Syllabus for HLS-615



This course acquaints students with a several concepts and practices that are necessary for collecting, analyzing and evaluating intelligence and managing the intelligence as a function. It also explores the influence of intelligence on shaping homeland security executive decision-making at the international, federal, state, and local levels. This course examines the structures, roles, and interactions of the foreign and domestic intelligence communities, the intelligence gathering and analysis capabilities of criminal justice and private sector entities, and the use of intelligence processes to support homeland security investigations, planning, and policy formulation. Through the study of current and past homeland security events, students in this course will develop an understanding of the intelligence tradecraft, analytic, and research skills required for intelligence work. This course also explores the ethical, Constitutional, and civil liberties issues associated with the collection of information by homeland security agencies. Also examined are topics related to assessing the reliability and validity of information, intelligence sharing, covert and counterintelligence operations of domestic and international intelligence agencies.


  1. Information intelligence gathering, evaluating and interpreting
  2. Criminal activity related to terrorism
  3. Enhancing global and domestic terrorism investigations
  4. Data tools and forms of analysis that can be used to identify/investigate terrorism
  5. Understanding the past to prevent threats, resources, and motives of terrorism
  6. Global and domestic recruiting efforts of terrorism
  7. The involvement of prisons and gangs with terrorism
  8. Analytical and investigating variables with global and domestic terrorism
  9. Terrorism vulnerability and risk assessment
  10. Transportation terrorism and the several threat agents
  11. Domestic and global forms of terrorism influence
  12. The means used to support terrorism
  13. Cyber and Bioterrorism
  14. The role of technology in intelligence and information collecting
  15. Use of electronic mail and internet protocols used to collect information


After completing this course, you should be able to:

  1. Examine the intelligence analysis of terrorism, homeland security, forms of terrorism, and community intelligence
  2. Illustrate methods for collecting, investigating, reporting, sharing, and analyzing information
  3. Outline investigative tools relating to collaboration between law enforcement and intelligence agencies as it pertains to fusion centers and source development
  4. Audit various sources of open source information, vectors to renovate collected information into intelligence to include threat and risk assessments with geographic and considerations
  5. Confirm and dissect global and domestic lessons learned as it pertains to terrorism recruiting, communication, and today’s modern street terrorism.
  6. Evaluate cyber-terrorism, and transportation, transportation terrorism, foreign-based terrorism influence, and bioterrorism
  7. Identify and Differentiate online communities, documents, photographs, websites, internet protocols, social networking, government records, and technology as an accelerator for information sharing and collecting.


You will need the following materials to do the work of the course. The required textbook is available from the University’s textbook supplier, MBS Direct, at

Required Textbook


Domestic and Global Intelligence for Security Management  is a three-credit online course, consisting of five  modules. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.


For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, take a proctored midterm examination, and complete a final project. See below for details.

Consult the Course Calendar for due dates.

Discussion Forums

You are required to participate in six Discussion Forums.

Written Assignments

You are required to complete four written assignments. The written assignments are on a variety of topics associated with the course modules.

Final Paper

You will be required to complete a 10-12 page paper written in accordance with APA guidelines. See the Final Paper section of the course website for additional information.


Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:


















Below 73

To receive credit for the course, you must earn a letter grade of C or higher on the weighted average of all assigned course work (e.g., assignments, discussion postings, projects, etc.). Graduate students must maintain a B average overall to remain in good academic standing.


First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:


Thomas Edison State University is committed to maintaining academic quality, excellence, and honesty. The University expects all members of its community to share the commitment to academic integrity, an essential component of a quality academic experience.

Students at Thomas Edison State University are expected to exhibit the highest level of academic citizenship. In particular, students are expected to read and follow all policies, procedures, and program information guidelines contained in publications; pursue their learning goals with honesty and integrity; demonstrate that they are progressing satisfactorily and in a timely fashion by meeting course deadlines and following outlined procedures; observe a code of mutual respect in dealing with mentors, staff, and other students; behave in a manner consistent with the standards and codes of the profession in which they are practicing; keep official records updated regarding changes in name, address, telephone number, or e-mail address; and meet financial obligations in a timely manner. Students not practicing good academic citizenship may be subject to disciplinary action including suspension, dismissal, or financial holds on records.

All members of the University community are responsible for reviewing the Academic Code of Conduct Policy in the University Catalog and online at

Academic Dishonesty

Thomas Edison State University expects all of its students to approach their education with academic integrity—the pursuit of scholarly activity free from fraud and deception. All mentors and administrative staff members at the University insist on strict standards of academic honesty in all courses. Academic dishonesty undermines this objective. Academic dishonesty can take the following forms:


Thomas Edison State University is committed to helping students understand the seriousness of plagiarism, which is defined as using the work and ideas of others without proper citation. The University takes a strong stance against plagiarism, and students found to be plagiarizing are subject to discipline under the academic code of conduct policy.

If you copy phrases, sentences, paragraphs, or whole documents word-for-word—or if you paraphrase by changing a word here and there—without identifying the author, or without identifying it as a direct quote, then you are plagiarizing. Please keep in mind that this type of identification applies to Internet sources as well as to print-based sources. Copying and pasting from the Internet, without using quotation marks and without acknowledging sources, constitutes plagiarism. (For information about how to cite Internet sources, see Online Student Handbook > Academic Standards > “Citing Sources.”)

Accidentally copying the words and ideas of another writer does not excuse the charge of plagiarism. It is easy to jot down notes and ideas from many sources and then write your own paper without knowing which words are your own and which are someone else’s. It is more difficult to keep track of each and every source. However, the conscientious writer who wishes to avoid plagiarizing never fails to keep careful track of sources.

Always be aware that if you write without acknowledging the sources of your ideas, you run the risk of being charged with plagiarism.

Clearly, plagiarism, no matter the degree of intent to deceive, defeats the purpose of education. If you plagiarize deliberately, you are not educating yourself, and you are wasting your time on courses meant to improve your skills. If you plagiarize through carelessness, you are deceiving yourself.

For examples of unintentional plagiarism, advice on when to quote and when to paraphrase, and information about writing assistance and originality report checking, click the links provided below.

Examples of Unintentional Plagiarism

When to Quote and When to Paraphrase

Writing Assistance at Smarthinking

Originality Report Checking at Turnitin

Disciplinary Process for Plagiarism

Acts of both intentional and unintentional plagiarism violate the Academic Code of Conduct.

If an incident of plagiarism is an isolated minor oversight or an obvious result of ignorance of proper citation requirements, the mentor may handle the matter as a learning exercise. Appropriate consequences may include the completion of tutorials, assignment rewrites, or any other reasonable learning tool in addition to a lower grade for the assignment or course. The mentor will notify the student and appropriate dean of the consequence by e-mail.

If the plagiarism appears intentional and/or is more than an isolated incident, the mentor will refer the matter to the appropriate dean, who will gather information about the violation(s) from the mentor and student, as necessary. The dean will review the matter and notify the student in writing of the specifics of the charge and the sanction to be imposed.

Possible sanctions include:

Copyright © 2016 by Thomas Edison State University. All rights reserved.