Search This Blog

3.30.2023


  How To Use Quotes In Your Paper (APA)


http://www.yorku.ca/igreene/citgd.htm

 

          

Upcoming lectures April/May 2023




02/04 - SUNDAY - 15:00-20:30h- ZOOM

06/04 - THURSDAY- 17:30 - 21:30h- ZOOM

07/04 - FRIDAY- 17:30 - 21:30h.- ZOOM

09/04 - SUNDAY   - 16:00 - 20:30h.- ZOOM

12/04 - WEDNESDAY-  17:30 - 21:30h.- ZOOM

13/04 -  THURSDAY  - 17:30 - 21:30h- ZOOM


Course introduction



Dear students,

Games without frontiers is an advanced course in political science, in our lectures, we will introduce

Some political and operational basic concepts, and terminology paradigms influencing the intelligence cycle of external-national intelligence organizations could in democracies

In addition to classic intelligence studies, we will review Cybersecurity & Cyber intelligence aspects.
Each year we are focusing on one of the main external intelligence services, mainly as a case study. This year we will examine some aspects of the operation of the Israeli external intelligence services also known as Mossad. We will try to understand some of the mechanisms used by the Israeli government in order to control Mossad,  especially at a time that is being described more and more as post HUMINT.


1. Basic concepts of national intelligence organizations

Understanding the difference between foreign and internal intelligence services.
Current and classic technological concepts of intelligence work.

Human intelligence in the age of cyber. 

Information and disinformation. "A view to a kill"- differences between operating intelligence service in popular fiction versus Reality.

Operating foreign intelligence services within the framework of democratic states.


2. Operating intelligence services in democracies, new democracies, and autocracies 

          The legal framework in which foreign intelligence services are operating. 

          The question of subordination between the intelligence services and the political decision-makers, what actually is the chain of command?

           The relationships between political decision-makers (echelons) and the intelligence services, theoretical models versus practice.


3. Political oversight models over the intelligence 

Existing political control models over intelligence services, are they adequate to the challenges of the present?

           Cybersphere challenges, obstacles, or opportunities, regarding intelligence services oversight?

Up-to-date approaches of civic control over foreign intelligence services.

The role of the intelligence report to the political decision-makers within the intelligence cycle. Between personal and political ambiguity.


4.  Cyber intelligence:

        What is cyber security? Introduction: "Darknet", "social engineering" and “hacking” terminologies.

Introducing basic concepts of Cyber Warfare, Military Use, Deterrence, Countermeasures, and Counterattacks.

Reviewing some of the major methodologies and concepts guiding intelligence organizations. Focusing on political and ethical dilemmas, defining the framework of civic control and supervision over the intelligence services.

Examining the interaction between political decision-makers and intelligence services to identify patterns of decision-making and future possible models for cooperation between the state’s political elites and the intelligence professionals.

5. Who is afraid of the big bad Wolf?

 A short history of the Israeli Mossad, myth versus facts. What is the mechanism used by the Israeli government and parliament in order to oversight Mossad activities?

Course paper


Each student can choose between:

1.  Presenting a small lecture of up to 45 minutes.
2. Submitting a short dissertation, up to 20 pages.

Here are the subjects for  the paper/ or presentations:
          National intelligence versus corporate intelligence, who has the advantage?
Compare abilities, technological measures, analytical abilities.

    Civic rights and intelligence, describe political, technical, financial methodologies of control over the intelligence services, suggest your own model.

     Who’s afraid of the big bad Wolf, cooperative intelligence, Ethics, and legal boundaries.

      Can technology assist controlling the intelligence services in a democracy, describe advantages and challenges.



: Conditions

1. The students are requested to choose one of the subjects, only one paper could be submitted 
Regarding each of the subjects.

2. Before beginning, the students need to submit: bibliography list, chapters, exact research question.  This should be submitted by email until by June 20.

3. The paper will follow all necessary political science quotation rules. Avoiding that will be reflected dramatically in the final Mark.






Course requirements and final mark

The course final mark will be consisted of:

1.  Participation in lectures (in case of missing more than two lectures, students cannot go to the final examination) – 15% of the course final mark.

2. Final paper 15-20 pages on one of the course subjects.
The final paper could be replaced by a 15-minute presentation in front of the students -  50% of the course final mark.

3. Final variable examination - 35% of the course final mark.

Optional topics for the final paper

1. Controlling external intelligence, and the differences between democratic and nondemocratic regimes. Theoretical concepts and practical implementation. 

2. Humint versus cyber intelligence, technological and methodological aspects of intelligence gathering.

3. Intelligence analysis, the contribution of artificial intelligence.

4. The EU intelligence agency, aims, policies, and actual contribution in relation to the EU security challenges.

5. The role of human intelligence collection within the Darknet and Internet social networks.

6. The effectiveness of legal oversight over the American intelligence services.

7. The role of non-governmental organizations and individuals in covert intelligence gathering.

8. Parliament and the foreign intelligence services in a democracy, how can parliament supervise the budget expenses of the intelligence services?

9. Can cyber - Internet replaces human traditional espionage activities?

10. The role of Osint in national intelligence gathering.


4.01.2020

Basic Bibliography for cyber intelligence:

Andress, J. & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Boston, MA: Syngress.
Bouchard, M., and H. Nguyen. (2009) “Is it Who You Know or How Many That Counts? Criminal Networks and Cost Avoidance in a Sample of Young Offenders.” Justice Quarterly 27, no. 1

Brenner, Susan. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press, 2008.

Chandler and R Boadhurst, "Social Engineering and Crime Prevention in Cyberspace," Queensland Univeristy of Technology, Brisbane, 2006.

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, CA: O'Reilly Media Incorporated.
Clarke, R.A. and Knake, R.K. (2010). Cyber War: The Next Threat to National Security and What to Do About It New York, NY: Ecco.
Decary-Hetu, David, and Benoit Dupont. “The Social Network of Hackers.” Global Crime 13 (2012)

F. Barbhuiya, S. Biswas, N. Hubballi, and S. Nandi, “A host based DES approach for detecting arp spoofing,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (2012)

Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23 (2010)


Kramer, F.D., Starr, S.H., & Wentz, L. eds. (2009). Cyberpower and National Security. Washington D.C.: National Defense University Press and Potomac Books.

Lowenthal, Mark M. Intelligence: From Secrets to Policy. 5th ed. Washington, DC: CQ Press, 2012.
Liu, E.C., (2013, January). Reauthorization of the FISA Amendments. Congressional Research Service Report for Congress, 7-5700, R42725. Available online at: http://www.fas.org/sgp/crs/intel/R42725.pdf.
Menn, J. (2010). Fatal System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The Size and Influence of a Criminal Organization: A Criminal Achievement Perspective.” Global Crime 10 (2009)
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method, and Practice. 3rd ed., edited by David Silverman, 111-127. Thousand Oaks, CA: Sage, 2011.

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, july 2009
O. Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Sym­posium on, april 2011
S. Yu and D. Dasgupta, “An effective network-based intrusion detection using conserved self pattern recognition algorithm augmented with near-deterministic detector generation,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Wang, Q., W. T. Yue, and K. Hui. (2012) “Do Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information Processing 108

Internet sources
Frontline: Behind Taliban Lines, February 23,2010. Available online at:
Federation of American Scientists publishes various reports at http://www.fas.org/pubs/briefs.html or http://www.fas.org/blog/secrecv/.
http://www.ncix.gov/publications/reports/fecie all/Foreign Economic Collection 2011.pdf.
Cyberwar: War in the Fifth Domain. (2010). The Economist. Online at: http://www.economist.com/node/16478792
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record id=12997.
FBI. “Directorate of Intelligence, Intelligence Collection Disciplines.” http://www.fbi.gov/about-us/intelligence/disciplines

Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC: National Institute of Justice, 2010. Accessed April 11, 2011. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf.

Dunn, Justin E. “Russia Cybercrime Market Doubles in 2011, Says Report.” IT World (2012). Accessed September 23. http://www.itworld.com/security/272448/russia-cybercrime-market- doubles-2011-says-report.

 Symantec Corporation. Symantec Internet Security Threat Report, Vol. 17. Accessed June 20, 2012.             http://www.symantec.com/threatreport.