The general aim of the course is to provide students with a critical understanding of the main concepts, objectives and procedures of managing security issues, both at the domestic and at the international level. Specific attention is given to: 1) the intelligence community and processes, their development and their relevance in protecting the national interest; 2) the new threats and challenges steaming from cyberspace.
Intelligence and Scientific Method,
Dario Antiseri and Adriano Soi,
Rubettino publisher, 2013.
Intelligence, Crises and Security
Len Scott and R. Gerald Huges, editors
Routledge 2007
Analyzing intelligence -
Roger Z. GEORGE and James B. Bruce, editors
Georgetown University Press - 2008
Intelligence in an Insecure World
Peter Gill, Mark Phythian
Polity 2012
Strategic intelligence for the 21st century: the mosaic method
Alfred Rolington
Article published on "Policing - A journal of policy and practice" -2013
For NON-attending students:
Security studies
edited by Paul D. Williams, pp. 634 - Routledge 2013
Learning Objectives
The general aim of the course is to provide students with a critical understanding of the main concepts, objectives and procedures of managing security issues, both at the domestic and at the international level. Specific attention is given to: 1) the intelligence community and processes, their development and their relevance in protecting the national interest; 2) the new threats and challenges steaming from cyberspace.
Prerequisites
There are no specific prerequisites.
Teaching Methods
Students are expected to participate actively in the course. Students are encouraged to choose whatever issue raised in the program and develop it in a short essay (no longer than 3,000 words) which will be, if time allows, read and discussed in class toward the end of the course.
Type of Assessment
Students must agree with the teachers the topic to be addressed for the short essay (paper). The final exam includes paper's discussion and the oral exam on the remaining parts of the program addressed during the classes.
Course program
1st Module
Section one: Fundamentals
to. Security, public security, national security
b. Security and political power
c. National interest
d. Security and freedom.
is. Risk and threat.
f. Intelligence: the different meanings of the term.
g. From information to knowledge: intelligence and scientific method.
h.Intelligence and political power
Second section: the evolution of Italian Intelligence from 1861 to the end of the twentieth century
to. Intelligence in Italy: brief historical profile, from the unification of Italy to the advent of the
Republic.
b. The Constitution of 1948: new values and new limits for National Intelligence
c. The first Italian law on information and security services (l
October 1977, n. 801). The secret of state.
d. The end of the century debate on the reform of the law n. 801 of 1977, the approval
of the law of 3 August 2007, n. 124 and the changes introduced by the law 7 August
2012, n. 133.
Section three: the Information System for the security of the Republic
to. The new government organization of information services: responsibilities
policies and the distribution of decision-making powers.
b. The missions of the information organizations, the Department of information for
security (DIS) and the division of functions between the information agency and
external security (AISE) and the Information and Internal Security Agency (AISI).
c. The secret of state
d. Some operational tools and related legal limits
is. Internal controls
Section Four: parliamentary control
to. The Parliamentary Committee for the Security of the Republic: composition e
powers
b. Governmental information obligations towards the Parliamentary Committee
c. The procedure of verification of the state secret by the Parliamentary Committee
2nd Module
1. Introduction
to. Who am I, what will we do
b. What is security? "Security" and "risk".
c. Globalization, multilateral interest & "the global commons"
d. The individual, social nature, cultural identity, minority group, mankind, the state,
the intergovernmental and the international levels, cyberspace: different
dimensions that count in IR security studies. Why do security studies matter?
2. The post-'89 security environment: what has changed?
to. Post-'89, regional crisis and frozen
conflicts; missile proliferation; WMD; nuclear deterrence
b. Failed / rogue states / non-state actors / illegal trafficking
c. Terrorism & radicalism. The Mumbai attacks.
d. Environment & resources: climate change, global warming and the High North?
Rare Earth - Water Scarcity - Food and famine
is. Energy security & the shale gas revolution
f. Global public agenda? vox populi? international spillovers of domestic insecurity
g. After the "Arab Springs"
h. Global economic divide; global social justice. The 99%.
the. Economic & financial security
j. Cyber threat
3. The National interest in the global arena
to. The concept of "National interest"
b. How is the National interest identified? The Italian National interest
c. Formal institutions devoted to the protection of the National interest in the
international arena: diplomacy, intelligence, the military
d. Non-state actors
is. How is the National interest protected collectively: UN, NATO, the EU and
other regional alliances / IIOO
4. The quest for order
to. International sovereignty? meaning and evolution of the concept. The System of
States and International Society
b. The responsibility of the State. The responsibility to protect & Human Rights
"Above all nations is humanity". Political accountability: who do you turn to?
c. International violence? what can we cope with? Hard & soft power - coercion &
influence. The balance of power, the security dilemma, deterrence
d. The cases of ISAF and Iranian nuclear negotiations
5. Asymmetric threat and global governance (case study): cyberspace and cyber
threat? a new security paradigm
to. Cyberspace: definition & relevance
b. Motivations, actors & vulnerabilities
c. The asymmetric threat & the strategic dimension
d. Cyber espionage, cyber sabotage, cyber weapon, cyber warfare & cyber terrorism
is. Situational awareness, resilience, info-sharing, IT innovation, reverse engineering,
escalation
f. Training & education, cyber hygiene, building and mobilizing cyber capabilities
g. Attribution, forensic & international cooperation
6. Asymmetric threat and global governance (case study):? cyber power, cyber
diplomacy and the governance of cyberspace
to. The National level, the whole-of-government approach
b. The private sector
c. NATO Cyber Defense Policy
d. The EU
is. Russia & China
f. Internet governance, the Budapest Convention
g. Cyber diplomacy
h. Governance issues, collective interests & CBMs
7. Seminar with the James Madison University
to. The Transatlantic region in the global order
b. NATO and the new Strategic Concept
c. "Leading from behind" and the Transatlantic defense-spending imbalance