Course Syllabus

advertisement
Spies! The Politics of Intelligence
University of California Washington Center
Spring Semester 2014
Instructor: Genevieve Lester, PhD
Georgetown University
Mortara Building, 36th and N Street, NW (Lower Level)
Tel: 202 687 4501 (o); 510 501 9008 (c)
Email: gal22@georgetown.edu
Introduction
Intelligence organizations have two qualities that Americans instinctively fear and
distrust: secrecy and power. While the intelligence community can attempt to alleviate
this fear and mistrust, the secret nature of intelligence work can never wholly put them to
rest. Moreover, Americans, particularly since 9/11, hold two opposing views of the
intelligence community: that it is both omniscient and incompetent. This course is
intended to explore, test, and challenge both of these notions. Intelligence is generally
viewed as an applied subject, studied by practitioners. This course bridges the gap
between theory and practice, encouraging students to understand the role of intelligence
among American institutions as well as how it both challenges and contributes to broader
theoretical concepts of transparency and governance. Further, it engages with
comparative issues in terms of the study of intelligence, focusing on intelligence themes
that transcend individual national political contexts.
In this course students will be introduced to recent issues concerning intelligence, such as
the role of intelligence in national security decision-making, intelligence failure, reform,
and oversight, focusing particularly on how the change in US intelligence in the post-9/11
context has increasingly emphasized domestic – or “homeland” – intelligence. Students
will gain a working understanding of the different types of intelligence, the range of
responsibilities that the different IC members hold, and the relationship between
intelligence and the policy-making process. Beyond the technical aspects of the
intelligence function, students will explore the political context that frames intelligence
operations and learn how the three branches of government both collaborate and conflict
to utilize this resource. They will learn how integral intelligence information is to highlevel government decision-making and the function of foreign policy. Finally, students
will consider some of the major normative questions regarding intelligence, such as: what
the appropriate role for intelligence should be in a democracy, how transparent
intelligence should be to the public, and how its vast array of activities should be
supervised.
Course Format
This course is a student-driven seminar. Students will be expected to come to class
prepared and participate actively in class discussion. Complementary to regular class
1
participation, students will be required to present on the readings each week. Part of the
evaluation of the presentations will rest upon the concision with which students present
and critique their readings.
Evaluation will be based on student participation, a case study, a policy memo, and final
exam. The final exam will be in the take home format. Cases will be 10 pages long and
will be chosen in consultation with the instructor. The case studies will be compiled into
a volume with potential for publication. Finally, students will prepare for and take part in
a foreign policy simulation exercise.
Assignments and Evaluation
Course Participation and Reading Presentations: Active course participation as befits
a challenging graduate seminar is expected. In addition, each week, two students will be
responsible for critiquing one of the assigned readings. Each presentation will be
approximately 10 minutes long and will form the basis of the discussion. These
presentations should not summarize the readings, but rather focus on a thoughtful critique
and discussion of the issues presented. Participation and presentations are worth 20% of
the grade.
Policy Memo: The policy memo will be approximately five pages long and will be due
in week five of the course. It will be worth 20% of the final grade.
Case Study Project: Students will write up a historical case on a historical intelligence
operation. The project will be 10 pages long. Guidelines are described in further detail on
the last page of the syllabus. The case is worth 25% of the final grade.
Final Exam (take home): The final exam will be a take home exercise and will be worth
35% of the final grade.
Textbook for purchase
Mark Lowenthal, Intelligence: From Secrets to Policy (5th edition, 2011).
The remainder of readings will be available on Blackboard.
2
Class Meetings
Class 1: Introduction to Course

Mark M. Lowenthal, From Secrets to Policy (5th Edition) (Washington DC: CQ
Press, 2011), Chs. 1-4, pp. 1-70.
Class 2: Understanding the US Intelligence Community

Jeffrey T. Richelson, The US Intelligence Community (6th edition) (Boulder, CO:
Westview Press, 2012) Ch. 1-3, pp. 1-78.

Loch K. Johnson (ed.), The Handbook of Intelligence Studies, Part III: The
Intelligence Cycle and the Search for Information: Planning, Collecting and
Processing, pp. 105-163.
Class 3: The Intelligence Disciplines

Lowenthal, From Secrets to Policy, Ch. 5, pp. 71-118.

Richelson, The US Intelligence Community, Chs. 7-9, pp. 169-269.

Selections from Henry A. Crumpton, The Art of Intelligence: Lessons from a Life
in the CIA's Clandestine Service (Penguin: 2012).

Selections from Milt Beardon and James Risen, The Main Enemy: The Inside
Story of the CIA’s Final Showdown with the KGB (Ballantine Books, 2003).
Class 4: Analysis and Inevitability?

Lowenthal, From Secrets to Policy, Ch. 6, pp. 119-162.

James Bruce, “Making Analysis More Reliable: Why Epistemology Matters to
Intelligence,” in George and Bruce (eds), Analyzing Intelligence: Origins,
Obstacles and Innovations (Georgetown: 2008) Ch. 11, pp. 171-190.

Carmen Medina, “The New Analysis,” Analyzing Intelligence: Origins, Obstacles
and Innovations (Georgetown: 2008) Ch 15, pp. 238-250.

Richard K. Betts, “Analysis, War and Decision: Why Intelligence Failures are
Inevitable,” World Politics (Vol. 31, No. 2, October 1978).

Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and
the Iraq War (Cornell: 2010) Chs. 3-4, pp. 123-196.
3
Class 5: Intelligence and the Policymaker

Lowenthal, From Secrets to Policy, Ch. 9, pp. 199-216.

Peter Gill, “The Politicization of Intelligence: Lessons from the Invasion of Iraq”,
in Born, Johnson and Leigh (eds), Who’s Watching the Spies (Washington DC:
Potomac Books, 2005) Ch. 2, pp. 12-33.

Paul R. Pillar, “Intelligence, Policy and the War in Iraq,” Foreign Affairs
(March/April 2006).

Selections from Joshua Rovner, Fixing the Facts: Intelligence and the Politics of
National Security (Ithaca: Cornell University Press, 2011).
*Policy Memos Due by Midnight*
Class 6: Covert Action

Lowenthal, From Secrets to Policy, Ch. 8, pp. 181-198.

John Prados, “The Future of Covert Action” in Loch K. Johnson (ed.), The
Handbook of Intelligence Studies, Part V, pp. 289-300.

John MacGaffin, “Clandestine Human Intelligence: Spies, Counterspies, and
Covert Action,” in Jennifer E. Sims and Burton Gerber (eds), Transforming US
Intelligence (Washington: Georgetown University Press, 2005) pp. 79-95.

Andru E. Wall, “Demystifying the Title 10-Title 50 Debate: Distinguishing
Military Operations, Intelligence Activities and Covert Action,” Harvard
National Security Journal (Vol. 3, 2011) pp. 85-141.

Jennifer Kibbe, “Covert Action and the Pentagon,” Intelligence and National
Security (Vol. 22, No. 1, Feb. 2007): pp. 57-74

Nicholas Schmidle, “Getting bin Laden: What Happened That Night in
Abbottabad,” New Yorker, August 8, 2011.
Class 7: Counterintelligence

Lowenthal, From Secrets to Policy, Ch. 7, pp. 163-180.
4

Robert Jervis, “Intelligence, Counterintelligence, Perception and Deception” in
Jennifer E. Sims and Burton Gerber (eds), Vaults, Mirrors and Masks:
Rediscovering US Counterintelligence (Washington DC: Georgetown University
Press, 2008) Ch. 3, pp. 69-80.

Jennifer Sims, “Twenty-first Century Counterintelligence: the Theoretical Basis
for Reform,” in Jennifer E. Sims and Burton Gerber (eds), Vaults, Mirrors and
Masks: Rediscovering US Counterintelligence (Washington DC: Georgetown
University Press, 2008) Ch. 1, pp. 19-51.

Nosenko Case Study

Hanssen Case Study
Class 8: Domestic Intelligence and Law Enforcement

Brian A. Jackson (ed). The Challenge of Domestic Intelligence in a Free Society
(Santa Monica: RAND, 2009) Chs. 3, 4, and 7.

Henry A. Crumpton, “Intelligence and Homeland Defense” in Jennifer E. Sims
and Burton Gerber, Transforming US Intelligence (Washington DC: Georgetown
University Press, 2005) Ch. 12, pp. 198-219.

Brian A. Jackson (ed.) Considering the Creation of a Domestic Intelligence
Agency in the United States: Lessons from the Experiences of Australia, Canada,
France, Germany, and the United Kingdom (Santa Monica: RAND, 2009) Chs. 1,
4-8.

Richard A. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake
of 9/11 (Lanham, MD: Rowman and Littlefield, 2005) (selections)
Class 9: Ethics and Intelligence

Selections from James M. Olson, Fairplay: The Moral Dilemmas of Spying
(Potomac Books: 2007).

Selections from Michael Walzer, Just and Unjust Wars (Basic: 2000).

Burton Gerber, “Managing HUMINT, the Need for a New Approach,” in Sims
and Gerber (eds) Transforming US Intelligence, pp. 180-197.

E. Drexel Godfrey, “Ethics and Intelligence,” Foreign Affairs 56, (3) (April
1978): pp. 624-42.

Richard Helms, A Look Over My Shoulder: A Life in the Central Intelligence
5
Agency (Ballantine: 2003) Chs. 38 and 40.
Class 10: Intelligence and Oversight

Loch K. Johnson, “Governing in the Absence of Angels”, in Born, Johnson and
Leigh (eds), Who’s Watching the Spies (Washington DC: Potomac Books, 2005)
Ch. 4, pp. 57-78.

Genevieve Lester, “External Accountability: Congress, Opposition, and Oversight
Development,” pp. 84-127.

Dana Priest and William M. Arkin, Top Secret America: The Rise of the New
American Security State (New York: Little Brown, 2011) Chs. 1, 2, pp. 3-35; 256277.

Bruce Cain et al, “Towards More Open Democracies: The Expansion of Freedom
of Information Laws,” in Bruce E. Cain, Russell J. Dalton, and Susan E. Scarrow
(eds) Democracy Transformed? Expanding Political Opportunities in Advanced
Industrial Democracies (Oxford: Oxford University Press, 2003) pp. 115-139.
Class 11: Intelligence Simulation

Materials to be distributed prior to class
Class 12: Intelligence Liaison and Student Presentations

Jennifer E. Sims, “Foreign Intelligence Liaison: Devils, Deals and Details,”
International Journal of Intelligence and Counterintelligence (Vol. 19: 2006) pp.
195-217.

Stéphane Lefebvre, "The Difficulties and Dilemma of International Intelligence
Cooperation." International Journal of Intelligence and Counterintelligence (Vol.
16, no. 4, Winter 2003-2004): pp. 527-542.
Class 13: Cybersecurity, New Directions and Conclusions

Richard K. Betts, Enemies of Intelligence (New York: Columbia University Press,
2007) Chs. 1, 8, pp. 1-19; pp. 183-193.
*Final Exam Distributed*
6
Policy Memo Template

Policy Issue
o Brief background of issue: how has the issue become a concern?
o Explain why it is important
o Lay out the facts of the policy problem
o Provide any supporting evidence/data needed to understand problem

Policy Options
o Provide several (at least 3) potential courses of action for your fictional
policymaker

Potential Complications and Outcomes of Each Course of Action
o Address the problems/pros/cons of each alternative

Recommendations
o Provide your recommendation for a course of action
7
Case Study Paper Project Description
The case study project should be 10 doubled-spaced pages, and will examine a single
foreign intelligence, counter-intelligence, or covert action case. Students will be allowed
to choose their own cases in consultation with the instructor. The paper will consist of the
following components:
1.
2.
3.
4.
Summary of the case (2 pages)
Description of the case as a success or failure (3 pages)
Explanation of the why it succeeded or failed (3 pages)
Principal lessons-learned from the case study, identifying the best (and/or
worst) intelligence practices (2 pages).
Use secondary sources drawn from the course as well as primary sources from the CIA
website, the National Security Archive website, Federation of American Scientists, etc.
The main objective here is to access as much data as possible and to pull this wide range
of information into a coherent analytic project. Cases may focus on American
intelligence or foreign services. Examples of potential topics include a) the Bay of Pigs,
b) the VENONA case c) the overthrow of Mossadegh d) Iran-Contra e) the Iraq invasion;
f) Iraq/WMD aftermath.
8
Download