Ball, K. Webster, F. (2003) The intensification of surveillance. Ball, K. Webster, F. (Ed.). The intensification of surveillance: crime, terrorism and warfare in the information içinde (ss.1-15). Pluto Press.
Barnea, A. (2018). Challenging the “lone wolf” phenomenon in an era of informant. International Journal of Intelligence and Counterintelligence. 31(2). 217-234.
Barnea, A. (2019) Big data and counterintelligence in western countries. International Journal of Intelligence and counterintelligence. 32(3). 433-447.
Brynielsson, J. Horndahl, A. Johansson, F. Kaati, L. Mårtenson, C. ve Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone. Security Informatics. 2(11). 1-15.
Denécé, E. (2014). The revolution in intelligence affairs: 1989–2003, International Journal of Intelligence and Counterintelligence. 27(1): 27-41.
Field manuel 2-0 intelligence. (2007). United States Army Press.
Freedman, L. (1977). U.S. Intelligence and the soviet strategic threat. Princeton University Press.
Gill P. ve Phythian M. (2018). Intelligence in an Insecure world. Polity Press Cambridge.
Goldman, A. (2016). Why didn’t the F.B.I. stop the New York bombing? Erişim tarihi: 24 Ekim 2018. https://www.nytimes.com/2016/09/22/us/fbi-terror-ahmad-khanrahami.html.
Herman, M. (1998). Diplomacy and intelligence, Diplomacy & Statecraft, 9(2). 1-22. https://www.bellingcat.com/news/uk-and-europe/2018/10/09/full-reportskripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/ Erişim tarihi: 24 Ekim 2018. https://www.bellingcat.com/news/2022/08/25/socialite-widow-jeweller-spyhow-a-gru-agent-charmed-her-way-into-nato-circles-initaly/?s=03 Erişim tarihi: 24 Ekim 2022. https://www.egm.gov.tr/0
https://www.europarl.europa.eu/news/en/press-room/20220412IPR27112/epinquiry-committee-for-pegasus-and-other-spyware-launched Erişim tarihi: 20 Ekim 2022.
https://www.mevzuat.gov.tr/mevzuatmetin/1.5.6698.pdf Erişim tarihi: 14 Ekim 2022. https://www.i-scoop.eu/big-data-action-value-context/data-age-2025datasphere/#:~:text=In%20the%20announcement%20of%20the,a%20 yearly%20basis)%20by%202025. Erişim tarihi: 24 Ekim 2022.
https://www.statista.com/statistics/949144/worldwide-global-dataspherereal-time-data-annual-size/ Erişim tarihi: 24 Ekim 2022.
Hulnick, A.S. (1999) Fixing the spy machine: Preparing American intelligence for the twenty-first century. Praeger.
James J. Wirtz, ve Rosenwasser, J.J. (2010). From combined arms to combined intelligence: philosophy, doctrine and operations, Intelligence and National Security, 25(6). 725-743.
Johnson, L.K. (2009). Sketches for a theory of strategic intelligence. Gill, P. Marrin,S. ve Phythian, M. (Ed). Intelligence theory key questions and debates içinde. (ss.33-53). Routledge.
Johnson, L.K. (2010). National security intelligence. Johnson, K.L. (Ed). The oxford handbook of national security intelligence içinde. (ss.332). Oxford University Press.
Johnson, L.K. (2014). The development of intelligence studies. Dover, R. Goodman, M. ve Hillebrand, C. (Ed). Routledge companion to intelligence studies içinde. (3-22). Routledge.
Joint publication 3-25 countering threat networks. (2016). United States Army Press.
Krebs, V.E. (2002). Mapping networks of terrorist cells. Connections. 24(3): 43-52.
Lowenthal, M. (2008). Intelligence: From secrets to policy. CQ Press.
Lahneman, W.J. (2006). The future of intelligence analysis volume I final report. University of Maryland.
Shulsky, A.N. ve Schmitt G.J. (2002). Silent warfare: Understanding the world of intelligence.
Potomac Books. Sparrow, M.K. (1991). Network vulnerabilities and strategic intelligence in law enforcement. International Journal of Intelligence and counterintelligence. 5(3). 255-274.
Steele, R.D. (2007). Open source intelligence. Johnson, K.L. (Ed). Handbook of intelligence studies içinde. (ss.129-147). Routledge
Treverton, G.F. Jones, S.G. Boraz, S. Lipscy, P. (2006). Toward a theory of intelligence. RAND Corporation.
Treverton, G.F. C. Gabbard, B. (2008). Assessing the tradecraft of intelligence analysis. RAND Corporation.
Treverton, G.F. (2009). Intelligence for an age of terror. RAND Corporation. Cambridge University Press.
Williams, P. (2001). Transnational criminal networks. Phil Arquilla, J. Ronfeldt, D.F. (Ed). Networks and netwars: The future of terror, crime, and militancy içinde. (ss.61-98). RAND Corporation.
Wheaton, K.J. (2019). How to teach 2500 years of intelligence history in about an hour. Erişim tarihi: 11 Ekim 2022. https://sourcesandmethods.blogspot.com/2019/06/how-toteach-2500-years-of-intelligence.html.
Wohlstetter, R. (1962). Pearl harbor warning and decision. Stanford University Press.
Woo, G. (2011). Interdiction of plots with multiple operatives. Wiil, U.K. (Ed). Counterterrorism and open-source intelligence içinde. (ss.49-60) Springer-Verlag. Younger A. MI6 'C' speech on fourth generation espionage, Erişim tarihi: 11 Mayıs 2022. https://www.gov.uk/government/speeches/mi6-c-speechon-fourth-generation-espionage.
Stratejik İstihbarat Analizini Anlamak: Bilimsel Araştırma ile Benzerlikleri ve Farkları
Psikolojik Harekât İstihbaratında Bir Analiz Yöntemi: Hedef Kitle Analizi
Sinyal İstihbaratı Analizi Bağlamında Bir Değerlendirme: Rubicon Operasyonu ve Türkiye
Dijital Çağda İstihbarat Analizi
M. Hayati TABAN ve Emre AYDİLEK