Module Specifications.
Current Academic Year 2024 - 2025
All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).
As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.
Date posted: September 2024
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
Coursework Only |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Description This module examines the essential cognitive process of intelligence: analysis. It does so from a normative theoretical anchoring – first outlining the analytic tradecraft with its epistemology and psychological pitfalls. To further appraise how intelligence and security analysis unfolds (and often unravels) upon contact with the world; the module has a large practical component. The second half of the course is dedicated to exercises, exploring structured analytic techniques; critical assessments of declassified intelligence assessments and lastly drafting and presenting a group briefing. Once intelligence analysis has been explored in both theory and practice, the course concludes by reflecting upon the ethical questions raised throughout the twelve weeks. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning Outcomes 1. Students’ will gain applied practical team experience in undertaking open-source ‘intelligence’ collection, processing, analysis and production; 2. Through a deeper theoretical understanding, the learner will be able to identify the pitfalls and analytic pathologies faced by intelligence analysts; 3. Building off from the introductions in Intelligence Analysis & Policy Making, the learner will further be able to assess and evaluate the authoritative theoretical literature on intelligence, as well as broader academic research within Intelligence Studies; 4. Analyse the ethical issues intrinsic to covert intrusive surveillance and other collection methods. The learner will also be able to evalute other normative ethnical debates concerning collective security vs. individual rights, algorithmic profiling, secrecy, transparency and accountability; 5. Critically examine evidence and reports at an advanced level, this will be derived from independent source related analysis with a special focus on the use of intelligence in the run up to the war in Iraq; 6. Bring to bear analytical and methodological tools from the module on the learner’s writing of their IMSISS dissertation. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Indicative Content and Learning Activities
Analytical Tradecraft: Essential concepts in intelligence analysisAnalytical Tradecraft: Kent vs. Kendall and the politicisation of analysisAnalytical Tradecraft: 9/11 and overcoming failures of design(guest lecture from former or current practitioner)Analytical Tradecraft: Pitfalls and pathologiesStructured Analytic Exercise (SATs): Generating a utility matrix (group exerciseStructured Analytic Exercise (SATs): Contrarian & Imaginative thinking techniques (group exercises)(guest lecture from former or current practitioner)Analysis and Iraq WMDs: A critical analysis of the Butler and Chilcot InquiresAnalysis and Iraq WMDs: A critical analysis of the ‘September Dossier’FOES Group analytic exercise, part 1:A simulation where in groups the students rapidly work together putting together what they have learned so far to produce a joint assessmentFOES Group analytic exercise, part 2:In part two the students present their joint assessments to a panel of ‘intelligence consumers’ and each otherIntelligence, Security, Ethics and Analysis(guest lecture from former or current practitioner) | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
Indicative Reading List | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Other Resources None | |||||||||||||||||||||||||||||||||||||||||||||||||||||