Counterterrorism and Counterintelligence Strategies – HLSC 730

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020

Course Description

Counterintelligence (CI) and Counterterrorism (CT) provides students with insight on the homeland security threats we face today with emphasis on terrorism and espionage. The tasks of CT and CI are particularly analysis-intensive. It requires its practitioners to employ a melded set of analytical tools and interoperable capabilities. This objective can be complicated by the fact that many CT and CI operations might involve several entities, including both the Intelligence Community and counterterrorism efforts. This course will explore how to create unified, integrated, and multi-disciplinary CT and CI analysis programs that make the best use of all available resources.

Prerequisite

HLSC 720

Rationale

The purpose of this course is to examine Counterintelligence and Counterterrorism principles and techniques. Counterintelligence and Counterterrorism are both offensive and defensive and serve to help secure our homeland from a myriad of enemies both foreign and domestic.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Analyze Counterterrorism and Counterintelligence strategies.
  2. Evaluate homeland security threats faced with emphasis on terrorism and espionage.
  3. Develop a melded set of analytical tools and interoperable capabilities to use in Counterterrorism and Counterintelligence activities.
  4. Create unified, integrated, and multi-disciplinary Counterterrorism and Counterintelligence strategies that make the best use of all available resources.
  5. Discuss biblical examples involving both Counterterrorism and Counterintelligence.

Course Assignment

Textbook readings and lecture presentations/notes

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.

Discussion Board Forums (8)

There will be 8 Discussion Board Forums throughout this course. The student is required to provide a thread in response to the provided topic for each forum. Each thread is to be at least 450-500 words and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be at least 200-250 words.

Research Paper 1

The student will complete a Research Paper which will be a Comprehensive Examination of Counterintelligence. This paper will be exhaustive. The student will provide the following using these headings: Counterintelligence fundamentals, challenges, theory; Defensive Counterintelligence to include planning, tenets, security of all types, and communications; Offensive Counterintelligence to include tenets, detection, deception, and neutralization; and ethics of counterintelligence. The student will discuss Biblical examples of the use of intelligence and or counterintelligence. How does cyber and social media fit in? The student will write at minimum a 10-full page research-oriented paper in current APA format. The paper must include at least 7 sources (which will include the class textbooks). The paper will be submitted through SafeAssign.

Research Paper 2

The student will complete a Research Paper which will be a Comprehensive Examination of Counterterrorism. This paper will be exhaustive. The student will provide the following using these headings: the purpose and need to understand, define, and analyze terrorism; discussion of behavioral traits, suspicious activity, radicalization and recruitment for and of terrorism; intelligence gathering; enhanced investigation and analysis; what’s past is prologue as it pertains to counterterrorism, and what might we expect from terrorism in the future. How does cyber and social media fit in? The student will write at minimum a 10-full page research-oriented paper in current APA format. The paper must include at least 7 sources (which can include the class textbooks). The paper will be submitted through SafeAssign.

Training Presentation (Two Options)

Option A - Instructions for A Comprehensive Examination of Counterintelligence Training Presentation

The student will prepare a PowerPoint (Audio/Visual) presentation wherein he or she will design training which will cover everything he or she discussed in the written paper he or she completed on this same topic in this class. Each section that was written and covered in the paper needs to be discussed but the training video will end with additional information that will include contingencies and countermeasures to a cyber-attack or intrusion.

Option B - Instructions for A Comprehensive Examination of Counterterrorism Training Presentation

The student will prepare a PowerPoint (Audio/Visual) presentation wherein he or she will design training which will cover everything he or she discussed in the written paper he or she completed on this same topic in this class. Each section that was written and covered in the paper needs to be discussed.

A minimum of twenty content slides are required not including the cover and reference slides. The presentation needs to be at least 15 minutes long and should last no more than 30 minutes maximum. At least 7 references should be cited and included on the last slide. The presentation must be in current APA format.