dc.contributor.author | Vickers, Robert | |
dc.coverage.temporal | Fall 2005 | |
dc.date.accessioned | 2023-03-06T16:27:04Z | |
dc.date.available | 2023-03-06T16:27:04Z | |
dc.date.issued | 2005-12 | |
dc.identifier | 17.908-Fall2005 | |
dc.identifier.other | 17.908 | |
dc.identifier.other | IMSCP-MD5-b9b269fed7cc8433c3e6de72261b459a | |
dc.identifier.uri | https://hdl.handle.net/1721.1/148306 | |
dc.description.abstract | This course will examine the origins, structure and functions of the U.S. Intelligence Community and its relationship to national security policy. It will look in some detail at the key intelligence agencies and the functions they perform, including collection, analysis, counterintelligence and covert action. It will also look at some of the key intelligence missions, such as strategic warning, counterterrorism, counterproliferation, and counterinsurgency. Finally, it will examine some of the major controversies concerning intelligence, including its successes and failures, relationship to policymakers, congressional oversight, and the need for reform. | en |
dc.language.iso | en-US | |
dc.rights | This site (c) Massachusetts Institute of Technology 2023. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions. | en |
dc.rights | Attribution-NonCommercial-ShareAlike 3.0 Unported | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | * |
dc.subject | Political science | en |
dc.subject | natioanl security | en |
dc.subject | origins | en |
dc.subject | structure | en |
dc.subject | functions | en |
dc.subject | U.S. | en |
dc.subject | Intelligence | en |
dc.subject | Community | en |
dc.subject | national security policy | en |
dc.subject | intelligence agencies | en |
dc.subject | collection | en |
dc.subject | analysis | en |
dc.subject | counterintelligence | en |
dc.subject | covert action | en |
dc.subject | strategic warning | en |
dc.subject | counterterrorism | en |
dc.subject | counterproliferation | en |
dc.subject | counterinsurgency | en |
dc.subject | controversies | en |
dc.subject | policymakers | en |
dc.subject | congressional oversight | en |
dc.subject | reform | en |
dc.title | 17.908 Reading Seminar in Social Science: Intelligence and National Security, Fall 2005 | en |
dc.title.alternative | Reading Seminar in Social Science: Intelligence and National Security | en |
dc.type | Learning Object | |
dc.contributor.department | Massachusetts Institute of Technology. Department of Political Science | |
dc.audience.educationlevel | Undergraduate | |
dc.subject.cip | 451001 | en |
dc.subject.cip | Political Science and Government, General | en |
dc.subject.cip | 450901 | en |
dc.subject.cip | International Relations and Affairs | en |
dc.date.updated | 2023-03-06T16:27:11Z | |