STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 425 LAW ENFORCEMENT INTELLIGENCE SYSTEMS IN HOMELAND SECURITY

Similar documents
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 420 THE CORPORATE ROLE IN HOMELAND SECURITY

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 201 CRITICAL ISSUES IN CRIMINAL JUSTICE

Espionage and Intelligence. Debra A. Miller, Book Editor

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 355 PUBLIC SAFETY CRITICAL INCIDENT RESPONSE

US Intelligence Community Thomas Patrick Carroll 1

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE. JUST 313 Juvenile Justice

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 400 INCIDENT COMMAND: SYSTEM COORDINATION AND ASSESSMENT

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE BSAD BUSINESS LAW II. Prepared By: William Jones

Lassen Community College Course Outline

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE LEST 320 NEGLIGENCE AND INTENTIONAL TORTS

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 300 FORENSIC PHOTOGRAPHY

The Need to Share: The U.S. Intelligence Community and Law Enforcement

1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene.

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:

Intelligence Analysis for Homeland Security RPAD 557

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

INTELLIGENCE ANALYSIS Criminal Justice 380 Course Syllabus Spring 2010

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law (August 3, 2007).

The National Counterintelligence Strategy of the United States

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HIST 202 H UNITED STATES HISTORY: 1877 TO PRESENT (HONORS)

MELISSA GRAVES. 118 Westbury Circle Oxford, MS PROFESSIONAL EXPERIENCE

Counterintelligence Awareness Glossary

CMJS/SOCI 4013 Homeland Security

One Hundred Twelfth Congress of the United States of America

CITRUS COMMUNITY COLLEGE DISTRICT. Degree Applicable (x) Non degree applicable ( )

IN THE WAR ON TERRORISM

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Curriculum for the Bachelor Degree in Crime and Delinquency

HOMELAND SECURITY INTELLIGENCE RPAD 556

Legal Studies and Criminal Science

American Military University. Bachelor of Arts in Intelligence Studies - Terrorism Studies

Evaluating and Teaching Homeland Security Intelligence 1 James Steiner, Ph.D. DRAFT

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE PSYC 350 EDUCATIONAL PSYCHOLOGY

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study

NATIONAL SECURITY INTELLIGENCE

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

Course Title: HSE -103 Legal Aspects of Homeland Security and Emergency Management Prerequisites: None Credit Hours: 3 lectures, 3 hours

Spring 2015 Courses Security Studies Masters and Certificate

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO Course Syllabus

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE ABAP SEMINAR IN APPLIED BEHAVIOR ANALYSIS

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 435 DISASTER SIMULATION

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE BSAD ADVERTISING AND PROMOTION

American Military University. Bachelor of Arts in Intelligence Studies - Intelligence Operations

Confrontation or Collaboration?

Title of Course: Cyberlaw New Course: 10/25/02

Foreign Affairs and National Security

WAYLAND BAPTIST UNIVERSITY SCHOOL OF BEHAVIORAL & SOCIAL SCIENCES HAWAII CAMPUS

National Security Adjudicator Training Program

INTELLIGENCE AND ANALYSIS

Introduction to Homeland Security Administration of Justice (AJ10) Fall Transportation Security Administration, 5757 Century Blvd.

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

JOHN DAVIDSON WOODWARD, JR.

Homeland Security Major

Curriculum Vitae. Mark C. Anarumo, Ph.D. National Security Fellow, May 2012 John F. Kennedy School of Government, Harvard University

CRIMINAL JUSTICE. CJ 0002 CRIME, LAW, AND PUBLIC POLICY 3 cr. CJ 0110 CRIMINOLOGY 3 cr. CJ 0130 CORRECTIONAL PHILOSOPHY: THEORY AND PRACTICE 3 cr.

Corporate Spying An Overview

The Geography of International terrorism

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture)

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE ACCT 410 INTERNATIONAL ACCOUNTING

MISSION BRIEF. Syllabus

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

Agenda Item #06-29 Effective Spring 2007 Eastern Illinois University Revised Course Proposal MGT 4500, Employee Staffing and Development

A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE)

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CRISIS INTERVENTION PSYC 315

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

GAO INFORMATION SHARING. Agencies Could Better Coordinate to Reduce Overlap in Field-Based Activities. Report to Congressional Requesters

Federal Bureau of Investigation s Integrity and Compliance Program

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

MISSION BRIEF. Syllabus

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS SECURITY MANAGEMENT I SEAT 1500

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE. HUSV 201 Introduction to Human Services

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

The Ethics of Information Sharing Between the FBI and CIA

Government in America People, Politics, and Policy 16th Edition, AP Edition 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

NAVAL POSTGRADUATE SCHOOL THESIS

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE. SOET 377 Engineering Ethics

The War on Terror in Classrooms and Clinics: An Inventory

The Frontiers of Global Security Intelligence: Analytical Tradecraft and Education as Drivers for Intelligence Reform

MSCJ 501 DEA Current Issues and Future Directions in Criminal Justice

Public Opinion on Selected National Security Issues:

Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies

Learning Goals: A Statement of Principles

Myths about Criminal Justice 17 Summary 18 Key Terms 19 Review Questions 19 In the Field 20 On the Net 20 Critical Thinking Exercises 20

CRIMINAL JUSTICE PROGRAM

The Design of an Undergraduate Program In Homeland Security

Transcription:

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 425 LAW ENFORCEMENT INTELLIGENCE SYSTEMS IN HOMELAND SECURITY Prepared By: Paul R. Bowdre SCHOOL OF SCIENCE, HEALTH, & CRIMINAL JUSTICE CRIMINAL JUSTICE DEPARTMENT MAY 2015

A. TITLE: Law Enforcement Intelligence Systems in Homeland Security B. COURSE NUMBER: JUST 425 C. CREDIT HOURS : 3 D. WRITING INTENSIVE COURSE: No E. COURSE LENGTH : 15 weeks F. SEMESTER(S) OFFERED : Fall or Spring G. HOURS OF LECTURE, LABORATORY, RECITATION, TUTORIAL, ACTIVITY: 3 lecture hours per week H. CATALOG DESCRIPTION: This course examines the concepts and practices involved in the process of collecting and analyzing intelligence as well as the influence of intelligence in shaping homeland security decision-making at the state and local levels. It examines the intelligence gathering and analysis capabilities of state and local criminal justice agencies and the use of intelligence processes to support homeland security policy formulation. Students in this course will develop an understanding of intelligence tradecraft and the analytic and research skills used in intelligence work, as well as an appreciation for the ethical, Constitutional, and civil liberties issues involved. Specific topics considered include open source intelligence, assessing the reliability and validity of information, intelligence sharing, covert and counterintelligence operations. I. PRE-REQUISETES/CO-COURSES : a. Pre-requisite: JUST 230 Fundamentals of Homeland Security and completion of 45 semester credit hours in Criminal Investigation, Criminal Justice: Law Enforcement Leadership or Homeland Security or permission of instructor. b. Co-requisite: None J. GOALS ( STUDENT LEARNING OUTCOMES) : By the end of this course, students will: Course Objective 1. Apply the concepts and practices in intelligence collection, analysis, and evaluation. 2. Describe the intelligence collection capabilities of state and local law enforcement agencies. 3. Summarize the process of using intelligence operations in support of state and local policy Institutional SLO 3. Professional Competence 1. Communication 3. Professional

formulation. 4. Demonstrate the analytic and research skills used in intelligence tradecraft. 5. Apply the process to demonstrate the reliability and validity of information. 6. Summarize the ethical, Constitutional, and civil liberties issues involved in local intelligence operations. Competence 1. Communication 3. Professional Competence 3. Professional Competence 1. Communication K. TEXTS : Graves, M., Jensen III, C.J., & McElreath, D.H. (2013). Introduction to intelligence studies. Boca Raton, FL: Taylor & Francis Group (CRC Press). L. REFERENCES : Chalk, P. & Rosenau, W. (2004) Confronting the enemy within: Security intelligence, the police, and counterterrorism in four democracies. Santa Monica, CA: Rand Kamien, D.G. (Ed.) (2012). Homeland security handbook (2 nd ed.). New York, NY: McGraw-Hill. Kraft, M.B. & Marks, E. (2012). U.S. government counterterrorism: A guide to who does what. Boca Raton, FL: Taylor & Francis Group. M. FACILITIES AND EQUIPMENT : Technology enhanced classroom N. GRADING METHOD: A-F O. MEASUREMENTCRITERIA / METHODS : Exams Quizzes Assignments Participation P. DETAILED COURSE OUTLINE : I. An Overview of Intelligence A. What Is Intelligence? B. The Challenge of Defining Intelligence

C. Information and Intelligence D. Types of Intelligence E. Functions of Intelligence Agencies F. Policymakers and Decision-Makers G. Intelligence Foundations in U.S. Government H. U.S. Intelligence Community I. Purpose of Intelligence Limitations of Intelligence II. III. History of Intelligence in the United States A. Revolutionary War to Civil War B. Civil War to World War I C. Law Enforcement Intelligence: The Palmer Raids D. World War I to Pearl Harbor E. World War II F. The Cold War a. National Security Act of 1947 b. Early Days of the CIA c. Korean War d. Creation of the National Security Agency e. Evolution of IMINT f. Cuba g. Vietnam Era h. War at Home i. Watergate and the Pike and Church Committees j. The Carter Years k. The Reagan Years: End of Cold War l. End of the Soviet Union G. Emergence of Terrorism H. Espionage in 1980s and 1990s I. The Clinton Years J. 9/11 and Its Aftermath K. Intelligence Reform and Terrorism Prevention Act of 2004 and Creation of the Director of National Intelligence L. Recent Developments in the Struggle against Terrorism The IC Today A. Designated Federal Agencies and the DNI i. Director of National Intelligence ii. Independent Agencies: CIA iii. Department of Energy: Office of Intelligence and Counterintelligence

iv. DHS: Office of Intelligence and Analysis and Coast Guard Intelligence v. Department of Justice: FBI and DEA vi. Department of State: Bureau of Intelligence and Research Department of the Treasury: Office of Terrorism and Financial Intelligence vii. Military Agencies: Army, Navy, Air Force, and Marines; Defense Intelligence Agency; National Geospatial-Intelligence Agency; National Security Agency; and National Reconnaissance Office B. Federal, State, and Local Agencies i. Federal Agencies ii. State and Local Agencies C. Private Sector IV. Collection A. Considerations for Collection i. Credibility Issues: Vetting the Source ii. Information: How Much Is Enough? iii. Protecting Sources and Methods B. First Step in Collection You Need to Have a Plan C. Collection Methods: The "INTs" i. Human Intelligence ii. Signals Intelligence iii. Geospatial Intelligence iv. Financial Intelligence v. Open Source Intelligence V. Barriers to Analysis A. Murky World of IC B. Psychological Barriers C. Group Decision-Making D. Bureaucratic Barriers: Politics and the Will of the Policymaker E. Bureaucratic Barriers: Information Sharing F. Security and Sharing: Inherent Tension VI. Analytical Methods A. Critical Thinking B. Collaboration C. Structured Analytical Techniques i. Understanding Our Assumptions: Key Assumptions Check

ii. Considering All Sides of the Issue: Analysis of Competing Hypotheses iii. Preparing for Whatever Comes: Scenarios iv. The Emperor s Clothes Are Fair Game: Contrarian Methods D. Analytical Software VII. VIII. IX. Putting It All Together: The Intelligence Cycle A. Information and the Origin of the Intelligence Cycle B. The Intelligence Cycle i. Step One: Planning and Direction ii. Step Two: Collection iii. Step Three: Processing iv. Step Four: Analysis v. Step Five: Dissemination vi. Step Six: Evaluation C. Critical Reactions to the Intelligence Cycle Counterintelligence A. Defensive Counterintelligence i. Classification Systems ii. Security Clearances iii. Counterintelligence Operations B. Offensive Counterintelligence i. Catching Spies in the United States ii. International Operations iii. Disinformation C. Counterintelligence Operations Today Covert Operations A. Covert Operations B. Clandestine Operations C. Deception Operations D. Recent History of Covert and Clandestine Operations by the United States E. Military Covert Operations F. Legal Requirements upon the President to Report Intelligence Operations G. Covert Operations and the War on Terror H. Are Covert Operations a Good Idea? X. Constitutional Mandates Overview of Executive, Legislative, and Judicial Roles A. Legal Origin of the Intelligence Community

B. Intelligence and International Law C. Targeting and Assassination D. Fourth Amendment: Right to Privacy E. History of FISA F. 28 Code of Federal Regulations 23 G. First Amendment Issues and Intelligence H. USA PATRIOT Act I. Intelligence Reform and Terrorism Prevention Act J. Terrorism and Legal Proceedings K. Classified Information Procedures Act L. Ethics XI. XII. XIII. Writing and Briefing for the Intelligence Community A. Writing B. Types of Intelligence Writing C. Writing for an Audience D. How to Write Intelligence Products E. Good versus Bad Intelligence Writing F. The Art of Writing G. The Writing Process H. Briefing i. Basics of Public Speaking ii. Briefing Preparation iii. The Briefing Criminal Intelligence and Crime Analysis A. History of Intelligence in Law Enforcement B. Law Enforcement and Intelligence C. Criminal Intelligence before the 9-11 Attacks D. Intelligence-Led Policing in the United States and the National Criminal E. Intelligence Sharing Plan i. Fusion Centers F. Crime Analysis i. Research behind Crime Analysis ii. Types of Crime Analysis 1. Criminal Investigative Analysis 2. Geographic Profiling Threats and Challenges for the Twenty-first Century A. Threats

i. Natural Threats ii. Illicit Drug Production and Distribution iii. Border Security and Immigration Issues iv. Transnational Organized Crime Human Trafficking v. Intellectual Property Theft vi. Cyber Security B. Weapons Trafficking C. Terrorism D. Failed States, Failing States, and Rogue Nations XIV. Future of Intelligence A. Forecasting the Future B. A Look Ahead i. Technology ii. Demographics iii. Economic Trends iv. Politics/Governance C. Vision 2015: How the DNI Defines the Future i. Infrastructure and Technology ii. Policy iii. Personnel Q. LABORATORY OUTLINE: N/A