To support you and your education, BCIT is adapting applied learning in formats
appropriate to the unfolding global situation. Spring PTS classes are commencing with
learning delivered in an online format.
This course is designed to expose students to a wide range of analytical techniques that are essential to protecting the interests of national security. Students will conduct the applied research and use advanced analytical methods to prepare collection plans and threat assessments on individuals or groups who pose a threat to national security. The course also examine the use advanced data mining tools, techniques and methods to expose and to determine the scope, nature and impact of their threat to national security, law and order.
This course isn't currently offered through BCIT Part-time Studies. Please check back next term or subscribe to receive email updates.
Upon successful completion, the student will be able to:
Explain the role, application and potential of intelligence analysis in safeguarding and advancing national security interests.
Define terrorism, explain the differences between criminals and terrorism and account for the various forms of terrorism in existence today.
Profile terrorist and extremist subjects and groups, detail their modus operandi and philosophy and learn how to disseminate information to national security and law enforcement agencies.
Examine the importance of open source intelligence in addressing terrorism. Apply knowledge of Internet-based and open-source research to collect, collate and analyze multiple sources of information from free and fee-based information vendors.
Reveal terrorist and extremist cells using data mining software (i2 Analyst's Notebook, Online iLink and Text Chart and partners: Dunn & Bradstreet and LexisNexis SmartLinx,). Students will build on their familiarity with i2 products by analyzing high volume data and employing advanced techniques such as clustering and network analysis.
Employ i2 Text Chart to collect unstructured, text-based data for conversion into a structured graphic format. Utilize i2 Text Chart with iBase and i2 Analyst's Notebook to visualize information in reports, keep track of salient facts across multiple documents, focus on the most relevant data, and identify missing or erroneous details and share information with other agencies.
Analyze disparate text-based data from online information vendors (i.e., Dunn & Bradstreet & LexisNexis) using Online iLink to generate leads or reveal evidentiary linkages on known or suspected terrorist and extremist cells.
Interpret analytical findings relating to national security, law and order.
Prepare threat and vulnerability assessments on individuals, terrorist groups and extremist cells that pose a threat to government and society.
Effective as of Spring/Summer 2006
FSCT 8482 is offered as a part of the following programs:
Interested in being notified about future offerings of FSCT 8482 - National Security Analysis?
If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.