International Security and Intelligence Programme
Twenty-First Century Perspectives on Intelligence and Contemporary Threats
Syllabus 2025
COURSE DIRECTORS
Professor David Gioe is a British Academy Global Professor in the Department of War Studies at King’s College London and an Associate Professor of History at the U.S. Military Academy at West Point. Professor Gioe spent 23 years of active then reserve service working in the U.S. intelligence community, including analytical and operational roles in the FBI, CIA, DIA, and the Office of Naval Intelligence.
Professor Michael S. Goodman, BA(Hons), MA, PhD, FRHistS, is the former Head of War Studies and Professor of Intelligence and International Affairs at King’s College London. He is the official historian of the British Joint Intelligence Committee and also a Visiting Professor at the Norwegian Defence Intelligence School. He is a British army reservist and has spent many years seconded to the Cabinet Office and Ministry of Defence.
____________________
SYNOPSIS
The International Security and Intelligence (ISI) programme offers a unique opportunity to study with leading academics and practitioners. With a special emphasis on human intelligence, students will explore the role of the intelligence and security agencies, applying their enduring principles to cutting-edge problems. Participants will consider the 21st-century threat landscape from an historical perspective. We will explore, through a vast panoply of optics, the intelligence cycle, the competing claims of state secrecy, information operations, terrorism, the problems generated by the demand for regional security, and the security aspects of digital revolutions. Intelligence collection, analysis of the product, and its dissemination to customers remain at the core of the intelligence cycle. Counterintelligence and covert action play more opaque but still vital roles at the heart of the nation state and international alliances. Understanding these perspectives on what intelligence can achieve, but also its limitations, are major course themes.
Setting the tone and direction of the programme will be a series of outstanding guest lectures covering a broad spectrum of contemporary intelligence and security challenges. Speakers in recent years have included practitioners – the Heads of MI5, MI6, and GCHQ; the Chief Judge to the Appeals Court of the United States Armed Forces, and the CIA Deputy Director for Operations – and leading academics working in the field of intelligence and security studies.
The multitude of threats facing Western democracies is diverse, and the issues which preoccupy the highest levels of government will be discussed and analysed. With its emphasis on contemporary and future challenges and practice, this is a programme which will appeal to those with an academic or professional interest in intelligence and contemporary threats.
This syllabus describes the:
- Aims of the programme
- Learning outcomes
- Teaching methods
- Assessment methods
- Class details and reading
____________________
AIMS OF THE PROGRAMME
- To promote a multidisciplinary understanding of concepts, issues, and debates regarding intelligence and national security issues more broadly.
- To encourage reflection on the meaning, value, and nature of intelligence and types of intelligence as evidence and bases for action.
- To encourage an understanding of the interactive processes of assessment and analysis.
- To foster conscious critical reading and discussion of issues concerning information, intelligence, policy, and action.
- To promote an understanding of scholarly activity in relation to intelligence.
- To foster an appreciation of intelligence skills and tools for understanding future developments.
- To foster understanding and application of a range of transferable intellectual and study skills – communication, listening, and teamwork.
THE PROGRAMME WILL PARTICULARLY APPEAL TO
Students and practitioners with an intellectual or professional interest in statecraft and the interlocking themes of intelligence, security, defence, and foreign policy.
LEARNING OUTCOMES
- Familiarity with key concepts in intelligence.
- Understanding of the variety of factors affecting the collection, processing, and use of information.
- Command of key concepts such as human intelligence, counterintelligence, signals intelligence, assessment and analysis, and information operations.
- Understanding of intelligence as both a challenge to and a support of international order.
- An understanding of different approaches to intelligence in history and other forms of social science.
- Knowledge and understanding of intelligence and security in relation to specific empirical cases.
- The problems and possible practical solutions to issues of intelligence, war, and security.
- To have contributed to and participated in the formation of co-learning, investigating and assessing the relevance and relationship of intelligence to future developments in policy and practice.
- Development of career and employability skills.
____________________
TEACHING METHODS
At the core of the programme are a series of key theme lectures covering a broad spectrum of contemporary intelligence and security challenges. Each lecture has a number of corresponding small-group seminars led by the lecturer where these key themes are debated and discussed. All teaching is conducted with strict adherence to the ‘Chatham House Rule,’ which all students must respect (when a meeting is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed).
KEY THEME LECTURES AND SEMINARS
*Please note the Lecture titles and order may be subject to change. These will be reflected on Moodle and in the Timetable.
1. The ISI Introduction to Intelligence Studies
This, the first lecture, considers the historiography of intelligence and the development of intelligence studies as a distinct field of academic inquiry. Guidance will be given on research methods, interpretative approaches, and analytical writing when exploring this exciting but challenging field. Required readings (in advance) are:
– Tony Paterson (2014), ‘Germany to spy on US for first time since 1945 after ‘double agent’ Scandal,’ The Independent, July 7, https://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-first-time-since-1945-after-double-agent-scandal-9590645.html
– Michael Warner (2007), ‘Sources and methods for the study of intelligence,’ in Loch K. Johnson (eds.), Handbook of Intelligence Studies (London), pp.17-27.
– David V. Gioe (2017), ‘The History of Fake News,’ The National Interest, July 1, https://nationalinterest.org/feature/the-history-fake-news-21386
– Widget Finn (2014), ‘Why Intelligence Studies are a Smart Career Move,’ iNews, February 19.
2. The British Approach to Intelligence
Here we will examine the ways in which the British intelligence community has developed what can be seen as a specific, characteristic approach towards its work over time and in response to the changing nature of the threats it has encountered. Required readings (in advance) are:
– Michael S. Goodman (2016), ‘Creating the Machinery for Joint Intelligence: The Formative Years of the Joint Intelligence Committee, 1936-1956,’ International Journal of Intelligence and Counterintelligence, 30:1 (November), pp.66-84.
– Lawrence J. Lamanna (2007), ‘Documenting the Differences Between American and British Intelligence Reports,’ International Journal of Intelligence and Counterintelligence, 20:4 (August), pp.602-628.
– Jack Davis (1991), ‘The Kent-Kendall debate of 1949,’ National Archives Catalog, (Summer), https://catalog.archives.gov/id/7283329
– ‘A Strong Britain in an Age of Uncertainty: The National Security Strategy,’ Gov.uk, October 2010, https://www.gov.uk/official-documents
– Richard K. Betts (2008), ‘Policy-makers and Intelligence Analysts: Love, Hate or Indifference?’ Intelligence and National Security, 3:1 (January), pp.184-189.
3. Human Intelligence and Operational Tradecraft
This lecture uses a Cold War case study to illuminate the potential and pitfalls of humans as intelligence agents. We will focus on intelligence collection, counter-intelligence, and agent security – timeless tradecraft issues. Required readings (in advance) are:
– Randy Burkett (2013), ‘An alternative Framework for Agent Recruitment: From MICE to RASCLS,’ Studies in Intelligence, 57: 1 (Extracts, March), pp.7-17.
– Espionage and Other Compromises of National Security: Case Summaries from 1975- 2008, Defense Personnel Security Research Center (November 2009), http://www.dhra.mil/perserec
– David V. Gioe (2017), ‘The More Things Change’: HUMINT in the Cyber Age,’ in R. Dover et al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London: Routledge), pp. 211-225.
– John Sano (2014), ‘Guide to the Study of Intelligence: The Changing Shape of HUMINT,’ Association of Former Intelligence Officers Intelligencer Journal (November).
– Jason Matthews (2013), ‘The Spy Who Turned Me,’ The Wall Street Journal, May 31, https://www.wsj.com/articles/SB10001424127887324412604578513371283582676
– Kate Brannen (2015), ‘To Catch a Spy,’ Foreign Policy, April 6, https://foreignpolicy.com/2015/04/06/to-catch-a-spy-biometrics-cia-border-security/
4. Surprise Attack and Warning Failures
Here we will consider classic examples of surprise attacks, including the Soviet invasion of Czechoslovakia in 1968 and the Argentine invasion of the Falkland Islands in 1982, and will identify some of the general lessons that emerge from them. We will consider whether there are ways to remedy the failures apparently inherent in intelligence work.
– James J. Wirtz (2013), ‘Indications and Warning in an Age of Uncertainty,’ International Journal of Intelligence and Counterintelligence, 26:3 (May 20), pp. 550-562.
– Michael I. Handel (2008), ‘Intelligence and the problem of strategic surprise,’ Journal of Strategic Studies, 7:3 (January 24), pp. 229-281.
– Mark A. Jensen (2012), ‘Intelligence Failures: What Are They Really and What Do We Do About Them?’ Intelligence and National Security, 27:2 (April 27), pp. 261-282.
– Michael S. Goodman (2007), ‘The Dog That Didn’t Bark: The Joint Intelligence Committee and Warning of Aggression,’ Cold War History, 7:4 (November 1), pp. 529-551.
– Richard K. Betts (1978), ‘Analysis, War and Decision: Why Intelligence Failures Are Inevitable,’ World Politics, 31:1 (October), pp. 61-89.
5. Intelligence Liaison
The focus here is on intelligence sharing, exploring the nature and importance of, and obstacles to, liaison between specific intelligence agencies and between international communities.
– Michael S. Goodman (2015), ‘The Foundations of Anglo-American Intelligence Sharing,’ Studies in Intelligence, 59:2 (June), pp. 1-12.
– Arthur S. Hulnick (2008), ‘Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?’, International Journal of Intelligence and Counterintelligence, 5:4 (January 9), pp.455-465.
– Patrick F. Walsh and Seumas Miller (2015), ‘Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden,’ Intelligence and National Security, 31:3 (January 22), pp.345-368.
– John Cary Sims (2010), ‘THE BRUSA AGREEMENT OF MAY 17, 1943’, Cryptologia, 21:1 (June 4), pp. 30-38. https://doi.org/10.1080/0161-119791885742.
6. Intelligence, Ethics and Accountability
This session will look at issues related to ethics and accountability and will consider how we might balance questions of morality and legality. It will also look at the evolution of various different national approaches to oversight and accountability.
– Michael M. Andregg and Peter Gill (2014), ‘Comparing the Democratization of Intelligence,’
Intelligence and National Security, 29:4 (July 10), pp. 487-497.
– Jennifer Kibble (2010), ‘Congressional Oversight of Intelligence: Is the Solution Part of the
Problem?’ Intelligence and National Security, 25:1, pp. 24-49.
– Ian Leigh (2012), ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11,’ Intelligence and National Security, 27:5, pp.722-738.
– Claudia Hillerbrand (2012), ‘The Role of New Media in Intelligence Oversight,’ Intelligence and National Security, 27:5 (October 5), pp. 689-706.
7. Assassination, Covert Action and Political Theatre
Is Assassination a form of covert action? A form of political theatre? Who is the audience? Who is the messenger? Is it an oxymoron to have a deniable political assassination?
– David V. Gioe, Michael S. Goodman & David S. Frey (2019), ‘Unforgiven: Russian Intelligence Vengeance as Political Theater and Strategic Messaging,’ Intelligence and National Security, 34:4, 561-575. (See PDF provided)
– Adrian Hänni and Miguel Grossman (2020), “Death to Traitors? The Pursuit of Intelligence Defectors from the Soviet Union to the Putin Era,” Intelligence and National Security, 35:3, pp. 403-423. (See PDF provided)
– Rory Cormac and Richard J. Aldrich (2018), ‘Grey is the New Black: Covert Action and Implausible Deniability,’ International Affairs, 94:3, pp. 477-494. (See PDF provided)
– David V. Gioe and Michael S. Goodman (2017), ‘The Intelligence Costs of Underestimating Russia: A Warning from History,’ War on the Rocks, March 31, https://warontherocks.com/2017/03/the-intelligence-costs-of-underestimating-russia-a-warning-from-history/
8. HUMINT in the Digital Age
The session will be on whether / how HUMINT can adapt (or be adapted) to the digital/cyber age, but the seminar will be a case study on 9/11 and intelligence failure through an exercise examining primary source documents.
– Malcolm Gladwell (2003), ‘Connecting the Dots,’ The New Yorker, March 2, https://www.newyorker.com/magazine/2003/03/10/connecting-the-dots.
– David V. Gioe (2018), ‘Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence,’ Intelligence and National Security, 33:7, pp.954-973.
– David V. Gioe (2017), ‘The More Things Change’: HUMINT in the Cyber Age,’ in R. Dover et al. (eds.), The Palgrave Handbook of Security, Risk and Intelligence (London: Routledge), pp.211-225. (PDF provided in resources)
– Stephen Marrin (2011), ‘The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis,’ Intelligence and National Security, 26:2 (May 20), pp.182-202.
9. Treachery – a framework for the assessment of the damage wrought by betrayal.
Cambridge University has produced its fair share of spies and traitors – not least the famous Cold War Five. Were any of these more outstandingly treacherous than Edward Snowden? We will look at the claims of these and others to the title of ‘the greatest traitor ever.’
– Andrew Higgins (2017), ‘Even in Death, the Spy Kim Philby Serves the Kremlin’s Purposes,’ The New York Times, October 1, https://www.nytimes.com/2017/10/01/world/europe/russia-kim-philby-spy-defector.html
– Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden (2016), U.S. House of Representatives, Permanent Select Committee on Intelligence, September 15, https://www.hsdl.org/?abstract&did=797546
– Malcolm Gladwell (2014), ‘Trust No One: Kim Philby and the hazards of mistrust’, New Yorker, July 28, https://www.newyorker.com/magazine/2014/07/28/philby
– Eric A. Posner (2013), ‘Before you Reboot the NSA, Think About This: The Paradox of reforming the security-industrial complex,’ New Republic, November 6, https://newrepublic.com/article/115291/rahul-sagars-secret-leaks-reviewed-eric-posner
– David V. Gioe (2014), ‘Tinker, Tailor, Leaker, Spy: The Future Costs of Mass Leaks,’ The National Interest, January 7, https://nationalinterest.org/article/tinker-tailor-leaker-spy-the-future-costs-mass-leaks-9644
RESEARCH METHODS LECTURE
Each supervisor delivers a ‘methods lecture’ designed to focus on their current research area of expertise, focusing on the findings but also paying close attention to the nature of the research and associated methodological concerns.
Recent methods lectures have included the following titles:
– Intelligence Cooperation and Security Assistance in the Global South
– The Future of the State in the Middle East
– Intelligence History: from Spies to Said
– Legal and Ethical Dilemmas of Targeted Killing
____________________
ISI offers an integrated programme of lectures, seminars, supervisions, and conference which all participants will be expected to attend. The programme consists of two tracks: Track I – Independent Supervised Research and Track II – Topics in International Security and Intelligence, detailed below. Participants of the ISI summer programme will take both tracks and be assessed on their performance in each.
TRACK I: INDEPENDENT SUPERVISED RESEARCH
ISI participants will follow a research track exploring in detail a particular security or intelligence theme through a series of ‘supervisions.’ Supervisions, central to Cambridge teaching and learning, bring together a small group of students under the guidance of an expert in the field to conduct research-based work, culminating in the production of an extended essay of 3,500 words. Applicants to ISI will submit a supervision proposal as part of their application. If admitted, will be allocated to a supervision group to undertake a tailored, in-depth study of their chosen security or intelligence theme guided by a CSi expert. Each group meets for five x 1.25hrs sessions backed up by office hours.
The following are previous research topics which students are encouraged to bear in mind before they submit their proposals. While we endeavour to accommodate proposals that fall outside these areas, students are encouraged to take account of the broad subject areas. The Programme Directors may, if necessary, suggest ways in which your topic might be refined or focused.
Recent Research Topics:
- Science and Security, i.e., Pandemics and Nuclear Proliferation
- Human Intelligence / the U.S. and UK intelligence communities
- Cyber and information operations
- Regional security topics covering the Middle East, Africa, and Asia
- Islamist and other extremist terrorism and violent non-state actors
- Intelligence analysis, liaison, oversight, policymaking, and accountability
- Russian and European security and intelligence issues
- Security cooperation (especially in the Global South)
Supervision group allocations are made in the weeks leading up to the programme once fees have been paid in full.
Example essay titles include:
- Dangerous, Fanatical, Fantasists: Conspiracy and Government in the Assassination of John F. Kennedy
- How Should the UK Deal with Captured British Islamic State Foreign Terrorist Fighters?
- Is Clandestine Diplomacy Compatible with Liberal Democratic Values of Transparency and Accountability?
- Is NATO’s eFP a Successful Countermeasure to Russian Hybrid Warfare?
TRACK II: TOPICS IN INTERNATIONAL SECURITY AND INTELLIGENCE
The central themes of the programme are explored through core lectures and seminars given by ISI faculty.
Key themes include:
- The role of intelligence and security agencies
- The 21st century threat landscape in an historical perspective
- The intelligence cycle
- Transparency, oversight, and competing claims of state secrecy
- Information operations
- Terrorism and conventional warfare
- Topics in regional security
- The security implications of digital revolutions
Intelligence collection, analysis, and dissemination remain at the core of the intelligence cycle while counter-intelligence and covert action play more opaque but still vital roles at the heart of the nation-state and international alliances. Understanding what intelligence can achieve, and its limitations, will be major themes for analysis and discussion and will be further explored at the annual conference.
The total contact time is a minimum of 50 hours.
ISI uses Moodle, an online learning platform, where the Independent Research Project is uploaded, the timetable can be accessed, and resources can be downloaded.
THE CSI CONFERENCE
Entitled Intelligence and Security in the Changing World, the conference programme is built around a series of lectures and panel discussions. The range of topics and quality of speakers makes this a unique opportunity for ISI students to hear, question and interact with those who have worked at the highest levels in the fields of Intelligence and Security.
Additional information, including past conference brochures, can be found here.
ASSESSMENT AND CREDIT
TRACK I
All participants submit a 3,500 essay having completed Independent Supervised Research. This essay will be assessed and graded, and the grade will appear on the transcript.
TRACK II
Participants are not routinely assessed on their performance in Track II. However, students who are in full-time education can apply for formal assessment. Assessment will take the form of a written report on the 2023 Conference and an exam taken towards the end of the fourth week of the programme. Students opting for such an assessment must follow any application process required by their university and ensure that they discuss transferring credit with their academic advisors before the start of ISI. ISI will provide a transcript and syllabus to help students applying to receive credit and can be contacted by your registrar via email (isioperations@thecsi.org.uk) if further information is required. All applications for assessment in Track II must be made by 22nd June 2025.
The ISI programme is a rigorous and intensive summer study course, founded on Cambridge University’s approaches to teaching and learning. Contact time is in excess of 50 hours over the 4-week programme and students are expected to undertake significant amounts of preparatory reading/research. We recommend that students wishing to apply for transfer credit engage with their home university upon acceptance in order to ascertain a credit value in accordance with that university’s policies and expectations. All participants successfully completing ISI – by submitting their extended essay – will receive a transcript, in mid-September, showing their grade expressed as a % and a letter (A – E) together with grading guidance notes. All work is assessed in relation to the mark schemes produced by the Department of War Studies at King’s College London. Students currently enrolled in a BA degree course will be marked using the BA standard marking criteria; MA students will be marked using the MA grading criteria. Students who are not in full-time education will be assessed in relation to their highest completed degree level.
CAMBRIDGE | % | U.S. EQUIVALENT |
First | 80-85 | A+ |
70-79 | A | |
Upper Second | 65-69 | A- |
60-64 | B+ | |
Lower Second | 55-59 | B |
50-54 | B- | |
Pass | 45-49 | C+ |
40-44 | C |
ISI 2025 grades will be issued on Friday 5th September 2025.
Transcripts will be issued on Friday 19th September 2025.
Suggested Reading List for Intelligence Studies
Any of the following volumes provide excellent introductions to the field of Intelligence Studies. Students may wish to explore these works to enhance their understanding of key intelligence terms, debates, and historical developments prior to the beginning of the ISI Programme.
General Introductions and Core Texts
- Rob Dover, Michael S. Goodman, and Claudia Hillebrand (eds.), The Routledge Companion to Intelligence Studies (Routledge, 2013) – An excellent starting point, with chapters covering the intelligence cycle, key debates, and comparative systems.
- Rob Dover, Huw Dylan, and Michael S. Goodman (eds.), The Palgrave Handbook of Security, Risk and Intelligence (Palgrave, 2017).
- Loch K. Johnson, Handbook of Intelligence Studies (Routledge, 2009).
- Loch K. Johnson (ed.), The Oxford Handbook of National Security Intelligence (OUP, 2010) – A highly useful and wide-ranging collection of essays, available in hard copy and as an eBook via the library.
- Mark M. Lowenthal, Intelligence: From Secrets to Policy (6th ed., CQ Press, 2016 – earlier editions are also suitable).
- Michael Herman, Intelligence Power in Peace and War (Routledge, 1996) – A foundational text for understanding intelligence from a theoretical and institutional perspective.
- Michael Herman & David Schaefer, Intelligence Power in Practice (Edinburgh University Press, 2023).
- Robert Dover, Huw Dylan & Michael S. Goodman (eds.), A Research Agenda for Intelligence Studies and Government (Edward Elgar Publishing, 2022).
Historical Perspectives
- Christopher Andrew, Richard J. Aldrich, and Wesley K. Wark (eds.), Secret Intelligence: A Reader (Routledge, 2009) – Also published as a 2008 edition; both versions offer a comprehensive collection of foundational documents and commentary.
- Richard J. Aldrich, Rory Cormac, and Michael S. Goodman, Spying on the World: The Declassified Documents of the Joint Intelligence Committee, 1936–2013 (Edinburgh University Press, 2014).
- David Omand, Securing the State (Penguin, 2010 & 2012) – Informed by a long career in public service, this volume offers a practitioner’s insight into modern intelligence and national security.
- Richard K. Betts, Enemies of Intelligence: Knowledge and Power in American National Security (Columbia University Press, 2007).
- Abram Shulsky & Gary J. Schmitt, Silent Warfare: Understanding the World of Intelligence (3rd, Potomac Books, 2002 – earlier editions are also useful).
- Betts, R. and Mahnken, T.G. (eds.), Paradoxes of Strategic Intelligence (Routledge, 2003) – Addresses strategic dilemmas relevant to intelligence assessment and policymaking.
- Len Scott and Peter Jackson (eds.), Understanding Intelligence in the Twenty-First Century (Routledge, 2004).
Contemporary Issues and Emerging Fields
- Calder Walton, Spies: The Epic Intelligence War Between East and West (Abacus, 2023).
- Amy Zegart, Spies, Lies, and Algorithms: The History and Future of American Intelligence (Princeton University Press, 2022).
- Jennifer E. Simms, Decision Advantage: Intelligence in International Politics from the Spanish Armada to Cyberwar (Oxford University Press, 2022).
- Herbert Lin & Amy B. Zegart (eds.), Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations(Brookings Institution Press, 2018).
- Kerry Patton, Sociocultural Intelligence: A New Discipline in Intelligence Studies (Continuum, 2010).
Specialised Topics and Case Studies
- Peter Gill & Mark Phythian, Intelligence in an Insecure World: Surveillance, Spies and Snouts (Polity, 2006 – multiple editions).
- James I. Walsh & Lawrence Freedman, The International Politics of Intelligence Sharing (Columbia University Press, 2010).
- Thomas L. Ahern, Vietnam Declassified: The CIA and Counterinsurgency (University Press of Kentucky, 2009).
- Huw Dylan & Thomas Maguire, ‘Secret Intelligence and Public Diplomacy in the Ukraine War’, Survival, Vol. 64, No. 4 (2022), pp. 33–74.
- Daniela Richterova, Watching the Jackals: Prague’s Covert Liaisons with Cold War Terrorists and Revolutionaries, foreword by Christopher Andrews (Georgetown University Press, 2025).
Study Skills
- The Research Process: A Short Guide for Undergraduate Students – A brief but helpful guide to academic research and writing.
Suggested Online Resources and Media
- UNREDACTED: The National Security Archive Blog – http://nsarchive.wordpress.com
- org: News and Analysis on Intelligence and Espionage – http://intelnews.org
- SpyCast (International Spy Museum) – http://www.spymuseum.org/multimedia/
- Sources and Methods Blog – http://sourcesandmethods.blogspot.co.uk