Skip to main content

Campus closed starting Tuesday, April 20 at 4 p.m.

CJS 366 The U.S. Intelligence Community

This course provides an overview of the U.S. Intelligence Community and examines how the community supports foreign policy and homeland security. Students examine the intelligence cycle and the structure, constraints, and oversight of the agencies that comprise the intelligence community. Specific attention is given to collection operations, analysis, and dissemination of finished intelligence products to consumers, with emphasis on how global intelligence is used to protect and police local communities. Also explored is how intelligence products build a common operational picture for national security management at top levels of government and how intelligence analysis supports Homeland Security by assisting federal, state, and local political leaders and law enforcement officials. Students also discuss human intelligence operations, counterintelligence, UAV (drone) operations, interrogation, and detention, and the moral, ethical, and legal framework inside which those disciplines and operations are practiced.

Prerequisites

Special information

Prerequisites: CJS 101 Introduction to Criminal Justice.
4 Undergraduate credits

Effective August 15, 2017 to present

Learning outcomes

General

  • Identify U.S. Intelligence Community organizations and their assigned missions
  • Understand the framework of the U.S. Intelligence Community and how to leverage community components to most effectively execute the homeland security mission, to include law enforcement efforts to protect American citizens
  • Identify how the U.S. Intelligence Community contributes to federal, state, and local law enforcement operations targeting threats to America's security
  • Define and explain how the components of the Intelligence Cycle apply to foreign policy, military operations, and homeland security missions (to include law enforcement efforts to protect the American public)
  • Identify primary intelligence collection methodologies and how those methodologies are best applied based on collection requirements
  • Compare the value of individual collection methods and their utility in responding to specific collection requirements, crises, or threats
  • Explain the fundamental steps involved in the analysis process
  • Understand the difference between information and intelligence
  • Understand the value of effectively integrating counterintelligence into security management
  • Compare the effectiveness of intelligence oversight programs and laws in balancing personal privacy and public safety and security
  • Evaluate the effectiveness of intelligence in mitigating threats from both a historical perspective and assessing current intelligence strategies against threats
  • Explain how the components of the Intelligence Cycle support the foreign policy and national security of the United States
  • Differentiate between information and intelligence and examine the pros and cons of different intelligence collection methodologies
  • Examine the effectiveness of intelligence oversight programs and laws in balancing personal privacy and public safety/security
  • Evaluate the effectiveness of intelligence in mitigating threats
  • Develop and improve critical thinking and communication skills