
Kaufer, A., Kaufer, A. M., Theis, T., Lau, K. A., Gray, J. L., & Rawlinson, W. D. (2020). Biological warfare: The history of microbial pathogens, biotoxins and emerging threats. Microbiology Australia. https://doi.org/10.1071/ma20031
Kelle, A., Nixdorff, K., & Dando, M. (2006). Controlling Biochemical Weapons: Adapting Multilateral Arms Control for the 21st Century. Null. https://doi.org/null
Kelle, A., Nixdorff, K., & Dando, M. (2008). A Paradigm Shift in the CBW Proliferation Problem: Devising Effective Restraint on the Evolving Biochemical Threat. Null. https://doi.org/null
Kelle, A., Nixdorff, K., & Dando, M. (2010). Strengthening BWC Prevention of State-Sponsored Bioweapons. Bulletin of The Atomic Scientists. https://doi.org/10.2968/066001003
Kelle, A., Nixdorff, K., & Dando, M. (2012c). Preventing a Biochemical Arms Race. Null. https://doi.org/null
Knollenberg B (1954). "General Amherst and Germ Warfare". Mississippi Valley Historical Review. 41 (3): 489–494. doi:10.2307/1897495. JSTOR 1897495. British war against Indians in 1763
Leitenberg, M. (1991). A return to Sverdlovsk: Allegations of Soviet activities related to biological weapons. Contemporary Security Policy. https://doi.org/10.1080/01440389108403950
Leitenberg, M. (1999). Aum Shinrikyo’s efforts to produce biological weapons: A case study in the serial propagation of misinformation. Terrorism and Political Violence. https://doi.org/10.1080/09546559908427537
Leitenberg, M. (2001). Biological weapons in the twentieth century: A review and analysis. Critical Reviews in Microbiology. https://doi.org/10.1080/20014091096774
Leitenberg, M. (2003). Distinguishing offensive from defensive biological weapons research. Critical Reviews in Microbiology. https://doi.org/10.1080/713610450
Leitenberg, M. (2005). Assessing The Biological Weapons And Bioterrorism Threat. Null. https://doi.org/null
Mayor A (2009). Greek Fire, Poison Arrows & Scorpion Bombs: Biological and Chemical Warfare in the Ancient World (revised ed.). Overlook. ISBN 978-1-58567-348-3.
Meselson M, Guillemin J, Hugh-Jones M, Langmuir A, Popova I, Shelokov A, Yampolskaya O. (1994) The Sverdlovsk anthrax outbreak of 1979. Science. 266:1202–1208. [PubMed] [Google Scholar]
National Academies of Sciences, Engineering, and Medicine (2018). Biodefense in the Age of Synthetic Biology. National Academies Press. doi:10.17226/24890. ISBN 978-0-309-46518-2. PMID 30629396. S2CID 90767286.
Norris J. (1977) East or west? The geographic origin of the Black Death. Bull Hist Med. 51:1–24. [PubMed] [Google Scholar]
Orent W (2004). Plague, The Mysterious Past and Terrifying Future of the World's Most Dangerous Disease. New York, NY: Simon & Schuster, Inc. ISBN 978-0-7432-3685-0.
Pearson, G. S. (2020). The Regime To Prevent Biological Weapons: Opportunities For A Safer, Healthier, More Prosperous World. Bioterrorism: The History of a Crisis in American Society. https://doi.org/10.4324/9781003123644-40
Poupard JA, Miller LA. (1992) History of biological warfare: catapults to capsomeres. Ann NY Acad Sci. 666:9–20. [PubMed] [Google Scholar]
Preston R (2002). The Demon in the Freezer. New York: Random House.
Rasnake, J. A. (2000). History of Biological Weapons and an Analysis of the Actual Threat to the United States. Null. https://doi.org/null
Robertson AG, Robertson LJ. (1995) From asps to allegations: biological warfare in history. Mil Med. 160:369–373. [PubMed] [Google Scholar]
Robinson, J. P., Guillemin, J., & Meselson, M. (1987). Yellow Rain: The Story Collapses. Foreign Policy. https://doi.org/10.2307/1148733
Rosebury, T., & Rosebury, T. (2018). Peace or Pestilence: Biological Warfare and How to Avoid It. Null. https://doi.org/null
Scharf, M. P. (1999). Clear and Present Danger: Enforcing the International Ban on Biological and Chemical Weapons Through Sanctions, Use of Force, and Criminalization. Michigan Journal of International Law. https://doi.org/10.4324/9781003123644-39
Schmelzer, C. D. (2014). Ambivalent Multilateralism: The United States and the Biological Weapons Convention. Null. https://doi.org/null
Sims, N. A. (2011). A simple treaty, a complex fulfillment: A short history of the Biological Weapons Convention Review Conferences. Bulletin of The Atomic Scientists. https://doi.org/10.1177/0096340211407400
Warner J, Ramsbotham J, Tunia E, Vadez JJ (May 2011). Analysis of the Threat of Genetically Modified Organisms for Biological Warfare. Washington, DC: National Defense University.
Wheelis M. Biological warfare at the 1346 siege of Caffa. (2002) Emerg Infect Dis. 8:971–975. [PMC free article] [PubMed] [Google Scholar]
Woods JB, ed. (April 2005). USAMRIID's Medical Management of Biological Casualties Handbook (PDF) (6th ed.). Fort Detrick, Maryland: U.S. Army Medical Institute of Infectious Diseases.
Yu VL. Serratia marcescens: historical perspective and clinical review. N Engl J Med. 979;300:887–893. [PubMed] [Google Scholar]
Zelicoff A, Bellomo M (2005). Microbe: Are we Ready for the Next Plague?. AMACOM Books, New York, NY. ISBN 978-0-8144-0865-0.
Zilinskas RA. (1997) Iraq's biological weapons. The past as future? JAMA. 278:418–424. [PubMed] [Google Scholar]
Zilinskas, R. A. (2006). The anti-plague system and the Soviet biological warfare program. Critical Reviews in Microbiology. https://doi.org/10.1080/10408410500496896
Zilinskas, R. A. (2017). A brief history of biological weapons programmes and the use of animal pathogens as biological warfare agents. Revue Scientifique Et Technique De L Office International Des Epizooties. https://doi.org/10.20506/rst.36.2.2662
Biosecurity
An efficient and Practical approach to Biosecurity. (n.d.). 276.
An introduction to biopreparedness. (n.d.). 269.
Antosia, R. E., & Cahill, J. D. (2006). Handbook of bioterrorism and disaster medicine. Springer.
Berger, K. M., DiEuliis, D., Meyer, C., & Rao, V. (n.d.). ROADMAP FOR IMPEMENTING BIOSECURITY AND BIODEFENSE POLICY IN THE UNITED STATES. 109.
Biosafety and Biohazard Evaluation. (n.d.). 33.
Biosecurity Challenges of the Global Expansion of High-Containment Biological Laboratories (p. 13315). (2012). National Academies Press. https://doi.org/10.17226/13315
Biosecurity Working Group. (2007). A code of conduct for biosecurity. Royal Netherlands Academy of Sciences.
Board on Life Sciences, Division on Earth and Life Studies, & National Academies of Sciences, Engineering, and Medicine. (2018). Governance of Dual Use Research in the Life Sciences: Advancing Global Consensus on Research Oversight: Proceedings of a Workshop (J. Revill, J. Husbands, & K. Bowman, Eds.; p. 25154). National Academies Press. https://doi.org/10.17226/25154
Butler, C. D. (n.d.). ‘Gain of function’ research can create experimental viruses. In light of COVID, it should be more strictly regulated – or banned. 4.
Clevestig, P. (2009). Handbook of applied biosecurity for life science laboratories. SIPRI, Stockholm International Peace Research Institute.
Commission on a Global Health Risk Framework for the Future & National Academy of Medicine, Secretariat. (2016). The Neglected Dimension of Global Security: A Framework to Counter Infectious Disease Crises (p. 21891). National Academies Press. https://doi.org/10.17226/21891
Criminal Investigation Handbook for Agroterrorism. (n.d.). 98.
Dando, M. (n.d.-a). Biological Weapons and the Biological Weapons Convention: History of Misuse and Assimilation into Security Apparatus. 6.
Dando, M. (n.d.-b). The Dutch experiment with a biosecurity code of conduct. 12.
DiEuliis, D., & Giordano, J. (2022). The Need for Modernization of Biosecurity in the Post-COVID World. MSphere, 7(2), e00025-22. https://doi.org/10.1128/msphere.00025-22
Drew, T. W., & Mueller-Doblies, U. U. (2017). Dual use issues in research – A subject of increasing concern? Vaccine, 35(44), 5990–5994. https://doi.org/10.1016/j.vaccine.2017.07.109
Du, L., Li, Y., Gao, J., Zhou, Y., & Jiang, S. (2012). Potential strategies and biosafety protocols used for dual-use research on highly pathogenic influenza viruses: Biosafety protocols for dual-use research on H5N1. Reviews in Medical Virology, 22(6), 412–419. https://doi.org/10.1002/rmv.1729
Edwards, B., Revill, J., & Bezuidenhout, L. (2014). From Cases to Capacity? A Critical Reflection on the Role of ‘Ethical Dilemmas’ in the Development of Dual-Use Governance. Science and Engineering Ethics, 20(2), 571–582. https://doi.org/10.1007/s11948-013-9450-7
Engel-Glatter, S. (2014). Dual-use research and the H5N1 bird flu: Is restricting publication the solution to biosecurity issues? Science and Public Policy, 41(3), 370–383. https://doi.org/10.1093/scipol/sct064
Engel-Glatter, S., & Ienca, M. (2018). Life scientists’ views and perspectives on the regulation of dual-use research of concern. Science and Public Policy, 45(1), 92–102. https://doi.org/10.1093/scipol/scx050
Evans, N. G. (2013). Contrasting Dual-Use Issues in Biology and Nuclear Science. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects. ANU Press. https://doi.org/10.22459/DUSE.12.2013.16
Evans, S. W. (n.d.). Biosecurity Governance for the Real World. 6.
Gronvall, G. K., Wang, L., McGrath, P. F., Cicero, A. J., Yuan, Y., Parker, M. I., Zhang, W., Sun, Y., Xue, Y., Zhang, J., Zhang, X., Yu, L., Song, J., & Trotochaud, M. (2022). The Biological Weapons Convention should endorse the Tianjin Biosecurity Guidelines for Codes of Conduct. Trends in Microbiology, 30(12), 1119–1120. https://doi.org/10.1016/j.tim.2022.09.014
Hagerman, A. D., & McCarl, B. A. (2008). Effects of Biosecurity Risk and Food Scare Events on Food Prices and Demand: Discussion. American Journal of Agricultural Economics, 90(5,), 1287–1288.
Hansen, M. B., Lilly, D., D’Esopo, M., & Fox, J. (n.d.). Editorial and Design Team. 45.
Hobson, P. T., Sundaram, L. S., Aldridge, D., Christie, A., Edwards, B., Dando, M., Petrovan, S., Shang, L., & Sutherland, W. (n.d.). Submission of Evidence to The Cabinet Office Enquiry on The Biological Security Strategy. 23.
Holtcamp, W. (2012). One Study, Two Paths: The Challenge of Dual-Use Research. Environmental Health Perspectives, 120(6). https://doi.org/10.1289/ehp.120-a238
Hunter, P. (2012). H5N1 infects the biosecurity debate: Governments and life scientists are waking up to the problem of dual‐use research. EMBO Reports, 13(7), 604–607. https://doi.org/10.1038/embor.2012.80
Hvistendahl, M. (n.d.-a). Experimenting With Disaster Part. 20.
Hvistendahl, M. (n.d.-b). Experimenting With Disaster Part 2. 6.
Hvistendahl, M. (n.d.-c). Experimenting With Disaster Part 3. 21.
Improving Security through International Biosafety Norms. (n.d.). 42.
Ismajani, D. D., & Mertens, D. E. (n.d.). Strengthen Biosafety and Biosecurity Training for the Biosafety and Biosecurity Initiative of the Africa CDC Platforms for in-person and virtual training. 10.
Koblentz, G. D. (2018). A Critical Analysis of the Scientific and Commercial Rationales for the De Novo Synthesis of Horsepox Virus. MSphere, 3(2), e00040-18. https://doi.org/10.1128/mSphere.00040-18
Lentzos, F. (n.d.-a). In mehr als 60 Hochsicherheitslaboren auf der ganzen Welt forschen Wissenschaftler an den gefährlichsten Viren und Bakterien, die es gibt. Die nächste Pandemie könnte aus einer dieser Einrichtungen kommen. 18.
Lentzos, F. (n.d.-b). The horror from the laboratory. 15.
MacIntyre, C. R. (2015). Biopreparedness in the Age of Genetically Engineered Pathogens and Open Access Science: An Urgent Need for a Paradigm Shift. Military Medicine, 180(9), 943–949. https://doi.org/10.7205/MILMED-D-14-00482
Marris, C. (n.d.). Synthetic biology and biosecurity: Challenging the “myths.” Frontiers in Public Health, 15.
Marris, C., Jefferson, C., & Lentzos, F. (2014). Negotiating the dynamics of uncomfortable knowledge: The case of dual use and synthetic biology. BioSocieties, 9(4), 393–420. https://doi.org/10.1057/biosoc.2014.32
Martinez, C. K. (2007). Biodefense research supporting the DoD: A new strategic vision. Strategic Studies Institute, U.S. Army War College.
McLeish, C., Spelling, A., & Balmer, B. (n.d.). The problems of prohibition: Chemical weapons and the Syrian conflict. 8.
Miller, S. (2013). Moral Responsibility, Collective-Action Problems and the Dual-Use Dilemma in Science and Technology. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects. ANU Press. https://doi.org/10.22459/DUSE.12.2013.12
Millett, P., & Snyder-Beattie, A. (2017). Existential Risk and Cost-Effective Biosecurity. Health Security, 15(4), 373–383. https://doi.org/10.1089/hs.2017.0028
Patrone, D., Resnik, D., & Chin, L. (2012). Biosecurity and the Review and Publication of Dual-Use Research of Concern. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 10(3), 290–298. https://doi.org/10.1089/bsp.2012.0011
Pearson, G. S. (n.d.). Strengthening the. 32.
Perkins, D., Danskin, K., Rowe, A. E., & Livinski, A. A. (2019). The Culture of Biosafety, Biosecurity, and Responsible Conduct in the Life Sciences: A Comprehensive Literature Review. Applied Biosafety, 24(1), 34–45. https://doi.org/10.1177/1535676018778538
Pilch, R., & Pomper, M. (n.d.). A GUIDE TO GETTING SERIOUS ABOUT BIO-LAB SAFETY. 12.
Purkitt, H. E. (2005). Biowarfare Lessons, Emerging Biosecurity Issues, and Ways to Monitor Dual-Use Biotechnology Trends in the Future: Defense Technical Information Center. https://doi.org/10.21236/ADA460394
Rambhia, K. J., Ribner, A. S., & Gronvall, G. K. (2011). Everywhere You Look: Select Agent Pathogens. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 9(1), 69–71. https://doi.org/10.1089/bsp.2011.0321
Recommended Policy Guidance for Departmental Development of Review Mechanisms for. (2017). 6.
Resnik, D. B. (2013). H5N1 Avian Flu Research and the Ethics of Knowledge. Hastings Center Report, 43(2), 22–33. https://doi.org/10.1002/hast.143
Rethinking biosecurity. (n.d.). 5.
Ryan, J. R. (2016). Biosecurity and bioterrorism: Containing and preventing biological threats (Second edition). Elsevier/BH, Butterworth-Heinemann is an imprint of Elsevier.
Salerno, R. M. (n.d.-a). Biosecurity and Bioterrorism. 17.
Salerno, R. M. (n.d.-b). The Status of International Biosecurity. 23.
Schuerger, C., Abdulla, S., & Puglisi, A. (2022). Mapping Biosafety Level-3 Laboratories by Publications. Center for Security and Emerging Technology. https://doi.org/10.51593/20220019
Shang, L., Mprah, M., Ravi, I., & Dando, M. (2022). Key issues in the implementation of the Tianjin Biosecurity Guidelines for Codes of Conduct for Scientists: A survey of biosecurity education projects. Biosafety and Health, 4(5), 339–346. https://doi.org/10.1016/j.bsheal.2022.08.003
Stemerding, D., & Murdock, K. (n.d.). Implementing biosecurity in (bio-)scientific research in the Netherlands. 5.
Suk, J. E., Vogel, K. M., & Ozin, A. J. (Eds.). (2015). Dual-Use Life Science Research and Biosecurity in the 21st Century: Social, Technical, Policy, and Ethical Challenges. Frontiers Media SA. https://doi.org/10.3389/978-2-88919-568-8
Suk, J. E., Zmorzynska, A., Hunger, I., Biederbick, W., Sasse, J., Maidhof, H., & Semenza, J. C. (2011). Dual-Use Research and Technological Diffusion: Reconsidering the Bioterrorism Threat Spectrum. PLoS Pathogens, 7(1), e1001253. https://doi.org/10.1371/journal.ppat.1001253
Testimony of Daniel M. (n.d.). 6.
The Tianjin Biosecurity Guidelines for Codes of Conduct for Scientists. (n.d.). 3.
Tucker, J. B. (n.d.). Double-Edged Innovations:346.
Uhlenhaut, C., Burger, R., & Schaade, L. (2013). Protecting society: Biological security and dual‐use dilemma in the life sciences—status quo and options for the future. EMBO Reports, 14(1), 25–30. https://doi.org/10.1038/embor.2012.195
United States Government Policy for Oversight of Life Sciences Dual Use Research of Concern. (n.d.). 4.
van Courtland Moon, J. E. (2008). The development of the norm against the use of poison: What literature tells us. Politics and the Life Sciences, 27(1), 55–77. https://doi.org/10.2990/27_1_55
Vennis, I. M., Boskovic, M., Bleijs, D. A., & Rutjes, S. A. (2022). Complementarity of International Instruments in the Field of Biosecurity. Frontiers in Public Health, 10, 894389. https://doi.org/10.3389/fpubh.2022.894389
Vogel, K. M. (2008). Framing biosecurity: An alternative to the biotech revolution model? Science and Public Policy, 35(1), 45–54. https://doi.org/10.3152/030234208X270513
Vogel, K. M., Ozin, A. J., & Suk, J. E. (2015). Biosecurity and Dual-Use Research: Gaining Function – But at What Cost? Frontiers in Public Health, 3. https://doi.org/10.3389/fpubh.2015.00013
Webster, R. G. (2012). Mammalian-Transmissible H5N1 Influenza: The Dilemma of Dual-Use Research. MBio, 3(1), e00005-12. https://doi.org/10.1128/mBio.00005-12
World Health Organization. (2020). WHO guidance on implementing regulatory requirements for biosafety and biosecurity in biomedical laboratories: A stepwise approach. World Health Organization. https://apps.who.int/iris/handle/10665/332244
World Health Organization. (2022). Global guidance framework for the responsible use of the life sciences: Mitigating biorisks and governing dual-use research. World Health Organization. https://apps.who.int/iris/handle/10665/362313
Zmorzynska, A., Suk, J. E., Biederbick, W., Maidhof, H., Sasse, J., Semenza, J. C., & Hunger, I. (2011). Unfinished Business: Efforts to Define Dual-Use Research of Bioterrorism Concern. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 9(4), 372–378. https://doi.org/10.1089/bsp.2011.0021
Aldrich, R. J. (2015). The 100 billion dollar brain: central intelligence machinery in the UK and the US. International Affairs, 91(2), 393–403. https://doi.org/10.1111/1468-2346.12242
Aldrich, R. J. (2017). Strategic culture as a constraint: intelligence analysis, memory and organizational learning in the social sciences and history. Intelligence and National Security, 32(5), 625–635. https://doi.org/10.1080/02684527.2017.1310977
Bang, M. (2016). Pitfalls in Military Quantitative Intelligence Analysis: Incident Reporting in a Low Intensity Conflict. Intelligence and National Security, 31(1), 49–73. https://doi.org/10.1080/02684527.2014.930584
Barnea, A., & Meshulach, A. (2021). Forecasting for Intelligence Analysis: Scenarios to Abort Strategic Surprise. International Journal of Intelligence and CounterIntelligence, 34(1), 106–133. https://doi.org/10.1080/08850607.2020.1793600
Barnes, A. (2016). Making Intelligence Analysis More Intelligent: Using Numeric Probabilities. Intelligence and National Security, 31(3), 327–344. https://doi.org/10.1080/02684527.2014.994955
Barnes, A. (2020). Getting it right: Canadian intelligence assessments on Iraq, 2002-2003. Intelligence and National Security, 35(7), 925–953. https://doi.org/10.1080/02684527.2020.1771934
Ben-Haim, Y. (2022). What Strategic Analysts and Planners for National Security Need to Know. International Journal of Intelligence and CounterIntelligence, 35(1), 57–72. https://doi.org/10.1080/08850607.2020.1822101
Ben-Israel, I. (1989). Philosophy and methodology of intelligence: The logic of estimate process. Intelligence and National Security, 4(4), 660–718. https://doi.org/10.1080/02684528908432023
Betts, R. K. (1978). Analysis, War, and Decision: Why Intelligence Failures Are inevitable. World Politics, 31(1), 61–89. https://doi.org/10.2307/2009967
Betts, R. K. (1988). Policy‐makers and intelligence analysts: Love, hate or indifference? Intelligence and National Security, 3(1), 184–189. https://doi.org/10.1080/02684528808431934
Blagden, D. (2018). The flawed promise of National Security Risk Assessment: nine lessons from the British approach. Intelligence and National Security, 33(5), 716–736. https://doi.org/10.1080/02684527.2018.1449366
Brand, M. (2019). Mind games: cognitive bias, US intelligence and the 1968 Soviet invasion of Czechoslovakia. Intelligence and National Security, 34(5), 743–757. https://doi.org/10.1080/02684527.2019.1580000
Carvin, S., & Juneau, T. (2021). Intelligence Analysis and Policy Making: The Canadian Experience. Stanford University Press.
Chang, W., & Tetlock, P. E. (2016). Rethinking the training of intelligence analysts. Intelligence and National Security, 31(6), 903–920. https://doi.org/10.1080/02684527.2016.1147164
Chang, W., Berdini, E., Mandel, D. R., & Tetlock, P. E. (2018). Restructuring structured analytic techniques in intelligence. Intelligence and National Security, 33(3), 337–356. https://doi.org/10.1080/02684527.2017.1400230
Claver, A. (2021). Devil’s advocacy and cyber space. In support of quality assurance and decision making. Journal of Intelligence History, 20(1), 88–102. https://doi.org/10.1080/16161262.2020.1864863
Coletta, G. (2018). Politicising intelligence: what went wrong with the UK and US assessments on Iraqi WMD in 2002. Journal of Intelligence History, 17(1), 65–78. https://doi.org/10.1080/16161262.2017.1397400
Conway, P. (2012). Red Team: How the Neoconservatives Helped Cause the Iraq Intelligence Failure. Intelligence and National Security, 27(4), 488–512. https://doi.org/10.1080/02684527.2012.688304
Coulthart, S. (2016). Why do analysts use structured analytic techniques? An in-depth study of an American intelligence agency. Intelligence and National Security, 31(7), 933–948. https://doi.org/10.1080/02684527.2016.1140327
Coulthart, S. (2017). What’s the problem? Frameworks and methods from policy analysis for analyzing complex problems. Intelligence and National Security, 32(5), 636–648. https://doi.org/10.1080/02684527.2017.1310983
Coulthart, S. J. (2017). An Evidence-Based Evaluation of 12 Core Structured Analytic Techniques. International Journal of Intelligence and CounterIntelligence, 30(2), 368–391. https://doi.org/10.1080/08850607.2016.1230706
Dahl, E. J. (2017). Getting beyond analysis by anecdote: improving intelligence analysis through the use of case studies. Intelligence and National Security, 32(5), 563–578. https://doi.org/10.1080/02684527.2017.1310967
Davies, P. H. J., & Gustafson, K. (2017). Weighing the evidence: the BCISS Iraq HUMINT Analytic Matrix Exercise. Intelligence and National Security, 32(7), 905–919. https://doi.org/10.1080/02684527.2017.1328860
Devanny, J., Dover, R., Goodman, M. S., & Omand, D. (2018). Why the British Government Must Invest in the Next Generation of Intelligence Analysts. The RUSI Journal, 163(6), 78–89. https://doi.org/10.1080/03071847.2018.1562027
Dhami, M. K. (2018). Towards an evidence-based approach to communicating uncertainty in intelligence analysis. Intelligence and National Security, 33(2), 257–272. https://doi.org/10.1080/02684527.2017.1394252
Dhami, M. K., & Careless, K. E. (2021). Intelligence Analysis Support Guide: Development and Validation. International Journal of Intelligence and CounterIntelligence. https://doi.org/10.1080/08850607.2021.1966589
Dyson, S. B., & Duelfer, C. A. (2020). Assessing How the U.S. Intelligence Community Analyzes Foreign Leaders. International Journal of Intelligence and CounterIntelligence, 33(4), 768–796. https://doi.org/10.1080/08850607.2020.1733544
Firehock, R. B., Gentry, J. A., Rogers, J. W., & Jr, J. M. S. (2018). Negotiating the review process: a CIA guide to intelligence analysis, 1970. Intelligence and National Security, 33(5), 774–783. https://doi.org/10.1080/02684527.2018.1470072
Freedman, L. (1997). The CIA and the soviet threat: The politicization of estimates, 1966-1977. Intelligence and National Security, 12(1), 122–142. https://doi.org/10.1080/02684529708432402
Friedman, J. A., & Zeckhauser, R. (2016). Why Assessing Estimative Accuracy is Feasible and Desirable. Intelligence and National Security, 31(2), 178–200. https://doi.org/10.1080/02684527.2014.980534
Gentry, J. A. (2016). Managers of Analysts: The Other Half of Intelligence Analysis. Intelligence and National Security, 31(2), 154–177. https://doi.org/10.1080/02684527.2014.961244
George, A. L., & Stern, E. K. (2002). Harnessing Conflict in Foreign Policy Making: From Devil’s to Multiple Advocacy. Presidential Studies Quarterly, 32(3), 484–505. https://doi.org/10.1111/j.1741-5705.2002.tb00003.x
Gioe, D. V., Hatfield, J. M., & Stout, M. (2020). Can United States intelligence community analysts telework? Intelligence and National Security, 35(6), 885–901. https://doi.org/10.1080/02684527.2020.1767389
Gustafson, K. (2010). Strategic Horizons: Futures Forecasting and the British Intelligence Community. Intelligence and National Security, 25(5), 589–610. https://doi.org/10.1080/02684527.2010.537118
Hart, D., & Simon, S. (2006). Thinking straight and talking straight: Problems of intelligence analysis. Survival, 48(1), 35–60. https://doi.org/10.1080/00396330600594231
Heazle, M. (2010). Policy Lessons from Iraq on Managing Uncertainty in Intelligence Assessment: Why the Strategic/Tactical Distinction Matters. Intelligence and National Security, 25(3), 290–308. https://doi.org/10.1080/02684527.2010.489780
Hendrickson, N. (2022). How to explain the value of intelligence analysis: external consequences or internal characteristics? Intelligence and National Security. https://doi.org/10.1080/02684527.2022.2076336
Heuer, R. (1981). Strategic deception and counter-deception. A cognitive process approach. International Studies Quarterly, 25(2), 294–327. https://doi.org/10.2307/2600359
Irwin, D., & Mandel, D. R. (2019). Improving information evaluation for intelligence production. Intelligence and National Security, 34(4), 503–525. https://doi.org/10.1080/02684527.2019.1569343
Jr, R. J. H., & Pherson, R. H. (2010). Structured Analytic Techniques for Intelligence Analysis (Revised edition). CQ Press.
Kahneman, D., & Klein, G. (2009). Conditions for intuitive expertise: a failure to disagree.(Author abstract)(Report). The American Psychologist, 64(6), 515–526. https://doi.org/10.1037/a0016755
Kreuzer, M. P. (2016). Professionalizing Intelligence Analysis: An Expertise and Responsibility Centered Approach. Intelligence and National Security, 31(4), 579–597. https://doi.org/10.1080/02684527.2015.1039228
Lowenthal, M. M. (2021). Intelligence is NOT About “Telling Truth to Power.” International Journal of Intelligence and CounterIntelligence, 34(4), 795–798. https://doi.org/10.1080/08850607.2021.1928438
Lutsch, A. (2020). Focusing on Practices of Intelligence Analysis within the EU. International Journal of Intelligence and CounterIntelligence, 33(3), 499–505. https://doi.org/10.1080/08850607.2020.1754671
M. Isaksen, B. G., & McNaught, K. R. (2023). Towards a better framework for estimative intelligence – addressing quality through a systematic approach to uncertainty handling. Intelligence and National Security, 0(0), 1–24. https://doi.org/10.1080/02684527.2023.2216963
Mandel, D. R., & Irwin, D. (2021). Uncertainty, Intelligence, and National Security Decisionmaking. International Journal of Intelligence and CounterIntelligence, 34(3), 558–582. https://doi.org/10.1080/08850607.2020.1809056
Manjikian, M. (2013). Positivism, Post-Positivism, and Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 26(3), 563–582. https://doi.org/10.1080/08850607.2013.758002
Marrin, S. (2007a). At Arm’s Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers. International Journal of Intelligence and Counterintelligence, 20(3), 401–414. https://doi.org/10.1080/08850600701249733
Marrin, S. (2007b). Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities. Intelligence and National Security, 22(6), 821–846. https://doi.org/10.1080/02684520701770634
Marrin, S. (2012a). Is Intelligence Analysis an Art or a Science? International Journal of Intelligence and CounterIntelligence, 25(3), 529–545. https://doi.org/10.1080/08850607.2012.678690
Marrin, S. (2012b). Intelligence Studies Centers: Making Scholarship on Intelligence Analysis Useful. Intelligence and National Security, 27(3), 398–422. https://doi.org/10.1080/02684527.2012.668082
Marrin, S. (2012c). Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security, 27(6), 896–912. https://doi.org/10.1080/02684527.2012.699290
Marrin, S. (2017a). Understanding and improving intelligence analysis by learning from other disciplines. Intelligence and National Security, 32(5), 539–547. https://doi.org/10.1080/02684527.2017.1310913
Marrin, S. (2017b). Why strategic intelligence analysis has limited influence on American foreign policy. Intelligence and National Security, 32(6), 725–742. https://doi.org/10.1080/02684527.2016.1275139
Marrin, S. (2020). Analytic objectivity and science: evaluating the US Intelligence Community’s approach to applied epistemology. Intelligence and National Security, 35(3), 350–366. https://doi.org/10.1080/02684527.2019.1710806
Marrin, S., & Clemente, J. D. (2006). Modeling an Intelligence Analysis Profession on Medicine. International Journal of Intelligence and CounterIntelligence, 19(4), 642–665. https://doi.org/10.1080/08850600600829882
Marrin, S., & Torres, E. (2017). Improving how to think in intelligence analysis and medicine. Intelligence and National Security, 32(5), 649–662. https://doi.org/10.1080/02684527.2017.1311472
Muller, D. G. (2008). Intelligence Analysis in Red and Blue. International Journal of Intelligence and CounterIntelligence, 21(1), 1–12. https://doi.org/10.1080/08850600701648652
Pascovich, E. (2018). The devil’s advocate in intelligence: the Israeli experience. Intelligence and National Security, 33(6), 854–865. https://doi.org/10.1080/02684527.2018.1470062
Pedersen, T., & Jansen, P. T. (2019). Seduced by secrecy – perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidence. Intelligence and National Security, 34(6), 881–898. https://doi.org/10.1080/02684527.2019.1628453
Phythian, M. (2017). Intelligence analysis and social science methods: exploring the potential for and possible limits of mutual learning. Intelligence and National Security, 32(5), 600–612. https://doi.org/10.1080/02684527.2017.1310972
Pili, G. (2021). Why HAL 9000 is not the future of intelligence analysis: Intelligence analysis in the 21st century. The Journal of Intelligence, Conflict, and Warfare, 4(1), 45–65. https://doi.org/10.21810/jicw.v4i1.2566
Pili, G. (2023). Deciphering intelligence analysis: the synthetic nature of the core intelligence function. Intelligence and National Security, 38(1), 128–142. https://doi.org/10.1080/02684527.2022.2041947
Pronk, D. (2021). Anticipating surprise in an era of global technology advances: a framework for scientific & technical intelligence analysis. Journal of Intelligence History, 20(1), 60–71. https://doi.org/10.1080/16161262.2020.1746141
Rosenberg, J. (2008). The Interpretation of Probability in Intelligence Estimation and Strategic Assessment. Intelligence and National Security, 23(2), 139–152. https://doi.org/10.1080/02684520801977238
Shaffer, R., & Shearn, B. (2023). Advancing intelligence analysis: using natural language processing on East Pakistani intelligence documents. Intelligence and National Security, 0(0), 1–24. https://doi.org/10.1080/02684527.2023.2170744
Shakoor, T. R. (2023). Unwinding the Intelligence Cycle in Denmark. International Journal of Intelligence and CounterIntelligence, 0(0), 1–19. https://doi.org/10.1080/08850607.2023.2193133
Shapira, I., & Siman-Tov, D. (2022). Israeli defense intelligence (IDI): adaptive evolution in the interaction between collection and analysis. Intelligence and National Security. https://doi.org/10.1080/02684527.2022.2110652
Sharfman, P. (1995). Intelligence analysis in an age of electronic dissemination. Intelligence and National Security, 10(4), 201–211. https://doi.org/10.1080/02684529508432333
Tang, J. (2017). How do we know? What intelligence analysis can learn from the sociology of science. Intelligence and National Security, 32(5), 663–674. https://doi.org/10.1080/02684527.2017.1311473
Teirilä, O. J. (2023). The Optimal Analyst: Balancing the Width and Depth in Strategic Intelligence. International Journal of Intelligence and CounterIntelligence, 0(0), 1–12. https://doi.org/10.1080/08850607.2022.2152765
Vandepeer, C. (2018). Intelligence and knowledge development: what are the questions intelligence analysts ask? Intelligence and National Security, 33(6), 785–803. https://doi.org/10.1080/02684527.2018.1454029
Vogel, K. M., Reid, G., Kampe, C., & Jones, P. (2021). The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability, and management. Intelligence and National Security, 36(6), 827–848. https://doi.org/10.1080/02684527.2021.1946952
Walsh, P. F. (2017). Improving strategic intelligence analytical practice through qualitative social research. Intelligence and National Security, 32(5), 548–562. https://doi.org/10.1080/02684527.2017.1310948
Warner, M. (2017). Analysis as history, and history as analysis: a search for common goals and standards. Intelligence and National Security, 32(5), 613–624. https://doi.org/10.1080/02684527.2017.1310974
Whitesmith, M. (2020). Experimental Research in Reducing the Risk of Cognitive Bias in Intelligence Analysis. International Journal of Intelligence and CounterIntelligence, 33(2), 380–405. https://doi.org/10.1080/08850607.2019.1690329