Course Number and Title: HDM 103 Information and Intelligence Sharing in Homeland Security
This course introduces systems and methods used by United States intelligence agents; the venues and jurisdictional limits of various intelligence agencies; and the legal bases for intelligence gathering, analysis, and dissemination for homeland security purposes.
- Use terminology specific to the intelligence community, and explain the historical context and current operations of the various agencies comprising the intelligence community. (CCC 4, 5; PGC1, 4)
- Interpret the intelligence-gathering capability that involves threats to the homeland. (CCC1, 2, 4, 5; PGC 1, 2, 4)
- Discuss current as well as future intelligence activities capabilities. (CCC 1, 2, 4; PGC 1, 2, 3)
- Describe the processes by which information is acquired, converted into intelligence, and made available. (CCC 3, 6; PGC 1, 2, 3, 4)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Use terminology specific to the intelligence community, and explain the historical context and current operations of the various agencies comprising the intelligence community.
- Describe the organization of the United States Intelligence Community.
- Use terms associated with intelligence gathering, analysis, and dissemination in the intelligence community.
- Describe the main historical legacy of the United States Intelligence Community.
- Discuss the 9/11 Commission’s recommendations affecting the intelligence community.
- Define the roles and responsibilities of the Director of National Intelligence.
- Interpret the intelligence-gathering capability that involves threats to the homeland.
- Identify the roles and responsibilities of each member of the intelligence community, including their relationships with law enforcement and homeland security authorities.
- Compare and contrast the different collection disciplines available such as signal intelligence, imagery and human intelligence, and measurement and signature intelligence as well as open-source intelligence.
- Recognize the role of the various federal intelligence collection agencies such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), National Security Agency (NSA), and the Defense Intelligence Agency (DIA).
- Describe the military’s role in gathering intelligence.
- Discuss current as well as future intelligence activities capabilities.
- Discuss the role of the National Counterterrorism Center (NCTC).
- Explain the role of the state fusion centers.
- Explain the analytical component of the United States Intelligence Community.
- Identify potential weapons of mass destruction and their likely effects.
- Describe the intelligence collection; analytical process; and dissemination of accurate, timely, and objective intelligence.
- Identify effective counterintelligence measures that enhance and protect intelligence-gathering activities.
- Describe the processes by which information is acquired, converted into intelligence, and made available.
- Explain each phase of the intelligence cycle: planning and direction, collection, processing, production and analysis, and dissemination.
- Explain the assessment of threats and how to develop effective options in response.
- Discuss the debate surrounding the need to collect intelligence covertly.
- Recognize the importance of applying security classifications to sources and methods of intelligence collection capabilities.
- Describe the United States classification system: Top Secret, Secret, Confidential, For Official Use Only, Law Enforcement Sensitive, and Sensitive Security Information (SSI).
- Describe the way intelligence is stored, processed, viewed, shared, and transmitted through various information-sharing systems such as Regional Information Sharing System/Automated Trusted Information Exchange, InfraGard, state and local fusion center web services, the Homeland Security Information Network (HSIN), and Law Enforcement Online.
- Describe and discuss the use of technology such as Internet searching, data mining, and pattern recognition in intelligence gathering.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Articulate the roles and responsibilities of key Criminal Justice and Homeland Security agencies and organizations.
- Demonstrate “all-hazards” planning, mitigation, response and recovery.
- Apply mitigation and crisis intervention strategies used by integrated disaster response teams to diverse citizen populations.
- Articulate the psychology and history of domestic and international terrorism.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.