SAN DIEGO STATE UNIVERSITY SYLLABUS FOR INTELLIGENCE AND HOMELAND SECURITY FALL 2013 4:00 – 6:40 PM, Thursdays Adams Humanities 3113 H SEC 690-3: INSTRUCTOR: Dr. Michael A. Turner Telephone: 858-945-4037 Email: mturner2@mail.sdsu.edu OFFICE HOURS: 3:00 – 3:45 PM, Thursdays PS 123, or more likely, at Starbucks at 5131 College Avenue and Lindo Paseo, right next (or underneath) College Square. COURSE OVERVIEW: Intelligence plays a vital, but misunderstood, role in homeland security. In the U.S., the sixteen agencies of the Intelligence Community (IC) provide numerous varied strategic services ranging from raw intelligence and analysis to special activities and counterintelligence. Each of the agencies has its own missions and institutional arrangements, which often compete and work at crosspurposes with those of sister agencies. There are historical and philosophical reasons for this particular evolution of U.S. intelligence. The role of strategic intelligence in homeland security is rather new, and so the precedents are only now being set. Consequently, while U.S. intelligence has had some spectacular successes in both national and homeland security, the nature of U.S. intelligence has also worked to produce some spectacular intelligence failures. This course is an investigation of the politics, the structure and functions of U.S. strategic intelligence, and its relationship to homeland security. It also examines the issues that confront America’s intelligence agencies in national and homeland security areas, as well as the contributions intelligence makes to homeland security policymaking. The following are some of the issues that 2 will be covered -- the challenge of staying relevant in a complex and changing world, managing federal relations with state and local officials, intelligence resource management, clandestine operations and secret activities, the role of secrecy and ethical considerations, leadership of the homeland security community and its impact on the intelligence agencies, intelligence reforms, and the like. COURSE OBJECTIVE: The objective of this course is to expose students to the intricacies of strategic intelligence and its relationship to the defense of the homeland, and to provide students with a thorough understanding of the U.S. Intelligence Community and its impact on U.S. national and homeland security. This is an interdisciplinary course for graduate students. The purpose of this class is to produce leaders from a variety of educational and professional backgrounds who can effectively and efficiently identify, design and mobilize the appropriate community resources to prevent, deter, preempt, defend against, and respond to criminal acts, terrorist attacks, other acts of war or natural disasters as they impact homeland security on the local, regional, national and international levels. Homeland security encompasses a grouping of diverse missions and functions that are performed by a wide variety of organizations on the local, state, federal and international levels. Consequently, there are many definitions of homeland security. For the purposes of this course, homeland security is defined as: The prevention, deterrence and preemption of, and defense against, external and internal threats and aggression targeted at U.S. (or another sovereign state's) territory, sovereignty, population, and infrastructure, as well as the management of the consequences of such threats and aggression and other domestic emergencies. DESIRED LEARNING OUTCOMES: At the conclusion of the course, students will be able to: -- Describe and explain the differences among the key intelligence community agencies, their 3 functions, and their relationships to homeland security organizations. -- Articulate the fundamental issues confronting U.S. strategic intelligence and the defense of the homeland. -- Identify the various techniques for collecting, analyzing, and disseminating intelligence to policymakers, and evaluate their utility at any given time. -- Analyze and explore in some depth some of the perennial and controversial issues facing homeland security and U.S. strategic intelligence. SPECIAL CIRCUMSTANCES POLICY: Please let me know of any special circumstances regarding your ability to attend class or complete assignments by their due dates (e.g., work schedule, conflict with other classes, etc.). Note that you must notify me before, not after, these assignments are due and that I will require proof of said difficulty. Failure to do so will result in an F or no-credit for the assignment. In the case of disability and/or learning disorder, please notify me directly before or after class or during office hours so that I can provide the proper academic accommodations per your specific Authorization for Accommodations Form. NON-ATTRIBUTION POLICY: This class, as a part of its curriculum, presents the student with a wide range of highly qualified and informative classmates, guest speakers, and professors. In order for these classmates, guest speakers, and professors to feel free to speak candidly, they are assured that what is said in lecture will not be repeated publicly outside the classroom, regardless of classification. To repeat what has been said in lecture to others outside the H Sec 690-2 environment risks calling fellow students, guest speakers, and professors to account publicly for his or her opinions and comments. This in turn could have the effect of stifling your classmates, guest speakers and professors, 4 causing them to speak in a guarded manner. Ultimately the quality of education provided in the seminar would suffer. Hence, what your fellow students, guest speakers, and professors say during their lectures is not for attribution. It is acceptable to say "someone in my class" made a particular statement, but the individual's name must not be divulged. Individuals who violate the nonattribution policy are subject to adverse administrative and disciplinary action per University policy. COURSE MATERIALS: There is one required text for this course: Loch K. Johnson and James J. Wirtz, eds., Intelligence, The Secret World of Spies, 3rd edition, New York: Oxford University Press, 2011. There are also additional readings listed in the schedule of classes, which can be found for each class session in the category COURSE DOCUMENTS in Blackboard. Please read the required material prior to arriving in class. I will also put some supplementary readings on Blackboard, under the category SUPPLEMENTAL READINGS in course documents. Although supplemental readings are not required readings, I strongly urge you to read them at your leisure. COURSE REQUIREMENTS: The following constitute the requirements for this course: Tests: Each registered student will take a mid-term and a final examination in this course. The mid-term will take place in the eighth week of the course (October 24) and will count for 20 percent of the course grade. The final examination (on December 12) will count for 30 percent of the final grade. Research Paper: Each student will write a formal research paper on a specific issue relating to intelligence and homeland security. The paper must meet all requirements set forth by San Diego State University on the drafting of formal research projects, including the inclusion of footnote/endnotes and references. The papers must reflect the kind of sophistication generally expected 5 of graduate students. Each paper must be no longer than 25 double-spaced pages, all inclusive, and must be presented to the instructor no later than the date specified. The instructor will not accept late papers. Each student will provide the instructor a topic statement, or a concept paper, on September 19. There is a sample topic paper (concept paper) on blackboard. The concept paper is a plan of what you intend to do regarding the subject and, as such, is an integral part of the research process. The concept paper and the research paper together will count for 40 percent of the final grade. Students who want to earn up to 10 extra points may opt to provide the class an oral briefing on their research. Those who want to do a briefing must inform the instructor in writing by October 24. The briefing must be thorough but brief, complete, and analytical, but must not go more than 10 minutes of class time. Briefings will take place on December 5. Effort and Participation: The remaining 10 percent will reflect other factors, such as class attendance, participation in discussions, and perceived effort. Please turn off all cell phones, pagers, and other electronic devices (except for laptop computers), and keep them off until after the end of each class session. THE INSTRUCTOR: Dr. Michael Turner is an independent contractor for the US Government. He also teaches at both the University of San Diego and San Diego State University. In the last thirty years, Dr. Turner has been a national security consultant, a professor of national security affairs, and an officer of the Central Intelligence Agency. Until August 2006, Dr. Turner occupied an endowed chair and was a professor of international affairs at Alliant International University in San Diego, CA while also teaching at the University of San Diego. Dr. Turner has taught intelligence and national security at the Air War College (1999-2000); at the Joint Military Intelligence College (now National Defense Intelligence College) at Bolling Air Force Base, Washington, DC (1993-1994); and various other universities such as the University of 6 Southern California, University of Virginia, University of Maryland, and Johns Hopkins University (1985-2005). Before becoming a full time academic, Dr. Turner was a CIA officer, working in both analytic and staff positions. Initially, he served as a political analyst on Middle East and West European affairs and then assumed various supervisory positions on the staff of the Director of Central Intelligence, first, as a Congressional Liaison representative and then as the Chief of Public Liaison Staff. In the mid-1980s, Dr. Turner also served several rotational assignments, one of which was as Acting Desk Officer for Turkey in the Department of State. He was also chosen to be a Congressional Fellow on Capitol Hill in 1986-87, serving as foreign policy advisor to Congresswoman Barbara Kennelly (D-CT).He also served as the CIA representative to various allied agencies. Dr. Turner is the author of Why Secret Intelligence Fails (Potomac Books, 2006) and Historical Dictionary of U.S. Intelligence (Scarecrow Press, 2007). He has written and lectured widely on a variety of strategic issues and intelligence matters. 7 SCHEDULE OF CLASSES AND READING ASSIGNMENTS Please read the assignments before the class meeting August 29: Introduction and Administrative Matters; History, the U.S. Intelligence Community, and the American Way Readings: Phyllis Provost McNeill, “The Evolution of the US Intelligence Community – An Historical Overview, pp. 16-33. Rhodri Jeffreys-Jones, “The Rise and Fall of the CIA,” pp. 46-56. September 5: Intelligence Process and Setting intelligence Requirements Readings: Arthur Hulnick, “The Intelligence Cycle,” pp. 65--77. Admiral Stansfield Turner, “Intelligence and the Second Bush Administration,” pp. 34-45. The White House, National Security Strategy, 2010. (Document 13) Statement of Paul Stockton, “Homeland Security Goals,” Before the House Appropriations Committee, Subcommittee on Homeland Security, 30 January 2007. (Document 12) Brian Michael Jenkins, “Basic Principles for Homeland Security,” RAND Testimony Before the House Appropriations Committee, Subcommittee on Homeland Security, January 30, 2007. (Document 1) Mark Randol, The Department of Homeland Security Intelligence Enterprise, Washington, DC: Congressional Research Service, 19 March 2010. (Document 23) September 12: Intelligence Collection -- Imagery, Signals Intelligence, MASINT and Space; Sensors, and Materials 8 Readings: Jeffrey T. Richelsen, “The Technical Collection of Intelligence,” pp. 78-88. James J. Wirtz, “Pearl Harbor and 9/11,” pp. 112-116. Patricia Moloney Figliola, “Digital Surveillance: The Communications Assistance for Law Enforcement Act,” CRS Report RL30677, June 7, 2007. (Document 9) Richard A. Best, Jr., “Satellite Surveillance: Domestic Issues,” CRS Report 34421, June 27, 2008. (Document 18) Richard A. Best, Jr., and Jennifer K. Elsea, Satellite Surveillance: Domestic Issues, Washington, DC: Congressional Research Service, 13 January 2011. (Document 24) Richard M. Thompson, Governmental Tracking of Cell Phones and Vehicles: The Confluence of Privacy, Technology, and Law, Washington, DC: Congressional Research Service, 1 December 2011. (Document 25) September 19: Intelligence Collection -- Human Intelligence and Open Source Intelligence Readings: Frederick P. Hitz, “Human Source Intelligence,” pp. 89-101. Stephen C. Mercado, “Open-Source Intelligence,” pp. 102-111. Mark A. Randol, “Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches,” CRS Report RL33616, January 14, 2009. (Document 7) Deliverable: CONCEPT PAPER - Students inform instructor of their research paper topic in writing September 26: Intelligence Analysis and Production Readings: 9 Richard K. Betts, “Analysis, War, and Decision: Why Intelligence Failures Are Inevitable,” pp. 123-139. Robert D. Blackwell and Jack Davis, “A Policymaker’s Perspective on Intelligence Analysis,” pp. 140-147. William M. Nolte, “The Challenges of Intelligence Analysis,” pp. 148-159. Richard A. Best, Jr., “Intelligence and the War in Iraq,” pp. 160-164. Gregory Treverton, “Intelligence Gathering, Analysis, and Sharing,” Chapter 2, 2008. (Document 22) Jeff Jonas and Jim Harper, “Effective Counterterrorism and the Limited Role of Predictive Data Mining,” Policy Analysis, No. 584, December 11, 2006. (Document 17) Richard M. Best, Jr., Intelligence Estimates: How Useful to Congress?, Washington, DC: Congressional Research Service, 6 January 2011. (Document 26) Richard M. Best, Jr., The National Intelligence Council: Issues and Options for Congress, Washington, DC: Congressional Research Service, 27 December 2011. (Document 27) October 3: Politicizing Intelligence Readings: James J. Wirtz, “The Intelligence-Policy Nexus,” pp. 169-176. Mark M. Lowenthal, “Tribal Tongues: Intelligence Consumers, Intelligence Producers,” pp. 210-218. Glenn Hastedt, “Public Intelligence,” pp. 177-190. Colonel Daniel Peetbrese, “Intelligence Sharing: Getting the National Counterterrorism Analysts on the Same Data Sheet,” The Atlantic Council Occasional Paper, October 2006. (Document 15) 10 John Rollins, “Fusion Centers: Issues and Options for Congress,” CRS Report RL34070, January 18, 2008. (Document 11) Alfred Cummings, Congress As A Consumer of Intelligence Information, Washington, DC: Congressional Research Service, 28 January 2010. (Document 28) October 10: Counterintelligence Readings: Stan A. Taylor and Daniel Snow, “Cold War Spies: Why They Spied and How They Got Caught,” pp. 307-318. Senate Select Committee on Intelligence, “Treachery Inside the CIA,” pp. 319-332. Paul J. Redmond, “The Challenges of Counterintelligence,” pp. 295-306. Office of the National Counterintelligence Executive, Fundamental Elements of the Counterintelligence Discipline, Volume 1, January 2006. (Document 3) National Counterintelligence Executive, “The National Counterintelligence Strategy of the United States of America,” 2008. (Document 16) October 17: Law Enforcement and Intelligence Readings: Government Accountability Office, “Federal Efforts Are Helping to Alleviate Some Challenges Encountered by State and Local Information Fusion Centers,” GAO-0835, October 2007. (Document 10) Sunchlar M. Rust, “Collaborative Network Evolution: The Los Angeles Early Warning Group,” Naval Postgraduate School, March 2006, Unpublished Master’s Thesis. (Document 20) Jerome Bjelopera, Terrorism Information Sharing and the Nationwoide Suspicious Activity Report Initiative, 11 Washington, DC: Congressional Research Service, 28 January 2011 (Document 29) October 24 – Mid Term Exam Students who choose to do a briefing on their research on December 5 must inform the instructor in writing by this date. October 31: Special Activities Readings: Loch Johnson, “Evaluating Covert Action,” pp. 265-286. Senator Frank Church, “Covert Action: Swampland of American Foreign Policy,” pp. 233-237. James A. Barry, “Covert Action Can Be Just,” pp. 238347. Alfred Cumming, “Sensitive Covert Action Notifications: Oversight Options for Congress,” CRS Report, 6 April 2011. (Document 2) November 7: The Foreign Experience and Intelligence Sharing Readings: Alexander Orlov, “The Soviet Intelligence Community,” pp. 522-531. Thomas C. Bruneau, “Controlling Intelligence in New Democracies,” pp. 516-525. Percy Cradock, “The British Experience with Intelligence,” pp. 532-539. Esther Brimmer, ed., Transforming Homeland Security: US and European Approaches, Washington, DC: Johns Hopkins Center for Transatlantic Relations, 2006. (Document 21) 12 November 14: Accountability Readings: Gregory F. Treverton, “Intelligence: Welcome to the American Government,” pp. 347-367. Frederick P. Hitz, “Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA,” pp. 368376. Frederic F. Manget, “Another System of Oversight: Intelligence and the Rise of Judicial Intervention,” pp. 377-392. Yale University School of Law Symposium, “Warrantless Wiretaps,” pp. 407-416. Mark A. Randol, “The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress,” CRS Report R40602, May 27, 2009. (Document 6) Richard A. Best, Jr., The Intelligence Appropriations Process: Issues for Congress, Washington, DC: Congressional Research Service, 16 December 2011. (Document 30) November 21 - Thanksgiving Break, No Class November 28: Intelligence after 9/11 and Now Readings: Kean Commission, “9/11 Intelligence Failure,” pp. 421465. Amy B. Zegart, “Spying Blind,” pp. 466-484. Paul Pillar, “Intelligence, Policy, and the War in Iraq,” pp. 492-498. Michael A. Wermuth, “Improving Terrorism Warnings – The Homeland Security System,” RAND Testimony to the House Committee on Government Reform, Subcommittee on National Security, March 16, 2004. (Document 14) 13 The Brookings Institution, “”The State of Homeland Security,” Symposium, June 1, 2006. (Document 19) Committee on Homeland Security, “The State of Homeland Security, 2007,” Staff Report, 2007. (Document 4) Department of Homeland Security, “One Team, One Mission, Securing Our Homeland,” DHS Strategic Plan for Fiscal Years 2008, 2013. (Document 8) Henry H. Willis, Strengthening Strategic Planning and Management at DHS, Testimony, Santa Monica, CA: RAND, 26 April 2013. (Document 31) December 5: Student Briefings Deliverable: Research Paper December 12: Final Examination