Lec # | Topics | READINGS |
---|---|---|
1 | Introduction This session will provide a brief overview of the course, discuss the required readings and class exercises, and the expected student participation. It will also ask the question of what is intelligence, how it relates to policy, and why is it necessary in a democratic society. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 1, pp. 1-9. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, introduction, and chapter 1, pp. 1-9. ISBN: 9781574883459. Warner, Michael. "Wanted, a Definition of Intelligence." Studies in Intelligence 46, no. 3 (2002). Aspin-Brown Commission. "The Need to Maintain an Intelligence Capability." Preparing for the 21st Century: An Appraisal of U.S. Intelligence. March 1, 1996, chapter 1. |
2 | Origins and Functions of the Intelligence Community This session looks at the origins if the Intelligence Community (IC) and its current functions and processes. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 2, and 4, pp. 10-24, and 41-53. ISBN: 9781568027593. Warner, Mark, ed. Central Intelligence: Origin and Evolution. Washington, DC: Center for the Study of Intelligence, CIA, 2001. (PDF) George, Roger Z. and Robert D. Kline, eds. Intelligence and the National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, 2004. Aspin-Brown Commission. "The Evolution of the U.S. Intelligence Community." (Appendix A) |
3 | The Current Intelligence Community Structure and Budget This session will examine in some detail the current structure and budget of the IC, focusing on the major agencies, their traditional roles, and proposals for change and reform in the post 9/11 environment. Students will debate the issue of centralization vs. decentralization of national intelligence. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 3, pp. 25-40. ISBN: 9781568027593. Johnson, Loch K., and James J. Wirtz, eds. "The Use and Limits of U.S. Intelligence." Strategic Intelligence. Los Angeles, CA: Roxbury Publishing, 2004, chapter 3, pp. 33-40. ISBN: 9781931719278. (Various authors) The 9/11 Commission Report. New York, NY: Norton, 2004, chapter 13, pp. 339-428. ISBN: 9780393326710. Kindsvater, Larry C. "A Senior Officer's Perspective: The Need to Reorganize the Intelligence Community." Studies in Intelligence 47, no. 1 (2003): 1-6. Vickers, Robert. "Intelligence Reform: Problems and Prospects." Breakthroughs XIV, no. 1 (Spring 2005). |
4 | Technical Collection and Open Source This session will discuss the ICs technical collection capabilities, especially Sigint and Imint, as well as the need for more open source input. It will also discuss classification issues and the shortcomings of technical collection in the war on terrorism. Students will debate the issue of technical vs. human collection and the value of open source information. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 5, pp. 54-86. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 2, pp. 22-33, and 37-40. ISBN: 9781574883459. Goodman, Glenn W. "Space-based Surveillance," and "Unclassified Space Eyes." In Intelligence and National Security Strategist: Enduring Issues and Challenges. Edited by Roger Z. George, and Robert D. Kline. Washington, DC: National Defense University Press, CSI, 2004, chapter 10, and 11. Macartney, John D. "How Should We Explain MASINT." In Intelligence and the National Security Strategist: Enduring Issues and Challenges. Edited by Roger Z. George, and Robert D. Kline, Washington, DC: National Defense University Press, 2004, chapter 13. Aid, Matthew "The U.S. National security Agency in the 21st Century." In Intelligence and the National Security Strategist: Enduring Issues and Challenges. Edited by Roger Z. George, and Robert D. Kline, Washington, DC: National Defense University Press, 2004, chapter 14. George, Roger Z., and Robert D. Kline, eds. "The Open Source Revolution." Part VI in Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, CSI, 2004, chapter 20-22. |
5 | Human Collection and Counterintelligence This session will discuss the need for human collection to wage the war on terrorism and support nonproliferation of WMD, as well as the requirement for strong counterintelligence efforts. The problems of human collection will be discussed, and students will debate the issue of the tension between human collection and counterintelligence. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 7, pp. 113-123. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. "Counterintelligence." In Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 2, pp. 11-22, and 33-37. ISBN: 9781574883459. Riley, Patrick. "CIA and Its Discontents." In Strategic Intelligence. Edited by Loch K. Johnson and James J. Wirtz. Los Angeles, CA: Roxbury Publishing, 2004, chapter 4. ISBN: 9781931719278. Cogan, Charles. "The In-Culture of the DO." In Intelligence and the National Security Strategist: Enduring Issues and Challenges. Edited by Roger Z. George, and Robert D. Kline. Washington, DC: National Defense University Press, 2004, chapter 15. Statement by Brian Fairchild before the Joint Economic Committee of the U.S. Congress. May 20, 1998, pp. 1-13. Olson, James M. "The Ten Commandants of Counterintelligence." In Intelligence and the National Security Strategist: Enduring Issues and Challenges. Edited by Roger Z. George, and Robert D. Kline. Washington, DC: National Defense University Press, 2004, chapter 18. |
6 | Analysis and Politicization This session will examine how the IC interacts in theory and practice, the different types of intelligence, especially current and estimative, and the difference between puzzles and mysteries. It will also look at the role of the National Intelligence Council in producing joint intelligence products and the issues of dissent and politicization. Students will produce a draft current intelligence item. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 6, pp. 87-112. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 3, pp. 41-61. ISBN: 9781574883459. George, Roger Z., and Robert D. Kline. Part VII in Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, CSI, 2004, chapter 23, 24, and 25. Watanabe, Frank. "Fifteen Axioms for Intelligence Analysis." Studies in Intelligence, no. 1 (1997). |
7 | Intelligence and National Policy This session will looks closely at the interaction between intelligence and policy, and why it sometimes used and sometimes ignored. It will also look in more detail at the danger of politicization, with the Iraq WMD estimate as a case study. Students will produce a draft national intelligence estimate terms of reference. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 9, pp. 139-152. ISBN: 9781568027593. George, Roger Z., and Robert D. Kline. Part IX in Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, CSI, 2004, chapter 31, 32 and 33. Herman, Michael. "Intelligence and National Action." In Strategic Intelligence. Edited by Loch K. Johnson, and James J. Wirtz. Los Angeles, CA: Roxbury Publishing, 2004, chapter 17. ISBN: 9781931719278. Senate Select Committee on Intelligence. "Report on the U.S. Intelligence Community's Pre-war Assessments on Iraq." 2004, pp. 1-30. (Conclusions) Summary of the Duelfer Report. (PDF) |
8 | Surprise Attack and Strategic Warning This session will examine the role of strategic warning and the difference between strategic and tactical warning. It will also look at the difference between capabilities and intentions. Finally, it will discuss how strategic warning is currently done in the IC. Students will debate the issue of policy successes and warning failures, and whether some warning failures are inevitable. | Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 3, pp. 62-73. ISBN: 9781574883459. Betts, Richard. "Analysis, War and Decision: Why Intelligence Failures Are Inevitable." World Politics 31, no. 1. Davis, Jack. "Strategic Warning." Occasional Papers (2003): 2-9. (PDF) Vickers, Robert. "The State of Warning Today." Defense Intelligence Journal (1998): 9-15. |
9 | Military Intelligence and Counterinsurgency This session focuses on the use of intelligence for military support. It also discusses the role of intelligence in military operations and its special problems in fighting insurgents and terrorist as opposed to supporting convention wars. Students will debate whether we are spending too much on technical collection and analysis in support of military operations for unconventional warfare. | George, Roger Z., and Robert D. Kline. Part X in Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press CSI, 2004, chapter 35, 36, 37, and 38. Grau, Lester. "Guerrillas, Terrorists and Intelligence Analysts." Military Review (July 2004): 42-49. Metz, Steven. "Insurgency and Counterinsurgency in Iraq." Washington Quarterly (Winter 2003-2004): 25-36. |
10 | Covert Action This session examines the most controversial of CIA intelligence roles, particularly support for paramilitary operations to overthrow governments, as well as past assassination attempts. Students will debate whether such operations are still necessary in support of the war on terrorism. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 8, pp. 124-138. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 4, pp. 75-97. ISBN: 9781574883459. George, Roger Z., and Robert D. Kline. Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, CSI, 2004, chapter 39. Johnson, Loch K. and James J.Wirtz, eds. Part VI in Strategic Intelligence. Los Angeles, CA: Roxbury Publishing, 2004, chapter 20, 21, 22, and 28. ISBN: 9781931719278. |
11 | Counterterrorism The focus of this session will be on the role of intelligence in supporting the war on terrorism. It will look in more detail on the reasons for the 9/11 warning failure, the role of the Counterterrorism Center, and the historical separation between domestic law enforcement and foreign intelligence. Finally it will look at the recommendations of the 9/11 Commission and the subsequent Intelligence Reform Act of 2004. Students will debate the need for enhanced security vs. the dangers to privacy and civil liberties. | George, Roger Z., and Robert D. Kline. Intelligence and National Security Strategist: Enduring Issues and Challenges. Washington, DC: National Defense University Press, CSI, 2004, chapter 9, and 27. Johnson, Loch K., and James J. Wirtz. Strategic Intelligence: Windows Into a Secret World - An Anthology. Los Angeles, CA: Roxbury Publishing Company, 2004, chapter 19, and 20. ISBN: 9781931719278. The 9/11 Commission Report. New York, NY: Norton, chapter 11, and 12, pp. 339-398. Berkowitz, Bruce. "Intelligence and the War on Terror." Orbis (Spring 2002): 289-300. |
12 | WMD and Nonproliferation This session will look at the special challenge to intelligence in supporting non-proliferation, and the special problem of denial and deception. It will examine Iraq as a case study of what can go wrong, and look at the danger of terrorist acquisition and use of WND. | Treverton, Gregory. "Intelligence:Achilles Heal of the Bush Doctrine." Arms Control Today (Jul-Aug 2003): 1-5. Commission on the Intelligence Capabilities of the U.S. Regarding Weapons of Mass Destruction. Washington, DC, 2005, overview, and chapter 13, pp. 1-37, and 501-536. |
13 | Intelligence and Democracy This session will address the history of intelligence oversight, particularly by the U.S. Congress, including issues of accountability, problems of secrecy in a democratic society, and ethical and morale issues. | Lowenthal, Mark M. Intelligence: From Secrets to Policy. 2nd ed. Washington, DC: CQ Press, 2003, chapter 10, and 13, pp. 153-174, and 206-222. ISBN: 9781568027593. Shulsky, Abram N., and Gary J. Schmitt. Silent Warfare: Understanding the World of Secret Intelligence. 3rd ed. Washington, DC: Potomac Books, 2002, chapter 6, pp. 129-158. ISBN: 9781574883459. Johnson, Loch K., and James J. Wirtz. Strategic Intelligence: Windows Into a Secret World - An Anthology. Los Angeles, CA: Roxbury Publishing Company, 2004, chapter 27, 30, 31, and 32. ISBN: 9781931719278. |
14 | Overview and the Future of Intelligence This wrap-up session will review key points from earlier readings and lectures and discuss the outlook for intelligence reform and the role of the new Director of National Intelligence. |