SYLLABUS International Security and Intelligence Programme: The Cambridge Security Initiative

Page created by Miguel Luna
 
CONTINUE READING
The Cambridge Security Initiative &

                         The Department of War Studies, King’s College London

     International Security and Intelligence Programme:

     Twenty-First Century Perspectives on Intelligence and Contemporary Threats

                                            SYLLABUS
                                                    2023

                                                                                  1
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
COURSE DIRECTORS:
     Professor David Gioe is a British Academy Global Professor and Visiting Professor of
     Intelligence and International Security in the Department of War Studies, King’s College
     London. He is History Fellow for the Army Cyber Institute at the US Military Academy at West
     Point and Associate Professor of History. David has been a national security practitioner for 20
     years. He is a former Central Intelligence Agency operations officer and remains a senior officer
     in the US Navy Reserve.

     Professor Michael S. Goodman is Professor of Intelligence and International Affairs and Head of
     the Department of War Studies, King’s College London. He is official historian of the British Joint
     Intelligence Committee and also a Visiting Professor at the Norwegian Defence Intelligence
     School. He is a British army reservist and has spent many years seconded to the Cabinet Office
     and Ministry of Defence.

     SYNOPSIS:
     The International Security and Intelligence (ISI) programme offers a unique opportunity to study
     with leading academics and practitioners. With a special emphasis on human intelligence, students
     will explore the role of the intelligence and security agencies, applying their enduring principles to
     cutting-edge problems. Participants will consider the 21st Century threat landscape from an historical
     perspective. We will explore, through a wide panoply of optics, the intelligence cycle, the competing
     claims of state secrecy, information operations, terrorism, the problems generated by the demand for
     regional security and the security aspects of digital revolutions. Intelligence collection, analysis of
     the product, and its dissemination to customers remain at the core of the intelligence cycle.
     Counterintelligence and covert action play more opaque but still vital roles at the heart of the nation
     state and international alliances. Understanding these perspectives, what intelligence can achieve,
     but also its limitations, are major course themes.

     Setting the tone and direction of the programme will be a series of outstanding guest lectures
     covering a broad spectrum of contemporary intelligence and security challenges. Speakers in recent
     years have included practitioners - the Heads of MI5, MI6 and GCHQ; the Chief Judge to the
     Appeals Court of the United States Armed Forces, and the CIA Deputy Director for Operations
     – and leading academics working in the field of Intelligence and Security studies.

     The multitude of threats facing Western democracies is diverse and the issues which preoccupy the

                                                                                                           2
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
highest levels of government will be discussed and analysed. With its emphasis on contemporary
     and future challenges and practice, this is a Programme which will appeal to those with an academic
     or professional interest in intelligence and contemporary threats.

     This Syllabus describes the:
             -   Aims of the programme
             -   Learning outcomes
             -   Teaching methods
             -   Assessment methods
             -   Class details and reading

     THE AIMS OF THE PROGRAMME ARE:
         -   To promote multidisciplinary understanding of concepts, issues and debates regarding
             intelligence and national security issues more broadly.
         -   To encourage reflection on the meaning, value and nature of intelligence and of types of
             intelligence as evidence and bases for action.
         -   To encourage an understanding of the interactive processes of assessment and analysis.
         -   To foster conscious critical reading and discussion of issues concerning information,
             intelligence, policy and action.
         -   To promote an understanding of scholarly activity in relation to intelligence.
         -   To foster appreciation of intelligence skills and tools for understanding future
             developments.
         -   To foster understanding and application of a range of transferable intellectual and study
             skills.
         -   To foster understanding and application of a range of transferable key skills –
             communication, listening, and teamwork.

     THE PROGRAMME WILL PARTICULARLY APPEAL TO:
     Students and practitioners with an intellectual or professional interest in statecraft and
     the interlocking themes of intelligence, security, defence and foreign policy.

     LEARNING OUTCOMES:
         -   Familiarity with key concepts in intelligence.
         -   Understanding of the variety of factors affecting the collection, processing
                                                                                                           3
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
and use of information.
         -   Command of key concepts such as human intelligence, counterintelligence,
             signals intelligence, assessment and analysis, and information operations.
         -   Understanding of intelligence as both a challenge to and a support of
             international order.
         -   An understanding of different approaches to intelligence in history and other
             forms of social science.
         -   Knowledge and understanding of intelligence and security in relation to
             specific empirical cases.
         -   The problems and possible practical solutions to issues of intelligence, war
             and security.
         -   To have contributed to and participated in the formation of co-learning,
             investigating and assessing the relevance and relationship of intelligence to
             future developments in policy and practice.
         -   Development of career and employability skills.

     TEACHING METHODS:
     At the core of the programme are a series of Key Theme Lectures covering a broad spectrum of
     contemporary intelligence and security challenges. Each lecture has a number of corresponding
     small-group seminars led by the lecturer where these key themes are debated and discussed. All
     teaching is conducted with strict adherence to the ‘Chatham House Rules’ which all students must
     respect (when a meeting is held under the Chatham House Rules, participants are free to use the
     information received, but neither the identity nor the affiliation of the speaker(s), nor that of any
     other participant, may be revealed).

     KEY THEME LECTURES AND SEMINARS
     *Please note the Lecture titles and order may be subject to change. These will be reflected on
     Moodle and in the Timetable.

 1. The ISI introduction to Intelligence Studies
     This, the first lecture, considers the historiography of intelligence and the development of
     intelligence studies as a distinct field of academic inquiry. Guidance will be given on research
     methods, interpretative approaches and analytical writing when exploring this exciting but
     challenging field. Required readings (in advance) are:

                                                                                                         4
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
-   Tony Paterson, ‘Germany to spy on US for first time since 1945 after ‘double agent’
             scandal’, The Independent (July 7, 2014),
             https://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-
             first- time-since-1945-after-double-agent-scandal-9590645.html
         -   Michael Warner, ‘Sources and methods for the study of intelligence’ in Loch K. Johnson
             (eds.), Handbook of Intelligence Studies (London, 2007), pp.17-27.
         -   David V. Gioe, ‘The History of Fake News’, The National Interest (July 1, 2017),
             https://nationalinterest.org/feature/the-history-fake-news-21386
         -   Widget Finn, ‘Why intelligence studies are a smart career move’, inews.co.uk (February 19,
             2014).

 2. The British Approach to Intelligence
     Here we will examine the ways in which the British intelligence community has developed what can
     be seen as a specific, characteristic approach towards its work over time and in response to the
     changing nature of the threats it has encountered. Required readings (in advance) are:
         -   Michael S. Goodman, ‘Creating the Machinery for Joint Intelligence: The Formative
             Years of the Joint Intelligence Committee, 1936-1956’, International Journal of Intelligence and
             Counterintelligence, Vol.30, No.1 (November 2016), pp.66-84.
         -   Lawrence J. Lamanna, ‘Documenting the Differences Between American and British
             Intelligence Reports’, International Journal of Intelligence and Counterintelligence, Vol.20, No.4 (August
             2007), pp.602-628.
         -   Jack Davis, ‘The Kent-Kendall debate of 1949’, National Archives Catalog (Summer 1991),
             https://catalog.archives.gov/id/7283329
         -   ‘A Strong Britain in an Age of Uncertainty: The National Security Strategy’, Gov.uk
             (October 2010), https://www.gov.uk/official-documents
         -   Richard K. Betts, ‘Policy-makers and intelligence analysts: Love, hate or indifference?’,
             Intelligence and National Security, Vol. 3, No.1 (January 2008), pp.184-189.

 3. Human Intelligence and Operational Tradecraft
     This lecture uses a Cold War case study to illuminate the potential and pitfalls of humans as
     intelligence agents. We will focus on intelligence collection, counter-intelligence and agent security
     – timeless tradecraft issues. Required readings (in advance) are:
         -   Randy Burkett, ‘An alternative Framework for Agent Recruitment: From MICE to
             RASCLS’, Studies in Intelligence, Vol.57, No.1 (Extracts, March 2013), pp.7-17.

                                                                                                                          5
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
-   Espionage and Other Compromises of National Security: Case Summaries from 1975-
             2008, Defense Personnel Security Research Center (November 2009),
             http://www.dhra.mil/perserec
         -   David V. Gioe, ‘The More Things Change’: HUMINT in the Cyber Age’, in R. Dover et
             al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London, 2017), pp.211-225.
         -   John Sano, ‘Guide to the Study of Intelligence: The Changing Shape of HUMINT’,
             Association of Former Intelligence Officers Intelligencer Journal (November 2014).
         -   Jason Matthews, ‘The Spy Who Turned Me’, The Wall Street Journal (May 31, 2013),
             https://www.wsj.com/articles/SB10001424127887324412604578513371283582676
         -   Kate Brannen, ‘To Catch a Spy’, Foreign Policy (April 6, 2015),
             https://foreignpolicy.com/2015/04/06/to-catch-a-spy-biometrics-cia-border-
             security/

 4. Surprise Attack and Warning Failures
     Here we will consider classic examples of surprise attack including the Soviet invasion of
     Czechoslovakia in 1968 and the Argentine invasion of the Falkland Islands in 1982 and will identify
     some of the general lessons that emerge from them. We will consider whether there are ways to
     remedy the failures apparently inherent in intelligence work.
         -   James J. Wirtz, ‘Indications and Warning in an Age of Uncertainty’, International Journal of
             Intelligence and Counterintelligence, Vol.26, No.3 (May 20, 2013), pp.550-562.
         -   Michael I. Handel, ‘Intelligence and the problem of strategic surprise’ Journal of Strategic
             Studies, No.7, Vol.3 (January 24, 2008), pp.229-281.
         -   Mark A. Jensen, ‘Intelligence failures: What Are They Really and What Do We Do About
             Them?’, Intelligence and National Security, Vol.27, No.2 (April 27, 2012), pp.261-282.
         -   Michael S. Goodman, ‘The Dog That Didn’t Bark: The Joint Intelligence Committee and
             Warning of Aggression’, Cold War History, Vol.7, No.4 (November 1, 2007), pp.529-551.
         -   Richard K. Betts, ‘Analysis, War and Decision: Why Intelligence Failures Are inevitable’,
             World Politics, Vol.31, No.1 (October, 1978), pp.61-89.

 5. Intelligence Liaison
     The focus here is on intelligence sharing, exploring the nature and importance of, and obstacles to,
     liaison between specific intelligence agencies and between international communities.
         -   Michael S. Goodman, ‘The Foundations of Anglo-American Intelligence Sharing’, Studies in
             Intelligence, Vol.59, No.2 (June 2015), pp.1-12.

                                                                                                                6
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
-   Arthur S. Hulnick, ‘Intelligence cooperation in the post-cold war era: A new game plan?’,
               International Journal of Intelligence and Counterintelligence, Vol.5, No.4 (January 9, 2008), pp.455-465.
           -   Patrick F. Walsh and Seumas Miller, ‘Rethinking ‘Five Eyes’ Security Intelligence
               Collection Policies and Practice Post Snowden’, Intelligence and National Security, Vol.31, No.3
               (January 22, 2015), pp.345-368.
           -   John Cary Sims, ‘THE BRUSA AGREEMENT OF MAY 17, 1943’, Cryptologia, Vol.21, No.1
               (June 4, 2010), pp.30-38.

 6. Intelligence, Ethics and Accountability
        This session will look at issues related to ethics and accountability and will consider how we might
        balance questions of morality and legality. It will also look at the evolution of various different
        national approaches to oversight and accountability
           -   Michael M. Andregg and Peter Gill, ‘Comparing the Democratization of Intelligence’,
               Intelligence and National Security, Vol.29, No.4 (July 10, 2014), pp.487-497.
           -   Jennifer Kibble, ‘Congressional Oversight of Intelligence: Is the Solution Part of the
               Problem?’, Intelligence and National Security, Vol.25, No.1, pp. 24-49.
           -   Ian Leigh, ‘Rebalancing Rights and National Security: Reforming UK Intelligence
               Oversight a Decade after 9/11’, Intelligence and National Security, Vol.27, No.5, pp.722-738.
           -   Claudia Hillerbrand, ‘The Role of New Media in Intelligence Oversight’, Intelligence and
               National Security, Vol.27, No.5 (October 5, 2012), pp.689-706.

 7. Assassination, Covert Action and Political Theatre
        Is Assassination a form of covert action? A form of political theater? Who is the audience? Who
        is the messenger? Is it an oxymoron to have a deniable political assassination?
    -     David V. Gioe, Michael S. Goodman & David S. Frey (2019) Unforgiven: "Russian intelligence
          vengeance as political theater and strategic messaging", Intelligence and National Security, 34:4, 561-
          575. (See PDF provided)
    -     Adrian Hanni and Miguel Grossman, "Death to traitors? The pursuit of intelligence defectors
          from the Soviet Union to the Putin era", Intelligence and National Security, VOL. 35, NO. 3, pp.
          403–423. (see PDF provided)
    -     Rory Cormac and Richard J. Aldrich, "Grey is the new black: Covert action and implausible
          deniability", International Affairs, 94: 3 (2018) 477–494. (See PDF provided).
    -     David V. Gioe and Michael S. Goodman, ‘The Intelligence Costs of Underestimating Russia: A
          Warning from History’, War on the Rocks (March 31,

                                                                                                                           7
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
2017), https://warontherocks.com/2017/03/the-intelligence-costs-of-underestimating-russia-
        a- warning-from-history/

 8. HUMINT in the Digital Age
     The session will be on whether / how HUMINT can adapt (or be adapted) to the digital / cyber
     age, but the seminar will be a case study on 9/11 and intelligence failure through an exercise
     examining primary source documents.
         -   Malcolm Gladwell, ‘Connecting the Dots’, The New Yorker (March 2,
             2003), https://www.newyorker.com/magazine/2003/03/10/connecting-the-dots
         -   David V. Gioe,‘ Cyber Operations and use fulfools: the approach of Russian
             hybrid intelligence’, Intelligence and National Security, Vol.33, No.7 (2018), pp.954-973.
         -   David V. Gioe, ‘The More Things Change’: HUMINT in the Cyber Age’, in R. Dover
             et al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London, 2017),
             pp.211-225. (PDF provided in resources)
         -   Stephen Marrin, ‘The 9/11 Terrorist Attacks: A Failure of Policy Not
             Strategic Intelligence Analysis’, Intelligence and National Security, Vol.26, No.2 (May 20,
             2011), pp.182-202.

 9. Treachery – a framework for the assessment of the damage wrought by betrayal.
     Cambridge University has produced its fair share of spies and traitors – not least the famous
     Cold War Five. Were any of these more outstandingly treacherous than Edward Snowden? We
     will look at the claims of these and others to the title of ‘the greatest traitor ever’.
         -   Andrew Higgins, ‘Even in Death, the Spy Kim Philby Serves the Kremlin’s Purposes’, The
             New York Times (October 1, 2017),
             https://www.nytimes.com/2017/10/01/world/europe/russia-kim-philby-spy-
             defector.html
         -   Review of the Unauthorized Disclosures of Former National Security Agency Contractor
             Edward Snowden, U.S. House of Representatives, Permanent Select Committee on Intelligence (September
             15, 2016), https://www.hsdl.org/?abstract&did=797546
         -   Malcolm Gladwell, ‘Trust No One: Kim Philby and the hazards of mistrust’, New Yorker
             (July 28, 2014), https://www.newyorker.com/magazine/2014/07/28/philby
         -   Eric A. Posner, ‘Before you Reboot the NSA, Think About This: The Paradox of
                                                                                                                    8
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
reforming the security-industrial complex’, New Republic (November 6, 2013),
             https://newrepublic.com/article/115291/rahul-sagars-secret-leaks-reviewed-eric-posner
         -   David V. Gioe, ‘Tinker, Tailor, Leaker, Spy: The Future Costs of Mass Leaks’, The
             National Interest (January 7, 2014), https://nationalinterest.org/article/tinker-tailor-leaker-
             spy-the-future-costs-mass-leaks-9644

METHODS LECTURES
Each of the supervisors delivers a ‘methods lecture’, designed to focus on their current research area of
expertise, focusing on the findings but also paying close attention to the nature of research and associated
methodological concerns.
Recent methods lectures have included the following titles:
         -   Intelligence Cooperation and Security Assistance in the Global South
         -   The Future of the State in the Middle East
         -   Intelligence History: from Spies to Said
         -   Legal and Ethical Dilemmas of Targeted Killing

ISI offers an integrated programme of lectures, seminars, supervisions and Conference which all
participants will be expected to attend. The Programme has two tracks which, again, all participants
take:

Track 1: INDEPENDENT SUPERVISED RESEARCH
Before starting the Programme students will submit a Supervision Track Interest Form. On the form
prospective participants must indicate their top three track choices from the following list:

         -    Science and Security / Pandemics and Proliferation
         -   Human Intelligence / the US intelligence community
         -   Cyber and information operations
         -   Security and Stability in the modern Middle East
         -   Islamist terrorism and violent non-state actors (ME and Africa focused)
         -   Intelligence analysis, oversight, policymaking, and accountability
         -   Russian and European Intelligence issues
         -   Terrorism and Counterterrorism in the Transatlantic Space

                                                                                                               9
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
-   Intelligence liaison and security cooperation (especially in the Global South)
         -   East Asian and African security issues

Once participant fees have been paid and your place on ISI 2023 has been confirmed, you will
complete an Independent Supervised Research Proposal Form that will ask you to refine your
research question and show some preliminary work in the area of the research track to which you have
been allocated.

You will then be paired with a CSi expert to undertake a tailored, in-depth study of the chosen security
or intelligence theme through five x 1.25hrs taught ‘supervisions’, a method at the heart of Cambridge
teaching. Supervision groups have up to six students and are designed to foster independent learning,
writing and presentation skills. Students are required to take ownership of their own research with
guidance from their supervisor. To this end supervisors also offer office hours.

Example essay titles include:
         -   Dangerous, Fanatical, Fantasists: Conspiracy and Government in the Assassination of John F.
             Kennedy
         -   How Should the UK Deal With Captured British Islamic State Foreign Terrorist Fighters?
         -   Is clandestine diplomacy compatible with liberal democratic values of transparency and accountability?
         -   Understanding the drought-conflict nexus in Africa: A case study from northeastern Tanzania
         -   Is NATO’s eFP a successful countermeasure to Russian Hybrid Warfare?

Track 2: Topics in International Security and Intelligence
Through lectures and seminars given by ISI Faculty, the central themes of the Programme are analysed
and discussed.
Key themes include:
    •   The role of intelligence and security agencies,
    •   The 21st century threat landscape in an historical perspective,
    •   The intelligence cycle,
    •   Competing claims of state secrecy,
    •   Information operations,
    •   Terrorism,
    •   Topics in regional security,
    •   The security implications of digital revolutions.

                                                                                                                      10
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
Intelligence collection, analysis and dissemination remain at the core of the intelligence cycle while
counter-intelligence and covert action play more opaque but still vital roles at the heart of the nation
state and international alliances. Understanding what intelligence can achieve – and its limitations – will
be major themes for analysis and discussion. Many of these will be further explored in panels and lectures
at the CSi Conference.

The Programme also hosts a series of outstanding Special Subject Lectures covering a broad range of
contemporary intelligence and security issues. These have been given, in recent years, by former Heads
of MI5, MI6, GCHQ and the French Security Services; the Chief Judge to the Appeals Court of the
United States Armed Forces, and the CIA Deputy Director for Operations as well as by leading
academics working in the field of Intelligence and Security studies.
The total contact time for this track is a minimum of 40 hours.

Please note that ISI uses Moodle, an Online Learning Platform, where the Independent Research Project
is uploaded, the timetable can be accessed and resources can be downloaded.

THE CSI CONFERENCE
Entitled Intelligence and Security in the Changing World, the Conference programme is built around a series
of lectures and panel discussions. The range of topics and quality of speakers makes this a unique
opportunity for ISI students to hear, question and interact with those who have worked at the highest
levels in the fields of Intelligence and Security.

Additional information, including past conference brochures, can be found here:
https://thecsi.org.uk/conference/

ASSESSMENT AND CREDIT
TRACK 1
All participants submit a 3,500 essay having completed Independent Supervised Research. This essay will be
assessed and graded and the grade will appear on the transcript.
TRACK 2
Participants are not routinely assessed on their performance in Track 2. However, students who are in
full-time education can apply to be formally assessed. Assessment will take the form of a written report
on the 2023 Conference and an exam taken towards the end of the fourth week of the

                                                                                                          11
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
Programme. Students opting for such assessment must follow any application process required by their
University and ensure that they discuss transferring credit with their academic advisors before the start
of ISI.

ISI will provide a transcript and syllabus to help students applying to receive credit, and can be contacted
by your Registrar via email (isi@thecsi.org.uk) if further information is required.
All applications for assessment in Track 2 must be made by 23rd June 2023.

CREDIT
Participants successfully completing ISI will receive a transcript showing a grade or grades, expressed as
a % and a letter (A – E) together with guidance on how grades are awarded and compare.
While it is of course ultimately for participants’ home institutions to determine the amount of academic
credit to be awarded, as a guide each track is usually accorded 3-4 US credits or 7.5 European Credit
Transfer and Accumulation System (ECTS) credits.

All participants successfully completing ISI will receive a transcript showing their grade expressed as a
% and a letter. Students will also receive grading guidance notes in early September after external
validation has been completed. All work is moderated to ensure consistency and is assessed in relation
to the mark schemes produced by the Department of War Studies at King’s College London.

Students will be assessed in relation to their highest academic qualification. For example, if students are
currently enrolled in a BA degree the essay will be marked using the BA standard marking criteria. An
MA student will be subjected to the MA grading criteria.

GRADING
As a guide it can be noted that for completion of each of the two tracks a student usually receives 3-4
US credits or 7.5 European Credit Transfer and Accumulation System (ECTS) credits. All credit
transfers are solely at the discretion of the Student’s Home University registrar- who will make their
own determination about what credit, if any, the ISI Programme might be worth. Students are
encouraged to have this discussion with their Home University registrar to avoid disappointment.

                                                                                                         12
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
Grade conversion guide:
             CAMBRIDGE                                %                        U.S. EQUIVALENT

                  First                              80-85                             A*

                                                     70-79                              A

             Upper Second                            65-69                             A-

                                                     60-64                             B+

             Lower Second                            55-59                              B

                                                     50-54                             B-

                   Pass                              45-49                             C+

                                                     40-44                              C

ISI 2022 Grades will be issued on Friday 8th September 2023.
Transcripts will be issued on Friday 22nd September 2023.

DIVERSITY
ISI attracts a diverse range of participants, from working professionals in the field of security and
intelligence to students preparing for undergraduate and postgraduate courses. In 2022 there were
fourteen different nationalities represented across 52 students. The range of academic interests and
experiences creates a unique learning environment, supported by the Cambridge model of lectures,
methods lectures, seminars and supervisions. All students are expected to do the required readings,
preparations for supervisions and contribute to seminar discussions.

GENERAL READING:
Any of the following volumes are all good introductions to the field of Intelligence Studies and students
may wish to bolster their knowledge and understanding of intelligence terms and topics before the
beginning of the programme:
         -   Rob Dover, Michael S Goodman and Claudia Hillebrand (eds), The Routledge Companion to
             Intelligence Studies (Routledge 2013)
         -   Rob Dover, Huw Dylan, Michael S Goodman (eds), The Palgrave Handbook of Security, Risk and
             Intelligence (Palgrave, 2017)
                                                                                                          13
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
-   Christopher Andrew, Richard J. Aldrich and Wesley K. Wark (eds.), Secret Intelligence: A Reader
             (2009)
         -   David Omand, Securing the State (2012)
         -   Peter Gill & Mark Pythian, Intelligence in an Insecure World: Surveillance, Spies and Snouts (2006)
         -   Loch K. Johnson, Handbook of Intelligence Studies (2009)
         -   Loch K. Johnson (ed.), The Oxford Handbook of National Security Intelligence (2010) -
             exceedingly good resource available in ample hardcopy and as an ebook from the library.
         -   Mark M. Lowenthal, Intelligence from Secrets to Policy (2016– various older editions are available
             and fine to use)
         -   Richard K. Betts, Enemies of Intelligence: Knowledge and Power in American National Security (2007)
         -   Abram Shulsky & Gary J. Schmitt, Silent Warfare (2002 – various older editions available)

     In addition, students might find it helpful and interesting to regularly read the following Blogs as
     they deal with aspects of intelligence and national security:
         -   UNREDACTED: the national security archive, unedited and uncensored -
             http://nsarchive.wordpress.com
         -   Intelnews.org: Expert News and commentary on intelligence, espionage, spies and spying
             http://intelnews.org
         -   International Spy Museum’s Spycasts – http://www.spymuseum.org/multimedia/
         -   Sources and methods - http://sourcesandmethods.blogspot.co.uk

                                                                                                                   14
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
APPENDIX A:
               KCL- Undergraduate Generic Marking Criteria Faculty of Arts & Humanities

                                                                                          15
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
16
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
17
https://thecsi.org.uk/international-security-and-intelligence-isi-programme/
© The Cambridge Security Initiative
You can also read