TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 DECEMBER 2, Course Syllabus. GeorgetownX

Size: px
Start display at page:

Download "TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 DECEMBER 2, Course Syllabus. GeorgetownX"

Transcription

1 TERRORISM AND COUNTERTERRORISM Course Syllabus GeorgetownX August 31, 2015

2 TABLE OF CONTENTS Core Faculty... 2 Interviews... 4 Faculty Support Team... 4 What is the course about?... 5 Key Questions... 5 What does the course include?... 5 Course Section Outline... 6 What will I learn in the course?... 8 What should we expect from each other?... 8 What you can Expect from Professor Byman and the course team... 8 What you can expect from edx... 8 What we expect from you... 8 Appendix A: Detailed Course Section Outline What is Terrorism and Who are the Terrorists? (Release: September 24, 2015) Stratgies, Tactics, and Technology Use (Release: October 1, 2015) Al- Qaeda (Release: October 8, 2015) Islam (Release: October 15, 2015) Area studies: Israel (Release: October 22, 2015) Area studies: South Asia (Release: October 29, 2015) Counterterrorism and The Rule of Law (Release: November 5, 2015) Intelligence and Counterterrorism (Release: November 12, 2015) Counterterrorism Instruments (Release: November 19, 2015) Appendix B: Learning Checklist What is Terrorism and Who are the Terrorists Section 1: September Strategies, Tactics, and Technology Use Section 2: October Al- Qaeda Section 3: October Islam Section 4: October Area studies: The Terrorist Threat to Israel and the Israeli response Section 5: October Area Studies: Terrorism and Counterterrorism in South Asia Section 6: October 29- November Counterterrorism and the Rule of Law Week 7: November Intelligence and Counterterrorism Section 8: November 12-19, Counterterrorism Instruments Section 9: November 20-26, of 21

3 TERRORISM AND COUNTERTERRORISM What is the danger of terrorism, and how can the world respond effectively? NOTE: The course will be archived for the following duration: October 1, 2015 May 13, No certificates will be issued for work completed after December 2, CORE FACULTY Daniel L. Byman Dr. Byman is a Professor in the Security Studies Program of the Walsh School of Foreign Service at Georgetown University and the Research Director of the Brookings Institution s Center for Middle East Policy. Dr. Byman served as a Professional Staff Member with the National Commission on Terrorist Attacks on the United States (the 9/11 Commission ) and the Joint 9/11 Inquiry Staff of the House and Senate Intelligence Committees. He also worked as the Research Director of the Center for Middle East Public Policy at the RAND Corporation and as a Middle East analyst for the U.S. intelligence community. Dr. Byman received his B.A. in religion from Amherst College and his Ph.D. in political science from the Massachusetts Institute of Technology. Follow Jonathan Brown Dr. Jonathan Brown is a Prince Alwaleed Bin Talal Professor of Islamic Civilization in the Center for Muslim- Christian Understanding at Georgetown University, a term member of the Council on Foreign Relations, Editor- in- Chief of the Oxford Encyclopedia of Islamic Law, and publisher of several books and articles on the Hadith, Islamic law, Sufism, Arabic lexical theory and Pre- Islamic poetry. Dr. Brown's current research interests include the history of forgery and historical criticism in Islamic civilization, comparison with the Western tradition; and modern conflicts between Late Sunni Traditionalism and Salafism in Islamic thought. Dr. Brown received his B.A. in history from Georgetown University and his Ph.D. in near eastern languages and civilizations from the University of Chicago. John Esposito Founding Director of the Prince Alwaleed Bin Talal Center for Muslim- Christian Understanding, John Esposito specializes in Islamic studies, religion, and international affairs as a Professor at Georgetown University. Esposito's research is published in more than 45 books and monographs, including Unholy War: Terror in the Name of Islam and The Future of Islam, translated into over 35 languages. Past President of the Middle East Studies Association and the American Academy of Religion, a member of the E. C. European Network of Experts on De- Radicalisation, the board of C- 1 World Dialogue, an ambassador for the UN Alliance of Civilizations, Esposito is Editor- in- Chief of Oxford Islamic Studies Online, The Oxford Encyclopedia of the Islamic World and other Oxford reference works on the Islamic world and Islamic Studies. Christine Fair C. Christine Fair is a Georgetown Security Studies Program Assistant Professor, where she focuses on South Asian political and military affairs. Fair previously worked at the RAND Corporation, United Nations Assistance 2 of 21

4 Mission to Afghanistan in Kabul, and at USIP s Center for Conflict Analysis and Prevention. Fair has as authored, co- authored and co- edited several books, is a member of the Council on Foreign Relations, Women in International Security, International Studies Association, American Political Science Association, and American Institute of Pakistan Studies. She serves on the editorial board of numerous journals, and is a senior fellow with the Combating Terrorism Center at West Point. Fair received her PhD and MA from the University of Chicago. Her most recent book is Fighting to the End: The Pakistan Army s Way of War (Oxford University Press, 2014). Many of her other publications can be found at christinefair.net Bruce Hoffman Bruce Hoffman is a Professor and Director of both the Center for Security Studies and the Security Studies Program at Georgetown University. Professor Hoffman is currently a member of the National Security Preparedness Group; a Global Scholar at the Woodrow Wilson International Center for Scholars; a Senior Fellow at the Combating Terrorism Center; a Visiting Professor at the International Institute for Counter- Terrorism, Herzliya, Israel and at the Handa Centre for the Study of Terrorism and Political Violence at St Andrews University, Scotland ; and serves in various editing capacities at The National Interest, Studies in Conflict and Terrorism, and the Columbia University Press Series on Terrorism and Irregular Warfare. Hoffman was awarded the United States Intelligence Community Seal Medallion in 1994 from the Director of Central Intelligence. Follow Fathali M. Moghaddam Fathali M. Moghaddam is Professor, Department of Psychology, Georgetown University, and Editor- in- Chief of Peace and Conflict: Journal of Peace Psychology (American Psychological Association). Moghaddam was born in Iran, educated from an early age in England, and worked for the United Nations and McGill University before joining Georgetown University in He has published extensively on radicalization, intergroup conflict, and the psychology of dictatorship and democracy. His most recent book is The Psychology of Dictatorship (2013), which received Honorable Mention, 2013 Prose Awards for Professional and Scholarly Excellence. Moghaddam has received a number of recognitions for his scholarly contributions, the most recent being the Outstanding International Psychologist Award for 2012 from the American Psychological Association s Division of International Psychology. Paul R. Pillar In 2005, Paul Pillar retired after a 28- year intelligence career in positions such as National Intelligence Officer for the Near East and South Asia; Chief of Analytic Units at the Central Intelligence Agency (CIA); an original member of the National Intelligence Council s Analytic Group; Executive Assistant to CIA's Deputy Director for Intelligence; Executive Assistant to Director of Central Intelligence William Webster; and Head of Assessments and Information Group and Deputy Chief of the DCI Counterterrorist Center. Pillar is a retired officer in the U.S. Army Reserve and a former core faculty member at Georgetown University Security Studies Program. He received his B.A. from Dartmouth College, his Ph.D. from Princeton University, and a B.Phil. from Oxford University. Benjamin Wittes Benjamin Wittes is a senior fellow in Governance Studies at The Brookings Institution. He co- founded and is the editor- in- chief of the Lawfare blog, which is devoted to sober and serious discussion of "Hard National 3 of 21

5 Security Choices," and is a member of the Hoover Institution's Task Force on National Security and Law. He is the author of Detention and Denial: The Case for Candor After Guantanamo, published in November 2011, co- editor of Constitution 3.0: Freedom and Technological Change, published in December 2011, and editor of Campaign 2012: Twelve Independent Ideas for Improving American Public Policy (Brookings Institution Press, May 2012). He is also writing a book on data and technology proliferation and their implications for security. He is the author of Law and the Long War: The Future of Justice in the Age of Terror, published in June 2008 by The Penguin Press, and the editor of the 2009 Brookings book, Legislating the War on Terror: An Agenda for Reform. INTERVIEWS Jacob Shapiro, Associate Professor, Princeton University and author of The Terrorist s Dilemma: Managing Violent Covert Organizations. Juan Zarate, Senior Adviser, Center for Strategic and International Studies, and former first Secretary of Treasury for Terrorism Financing and Financial Crimes Major David Blair, USAF, MQ- 1 Predator Pilot, United States Air Force Mark Mazzetti, New York Times Reporter and author of The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth. Peter Neumann, Professor, King s College London, and Director, International Centre for the Study of Radicalisation Rita Katz, Co- founder, SITE Intelligence Group FACULTY SUPPORT TEAM Marc Meyer, Course Manager and Lead Teaching Assistant Marc Meyer is a M.A. candidate in the Security Studies Program at Georgetown University, focusing on terrorism and sub- state violence. He also works as Dr. Daniel Byman s research assistant, concentrating on terrorism and insurgency worldwide. He has worked in various capacities at the Government Accountability Office (GAO), US House of Representatives and the US Marshals Service. He received his B.A. in Law, Societies and Justice with a minor in comparative religion from the University of Washington- Seattle. Kait Williamson, Teaching Assistant Kait Williamson is an MA Candidate in the Communication, Culture, & Technology program at Georgetown University, specializing in conflict studies through media, terrorism propaganda, and data analytics. Kait works for the PeaceTech Lab, a nonprofit created by the United States Institute of Peace. With a background in PR and politics Kait has previous experience in Governor Chris Christie's Press Office. She has worked in various cultures from London to Qatar, utilizing her foreign/public affairs skills and political knowledge. Natalia Peña, Teaching Assistant Natalia Peña is an M.A. candidate in the Security Studies Program at Georgetown University, where she focuses on terrorism and sub- state violence. Prior to studying at Georgetown, Natalia has previously worked in 4 of 21

6 the Massachusetts House of Representatives and the Plymouth County District Attorney's Office. Her research interests include regional security in the Middle East, Islam, and the evolution and use of radical ideology. She graduated from Boston College with a double major in Political Science and Islamic Civilization and Societies. WHAT IS THE COURSE ABOUT? Terrorism has gone from a persistent yet marginal security concern to one of the most important security problems of our day: indeed, there are few countries that do not suffer from some form of terrorism. Though many terrorist attempts fail, some groups wage lengthy and bloody campaigns and, in exceptional cases, kill hundreds or even thousands in pursuit of their ends. Course topics include the nuances involved in defining terrorism, the nature of Al- Qaeda, Hamas, and other important groups, the effectiveness of different counterterrorism tools like detention and military force, linkages (or the lack thereof) between terrorism and world religions like Islam, terrorist recruiting, the rule of law, the political context in South Asia and the Middle East, and terrorist use of technology. KEY QUESTIONS What is terrorism, and what are the components of different definitions? What are common causes of terrorism? What are common strategies and tactics of terrorism? How do terrorist groups respond to technological change? What are common weaknesses of terrorist groups? Why do these occur? What are the primary terrorism and counterterrorism challenges related the India- Pakistan confrontation? What are the primary terrorism and counterterrorism lessons related to the Israeli- Palestinian confrontation? What is the nature of Al- Qaeda, and why has it proven such a difficult adversary? What is the relationship between Islam and violence? What is the role of intelligence in counterterrorism? What are the strengths and weaknesses of different counterterrorism instruments? How can you fight terrorism in accord with the rule of law? Under what conditions does terrorism "work? How serious a problem is terrorism? In what ways does it manifest? WHAT DOES THE COURSE INCLUDE? Each section of the course listed in the Course Section Outline below begins with an Introduction subsection and ends with a Conclusion & Looking Ahead subsection. In between these subsections, the topics are organized sequentially. Most of the subsections are required when working towards a certificate of completion, but there are also optional segments for those interested in learning more. Further, Section 5 5 of 21

7 focuses on a geographical region plagued by terrorism. This section presents the learners with two options, one of which will be required for certificate of completion. Students can choose their area studies focus to be on either Israel and the Palestinians or South Asian terrorism. These topics (listed in the Course Section Outline below) include lectures highlighting key concepts that are summarized under the Definition of Terms menu item, knowledge checks, polls, a case study simulation, and discussion activities. The Introduction includes a weekly guide that lists the key questions to be addressed in that course section. It also lists the readings, which may be links to external website or PDF files. The weekly guide is then followed by the faculty member s introduction of the section's topic under study. The Conclusion & Looking Ahead provides you with a listing of the key learning outcomes related to that particular section of the course. It features the faculty member s summary of key points and considerations in relation to the topics addressed. In addition, this subsection offers you the opportunity to ask clarifying questions on the specific subsection or overall course material that will be collected by course teaching assistants and answered by Professor Byman or another expert. The Simulation will come once the course after the course has been completed, and prompts students to engage in a fictional case study and conduct a threat assessment. This is optional for learners, but will help reinforce key concepts learned throughout the course by drawing on course content and readings to complete the threat assessment. The overall course content outline follows. Note that numbered sections listed below are released on a weekly basis. These dates are listed next to each topic. For a complete listing of the weeks, including list of key questions and readings, see Appendix A. COURSE SECTION OUTLINE 1. What is Terrorism and Who Are The Terrorists? (Release: September 24, 2015) This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. 2. Strategies, Tactics, and Technology Use (Release: October 1, 2015) This section of the course explores the various strategies and common tactics employed by most terrorist organizations as well as terrorist use of technology. This section will also feature Professor Byman s interview with terrorism scholar Jacob Shapiro, which is optional for class participants. 3. Al- Qaeda (Release: October 8, 2015) This section of the course explores the most important modern terrorist group - - Al- Qaeda and its historical evolution, goals, strengths and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co- founder Rita Katz. 4. Islam (Release: October 15, 2015) This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam Salafism. 5. Area Studies: Israel/Palestine (Release: October 22, 2015) This section of the course explores the terrorist threat to Israel and the Israeli response. 6. Area Studies: South Asia (Release: October 29, 2015) 6 of 21

8 This section of explores terrorism and counterterrorism in South Asia. 7. Counterterrorism and the Rule of Law (Release: November 5, 2015) This section of the course explores the implications of U.S. domestic and international law for counterterrorism. 8. Intelligence and Counterterrorism (Release: November 12, 2015) This section of the course explores the role of intelligence in counterterrorism operations and considers several important post- 9/11 controversies such as surveillance and torture. 9. Counterterrorism Instruments (Release: November 19, 2015) This section of the course explores various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ- 1 Predator Pilot Major David Blair, USAF and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate. 7 of 21

9 WHAT WILL I LEARN IN THE COURSE? The course is designed to help you achieve the following learning goals and objectives. Recall the working definitions of terrorism and recognize their analytic limits; Identify a range of causes of terrorism and, as importantly, understand what commonly cited issues are not usually causes; Understand the strategies and tactics of terrorist groups; Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al- Qaeda; Understand the relationship between religion and terrorism; and Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. A Learning Checklist that organizes the learning goals above with the learning objectives for each of the course sections is available to you in Appendix B of this syllabus. Use this to help you determine what you are learning in the course. In addition, Appendix C of this syllabus includes the Definition of Terms handout that highlights the key terms used throughout the course. WHAT SHOULD WE EXPECT FROM EACH OTHER? WHAT YOU CAN EXPECT FROM PROFESSOR BYMAN AND THE COURSE TEAM Every week, Professor Byman will address the top five student questions, which will be ed to you every week and posted in the updates section. Instructions for posting questions for Professor Byman are included in the Conclusion & Looking Ahead subsections. In addition, Teaching Assistants will regularly participate in discussion boards to provide content clarification, guidance, and support. We will be providing regular updates and reminders in the Course Info page beyond Professor Byman s weekly response to your questions. We will also be providing weekly current events news briefs, in addition to posting relevant news stories surrounding terrorism and counterterrorism on our social media outlets Facebook and Twitter. WHAT YOU CAN EXPECT FROM EDX In the event of a technical problem, you should click the Help tab located on the left border of the screen (Figure 1). This Help tab opens an instruction box that directs you to student Frequently Asked Questions (FAQs) for general edx questions. You can also: Report a problem Make a suggestion Ask a question You may post technical problems to the Technical thread of the discussion board. Finally, you may also contact technical@edx.org directly to report bugs. WHAT WE EXPECT FROM YOU Figure 1: Screenshot with Help tab 8 of 21

10 Students should spend around eight to ten (8-10) hours per week to review assigned readings, watch weekly lectures, work through weekly knowledge checks and other activities, including the discussion threads, polling questions, and keeping informed of current events surround terrorism and counterterrorism. In each course section we have included activities to support you in reaching the specified learning objectives for that section. The graded activities are categorized as knowledge checks; these are the activities that are counted toward achieving the certificate for the course. They include: Multiple answer questions; Multiple choice questions; True/False questions; and Self- assessment open response questions. To receive a course certificate, you must complete/submit all graded assignments by December 2 nd, 2015 at 9:00 EDT/13:00 UTC and receive a score of 75 percent or higher. To supplement the graded knowledge check activities listed above, we have also included other components to enable learners to explore the subject matter more deeply. These include: Discussion questions; Polling questions; and Case study simulation: We have also created a case study simulation that draws upon each section to apply concepts learned in the class. The simulation places the student in the position of an employee at a (fictional) intelligence service tasked with stopping a potential terrorist attack. Students are encouraged to consider the case study in light of the course's content material and which concepts apply to the individual at question. All activities included in the course are designed to help you gauge your learning as a result of your interaction with the course content both from the video lectures and readings. Instructions on how to complete the activities are included within each course section. WEEKLY TIMELINE The due dates for submission for all activities are listed in each course section. Since the course opens on September 24 th (Thursday), our weeks are from Thursday to Wednesday. Take a look at our suggested path below for engaging with the course on a weekly basis. Each week begins on Thursday at 9:00 EDT/13:00 UTC Study the course content Take Part in the Achvihes Each week ends on Wednsday Review the weekly guide Watch the course video introducton Read the assigned readings for the week Watch the video lectures Use the Student Lecture Notes area to highlight key points Complete the knowledge checks Partcipate in the discussions and polls Consider the case study in light of the week's content material Review course materials Finish any pending actvites Submit any clarifying questons for the week for Professor Byman by at 9:00 EDT/ 13:00 UTC Figure 2: Suggested weekly engagement 9 of 21

11 NETIQUETTE GUIDELINES Please be respectful To promote the best educational experience possible, we ask each student to respect the opinions and thoughts of other students and be courteous in the way that you choose to express yourself. Terrorism and Counterterrorism topics elicit and should elicit - - passionate and controversial debates. However, informed debate should never give way to insult, rudeness, or anything that might detract from the learning process. GUIX x students should be respectful and considerate of all opinions. In order for us to have meaningful discussions, we must learn to understand what others are saying and be open- minded about others opinions. If you want to persuade someone to see things differently, it is much more effective to do so in a polite, non- threatening way rather than to do so antagonistically. Everyone has insights to offer based on his/her experiences, and we can all learn from each other. Civility is essential: Our teaching assistants can, and will, remove students from the class who detract from the learning process with insulting comments on the course- wise discussion boards. Look before you write Prior to posting a question or comment on the discussion board, the Georgetown course team asks that you look to see if any of your classmates have the same question. Upvote questions that are similar to your own or that are also of interest to you, instead of starting a new thread. This will greatly help our Georgetown TAs best monitor the discussions and bring important questions to Professor Byman s attention. Use the discussion board for course- related posts only Although we encourage students to get to know each other, please use the discussion board as a for course content conversations only. Properly and promptly notify us of technical issues Although we do not predict technical issues, they can and may happen. To make sure these receive prompt attention, post details about any technical issues directly on the Technical discussion thread or technical@edx.org directly. ACADEMIC INTEGRITY Observe edx and GeorgetownX s honor policies Although collaboration and conversation will certainly contribute to your learning in the course, we ask students to refrain from collaborating with or consulting one another on any graded material for the course. Violations of the honor policy undermine the purpose of education and the academic integrity of the course. We expect that all work submitted will be a reflection of one s own original work and thoughts. GeorgetownX faculty and staff expect all members of the community to strive for excellence in scholarship and character. 10 of 21

12 APPENDIX A: DETAILED COURSE SECTION OUTLINE 1. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS? (RELEASE: SEPTEMBER 24, 2015) This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. KEY QUESTIONS: Why is terrorism so difficult to define? How have definitions of terrorism changed over time? What are the common, core elements of terrorism as a means to build a definition? What are the differences and similarities between terrorism and guerrilla warfare? What are the core definitional requirements of terrorism? Why do people become terrorists? What is the process that results in an individual s radicalization and then recruitment? How do terrorists justify the violence they commit? Why is it so difficult, if not impossible, to develop a common set of reasons for why someone becomes a terrorist? What are the roles of various situational and personality factors that shape terrorists? REQUIRED READINGS: Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 2nd edition, 2006), pp and pp Fathali M. Moghaddam, "The Staircase to Terrorism: A Psychological Exploration," American Psychologist, Iss. 2, (2005), pp R.F. Paloutzian & C. Park (Eds.), Moghaddam, F.M., Warren, Z., & Love, K., Religion and the Staircase to Terrorism, 2nd ed., pp (2013) in Handbook of the Psychology of Religion and Spirituality. OPTIONAL READINGS: Leonard Weinberg, et al., The Challenges of Conceptualizing Terrorism, Terrorism and Political Violence, vol. 16, no. 4 (2004), pp The United States Department of State, Country Reports on Terrorism (Washington, D.C., 2013). p. xvi only [including the footnote]. 11 of 21

13 2. STRATGIES, TACTICS, AND TECHNOLOGY USE (RELEASE: OCTOBER 1, 2015) This section of the course explores the various strategies and common tactics employed by most terrorist organizations, as well as terrorist use of technology. This section will also feature Professor Byman s interview with terrorism scholar Jacob Shapiro, which is optional for class participants.. KEY QUESTIONS: What are the different strategies that terrorist groups use to advance their objectives? What are the strengths and weaknesses of the various strategies? Why does terrorism essentially functions in a technological vacuum compared with modern warfare? What are the reasons for terrorists operational conservatism? How do ease and low cost affect terrorist planning and operations? Why do terrorists avoid sophisticated technologies when they innovate? What role does publicity play in fostering terrorist innovation? Why are terrorists rarely attracted to more sophisticated technologies and Weapons of Mass Destruction (WMD)? REQUIRED READINGS: Bruce Hoffman, Inside Terrorism, Columbia University Press, 2nd. Edition (2006), pp John Parachini, "Putting WMD Terrorism into Perspective, Washington Quarterly, Vol. 26, Iss. 4, pp OPTIONAL READINGS: Central Intelligence Agency, Terrorist CBRN: Materials and Effects, June AL- QAEDA (RELEASE: OCTOBER 8, 2015) This section of the course explores the most important modern terrorist group Al- Qaeda and its historical evolution, goals, strengths, and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co- founder Rita Katz. KEY QUESTIONS: How has Al- Qaeda evolved over time? Why did Al- Qaeda conduct the 9/11 attacks and how did it adjust to setbacks it suffered in the attacks aftermath? What are Al- Qaeda s key organizational goals? What are some of the key traits and characteristics of senior Al- Qaeda leaders and their supporters? 12 of 21

14 Why do groups affiliate with Al- Qaeda and what are common limits to cooperation between affiliates and the core organization? REQUIRED READINGS: Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist Movement (United Kingdom: Oxford University Press, 2015), selected pages: pp.13-14, 25-27, 47-50, 57-59, 82-83, , National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), The 9/11 Commission Report (Norton: 2004), "The Foundation of New Terrorism," pp National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), "Al Qaeda Aims at the American Homeland," pp Lawrence Wright, The Man Behind Bin Laden, The New Yorker (September 16, 2002). Bruce Hoffman and Fernando Reinares, "Conclusions," The Evolving Global Terrorism Threat. Cases from 9/11 to Osama bin Laden's Death (Columbia University Press: New York, 2014). "ISIS vs. Al Qaeda: Jihadism s Global Civil War, The National Interest, Iss. 136, pp (March/April 2015). OPTIONAL READINGS: Daniel Byman Breaking the Bonds between Al Qaeda and Its Affiliate Organizations, (Brookings 2012). Peter Bergen and Paul Cruickshank, The Unraveling: Al- Qaeda s Revolt against Bin Ladin, The New Republic, June ISLAM (RELEASE: OCTOBER 15, 2015) This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam Salafism. KEY QUESTIONS: Can Islam be viewed as a driver of terrorism? What does the term jihad mean, and what are the ways in which it has been used and/or exploited? What are the majority attitudes among Muslims towards terrorism in the name of Islam? How did the "global jihad," championed by Osama bin Laden and Al- Qaeda, emerge? What is the rationale for suicide bombing and how have Muslim religious leaders have responded? When is violent resistance in the name of jihad acceptable according to mainstream tradition? When is violence illegitimate? What is the basic nature of Salafism? What is the important difference between Salafism and mere backwardness? What is the place of Saudi Arabia in global Salafism? 13 of 21

15 Why are conservatism in religion and violence not inherently linked? How do seemingly arcane legal issues affect attitudes towards political legitimacy and the acceptability of violent uprisings? REQUIRED READINGS: John L. Esposito, "Terrorism & the Rise of Political Islam," in Democracy & Terrorism: Vol. 1 The Roots of Terrorism, (ed.) Louise Richardson (London: Francis & Taylor, 2006). Mark Juergensmeyer, "Does Religion Cause Terrorism?" National Policy Forum on Terrorism, Security and America's Purpose - Washington, D.C., September 6-7, Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist Movement (United Kingdom: Oxford University Press, 2015), pp OPTIONAL READINGS: Quintan Wictorowicz, "Anatomy of the Salafi Movement," Studies in Conflict and Terrorism 29, no. 3 (2006): pp John O. Voll, Foundations for Revival and Reform," in The Oxford History of Islam, ed. John L. Esposito, (Oxford: Oxford University Press, 1999), pp Ed. Basheer Nafi, "The Rise of Islamic Reformist Thought and its Challenge to Traditional Islam," in Islamic Thought in the Twentieth Century, ed. Suha Farouki and Basheer M. Nafi, (London: I.B. Tauris, 2004), pp AREA STUDIES: ISRAEL (RELEASE: OCTOBER 22, 2013) This section of the course explores the terrorist threat to Israel and the Israeli response. KEY QUESTIONS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE What have Palestinian groups accomplished using terrorism? What have they failed to accomplish? What methods has Israel used to fight Palestinian terrorism? How do the methods work together? How has Israel gathered intelligence on suspected terrorists? What are the advantages and disadvantages of different Israeli counterterrorism instruments? How has terrorism interacted with the peace process? REQUIRED READINGS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE: Daniel Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism (New York: Oxford University Press, 2011), pp , , and of 21

16 Daniel Byman, "Curious Victory: Explaining Israel's Suppression of the Second Intifada," Terrorism and Political Violence (November 2012), pp OPTIONAL READINGS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE: None. 6. AREA STUDIES: SOUTH ASIA (RELEASE: OCTOBER 29, 2013) This section of the course explores terrorism and counterterrorism in South Asia. KEY QUESTIONS: How has political Islam in Pakistan evolved? Consider in particular how the Two Nation Theory and the impact of the bloody process of partition shaped the two new states of India and Pakistan that emerged in What are the origins of Pakistan's Non- State Actor Policy in Kashmir, India and Afghanistan? Which are the main Pakistani militant groups operating in and from Pakistan? What is the role of nuclear weapons in facilitating Pakistan's Non- State Actor Policy in India and beyond? What are the questions and problems facing Pakistan as it tries to manage the spread of domestic Islamist terrorism while retaining its commitment to using Islamist militants outside of Pakistan to achieve its policy goals? REQUIRED READINGS: C. Christine Fair, Fighting to the End: The Pakistan Army's Way of War (United Kingdom: Oxford University Press, 2014), Chapters 1, 3, 7, 8, & 9. Husain Haqqani, Pakistan: Between Mosque and Military, (Washington, D.C.: Carnegie Endowment for International Peace, 2005). Chapters 4, 5, 7, & 9. OPTIONAL READINGS: None. 7. COUNTERTERRORISM AND THE RULE OF LAW (RELEASE: NOVEMBER 5, 2015) This section of the course explores the implications of U.S. domestic and international law for counterterrorism. KEY QUESTIONS: What are the laws of war and how do they related to counterterrorism? What is the impact of criminal law on counterterrorism? What legal authorities govern which government agencies? How do the roles of various government agencies differ? How does the law affect targeted killings? How does the law affect interrogations? 15 of 21

17 How does the law affect the use of force? REQUIRED Readings: Daniel O'Donnell, "International Treaties Against Terrorism and the Use of Terrorism During Armed Conflict and by Armed Forces," International Review of Red Cross, Vol. 88, No. 864, December United Nations Security Council, Resolution 1373, September 28, U.S. Constitution. U.S. Supreme Court, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (The Steel Seizure Case), with particular attention on Justice Jackson's tripartite framework and Chief Justice Vinson's dissent. OPTIONAL READINGS: U.S. Supreme Court, United States v. Curtis- Wright Export Corp, 299 U.S. 304 (1936). U.S. Supreme Court, New York Times Co. v. United States, 403 U.S. 713 (1971). U.S. Supreme Court, Katz v. United States, 389 U.S. 347 (1967). U.S. Supreme Court, U.S. v. U.S. District Court, 407 U.S. 297 (1972). 8. INTELLIGENCE AND COUNTERTERRORISM (RELEASE: NOVEMBER 12, 2013) This section of the course explores the role of intelligence in counterterrorism operations and considers several important post- 9/11 controversies such as surveillance and torture. KEY QUESTIONS: What are the purposes that intelligence serves in counterterrorism? What are the limits of intelligence in counterterrorism? What are collection and analytic techniques that intelligence services use in counterterrorism? What are the strengths and weaknesses of different intelligence techniques? What are the standards of success and failure regarding counterterrorist intelligence? What governmental organizations contribute to counterterrorist intelligence, especially in the United States, and how have they changed? What are the principle controversies involving intelligence used for counterterrorism? REQUIRED READINGS: Daniel Byman, "The Intelligence War on Terrorism," Intelligence and National Security (2013). Richard A. Posner, "Principles of Intelligence," Preventing Surprise Attacks (Rowman & Littlefield, 2005), Chapter of 21

18 OPTIONAL READINGS: Gabriella Blum and Philip B. Heymann, "Interrogation," in Laws, Outlaws, and Terrorists (Massachusetts: MIT Press, 2010), Chapter COUNTERTERRORISM INSTRUMENTS (RELEASE: NOVEMBER 19, 2013) This section of the course explores the various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ- 1 Predator Pilot Major David Blair, USAF, and former first Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate. KEY QUESTIONS: What are the various instruments used in counterterrorism? What are the principal ways in which each instrument is used? What are the contributions and advantages of each instrument? What are the limitations and disadvantages of each instrument? How are these counterterrorism instruments used together in a complementary way? REQUIRED READINGS: Audrey Kurth Cronin, "Why Drones Fail, Foreign Affairs (July/August 2013). Daniel Byman, "Why Drones Work, Foreign Affairs (July/August 2013). Paul R. Pillar, "Counterterrorist Instruments," in Terrorism and U.S. Foreign Policy (Washington, D.C.: Brookings, 2003), Chapter 4. OPTIONAL READINGS: Daniel Byman, "Diplomacy," in The Five Front War: The Better Way To Fight Global Jihad, New York: Wiley, 2007), Chapter 8. Michael Scheuer Testimony in "Extraordinary Rendition in U.S. Counterterrorism Policy: The Impact on Transatlantic Relations," House Foreign Affairs Committee, April 17, Read the Question and Answer session! Paul R. Pillar and Christopher Preble, "Don't You Know There's a War On? Assessing the Military's Role in Counterterrorism," in Benjamin H. Friedman, Jim Harper, and Christopher A. Preble (eds.), Terrorizing Ourselves (Washington, D.C.: Cato Institute, 2010). 17 of 21

19 18 of 21

20 APPENDIX B: LEARNING CHECKLIST This guide lists the learning goals and objectives for each section of the GeorgetownX Terrorism and Counterterrorism Course (September 24, November 25, 2015). Use this guide as your own learning checklist while engaging with the course. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS SECTION 1: OCTOBER 1-7 Recall the working definitions of terrorism and recognize their analytic limits. Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. Explain how terrorism has changed throughout history and how it is hard to define. Recognize how terrorism differs from other forms of conflict and violence like guerilla warfare. List the core elements of the definition of terrorism. Indicate how someone becomes a terrorist and how he or she might justify and rationalize the violence they commit. Recognize the diversity of reasons that account for someone becoming a terrorist. Recognize the distinct psychological processes and policy measures associated with each level on the staircase to terrorism. STRATEGIES, TACTICS, AND TECHNOLOGY USE SECTION 2: OCTOBER 1-7 Understand the strategies and tactics of terrorist groups. Identify the different strategies that terrorist groups use and their associated strengths and weaknesses. Describe the most common types of terrorist attacks and how terrorists use technology. AL- QAEDA SECTION 3: OCTOBER 8-14 Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al- Qaeda. Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. Identify one or more accomplishments, weaknesses and/or problems of each group. Identify the various main militant groups and their objectives. Recognize the diversity of reasons that account for someone becoming a terrorist. ISLAM SECTION 4: OCTOBER Understand the relationship between religion and terrorism. Describe jihad and ways in which it has been used and/or exploited. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. Identify the causes if terrorism and its relationship to religion. Explain the emergence of global jihad inspired by Osama bin Laden and Al- Qaeda. Explain the ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism. 19 of 21

21 Define Salafism. Explain the place of Saudi Arabia in global Salafism. Recognize that conservatism in religion and violence are not necessarily linked. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. AREA STUDIES: THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE SECTION 5: OCTOBER Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. Recognize the strengths and limits of different counterterrorism instruments, including intelligence, economic punishment, and different uses of military force (drones/targeted killing of terrorists). Explain how intelligence is collected against terrorist groups and recognize different means (human intelligence, signals intelligence, etc.). Describe the impact of counterterrorism on peace negotiations. AREA STUDIES: TERRORISM AND COUNTERTERRORISM IN SOUTH ASIA SECTION 6: OCTOBER 29- NOVEMBER 4 Identify important terrorist groups in the Middle East and/or South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al- Qaeda. Understand the relationship between religion and terrorism. Describe the evolution of political Islam. Describe what state supporters do and do not offer groups. Identify the various main militant groups. Explain the ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism. Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. COUNTERTERRORISM AND THE RULE OF LAW WEEK 7: NOVEMBER 5-11 Understand how counterterrorism constrained in a democratic society. o Understand the legal principles shaping detention o Understand the legal principles shaping surviellence o Understand the legal principles shaping targeted killings o Identify which authorities govern which bureaucracies? Identify the sources of law related to counterterrorism? Describe important legal issues regarding U.S. counterterrorism today INTELLIGENCE AND COUNTERTERRORISM SECTION 8: NOVEMBER 12-19, 2013 Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. Explain how intelligence is collected against terrorist groups and recognize the different means (human intelligence, signals intelligence, etc.). 20 of 21

22 Identify the types of governmental organizations that contribute to counterterrorist intelligence and how they have changed. Describe the principle controversies in recent years involving intelligence used for counterterrorism. COUNTERTERRORISM INSTRUMENTS SECTION 9: NOVEMBER 20-26, 2013 Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. Recognize the strengths and limits of different counterterrorism instruments, including intelligence, economic punishment, and different uses of military force (drones/targeted killing of terrorism). Identify the tradeoffs in the use of each counterterrorism. If you are planning to get a Certificate, all graded activities have to be submitted by December 2nd at 9:00 EDT/13:00 UTC. 21 of 21

TERRORISM AND COUNTERTERRORISM SELF- PACED COURSE THROUGH MARCH 1, Course Syllabus. GeorgetownX

TERRORISM AND COUNTERTERRORISM SELF- PACED COURSE THROUGH MARCH 1, Course Syllabus. GeorgetownX TERRORISM AND COUNTERTERRORISM Course Syllabus GeorgetownX Self- Paced Course through March 1, 2017 TABLE OF CONTENTS Core Faculty... 2 Interviews... 4 Faculty Support Team... 4 What is the course about?...

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Madam Chairman, Mr. Vice Chairman, Members of the Committee: It is a distinct honor

More information

Radicalization/De-radicalization:

Radicalization/De-radicalization: Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Radicalization/De-radicalization: Lessons for the Next U.S. President 4 December 2008 SUMMARY In the third installment in

More information

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: A. It is important for an individual to understand the history of

More information

Hoffman, Bruce Inside Terrorism: Revised and Expanded Edition. Columbia University Press. ISBN:

Hoffman, Bruce Inside Terrorism: Revised and Expanded Edition. Columbia University Press. ISBN: Politics of Counter-Terrorism Political Science 486S Spring 2017 Wednesday TU 219 5:50-8:50 PM Instructor: Jeremy Matthew Berkowitz E-mail Address: jberkow5@binghamton.edu Office Hours: Thursday 2:30-4:30

More information

Conference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA

Conference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA Naif Arab University for Security Sciences Supported By In Partnership With Conference on Use of the Internet to Counter the Appeal of Extremist Violence Naif Arab University for Security Sciences, Riyadh,

More information

General Course Information

General Course Information Course ECON 3369_HN1 The Political Economy of Terrorism Professor Todd Sandler Term Fall 2016 Meetings M, W 10:00-11:15 a.m., GC 1.208B Professor s Contact Information Office Phone 972-883-6725 Office

More information

PSC/IR 273 The Politics of Terrorism Fall :40am-10:55am, Dewey Alexander Lee

PSC/IR 273 The Politics of Terrorism Fall :40am-10:55am, Dewey Alexander Lee Instructor: Email: alexander.mark.lee@rochester.edu Office: Harkness Hall 327 Office Hours: Tuesday 11:30-2 PSC/IR 273 The Politics of Terrorism Fall 2014 9:40am-10:55am, Dewey 2162 Alexander Lee Course

More information

SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM

SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM AMERICAN UNIVERSITY ONLINE MASTER OF SCIENCE IN COUNTER- TERRORISM AND HOMELAND SECURITY American University s online Master of Science in Counter-Terrorism

More information

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 316. Dr. Mary Desjeans

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 316. Dr. Mary Desjeans INTERNATIONAL TERRORISM AND COUNTERTERRORISM Spring 2014 Political Science 379-01 MWF 1200-1250, Maybank 316 Dr. Mary Desjeans Office Hours: MW1100-1145 and by arrangement. Office Address: 26 Coming Street,

More information

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire 2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important

More information

M. Taylor Fravel Statement of Research (September 2011)

M. Taylor Fravel Statement of Research (September 2011) M. Taylor Fravel Statement of Research (September 2011) I study international security with an empirical focus on China. By focusing on China, my work seeks to explain the foreign policy and security behavior

More information

KIMBERLY JONES. Northeastern University, International Affairs Program 210 Renaissance Place, Boston, MA /

KIMBERLY JONES. Northeastern University, International Affairs Program 210 Renaissance Place, Boston, MA / KIMBERLY JONES Northeastern University, International Affairs Program 210 Renaissance Place, Boston, MA 02115 k.jones@neu.edu / 617.373.8203 EDUCATION Ph.D. in Public and International Affairs, Northeastern

More information

Manual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009

Manual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009 1 Manual for trainers Community Policing Preventing Radicalisation & Terrorism Prevention of and Fight Against Crime 2009 With financial support from the Prevention of and Fight against Crime Programme

More information

GOVT 315 Terrorism and Insurgency Department of Government Georgetown University

GOVT 315 Terrorism and Insurgency Department of Government Georgetown University GOVT 315 Terrorism and Insurgency Department of Government Georgetown University Fall 2011 MW 3:30 pm - 4:45 pm (ICC 234) Office Hours: 1:30pm 3:00pm [M] or by appointment Professor Elizabeth Grimm Arsenault

More information

Congressional Testimony

Congressional Testimony Congressional Testimony FOREIGN ASSISTANCE, SUPPORT FOR EXTREMISM AND PUBLIC OPINION IN MUSLIM MAJORITY COUNTRIES Written Testimony of Kenneth Ballen President Terror Free Tomorrow: The Center for Public

More information

CV, Naim 1 of 5 CURRICULUM VITAE SYED RASHID NAIM

CV, Naim 1 of 5 CURRICULUM VITAE SYED RASHID NAIM CV, Naim 1 of 5 CURRICULUM VITAE SYED RASHID NAIM Senior Lecturer Director of Undergraduate Studies Department Of Political Science Georgia State University II EDUCATION Ph.D.: In Political Science, from

More information

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction

More information

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0 Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0 AY17-18 COURSE DESCRIPTION: Terrorism in the 21 st century is a global phenomenon. This course is designed to

More information

I am happy to have the opportunity to address you today

I am happy to have the opportunity to address you today Special meeting of the Security Council Counter-Terrorism Committee on Preventing the Exploitation of Information and Communication Technologies (ICT) for Terrorist Purposes, while Respecting Human Rights

More information

Political Science 395, Section 15. Spring

Political Science 395, Section 15. Spring Department of Political Science Rutgers, The State University of New Jersey 89 George Street New Brunswick, NJ 08901-1411 Web: http://polisci.rutgers.edu Phone: 732-932-9283 Fax: 732-932-7170 Political

More information

confronting terrorism in the pursuit of power

confronting terrorism in the pursuit of power strategic asia 2004 05 confronting terrorism in the pursuit of power Edited by Ashley J. Tellis and Michael Wills Regional Studies South Asia: A Selective War on Terrorism? Walter K. Andersen restrictions

More information

The Department of State s Annual Report on Terrorism

The Department of State s Annual Report on Terrorism The Department of State s Annual Report on Terrorism Testimony of Raphael F. Perl Specialist in International Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service Before

More information

Introduction Rationale and Core Objectives

Introduction Rationale and Core Objectives Introduction The Middle East Institute (United States) and the Fondation pour la Recherche Stratégique (Paris, France), with support from the European Union, undertook the project entitled Understanding

More information

CoPPRa : Community policing and prevention of radicalisation. Rob Out 1

CoPPRa : Community policing and prevention of radicalisation. Rob Out 1 CoPPRa : Community policing and prevention of radicalisation Rob Out 1 I m really pleased to see that the CoPPRa project specifically addresses one of the most important but, in counter-terrorism context

More information

fragility and crisis

fragility and crisis strategic asia 2003 04 fragility and crisis Edited by Richard J. Ellings and Aaron L. Friedberg with Michael Wills Country Studies Pakistan: A State Under Stress John H. Gill restrictions on use: This

More information

A Dramatic Change of Public Opinion In the Muslim World

A Dramatic Change of Public Opinion In the Muslim World A Dramatic Change of Public Opinion In the Muslim World Results from a New Poll in Pakistan by Terror Free for Tomorrow, Inc All rights reserved. www.terrorfreetomorrow.org info@terrorfreetomorrow.org

More information

MIRIAM FENDIUS ELMAN. Department of Political Science, Arizona State University

MIRIAM FENDIUS ELMAN. Department of Political Science, Arizona State University MIRIAM FENDIUS ELMAN PRESENT POSITIONS: Associate Professor Department of Political Science, Arizona State University PREVIOUS POSITIONS: Assistant Professor (1996-2002) Department of Political Science,

More information

NEW PEACEKEEPING STRATEGIES FOLLOWING VIOLENT REGIME CHANGE. May 28-30, United States Institute of Peace. Washington, D.C.

NEW PEACEKEEPING STRATEGIES FOLLOWING VIOLENT REGIME CHANGE. May 28-30, United States Institute of Peace. Washington, D.C. NEW PEACEKEEPING STRATEGIES FOLLOWING VIOLENT REGIME CHANGE May 28-30, 2014 United States Institute of Peace Washington, D.C. Facilitated by Robert M. Perito 1 & UN Department of Peacekeeping Operations

More information

Joe Wippl Spring 2017

Joe Wippl Spring 2017 Joe Wippl Spring 2017 Fred Pardee School of Global Studies Boston University IR 556: PRESENT AND FUTURE INTELLIGENCE ISSUES: TERRORISM, PROLIFERATION, COUNTERINTELLIGENCE, ROGUE STATES AND NATIONAL/REGIONAL

More information

National Security Policy. National Security Policy. Begs four questions: safeguarding America s national interests from external and internal threats

National Security Policy. National Security Policy. Begs four questions: safeguarding America s national interests from external and internal threats National Security Policy safeguarding America s national interests from external and internal threats 17.30j Public Policy 1 National Security Policy Pattern of government decisions & actions intended

More information

G8 Declaration on Counter Terrorism

G8 Declaration on Counter Terrorism G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism

More information

Conflating Terrorism and Insurgency

Conflating Terrorism and Insurgency Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?

More information

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement?

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement? Continuing Conflict in SW Asia EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement? Directions Today, we will be looking at the causes of important ongoing conflicts

More information

Susanne Martin. Assistant Professor (2011 Present) Department of Political Science University of Nevada, Reno

Susanne Martin. Assistant Professor (2011 Present) Department of Political Science University of Nevada, Reno Susanne Martin Department of Political Science, University of Nevada, Reno 1664 N. Virginia, Mail Stop 0302, Reno, Nevada 89557 Phone: (512) 297-0447 E-mail: susannemartin@unr.edu RESEARCH AREAS Political

More information

Department of International Relations Tel:

Department of International Relations Tel: Prof. Husain Haqqani 154, Bay State Road Department of International Relations Tel: 617-358-07130 Email: haqqani@bu.edu CAS IR 531/COM 531 Intercultural Communication Spring 2014 "Intercultural communication

More information

Risa Alexandra Brooks, Ph.D. Assistant Professor of Political Science Marquette University

Risa Alexandra Brooks, Ph.D. Assistant Professor of Political Science Marquette University Risa Alexandra Brooks, Ph.D. Assistant Professor of Political Science Marquette University risa.brooks@marquette.edu PRIMARY RESEARCH INTERESTS International Security/Security Studies; Civil-Military Relations;

More information

Scott D. Sagan Stanford University Herzliya Conference, Herzliya, Israel,

Scott D. Sagan Stanford University Herzliya Conference, Herzliya, Israel, Scott D. Sagan Stanford University Herzliya Conference, Herzliya, Israel, 2009 02 04 Thank you for this invitation to speak with you today about the nuclear crisis with Iran, perhaps the most important

More information

ZACHARY SELDEN Department of Political Science University of Florida

ZACHARY SELDEN Department of Political Science University of Florida ZACHARY SELDEN Department of Political Science University of Florida zselden@ufl.edu PROFESSIONAL EXPERIENCE 2011 Assistant Professor, Department of Political Science University of Florida 2008-2011 Deputy

More information

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? International Terrorism: What is Terrorism? A. Dr. Jim Ray (2010) argues that terrorism has been around for a long time- terrorist

More information

Government Research Priorities for TSAS

Government Research Priorities for TSAS Government Research Priorities for TSAS TSAS works with a number of departments in government. This document alerts academic researchers to the questions that policy analysts find most interesting and

More information

Countering Violent Extremism and Radical Rhetoric

Countering Violent Extremism and Radical Rhetoric and Radical Rhetoric Assistant Professor School of International and Public Affairs Data Science Institute Columbia University February 1, 2019 A Soft Approach to Combat Terrorism Traditionally, CT has

More information

The Terror OCTOBER 18, 2001

The Terror OCTOBER 18, 2001 The Terror OCTOBER 18, 2001 Philip C. Wilcox Jr. Font Size: A A A The author, a retired US Foreign Service officer, served as US Ambassador at Large for Counterterrorism between 1994 and 1997. The Bush

More information

POLS 5179 Terrorism: A Comparative Politics Perspective

POLS 5179 Terrorism: A Comparative Politics Perspective Central European University MA Course, Fall Semester 2017 POLS 5179 Terrorism: A Comparative Politics Perspective Instructor Prof. Dr. Matthijs Bogaards Visiting Professor, Department of Political Science

More information

Masters in Terrorism and Political Violence - Full time programme

Masters in Terrorism and Political Violence - Full time programme Masters in Terrorism and Political Violence - Full time programme Programme Requirements Terrorism and Political Violence - MLitt IR5901 (30 credits) and IR5902 (30 credits) and 60 credits from Module

More information

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives. Confronting Extremism and Terrorism Major General Dr. Kamal Ahmed Amer Chairman of the Committee for Defense and National Security, and the House of Representatives. Terrorism is one of the most significant

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

Social Studies. Smyth County Schools Curriculum Map Grade:9--12 th. Subject:Current Affairs. Standards

Social Studies. Smyth County Schools Curriculum Map Grade:9--12 th. Subject:Current Affairs. Standards Grade:9--12 th Subject:Current Affairs 1st Quarter 2nd Quarter Standards Content 9/11 and the Global War on Terrorism Prelude and aftermath of September 11, 2001 Homeland security vs. civil liberties Weapons

More information

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Overview Since the downfall of the Federal Republic of Somalia s dictatorial regime under president Siad Barre

More information

Building Global Alliances in the Fight against Terrorism

Building Global Alliances in the Fight against Terrorism Building Global Alliances in the Fight against Terrorism By Alistair Mill ar and Eric Rosand November 2007 This paper was commissioned by the Better World Campaign, a sister organization of the United

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing

More information

WINTER. March 24. Template

WINTER. March 24. Template March 24 WINTER EQ- What are the different state shapes and types of boundaries? Agenda: 1. Daily Sheet 2. Review 3. Nation, State, Nation-States Gallery walk 4. Types of Boundaries Notes 4. Shapes of

More information

AFGHANISTAN. The Trump Plan R4+S. By Bill Conrad, LTC USA (Ret) October 6, NSF Presentation

AFGHANISTAN. The Trump Plan R4+S. By Bill Conrad, LTC USA (Ret) October 6, NSF Presentation AFGHANISTAN The Trump Plan R4+S By Bill Conrad, LTC USA (Ret) October 6, 2017 --NSF Presentation Battle Company 2 nd of the 503 rd Infantry Regiment 2 Battle Company 2 nd of the 503 rd Infantry Regiment

More information

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda Combating Terrorism Center at West Point Occasional Paper Series Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda May 2, 2011 Scott Helfstein, Ph.D. Dominick Wright, Ph.D. The views

More information

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? International Terrorism: What is Terrorism? A. Dr. Jim Ray (2010) argues that terrorism has been around for a long time- terrorist

More information

GOVT International Security. Fall George Mason University. Time: Monday 4:30pm Office: Robinson A 219

GOVT International Security. Fall George Mason University. Time: Monday 4:30pm Office: Robinson A 219 GOVT 745-001 International Security Fall 2016 George Mason University Room: Robinson B 108 Professor: Colin Dueck Time: Monday 4:30pm Office: Robinson A 219 Office hours: M 1-4 and by appointment E-mail:

More information

Martha Crenshaw. Senior Fellow at the Freeman Spogli Institute for International Studies. Bio BIO ACADEMIC APPOINTMENTS HONORS AND AWARDS

Martha Crenshaw. Senior Fellow at the Freeman Spogli Institute for International Studies. Bio BIO ACADEMIC APPOINTMENTS HONORS AND AWARDS Senior Fellow at the Freeman Spogli Institute for International Studies Curriculum Vitae available Online Bio BIO Martha Crenshaw is a senior fellow at CISAC and FSI and a professor of political science

More information

INTRODUCTION TO POLITICAL SCIENCE SYLLABUS GLENDALE COMMUNITY COLLEGE Fall 2003 POS 100 Section 3281

INTRODUCTION TO POLITICAL SCIENCE SYLLABUS GLENDALE COMMUNITY COLLEGE Fall 2003 POS 100 Section 3281 INTRODUCTION TO POLITICAL SCIENCE SYLLABUS GLENDALE COMMUNITY COLLEGE Fall 2003 POS 100 Section 3281 Instructor: Reuben M. Payne JD Office: 05-135 (in same building as bookstore) Phone: 602-978-1742 Class:

More information

Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010

Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010 Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub UK-US Workshop Summary Report December 2010 Dr Basia Spalek & Dr Laura Zahra McDonald Institute

More information

Terrorism and Asymmetric Warfare Course Syllabus

Terrorism and Asymmetric Warfare Course Syllabus MOSCOW STATE INSTITUTE OF INTERNATIONAL RELATIONS MGIMO UNIVERSITY School of Government and International Affairs B.A. in Government and International Affairs World Politics Department «Approved» Director,

More information

Globalization and Security

Globalization and Security Globalization and Security CREDIT INSTRUCTOR Seo-Hyun Park OFFICE TBA OFFICE HOURS TBA TIME TBA CLASSROOM LOCATION TBA E-MAIL seohyun@gmail.com * Please leave the fields blank which haven t been decided

More information

Winter 2006 Political Science 2004: Politics and Violence in the Middle East University of Missouri at Columbia

Winter 2006 Political Science 2004: Politics and Violence in the Middle East University of Missouri at Columbia Winter 2006 Political Science 2004: Politics and Violence in the Middle East University of Missouri at Columbia Instructor Özgür Özdamar 22 Professional Building Phone: 882-0097 E-mail: ioo33d (.a.t.)

More information

7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM

7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM 7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM The 7 TH Annual INTERPA Conference on New trends in combatting terrorism and extremism was hosted by the police college of

More information

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Committee: Human Rights Council Student Officer: Soo Young Yun, President from Wikimedia Commons Introduction: With

More information

Civil War and Political Violence. Paul Staniland University of Chicago

Civil War and Political Violence. Paul Staniland University of Chicago Civil War and Political Violence Paul Staniland University of Chicago paul@uchicago.edu Chicago School on Politics and Violence Distinctive approach to studying the state, violence, and social control

More information

PUBLIC ADMINISTRATION (PUAD)

PUBLIC ADMINISTRATION (PUAD) Public Administration (PUAD) 1 PUBLIC ADMINISTRATION (PUAD) 500 Level Courses PUAD 502: Administration in Public and Nonprofit Organizations. 3 credits. Graduate introduction to field of public administration.

More information

Address on the Future of Iraq. 26 February 2003, Washington, D.C.

Address on the Future of Iraq. 26 February 2003, Washington, D.C. George W. Bush Address on the Future of Iraq 26 February 2003, Washington, D.C. [AUTHENTICITY CERTIFIED: Text version below transcribed directly from audio] Thanks for the warm welcome. I'm proud to be

More information

The American Public on the 9/11 Decade

The American Public on the 9/11 Decade The American Public on the 9/11 Decade A Study of American Public Opinion September 8, 2011 PRIMARY INVESTIGATORS: SHIBLEY TELHAMI, STEVEN KULL STAFF: CLAY RAMSAY, EVAN LEWIS, STEFAN SUBIAS The Anwar Sadat

More information

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary

More information

ACADEMIC APPOINTMENTS

ACADEMIC APPOINTMENTS BRYAN T. GERVAIS Curriculum Vitae Department of Political Science and Geography University of Texas at San Antonio One UTSA Circle San Antonio, TX 78249 Office Phone: (210)458-5646 Email: bryan.gervais@utsa.edu

More information

The War in Iraq. The War on Terror

The War in Iraq. The War on Terror The War in Iraq The War on Terror Daily Writing: How should the United States respond to the threat of terrorism at home or abroad? Should responses differ if the threat has not taken tangible shape but

More information

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our

More information

A PRACTITIONER S GUIDE ON PREVENTING RADICALISATION IN SCHOOLS

A PRACTITIONER S GUIDE ON PREVENTING RADICALISATION IN SCHOOLS A PRACTITIONER S GUIDE ON PREVENTING RADICALISATION IN SCHOOLS November 2016 About the European Foundation for Democracy The European Foundation for Democracy is a Brussels and Berlin-based policy institute

More information

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair Second Interim Report of the National Commission on Terrorist Attacks Upon the United States Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair September 23, 2003 The National Commission on Terrorist

More information

States & Types of States

States & Types of States States & Types of States Political Geography Nation: a group of people with a common culture - Tightly knit group of people possessing shared cultural beliefs & unity: genous - Ancestry or historical events

More information

Brief contents. PART III Global conflict and war 245. PART I Foundations of global politics 1. PART II Institutions and actors in global politics 87

Brief contents. PART III Global conflict and war 245. PART I Foundations of global politics 1. PART II Institutions and actors in global politics 87 Brief contents PART I Foundations of global politics 1 Chapter 1 Introduction to global politics 3 Chapter 2 Global history: The making of the 21st century 20 Chapter 3 Competing theories, methods, and

More information

Terrorism Within Comparative International Context

Terrorism Within Comparative International Context Terrorism Within Comparative International Context M.R. Haberfeld Joseph F. King Charles Andrew Lieberman Terrorism Within Comparative International Context The Counter-Terrorism Response and Preparedness

More information

An Assessment of 516 Combatant Status Review Tribunal (CSRT) Unclassified Summaries. 25 July 2007

An Assessment of 516 Combatant Status Review Tribunal (CSRT) Unclassified Summaries. 25 July 2007 A RESPONSE TO THE SETON HALL STUDY An Assessment of 516 Combatant Status Review Tribunal (CSRT) Unclassified Summaries 25 July 2007 1 LTC JOSEPH FELTER, PH.D. DIRECTOR, COMBATING TERRORISM CENTER JARRET

More information

Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1

Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 October 19, 2012 Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 Foreign policy will take center stage in the third and

More information

AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the

AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the Judiciary Hearing on Civil Liberties and National Security

More information

PO/IR 265 TERRORISM: STRATEGIES OF DESTRUCTION IES Abroad Rome

PO/IR 265 TERRORISM: STRATEGIES OF DESTRUCTION IES Abroad Rome PO/IR 265 TERRORISM: STRATEGIES OF DESTRUCTION IES Abroad Rome DESCRIPTION: Terrorism has been one of the most pressing political problems of the last half-century: almost every continent has experienced

More information

DPI-730: The Past and the Present: Directed Research in History and Public Policy

DPI-730: The Past and the Present: Directed Research in History and Public Policy DPI-730: The Past and the Present: Directed Research in History and Public Policy Prof. Moshik Temkin Spring 2017 Monday 4:15-6 p.m. Taubman 401 Harvard Kennedy School Professor Moshik Temkin Harvard Kennedy

More information

APPLICANT INFORMATION CLASS OF 2018

APPLICANT INFORMATION CLASS OF 2018 APPLICANT INFORMATION CLASS OF 2018 1 We are a nationwide community, forged in the aftermath of 9/11, fighting for America's promise on the battlefield, along the campaign trail, and in the halls of government.

More information

epp european people s party

epp european people s party For a cohesive society: Countering Islamic extremism ADOPTED AT THE EPP CONGRESS - MALTA, 29-30 MARCH 2017 01 Open, tolerant societies and the separation of church and state have been important achievements

More information

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

Political Science 245: The United States in World Politics

Political Science 245: The United States in World Politics Political Science 245 John Oates Winter 2012 quarter Email: oates.35@osu.edu Ramseyer Hall 0100 Office: Derby 2081 Tues & Thurs, 2:30-4:18 p.m. Office hrs: Tues, 1:30-2:30 a.m. (and by appointment) Political

More information

GOVT-GOVERNMENT (GOVT)

GOVT-GOVERNMENT (GOVT) GOVT-GOVERNMENT (GOVT) 1 GOVT-GOVERNMENT (GOVT) GOVT 100G. American National Government Class critically explores political institutions and processes including: the U.S. constitutional system; legislative,

More information

IPS Survey of Iranian Public Opinion on its Nuclear Program, Recognition of Israel, Relations with the US, and the Removal of Sanctions

IPS Survey of Iranian Public Opinion on its Nuclear Program, Recognition of Israel, Relations with the US, and the Removal of Sanctions Institute for Policy and Strategy (IPS) IDC Herzliya IPS Survey of Iranian Public Opinion on its Nuclear Program, Recognition of Israel, Relations with the US, and the Removal of Sanctions Prof. Alex Mintz

More information

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION The United States has a vital national security interest in addressing the current and potential

More information

Course Descriptions Political Science

Course Descriptions Political Science Course Descriptions Political Science PSCI 2010 (F) United States Government. This interdisciplinary course addresses such basic questions as: Who has power in the United States? How are decisions made?

More information

Christopher S. Parker Department of Political Science University of Washington 112 Gowen Hall University of Washington, Seattle

Christopher S. Parker Department of Political Science University of Washington 112 Gowen Hall University of Washington, Seattle Christopher S. Parker Department of Political Science University of Washington 112 Gowen Hall University of Washington, Seattle 206.543.2947 Employment 2006-present Assistant Professor, Department of Political

More information

Introduction to Terrorism POLSCI Fall 2014

Introduction to Terrorism POLSCI Fall 2014 Prof. David A. Siegel WF, 10:05-11:20 pm, Soc Psy 129 Introduction to Terrorism POLSCI 232-01 Fall 2014 1 Office: 294H Gross Hall E-mail: david.siegel@duke.edu Office Hours: W, Th 1:30-2:30 pm Phone: 660-4306

More information

Intelligence and National Security Essay. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation.

Intelligence and National Security Essay. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation. This essay critically examines community- based approaches to counter- terrorism and counter- radicalisation

More information

Associate Professor, University of Wisconsin Madison Department of Political Science, 2015 current

Associate Professor, University of Wisconsin Madison Department of Political Science, 2015 current JESSICA L. P. WEEKS Department of Political Science University of Wisconsin-Madison 412 North Hall 1050 Bascom Mall Madison, WI 53706 jweeks@wisc.edu CURRENT POSITION Associate Professor, University of

More information

Building Global Alliances in the Fight Against Terrorism

Building Global Alliances in the Fight Against Terrorism DON T GO IT ALONE: America s Interest in International Cooperation Building Global Alliances in the Fight Against Terrorism By Alistair Millar and Eric Rosand Center on Global Counterterrorism Cooperation

More information

ENVS 80.08: The Practice of Science Policy & Diplomacy

ENVS 80.08: The Practice of Science Policy & Diplomacy ENVS 80.08: The Practice of Science Policy & Diplomacy Instructor: Office location: Email: Class periods: Classroom: Office hours: X-hours: Melody Brown Burkins 146 Haldeman Melody.B.Burkins@dartmouth.edu

More information

D EPARTMENT OF SOCIOLOGY POMONA C OLLEGE 420 N. H ARVARD A VENUE C LAREMONT, CA 91711

D EPARTMENT OF SOCIOLOGY POMONA C OLLEGE 420 N. H ARVARD A VENUE C LAREMONT, CA 91711 Colin J. Beck D EPARTMENT OF SOCIOLOGY POMONA C OLLEGE 420 N. H ARVARD A VENUE C LAREMONT, CA 91711 O FFICE: H AHN 218 PHONE: 909-621-8510 FAX: 909-607-7882 CBECK@ POMONA.EDU POSITIONS 2015-. Associate

More information