SYLLABUS FOR HMSY 1340 Homeland Security Intelligence Semester Hours Credit: 3 Lecture Hours: 48 Location: Rhine Ordnance Barracks (ROB) Bldg 285 Course Dates/Days/Times: 23 Mar-13 May/M,W/1800-2100 Instructor: Mr. Lerin Hester Office Hours: M-F after 1700 or by appointment Instructor Email: [email protected] Phone: 01716888102 INSTRUCTOR BIOGRAPHY With 16 years of military service, I have constantly trained and performed intelligence operations in regards to security. Additionallly, since I possess a classifed clearance within the Department of Defense, I have been involved and privileged to information not accessable to others within the military and intelligence communities. Unfortunately, I can not share classified informaton. But, I can share my knowledge in the field of intelligence to others. I look forward to working with each and everyone of you during this class to make the learning environment a great experience. I. II. INTRODUCTION A. This course will study the intelligence community, including the role and relationship of intelligence and law enforcement. Topics include the intelligence community structure, intelligence collection methods, cycle, intelligence operations, classification, production and analysis, assessment of targets, and criminal intelligence and crime analysis. Understanding barriers to analysis and common errors of intelligence professionals will also be discussed. B. This course is a required course for the Homeland Security – Emergency Management Associate in Applied Science degree. C. This course is occupationally related and serves as preparation for careers in Criminal Justice, Law Enforcement, and Corrections. D. Prerequisite(s): None. LEARNING OUTCOMES Upon successful completion of this course, Homeland Security Intelligence HMSY 1340 Page 1 of 11 Operations, the student will: III. A. Describe and explain the different types of intelligence information and missions. B. Identify intelligence information and evaluate raw data. C. Analyze an intelligence related situation or event. D. Demonstrate competency in presenting the results of an intelligence assessment. INSTRUCTIONAL MATERIALS A. The instructional materials identified for this course are viewable through http://www.ctcd.edu/im/im_main.asp Required Student Textbook: Jenson, C. (2012). Introduction to Intelligence Studies. (1st ed.) New York City: CRC Press. ISBN: 9781466500037 IV. COURSE REQUIREMENTS: A. Your first responsibility is scholarship. The grade you receive for this course will not be the grade of the instructor, but rather the grade you and you alone make. B. You should attend class regularly and be prepared to participate in classroom discussions and to take unannounced quizzes relating to text assignments and lecture material presented from the beginning of the course. Please refer to ‘Class Attendance and Course Progress’ under the Academic Policies section in our current Central Texas College (CTC) Course Catalog. C. You are encouraged to give your best effort throughout the course. From the beginning, you should plan for a steady, organized, and continuous effort, which in the long run will prove more effective for your final grade than a last minute crash-cram policy. Your course grade is not determined solely by exam grade. Such factors as class participation, initiative, attendance, and individual research papers or projects will be considered in grade computation. D. From time to time, special library and/or outside assignments will be made to members of the class individually and/or in groups. You are expected to read all assignments and fulfill your responsibilities to any group assignment. HMSY 1340 Page 2 of 11 E. You are expected to read all assigned material and bring your textbook/reading materials to class. Keep informed on all assignments, especially after an absence. F. Good class notes are indispensable for earning a good grade, since both the material assigned and that discussed in class will be the basis for examination material. G. Scholastic Honesty: All students are required and expected to maintain the highest standards of scholastic honesty in the preparation of all coursework and during examinations. The following are considered examples of scholastic dishonesty: Plagiarism: The taking of passages from the writing of others without giving proper credit to the sources. Collusion: Using another’s work as one’s own, or working together with another person in the preparation of work, unless such joint preparation is specifically approved in advance by the instructor. Cheating: Giving or receiving information on examinations. a. H. Special Work: A term paper will be required. Students will write a 5-7 page (not including title and reference pages), double spaced, paper describing which intelligence collection method they believe is most important. Students will utilize the APA writing method. More detailed information will be covered during the first week of the course. V. EXAMINATIONS A. There will be a minimum of two major examinations and a written paper as follows: 1. Mid-Term Exam on April 8th. 2. Term Paper due on April 29th. 3. Final Exam on May 6th. B. A student must be present for all examinations. Students who know in advance that they will be absent from an examination due to valid reasons must arrange to take an early examination. Unexpected absences due to illness or extenuating circumstances will require the student to see the instructor about individual make-up work. C. Students without excused absences will be given a zero for the missed examination. D. Examinations will consist of both objective (multiple choice and fill in-theblank,) and subjective (short answer and essay) questions. Students must be able HMSY 1340 Page 3 of 11 to communicate both orally and in written form, thus some questions requiring the composition and writing of an essay answer will be required. VI. SEMESTER GRADE COMPUTATIONS EXAM Participation Mid-Term Exam Term Paper Final Exam POINTS 200 200 200 400 POINTS 900-1000 800- 899 700- 799 600- 699 0- 599 GRADES A=4 pts/sem hr B=3 pts/sem hr C=2 pts/sem hr D=1 pt/sem hr F=0 pts/sem hr -------------------------------------------TOTAL 1000 VII. NOTES AND ADDITIONAL INSTRUCTIONS FROM COURSE INSTRUCTOR A. Tuition refunds are made only in the case of class cancellation or official and timely withdrawal from CTC or from a course. Please refer to the current course catalog for more details. B. GoArmyEd students should contact their education counselor before withdrawing and are required to withdraw through the GoArmyEd portal. Please note: a military withdrawal does not override CTC’s grading policy. For self-pay students, refunds are computed from the date the Application for Withdrawal or Refund is filed with the CTC Field Representative or designated Student Services Officer. Special conditions apply to students who receive federal, state, and/or institutional financial aid. Tuition and fees paid directly to the Institution by the Veterans Administration, Title IV (Financial Aid Programs, a sponsor, donor, or scholarship shall be refunded to the source rather than directly to the students. C. Course Withdrawals, Student Responsibilities: It is the student’s responsibility to officially withdraw from a course. The instructor cannot initiate a withdrawal based upon a student’s request. Rather, students must initiate the withdrawal with the designated Education Center Representative, through the CTC Field Representative or the Student Services Officer for that region. Applications for Withdrawal will be accepted at any time before the completion of 75% of the course, after which time the student will be assigned an “FN”- “Failure for Non-attendance.” D. Incomplete / Course in Progress Grade Policy: An “IP” or “Incomplete” grade may be assigned by an instructor if a student has made satisfactory progress in a course with the exception of a major quiz, final exam, or other project. The “IP” grade may also be assigned based on circumstances beyond a student’s control, such as personal illness, death in the immediate family, or military orders. Notice of absences, with supporting documentation, may be required by the instructor. The instructor makes HMSY 1340 Page 4 of 11 the final decision concerning the granting of the incomplete grade. With an “Incomplete” grade, students are required to complete a set amount of work before the instructor will submit an official letter grade. E. Cellular phones, beepers, and other electronic devices will be turned off while the student is in the classroom or laboratory unless the student is using the device for class purposes. No texting or social networking is allowed during class. F. Instructor Discretion: The instructor reserves the right of final decision in course requirements. G. Civility: Individuals are expected to be cognizant of what a constructive educational experience is and respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion. VIII. COURSE OUTLINE Note: The instructor has the right to change the course schedule. Any changes will be announced in class. If the student misses a class period and changes are announced, it is the student’s responsibility to receive the missed information from a classmate or the instructor. A. (Week 1) Lesson One: Overview of Intelligence and the History of Intelligence in the US 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Demonstrate familiarity with the many definitions and uses of the term “intelligence.” b. Describe how intelligence enhances national security. c. Summarize the relationship between the intelligence community and policymakers/decision-makers. d. Recognize how the “reality” of intelligence work often differs from common perceptions and myths perpetuated in the popular media. e. Describe the importance of “decision advantage” and how it can be achieved. f. List and explain the five functions of intelligence. g. Explain why the United States did not develop a robust, sustained intelligence capability until the twentieth century. h. Identify some reasons why the United States was not able to anticipate and thwart the attacks of September 11, 2001. i. Describe how historical events have shaped the American intelligence efforts of today. 2. Learning Activities: a. Read Chapters 1 and 2 in your textbook. b. Review these PowerPoint slideshows: Chapter 1 HMSY 1340 Page 5 of 11 Chapter 2 c. Review the following websites: The US Intelligence Community (USIC) to learn more about the intelligence organizations FAS Intelligence Resource Program Center for Defense Information at POGO U.S. Department of Homeland Security 3. Lesson Outline: a. b. c. d. e. f. g. B. Intelligence Defined Types of Intelligence Functions of Intelligence Agencies Limitations of Intelligence History of Intelligence Emergence of Terrorism Recent Developments in the Struggle against Terrorism (Week 2) Lesson Two: The Intelligence Community Today 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Explain the organization of the U.S. intelligence community (IC), to include the role that federal, local, state and private agencies play. b. Describe how and why the U.S. IC has evolved to its current state. c. Describe the role played by the Director of National Intelligence (DNI) and why such a position was deemed necessary. d. Identify all 16 agencies that report to the DNI and describe their missions. e. Identify how the U.S. intelligence effort may evolve in the next several years. f. Explain how the "ideal" U.S. IC would be constructed. 2. Learning Activities: a. Read Chapter 3 in your textbook. b. Review these PowerPoint slideshows: Chapter 3 3. Lesson Outline: a. Designated Federal Agencies and the DNI b. Federal, State, and Local Agencies involved in Intelligence c. Private Sector Intelligence C. (Week 3) Lesson Three: Barriers to Analysis and Analytical Methods 1. HMSY 1340 Learning Outcomes: Upon successful completion of this lesson, the student will: Page 6 of 11 a. Explain the importance of objective and non-politicized intelligence. b. Define and explain the concept of critical thinking and its importance to analysis. c. Describe each of the following and explain how they may contribute to less than optimal analysis: Bounded rationality Mindsets Perceptions d. Explain how biases, such as fundamental attribution error and the recency effect, are “hardwired” into human thinking and how they may negatively impact analysis. e. Describe how group decision-making can be subject to misperception and bias just as individual decision-making can. f. Identify some of the bureaucratic hurdles involved in conducting unbiased analysis. g. Explain the inherent tension between security and information sharing. h. Identify strategies that can be used to combat bias. i. Discuss why many scholars assert that most intelligence failures are failures of analysis rather than collection. j. Describe the knowledge, skills, and abilities that successful analysts possess. k. Describe what a “structured analytical technique” is and why they are used in the IC today. l. Demonstrate familiarity with: Analysis of Competing Hypotheses Scenarios Key Assumptions Check Contrarian Methods m. Explain how analytical software is used in the IC and how technological advances might enhance analysis. n. Identify the importance of collaboration in analysis, and describe how the IC is attempting to enhance agencies and analysts working more closely together. 2. Learning Activities: a. Read Chapters 5 and 6 in the textbook. b. Go to the following website: http://www.cnas.org/node/3924 and Download the Full Working Paper (PDF) titled: Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Review the paper to learn more about intelligence operations. c. Review these PowerPoint slideshows: Chapter 5, Chapter 6 d. Mid-Term Exam! (April 8th) This exam will cover the material covered during weeks 1-3. 3. Lesson Outline: a. Psychological Barriers b. Group Decision-Making c. Bureaucratic Barriers HMSY 1340 Page 7 of 11 d. Security and Sharing e. Critical Thinking f. Structured Analytical Techniques D. (Week 4) Lesson Four: Collection 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Describe and fully explain what “collection” means in the context of intelligence. b. Explain what a “collection” plan is and the considerations that go into constructing one. c. Identify each of the following “INTs” and the advantages/disadvantages of each: HUMINT SIGINT GEOINT MASINT FININT OSINT 2. Learning Activities: a. Read Chapter 4 in your textbook. b. Review these PowerPoint slideshow: Chapter 4 3. Lesson Outline: a. Considerations b. Collection Plan c. Collection Methods E. (Week 5) Lesson Five: Counterintelligence 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Provide a workable definition for counterintelligence (CI), and fully describe its elements. b. Explain the role CI plays in providing “decision advantage.” c. Define “right to know” and “need to know,” and describe why they are fundamental parts of CI. d. Define fully the different levels involved in security clearances and how one goes about obtaining one. e. Explain how CI can be “offensive” as well as “defensive.” f. Describe what the Director of National Intelligence means by “responsibility to provide.” Identify why some think this might jeopardize the protection of sensitive intelligence. HMSY 1340 Page 8 of 11 g. Explain the damage that spies like Aldrich Ames and Robert Hanssen can inflict on national security. 2. Learning Activities: a. Read Chapter 8 in your textbook. b. Review these PowerPoint slideshow: Chapter 8 3. Lesson Outline: a. Defensive Counterintelligence b. Offensive Counterintelligence c. Counterintelligence Operations Today F. (Week 6) Lesson Six: Covert Operations 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Describe the history of covert operations utilized by the U.S. intelligence community. b. Provide a definition for a covert operation, fully describing each element that is essential for its successful implementation. c. Identify various tactics that can be used in a covert operation, ranging from financial support and propaganda to military action and force. d. Decide whether covert operations have helped or hurt U.S. interests, using examples from history. e. Describe the different considerations that go into planning an international covert operation versus a domestic undercover operation that a law enforcement agency might carry out. 2. Learning Activities: a. Read Chapter 9 in your textbook. b. Review these PowerPoint slideshow: Chapter 9 4. Lesson Outline: a. b. c. d. e. f. G. Covert Operations Clandestine Operations Deception Operations Military Covert Operations Covert Operations and the War on Terrorism Term Paper Due! (April 29th) Students will write a 5-7 page (not including title and reference pages), double spaced, paper describing which intelligence collection method they believe is most important. Students will utilize the APA writing method. (Week 7) Lesson Seven: The Intelligence Cycle 1. HMSY 1340 Learning Outcomes: Upon successful completion of this lesson, the student Page 9 of 11 will: a. Describe the history of the Intelligence Cycle and why it is taught/used in the IC today. b. Explain fully all the elements of the cycle. c. Apply the cycle to a real-world situation. d. Describe some of the criticisms of the cycle and whether it should continue to be used/taught. e. Explain how you would change/improve the intelligence cycle. 2. Learning Activities: a. Read Chapter 7 in your textbook. b. Review these PowerPoint slideshow: Chapter 7 3. Lesson Outline: a. The Intelligence Cycle Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination Evaluation b. Critical Reactions to the Intelligence Cycle H. (Week 8) Lesson Eight: The “All-Source Production” of Intelligence – Part One: 1. Learning Outcomes: Upon successful completion of this lesson, the student will: a. Describe criminal intelligence and crime analysis, and explain their similarities/differences. b. Describe the history of criminal intelligence, and explain why its use has waxed and waned in American law enforcement agencies. c. Explain the fundamentals of Intelligence-Led Policing and describe its application in policing today. d. Explain how technology has revolutionized crime analysis and explain how it can be used to apprehend criminals/prevent crime. e. Criminal Investigative Analysis Geographic Profiling National Criminal Intelligence Sharing Plan Fusion Centers Regional Information Sharing Systems (RISS) Program Joint Terrorism Task Forces (JTTF) High Intensity Drug Trafficking Area (HIDTA) Program 2. Learning Activities: a. Read Chapter 13 in the textbook. HMSY 1340 Page 10 of 11 b. Review these PowerPoint slideshow: c. Final Exam! (May 6th) The exam will cover all material covered in the class. 3. Lesson Outline: a. History of Intelligence in Law Enforcement b. Law Enforcement and Intelligence c. Intelligence-Led Policing in the US and the National Criminal Intelligence Sharing Plan d. Crime Analysis HMSY 1340 Page 11 of 11
© Copyright 2026 Paperzz