Accueil > Intelligence and technology


Type d'enseignement : Seminar

Semester : Spring 2017-2018

Number of hours : 24

Language of tuition : English

Voir les plans de cours et bibliographies


Interest in security and intelligence studies, new technologies and readiness to go beyond classical intelligence analysis frameworks and dive into an interdisciplinary approach would be an asset.

Course Description

This course seeks to examine the introduction of advanced technologies, data analytics and artificial intelligence (AI) in the field of intelligence. After designing an analytical framework, students will learn how the ongoing development of software-based technologies, information and communication technologies (ICTs), big data and artificial intelligence (AI) lead to a paradigm shift in intelligence knowledge, decision-making and operations. More specifically, they will learn how open source intelligence (OSINT), digital communications intelligence, metadata intelligence, geospatial intelligence, sensor-based intelligence, biometrics, artificial intelligence and big data expand intelligence into new areas, which did not constitute its immediate gaze. Drawing on case studies, this course will provide students with basic technological, analytic, critical and practical knowledge to: 1) define a framework for analyzing the intelligence & technology nexus, 2) assess the relevance of the technological solutions for intelligence and analyze their impact, 3) examine the new issues they generate especially in light of the revelations on global mass surveillance and recent terrorist attacks.


CEYHAN, Ayse (consultante)

Pedagogical format

Professor lectures. Reading material discussion, case studies and group working. 2 in-class written tests (dates will be provided).

Course validation

Mandatory readings and class participation (20 % of the final grade). This course is designed to allow active student involvement placing great attention on their contribution. Your active participation is welcome and will be facilitated through case studies. Two in-class tests (30%) to assess the level of the knowledge acquired. Tests are not essays, but only an assessment of the knowledge you acquired in class. Final paper (50%). Topics will be distributed.


No exposé. Reading technical, conceptual and empirical materials. Class participation through case studies and discussions. Final paper.

Required reading

  • A. Ceyhan, 2008, “Technologization of Security: Management of Uncertainty and Fear in the Age of Biometrics”, Surveillance & Society, no 5(2)
  • M. Dunn Cavelty and V. Mauer, 2010, “Postmodern Intelligence: Strategic Warning in an Age of Reflexive Intelligence”, Security Dialogue, 40 (2): 123-144
  • L.D. Introna and Wood D. 2004. “Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems, Surveillance & Society, 2(2/3): 177-198
  • P.O'Neil, “Complexity and Counterterrorism: Thinking about Biometrics”, 2005, Studies in Conflict and Terrorism, 28: 547-566
  • S.Singh, “Cracking the Enigma”, 1999 in S.Singh, The Code Book, New York, Anchor Books

Additional required reading

  • Z.Bauman, 2000, Liquid Modernity, London Polity Press
  • G.Correra, 2015, Intercept: The Secret History of Computers and Spies, LondonWeidenfield and Nicolson
  • J.C. Cousseran and P.Hayez (2015), Renseigner les démocraties, - renseigner en démocratie, Paris, Odile Jacob
  • D. R, Goodman and M.S., Hillbrand C, 2014, Routledge Companion to Intelligence, Routledge
  • P;Gill and M. Phytian, 2012, Intelligence in an Insecure World, Polity
  • D. Lyon, 2015, Surveillance after Snowden, London, Polity
  • R.M. Clark, 2010, The Technical Collection of Intelligence, CQ Press
  • T.Graham Jr and K.Hansen, 2007, Spy Satellites and other Intelligence Technologies that Changed History,, University of Washington Press
  • D. MacKenzie and J. Wajcman (eds.), 1999, The Social Shaping of Technology, Open University Press (second edition)
  • E. Morozov, 2013, To Save Everything Click Here: the Folly of Technosolutionism, Public Af, New York, Fairs Edition
  • S.Singh, The Code Book, 1999, Anchor Books
  • The Oxford Handbook of National Security Intelligence (2010), Oxford University Press
  • L. Winner, « Do Artifacts Have Politics? » 1980 (Winter), Daedalus, Vol. 109, No. 1, pp. 121-136

Plans de cours et bibliographies