Enable GingerCannot connect to Ginger Check your internet connection or reload the browserDisable in this text fieldEditEdit in GingerEdit in Ginger×Enable GingerCannot connect to Ginger Check your internet connection or reload the browserDisable in this text fieldEditEdit in GingerEdit in Ginger×
Games without frontiers is an advanced course in political science and military history, introducing the operating framework of the intelligence organization's operation in Western democracies.
In addition to classic intelligence studies, we will review aspects of Cybersecurity & Cyber intelligence.
Here is the sum of subjects we will review:
1. Basic concepts of national intelligence organizations
Understanding the difference between foreign and internal intelligence services.
Current and classic technological concepts of intelligence work.
Human intelligence in the age of cyber.
Information and disinformation. "A view to a kill"- differences between operating intelligence service in popular fiction versus Reality.
Operating foreign intelligence services within the framework of democratic states.
2. Operating intelligence services in democracies, new democracies, and autocracies
The legal framework in which foreign intelligence services are operating.
The question of subordination between the intelligence services and the political decision-makers, what actually is the chain of command?
The relationships between political decision-makers (echelons) and the intelligence services, theoretical models versus practice.
3. Political oversight models over the intelligence
Existing political control models over intelligence services, are they adequate to the challenges of the present?
Cybersphere challenges, obstacle or opportunities, regarding intelligence services oversight?
Up to date approaches of civic control over foreign intelligence services.
The role of the intelligence report to the political decision-makers within the intelligence cycle. Between personal and political ambiguity.
4. Cyber intelligence:
What is cyber-security? Introduction of: "Darknet", "social engineering" and “hacking” terminologies.
Introducing basic concepts of Cyber Warfare, Military Use and Deterrence, Countermeasures and Counterattacks.
Reviewing some of the major methodologies and concepts guiding intelligence organizations. Focusing on political and ethical dilemmas, defining the framework of civic control and supervision over the intelligence services.
Examining the interaction between political decision-makers and intelligence services, in order to identify patterns of decision making and future possible models for cooperation between the states’ political elites and the intelligence professionals.
System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The
Size and Influence of a Criminal Organization: A Criminal Achievement
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method,
and Practice. 3rd ed., edited by David Silverman, 111-127.
Thousand Oaks, CA: Sage, 2011.
Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd
cup 99 data set,” in Computational
Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE
Symposium on, july 2009
Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly
detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security
(CICS), 2011 IEEE Symposium on, april
and D. Dasgupta, “An effective network-based intrusion detection using
conserved self pattern recognition algorithm augmented with near-deterministic
detector generation,” in Computational
Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april
Wang, Q., W. T. Yue, and K. Hui. (2012) “Do
Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information
Behind Taliban Lines, February 23,2010. Available online at:
Proceedings of a Workshop on Deterring
Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers
prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record
FBI. “Directorate of Intelligence, Intelligence Collection