Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Counter Intelligence
  • Unit Code

    SCY3506
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit introduces students to counter intelligence. Students will explore fundamental issues in defensive and offensive counter intelligence operations. They will also explore in depth the role of ethics in counter intelligence operations, investigations and analysis. There will be an introduction to the human factor in counter intelligence and the nature of security vetting. The students will also be introduced to the counter intelligence investigation and development of counter intelligence analytical products. Throughout the unit the multi disciplinary nature of counter intelligence will be emphasised.

Prerequisite Rule

Students must pass 1 unit from SCY1117

Learning Outcomes

On completion of this unit students should be able to:

  1. Create quality counter intelligence products.
  2. Define counter intelligence.
  3. Evaluate the threat posed by human and technical collection capabilities.
  4. Explain the relationship between the counter intelligence and intelligence functions.
  5. Judge what is ethical practice in counter intelligence operations.
  6. Plan a counter intelligence investigation.

Unit Content

  1. Contemporary counter intelligence.
  2. Counter intelligence analysis.
  3. Counter intelligence case study.
  4. Counter intelligence failure.
  5. Defining counter intelligence.
  6. Espionage, sabotage and subversion.
  7. Ethics and oversight.
  8. The counter intelligence investigation.
  9. The human factor.
  10. The relationship between counter intelligence & intelligence.
  11. Vetting as a security prophylactic.

Additional Learning Experience Information

Lectures, tutorials, seminars and workshops.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Case StudyCounter intelligence analysis problem30%
ReportReport on a counter intelligence issue30%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
Case StudyCounter intelligence analysis problem30%
ReportReport on a counter intelligence issue30%
ExaminationEnd of semester examination40%

Text References

  • Johnston, R. (2005). Analytic culture in the US intelligence community: an ethnographic study. Washington: Center for the Study of Intelligence.
  • Goldman, J. (Ed.). (2009). Ethics of spying a reader for the intelligence professional vol 2. Lanham: Scarecrow Press.
  • Boba, R. (2005). Crime analysis and crime mapping. Thousand Oaks: Sage Publications.
  • Bloch, J. (2003). Global intelligence. London: Zed Books.
  • Swenson, R. G. (Ed.). (2003). Bringing intelligence about practitioners reflect on best practices. Washington: Joint Military Intelligence College.
  • Perry, D. (2009). Partly cloudy ethics in war, espionage, covert action and interrogation. Lanham: Scarecrow Press.

Journal References

  • Security studies
  • Studies in conflict and terrorism
  • Survival
  • Terrorism and counter terrorism journal
  • Journal of information warfare
  • Jane's intelligence review
  • International security
  • Terrorism & political violence
  • Intelligence & national security
  • European security
  • International journal of intelligence and counter intelligence

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY3506|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Counter Intelligence
  • Unit Code

    SCY3506
  • Year

    2015
  • Enrolment Period

    2
  • Version

    2
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit introduces students to counter intelligence. Students will explore fundamental issues in defensive and offensive counter intelligence operations. They will also explore in depth the role of ethics in counter intelligence operations, investigations and analysis. There will be an introduction to the human factor in counter intelligence and the nature of security vetting. The students will also be introduced to the counter intelligence investigation and development of counter intelligence analytical products. Throughout the unit the multi disciplinary nature of counter intelligence will be emphasised.

Prerequisite Rule

None.

Learning Outcomes

On completion of this unit students should be able to:

  1. Create quality counter intelligence products.
  2. Define counter intelligence.
  3. Evaluate the threat posed by human and technical collection capabilities.
  4. Explain the relationship between the counter intelligence and intelligence functions.
  5. Judge what is ethical practice in counter intelligence operations.
  6. Plan a counter intelligence investigation.

Unit Content

  1. Contemporary counter intelligence.
  2. Counter intelligence analysis.
  3. Counter intelligence case study.
  4. Counter intelligence failure.
  5. Defining counter intelligence.
  6. Espionage, sabotage and subversion.
  7. Ethics and oversight.
  8. The counter intelligence investigation.
  9. The human factor.
  10. The relationship between counter intelligence & intelligence.
  11. Vetting as a security prophylactic.

Additional Learning Experience Information

Lectures, tutorials, seminars and workshops.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Case StudyCounter intelligence analysis problem30%
ReportReport on a counter intelligence issue30%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
Case StudyCounter intelligence analysis problem30%
ReportReport on a counter intelligence issue30%
ExaminationEnd of semester examination40%

Text References

  • Johnston, R. (2005). Analytic culture in the US intelligence community: an ethnographic study. Washington: Center for the Study of Intelligence.
  • Goldman, J. (Ed.). (2009). Ethics of spying a reader for the intelligence professional vol 2. Lanham: Scarecrow Press.
  • Boba, R. (2005). Crime analysis and crime mapping. Thousand Oaks: Sage Publications.
  • Bloch, J. (2003). Global intelligence. London: Zed Books.
  • Swenson, R. G. (Ed.). (2003). Bringing intelligence about practitioners reflect on best practices. Washington: Joint Military Intelligence College.
  • Perry, D. (2009). Partly cloudy ethics in war, espionage, covert action and interrogation. Lanham: Scarecrow Press.

Journal References

  • Security studies
  • Studies in conflict and terrorism
  • Survival
  • Terrorism and counter terrorism journal
  • Journal of information warfare
  • Jane's intelligence review
  • International security
  • Terrorism & political violence
  • Intelligence & national security
  • European security
  • International journal of intelligence and counter intelligence

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY3506|2|2