HSEC 360 Intelligence and National Security

HSEC 360 Intelligence and National Security

1. This is an open-book, take-home exam. You may use whatever resources you wish
to answer the question. There are five (5) questions.
2. Your answers must be based on evidence. If you use outside resources, you MUST
properly cite them. Use whatever citation format you are comfortable with. You may
use the footnote function in WORD.
3. You must prepare the test using WORD. Submit the completed test through
Turnitin on Blackboard. There are no exceptions to this rule.
4. The test is due NO LATER THAN midnight, Monday 12 December 2022 based on
the time-stamp provided by Turnitin. Make sure that your submission is properly
uploaded, and that you retain a receipt in case of a discrepancy. There are no
exceptions to this rule.
5. The answer to EACH question must be AT LEAST 325 words long, in Times New
Roman, 12 pitch. Failure to meet the minimum standard will result in a decrease of one
letter grade for each answer that does not meet standards.
6. The objective of the test is for you to display your ability to analyze and synthesize
the material we have discussed in class over the semester. Take time to think about
how you want to answer the question.
7. The more complete and thorough your answers, the better the grade. Try to consider
ALL aspects of the question.
8. Read the question thoroughly and make sure you answer ALL parts of the
question. Answer the question as written, not the question you want to answer.
9. The more detail and specific examples you can provide in your answers the greater
the likelihood of a good grade.

 

EXAM QUESTIONS
1. What is OSINT? How does it differ from other intelligence disciplines? How is OSINT being used in the Russian war in Ukraine? What are the limitations of OSINT? Provide specific examples.

2. Draw the intelligence cycle and describe the major elements. How do they relate to each other? What are the criticisms of the intelligence cycle?

3. In what way do intelligence requirements represent the needs of decision-makers? Who contributes to the creation of intelligence requirements? How are intelligence requirements related to resources? Provide specific examples.

4. What are covert operations? How are covert operations in the US approved? Name the various types of covert action? How relevant are the types of covert operations conducted during the Cold War (1950 – 1989) to the current international environment? Provide specific examples.

5. Is the policy maker part of the intelligence process (policy-maker a euphemism for any intelligence customer)? How do policy-makers interact with the intelligence community? Do policy-makers have a right to question analysts about their findings? Explain. Provide specific examples.