SYLLABUS International Security and Intelligence Programme: The Cambridge Security Initiative
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
The Cambridge Security Initiative & The Department of War Studies, King’s College London International Security and Intelligence Programme: Twenty-First Century Perspectives on Intelligence and Contemporary Threats SYLLABUS 2023 1 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
COURSE DIRECTORS: Professor David Gioe is a British Academy Global Professor and Visiting Professor of Intelligence and International Security in the Department of War Studies, King’s College London. He is History Fellow for the Army Cyber Institute at the US Military Academy at West Point and Associate Professor of History. David has been a national security practitioner for 20 years. He is a former Central Intelligence Agency operations officer and remains a senior officer in the US Navy Reserve. Professor Michael S. Goodman is Professor of Intelligence and International Affairs and Head of the Department of War Studies, King’s College London. He is official historian of the British Joint Intelligence Committee and also a Visiting Professor at the Norwegian Defence Intelligence School. He is a British army reservist and has spent many years seconded to the Cabinet Office and Ministry of Defence. SYNOPSIS: The International Security and Intelligence (ISI) programme offers a unique opportunity to study with leading academics and practitioners. With a special emphasis on human intelligence, students will explore the role of the intelligence and security agencies, applying their enduring principles to cutting-edge problems. Participants will consider the 21st Century threat landscape from an historical perspective. We will explore, through a wide panoply of optics, the intelligence cycle, the competing claims of state secrecy, information operations, terrorism, the problems generated by the demand for regional security and the security aspects of digital revolutions. Intelligence collection, analysis of the product, and its dissemination to customers remain at the core of the intelligence cycle. Counterintelligence and covert action play more opaque but still vital roles at the heart of the nation state and international alliances. Understanding these perspectives, what intelligence can achieve, but also its limitations, are major course themes. Setting the tone and direction of the programme will be a series of outstanding guest lectures covering a broad spectrum of contemporary intelligence and security challenges. Speakers in recent years have included practitioners - the Heads of MI5, MI6 and GCHQ; the Chief Judge to the Appeals Court of the United States Armed Forces, and the CIA Deputy Director for Operations – and leading academics working in the field of Intelligence and Security studies. The multitude of threats facing Western democracies is diverse and the issues which preoccupy the 2 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
highest levels of government will be discussed and analysed. With its emphasis on contemporary and future challenges and practice, this is a Programme which will appeal to those with an academic or professional interest in intelligence and contemporary threats. This Syllabus describes the: - Aims of the programme - Learning outcomes - Teaching methods - Assessment methods - Class details and reading THE AIMS OF THE PROGRAMME ARE: - To promote multidisciplinary understanding of concepts, issues and debates regarding intelligence and national security issues more broadly. - To encourage reflection on the meaning, value and nature of intelligence and of types of intelligence as evidence and bases for action. - To encourage an understanding of the interactive processes of assessment and analysis. - To foster conscious critical reading and discussion of issues concerning information, intelligence, policy and action. - To promote an understanding of scholarly activity in relation to intelligence. - To foster appreciation of intelligence skills and tools for understanding future developments. - To foster understanding and application of a range of transferable intellectual and study skills. - To foster understanding and application of a range of transferable key skills – communication, listening, and teamwork. THE PROGRAMME WILL PARTICULARLY APPEAL TO: Students and practitioners with an intellectual or professional interest in statecraft and the interlocking themes of intelligence, security, defence and foreign policy. LEARNING OUTCOMES: - Familiarity with key concepts in intelligence. - Understanding of the variety of factors affecting the collection, processing 3 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
and use of information. - Command of key concepts such as human intelligence, counterintelligence, signals intelligence, assessment and analysis, and information operations. - Understanding of intelligence as both a challenge to and a support of international order. - An understanding of different approaches to intelligence in history and other forms of social science. - Knowledge and understanding of intelligence and security in relation to specific empirical cases. - The problems and possible practical solutions to issues of intelligence, war and security. - To have contributed to and participated in the formation of co-learning, investigating and assessing the relevance and relationship of intelligence to future developments in policy and practice. - Development of career and employability skills. TEACHING METHODS: At the core of the programme are a series of Key Theme Lectures covering a broad spectrum of contemporary intelligence and security challenges. Each lecture has a number of corresponding small-group seminars led by the lecturer where these key themes are debated and discussed. All teaching is conducted with strict adherence to the ‘Chatham House Rules’ which all students must respect (when a meeting is held under the Chatham House Rules, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed). KEY THEME LECTURES AND SEMINARS *Please note the Lecture titles and order may be subject to change. These will be reflected on Moodle and in the Timetable. 1. The ISI introduction to Intelligence Studies This, the first lecture, considers the historiography of intelligence and the development of intelligence studies as a distinct field of academic inquiry. Guidance will be given on research methods, interpretative approaches and analytical writing when exploring this exciting but challenging field. Required readings (in advance) are: 4 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
- Tony Paterson, ‘Germany to spy on US for first time since 1945 after ‘double agent’ scandal’, The Independent (July 7, 2014), https://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for- first- time-since-1945-after-double-agent-scandal-9590645.html - Michael Warner, ‘Sources and methods for the study of intelligence’ in Loch K. Johnson (eds.), Handbook of Intelligence Studies (London, 2007), pp.17-27. - David V. Gioe, ‘The History of Fake News’, The National Interest (July 1, 2017), https://nationalinterest.org/feature/the-history-fake-news-21386 - Widget Finn, ‘Why intelligence studies are a smart career move’, inews.co.uk (February 19, 2014). 2. The British Approach to Intelligence Here we will examine the ways in which the British intelligence community has developed what can be seen as a specific, characteristic approach towards its work over time and in response to the changing nature of the threats it has encountered. Required readings (in advance) are: - Michael S. Goodman, ‘Creating the Machinery for Joint Intelligence: The Formative Years of the Joint Intelligence Committee, 1936-1956’, International Journal of Intelligence and Counterintelligence, Vol.30, No.1 (November 2016), pp.66-84. - Lawrence J. Lamanna, ‘Documenting the Differences Between American and British Intelligence Reports’, International Journal of Intelligence and Counterintelligence, Vol.20, No.4 (August 2007), pp.602-628. - Jack Davis, ‘The Kent-Kendall debate of 1949’, National Archives Catalog (Summer 1991), https://catalog.archives.gov/id/7283329 - ‘A Strong Britain in an Age of Uncertainty: The National Security Strategy’, Gov.uk (October 2010), https://www.gov.uk/official-documents - Richard K. Betts, ‘Policy-makers and intelligence analysts: Love, hate or indifference?’, Intelligence and National Security, Vol. 3, No.1 (January 2008), pp.184-189. 3. Human Intelligence and Operational Tradecraft This lecture uses a Cold War case study to illuminate the potential and pitfalls of humans as intelligence agents. We will focus on intelligence collection, counter-intelligence and agent security – timeless tradecraft issues. Required readings (in advance) are: - Randy Burkett, ‘An alternative Framework for Agent Recruitment: From MICE to RASCLS’, Studies in Intelligence, Vol.57, No.1 (Extracts, March 2013), pp.7-17. 5 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
- Espionage and Other Compromises of National Security: Case Summaries from 1975- 2008, Defense Personnel Security Research Center (November 2009), http://www.dhra.mil/perserec - David V. Gioe, ‘The More Things Change’: HUMINT in the Cyber Age’, in R. Dover et al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London, 2017), pp.211-225. - John Sano, ‘Guide to the Study of Intelligence: The Changing Shape of HUMINT’, Association of Former Intelligence Officers Intelligencer Journal (November 2014). - Jason Matthews, ‘The Spy Who Turned Me’, The Wall Street Journal (May 31, 2013), https://www.wsj.com/articles/SB10001424127887324412604578513371283582676 - Kate Brannen, ‘To Catch a Spy’, Foreign Policy (April 6, 2015), https://foreignpolicy.com/2015/04/06/to-catch-a-spy-biometrics-cia-border- security/ 4. Surprise Attack and Warning Failures Here we will consider classic examples of surprise attack including the Soviet invasion of Czechoslovakia in 1968 and the Argentine invasion of the Falkland Islands in 1982 and will identify some of the general lessons that emerge from them. We will consider whether there are ways to remedy the failures apparently inherent in intelligence work. - James J. Wirtz, ‘Indications and Warning in an Age of Uncertainty’, International Journal of Intelligence and Counterintelligence, Vol.26, No.3 (May 20, 2013), pp.550-562. - Michael I. Handel, ‘Intelligence and the problem of strategic surprise’ Journal of Strategic Studies, No.7, Vol.3 (January 24, 2008), pp.229-281. - Mark A. Jensen, ‘Intelligence failures: What Are They Really and What Do We Do About Them?’, Intelligence and National Security, Vol.27, No.2 (April 27, 2012), pp.261-282. - Michael S. Goodman, ‘The Dog That Didn’t Bark: The Joint Intelligence Committee and Warning of Aggression’, Cold War History, Vol.7, No.4 (November 1, 2007), pp.529-551. - Richard K. Betts, ‘Analysis, War and Decision: Why Intelligence Failures Are inevitable’, World Politics, Vol.31, No.1 (October, 1978), pp.61-89. 5. Intelligence Liaison The focus here is on intelligence sharing, exploring the nature and importance of, and obstacles to, liaison between specific intelligence agencies and between international communities. - Michael S. Goodman, ‘The Foundations of Anglo-American Intelligence Sharing’, Studies in Intelligence, Vol.59, No.2 (June 2015), pp.1-12. 6 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
- Arthur S. Hulnick, ‘Intelligence cooperation in the post-cold war era: A new game plan?’, International Journal of Intelligence and Counterintelligence, Vol.5, No.4 (January 9, 2008), pp.455-465. - Patrick F. Walsh and Seumas Miller, ‘Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden’, Intelligence and National Security, Vol.31, No.3 (January 22, 2015), pp.345-368. - John Cary Sims, ‘THE BRUSA AGREEMENT OF MAY 17, 1943’, Cryptologia, Vol.21, No.1 (June 4, 2010), pp.30-38. 6. Intelligence, Ethics and Accountability This session will look at issues related to ethics and accountability and will consider how we might balance questions of morality and legality. It will also look at the evolution of various different national approaches to oversight and accountability - Michael M. Andregg and Peter Gill, ‘Comparing the Democratization of Intelligence’, Intelligence and National Security, Vol.29, No.4 (July 10, 2014), pp.487-497. - Jennifer Kibble, ‘Congressional Oversight of Intelligence: Is the Solution Part of the Problem?’, Intelligence and National Security, Vol.25, No.1, pp. 24-49. - Ian Leigh, ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11’, Intelligence and National Security, Vol.27, No.5, pp.722-738. - Claudia Hillerbrand, ‘The Role of New Media in Intelligence Oversight’, Intelligence and National Security, Vol.27, No.5 (October 5, 2012), pp.689-706. 7. Assassination, Covert Action and Political Theatre Is Assassination a form of covert action? A form of political theater? Who is the audience? Who is the messenger? Is it an oxymoron to have a deniable political assassination? - David V. Gioe, Michael S. Goodman & David S. Frey (2019) Unforgiven: "Russian intelligence vengeance as political theater and strategic messaging", Intelligence and National Security, 34:4, 561- 575. (See PDF provided) - Adrian Hanni and Miguel Grossman, "Death to traitors? The pursuit of intelligence defectors from the Soviet Union to the Putin era", Intelligence and National Security, VOL. 35, NO. 3, pp. 403–423. (see PDF provided) - Rory Cormac and Richard J. Aldrich, "Grey is the new black: Covert action and implausible deniability", International Affairs, 94: 3 (2018) 477–494. (See PDF provided). - David V. Gioe and Michael S. Goodman, ‘The Intelligence Costs of Underestimating Russia: A Warning from History’, War on the Rocks (March 31, 7 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
2017), https://warontherocks.com/2017/03/the-intelligence-costs-of-underestimating-russia- a- warning-from-history/ 8. HUMINT in the Digital Age The session will be on whether / how HUMINT can adapt (or be adapted) to the digital / cyber age, but the seminar will be a case study on 9/11 and intelligence failure through an exercise examining primary source documents. - Malcolm Gladwell, ‘Connecting the Dots’, The New Yorker (March 2, 2003), https://www.newyorker.com/magazine/2003/03/10/connecting-the-dots - David V. Gioe,‘ Cyber Operations and use fulfools: the approach of Russian hybrid intelligence’, Intelligence and National Security, Vol.33, No.7 (2018), pp.954-973. - David V. Gioe, ‘The More Things Change’: HUMINT in the Cyber Age’, in R. Dover et al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London, 2017), pp.211-225. (PDF provided in resources) - Stephen Marrin, ‘The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis’, Intelligence and National Security, Vol.26, No.2 (May 20, 2011), pp.182-202. 9. Treachery – a framework for the assessment of the damage wrought by betrayal. Cambridge University has produced its fair share of spies and traitors – not least the famous Cold War Five. Were any of these more outstandingly treacherous than Edward Snowden? We will look at the claims of these and others to the title of ‘the greatest traitor ever’. - Andrew Higgins, ‘Even in Death, the Spy Kim Philby Serves the Kremlin’s Purposes’, The New York Times (October 1, 2017), https://www.nytimes.com/2017/10/01/world/europe/russia-kim-philby-spy- defector.html - Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden, U.S. House of Representatives, Permanent Select Committee on Intelligence (September 15, 2016), https://www.hsdl.org/?abstract&did=797546 - Malcolm Gladwell, ‘Trust No One: Kim Philby and the hazards of mistrust’, New Yorker (July 28, 2014), https://www.newyorker.com/magazine/2014/07/28/philby - Eric A. Posner, ‘Before you Reboot the NSA, Think About This: The Paradox of 8 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
reforming the security-industrial complex’, New Republic (November 6, 2013), https://newrepublic.com/article/115291/rahul-sagars-secret-leaks-reviewed-eric-posner - David V. Gioe, ‘Tinker, Tailor, Leaker, Spy: The Future Costs of Mass Leaks’, The National Interest (January 7, 2014), https://nationalinterest.org/article/tinker-tailor-leaker- spy-the-future-costs-mass-leaks-9644 METHODS LECTURES Each of the supervisors delivers a ‘methods lecture’, designed to focus on their current research area of expertise, focusing on the findings but also paying close attention to the nature of research and associated methodological concerns. Recent methods lectures have included the following titles: - Intelligence Cooperation and Security Assistance in the Global South - The Future of the State in the Middle East - Intelligence History: from Spies to Said - Legal and Ethical Dilemmas of Targeted Killing ISI offers an integrated programme of lectures, seminars, supervisions and Conference which all participants will be expected to attend. The Programme has two tracks which, again, all participants take: Track 1: INDEPENDENT SUPERVISED RESEARCH Before starting the Programme students will submit a Supervision Track Interest Form. On the form prospective participants must indicate their top three track choices from the following list: - Science and Security / Pandemics and Proliferation - Human Intelligence / the US intelligence community - Cyber and information operations - Security and Stability in the modern Middle East - Islamist terrorism and violent non-state actors (ME and Africa focused) - Intelligence analysis, oversight, policymaking, and accountability - Russian and European Intelligence issues - Terrorism and Counterterrorism in the Transatlantic Space 9 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
- Intelligence liaison and security cooperation (especially in the Global South) - East Asian and African security issues Once participant fees have been paid and your place on ISI 2023 has been confirmed, you will complete an Independent Supervised Research Proposal Form that will ask you to refine your research question and show some preliminary work in the area of the research track to which you have been allocated. You will then be paired with a CSi expert to undertake a tailored, in-depth study of the chosen security or intelligence theme through five x 1.25hrs taught ‘supervisions’, a method at the heart of Cambridge teaching. Supervision groups have up to six students and are designed to foster independent learning, writing and presentation skills. Students are required to take ownership of their own research with guidance from their supervisor. To this end supervisors also offer office hours. Example essay titles include: - Dangerous, Fanatical, Fantasists: Conspiracy and Government in the Assassination of John F. Kennedy - How Should the UK Deal With Captured British Islamic State Foreign Terrorist Fighters? - Is clandestine diplomacy compatible with liberal democratic values of transparency and accountability? - Understanding the drought-conflict nexus in Africa: A case study from northeastern Tanzania - Is NATO’s eFP a successful countermeasure to Russian Hybrid Warfare? Track 2: Topics in International Security and Intelligence Through lectures and seminars given by ISI Faculty, the central themes of the Programme are analysed and discussed. Key themes include: • The role of intelligence and security agencies, • The 21st century threat landscape in an historical perspective, • The intelligence cycle, • Competing claims of state secrecy, • Information operations, • Terrorism, • Topics in regional security, • The security implications of digital revolutions. 10 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
Intelligence collection, analysis and dissemination remain at the core of the intelligence cycle while counter-intelligence and covert action play more opaque but still vital roles at the heart of the nation state and international alliances. Understanding what intelligence can achieve – and its limitations – will be major themes for analysis and discussion. Many of these will be further explored in panels and lectures at the CSi Conference. The Programme also hosts a series of outstanding Special Subject Lectures covering a broad range of contemporary intelligence and security issues. These have been given, in recent years, by former Heads of MI5, MI6, GCHQ and the French Security Services; the Chief Judge to the Appeals Court of the United States Armed Forces, and the CIA Deputy Director for Operations as well as by leading academics working in the field of Intelligence and Security studies. The total contact time for this track is a minimum of 40 hours. Please note that ISI uses Moodle, an Online Learning Platform, where the Independent Research Project is uploaded, the timetable can be accessed and resources can be downloaded. THE CSI CONFERENCE Entitled Intelligence and Security in the Changing World, the Conference programme is built around a series of lectures and panel discussions. The range of topics and quality of speakers makes this a unique opportunity for ISI students to hear, question and interact with those who have worked at the highest levels in the fields of Intelligence and Security. Additional information, including past conference brochures, can be found here: https://thecsi.org.uk/conference/ ASSESSMENT AND CREDIT TRACK 1 All participants submit a 3,500 essay having completed Independent Supervised Research. This essay will be assessed and graded and the grade will appear on the transcript. TRACK 2 Participants are not routinely assessed on their performance in Track 2. However, students who are in full-time education can apply to be formally assessed. Assessment will take the form of a written report on the 2023 Conference and an exam taken towards the end of the fourth week of the 11 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
Programme. Students opting for such assessment must follow any application process required by their University and ensure that they discuss transferring credit with their academic advisors before the start of ISI. ISI will provide a transcript and syllabus to help students applying to receive credit, and can be contacted by your Registrar via email (isi@thecsi.org.uk) if further information is required. All applications for assessment in Track 2 must be made by 23rd June 2023. CREDIT Participants successfully completing ISI will receive a transcript showing a grade or grades, expressed as a % and a letter (A – E) together with guidance on how grades are awarded and compare. While it is of course ultimately for participants’ home institutions to determine the amount of academic credit to be awarded, as a guide each track is usually accorded 3-4 US credits or 7.5 European Credit Transfer and Accumulation System (ECTS) credits. All participants successfully completing ISI will receive a transcript showing their grade expressed as a % and a letter. Students will also receive grading guidance notes in early September after external validation has been completed. All work is moderated to ensure consistency and is assessed in relation to the mark schemes produced by the Department of War Studies at King’s College London. Students will be assessed in relation to their highest academic qualification. For example, if students are currently enrolled in a BA degree the essay will be marked using the BA standard marking criteria. An MA student will be subjected to the MA grading criteria. GRADING As a guide it can be noted that for completion of each of the two tracks a student usually receives 3-4 US credits or 7.5 European Credit Transfer and Accumulation System (ECTS) credits. All credit transfers are solely at the discretion of the Student’s Home University registrar- who will make their own determination about what credit, if any, the ISI Programme might be worth. Students are encouraged to have this discussion with their Home University registrar to avoid disappointment. 12 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
Grade conversion guide: CAMBRIDGE % U.S. EQUIVALENT First 80-85 A* 70-79 A Upper Second 65-69 A- 60-64 B+ Lower Second 55-59 B 50-54 B- Pass 45-49 C+ 40-44 C ISI 2022 Grades will be issued on Friday 8th September 2023. Transcripts will be issued on Friday 22nd September 2023. DIVERSITY ISI attracts a diverse range of participants, from working professionals in the field of security and intelligence to students preparing for undergraduate and postgraduate courses. In 2022 there were fourteen different nationalities represented across 52 students. The range of academic interests and experiences creates a unique learning environment, supported by the Cambridge model of lectures, methods lectures, seminars and supervisions. All students are expected to do the required readings, preparations for supervisions and contribute to seminar discussions. GENERAL READING: Any of the following volumes are all good introductions to the field of Intelligence Studies and students may wish to bolster their knowledge and understanding of intelligence terms and topics before the beginning of the programme: - Rob Dover, Michael S Goodman and Claudia Hillebrand (eds), The Routledge Companion to Intelligence Studies (Routledge 2013) - Rob Dover, Huw Dylan, Michael S Goodman (eds), The Palgrave Handbook of Security, Risk and Intelligence (Palgrave, 2017) 13 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
- Christopher Andrew, Richard J. Aldrich and Wesley K. Wark (eds.), Secret Intelligence: A Reader (2009) - David Omand, Securing the State (2012) - Peter Gill & Mark Pythian, Intelligence in an Insecure World: Surveillance, Spies and Snouts (2006) - Loch K. Johnson, Handbook of Intelligence Studies (2009) - Loch K. Johnson (ed.), The Oxford Handbook of National Security Intelligence (2010) - exceedingly good resource available in ample hardcopy and as an ebook from the library. - Mark M. Lowenthal, Intelligence from Secrets to Policy (2016– various older editions are available and fine to use) - Richard K. Betts, Enemies of Intelligence: Knowledge and Power in American National Security (2007) - Abram Shulsky & Gary J. Schmitt, Silent Warfare (2002 – various older editions available) In addition, students might find it helpful and interesting to regularly read the following Blogs as they deal with aspects of intelligence and national security: - UNREDACTED: the national security archive, unedited and uncensored - http://nsarchive.wordpress.com - Intelnews.org: Expert News and commentary on intelligence, espionage, spies and spying http://intelnews.org - International Spy Museum’s Spycasts – http://www.spymuseum.org/multimedia/ - Sources and methods - http://sourcesandmethods.blogspot.co.uk 14 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
APPENDIX A: KCL- Undergraduate Generic Marking Criteria Faculty of Arts & Humanities 15 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
16 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
17 https://thecsi.org.uk/international-security-and-intelligence-isi-programme/ © The Cambridge Security Initiative
You can also read