course requirements - San Diego State University

advertisement
SAN DIEGO STATE UNIVERSITY
SYLLABUS FOR
INTELLIGENCE AND HOMELAND SECURITY
FALL 2013
4:00 – 6:40 PM, Thursdays
Adams Humanities 3113
H SEC 690-3:
INSTRUCTOR:
Dr. Michael A. Turner
Telephone: 858-945-4037
Email: mturner2@mail.sdsu.edu
OFFICE HOURS:
3:00 – 3:45 PM, Thursdays
PS 123, or more likely, at Starbucks at 5131 College Avenue
and Lindo Paseo, right next (or underneath) College Square.
COURSE OVERVIEW:
Intelligence plays a vital, but misunderstood, role in
homeland security. In the U.S., the sixteen agencies of
the Intelligence Community (IC) provide numerous varied
strategic services ranging from raw intelligence and
analysis to special activities and counterintelligence.
Each of the agencies has its own missions and institutional
arrangements, which often compete and work at crosspurposes with those of sister agencies. There are
historical and philosophical reasons for this particular
evolution of U.S. intelligence. The role of strategic
intelligence in homeland security is rather new, and so the
precedents are only now being set. Consequently, while
U.S. intelligence has had some spectacular successes in
both national and homeland security, the nature of U.S.
intelligence has also worked to produce some spectacular
intelligence failures.
This course is an investigation of the politics, the
structure and functions of U.S. strategic intelligence, and
its relationship to homeland security. It also examines
the issues that confront America’s intelligence agencies in
national and homeland security areas, as well as the
contributions intelligence makes to homeland security
policymaking. The following are some of the issues that
2
will be covered -- the challenge of staying relevant in a
complex and changing world, managing federal relations with
state and local officials, intelligence resource
management, clandestine operations and secret activities,
the role of secrecy and ethical considerations, leadership
of the homeland security community and its impact on the
intelligence agencies, intelligence reforms, and the like.
COURSE OBJECTIVE:
The objective of this course is to expose students to
the intricacies of strategic intelligence and its
relationship to the defense of the homeland, and to provide
students with a thorough understanding of the U.S.
Intelligence Community and its impact on U.S. national and
homeland security.
This is an interdisciplinary course for graduate
students. The purpose of this class is to produce leaders
from a variety of educational and professional backgrounds
who can effectively and efficiently identify, design and
mobilize the appropriate community resources to prevent,
deter, preempt, defend against, and respond to criminal
acts, terrorist attacks, other acts of war or natural
disasters as they impact homeland security on the local,
regional, national and international levels.
Homeland security encompasses a grouping of diverse
missions and functions that are performed by a wide variety
of organizations on the local, state, federal and
international levels. Consequently, there are many
definitions of homeland security. For the purposes of this
course, homeland security is defined as:
The prevention, deterrence and preemption of, and defense
against, external and internal threats and aggression targeted at
U.S. (or another sovereign state's) territory, sovereignty,
population, and infrastructure, as well as the management of the
consequences of such threats and aggression and other domestic
emergencies.
DESIRED LEARNING OUTCOMES:
At the conclusion of the course, students will be able
to:
--
Describe and explain the differences among the
key intelligence community agencies, their
3
functions, and their relationships to homeland
security organizations.
--
Articulate the fundamental issues confronting
U.S. strategic intelligence and the defense of
the homeland.
--
Identify the various techniques for collecting,
analyzing, and disseminating intelligence to
policymakers, and evaluate their utility at any
given time.
--
Analyze and explore in some depth some of the
perennial and controversial issues facing
homeland security and U.S. strategic
intelligence.
SPECIAL CIRCUMSTANCES POLICY:
Please let me know of any special circumstances
regarding your ability to attend class or complete
assignments by their due dates (e.g., work schedule,
conflict with other classes, etc.). Note that you must
notify me before, not after, these assignments are due and
that I will require proof of said difficulty. Failure to do
so will result in an F or no-credit for the assignment. In
the case of disability and/or learning disorder, please
notify me directly before or after class or during office
hours so that I can provide the proper academic
accommodations per your specific Authorization for
Accommodations Form.
NON-ATTRIBUTION POLICY:
This class, as a part of its curriculum, presents the
student with a wide range of highly qualified and
informative classmates, guest speakers, and professors. In
order for these classmates, guest speakers, and professors
to feel free to speak candidly, they are assured that what
is said in lecture will not be repeated publicly outside
the classroom, regardless of classification. To repeat what
has been said in lecture to others outside the H Sec 690-2
environment risks calling fellow students, guest speakers,
and professors to account publicly for his or her opinions
and comments. This in turn could have the effect of
stifling your classmates, guest speakers and professors,
4
causing them to speak in a guarded manner. Ultimately the
quality of education provided in the seminar would suffer.
Hence, what your fellow students, guest speakers, and
professors say during their lectures is not for
attribution. It is acceptable to say "someone in my class"
made a particular statement, but the individual's name must
not be divulged. Individuals who violate the nonattribution policy are subject to adverse administrative
and disciplinary action per University policy.
COURSE MATERIALS:
There is one required text for this course:
Loch K. Johnson and James J. Wirtz, eds.,
Intelligence, The Secret World of Spies, 3rd edition, New
York: Oxford University Press, 2011.
There are also additional readings listed in the
schedule of classes, which can be found for each class
session in the category COURSE DOCUMENTS in Blackboard.
Please read the required material prior to arriving in
class. I will also put some supplementary readings on
Blackboard, under the category SUPPLEMENTAL READINGS in
course documents. Although supplemental readings are not
required readings, I strongly urge you to read them at your
leisure.
COURSE REQUIREMENTS:
The following constitute the requirements for this
course:
Tests: Each registered student will take a mid-term
and a final examination in this course. The mid-term will
take place in the eighth week of the course (October 24)
and will count for 20 percent of the course grade. The
final examination (on December 12) will count for 30
percent of the final grade.
Research Paper: Each student will write a formal
research paper on a specific issue relating to intelligence
and homeland security. The paper must meet all
requirements set forth by San Diego State University on the
drafting of formal research projects, including the
inclusion of footnote/endnotes and references. The papers
must reflect the kind of sophistication generally expected
5
of graduate students. Each paper must be no longer than 25
double-spaced pages, all inclusive, and must be presented
to the instructor no later than the date specified. The
instructor will not accept late papers.
Each student will provide the instructor a topic
statement, or a concept paper, on September 19. There is a
sample topic paper (concept paper) on blackboard. The
concept paper is a plan of what you intend to do regarding
the subject and, as such, is an integral part of the
research process. The concept paper and the research paper
together will count for 40 percent of the final grade.
Students who want to earn up to 10 extra points may
opt to provide the class an oral briefing on their
research. Those who want to do a briefing must inform the
instructor in writing by October 24. The briefing must be
thorough but brief, complete, and analytical, but must not
go more than 10 minutes of class time. Briefings will take
place on December 5.
Effort and Participation: The remaining 10 percent
will reflect other factors, such as class attendance,
participation in discussions, and perceived effort. Please
turn off all cell phones, pagers, and other electronic
devices (except for laptop computers), and keep them off
until after the end of each class session.
THE INSTRUCTOR:
Dr. Michael Turner is an independent contractor for
the US Government. He also teaches at both the University
of San Diego and San Diego State University. In the last
thirty years, Dr. Turner has been a national security
consultant, a professor of national security affairs, and
an officer of the Central Intelligence Agency.
Until August 2006, Dr. Turner occupied an endowed
chair and was a professor of international affairs at
Alliant International University in San Diego, CA while
also teaching at the University of San Diego. Dr. Turner
has taught intelligence and national security at the Air
War College (1999-2000); at the Joint Military Intelligence
College (now National Defense Intelligence College) at
Bolling Air Force Base, Washington, DC (1993-1994); and
various other universities such as the University of
6
Southern California, University of Virginia, University of
Maryland, and Johns Hopkins University (1985-2005).
Before becoming a full time academic, Dr. Turner was a
CIA officer, working in both analytic and staff positions.
Initially, he served as a political analyst on Middle East
and West European affairs and then assumed various
supervisory positions on the staff of the Director of
Central Intelligence, first, as a Congressional Liaison
representative and then as the Chief of Public Liaison
Staff. In the mid-1980s, Dr. Turner also served several
rotational assignments, one of which was as Acting Desk
Officer for Turkey in the Department of State. He was also
chosen to be a Congressional Fellow on Capitol Hill in
1986-87, serving as foreign policy advisor to Congresswoman
Barbara Kennelly (D-CT).He also served as the CIA
representative to various allied agencies.
Dr. Turner is the author of Why Secret Intelligence
Fails (Potomac Books, 2006) and Historical Dictionary of
U.S. Intelligence (Scarecrow Press, 2007). He has written
and lectured widely on a variety of strategic issues and
intelligence matters.
7
SCHEDULE OF CLASSES AND READING ASSIGNMENTS
Please read the assignments before the class meeting
August 29: Introduction and Administrative Matters;
History, the U.S. Intelligence Community, and the American
Way
Readings:
Phyllis Provost McNeill, “The Evolution of the US
Intelligence Community – An Historical Overview, pp.
16-33.
Rhodri Jeffreys-Jones, “The Rise and Fall of the CIA,”
pp. 46-56.
September 5: Intelligence Process and Setting intelligence
Requirements
Readings:
Arthur Hulnick, “The Intelligence Cycle,” pp. 65--77.
Admiral Stansfield Turner, “Intelligence and the
Second Bush Administration,” pp. 34-45.
The White House, National Security Strategy, 2010.
(Document 13)
Statement of Paul Stockton, “Homeland Security Goals,”
Before the House Appropriations Committee,
Subcommittee on Homeland Security, 30 January 2007.
(Document 12)
Brian Michael Jenkins, “Basic Principles for Homeland
Security,” RAND Testimony Before the House
Appropriations Committee, Subcommittee on Homeland
Security, January 30, 2007. (Document 1)
Mark Randol, The Department of Homeland Security
Intelligence Enterprise, Washington, DC: Congressional
Research Service, 19 March 2010. (Document 23)
September 12: Intelligence Collection -- Imagery, Signals
Intelligence, MASINT and Space; Sensors, and Materials
8
Readings:
Jeffrey T. Richelsen, “The Technical Collection of
Intelligence,” pp. 78-88.
James J. Wirtz, “Pearl Harbor and 9/11,” pp. 112-116.
Patricia Moloney Figliola, “Digital Surveillance: The
Communications Assistance for Law Enforcement Act,”
CRS Report RL30677, June 7, 2007. (Document 9)
Richard A. Best, Jr., “Satellite Surveillance:
Domestic Issues,” CRS Report 34421, June 27, 2008.
(Document 18)
Richard A. Best, Jr., and Jennifer K. Elsea, Satellite
Surveillance: Domestic Issues, Washington, DC:
Congressional Research Service, 13 January 2011.
(Document 24)
Richard M. Thompson, Governmental Tracking of Cell
Phones and Vehicles: The Confluence of Privacy,
Technology, and Law, Washington, DC: Congressional
Research Service, 1 December 2011. (Document 25)
September 19: Intelligence Collection -- Human Intelligence
and Open Source Intelligence
Readings:
Frederick P. Hitz, “Human Source Intelligence,” pp.
89-101.
Stephen C. Mercado, “Open-Source Intelligence,” pp.
102-111.
Mark A. Randol, “Homeland Security Intelligence:
Perceptions, Statutory Definitions, and Approaches,”
CRS Report RL33616, January 14, 2009. (Document 7)
Deliverable: CONCEPT PAPER - Students inform
instructor of their research paper topic in writing
September 26: Intelligence Analysis and Production
Readings:
9
Richard K. Betts, “Analysis, War, and Decision: Why
Intelligence Failures Are Inevitable,” pp. 123-139.
Robert D. Blackwell and Jack Davis, “A Policymaker’s
Perspective on Intelligence Analysis,” pp. 140-147.
William M. Nolte, “The Challenges of Intelligence
Analysis,” pp. 148-159.
Richard A. Best, Jr., “Intelligence and the War in
Iraq,” pp. 160-164.
Gregory Treverton, “Intelligence Gathering, Analysis,
and Sharing,” Chapter 2, 2008. (Document 22)
Jeff Jonas and Jim Harper, “Effective Counterterrorism
and the Limited Role of Predictive Data Mining,”
Policy Analysis, No. 584, December 11, 2006. (Document
17)
Richard M. Best, Jr., Intelligence Estimates: How
Useful to Congress?, Washington, DC: Congressional
Research Service, 6 January 2011. (Document 26)
Richard M. Best, Jr., The National Intelligence
Council: Issues and Options for Congress, Washington,
DC: Congressional Research Service, 27 December 2011.
(Document 27)
October 3: Politicizing Intelligence
Readings:
James J. Wirtz, “The Intelligence-Policy Nexus,” pp.
169-176.
Mark M. Lowenthal, “Tribal Tongues: Intelligence
Consumers, Intelligence Producers,” pp. 210-218.
Glenn Hastedt, “Public Intelligence,” pp. 177-190.
Colonel Daniel Peetbrese, “Intelligence Sharing:
Getting the National Counterterrorism Analysts on the
Same Data Sheet,” The Atlantic Council Occasional
Paper, October 2006. (Document 15)
10
John Rollins, “Fusion Centers: Issues and Options for
Congress,” CRS Report RL34070, January 18, 2008.
(Document 11)
Alfred Cummings, Congress As A Consumer of
Intelligence Information, Washington, DC:
Congressional Research Service, 28 January 2010.
(Document 28)
October 10: Counterintelligence
Readings:
Stan A. Taylor and Daniel Snow, “Cold War Spies: Why
They Spied and How They Got Caught,” pp. 307-318.
Senate Select Committee on Intelligence, “Treachery
Inside the CIA,” pp. 319-332.
Paul J. Redmond, “The Challenges of
Counterintelligence,” pp. 295-306.
Office of the National Counterintelligence Executive,
Fundamental Elements of the Counterintelligence
Discipline, Volume 1, January 2006. (Document 3)
National Counterintelligence Executive, “The National
Counterintelligence Strategy of the United States of
America,” 2008. (Document 16)
October 17: Law Enforcement and Intelligence
Readings:
Government Accountability Office, “Federal Efforts Are
Helping to Alleviate Some Challenges Encountered by
State and Local Information Fusion Centers,” GAO-0835, October 2007. (Document 10)
Sunchlar M. Rust, “Collaborative Network Evolution:
The Los Angeles Early Warning Group,” Naval
Postgraduate School, March 2006, Unpublished Master’s
Thesis. (Document 20)
Jerome Bjelopera, Terrorism Information Sharing and
the Nationwoide Suspicious Activity Report Initiative,
11
Washington, DC: Congressional Research Service, 28
January 2011 (Document 29)
October 24 – Mid Term Exam
Students who choose to do a briefing on their research
on December 5 must inform the instructor in writing by
this date.
October 31: Special Activities
Readings:
Loch Johnson, “Evaluating Covert Action,” pp. 265-286.
Senator Frank Church, “Covert Action: Swampland of
American Foreign Policy,” pp. 233-237.
James A. Barry, “Covert Action Can Be Just,” pp. 238347.
Alfred Cumming, “Sensitive Covert Action
Notifications: Oversight Options for Congress,” CRS
Report, 6 April 2011. (Document 2)
November 7: The Foreign Experience and Intelligence Sharing
Readings:
Alexander Orlov, “The Soviet Intelligence Community,”
pp. 522-531.
Thomas C. Bruneau, “Controlling Intelligence in New
Democracies,” pp. 516-525.
Percy Cradock, “The British Experience with
Intelligence,” pp. 532-539.
Esther Brimmer, ed., Transforming Homeland Security:
US and European Approaches, Washington, DC: Johns
Hopkins Center for Transatlantic Relations, 2006.
(Document 21)
12
November 14: Accountability
Readings:
Gregory F. Treverton, “Intelligence: Welcome to the
American Government,” pp. 347-367.
Frederick P. Hitz, “Unleashing the Rogue Elephant:
September 11 and Letting the CIA Be the CIA,” pp. 368376.
Frederic F. Manget, “Another System of Oversight:
Intelligence and the Rise of Judicial Intervention,”
pp. 377-392.
Yale University School of Law Symposium, “Warrantless
Wiretaps,” pp. 407-416.
Mark A. Randol, “The Department of Homeland Security
Intelligence Enterprise: Operational Overview and
Oversight Challenges for Congress,” CRS Report R40602,
May 27, 2009. (Document 6)
Richard A. Best, Jr., The Intelligence Appropriations
Process: Issues for Congress, Washington, DC:
Congressional Research Service, 16 December 2011.
(Document 30)
November 21 - Thanksgiving Break, No Class
November 28: Intelligence after 9/11 and Now
Readings:
Kean Commission, “9/11 Intelligence Failure,” pp. 421465.
Amy B. Zegart, “Spying Blind,” pp. 466-484.
Paul Pillar, “Intelligence, Policy, and the War in
Iraq,” pp. 492-498.
Michael A. Wermuth, “Improving Terrorism Warnings –
The Homeland Security System,” RAND Testimony to the
House Committee on Government Reform, Subcommittee on
National Security, March 16, 2004. (Document 14)
13
The Brookings Institution, “”The State of Homeland
Security,” Symposium, June 1, 2006. (Document 19)
Committee on Homeland Security, “The State of Homeland
Security, 2007,” Staff Report, 2007. (Document 4)
Department of Homeland Security, “One Team, One
Mission, Securing Our Homeland,” DHS Strategic Plan
for Fiscal Years 2008, 2013. (Document 8)
Henry H. Willis, Strengthening Strategic Planning and
Management at DHS, Testimony, Santa Monica, CA: RAND,
26 April 2013. (Document 31)
December 5: Student Briefings
Deliverable: Research Paper
December 12: Final Examination
Download