HLS450: Intelligence. Course Description and Outcomes. Credit Hours: 3

Similar documents
Course Description and Outcomes. Participation & Attendance

ISM527 - Cyber Security Management

HLS300: Introduction to Homeland Security

SAMPLE. PJM500: Project Management. Course Description and Outcomes. Credit Hours: 3

MGT410 Project Management

ISM542 Business Analytics

ISM530 Enterprise Cybersecurity

ITS415: Principles of Cybersecurity

ITS425: Ethical Hacking and Penetration Testing

ORG579: Organizational Leadership Capstone

ISM540: Introduction to Business Intelligence

HSM300: Introduction to Human Services

SAMPLE. Course Description and Outcomes

ITS425: Ethical Hacking and Penetration Testing

HSM405 Case Management in Human Services

ITS410: Database Management

OTL532K Principles of 21st Century Learning and Design

PJM380: Project Management Tools

HCM370: Quality and Risk Management in Health Care Credit Hours: 3

SMB300 Small Business and Entrepreneurship

SAMPLE. COM300: Effective Business Communication Skills: Research and Writing

PJM480: Capstone Project Management

ORG536: Contemporary Business Writing and Communication

PJM380: Project Management Tools

MKG350: Promotions, Advertising and Public Relations

How To Write A Project On Information Technology

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

IDEAL PROGRAM PRST 224 Critical Thinking & Writing SYLLABUS ONLINE

PHOENIX COLLEGE ONLINE. SBS220 Internet Marketing for Small Business

Child Development 382 Professional Seminar in Child Development: Current Issues Fall 2016 Tuesdays 5-7:50pm in Modoc 120

SAMPLE. ORG536: Contemporary Business Writing and Communication

COURSE SYLLABUS ETEC 524: Introduction to Educational Technology Spring 2013


OTTAWA ONLINE ECE Early Childhood Math Methods

How To Get A Wgu Degree

College of Southern Maryland Fundamentals of Accounting Practice(ACC 1015) Course Syllabus Spring 2015

OTTAWA ONLINE EDC-7723 Instructional Design and Evaluation

SYLLABUS FOR ADM 689. Spring 2010, Summer 2010, Fall 2010

Independent Study Project in Journalism

Master of Education, Learning and Technology

Division of Fine Arts Department of Photography Course Syllabus

The guidelines for Major Projects in the College of Liberal Arts are brief:

Course Title: ARE Curriculum in Teaching Art (Web) Term: Fall 2014 Credits: 3

University of Massachusetts Dartmouth Charlton College of Business Information Technology for Small Business MIS 375.

University of Massachusetts Dartmouth Charlton College of Business Information Technology for Small Business MIS 375 (Online Course)

English 1302 Writing Across the Curriculum Spring 2016

INTRODUCTION TO SMALL BUSINESS MANAGEMENT MANAGEMENT 103 (52356) 3 semester credits Summer Semester 2014

INTELLIGENCE ANALYSIS Criminal Justice 380 Course Syllabus Spring 2010

LoudCloud Student Walk to Class Tutorial

Online Course Syllabus. POL 1113: American National Government. Fall 2015

PRST 5400/6400/7400 INSTRUCTIONAL DESIGN FOR TRAINING AND DEVELOPMENT 3 Credit Hours

CRIJ/BOR 4354 Professionalism & Ethics in Criminal Justice Agencies

Brazosport College Syllabus for Criminology (CJSA 1325) Spring 2014 (Online)

COURSE SYLLABUS ETEC 578: Instructional Design & Development Spring 2014

Prairie View A&M University P.O. Box 519 Mail Stop 2600 Prairie View, TX 77446

Master of Science, Management and Leadership

ANGELO STATE UNIVERSITY BACHELOR of SCIENCE in NURSING RN-BSN Program NUR 2324 PATHOPHYSIOLOGY FALL 2014 PAUL OSMANSKI; MSN, RN

IS Management Information Systems

Social Psychology PSY Syllabus Fall

BUS 454 MARKET RESEARCH AND INFORMATION

Upon completion of COMM 7, Interpersonal Communication, students will be able to:

Address: XXX. Semester/Year: xxx

Master of Business Administration

ASU College of Education Department of Curriculum and Instruction EDG 6331 Role of the School Counselor Fall A 2015 Course Syllabus

HARRISBURG AREA COMMUNITY COLLEGE PSYCHOLOGY 101-GENERAL PSYCHOLOGY. Dr. Jaci Verghese. Syllabus for CRN Meeting Times: Online Instruction

Human Resource Management. BUA Spring 2009 Hybrid. Semester Dates: May 19, 2009 through June 23, 2009

Lisa K. Thompson, Ph.D., Instructor: (office); (fax); SYLLABUS Spring 2013

COURSE OUTLINE. SOC SCI 2LC3E (Winter 2014) Leadership & Communications

INTRODUCTION TO CRIMINAL JUSTICE FALL 2015

Introduction to Criminal Justice Central College

ASU College of Education Department of Curriculum and Instruction EDG 6361 American Higher Education Course Syllabus

BUSSINESS AND PROFESSIONAL COMMUNICATION COMM GRADING USING THE FOLLOWING VALUES Attendance Classroom & Discussion board participation

Grading and Assignments: Participation: 10.0% Discussion Boards: 10.0% Midterm Exam: 22.5% Final Exam: 22.5% Policy Paper: 35.0%

Traditional courses are taught primarily face to face.

EDP 504 ADVANCED EDUCATIONAL PSYCHOLOGY

Human Resource Management Political Science (POLS) 543 Spring 2013 Course Meets: Tuesday and Thursday 11:00-12:15 p.m. Faner 3075

Department of Criminal Justice CRJ 325 Incident Management and Planning

Department of Accounting Syllabus Fall 2015 ACCT E CRN: # 82569

How To Write A Job Application

Instructor: See information provided in the Syllabus link in the classroom

Northeastern University College of Professional Studies Understanding the Department of Homeland Security CJS 2115 Course Syllabus Fall 2015

Psychology 4978: Clinical Psychology Capstone (Section 1) Fall 2015

MSCJ 501 DEA Current Issues and Future Directions in Criminal Justice

CJ 4480 Digital Forensics II Syllabus - Term

University of Massachusetts Lowell Graduate School of Education Issues, Mandates, and Ethics in Special Education - 05.

HCC ONLINE COURSE REVIEW RUBRIC

CALIFORNIA STATE UNIVERSITY, FULLERTON College of Education Department of Special Education Sped 520: Assessment in Special Education Spring 2015

OTTAWA ONLINE BUS Management Information Systems

INTRODUCTION TO CRIMINAL JUSTICE 101- Hybrid

Transcription:

HLS450: Intelligence Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes Course Description: This course provides an understanding of the intelligence cycle as it relates to homeland security. Topics include intelligence collection, analysis, and dissemination. Students will review the historical context of intelligence and its role in decision making. This course also addresses the different intelligence disciplines of structures, missions, and products. Case studies covering past, present, and future challenges to intelligence operations and homeland security counter measures are also discussed for threat assessment and risk analysis. Course Overview: In this course, students will review a wide array of Homeland Security intelligence-gathering topics and connect them all together with real-world examples. Students will review a wide array of Homeland Security intelligencegathering topics and connect them all together with real-world examples. Students will first review the historical context of intelligence and its role in decision making; they will analyze the evolution and role that intelligence gathering has played in the United States history. Emphasis will also be placed on the intelligence cycle and students will evaluate a five-step and seven-step approach. This course also addresses such topics as counterintelligence, critical infrastructure, threat assessments, and risk analysis. Because there are so many players within the intelligence community, the course will also analyze the stakeholders who play a role in intelligence gathering within the United States. Finally, this course will culminate with students analyzing a case study of their choosing to allow for a real-world consideration of a Homeland Security intelligence gathering scenario. Course Learning Outcomes: 1. Examine the history of intelligence within the United States. 2. Analyze the intelligence cycle. 3. Analyze the challenges that face the Homeland Security intelligence community. 4. Examine the role of the many stakeholders within the Homeland Security intelligence community. 5. Demonstrate an understanding of U.S. critical infrastructure and its connection to Homeland Security intelligence.

Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 11:59 p.m. MT and Peer Responses posted by Sunday 11:59 p.m. MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 11:59 p.m. MT. Week # Readings Assignments 1 Chapter 1 (p. 8-35) & Chapter 5 (p. 78-96) in Homeland Security and Intelligence Chapter 2 (p. 11-28) in Intelligence: From Secrets to 2 3 Chapter 4 (p. 57-70), Chapter 5 (p. 71-116) & Chapter 6 (p. 119-160) in Intelligence: From Secrets to Chapter 1 (p. 1-9) & Chapter 8 (p. 181-197) in Intelligence: From Secrets to Best, R. A. (1996). CRS report for congress covert action: An effective instrument of U. S. foreign policy? Congressional Research Service. Retrieved from http://congressionalresearch.com/96-844/document.php Critical Thinking (75 points) Critical Thinking (75 points)

4 Chapter 3 (p. 43-59) & Chapter 8 (p. 136-146) in Homeland Security and Intelligence Chapter 12 (p. 271-306) in Intelligence: From Secrets to Mastery Exercise (20 points) 5 Chapter 10 (p. 217-247), Chapter 13 (p. 307-325) & Chapter 14 (p. 327-344) in Intelligence: From Secrets to Critical Thinking (100 points) 6 Chapter 7 (p. 163-180) in Intelligence: From Secrets to Kaplan, D., Ekman, M., & Marek, A. (2006). Spies among us. U.S. News & World Report, 140(17), 40-49. Jeffreys-Jones, R. (2005) The FBI s continuing challenge: Centralized intelligence vs. civil liberties. Chronicle of Higher Education, 51 (20), B12-B13. Flynn, S. (2011, May/June). Recalibrating Homeland Security. Foreign Affairs, 90(3), 130-141. Moravej, K., & Diaz, G. (2007). Critical issues in contemporary counterintelligence. UNISCI Discussion Papers 13. Retrieved from http://www.isn.ethz.ch/digital- Library/Publications/Detail/?ots591=0c54e3b3-1e9cbe1e-2c24-a6a8c7060233&lng=en&id=31727 Critical Thinking (100 points) 7 Chapter 2 (p. 36-42), Chapter 6 (p. 97-109) & Chapter 7 (p. 110-135) in Homeland Security and Intelligence Chapter 3 (p. 31-56) in Intelligence: From Secrets to 8 Chapter 10 (p. 172-183), Chapter 12 (p. 204-215) & Chapter 13 (p. 216-228) in Homeland Security and Intelligence Chapter 14 (p. 327-344) in Intelligence: From Secrets to Recommended: Chapters 4 & 9 in Homeland Security and Intelligence Mastery Exercise (20 points) Portfolio (350 points) Assignment Details This course includes the following assignments/projects: Module 2 CRITICAL THINKING: Intelligence Cycle Analysis (75 points)

The Portfolio Project due in Module 8 asks you to choose a case study and examine it by connecting it back to Lowenthal s seven-step intelligence cycle. This assignment will allow you to do this same thing, but on a smaller scale. Research a case study on some aspect of Homeland Security (it can be one from the text or an outside case study of your choosing) and provide an outline using the five-step approach to the intelligence cycle. Provide a bullet-pointed outline of the intelligence cycle actions that were taken in the case study you chose. Your two- to three-page outline must include at least two different sources and should be formatted according to the CSU-Global Guide to Writing and APA Style, with sources properly cited. Upload your completed work to the Week 2 Assignments page. Module 3 Module 4 Module 5 Portfolio Project: Homeland Security Intelligence Case Study (0 points) A final Portfolio Project is due at the end of the course. Please read the full Portfolio Project description on the Week 8 Assignments page to preview your Portfolio Project assignment. This week you should choose a case study that documents Homeland Security intelligence. It cannot be the same case study you used in your Critical Thinking assignment. However, it can be one that was discussed in the text and/or the course. Week 2 Requirements: Submit your chosen case study for approval by the instructor. In one or two sentences identify the chosen case study and explain why you chose this specific case. Upload your explanation to the Week 2 Assignments page. While you will not receive points for this submission in Week 2, it is a required part of the project and points will be assessed for this submission in the Portfolio Project grading rubric. CRITICAL THINKING: Intelligence Framework (75 points) In our lecture this week, we examined various frameworks that attempt to explain the act of Homeland Security intelligence gathering. In a short essay, develop, name, and briefly explain a framework of your own design that you feel best relates to Covert Actions taken within the intelligence community. Your two- to three-page essay should be formatted according to the CSU-Global Guide to Writing and APA Style, with sources properly cited. Upload your completed work to the Week 3 Assignments page. Portfolio Project: Homeland Security Intelligence Case Study (0 points) A final Portfolio Project is due at the end of the course. Please read the full Portfolio Project description on the Week 8 Assignments page to preview your Portfolio Project assignment. Week 4 Requirements: Research and submit a list of at least seven scholarly sources you intend to use for your case study analysis. Wikipedia and CliffsNotes are unacceptable resources as are blogs, newspaper articles, and editorials. Upload your list of sources to the Week 4 Assignments page. While you will not receive points for this submission in Week 4, it is a required part of the project and points will be assessed for this submission in the Portfolio Project grading rubric.

Module 6 Module 8 CRITICAL THINKING: Ethical Issues in Intelligence Gathering (100 points) Think back on our readings for this module and over the course. What do you see as being the largest ethical issue in intelligence gathering within the U.S? Is the intelligence we have gathered worth the ethics we have potentially lost? Consider these questions when identifying the ethical issue. Be sure to document the instance well and provide support for your reasoning. Your two- or three-page response must include at least two different sources and should be formatted according to the CSU-Global Guide to Writing and APA Style, with sources properly cited. Upload your completed work to the Week 5 Assignments page. CRITICAL THINKING: Counterintelligence (100 points) Think back on the readings in this module and consider the role that counterintelligence has on counterterrorism in the United States. Considering the nature of gathering counterintelligence and the fact that some find it hard to walk a fine line between the ethical and unethical, discuss whether or not we should continue this practice. In your personal opinion, has the information we have received through counterintelligence operations saved our nation with regard to terrorism? Be sure to provide support from the literature for your reasoning. Your two- to three-page response must include at least two different sources and should be formatted according to the CSU-Global Guide to Writing and APA Style, with sources properly cited. Upload your completed work to the Week 6 Assignments page. PORTFOLIO: Homeland Security Intelligence Case Study (350 points) Choose a case study that documents Homeland Security intelligence. It cannot be the same case study you used in your Module 2 Critical Thinking assignment. However, it can be one that was discussed in the text and/or the course. Once you have an approved topic you will complete an analysis of the case study using Lowenthal s intelligence cycle. Your analysis must be supported with a minimum of seven scholarly sources. Project Preliminary Deliverables: Week 2: Submit your chosen case study for approval by the instructor. In one or two sentences identify the chosen case study and explain why you chose this specific case. Upload your explanation to the Week 2 Assignments page. Week 4: Research and submit a list of at least seven scholarly sources you intend to use for your case study analysis. Wikipedia and CliffsNotes are unacceptable resources, as are blogs, newspaper articles, and editorials. Upload your list of sources to the Week 4 Assignments page. Project Final Requirements: Week 8: Submit your completed case study analysis including the following items: 1. A description of the case and what occurred in detail 2. An examination of the case in-depth that utilizes the seven-step approach to the intelligence cycle. Each step within this process should be a heading in your paper, with the Feedback section including information for how the intelligence was used to secure the homeland. 3. A response to the following questions: What challenges were faced? Do you think these same challenges would have occurred if this case occurred 50 years prior?

4. An incorporation of the role of counterintelligence, counterterrorism, covert action, and critical infrastructure as they pertain to your chosen case. Remember, your analysis must be supported with a minimum of seven scholarly resources (e.g., academic journals and academic textbooks) to carry out your research for this paper. As expressed previously, Wikipedia and CliffsNotes are unacceptable resources, as are blogs, newspaper articles, and editorials. Your eight- to 10-page paper should be formatted according to the CSU-Global Guide to Writing and APA Style, with sources properly cited. Upload your completed project to the Week 8 Assignments page. Course Grading 10% Mastery Exercises 20% Discussion Participation 35% Critical Thinking Activities 35% Final Portfolio Paper Grading Scale and Policies A 95.0 100 A- 90.0 94.9 B+ 86.7 89.9 B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and Incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions on your course s Assignments page. Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words?

Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.