TERRORISM AND COUNTERTERRORISM OCTOBER 1, 2014 DECEMBER 2, Course Syllabus. GeorgetownX

Size: px
Start display at page:

Download "TERRORISM AND COUNTERTERRORISM OCTOBER 1, 2014 DECEMBER 2, 2014. Course Syllabus. GeorgetownX"

Transcription

1 Course Syllabus GeorgetownX October 1, 2014 December 2, 2014

2 TABLE OF CONTENTS Core Faculty... 2 Interviews... 4 Faculty Support Team... 5 What is the course about?... 5 Key Questions... 6 What does the course include?... 6 Course Section Outline... 7 What will I learn in the course?... 8 What should we expect from each other?... 8 What you can Expect from Professor Byman and the course team... 8 What you can expect from edx... 9 What we expect from you... 9 Appendix A: Detailed Course Section Outline What is Terrorism and Who are the Terrorists (Release: October 1, 2014) Stratgies, Tactics, and Technology Use (Release: October 8, 2013) Al-Qaeda (Release: October 15, 2013) Islam (Release: October 22, 2013) Area Options (Release: October 29, 2013) Counterterrorism and The Rule of Law (Release: November 5, 2013) Intelligence and Counterterrorism (Release: November 12, 2013) Counterterrorism Instruments (Release: November 19, 2013) Appendix B: Learning Checklist What is Terrorism and Who Are The Terrorists? Section 1: October Strategies, Tactics, and Technology Use Section 2: October Al-Qaeda Section 3: October Islam Section 4: October Area Option 1: The Terrorist Threat to Israel and the Israeli Response Section 5: October 29-November 4 21 Area Option 2: Terrorism and Counterterrorism in South Asia Section 5: October 29-November Counterterrorism and the Rule of Law section 6: November Intelligence and Counterterrorism Section 7: November Counterterrorism Instruments Section 8: November Appendix C: Definition of Terms Handout of 37

3 GEORGETOWNX: WHAT IS THE DANGER OF TERRORISM, AND HOW CAN THE WORLD RESPOND EFFECTIVELY? NOTE: The course will be archived for the following duration: October 1, 2014 May 13, No certificates will be issued for work completed after December 2, CORE FACULTY DANIEL L. BYMAN Dr. Daniel L. Byman is the lead faculty member for this GeorgetownX course on terrorism and counterterrorism. He is a Professor in the Security Studies Program of the Walsh School of Foreign Service at Georgetown University and the Research Director of the Brookings Institution s Center for Middle East Policy. Dr. Byman served as a Professional Staff Member with the National Commission on Terrorist Attacks on the United States (the 9/11 Commission ) and the Joint 9/11 Inquiry Staff of the House and Senate Intelligence Committees. He also worked as the Research Director of the Center for Middle East Public Policy at the RAND Corporation and as a Middle East analyst for the U.S. intelligence community. Dr. Byman received his B.A. in religion from Amherst College and his Ph.D. in political science from the Massachusetts Institute of Technology. Follow JONATHAN BROWN Dr. Jonathan Brown is a Prince Alwaleed Bin Talal Professor of Islamic Civilization in the Center for Muslim- Christian Understanding at Georgetown University, a term member of the Council on Foreign Relations, Editorin-Chief of the Oxford Encyclopedia of Islamic Law, and publisher of several books and articles on the Hadith, Islamic law, Sufism, Arabic lexical theory and Pre-Islamic poetry. Dr. Brown's current research interests include the history of forgery and historical criticism in Islamic civilization, comparison with the Western tradition; and modern conflicts between Late Sunni Traditionalism and Salafism in Islamic thought. Dr. Brown received his B.A. in history from Georgetown University and his Ph.D. in near eastern languages and civilizations from the University of Chicago. LAURA K. DONOHUE Dr. Laura K. Donohue is a Professor at Georgetown Law and Director of Georgetown's Center on National Security & the Law. Dr. Donohue specializes in national security and counterterrorism law in the United States and United Kingdom, is a Life Member of the Council on Foreign Relations, and an Advisory Board Member of the Electronic Privacy Information Center. She formerly clerked for Judge John T. Noonan, Ninth Circuit Court of Appeals. Dr. Donohue obtained her A.B. with Honors from Dartmouth College, her M.A. with Distinction from the University of Ulster, her J.D. with Distinction from Stanford Law School, and her Ph.D. in History from the University of Cambridge. 2 of 37

4 JOHN ESPOSITO Dr. John Esposito is the Founding Director of the Prince Alwaleed Bin Talal Center for Muslim-Christian Understanding, Dr. Esposito specializes in Islamic studies, religion, and international affairs as a Professor at Georgetown University. His research is published in more than 45 books and monographs, including Unholy War: Terror in the Name of Islam and The Future of Islam, translated into over 35 languages. Past President of the Middle East Studies Association and the American Academy of Religion, a member of the E. C. European Network of Experts on De-Radicalisation, on the board of C-1 World Dialogue, an ambassador for the UN Alliance of Civilizations, Dr. Esposito is also Editor-in-Chief of Oxford Islamic Studies Online, The Oxford Encyclopedia of the Islamic World, and other Oxford reference works on the Islamic world and Islamic Studies. CHRISTINE FAIR Dr. C. Christine Fair is a Georgetown Security Studies Program Assistant Professor, where she focuses on South Asian political and military affairs. Dr. Fair previously worked at the RAND Corporation, United Nations Assistance Mission to Afghanistan in Kabul, and at USIP s Center for Conflict Analysis and Prevention. She has as authored, co-authored and co-edited several books, is a member of the Council on Foreign Relations, Women in International Security, International Studies Association, American Political Science Association, and American Institute of Pakistan Studies. She serves on the editorial board of numerous journals, and is a senior fellow with the Combating Terrorism Center at West Point. Dr. Fair received her Ph.D. and M.A. from the University of Chicago. Her most recent book is Fighting to the End: The Pakistan Army s Way of War (Oxford University Press, 2014). Many of her other publications can be found at christinefair.net. BRUCE HOFFMAN Dr. Bruce Hoffman has been studying terrorism and insurgency for nearly four decades. He is a tenured professor in Georgetown University s Edmund A. Walsh School of Foreign Service where he is also the Director of both the Center for Security Studies and of the Security Studies Program. In addition, he is visiting Professor of Terrorism Studies at St. Andrews University, Scotland. Professor Hoffman previously held the Corporate Chair in Counterterrorism and Counterinsurgency at the RAND Corporation and was also Director of RAND s Washington, D.C. Office. He was recently appointed by the U.S. Congress to serve as a commissioner on the Independent Commission to Review the FBI s Post-9/11 Response to Terrorism and Radicalization. Professor Hoffman was Scholar-in-Residence for Counterterrorism at the Central Intelligence Agency between 2004 and 2006; an adviser on counterterrorism to the Office of National Security Affairs, Coalition Provisional Authority, Baghdad, Iraq in 2004, and from an adviser on counterinsurgency to the Strategy, Plans, and Analysis Office at Multi-National Forces-Iraq Headquarters, Baghdad. Professor Hoffman was also an adviser to the Iraq Study Group. He is the author of Inside Terrorism (2006). His forthcoming books, The Evolution Global Terrorist Threat: From 9/11 to Osama bin Laden s Death will be published in 2014, and Anonymous Soldiers: The Struggle for Israel, , in Follow DAVID KOPLOW Professor David Koplow has been a Georgetown Law faculty member since Professor Koplow specializes in the areas of public international law, national security law, and the intersection between international law and U.S. constitutional law. He served as Special Counsel for Arms Control to the General Counsel of the 3 of 37

5 Department of Defense ( ), Deputy General Counsel for International Affairs at the Department of Defense ( ), and as Attorney-Advisor and Special Assistant to the Director of the U.S. Arms Control and Disarmament Agency ( ). A Rhodes scholar, Professor Koplow graduated from Harvard College and Yale Law School. FATHALI M. MOGHADDAM Dr. Fathali M. Moghaddam is Professor in the Department of Psychology at Georgetown University, and Editorin-Chief of Peace and Conflict: Journal of Peace Psychology (American Psychological Association). Dr. Moghaddam was born in Iran, educated from an early age in England, and worked for the United Nations and McGill University before joining Georgetown University in He has published extensively on radicalization, intergroup conflict, and the psychology of dictatorship and democracy. His most recent book is The Psychology of Dictatorship (2013), which received Honorable Mention, 2013 Prose Awards for Professional and Scholarly Excellence. Dr. Moghaddam has received a number of recognitions for his scholarly contributions, the most recent being the Outstanding International Psychologist Award for 2012 from the American Psychological Association s Division of International Psychology. PAUL R. PILLAR Dr. Paul R. Pillar retired in 2005 after a 28-year intelligence career in positions such as National Intelligence Officer for the Near East and South Asia; Chief of Analytic Units at the Central Intelligence Agency (CIA); an original member of the National Intelligence Council s Analytic Group; Executive Assistant to CIA's Deputy Director for Intelligence; Executive Assistant to Director of Central Intelligence William Webster; and Head of Assessments and Information Group and Deputy Chief of the DCI Counterterrorist Center. Dr. Pillar is a retired officer in the U.S. Army Reserve and a former core faculty member at Georgetown University Security Studies Program. He received his B.A. from Dartmouth College, his Ph.D. from Princeton University, and a B.Phil. from Oxford University. INTERVIEWS Jacob Shapiro, Associate Professor, Princeton University and author of The Terrorist s Dilemma: Managing Violent Covert Organizations. Juan Zarate, Senior Adviser, Center for Strategic and International Studies, and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Major David Blair, USAF, MQ-1 Predator Pilot, United States Air Force Mark Mazzetti, New York Times Reporter and author of The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth. Peter Neumann, Professor, King s College London, and Director, International Centre for the Study of Radicalisation Rita Katz, Co-founder, SITE Intelligence Group 4 of 37

6 FACULTY SUPPORT TEAM JAMIE GELLER, COURSE MANAGER AND HEAD TEACHING ASSISTANT Ms. Jamie Geller is an M.A. candidate in the Security Studies Program at Georgetown University focusing on terrorism and sub-state violence. She also works as Dr. Daniel Byman s research assistant, focusing on terrorism and insurgency worldwide, and the Associate Editor-Middle East at the Georgetown Security Studies Review, in addition to her course manager and head teaching assistant duties for the MOOC. Ms. Geller has worked in various capacities at Omnis, Inc., the Brookings Institution s Center for Middle East Policy, the Investigative Project on Terrorism, the International Institute for Counter-Terrorism, and the Jerusalem Post. She received a B.A. in International Studies with a focus in Global Security and a minor in Middle East studies from the University of Wisconsin-Madison. RITIKA SINGH, TEACHING ASSISTANT Ms. Ritika Singh is an M.A. candidate in Georgetown University's Asian Studies Program, where she focuses on security and politics in South Asia. Previously, she worked as a Project Coordinator at the Brookings Institution and an Associate Editor at Lawfare, a website devoted to national security legal issues. She has co-authored two book chapters, one on presidential power and civil liberties during the War of 1812, and the other on James Madison s changing attitudes towards executive and federal power and security issues. She has also published a study on civilian casualties in drone strikes in the New Republic, and written pieces for World Politics Review, Slate, and Commonweal. RACHEL GROCOCK, TEACHING ASSISTANT Ms. Rachel Grocock is an M.A. candidate in Georgetown University's Security Studies Program, concentrating in military operations. Previously, she worked as an Operations Specialist at METIS Solutions, a small-business defense contractor working for clients such as the Department of Defense, Department of Treasury, and US Forces Afghanistan. She has also worked as a teaching assistant for Georgetown University's Military Instruments of National Power course, which focuses on military doctrine, war theory, and analysis of major battles. WHAT IS THE COURSE ABOUT? Terrorism has gone from a persistent yet marginal security concern to one of the most important security problems of our day; indeed, there are few countries that do not suffer from some form of terrorism. Though many terrorist attempts fail, some groups wage lengthy and bloody campaigns and kill hundreds or even thousands in pursuit of their ends. Course topics include the nuances involved in defining terrorism, the nature of Al-Qaeda, Hamas, and other important groups, the effectiveness of different counterterrorism tools like detention and military force, linkages (or the lack thereof) between terrorism and world religions like Islam, terrorist recruiting, the rule of law, the political context in South Asia and the Middle East, and terrorist use of technology. 5 of 37

7 KEY QUESTIONS What is terrorism, and what are the components of different definitions? What are common causes of terrorism? What are common strategies and tactics of terrorism? How do terrorist groups respond to technological change? What are common weaknesses of terrorist groups? Why do these occur? What are the primary terrorism and counterterrorism challenges related the India-Pakistan confrontation? What are the primary terrorism and counterterrorism lessons related to the Israeli-Palestinian confrontation? What is the nature of Al-Qaeda, and why has it proven such a difficult adversary? What is the relationship between Islam and violence? What is the role of intelligence in counterterrorism? What are the strengths and weaknesses of different counterterrorism instruments? How can you fight terrorism in accord with the rule of law? Under what conditions does terrorism "work? How serious a problem is terrorism? In what ways does it manifest? WHAT DOES THE COURSE INCLUDE? Each section of the course listed in the Course Section Outline below begins with a Weekly Guide subsection and ends with a Section Discussion, Conclusion, & Looking Ahead subsection. In between these subsections, the topics are organized sequentially. Most of the subsections are required when working towards a certificate of completion, but there are also optional segments for those interested in learning more. Further, Section 5 focuses on a geographical region plagued by terrorism. This section presents the learners with two options, one of which will be required for certificate of completion. Students can choose their area studies focus to be on either Israel and the Palestinians or South Asian terrorism. These topics (listed in the Course Section Outline below) include lectures highlighting key concepts that are summarized under the Definition of Terms menu item, knowledge checks, polls, a case study simulation, and discussion activities. The Weekly Guide lists the key questions to be addressed in that course section. It also lists the readings, which may be links to external websites or PDF files. A weekly poll question follows soliciting your opinion on a topic-related question. The Section Discussion, Conclusion, & Looking Ahead includes the same poll question found in the Weekly Guide followed by the opportunity to have a broader section-level discussion with your peers. It also provides you with a listing of the key learning outcomes related to that particular section of the course. In addition, this subsection offers you the opportunity to ask clarifying questions on the specific subsection or overall course material that will be collected by course teaching assistants and answered by Professor Byman. 6 of 37

8 The Simulation will come after the course has been completed. It prompts students to engage in a fictional case study and conduct a threat assessment. The simulation is optional for learners, but will help reinforce key concepts learned throughout the course by drawing on course content and readings to complete the threat assessment. We also hope it s fun. The overall course content outline follows. Note that numbered sections listed below are released on a weekly basis. These dates are listed next to each topic. For a complete listing of the weeks, including list of key questions and readings, see Appendix A. COURSE SECTION OUTLINE 1. What is Terrorism and Who Are The Terrorists (Release: October 1, 2014) This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. 2. Strategies, Tactics, and Technology Use (Release: October 8, 2014) This section of the course explores the various strategies and common tactics employed by most terrorist organizations as well as terrorist use of technology. This section will also feature Professor Byman s interview with terrorism scholar Jacob Shapiro, which is optional for class participants. 3. Al-Qaeda (Release: October 15, 2014) This section of the course explores the most important modern terrorist group -- Al-Qaeda and its historical evolution, goals, strengths and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co-founder Rita Katz. 4. Islam (Release: October 22, 2014) This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam Salafism. 5. Area Studies: Israel/Palestine and South Asia (Release: October 29, 2014) These area studies sections of the course prompt learners to choose a region to learn more about its terrorism problem and the counterterrorism response. Students may choose between The Threat to Israel and the Israeli Response or Terrorism and Counterterrorism in South Asia. 6. Counterterrorism and the Rule of Law (Release: November 5, 2014) This section of the course explores the implications of U.S. domestic and international law for counterterrorism. 7. Intelligence and Counterterrorism (Release: November 12, 2014) This section of the course explores the role of intelligence in counterterrorism and considers several important post-9/11 controversies such as surveillance and torture. This section will also feature Professor Fair s optional subsection interview with New York Times reporter Mark Mazzetti on U.S. targeted killings as a controversial counterterrorism instrument. 8. Counterterrorism Instruments (Release: November 19, 2014) This section of the course explores various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also 7 of 37

9 feature an optional subsection on renditions and interviews with MQ-1 Predator Pilot Major David Blair, USAF and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate. WHAT WILL I LEARN IN THE COURSE? The course is designed to help you achieve the following learning goals. Recall the working definitions of terrorism and recognize their analytic limits; Identify a range of causes of terrorism and, as importantly, understand what commonly cited issues are not usually causes; Understand the strategies and tactics of terrorist groups; Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda; Understand the relationship between religion and terrorism; and Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. A Learning Checklist that organizes the learning goals above with the learning objectives for each of the course sections is available to you in Appendix B of this syllabus. Use this to help you determine what you are learning in the course. In addition, Appendix C of this syllabus includes the Definition of Terms handout that highlights the key terms used throughout the course. WHAT SHOULD WE EXPECT FROM EACH OTHER? WHAT YOU CAN EXPECT FROM PROFESSOR BYMAN AND THE COURSE TEAM Every week, Professor Byman will address the top five student questions in a video response, which will be uploaded in the Office Hours subsection for a given section of the course. Instructions for posting questions for Professor Byman are included in the Discussion, Conclusion & Looking Ahead subsections. In addition, Teaching Assistants will regularly participate in discussion boards to provide content clarification, guidance, and support. This course also seeks to inform your thinking on current events. We will be interviewing experts in the field, use our discussion board to prompt student engagement and discussion, and post relevant stories to our social media outlets regarding current events. We also encourage you to use the course s features to bring current events related to terrorism to the attention of your fellow students. We will be providing regular updates and reminders in the Course Info page beyond Professor Byman s weekly video response to your questions. You should expect two s each week from our staff: one focused on current events on Monday at 9:00 EDT/13:00 UTC, and one when a new section is released on Wednesday at 9:00 EDT/13:00 UTC. Please follow us on Twitter (@TerrorismGUX) and Facebook ( - GeorgetownX: Terrorism and Counterterrorism). We will identify news stories and other sources of information on current events related to terrorism across the globe and will also highlight course content. If you have any specific questions for Professor Byman or the faculty support team, please TerrorismGUX@georgetown.edu. 8 of 37

10 WHAT YOU CAN EXPECT FROM EDX In the event of a technical problem, you should click the Help tab located on the left border of the screen (Figure 1). This Help tab opens an instruction box that directs you to student Frequently Asked Questions (FAQs) for general edx questions. You can also: Report a problem Make a suggestion Ask a question You may post technical problems to the Technical thread of the discussion board. Finally, you may also contact technical@edx.org directly to report bugs. WHAT WE EXPECT FROM YOU Figure 1: Entry page of course showing the Help Students should spend around eight to ten (8-10) hours per week to review assigned readings, watch weekly lectures, work through weekly knowledge checks and other activities, including the discussion threads, polling questions, and keeping informed of current events surround terrorism and counterterrorism. In each course section we have included activities to support you in reaching the specified learning objectives for that section. The graded activities are categorized as knowledge checks; these are the activities that are counted toward achieving the certificate for the course. They include: Multiple answer questions; Multiple choice questions; True/False questions; and Self-assessment open response questions. To receive a course certificate, you must complete/submit all graded assignments by December 2 rd, 2014 at 9:00 EDT/13:00 UTC and receive a score of 75 percent or higher. To supplement the graded knowledge check activities listed above, we have also included other components to enable learners to explore the subject matter more deeply. These include: Polling questions and discussion: As you go through the course, there will be polling questions each week to get you thinking about the section's material. These polls are located in the Introduction subsections (right after the Weekly Guide) and in the Section Discussion Conclusion & Looking Ahead subsections (right after the Conclusion Guide and before the Looking Ahead Guide). Please engage with your peers on these questions, using the discussion board prompts found in the Conclusion & Looking Ahead subsections. We would like you to focus explicitly on whether the section's content has changed or only further reinforced your opinions on these questions; Current events discussion: As you go through the course, there will also be current events discussion prompts each week. Please engage with your peers on these current events discussion prompts found in the Current Events section, located between Course Overview and Section 1; and 9 of 37

11 Case study simulation: We have also created a case study simulation that draws upon each section to apply concepts learned in the class. The simulation places the student in the position of an employee at a (fictional) intelligence service tasked with stopping a potential terrorist attack. Students are encouraged to consider the case study in light of the course's content material and which concepts apply to the individual at question. All activities included in the course are designed to help you gauge your learning as a result of your interaction with the course content both from the video lectures and readings. Instructions on how to complete the activities are included within each course section. WEEKLY TIMELINE The due dates for submission for all activities are listed in each course section. Since the course opens on October 1 (Wednesday), our weeks are from Wednesday to Tuesday. Take a look at our suggested path below for engaging with the course on a weekly basis. Each week begins on Wednesday at 9:00 EDT/13:00 UTC Review the weekly guide Watch the course video introduction Study the course content Read the assigned readings for the week Watch the video lectures Use the Student Lecture Notes area to highlight key points Take Part in the Activities Complete the knowledge checks Participate in the discussions and polls Consider the case study in light of the week's content material Each week ends on Tuesday Review course materials Finish any pending activities Submit any clarifying questions for the week for Professor Byman by at 9:00 EDT/13:00 UTC Figure 2: Suggested weekly engagement NETIQUETTE GUIDELINES Please be respectful To promote the best educational experience possible, we ask each student to respect the opinions and thoughts of other students and be courteous in the way that you choose to express yourself. Terrorism and Counterterrorism topics elicit and should elicit -- passionate and controversial debates. However, informed debate should never give way to insult, rudeness, or anything that might detract from the learning process. GUIX x students should be respectful and considerate of all opinions. In order for us to have meaningful discussions, we must learn to understand what others are saying and be open-minded about others opinions. If you want to persuade someone to see things differently, it is much more effective to do so in a polite, nonthreatening way rather than to do so antagonistically. Everyone has insights to offer based on his or her experiences, and we can all learn from one another. Civility is essential: Our teaching assistants can, and will, remove students from the class who detract from the learning process with insulting comments on the coursewide discussion boards. At the discretion of the course team, individuals will be removed from the class on 10 of 37

12 their first offensive or inappropriate statement, and all threads relating to that statement will also be removed from the course discussion boards. Look before you write Prior to posting a question or comment on the discussion board, the Georgetown course team asks that you look to see if any of your classmates have raised the same question. Upvote questions that are similar to your own or that are also of interest to you instead of starting a new thread. This will greatly help our Georgetown course team best monitor the discussions and bring important questions to Professor Byman s attention. Use the discussion board for course-related posts only Although we encourage students to get to know one another, please use the discussion board as for course content conversations only. Properly and promptly notify us of technical issues Although we do not predict technical issues, they can and may happen. To make sure these receive prompt attention, post details about any technical issues directly on the Technical discussion thread or technical@edx.org directly. ACADEMIC INTEGRITY Observe edx and GeorgetownX s honor policies Although collaboration and conversation will certainly contribute to your learning in the course, we ask students to refrain from collaborating with or consulting one another on any graded material for the course. Violations of the honor policy undermine the purpose of education and the academic integrity of the course. We expect that all work submitted will be a reflection of one s own original work and thoughts. GeorgetownX faculty and staff expect all members of the community to strive for excellence in scholarship and character. 11 of 37

13 APPENDIX A: DETAILED COURSE SECTION OUTLINE 1. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS (RELEASE: OCTOBER 1, 2014) This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. KEY QUESTIONS: Why is terrorism so difficult to define? How have definitions of terrorism changed over time? What are the common, core elements of terrorism as a means to build a definition? What are the differences and similarities between terrorism and guerrilla warfare? Why do people become terrorists? What is the process that results in an individual s radicalization and then recruitment? How do terrorists justify the violence they commit? Why is it so difficult, if not impossible, to develop a common set of reasons for why someone becomes a terrorist? What are the roles of various situational and personality factors that shape terrorists? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 2nd edition, 2006), pp.1-42 and pp Fathali M. Moghaddam, "The Staircase to Terrorism: A Psychological Exploration," American Psychologist, Iss. 2, (2005), pp Fathali M. Moghaddam, "The Springboard to Dictatorship and the Arab Spring in the Context of Additive and Subtractive Globalization: A Psychological Assessment," SAIS Review vol. XXXIII no. 2 (Summer-Fall 2012). R.F. Paloutzian & C. Park (Eds.), Moghaddam, F.M., Warren, Z., & Love, K., Religion and the Staircase to Terrorism, 2nd ed., pp (2013) in Handbook of the Psychology of Religion and Spirituality. OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Leonard Weinberg, et al., The Challenges of Conceptualizing Terrorism, Terrorism and Political Violence, vol. 16, no. 4 (2004), pp The United States Department of State, Country Reports on Terrorism (Washington, D.C., 2013). p. xvi only [including the footnote]. Fathali M. Moghaddam, "From the Terrorists' Point of View: What They Experience and Why They Come to Destroy," Praeger International Security, of 37

14 2. STRATEGIES, TACTICS, AND TECHNOLOGY USE (RELEASE: OCTOBER 8, 2013) This section of the course explores the various strategies and common tactics employed by most terrorist organizations, as well as terrorist use of technology. This section will also feature Professor Byman s interview with terrorism scholar Jacob Shapiro, which is optional for class participants. KEY QUESTIONS: What are the different strategies that terrorist groups use to advance their objectives? What are the strengths and weaknesses of the various strategies? Why does terrorism essentially functions in a technological vacuum compared with modern warfare? What are the reasons for terrorists operational conservatism? How do ease and low cost affect terrorist planning and operations? Why do terrorists avoid sophisticated technologies when they innovate? What role does publicity play in fostering terrorist innovation? Why are terrorists rarely attracted to more sophisticated technologies and Weapons of Mass Destruction (WMD)? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Andrew Kydd and Barbara F. Walter, "The Strategies of Terrorism," International Security, Volume 31, Number 1, pp Bruce Hoffman, Inside Terrorism, Columbia University Press, 2nd. Edition (2006), pp John Parachini, "Putting WMD Terrorism into Perspective, Washington Quarterly, Vol. 26, Iss. 4, pp OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Central Intelligence Agency, Terrorist CBRN: Materials and Effects, June Walter Laqueur, "Postmodern Terrorism: New Rules for an Old Game," Foreign Affairs (September/October 1996). 13 of 37

15 3. AL-QAEDA (RELEASE: OCTOBER 15, 2013) This section of the course explores the most important modern terrorist group Al-Qaeda and its historical evolution, goals, strengths, and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co-founder Rita Katz. KEY QUESTIONS: How has Al-Qaeda evolved over time? Why did Al-Qaeda conduct the 9/11 attacks and how did it adjust to setbacks it suffered in the attacks' aftermath? What are Al-Qaeda's organizational goals? What are some of the traits and characteristics of senior Al-Qaeda leaders and their supporters? Why do groups affiliate with Al-Qaeda and what are common limits to cooperation between affiliates and the core organization? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Bruce Hoffman and Fernando Reinares, "Conclusions," The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden's Death (Columbia University Press: New York, 2014). Lawrence Wright, The Man Behind Bin Laden, The New Yorker (September 16, 2002). National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), The 9/11 Commission Report (Norton: 2004), "The Foundation of New Terrorism," pp National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), "Al Qaeda Aims at the American Homeland," pp OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Daniel Byman Breaking the Bonds between Al Qaeda and Its Affiliate Organizations, (Brookings 2012). Peter Bergen and Paul Cruickshank, The Unraveling, The New Republic, June of 37

16 4. ISLAM (RELEASE: OCTOBER 22, 2013) This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam Salafism. KEY QUESTIONS: Can Islam be viewed as a driver of terrorism? What are the majority attitudes among Muslims towards terrorism in the name of Islam? What does the term jihad mean, and what are the ways in which it has been used and/or exploited? How did the "global jihad," championed by Osama bin Laden and Al-Qaeda, emerge? What is the rationale for suicide bombing and how have Muslim religious leaders have responded? When is violent resistance in the name of jihad acceptable according to mainstream tradition? When is violence illegitimate? What is the basic nature of Salafism? What is the important difference between Salafism and mere backwardness? What is the place of Saudi Arabia in global Salafism? Why are conservatism in religion and violence not inherently linked? How do seemingly arcane legal issues affect attitudes towards political legitimacy and the acceptability of violent uprisings? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) John L. Esposito, "Terrorism & the Rise of Political Islam," in Democracy & Terrorism: Vol. 1 The Roots of Terrorism, (ed.) Louise Richardson (London: Francis & Taylor, 2006). Mark Juergensmeyer, "Is Religion the Problem?" National Policy Forum on Terrorism, Security and America's Purpose - Washington, D.C., September 6-7, OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) John O. Voll, Foundations for Revival and Reform," in The Oxford History of Islam, ed. John L. Esposito, (Oxford: Oxford University Press, 1999), pp Quintan Wiktorowicz, "Anatomy of the Salafi Movement," Studies in Conflict and Terrorism 29, no. 3 (2006): pp of 37

17 5. AREA OPTIONS (RELEASE: OCTOBER 29, 2013) This section of the course prompts learners to choose a region in which they would like to learn more about its terrorism and counterterrorism issues. Students may choose between The Terrorist Threat to Israel and the Israeli Response or Terrorism and Counterterrorism in South Asia. THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE KEY QUESTIONS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE What have Palestinian groups accomplished using terrorism? What have they failed to accomplish? What methods has Israel used to fight Palestinian terrorism? How do the methods work together? How has Israel gathered intelligence on suspected terrorists? What are the advantages and disadvantages of different Israeli counterterrorism instruments? How has terrorism interacted with the peace process? REQUIRED READINGS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Daniel Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism (New York: Oxford University Press, 2011), pp , , and Daniel Byman, "Curious Victory: Explaining Israel's Suppression of the Second Intifada," Terrorism and Political Violence (November 2012), pp IN SOUTH ASIA KEY QUESTIONS FOR IN SOUTH ASIA: How has political Islam in Pakistan evolved? Consider in particular how the Two Nation Theory and the impact of the bloody process of partition shaped the two new states of India and Pakistan that emerged in What are the origins of Pakistan's Non-State Actor Policy in Kashmir, India and Afghanistan? Which are the main Pakistani militant groups operating in and from Pakistan? What is the role of nuclear weapons in facilitating Pakistan's Non-State Actor Policy in India and beyond? What are the questions and problems facing Pakistan as it tries to manage the spread of domestic Islamist terrorism while retaining its commitment to using Islamist militants outside of Pakistan to achieve its policy goals? REQUIRED READINGS FOR IN SOUTH ASIA: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) C. Christine Fair, Fighting to the End: The Pakistan Army's Way of War (United Kingdom: Oxford University Press, 2014), pp. 1-9, 40-65, , , , , and Husain Haqqani, Pakistan: Between Mosque and Military, (Washington, D.C.: Carnegie Endowment for International Peace, 2005), pp , , and of 37

18 6. COUNTERTERRORISM AND THE RULE OF LAW (RELEASE: NOVEMBER 5, 2013) This section of the course explores the implications of U.S. domestic and international law for counterterrorism. KEY QUESTIONS: What are the best sources for understanding U.S. counterterrorism law? How does who defines an act of violence, and how the act of violence is understood, affect the response? How does the Constitution allocate different branches of government powers relevant to counterterrorism? Why is terrorism such a challenge for international law? What is the nature of treaties, and how do they contribute to the fight against terrorism? What is the nature of customary international law, and how does it contribute to the fight against terrorism? What is the nature of the United Nations Security Council resolutions, and how do they contribute to the fight against terrorism? What are the various military and law enforcement tools available to promote enforcement of international law? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Daniel O'Donnell, "International Treaties Against Terrorism and the Use of Terrorism During Armed Conflict and by Armed Forces," International Review of Red Cross, Vol. 88, No. 864, December 2006 United Nations Security Council, Resolution 1373, September 28, U.S. Constitution. U.S. Supreme Court, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (The Steel Seizure Case), with particular attention on Justice Jackson's tripartite framework and Chief Justice Vinson's dissent. OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) U.S. Supreme Court, United States v. Curtis-Wright Export Corp, 299 U.S. 304 (1936). U.S. Supreme Court, New York Times Co. v. United States, 403 U.S. 713 (1971). This ruling explores the intersection of the First Amendment and national security concerns. U.S. Supreme Court, Katz v. United States, 389 U.S. 347 (1967). This ruling establishes the reasonable expectation of privacy test with regard to the Fourth Amendment. U.S. Supreme Court, U.S. v. U.S. District Court, 407 U.S. 297 (1972). This ruling considers the Fourth Amendment in the context of domestic surveillance for national security purposes. 17 of 37

19 7. INTELLIGENCE AND COUNTERTERRORISM (RELEASE: NOVEMBER 12, 2013) This section of the course explores the role of intelligence in counterterrorism operations and considers several important post-9/11 controversies such as surveillance and torture. KEY QUESTIONS: What are the purposes that intelligence serves in counterterrorism? What are the limits of intelligence in counterterrorism? What are collection and analytic techniques that intelligence services use in counterterrorism? What are the strengths and weaknesses of different intelligence techniques? What are the standards of success and failure regarding counterterrorism intelligence? What governmental organizations contribute to counterterrorism intelligence, especially in the United States, and how have they changed? What are the principal controversies involving intelligence used for counterterrorism? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Daniel Byman, "The Intelligence War on Terrorism," Intelligence and National Security (2013). Richard A. Posner, Chapter 4, "Principles of Intelligence," Preventing Surprise Attacks (Rowman & Littlefield, 2005). OPTIONAL READINGS: None. 18 of 37

20 8. COUNTERTERRORISM INSTRUMENTS (RELEASE: NOVEMBER 19, 2013) This section of the course explores the various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ-1 Predator Pilot Major David Blair, USAF, and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate. KEY QUESTIONS: What are the various instruments used in counterterrorism? What are the principal ways in which each instrument is used? What are the contributions and advantages of each instrument? What are the limitations and disadvantages of each instrument? How are these counterterrorism instruments used together in a complementary way? REQUIRED READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Audrey Kurth Cronin, "Why Drones Fail, Foreign Affairs (July/August 2013). Daniel Byman, "Why Drones Work, Foreign Affairs (July/August 2013). Paul R. Pillar, Chapter 4, "Counterterrorist Instruments," in Terrorism and U.S. Foreign Policy (Washington, D.C.: Brookings, 2003). OPTIONAL READINGS: (All Readings are available in the course itself under Course Readings and in the Weekly Guide subsection.) Daniel Byman, Chapter 8, "Diplomacy," in The Five Front War: The Better Way To Fight Global Jihad, New York: Wiley, 2007). Michael Scheuer Testimony in "Extraordinary Rendition in U.S. Counterterrorism Policy: The Impact on Transatlantic Relations," House Foreign Affairs Committee, April 17, Read the Question and Answer session! Paul R. Pillar and Christopher Preble, "Don't You Know There's a War On? Assessing the Military's Role in Counterterrorism," in Benjamin H. Friedman, Jim Harper, and Christopher A. Preble (eds.), Terrorizing Ourselves (Washington, D.C.: Cato Institute, 2010). 19 of 37

21 APPENDIX B: LEARNING CHECKLIST This guide lists the learning goals and objectives for each section of the GeorgetownX Terrorism and Counterterrorism Course (October 1 - November 25, 2014). Use this guide as your own learning checklist while engaging with the course. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS? SECTION 1: OCTOBER 1-7 Recall the working definitions of terrorism and recognize their analytic limits. Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. Explain how terrorism has changed throughout history and how it is hard to define. Recognize how terrorism differs from other forms of conflict and violence like guerilla warfare. List the core elements of the definition of terrorism. Indicate how someone becomes a terrorist and how he or she might justify and rationalize the violence they commit. Recognize the diversity of reasons that account for someone becoming a terrorist. Recognize the distinct psychological processes and policy measures associated with each level on the staircase to terrorism. STRATEGIES, TACTICS, AND TECHNOLOGY USE SECTION 2: OCTOBER 8-14 Understand the strategies and tactics of terrorist groups. Identify the different strategies that terrorist groups use and their associated strengths and weaknesses. Describe the most common types of terrorist attacks and how terrorists use technology. AL-QAEDA SECTION 3: OCTOBER Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda. Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. Identify one or more accomplishments, weaknesses and/or problems of each group. Identify the various main militant groups and their objectives. Recognize the diversity of reasons that account for someone becoming a terrorist. ISLAM SECTION 4: OCTOBER Understand the relationship between religion and terrorism. Describe jihad and ways in which it has been used and/or exploited. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. Identify the causes if terrorism and its relationship to religion. Explain the emergence of global jihad inspired by Osama bin Laden and Al-Qaeda. Explain the ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism. 20 of 37

22 Define Salafism. Explain the place of Saudi Arabia in global Salafism. Recognize that conservatism in religion and violence are not necessarily linked. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. AREA OPTION 1: THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE SECTION 5: OCTOBER 29-NOVEMBER 4 Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. Recognize the strengths and limits of different counterterrorism instruments, including intelligence, economic punishment, and different uses of military force (drones/targeted killing of terrorists). Explain how intelligence is collected against terrorist groups and recognize different means (human intelligence, signals intelligence, etc.). Describe the impact of counterterrorism on peace negotiations. AREA OPTION 2: IN SOUTH ASIA SECTION 5: OCTOBER 29-NOVEMBER 4 Identify important terrorist groups in the Middle East and/or South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda. Understand the relationship between religion and terrorism. Describe the evolution of political Islam. Describe what state supporters do and do not offer groups. Identify the various main militant groups. Explain ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. COUNTERTERRORISM AND THE RULE OF LAW SECTION 6: NOVEMBER 5-11 Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. Identify the best sources for understanding U.S. counterterrorism law; Describe how who defines an act of violence, and how the act of violence is understood, affect the response; Explain how the Constitution allocates different branches of government powers relevant to counterterrorism; Describe why terrorism is such a challenge for international law; Describe the nature of treaties, and how they contribute to the fight against terrorism; Describe the nature of customary international law, and how it contributes to the fight against terrorism; Describe the nature of the United Nations Security Council resolutions, and how they contribute to the fight against terrorism; and 21 of 37

Homeland Security and Terrorism COURSE SYLLABUS

Homeland Security and Terrorism COURSE SYLLABUS Homeland Security and COURSE SYLLABUS Course: CRJU 491T Section: 001 Semester: Spring 2015 UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE Instructor: Leslie G. Wiser, Jr. Office:

More information

Ph.D. in International Studies University of Washington Seattle

Ph.D. in International Studies University of Washington Seattle February 2012 Ph.D. in International Studies University of Washington Seattle Introduction University of Washington (UW) proposes to offer a Ph.D. in International Studies degree beginning Fall 2012. This

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

Security Studies MA. Your entry in to the World of National Security DESIGNED FOR THE REAL WORLD SECURITY JOB MARKET:

Security Studies MA. Your entry in to the World of National Security DESIGNED FOR THE REAL WORLD SECURITY JOB MARKET: Security Studies MA Your entry in to the World of National Security POTENTIAL CAREERS: Intelligence Analysis Counterterrorism Intelligence Operations Military Careers Risk Analysis Diplomacy Consulting

More information

know school PubliC affairs

know school PubliC affairs know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

How To Learn About Politics At Sacred Heart University

How To Learn About Politics At Sacred Heart University SACRED HEART UNIVERSITY UNDERGRADUATE CATALOG 2012-2013 POLITICAL SCIENCE The Political Science major seeks to awaken in students an appreciation and an understanding of politics and government in the

More information

Paul R. Pillar. Adjunct Professor of Security Studies, Georgetown University, 2003-2004 Adjunct lecturer in Government, Johns Hopkins University, 2005

Paul R. Pillar. Adjunct Professor of Security Studies, Georgetown University, 2003-2004 Adjunct lecturer in Government, Johns Hopkins University, 2005 Paul R. Pillar Nonresident Senior Fellow, Center for Security Studies, Georgetown University Non-Resident Senior Fellow in Foreign Policy, Brookings Institution Contributing Editor, The National Interest

More information

Brief Biographical Sketch

Brief Biographical Sketch Department of Political Science University of California, Davis Davis, California 95616 (530) 752-2262 E-mail: mnincic@ucdavis.edu Present Position Brief Biographical Sketch Miroslav Nincic Professor of

More information

Key Concepts Chart (The United States after the Cold War)

Key Concepts Chart (The United States after the Cold War) Unit 10, Activity 1, Key Concepts Chart Key Concepts Chart (The United States after the Cold War) Key Concept +? - Explanation Extra Information NAFTA Presidents George H.W. Bush and Bill Clinton both

More information

ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN. by Tom Hayden February 6, 2009

ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN. by Tom Hayden February 6, 2009 ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN by Tom Hayden February 6, 2009 It is time to rethink Afghanistan and Pakistan. Otherwise the new Obama administration will be led into a yawning quagmire. It

More information

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW UNITED STATES INSTITUTE OF PEACE Academy for International Conflict Management and Peacebuilding HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW May 15 17, 2012 Tuesday Thursday Washington, DC Developed

More information

How To Study Political Science At Pcj.Edu

How To Study Political Science At Pcj.Edu Political Science Courses-1 American Politics POL 110/American Government Examines the strengths and weaknesses, problems and promise of representative democracy in the United States. Surveys the relationships

More information

MELISSA GRAVES. 118 Westbury Circle Oxford, MS 38655 magraves@olemiss.edu 662-832-6379 PROFESSIONAL EXPERIENCE

MELISSA GRAVES. 118 Westbury Circle Oxford, MS 38655 magraves@olemiss.edu 662-832-6379 PROFESSIONAL EXPERIENCE MELISSA GRAVES 118 Westbury Circle Oxford, MS 38655 magraves@olemiss.edu 662-832-6379 PROFESSIONAL EXPERIENCE July 2015-Present University of Mississippi Center for Intelligence and Security Studies Interim

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

Education PhD: Political Science, Department of International Studies Università degli Studi Roma Tre, Roma, Italy, 2010-2013

Education PhD: Political Science, Department of International Studies Università degli Studi Roma Tre, Roma, Italy, 2010-2013 Curriculum Vitae Niccolò Petrelli Center for International Security and Cooperation (CISAC) Encina Hall, 616 Serra Street 94305-6055 Stanford California, USA 001-415-490-7300 nicpetrelli@gmail.com; petrelli@stanford.edu

More information

Double Master s Degree Program in International Relations between The University of Haifa and The University of Warsaw

Double Master s Degree Program in International Relations between The University of Haifa and The University of Warsaw Double Master s Degree Program in International Relations between The University of Haifa and The University of Warsaw Beginning in October 2015, students at the University of Haifa will have an opportunity

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

Lesson Plan: Islamophobia in the Shadow of 9/11

Lesson Plan: Islamophobia in the Shadow of 9/11 Lesson Plan: Islamophobia in the Shadow of 9/11 Grades 10-12 Purpose In this lesson, students will critically analyze various media for manifestations of Islamophobia. They will also learn to recognize

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs

DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2016 Instructor: Professor James K. Conant 631 Founders

More information

Assistant Professor, Political Science, George Washington University, beginning August 2013.

Assistant Professor, Political Science, George Washington University, beginning August 2013. Yonatan Lupu Princeton University Robertson Hall, Room 447A Princeton, NJ 08544 Phone: (703) 725-6588 ylupu@gwu.edu http://dss.ucsd.edu/ ylupu/ Academic Positions Assistant Professor, Political Science,

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

Teaching Notes Crisis Guide: The Israeli-Palestinian Conflict

Teaching Notes Crisis Guide: The Israeli-Palestinian Conflict Teaching Notes Crisis Guide: The Israeli-Palestinian Conflict CFR.org s award-winning multimedia Crisis Guide series aims to provide a detailed, tailored resource for the exploration of the world s most

More information

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA A COMPARATIVE ASSESSMENT OF SAUDI ARABIA WITH OTHER COUNTRIES OF THE ISLAMIC WORLD Targeting Terrorist Finances Project * Watson Institute for International Studies Brown University June 2004 During the

More information

OFFICE OF. James P. Brady, LL.M. Attorney at Law. 149 High Street Tel: (781) 749-3114 Hingham, MA 02043 Fax: (781) 740-2319 CURRICULUM VITAE

OFFICE OF. James P. Brady, LL.M. Attorney at Law. 149 High Street Tel: (781) 749-3114 Hingham, MA 02043 Fax: (781) 740-2319 CURRICULUM VITAE OFFICE OF James P. Brady, LL.M. Attorney at Law 149 High Street Tel: (781) 749-3114 Hingham, MA 02043 Fax: (781) 740-2319 CURRICULUM VITAE Current Professional Practice Independent law office since 1996,

More information

RACHEL A. HARMON University of Virginia School of Law 580 Massie Road, Charlottesville VA 22903 (434) 924-7205 (office) rharmon@virginia.

RACHEL A. HARMON University of Virginia School of Law 580 Massie Road, Charlottesville VA 22903 (434) 924-7205 (office) rharmon@virginia. RACHEL A. HARMON University of Virginia School of Law 580 Massie Road, Charlottesville VA 22903 (434) 924-7205 (office) rharmon@virginia.edu EMPLOYMENT: University of Virginia School of Law Sullivan &

More information

Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause

Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause Thursday, November 6 th, 2014 Hall of the Americas, Organization of American States 17 th Street

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

SCHOOL OF POLITICS AND INTERNATIONAL RELATIONS QUAID-I-AZAM UNIVERSITY

SCHOOL OF POLITICS AND INTERNATIONAL RELATIONS QUAID-I-AZAM UNIVERSITY SCHOOL OF POLITICS AND INTERNATIONAL RELATIONS QUAID-I-AZAM UNIVERSITY INTRODUCTION The School of Politics and International Relations (SPIR) at Quaid-i-Azam University is Pakistan s premier institution

More information

To use the Muslim concept of Jihad to understand Muslim attitudes to war.

To use the Muslim concept of Jihad to understand Muslim attitudes to war. To use the Muslim concept of Jihad to understand Muslim attitudes to war. Grade C All will be able to describe the meaning of greater and lesser JIHAD. Grade B Most will be able to explain why the concept

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK Graduate Certificate in Global Security Studies Brandon Prins Political Science UTK Purpose of Certificate Program Training Increase understanding of salient security issues, such as the proliferation

More information

A Six-Day War: Its Aftermath in American Public Opinion

A Six-Day War: Its Aftermath in American Public Opinion A Six-Day War: Its Aftermath in American Public Opinion For 40 years, public opinion has consistently favored Israel over the Palestinians by Robert Ruby, Senior Editor, Pew Forum on Religion & Public

More information

Speaker Biographies. Formal chairman, National Defense Reform Commission

Speaker Biographies. Formal chairman, National Defense Reform Commission Speaker Biographies Kim, Jae Chang Formal chairman, National Defense Reform Commission General (ret.) Kim Jae Chang was born in Andong, Korea on 5 March 1940. He graduated from the Korean Military Academy

More information

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

CMJS/SOCI 4013 Homeland Security

CMJS/SOCI 4013 Homeland Security CMJS/SOCI 4013 Homeland Security Instructor Information: Professor: Dr. Gruenewald (jgruenew@uark.edu) TA: Kristin Kelley (kxk001@uark.edu) Office Location: Old Main 221 Office Phone: 479-575-2057 Office

More information

POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115

POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115 Dr. Sabri Ciftci Waters Hall 222 Phone: 785 532 3514 Email: ciftci@ksu.edu POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115 Office Hours:

More information

TURKEY AT THE CROSSROADS:

TURKEY AT THE CROSSROADS: TURKEY AT THE CROSSROADS: POLITICS AND DEMOCRATIZATION IN AN EMERGING POWER IN THE MIDDLE EAST Marshall Student Center Room 3707 University of South Florida Thursday, March 24, 2011 Sponsored by the Department

More information

RESUME BENJAMIN W. HEINEMAN, JR. Home. Harvard I. EMPLOYMENT

RESUME BENJAMIN W. HEINEMAN, JR. Home. Harvard I. EMPLOYMENT RESUME BENJAMIN W. HEINEMAN, JR. Home Harvard 83 Turning Mill Lane Kennedy School/Littauer 362 New Canaan, CT 06840 79 JFK Street 203-801-4338 Cambridge, MA 02138 fax: 203-801-0777 617-496-7305 fax: 617-495-8693

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS

COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS Course Code 2507205 Course Name International Relations of the Middle East In this course the student will learn an historical and

More information

THOMAS B. HEFFELFINGER

THOMAS B. HEFFELFINGER THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 60 South Sixth Street, Suite 2700 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

More information

American University. Department of Government GOVERNMENT 529-001 Homeland Security: Strategy and Policy. Course Syllabus

American University. Department of Government GOVERNMENT 529-001 Homeland Security: Strategy and Policy. Course Syllabus American University Department of Government GOVERNMENT 529-001 Homeland Security: Strategy and Policy Course Syllabus Professor K. A. Beyoghlow, PhD 3 Semester Hours Credit Fall 2010 Daytime Contact Tel:

More information

Curriculum Vitae. Mark C. Anarumo, Ph.D. National Security Fellow, May 2012 John F. Kennedy School of Government, Harvard University

Curriculum Vitae. Mark C. Anarumo, Ph.D. National Security Fellow, May 2012 John F. Kennedy School of Government, Harvard University Curriculum Vitae Mark C. Anarumo, Ph.D. Home 2502D Arlington Mill Dr. South Arlington VA 22206 (609) 975-3613 Email: mark.anarumo@yahoo.com Work 1030 Air Force Pentagon, Room 4A1076 Washington D.C. 20330-1030

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Washington, DC 20510 Washington, DC 20510

Washington, DC 20510 Washington, DC 20510 July 17, 2013 The Honorable Patrick Leahy The Honorable Charles Grassley Chairman Ranking Member Senate Judiciary Committee Committee on the Judiciary United States Senate United States Senate Washington,

More information

MARTHA FINNEMORE. CURRENT POSITION University Professor of Political Science and International Affairs George Washington University

MARTHA FINNEMORE. CURRENT POSITION University Professor of Political Science and International Affairs George Washington University MARTHA FINNEMORE Department of Political Science and Elliott School of International Affairs The George Washington University Washington, DC 20052 (202) 994-8617 finnemor@gwu.edu http://home.gwu.edu/~finnemor/

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Curriculum for the Bachelor Degree in Crime and Delinquency

Curriculum for the Bachelor Degree in Crime and Delinquency The curriculum for the B.S.c. degree in (12 ) credit hours are distributed as follows:- No. 1 2 4 Requirements University Requirements Compulsory Elective Faculty Requirements Specialization Requirements

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

UNITED STATES SENATE COMMITTEE ON THE JUDICIARY. Testimony of Stephen M. Kohn 1

UNITED STATES SENATE COMMITTEE ON THE JUDICIARY. Testimony of Stephen M. Kohn 1 UNITED STATES SENATE COMMITTEE ON THE JUDICIARY Whistleblower Retaliation at the FBI: Improving Protections and Oversight Testimony of Stephen M. Kohn 1 Executive Director, National Whistleblower Center

More information

School of Security and Global Studies NSEC 614 The Political Psychology of Terror Groups 3 Credit Hours 8 Weeks

School of Security and Global Studies NSEC 614 The Political Psychology of Terror Groups 3 Credit Hours 8 Weeks STUDENT WARNING: This course syllabus is from a previous semester archive serves only as a preparatory reference. Please use this syllabus as a reference only until professor opens classroom you have access

More information

May 2009 syllabus. Syllabus revised October 2009. For first examinations in May 2011

May 2009 syllabus. Syllabus revised October 2009. For first examinations in May 2011 This is an edited version of the subject guide, for use with extended essay candidates. Assessment details for the subject are not included: please refer to the assessment criteria in the Extended Essay

More information

Department of Political Science Phone: (805) 893-5902 University of California, Santa Barbara Fax: (805) 893-3309

Department of Political Science Phone: (805) 893-5902 University of California, Santa Barbara Fax: (805) 893-3309 NEIL NARANG Department of Political Science Phone: (805) 893-5902 University of California, Santa Barbara Fax: (805) 893-3309 Ellison Hall, Office 3710 Email: narangn@polsci.ucsb.edu Santa Barbara, CA

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Department of Political Science

Department of Political Science California State University, San Bernardino 1 Department of Political Science Department of Political Science Social and Behavioral Sciences Building, Room 112 (909) 537-5535 Department of Political Science

More information

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education Student and Faculty Login The University Request Information Sitemap Read Our Expert Guide To: Potential for obtaining intelligence jobs is enhanced by focus in intelligence studies Earn a Bachelor or

More information

SADIQ REZA. Home Address: 185 West Broadway 335 Linwood Avenue New York, NY 10013 Newtonville, MA 02460 212-431-2374 office sreza@nyls.

SADIQ REZA. Home Address: 185 West Broadway 335 Linwood Avenue New York, NY 10013 Newtonville, MA 02460 212-431-2374 office sreza@nyls. SADIQ REZA NEW YORK LAW SCHOOL Home Address: 185 West Broadway 335 Linwood Avenue New York, NY 10013 Newtonville, MA 02460 212-431-2374 office sreza@nyls.edu EMPLOYMENT NEW YORK LAW SCHOOL. PROFESSOR,

More information

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint

More information

GERALD F. LEONARD Boston University School of Law 765 Commonwealth Ave. Boston, MA 02215 617-353-3138 gleonard@bu.edu

GERALD F. LEONARD Boston University School of Law 765 Commonwealth Ave. Boston, MA 02215 617-353-3138 gleonard@bu.edu GERALD F. LEONARD 765 Commonwealth Ave. Boston, MA 02215 617-353-3138 gleonard@bu.edu EDUCATION J.D., Magna Cum Laude, University of Michigan Law School, 1995 Ph.D., History, University of Michigan, 1992

More information

How To Write A Book

How To Write A Book THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

The Geography of International terrorism

The Geography of International terrorism SUB Hamburg A/596060 The Geography of International terrorism An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina and George F. Hepner CRC Press Taylor & Francis Croup Boca

More information

THE CONSORTIUM FOR HEALTH AND HUMAN RIGHTS

THE CONSORTIUM FOR HEALTH AND HUMAN RIGHTS THE CONSORTIUM FOR HEALTH AND HUMAN RIGHTS he Consortium for Health and Human Rights is comprised of the Francois-Xavier Bagnoud Center for Health and Human Rights; Global Lawyers and Physicians; International

More information

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325 Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil

More information

Subject: The Urgent Need to Apply Behavioral Science to International Security: New Evidence + 2 Examples

Subject: The Urgent Need to Apply Behavioral Science to International Security: New Evidence + 2 Examples To: "Dr. Baruch Fischhoff - Chair, National Academy Committee on Improving Intelligence" From: Lloyd Etheredge Subject: The Urgent Need to Apply Behavioral

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

m a s t e r o f s c i e n c e i n

m a s t e r o f s c i e n c e i n m a s t e r o f s c i e n c e i n Global affairs The M.S. in Global Affairs is the flagship graduate program of the Center for Global Affairs (CGA), ranked by the Foreign Policy Association in 2010 and

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Khalid A. Kahloon Attorney At Law 600 West Main Street, Suite 500, Louisville, KY 40202 502.509.2110 Fax 502.584.1212 kahloon@msn.

Khalid A. Kahloon Attorney At Law 600 West Main Street, Suite 500, Louisville, KY 40202 502.509.2110 Fax 502.584.1212 kahloon@msn. Khalid A. Kahloon Attorney At Law 600 West Main Street, Suite 500, Louisville, KY 40202 502.509.2110 Fax 502.584.1212 kahloon@msn.com PROFESSIONAL EXPERIENCE Private Practice July 2010 Present Practice

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

How To Become A National Security Consultant

How To Become A National Security Consultant (Ed), Ph.D. 735 Woodmoor Acres Drive, Monument, Colorado 80132 (719) 493-2610 edlockephd@gmail.com Professional Profile Eager to share over twenty years of military and government homeland security experience

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

James Igoe Walsh. American University Post-Doctoral Fellow, School of International Service, 1996-7.

James Igoe Walsh. American University Post-Doctoral Fellow, School of International Service, 1996-7. March 2014 James Igoe Walsh Political Science Department University of North Carolina Charlotte Charlotte NC 28223 Telephone +1 704 237 0550 jwalsh@uncc.edu http://www.jamesigoewalsh.com Academic Experience

More information

SYLLABUS: Introduction to Public Policy PUP 3002 Section 3 Summer 2006 Time: M T W R F 2:00-3:15 PM Location: 115 Bellamy Building

SYLLABUS: Introduction to Public Policy PUP 3002 Section 3 Summer 2006 Time: M T W R F 2:00-3:15 PM Location: 115 Bellamy Building SYLLABUS: Introduction to Public Policy PUP 3002 Section 3 Summer 2006 Time: M T W R F 2:00-3:15 PM Location: 115 Bellamy Building INSTRUCTOR: Justin Esarey, 556 Bellamy Building CONTACT INFORMATION: Office

More information

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. MSE 6201, Homeland Security Course Syllabus Course Description Comprehensive examination of homeland security, terrorism, domestic security, emergency preparedness, and border and transportation security.

More information

Negotiating the Nation: Diaspora Contestations about Hindu Nationalism in India. 2010. Nations and Nationalism 16(4): 696-714.

Negotiating the Nation: Diaspora Contestations about Hindu Nationalism in India. 2010. Nations and Nationalism 16(4): 696-714. Bidisha Biswas Department of Political Science 516 High Street, Bellingham, WA 98225 (202) 664-3407 bidisha.biswas@wwu.edu Homepage: http://myweb.facstaff.wwu.edu/~biswasb EMPLOYMENT (2010-Present) Associate

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897 THOMAS B. HEFFELFINGER RESUME Personal Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897 Education

More information

MASTER OF PROFESSIONAL STUDIES

MASTER OF PROFESSIONAL STUDIES MASTER OF PROFESSIONAL STUDIES IN THE FIELD OF SECURITY AND SAFETY LEADERSHIP OFFERED BY THE GEORGE WASHINGTON UNIVERSITY COLLEGE OF PROFESSIONAL STUDIES CLASSES HELD AT: THE GW GRADUATE EDUCATION CENTER,

More information

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015 Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina

More information

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

How To Get A Security Degree In Australia

How To Get A Security Degree In Australia Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.

More information

April 9 10, 2015 Twentieth Century Club

April 9 10, 2015 Twentieth Century Club Countering Violent Extremism in the United States and the European Union April 9 10, 2015 Twentieth Century Club Registration is required. To register please visit: tinyurl.com/kxteapk All sessions will

More information

Emilie Marie Hafner-Burton

Emilie Marie Hafner-Burton Emilie Marie Hafner-Burton Princeton University Woodrow Wilson School of Public and International Affairs Department of Politics Princeton, NJ 08544 USA (609) 258.5931 ehafner@princeton.edu http://www.princeton.edu/~ehafner/

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information