Search This Blog

4.29.2025

Course introduction


Games Without Frontiers

Dear Students,

Games Without Frontiers is an advanced course in Political Science designed for M.A. students specializing in defense and security studies. The course introduces fundamental political, operational, and terminological concepts that influence the intelligence cycle of external-national intelligence organizations operating within democratic systems.

In addition to the study of classical intelligence doctrines, the course will also address contemporary aspects of Cybersecurity and Cyber Intelligence. Each academic year, the course focuses on one major external intelligence agency as a case study. In the current semester, the course will examine selected operational, structural, and supervisory aspects of the Israeli external intelligence service, known as Mossad, with particular attention to evolving control mechanisms exercised by the Israeli government, especially within the context of the post-HUMINT (post-Human Intelligence) era.

1. Basic Concepts of National Intelligence Organizations

·         Differentiating between foreign and internal intelligence services.

·         Analyzing classical and contemporary technological paradigms relevant to intelligence operations.

·         Human intelligence in the cyber era: transformations, challenges, and continuities.

·         Information versus disinformation: operational perspectives.

·         "A View to a Kill": distinctions between fictional representations of intelligence operations and empirical realities.

·         The operational environment of external intelligence services in democratic regimes.

2. Intelligence Services in Democracies, New Democracies, and Autocracies

·         Examination of the legal frameworks governing the operation of foreign intelligence services.

·         The chain of command: Theoretical and practical considerations regarding the subordination of intelligence agencies to political decision-makers.

·         Comparative analysis of models delineating the relationships between political echelons and intelligence services: theoretical approaches versus practical implementation.

3. Political Oversight of Intelligence Services

·         Critical assessment of existing political oversight models: capabilities, limitations, and adaptability to contemporary threats.

·         Cyberspace as both an obstacle and an opportunity for the oversight and accountability of intelligence activities.

·         Emerging models of civic control over foreign intelligence services.

·         The role and function of the intelligence report within the intelligence cycle: between personal interpretation and political ambiguity.

4. Cyber Intelligence

·         Defining cybersecurity and introducing relevant terminologies: "Darknet," "social engineering," and "hacking."

·         Overview of core concepts in Cyber Warfare: military utilization, deterrence strategies, countermeasures, and offensive operations.

·         Critical review of major methodologies guiding contemporary cyber intelligence organizations.

·         Exploration of political and ethical dilemmas inherent in cyber intelligence activities.

·         Structuring frameworks for civic control and supervision over cyber and traditional intelligence services.

·         Investigating the patterns of interaction between political decision-makers and intelligence professionals, aiming to conceptualize future models of cooperation.

5. Who Is Afraid of the Big Bad Wolf?

·         A concise historiographical analysis of the Israeli Mossad: myth construction versus factual accounts.

·         Examination of institutional mechanisms utilized by the Israeli government and the Knesset to oversee Mossad activities.

·         Evaluating the effectiveness and limitations of oversight mechanisms within the broader framework of democratic accountability.


We will engage critically with theoretical literature, empirical case studies, and methodological debates throughout the semester, aiming to enhance both conceptual understanding and analytical capabilities regarding intelligence organizations and their governance in democratic systems.


Optional Topics for the Final Paper

Optional Topics for the Final Paper 

Below is a list of suggested topics for your final paper. These topics are designed to guide your research and analysis in the field of intelligence studies. Each topic allows for theoretical engagement, case-based analysis, and methodological reflection. Students are encouraged to refine and narrow their selected topic in consultation with the instructor, and must apply appropriate academic methodologies and referencing systems.

1.       Controlling External Intelligence: A Comparative Study of Democratic and Non-Democratic Regimes

Analyze the institutional and legal mechanisms used to oversee external intelligence services in both democratic and authoritarian regimes. Include theoretical frameworks of civil-military relations and discuss the effectiveness of actual practices in key case studies.

2.       HUMINT versus Cyber Intelligence: Technological and Methodological Considerations

Compare human intelligence (HUMINT) and cyber intelligence in terms of operational technologies, methodological frameworks, and risks. Assess the strengths and weaknesses of each mode of intelligence collection in both strategic and tactical contexts.

3.       Intelligence Analysis and the Integration of Artificial Intelligence

Evaluate the role of artificial intelligence in modern intelligence analysis. Discuss both its capabilities and limitations, including issues of bias, decision-making, and predictive modeling within intelligence cycles.

4.       The European Union Intelligence Agency: Mission, Policies, and Security Contributions

Examine the structure and goals of the EU's intelligence coordination mechanisms, such as INTCEN. Analyze their relevance to contemporary EU security challenges, including counterterrorism, cyber defense, and border protection.

5.       Human Intelligence Collection in the Darknet and Social Networks

Explore how HUMINT is deployed in virtual environments, with particular focus on the Darknet and social media platforms. Address challenges of anonymity, verification, and ethical boundaries.

6.       Legal Oversight of U.S. Intelligence Services: Effectiveness and Limitations

Critically examine the legal and institutional structures that oversee American intelligence agencies, including the role of congressional committees, judicial mechanisms, and executive control. Assess their effectiveness in balancing national security and democratic accountability.

7.       Non-Governmental Actors in Covert Intelligence Gathering

Investigate the growing role of NGOs, private contractors, and individual actors in the realm of covert intelligence. Assess legal implications, accountability issues, and potential national security risks.

8.       Parliamentary Supervision of Intelligence Budgets in Democracies

Analyze how parliaments in democratic states oversee intelligence budgets and expenditures. Discuss transparency challenges, secrecy norms, and models of legislative accountability.

9.       Can Cyber Intelligence Replace Traditional Espionage?

Debate the potential of cyber intelligence to substitute human-based espionage. Discuss complementary roles, operational challenges, and cases where cyber operations have succeeded or failed to meet strategic goals.

10.   The Role of Open-Source Intelligence (OSINT) in National Security

Assess the growing use of OSINT in national intelligence strategies. Evaluate its sources, reliability, and utility across different intelligence domains, including counterterrorism, foreign affairs, and public health surveillance.


APA Quotation and Referencing Guidelines for M.A. Political Science Students

 

APA Quotation and Referencing Guidelines for M.A. Political Science Students:

In academic writing, proper citation is essential to uphold the principles of transparency, academic integrity, and intellectual honesty.
The American Psychological Association (APA) style is one of the most widely accepted systems for citation in the social sciences,
including Political Science—especially in departments that emphasize empirical and policy-oriented research.

APA citation follows an author-date system with in-text parenthetical references, supported by a full reference list at the end of the document.
Unlike footnote-based systems, APA does not use footnotes for citation purposes (except for limited content notes). Instead, sources are
referenced directly within the text.

1. In-text Citations

When quoting or paraphrasing, the author's surname and the year of publication must appear in parentheses:
- Direct quote: “Security is always political” (Booth, 2007, p. 33).
- Paraphrase: According to Booth (2007), security should be viewed as a deeply political process.

If the source has two authors: (Keohane & Nye, 2011)
If more than three: (Waltz et al., 2010)

2. Reference List Examples

At the end of your paper, a full reference list must include all cited sources in alphabetical order:

- Book: Booth, K. (2007). *Theory of world security*. Cambridge University Press.
- Edited Book Chapter: Foucault, M. (1991). Politics and the study of discourse. In G. Burchell, C. Gordon, & P. Miller (Eds.),
  *The Foucault effect: Studies in governmentality* (pp. 53–72). University of Chicago Press.
- Journal Article: Keohane, R. O., & Nye, J. S. (2011). Power and interdependence revisited. *International Organization, 41*(4), 725–753.

3. Why APA Matters

APA ensures consistency in how sources are cited, allowing readers to verify arguments, trace intellectual influences, and evaluate the quality of research.
Failure to properly cite sources—even unintentionally—can result in plagiarism, a serious breach of academic conduct.

Students are expected to follow APA rules precisely in all submitted work. Mastery of this system is not only essential for academic success
but also for developing professional scholarly habits.

For further explanation and additional examples, please refer to the official APA style guide at the following links:


https://apastyle.apa.org/style-grammar-guidelines/citations


http://www.yorku.ca/igreene/citgd.htm

 

Course paper


Course Assignment Instructions – M.A. Intelligence Studies

Assignment Options

Each student may choose one of the following options:

1.        Delivering a focused academic presentation of up to 45 minutes.

2.       Submitting a short academic dissertation of up to 20 pages.

Suggested Topics for Paper or Presentation

3.      National Intelligence vs. Corporate Intelligence: Who Holds the Advantage?

Conduct a comparative analysis of capabilities, technological tools, and analytical proficiency between national and corporate intelligence bodies.

4.      Civic Rights and Intelligence Oversight

Describe the political, technical, and financial mechanisms of oversight applied to intelligence services. Propose and justify a model of your own.

5.     Who’s Afraid of the Big Bad Wolf? Cooperative Intelligence, Ethics, and Legal Boundaries

Analyze the ethical and legal dimensions of cooperative intelligence operations. Explore the extent to which technology can support democratic oversight of intelligence services, and identify associated advantages and limitations.

Submission Conditions and Requirements

·         Each student must select only one of the proposed topics. Only one paper may be submitted per topic.

·         Before commencing work, students must submit the following elements via email no later than June 20: a proposed bibliography, a chapter outline, and a clearly defined research question.

·         All submitted work must comply with academic standards for citation and referencing in Political Science. Failure to adhere to citation conventions will significantly impact the final grade.

Upcoming lectures May 2025


21.05.2025 (Wednesday), 17:30–21:00

Basic concepts of intelligence organizations: methodologies and terminology.

22.05.2025 (Thursday), 17:30–21:00

Between human espionage and cyber intelligence.

27.05.2025 (Tuesday), 17:30–21:00

Theories of political intelligence control: Cross-analysis of Israeli intelligence failure, October 2023.

28.05.2025 (Wednesday), 17:30–21:00

Why spy? The role of OSINT (Open-Source Intelligence) and non-state intelligence actors in the intelligence domain.

29.05.2025 (Thursday), 17:30–21:00

Conclusion: Future horizons of Western national intelligence organizations.
Discussion on final paper submission and potential topics for student research.



Course Requirements and Final Assessment



Course Requirements and Final Assessment – M.A. Intelligence Studies

This document outlines the academic requirements and evaluation criteria for the course. Students are expected to meet all components in order to pass successfully. Academic rigor, engagement, and adherence to disciplinary standards will be expected at all stages.

Final Grade Composition

1.       Participation in Lectures – 15% of the Final Grade

Active and consistent participation in lectures is essential. Attendance will be recorded regularly. Students who miss more than two sessions without prior approval or valid justification will not be eligible to sit for the final examination. Participation includes contributions to discussions, engagement with the reading materials, and demonstrated commitment to the learning process.

2.       Final Paper or Presentation – 50% of the Final Grade

Students are required to submit a final academic paper of 15–20 pages, focusing on one of the core subjects discussed in the course. Papers must follow formal academic structure, including a clear research question, theoretical framework, methodology, and proper citation using the APA style or another approved political science referencing system.

Alternatively, students may choose to deliver a 15-minute academic presentation based on their research topic, in front of the class. The presentation must reflect original analysis, conceptual clarity, and scholarly rigor, equivalent to that of a written submission. Only one of the two options (paper or presentation) is required, and the choice must be communicated to the instructor in advance.

3.       Final Examination – 35% of the Final Grade

A final written examination will be administered at the end of the course. It will assess students’ understanding of core concepts, theoretical models, case studies, and analytical tools discussed throughout the semester. The format may include essay questions, case analysis, and conceptual application.