+ All Categories
Home > Documents > Comprehensive MOOC Syllabus, 082614

Comprehensive MOOC Syllabus, 082614

Date post: 16-Oct-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
22
TERRORISM AND COUNTE RTERRORISM SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Course Syllabus GeorgetownX August 31, 2015
Transcript
Page 1: Comprehensive MOOC Syllabus, 082614

TERRORISM  AND  COUNTERTERRORISM  SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

 

Course  Syllabus  GeorgetownX  

 August  31,  2015  

             

 

 

   

Page 2: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

1  of  21  

 

TABLE  OF  CONTENTS  

Core  Faculty  ............................................................................................................................................................  2  Interviews  ...............................................................................................................................................................  4  Faculty  Support  Team  .............................................................................................................................................  4  What  is  the  course  about?  .....................................................................................................................................  5  

Key  Questions  ....................................................................................................................................................  5  What  does  the  course  include?  ..............................................................................................................................  5  

Course  Section  Outline  .......................................................................................................................................  6  What  will  I  learn  in  the  course?  ..............................................................................................................................  8  What  should  we  expect  from  each  other?  .............................................................................................................  8  

What  you  can  Expect  from  Professor  Byman  and  the  course  team  ...................................................................  8  What  you  can  expect  from  edX  ..........................................................................................................................  8  What  we  expect  from  you  ..................................................................................................................................  8  

Appendix  A:  Detailed  Course  Section  Outline  ......................................................................................................  11  1.   What  is  Terrorism  and  Who  are  the  Terrorists?  (Release:  September  24,  2015)  .....................................  11  2.   Stratgies,  Tactics,  and  Technology  Use  (Release:  October  1,  2015)  .........................................................  12  3.   Al-­‐Qaeda  (Release:  October  8,  2015)  ........................................................................................................  12  4.   Islam  (Release:  October  15,  2015)  ............................................................................................................  13  5.   Area  studies:  Israel    (Release:  October  22,  2015)  .....................................................................................  14  6.   Area  studies:  South  Asia    (Release:  October  29,  2015)  .............................................................................  15  7.   Counterterrorism  and  The  Rule  of  Law  (Release:  November  5,  2015)  .....................................................  15  8.   Intelligence  and  Counterterrorism  (Release:  November  12,  2015)  ..........................................................  16  9.   Counterterrorism  Instruments  (Release:  November  19,  2015)  ................................................................  17  

Appendix  B:  Learning  Checklist  ............................................................................................................................  19  What  is  Terrorism  and  Who  are  the  Terrorists–  Section  1:  September  24-­‐31  .................................................  19  Strategies,  Tactics,  and  Technology  Use  –  Section  2:  October  1-­‐7  ...................................................................  19  Al-­‐Qaeda  –  Section  3:  October  8-­‐14  .................................................................................................................  19  Islam  –  Section  4:  October  15-­‐21  .....................................................................................................................  19  Area  studies:  The  Terrorist  Threat  to  Israel  and  the  Israeli  response–  Section  5:  October  22-­‐28  ...................  20  Area  Studies:  Terrorism  and  Counterterrorism  in  South  Asia–  Section  6:  October  29-­‐November  4  ...............  20  Counterterrorism  and  the  Rule  of  Law  –  Week  7:  November  5-­‐11  .................................................................  20  Intelligence  and  Counterterrorism  –  Section  8:  November  12-­‐  19,  2013  ........................................................  20  Counterterrorism  Instruments  –  Section  9:  November  20-­‐  26,  2013  ..............................................................  21  

 

 

Page 3: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

2  of  21  

 

 

TERRORISM  AND  COUNTERTERRORISM  What  is  the  danger  of  terrorism,  and  how  can  the  world  respond  effectively?    NOTE:  The  course  will  be  archived  for  the  following  duration:  October  1,  2015  –  May  13,  2016.  No  certificates  will  be  issued  for  work  completed  after  December  2,  2015.    

CORE  FACULTY  

• Daniel  L.  Byman  Dr.  Byman  is  a  Professor  in  the  Security  Studies  Program  of  the  Walsh  School  of  Foreign  Service  at  Georgetown  University  and  the  Research  Director  of  the  Brookings  Institution’s  Center  for  Middle  East  Policy.  Dr.  Byman  served  as  a  Professional  Staff  Member  with  the  National  Commission  on  Terrorist  Attacks  on  the  United  States  (the  “9/11  Commission”)  and  the  Joint  9/11  Inquiry  Staff  of  the  House  and  Senate  Intelligence  Committees.  He  also  worked  as  the  Research  Director  of  the  Center  for  Middle  East  Public  Policy  at  the  RAND  Corporation  and  as  a  Middle  East  analyst  for  the  U.S.  intelligence  community.  Dr.  Byman  received  his  B.A.  in  religion  from  Amherst  College  and  his  Ph.D.  in  political  science  from  the  Massachusetts  Institute  of  Technology.  Follow  him  @dbyman.  

 

§ Jonathan  Brown  Dr.  Jonathan  Brown  is  a  Prince  Alwaleed  Bin  Talal  Professor  of  Islamic  Civilization  in  the  Center  for  Muslim-­‐Christian  Understanding  at  Georgetown  University,  a  term  member  of  the  Council  on  Foreign  Relations,  Editor-­‐in-­‐Chief  of  the  Oxford  Encyclopedia  of  Islamic  Law,  and  publisher  of  several  books  and  articles  on  the  Hadith,  Islamic  law,  Sufism,  Arabic  lexical  theory  and  Pre-­‐Islamic  poetry.  Dr.  Brown's  current  research  interests  include  the  history  of  forgery  and  historical  criticism  in  Islamic  civilization,  comparison  with  the  Western  tradition;  and  modern  conflicts  between  Late  Sunni  Traditionalism  and  Salafism  in  Islamic  thought.  Dr.  Brown  received  his  B.A.  in  history  from  Georgetown  University  and  his  Ph.D.  in  near  eastern  languages  and  civilizations  from  the  University  of  Chicago.  

 

§ John  Esposito  Founding  Director  of  the  Prince  Alwaleed  Bin  Talal  Center  for  Muslim-­‐Christian  Understanding,  John  Esposito  specializes  in  Islamic  studies,  religion,  and  international  affairs  as  a  Professor  at  Georgetown  University.  Esposito's  research  is  published  in  more  than  45  books  and  monographs,  including  Unholy  War:  Terror  in  the  Name  of  Islam  and  The  Future  of  Islam,  translated  into  over  35  languages.  Past  President  of  the  Middle  East  Studies  Association  and  the  American  Academy  of  Religion,  a  member  of  the  E.  C.  European  Network  of  Experts  on  De-­‐Radicalisation,  the  board  of  C-­‐1  World  Dialogue,  an  ambassador  for  the  UN  Alliance  of  Civilizations,  Esposito  is  Editor-­‐in-­‐Chief  of  Oxford  Islamic  Studies  Online,  The  Oxford  Encyclopedia  of  the  Islamic  World  and  other  Oxford  reference  works    on  the  Islamic  world  and  Islamic  Studies.    

§ Christine  Fair  

C.  Christine  Fair  is  a  Georgetown  Security  Studies  Program  Assistant  Professor,  where  she  focuses  on  South  Asian  political  and  military  affairs.  Fair  previously  worked  at  the  RAND  Corporation,  United  Nations  Assistance  

Page 4: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

3  of  21  

 

Mission  to  Afghanistan  in  Kabul,  and  at  USIP’s  Center  for  Conflict  Analysis  and  Prevention.  Fair  has  as  authored,  co-­‐authored  and  co-­‐edited  several  books,  is  a  member  of  the  Council  on  Foreign  Relations,  Women  in  International  Security,  International  Studies  Association,  American  Political  Science  Association,  and  American  Institute  of  Pakistan  Studies.  She  serves  on  the  editorial  board  of  numerous  journals,  and  is  a  senior  fellow  with  the  Combating  Terrorism  Center  at  West  Point.  Fair  received  her  PhD  and  MA  from  the  University  of  Chicago.  Her  most  recent  book  is  Fighting  to  the  End:  The  Pakistan  Army’s  Way  of  War  (Oxford  University  Press,  2014).  Many  of  her  other  publications  can  be  found  at  christinefair.net  

 

§ Bruce  Hoffman  

Bruce  Hoffman  is  a  Professor  and  Director  of  both  the  Center  for  Security  Studies  and  the  Security  Studies  Program  at  Georgetown  University.  Professor  Hoffman  is  currently  a  member  of  the  National  Security  Preparedness  Group;  a  Global  Scholar  at  the  Woodrow  Wilson  International  Center  for  Scholars;  a  Senior  Fellow  at  the  Combating  Terrorism  Center;  a  Visiting  Professor  at  the  International  Institute  for  Counter-­‐Terrorism,  Herzliya,  Israel  and  at  the  Handa  Centre  for  the  Study  of  Terrorism  and  Political  Violence  at  St  Andrews  University,  Scotland  ;  and  serves  in  various  editing  capacities  at  The  National  Interest,  Studies  in  Conflict  and  Terrorism,  and  the  Columbia  University  Press  Series  on  Terrorism  and  Irregular  Warfare.    Hoffman  was  awarded  the  United  States  Intelligence  Community  Seal  Medallion  in  1994  from  the  Director  of  Central  Intelligence.  Follow  him  @hoffman_bruce.  

 

§ Fathali  M.  Moghaddam  Fathali  M.  Moghaddam  is  Professor,  Department  of  Psychology,  Georgetown  University,  and  Editor-­‐in-­‐Chief  of  Peace  and  Conflict:  Journal  of  Peace  Psychology  (American  Psychological  Association).  Moghaddam  was  born  in  Iran,  educated  from  an  early  age  in  England,  and  worked  for  the  United  Nations  and  McGill  University  before  joining  Georgetown  University  in  1990.  He  has  published  extensively  on  radicalization,  intergroup  conflict,  and  the  psychology  of  dictatorship  and  democracy.  His  most  recent  book  is  The  Psychology  of  Dictatorship  (2013),  which  received  Honorable  Mention,  2013  Prose  Awards  for  Professional  and  Scholarly  Excellence.  Moghaddam  has  received  a  number  of  recognitions  for  his  scholarly  contributions,  the  most  recent  being  the  Outstanding  International  Psychologist  Award  for  2012  from  the  American  Psychological  Association’s  Division  of  International  Psychology.      

§ Paul  R.  Pillar  In  2005,  Paul  Pillar  retired  after  a  28-­‐year  intelligence  career  in  positions  such  as  National  Intelligence  Officer  for  the  Near  East  and  South  Asia;  Chief  of  Analytic  Units  at  the  Central  Intelligence  Agency  (CIA);  an  original  member  of  the  National  Intelligence  Council’s  Analytic  Group;  Executive  Assistant  to  CIA's  Deputy  Director  for  Intelligence;  Executive  Assistant  to  Director  of  Central  Intelligence  William  Webster;  and  Head  of  Assessments  and  Information  Group  and  Deputy  Chief  of  the  DCI  Counterterrorist  Center.  Pillar  is  a  retired  officer  in  the  U.S.  Army  Reserve  and  a  former  core  faculty  member  at  Georgetown  University  Security  Studies  Program.  He  received  his  B.A.  from  Dartmouth  College,  his  Ph.D.  from  Princeton  University,  and  a  B.Phil.  from  Oxford  University.  

§ Benjamin  Wittes  

Benjamin  Wittes  is  a  senior  fellow  in  Governance  Studies  at  The  Brookings  Institution.  He  co-­‐founded  and  is  the  editor-­‐in-­‐chief  of  the  Lawfare  blog,  which  is  devoted  to  sober  and  serious  discussion  of  "Hard  National  

Page 5: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

4  of  21  

 

Security  Choices,"  and  is  a  member  of  the  Hoover  Institution's  Task  Force  on  National  Security  and  Law.  He  is  the  author  of  Detention  and  Denial:  The  Case  for  Candor  After  Guantanamo,  published  in  November  2011,  co-­‐editor  of  Constitution  3.0:  Freedom  and  Technological  Change,  published  in  December  2011,  and  editor  of  Campaign  2012:  Twelve  Independent  Ideas  for  Improving  American  Public  Policy  (Brookings  Institution  Press,  May  2012).  He  is  also  writing  a  book  on  data  and  technology  proliferation  and  their  implications  for  security.  He  is  the  author  of  Law  and  the  Long  War:  The  Future  of  Justice  in  the  Age  of  Terror,  published  in  June  2008  by  The  Penguin  Press,  and  the  editor  of  the  2009  Brookings  book,  Legislating  the  War  on  Terror:  An  Agenda  for  Reform.  

 

INTERVIEWS  

§ Jacob  Shapiro,  Associate  Professor,  Princeton  University  and  author  of  The  Terrorist’s  Dilemma:  Managing  Violent  Covert  Organizations.  

§ Juan  Zarate,  Senior  Adviser,  Center  for  Strategic  and  International  Studies,  and  former  first  Secretary  of  Treasury  for  Terrorism  Financing  and  Financial  Crimes  

§ Major  David  Blair,  USAF,  MQ-­‐1  Predator  Pilot,  United  States  Air  Force  § Mark  Mazzetti,  New  York  Times  Reporter  and  author  of  The  Way  of  the  Knife:  The  CIA,  a  Secret  Army,  and  

a  War  at  the  Ends  of  the  Earth.  § Peter  Neumann,  Professor,  King’s  College  London,  and  Director,  International  Centre  for  the  Study  of  

Radicalisation  § Rita  Katz,  Co-­‐founder,  SITE  Intelligence  Group  

 

FACULTY  SUPPORT  TEAM  

§ Marc  Meyer,  Course  Manager  and  Lead  Teaching  Assistant  Marc  Meyer  is  a  M.A.  candidate  in  the  Security  Studies  Program  at  Georgetown  University,  focusing  on  terrorism  and  sub-­‐state  violence.  He  also  works  as  Dr.  Daniel  Byman’s  research  assistant,  concentrating  on  terrorism  and  insurgency  worldwide.  He  has  worked  in  various  capacities  at  the  Government  Accountability  Office  (GAO),  US  House  of  Representatives  and  the  US  Marshals  Service.  He  received  his  B.A.  in  Law,  Societies  and  Justice  with  a  minor  in  comparative  religion  from  the  University  of  Washington-­‐Seattle.  

 

§ Kait  Williamson,  Teaching  Assistant    Kait  Williamson  is  an  MA  Candidate  in  the  Communication,  Culture,  &  Technology  program  at  Georgetown  University,  specializing  in  conflict  studies  through  media,  terrorism  propaganda,  and  data  analytics.  Kait  works  for  the  PeaceTech  Lab,  a  nonprofit  created  by  the  United  States  Institute  of  Peace.  With  a  background  in  PR  and  politics  Kait  has  previous  experience  in  Governor  Chris  Christie's  Press  Office.  She  has  worked  in  various  cultures  from  London  to  Qatar,  utilizing  her  foreign/public  affairs  skills  and  political  knowledge.  

 

§ Natalia  Peña,  Teaching  Assistant    Natalia  Peña  is  an  M.A.  candidate  in  the  Security  Studies  Program  at  Georgetown  University,  where  she  focuses  on  terrorism  and  sub-­‐state  violence.  Prior  to  studying  at  Georgetown,  Natalia  has  previously  worked  in  

Page 6: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

5  of  21  

 

the  Massachusetts  House  of  Representatives  and  the  Plymouth  County  District  Attorney's  Office.  Her  research  interests  include  regional  security  in  the  Middle  East,  Islam,  and  the  evolution  and  use  of  radical  ideology.  She  graduated  from  Boston  College  with  a  double  major  in  Political  Science  and  Islamic  Civilization  and  Societies.    

 

WHAT  IS  THE  COURSE  ABOUT?  

Terrorism  has  gone  from  a  persistent  yet  marginal  security  concern  to  one  of  the  most  important  security  problems  of  our  day:  indeed,  there  are  few  countries  that  do  not  suffer  from  some  form  of  terrorism.  Though  many  terrorist  attempts  fail,  some  groups  wage  lengthy  and  bloody  campaigns  and,  in  exceptional  cases,  kill  hundreds  or  even  thousands  in  pursuit  of  their  ends.  

Course  topics  include  the  nuances  involved  in  defining  terrorism,  the  nature  of  Al-­‐Qaeda,  Hamas,  and  other  important  groups,  the  effectiveness  of  different  counterterrorism  tools  like  detention  and  military  force,  linkages  (or  the  lack  thereof)  between  terrorism  and  world  religions  like  Islam,  terrorist  recruiting,  the  rule  of  law,  the  political  context  in  South  Asia  and  the  Middle  East,  and  terrorist  use  of  technology.  

KEY  QUESTIONS  

• What  is  terrorism,  and  what  are  the  components  of  different  definitions?  

• What  are  common  causes  of  terrorism?  

• What  are  common  strategies  and  tactics  of  terrorism?  How  do  terrorist  groups  respond  to  technological  change?  

• What  are  common  weaknesses  of  terrorist  groups?  Why  do  these  occur?  

• What  are  the  primary  terrorism  and  counterterrorism  challenges  related  the  India-­‐Pakistan  confrontation?    

• What  are  the  primary  terrorism  and  counterterrorism  lessons  related  to  the  Israeli-­‐Palestinian  confrontation?  

• What  is  the  nature  of  Al-­‐Qaeda,  and  why  has  it  proven  such  a  difficult  adversary?  

• What  is  the  relationship  between  Islam  and  violence?  

• What  is  the  role  of  intelligence  in  counterterrorism?  

• What  are  the  strengths  and  weaknesses  of  different  counterterrorism  instruments?  

• How  can  you  fight  terrorism  in  accord  with  the  rule  of  law?  

• Under  what  conditions  does  terrorism  "work”?  

• How  serious  a  problem  is  terrorism?  In  what  ways  does  it  manifest?    

 

WHAT  DOES  THE  COURSE  INCLUDE?  

Each  section  of  the  course  listed  in  the  Course  Section  Outline  below  begins  with  an  Introduction  subsection  and  ends  with  a  Conclusion  &  Looking  Ahead  subsection.  In  between  these  subsections,  the  topics  are  organized  sequentially.  Most  of  the  subsections  are  required  when  working  towards  a  certificate  of  completion,  but  there  are  also  optional  segments  for  those  interested  in  learning  more.  Further,  Section  5  

Page 7: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

6  of  21  

 

focuses  on  a  geographical  region  plagued  by  terrorism.  This  section  presents  the  learners  with  two  options,  one  of  which  will  be  required  for  certificate  of  completion.  Students  can  choose  their  area  studies  focus  to  be  on  either  Israel  and  the  Palestinians  or  South  Asian  terrorism.  

These  topics  (listed  in  the  Course  Section  Outline  below)  include  lectures  highlighting  key  concepts  that  are  summarized  under  the  Definition  of  Terms  menu  item,  knowledge  checks,  polls,  a  case  study  simulation,  and  discussion  activities.    

§ The  Introduction  includes  a  weekly  guide  that  lists  the  key  questions  to  be  addressed  in  that  course  section.  It  also  lists  the  readings,  which  may  be  links  to  external  website  or  PDF  files.  The  weekly  guide  is  then  followed  by  the  faculty  member’s  introduction  of  the  section's  topic  under  study.  

§ The  Conclusion  &  Looking  Ahead  provides  you  with  a  listing  of  the  key  learning  outcomes  related  to  that  particular  section  of  the  course.  It  features  the  faculty  member’s  summary  of  key  points  and  considerations  in  relation  to  the  topics  addressed.  In  addition,  this  subsection  offers  you  the  opportunity  to  ask  clarifying  questions  on  the  specific  subsection  or  overall  course  material  that  will  be  collected  by  course  teaching  assistants  and  answered  by  Professor  Byman  or  another  expert.  

§ The  Simulation  will  come  once  the  course  after  the  course  has  been  completed,  and  prompts  students  to  engage  in  a  fictional  case  study  and  conduct  a  threat  assessment.  This  is  optional  for  learners,  but  will  help  reinforce  key  concepts  learned  throughout  the  course  by  drawing  on  course  content  and  readings  to  complete  the  threat  assessment.  

The  overall  course  content  outline  follows.  Note  that  numbered  sections  listed  below  are  released  on  a  weekly  basis.  These  dates  are  listed  next  to  each  topic.  For  a  complete  listing  of  the  weeks,  including  list  of  key  questions  and  readings,  see  Appendix  A.    

COURSE  SECTION  OUTLINE  

1. What  is  Terrorism  and  Who  Are  The  Terrorists?  (Release:  September  24,  2015)  This  section  of  the  course  explores  the  definitional  debate  surrounding  terrorism,  conditions  that  make  individuals  more  susceptible  to  radicalization  and  eventual  recruitment  by  terrorist  groups,  and  terrorist  psychology.  There  will  also  be  an  optional  subsection  interview  with  director  of  the  International  Centre  for  the  Study  of  Radicalisation,  Peter  Neumann.  

2. Strategies,  Tactics,  and  Technology  Use  (Release:  October  1,  2015)  This  section  of  the  course  explores  the  various  strategies  and  common  tactics  employed  by  most  terrorist  organizations  as  well  as  terrorist  use  of  technology.  This  section  will  also  feature  Professor  Byman’s  interview  with  terrorism  scholar  Jacob  Shapiro,  which  is  optional  for  class  participants.  

3. Al-­‐Qaeda  (Release:  October  8,  2015)  This  section  of  the  course  explores  the  most  important  modern  terrorist  group  -­‐-­‐  Al-­‐Qaeda  –  and  its  historical  evolution,  goals,  strengths  and  weaknesses  as  well  as  the  broader  jihadist  movement.  There  will  also  be  an  optional  subsection  lecture  featuring  SITE  Intelligence  Group  co-­‐founder  Rita  Katz.  

4. Islam  (Release:  October  15,  2015)  This  section  of  the  course  explores  the  relationship  between  Islam  and  violence  and  the  attitudes  of  one  particular  school  of  thought  within  Islam  –  Salafism.  

5. Area  Studies:  Israel/Palestine  (Release:  October  22,  2015)                                                                                This  section  of  the  course  explores  the  terrorist  threat  to  Israel  and  the  Israeli  response.  

6. Area  Studies:  South  Asia  (Release:  October  29,  2015)                                                                

Page 8: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

7  of  21  

 

This  section  of  explores  terrorism  and  counterterrorism  in  South  Asia.  7. Counterterrorism  and  the  Rule  of  Law  (Release:  November  5,  2015)  

This  section  of  the  course  explores  the  implications  of  U.S.  domestic  and  international  law  for  counterterrorism.  

8. Intelligence  and  Counterterrorism  (Release:  November  12,  2015)  This  section  of  the  course  explores  the  role  of  intelligence  in  counterterrorism  operations  and  considers  several  important  post-­‐9/11  controversies  such  as  surveillance  and  torture.    

9. Counterterrorism  Instruments  (Release:  November  19,  2015)  This  section  of  the  course  explores  various  counterterrorism  instruments,  such  as  diplomacy,  financial  pressure,  and  targeted  killings,  and  their  associated  advantages  and  limitations.  This  section  will  also  feature  an  optional  subsection  on  renditions  and  interviews  with  New  York  Times  reporter  Mark  Mazzetti,  MQ-­‐1  Predator  Pilot    Major  David  Blair,  USAF  and  former  Assistant  Secretary  of  Treasury  for  Terrorism  Financing  and  Financial  Crimes  Juan  Zarate  .      

Page 9: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

8  of  21  

 

WHAT  WILL  I  LEARN  IN  THE  COURSE?  

The  course  is  designed  to  help  you  achieve  the  following  learning  goals  and  objectives.  ¨ Recall  the  working  definitions  of  terrorism  and  recognize  their  analytic  limits;  ¨ Identify  a  range  of  causes  of  terrorism  and,  as  importantly,  understand  what  commonly  cited  issues  are  

not  usually  causes;  ¨ Understand  the  strategies  and  tactics  of  terrorist  groups;  ¨ Identify  important  terrorist  groups  in  the  Middle  East  and  South  Asia  with  an  understanding  of  their  

strengths,  weaknesses,  and  overall  effectiveness.  These  include  Palestinian  groups,  Pakistani  groups,  and  Al-­‐Qaeda;  

¨ Understand  the  relationship  between  religion  and  terrorism;  and  ¨ Understand  how  counterterrorism  is  constrained  in  a  democratic  society  and  several  important  legal  

debates  related  to  counterterrorism.    

A  Learning  Checklist  that  organizes  the  learning  goals  above  with  the  learning  objectives  for  each  of  the  course  sections  is  available  to  you  in  Appendix  B  of  this  syllabus.  Use  this  to  help  you  determine  what  you  are  learning  in  the  course.  In  addition,  Appendix  C  of  this  syllabus  includes  the  Definition  of  Terms  handout  that  highlights  the  key  terms  used  throughout  the  course.  

WHAT  SHOULD  WE  EXPECT  FROM  EACH  OTHER?  

WHAT  YOU  CAN  EXPECT  FROM  PROFESSOR  BYMAN  AND  THE  COURSE  TEAM  

Every  week,  Professor  Byman  will  address  the  top  five  student  questions,  which  will  be  emailed  to  you  every  week  and  posted  in  the  ‘updates’  section.  Instructions  for  posting  questions  for  Professor  Byman  are  included  in  the  Conclusion  &  Looking  Ahead  subsections.  In  addition,  Teaching  Assistants  will  regularly  participate  in  discussion  boards  to  provide  content  clarification,  guidance,  and  support.    

We  will  be  providing  regular  updates  and  reminders  in  the  Course  Info  page  beyond  Professor  Byman’s  weekly  response  to  your  questions.      

We  will  also  be  providing  weekly  current  events  news  briefs,  in  addition  to  posting  relevant  news  stories  surrounding  terrorism  and  counterterrorism  on  our  social  media  outlets  –  Facebook  and  Twitter.  

WHAT  YOU  CAN  EXPECT  FROM  EDX  

In  the  event  of  a  technical  problem,  you  should  click  the  “Help”  tab  located  on  the  left  border  of  the  screen  (Figure  1).  This  “Help”  tab  opens  an  instruction  box  that  directs  you  to  student  Frequently  Asked  Questions  (FAQs)  for  general  edX  questions.  You  can  also:    

§ Report  a  problem  § Make  a  suggestion  § Ask  a  question  

You  may  post  technical  problems  to  the  “Technical”  thread  of  the  discussion  board.  Finally,  you  may  also  contact  [email protected]  directly  to  report  bugs.  

WHAT  WE  EXPECT  FROM  YOU  

Figure  1:  Screenshot  with  Help  tab  

Page 10: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

9  of  21  

 

Students  should  spend  around  eight  to  ten  (8-­‐10)  hours  per  week  to  review  assigned  readings,  watch  weekly  lectures,  work  through  weekly  knowledge  checks  and  other  activities,  including  the  discussion  threads,  polling  questions,  and  keeping  informed  of  current  events  surround  terrorism  and  counterterrorism.    

In  each  course  section  we  have  included  activities  to  support  you  in  reaching  the  specified  learning  objectives  for  that  section.  The  graded  activities  are  categorized  as  knowledge  checks;  these  are  the  activities  that  are  counted  toward  achieving  the  certificate  for  the  course.  They  include:  

• Multiple  answer  questions;  • Multiple  choice  questions;  • True/False  questions;  and    • Self-­‐assessment  open  response  questions.  

To  receive  a  course  certificate,  you  must  complete/submit  all  graded  assignments  by  December  2nd,  2015  at  9:00  EDT/13:00  UTC  and  receive  a  score  of  75  percent  or  higher.  

To  supplement  the  graded  knowledge  check  activities  listed  above,  we  have  also  included  other  components  to  enable  learners  to  explore  the  subject  matter  more  deeply.  These  include:  

• Discussion  questions;  • Polling  questions;  and  • Case  study  simulation:  We  have  also  created  a  case  study  simulation  that  draws  upon  each  section  to  

apply  concepts  learned  in  the  class.  The  simulation  places  the  student  in  the  position  of  an  employee  at  a  (fictional)  intelligence  service  tasked  with  stopping  a  potential  terrorist  attack.  Students  are  encouraged  to  consider  the  case  study  in  light  of  the  course's  content  material  and  which  concepts  apply  to  the  individual  at  question.  

All  activities  included  in  the  course  are  designed  to  help  you  gauge  your  learning  as  a  result  of  your  interaction  with  the  course  content  both  from  the  video  lectures  and  readings.  Instructions  on  how  to  complete  the  activities  are  included  within  each  course  section.  

WEEKLY  TIMELINE  

The  due  dates  for  submission  for  all  activities  are  listed  in  each  course  section.  Since  the  course  opens  on  September  24th    (Thursday),  our  weeks  are  from  Thursday  to  Wednesday.  Take  a  look  at  our  suggested  path  below  for  engaging  with  the  course  on  a  weekly  basis.    

 Figure  2:  Suggested  weekly  engagement  

Review  the  weekly  guide  Watch  the  course  video  introducton    

Each  week  begins  on  Thursday  at  9:00  EDT/13:00  UTC  

Read  the  assigned  readings  for  the  week    Watch  the  video  lectures  Use  the  Student  Lecture  Notes  area  to  highlight  key  points  

Study  the  course  content  

Complete  the  knowledge  checks    Partcipate  in  the  discussions  and  polls  Consider  the  case  study  in  light  of  the  week's  content  material    

Take  Part  in  the  Achvihes  

Review  course  materials  Finish  any  pending  actvites  Submit  any  clarifying  questons  for  the  week  for  Professor  Byman  by  at  9:00  EDT/13:00  UTC  

Each  week  ends  on  Wednsday  

Page 11: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

10  of  21  

 

 

 

NETIQUETTE  GUIDELINES  

Please  be  respectful  

To  promote  the  best  educational  experience  possible,  we  ask  each  student  to  respect  the  opinions  and  thoughts  of  other  students  and  be  courteous  in  the  way  that  you  choose  to  express  yourself.  Terrorism  and  Counterterrorism  topics  elicit  –  and  should  elicit  -­‐-­‐  passionate  and  controversial  debates.  However,  informed  debate  should  never  give  way  to  insult,  rudeness,  or  anything  that  might  detract  from  the  learning  process.  GUIX-­‐501-­‐02x  students  should  be  respectful  and  considerate  of  all  opinions.    

In  order  for  us  to  have  meaningful  discussions,  we  must  learn  to  understand  what  others  are  saying  and  be  open-­‐minded  about  others’  opinions.  If  you  want  to  persuade  someone  to  see  things  differently,  it  is  much  more  effective  to  do  so  in  a  polite,  non-­‐threatening  way  rather  than  to  do  so  antagonistically.  Everyone  has  insights  to  offer  based  on  his/her  experiences,  and  we  can  all  learn  from  each  other.  Civility  is  essential:  Our  teaching  assistants  can,  and  will,  remove  students  from  the  class  who  detract  from  the  learning  process  with  insulting  comments  on  the  course-­‐wise  discussion  boards.  

Look  before  you  write  

Prior  to  posting  a  question  or  comment  on  the  discussion  board,  the  Georgetown  course  team  asks  that  you  look  to  see  if  any  of  your  classmates  have  the  same  question.  Upvote  questions  that  are  similar  to  your  own  or  that  are  also  of  interest  to  you,  instead  of  starting  a  new  thread.  This  will  greatly  help  our  Georgetown  TAs  best  monitor  the  discussions  and  bring  important  questions  to  Professor  Byman’s  attention.  

Use  the  discussion  board  for  course-­‐related  posts  only  

Although  we  encourage  students  to  get  to  know  each  other,  please  use  the  discussion  board  as  a  for  course  content  conversations  only.  

Properly  and  promptly  notify  us  of  technical  issues  

Although  we  do  not  predict  technical  issues,  they  can  and  may  happen.  To  make  sure  these  receive  prompt  attention,  post  details  about  any  technical  issues  directly  on  the  “Technical”  discussion  thread  or  email  [email protected]  directly.    

ACADEMIC  INTEGRITY  

Observe  edX  and  GeorgetownX’s  honor  policies  

Although  collaboration  and  conversation  will  certainly  contribute  to  your  learning  in  the  course,  we  ask  students  to  refrain  from  collaborating  with  or  consulting  one  another  on  any  graded  material  for  the  course.  Violations  of  the  honor  policy  undermine  the  purpose  of  education  and  the  academic  integrity  of  the  course.    We  expect  that  all  work  submitted  will  be  a  reflection  of  one’s  own  original  work  and  thoughts.  

GeorgetownX  faculty  and  staff  expect  all  members  of  the  community  to  strive  for  excellence  in  scholarship  and  character.  

     

Page 12: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

11  of  21  

 

 

APPENDIX  A:  DETAILED  COURSE  SECTION  OUTLINE    

1. WHAT  IS  TERRORISM  AND  WHO  ARE  THE  TERRORISTS?  (RELEASE:  SEPTEMBER  24,  2015)    This  section  of  the  course  explores  the  definitional  debate  surrounding  terrorism,  conditions  that  make  individuals  more  susceptible  to  radicalization  and  eventual  recruitment  by  terrorist  groups,  and  terrorist  psychology.  There  will  also  be  an  optional  subsection  interview  with  director  of  the  International  Centre  for  the  Study  of  Radicalisation,  Peter  Neumann.    

KEY  QUESTIONS:  

¨ Why  is  terrorism  so  difficult  to  define?  ¨ How  have  definitions  of  terrorism  changed  over  time?  ¨ What  are  the  common,  core  elements  of  terrorism  as  a  means  to  build  a  definition?  ¨ What  are  the  differences  and  similarities  between  terrorism  and  guerrilla  warfare?  ¨ What  are  the  core  definitional  requirements  of  terrorism?  ¨ Why  do  people  become  terrorists?  ¨ What  is  the  process  that  results  in  an  individual’s  radicalization  and  then  recruitment?  ¨ How  do  terrorists  justify  the  violence  they  commit?  ¨ Why  is  it  so  difficult,  if  not  impossible,  to  develop  a  common  set  of  reasons  for  why  someone  becomes  

a  terrorist?  ¨ What  are  the  roles  of  various  situational  and  personality  factors  that  shape  terrorists?  

REQUIRED  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Bruce  Hoffman,  Inside  Terrorism  (New  York:  Columbia  University  Press,  2nd  edition,  2006),  pp.  1-­‐42  and  pp.  229-­‐256.  

¨ Fathali  M.  Moghaddam,  "The  Staircase  to  Terrorism:  A  Psychological  Exploration,"  American  Psychologist,  Iss.  2,  (2005),  pp.  161-­‐169.    

¨ R.F.  Paloutzian  &  C.  Park  (Eds.),  Moghaddam,  F.M.,  Warren,  Z.,  &  Love,  K.,  Religion  and  the  Staircase  to  Terrorism,  2nd  ed.,  pp.  632-­‐648  (2013)  in  Handbook  of  the  Psychology  of  Religion  and  Spirituality.    

OPTIONAL  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Leonard  Weinberg,  et  al.,  “The  Challenges  of  Conceptualizing  Terrorism,”  Terrorism  and  Political  Violence,  vol.  16,  no.  4  (2004),  pp.  777-­‐794.  

¨ The  United  States  Department  of  State,  Country  Reports  on  Terrorism  (Washington,  D.C.,  2013).  p.  xvi  only  [including  the  footnote].    

 

Page 13: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

12  of  21  

 

2. STRATGIES,  TACTICS,  AND  TECHNOLOGY  USE  (RELEASE:  OCTOBER  1,  2015)  

 This  section  of  the  course  explores  the  various  strategies  and  common  tactics  employed  by  most  terrorist  organizations,  as  well  as  terrorist  use  of  technology.  This  section  will  also  feature  Professor  Byman’s  interview  with  terrorism  scholar  Jacob  Shapiro,  which  is  optional  for  class  participants..  

KEY  QUESTIONS:  

¨ What  are  the  different  strategies  that  terrorist  groups  use  to  advance  their  objectives?  ¨ What  are  the  strengths  and  weaknesses  of  the  various  strategies?  ¨ Why  does  terrorism  essentially  functions  in  a  technological  vacuum  compared  with  modern  warfare?  ¨ What  are  the  reasons  for  terrorists’  operational  conservatism?  ¨ How  do  ease  and  low  cost  affect  terrorist  planning  and  operations?  ¨ Why  do  terrorists  avoid  sophisticated  technologies  when  they  innovate?  ¨ What  role  does  publicity  play  in  fostering  terrorist  innovation?  ¨ Why  are  terrorists  rarely  attracted  to  more  sophisticated  technologies  and  Weapons  of  Mass  

Destruction  (WMD)?  

REQUIRED  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Bruce  Hoffman,  Inside  Terrorism,  Columbia  University  Press,  2nd.  Edition  (2006),  pp.  267-­‐281.  ¨ John  Parachini,  "Putting  WMD  Terrorism  into  Perspective,”  Washington  Quarterly,  Vol.  26,  Iss.  4,  pp.  

37-­‐50.    

OPTIONAL  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Central  Intelligence  Agency,  “Terrorist  CBRN:  Materials  and  Effects,”  June  2008.    

 

3. AL-­‐QAEDA  (RELEASE:  OCTOBER  8,  2015)  

 This  section  of  the  course  explores  the  most  important  modern  terrorist  group  –  Al-­‐Qaeda  –  and  its  historical  evolution,  goals,  strengths,  and  weaknesses  as  well  as  the  broader  jihadist  movement.  There  will  also  be  an  optional  subsection  lecture  featuring  SITE  Intelligence  Group  co-­‐founder  Rita  Katz.      

KEY  QUESTIONS:  

¨ How  has  Al-­‐Qaeda  evolved  over  time?  ¨ Why  did  Al-­‐Qaeda  conduct  the  9/11  attacks  and  how  did  it  adjust  to  setbacks  it  suffered  in  the  attacks’  

aftermath?  ¨ What  are  Al-­‐Qaeda’s  key  organizational  goals?  ¨ What  are  some  of  the  key  traits  and  characteristics  of  senior  Al-­‐Qaeda  leaders  and  their  supporters?  

Page 14: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

13  of  21  

 

¨ Why  do  groups  affiliate  with  Al-­‐Qaeda  and  what  are  common  limits  to  cooperation  between  affiliates  and  the  core  organization?  

REQUIRED  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  Byman,  Al  Qaeda,  the  Islamic  State,  and  the  Global  Jihadist  Movement  (United  Kingdom:  Oxford  University  Press,  2015),  selected  pages:  pp.13-­‐14,  25-­‐27,  47-­‐50,  57-­‐59,  82-­‐83,  109-­‐110,  157-­‐162.  

¨ National  Commission  on  Terrorist  Attacks  upon  the  United  States  (the  9/11  Commission),  The  9/11  Commission  Report  (Norton:  2004),  "The  Foundation  of  New  Terrorism,"  pp.  47-­‐70.  

¨ National  Commission  on  Terrorist  Attacks  upon  the  United  States  (the  9/11  Commission),    "Al  Qaeda  Aims  at  the  American  Homeland,"  pp.  145-­‐173.  

¨ Lawrence  Wright,  “The  Man  Behind  Bin  Laden,”  The  New  Yorker  (September  16,  2002).  ¨ Bruce  Hoffman  and  Fernando  Reinares,  "Conclusions,"  The  Evolving  Global  Terrorism  Threat.  Cases  

from  9/11  to  Osama  bin  Laden's  Death  (Columbia  University  Press:  New  York,  2014).    ¨ "ISIS  vs.  Al  Qaeda:  Jihadism’s  Global  Civil  War,”  The  National  Interest,  Iss.  136,  pp.  10-­‐18  (March/April  

2015).  

OPTIONAL  READINGS:    

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  Byman  “Breaking  the  Bonds  between  Al  Qaeda  and  Its  Affiliate  Organizations,”  (Brookings  2012).  

¨ Peter  Bergen  and  Paul  Cruickshank,  “The  Unraveling:  Al-­‐Qaeda’s  Revolt  against  Bin  Ladin,”  The  New  Republic,  June  2008.    

 

4. ISLAM  (RELEASE:  OCTOBER  15,  2015)    This  section  of  the  course  explores  the  relationship  between  Islam  and  violence  and  the  attitudes  of  one  particular  school  of  thought  within  Islam  –  Salafism.    

KEY  QUESTIONS:  

¨ Can  Islam  be  viewed  as  a  driver  of  terrorism?  ¨ What  does  the  term  jihad  mean,  and  what  are  the  ways  in  which  it  has  been  used  and/or  exploited?  ¨ What  are  the  majority  attitudes  among  Muslims  towards  terrorism  in  the  name  of  Islam?  ¨ How  did  the  "global  jihad,"  championed  by  Osama  bin  Laden  and  Al-­‐Qaeda,  emerge?  ¨ What  is  the  rationale  for  suicide  bombing  and  how  have  Muslim  religious  leaders  have  responded?  ¨ When  is  violent  resistance  in  the  name  of  jihad  acceptable  according  to  mainstream  tradition?  When  is  

violence  illegitimate?  ¨ What  is  the  basic  nature  of  Salafism?  ¨ What  is  the  important  difference  between  Salafism  and  mere  backwardness?  ¨ What  is  the  place  of  Saudi  Arabia  in  global  Salafism?  

Page 15: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

14  of  21  

 

¨ Why  are  conservatism  in  religion  and  violence  not  inherently  linked?  ¨ How  do  seemingly  arcane  legal  issues  affect  attitudes  towards  political  legitimacy  and  the  acceptability  

of  violent  uprisings?  

REQUIRED  READINGS:    

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ John  L.  Esposito,  "Terrorism  &  the  Rise  of  Political  Islam,"  in  Democracy  &  Terrorism:  Vol.  1  The  Roots  of  Terrorism,  (ed.)  Louise  Richardson  (London:  Francis  &  Taylor,  2006).    

¨ Mark  Juergensmeyer,  "Does  Religion  Cause  Terrorism?"  National  Policy  Forum  on  Terrorism,  Security  and  America's  Purpose  -­‐  Washington,  D.C.,  September  6-­‐7,  2005.    

¨ Daniel  Byman,  Al  Qaeda,  the  Islamic  State,  and  the  Global  Jihadist  Movement  (United  Kingdom:  Oxford  University  Press,  2015),  pp.  69-­‐71  

OPTIONAL  READINGS:    

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Quintan  Wictorowicz,  "Anatomy  of  the  Salafi  Movement,"  Studies  in  Conflict  and  Terrorism  29,  no.  3  (2006):  pp.  207-­‐239.  

¨ John  O.  Voll,  Foundations  for  Revival  and  Reform,"  in  The  Oxford  History  of  Islam,  ed.  John  L.  Esposito,  (Oxford:  Oxford  University  Press,  1999),  pp.  509-­‐547.  

¨ Ed.  Basheer  Nafi,  "The  Rise  of  Islamic  Reformist  Thought  and  its  Challenge  to  Traditional  Islam,"  in  Islamic  Thought  in  the  Twentieth  Century,  ed.  Suha  Farouki  and  Basheer  M.  Nafi,  (London:  I.B.  Tauris,  2004),  pp.  28-­‐60.  

 

5. AREA  STUDIES:  ISRAEL    (RELEASE:  OCTOBER  22,  2013)  

 This  section  of  the  course  explores  the  terrorist  threat  to  Israel  and  the  Israeli  response.    

KEY  QUESTIONS  FOR  THE  TERRORIST  THREAT  TO  ISRAEL  AND  THE  ISRAELI  RESPONSE  

¨ What  have  Palestinian  groups  accomplished  using  terrorism?  What  have  they  failed  to  accomplish?  ¨ What  methods  has  Israel  used  to  fight  Palestinian  terrorism?  How  do  the  methods  work  together?  ¨ How  has  Israel  gathered  intelligence  on  suspected  terrorists?  ¨ What  are  the  advantages  and  disadvantages  of  different  Israeli  counterterrorism  instruments?  ¨ How  has  terrorism  interacted  with  the  peace  process?  

REQUIRED  READINGS  FOR  THE  TERRORIST  THREAT  TO  ISRAEL  AND  THE  ISRAELI  RESPONSE:  (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  Byman,  A  High  Price:  The  Triumphs  and  Failures  of  Israeli  Counterterrorism  (New  York:  Oxford  University  Press,  2011),  pp.  29-­‐76,  307-­‐334,  and  347-­‐361.  

Page 16: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

15  of  21  

 

¨ Daniel  Byman,  "Curious  Victory:  Explaining  Israel's  Suppression  of  the  Second  Intifada,"  Terrorism  and  Political  Violence  (November  2012),  pp.  825-­‐852.  

OPTIONAL  READINGS  FOR  THE  TERRORIST  THREAT  TO  ISRAEL  AND  THE  ISRAELI  RESPONSE:  None.    

6. AREA  STUDIES:  SOUTH  ASIA    (RELEASE:  OCTOBER  29,  2013)  This  section  of  the  course  explores  terrorism  and  counterterrorism  in  South  Asia.”    

KEY  QUESTIONS:  ¨ How  has  political  Islam  in  Pakistan  evolved?  Consider  in  particular  how  the  “Two  Nation  Theory”  and  

the  impact  of  the  bloody  process  of  partition  shaped  the  two  new  states  of  India  and  Pakistan  that  emerged  in  1947.  

¨ What  are  the  origins  of  Pakistan's  “Non-­‐State  Actor  Policy”  in  Kashmir,  India  and  Afghanistan?    ¨ Which  are  the  main  Pakistani  militant  groups  operating  in  and  from  Pakistan?    ¨ What  is  the  role  of  nuclear  weapons  in  facilitating  Pakistan's  Non-­‐State  Actor  Policy  in  India  and  

beyond?    ¨ What  are  the  questions  and  problems  facing  Pakistan  as  it  tries  to  manage  the  spread  of  domestic  

Islamist  terrorism  while  retaining  its  commitment  to  using  Islamist  militants  outside  of  Pakistan  to  achieve  its  policy  goals?  

REQUIRED  READINGS:  (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ C.  Christine  Fair,  Fighting  to  the  End:  The  Pakistan  Army's  Way  of  War  (United  Kingdom:  Oxford  University  Press,  2014),  Chapters  1,  3,  7,  8,  &  9.  

¨ Husain  Haqqani,  Pakistan:  Between  Mosque  and  Military,  (Washington,  D.C.:  Carnegie  Endowment  for  International  Peace,  2005).  Chapters  4,  5,  7,  &  9.  

OPTIONAL  READINGS:  None.      

7. COUNTERTERRORISM  AND  THE  RULE  OF  LAW  (RELEASE:  NOVEMBER  5,  2015)    This  section  of  the  course  explores  the  implications  of  U.S.  domestic  and  international  law  for  counterterrorism.  

KEY  QUESTIONS:  ¨ What are the laws of war and how do they related to counterterrorism? ¨ What is the impact of criminal law on counterterrorism? ¨ What legal authorities govern which government agencies? ¨ How do the roles of various government agencies differ? ¨ How does the law affect targeted killings? ¨ How does the law affect interrogations?

Page 17: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

16  of  21  

 

¨ How does the law affect the use of force?

REQUIRED  Readings:    

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  O'Donnell,  "International  Treaties  Against  Terrorism  and  the  Use  of  Terrorism  During  Armed  Conflict  and  by  Armed  Forces,"  International  Review  of  Red  Cross,  Vol.  88,  No.  864,  December  2006.  

¨ United  Nations  Security  Council,  Resolution  1373,  September  28,  2001.    ¨ U.S.  Constitution.  ¨ U.S.  Supreme  Court,  Youngstown  Sheet  &  Tube  Co.  v.  Sawyer,  343  U.S.  579  (1952)  (The  Steel  Seizure  

Case),  with  particular  attention  on  Justice  Jackson's  tripartite  framework  and  Chief  Justice  Vinson's  dissent.  

OPTIONAL  READINGS:  

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ U.S.  Supreme  Court,  United  States  v.  Curtis-­‐Wright  Export  Corp,  299  U.S.  304  (1936).  ¨ U.S.  Supreme  Court,  New  York  Times  Co.  v.  United  States,  403  U.S.  713  (1971).  ¨ U.S.  Supreme  Court,  Katz  v.  United  States,  389  U.S.  347  (1967).  ¨ U.S.  Supreme  Court,  U.S.  v.  U.S.  District  Court,  407  U.S.  297  (1972).    

 

8. INTELLIGENCE  AND  COUNTERTERRORISM  (RELEASE:  NOVEMBER  12,  2013)    This  section  of  the  course  explores  the  role  of  intelligence  in  counterterrorism  operations  and  considers  several  important  post-­‐9/11  controversies  such  as  surveillance  and  torture.  

KEY  QUESTIONS:  

¨ What  are  the  purposes  that  intelligence  serves  in  counterterrorism?    ¨ What  are  the  limits  of  intelligence  in  counterterrorism?    ¨ What  are  collection  and  analytic  techniques  that  intelligence  services  use  in  counterterrorism?    ¨ What  are  the  strengths  and  weaknesses  of  different  intelligence  techniques?    ¨ What  are  the  standards  of  success  and  failure  regarding  counterterrorist  intelligence?  What  

governmental  organizations  contribute  to  counterterrorist  intelligence,  especially  in  the  United  States,  and  how  have  they  changed?  What  are  the  principle  controversies  involving  intelligence  used  for  counterterrorism?  

REQUIRED  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  Byman,  "The  Intelligence  War  on  Terrorism,"  Intelligence  and  National  Security  (2013).    ¨ Richard  A.  Posner,  "Principles  of  Intelligence,"  Preventing  Surprise  Attacks  (Rowman  &  Littlefield,  

2005),  Chapter  4.    

Page 18: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

17  of  21  

 

OPTIONAL  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Gabriella  Blum  and  Philip  B.  Heymann,  "Interrogation,"  in  Laws,  Outlaws,  and  Terrorists  (Massachusetts:  MIT  Press,  2010),  Chapter  6.    

 

9. COUNTERTERRORISM  INSTRUMENTS  (RELEASE:  NOVEMBER  19,  2013)    This  section  of  the  course  explores  the  various  counterterrorism  instruments,  such  as  diplomacy,  financial  pressure,  and  targeted  killings,  and  their  associated  advantages  and  limitations.  This  section  will  also  feature  an  optional  subsection  on  renditions  and  interviews  with  New  York  Times  reporter  Mark  Mazzetti,  MQ-­‐1  Predator  Pilot    Major  David  Blair,  USAF,  and  former  first  Secretary  of  Treasury  for  Terrorism  Financing  and  Financial  Crimes  Juan  Zarate.  

KEY  QUESTIONS:  ¨ What  are  the  various  instruments  used  in  counterterrorism?  ¨ What  are  the  principal  ways  in  which  each  instrument  is  used?  ¨ What  are  the  contributions  and  advantages  of  each  instrument?  ¨ What  are  the  limitations  and  disadvantages  of  each  instrument?  ¨ How  are  these  counterterrorism  instruments  used  together  in  a  complementary  way?  

REQUIRED  READINGS:    (All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Audrey  Kurth  Cronin,  "Why  Drones  Fail,”  Foreign  Affairs  (July/August  2013).    ¨ Daniel  Byman,  "Why  Drones  Work,”  Foreign  Affairs  (July/August  2013).    ¨ Paul  R.  Pillar,  "Counterterrorist  Instruments,"  in  Terrorism  and  U.S.  Foreign  Policy  (Washington,  D.C.:  

Brookings,  2003),  Chapter  4.    

OPTIONAL  READINGS:    

(All  Readings  are  available  in  the  course  itself  as  part  of  the  Weekly  Guide  within  the  Introduction  subsection  or  under  Readings  in  the  main  top  menu  of  the  course.)    

¨ Daniel  Byman,  "Diplomacy,"  in  The  Five  Front  War:  The  Better  Way  To  Fight  Global  Jihad,  New  York:  Wiley,  2007),  Chapter  8.    

¨ Michael  Scheuer  Testimony  in  "Extraordinary  Rendition  in  U.S.  Counterterrorism  Policy:  The  Impact  on  Transatlantic  Relations,"  House  Foreign  Affairs  Committee,  April  17,  2007.  Read  the  Question  and  Answer  session!    

¨ Paul  R.  Pillar  and  Christopher  Preble,  "Don't  You  Know  There's  a  War  On?  Assessing  the  Military's  Role  in  Counterterrorism,"  in  Benjamin  H.  Friedman,  Jim  Harper,  and  Christopher  A.  Preble  (eds.),  Terrorizing  Ourselves  (Washington,  D.C.:  Cato  Institute,  2010).    

 

Page 19: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

18  of  21  

 

   

Page 20: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

19  of  21  

 

APPENDIX  B:  LEARNING  CHECKLIST    

This  guide  lists  the  learning  goals  and  objectives  for  each  section  of  the  GeorgetownX  Terrorism  and  Counterterrorism  Course  (September  24,  2015  -­‐  November  25,  2015).  Use  this  guide  as  your  own  learning  checklist  while  engaging  with  the  course.  

WHAT  IS  TERRORISM  AND  WHO  ARE  THE  TERRORISTS–  SECTION  1:  OCTOBER  1-­‐7  

¨ Recall  the  working  definitions  of  terrorism  and  recognize  their  analytic  limits.  ¨ Identify  a  range  of  causes  of  terrorism,  and  as  importantly,  distinguish  what  commonly  cited  issues  are  

not  usually  causes.  ¨ Explain  how  terrorism  has  changed  throughout  history  and  how  it  is  hard  to  define.  ¨ Recognize  how  terrorism  differs  from  other  forms  of  conflict  and  violence  like  guerilla  warfare.    ¨ List  the  core  elements  of  the  definition  of  terrorism.  ¨ Indicate  how  someone  becomes  a  terrorist  and  how  he  or  she  might  justify  and  rationalize  the  

violence  they  commit.    ¨ Recognize  the  diversity  of  reasons  that  account  for  someone  becoming  a  terrorist.  ¨ Recognize  the  distinct  psychological  processes  and  policy  measures  associated  with  each  level  on  the  

staircase  to  terrorism.    

STRATEGIES,  TACTICS,  AND  TECHNOLOGY  USE  –  SECTION  2:  OCTOBER  1-­‐7  

¨ Understand  the  strategies  and  tactics  of  terrorist  groups.  ¨ Identify  the  different  strategies  that  terrorist  groups  use  and  their  associated  strengths  and  

weaknesses.  ¨ Describe  the  most  common  types  of  terrorist  attacks  and  how  terrorists  use  technology.  

AL-­‐QAEDA  –  SECTION  3:  OCTOBER  8-­‐14  

¨ Identify  important  terrorist  groups  in  the  Middle  East  and  South  Asia  with  an  understanding  of  their  strengths,  weaknesses,  and  overall  effectiveness.  These  include  Palestinian  groups,  Pakistani  groups,  and  Al-­‐Qaeda.  

¨ Identify  a  range  of  causes  of  terrorism,  and  as  importantly,  distinguish  what  commonly  cited  issues  are  not  usually  causes.  ¨ Identify  one  or  more  accomplishments,  weaknesses  and/or  problems  of  each  group.  ¨ Identify  the  various  main  militant  groups  and  their  objectives.  ¨ Recognize  the  diversity  of  reasons  that  account  for  someone  becoming  a  terrorist.  

ISLAM  –  SECTION  4:  OCTOBER  15-­‐21  

¨ Understand  the  relationship  between  religion  and  terrorism.  ¨ Describe  jihad  and  ways  in  which  it  has  been  used  and/or  exploited.  ¨ Identify  the  attitudes  most  Muslims  have  today  towards  Islamic  law  and  terrorism  in  the  name  of  

Islam.  ¨ Identify  the  causes  if  terrorism  and  its  relationship  to  religion.  ¨ Explain  the  emergence  of  global  jihad  inspired  by  Osama  bin  Laden  and  Al-­‐Qaeda.    ¨ Explain  the  ways  in  which  Islam  can  be  viewed  as  the  problem,  the  primary  catalyst,  and  the  driver  of  

terrorism.    

Page 21: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

20  of  21  

 

¨ Define  Salafism.  ¨ Explain  the  place  of  Saudi  Arabia  in  global  Salafism.  ¨ Recognize  that  conservatism  in  religion  and  violence  are  not  necessarily  linked.  ¨ Identify  the  attitudes  most  Muslims  have  today  towards  Islamic  law  and  terrorism  in  the  name  of  

Islam.  ¨  

AREA  STUDIES:  THE  TERRORIST  THREAT  TO  ISRAEL  AND  THE  ISRAELI  RESPONSE–  SECTION  5:  OCTOBER  22-­‐28  

¨ Understand  how  counterterrorism  is  constrained  in  a  democratic  society  and  several  important  legal  debates  related  to  counterterrorism.  ¨ Recognize  the  strengths  and  limits  of  different  counterterrorism  instruments,  including  intelligence,  

economic  punishment,  and  different  uses  of  military  force  (drones/targeted  killing  of  terrorists).  ¨ Explain  how  intelligence  is  collected  against  terrorist  groups  and  recognize  different  means  (human  

intelligence,  signals  intelligence,  etc.).  ¨ Describe  the  impact  of  counterterrorism  on  peace  negotiations.  

AREA  STUDIES:  TERRORISM  AND  COUNTERTERRORISM  IN  SOUTH  ASIA–  SECTION  6:  OCTOBER  29-­‐NOVEMBER  4  

¨ Identify  important  terrorist  groups  in  the  Middle  East  and/or  South  Asia  with  an  understanding  of  their  strengths,  weaknesses,  and  overall  effectiveness.  These  include  Palestinian  groups,  Pakistani  groups,  and  Al-­‐Qaeda.  

¨ Understand  the  relationship  between  religion  and  terrorism.  ¨ Describe  the  evolution  of  political  Islam.  ¨ Describe  what  state  supporters  do  and  do  not  offer  groups.  ¨ Identify  the  various  main  militant  groups.  ¨ Explain  the  ways  in  which  Islam  can  be  viewed  as  the  problem,  the  primary  catalyst,  and  the  driver  of  

terrorism.  ¨ Identify  the  attitudes  most  Muslims  have  today  towards  Islamic  law  and  terrorism  in  the  name  of  

Islam.  

COUNTERTERRORISM  AND  THE  RULE  OF  LAW  –  WEEK  7:  NOVEMBER  5-­‐11  

¨ Understand  how  counterterrorism  constrained  in  a  democratic  society.  o Understand  the  legal  principles  shaping  detention  o Understand  the  legal  principles  shaping  surviellence  o Understand  the  legal  principles  shaping  targeted  killings  o Identify which authorities govern which bureaucracies?  

¨ Identify  the  sources  of  law  related  to  counterterrorism?  ¨ Describe  important  legal  issues  regarding  U.S.  counterterrorism  today  

INTELLIGENCE  AND  COUNTERTERRORISM  –  SECTION  8:  NOVEMBER  12-­‐  19,  2013  

¨ Understand  how  counterterrorism  is  constrained  in  a  democratic  society  and  several  important  legal  debates  related  to  counterterrorism.  ¨ Explain  how  intelligence  is  collected  against  terrorist  groups  and  recognize  the  different  means  

(human  intelligence,  signals  intelligence,  etc.).  

Page 22: Comprehensive MOOC Syllabus, 082614

 

 

GeorgetownX:  Terrorism  and  Counterterrorism    SEPTEMBER  24,  2015  –  DECEMBER  2,  2015  

21  of  21  

 

¨ Identify  the  types  of  governmental  organizations  that  contribute  to  counterterrorist  intelligence  and  how  they  have  changed.  

¨ Describe  the  principle  controversies  in  recent  years  involving  intelligence  used  for  counterterrorism.  

COUNTERTERRORISM  INSTRUMENTS  –  SECTION  9:  NOVEMBER  20-­‐  26,  2013  

¨ Understand  how  counterterrorism  is  constrained  in  a  democratic  society  and  several  important  legal  debates  related  to  counterterrorism.  ¨ Recognize  the  strengths  and  limits  of  different  counterterrorism  instruments,  including  intelligence,  

economic  punishment,  and  different  uses  of  military  force  (drones/targeted  killing  of  terrorism).  ¨ Identify  the  tradeoffs  in  the  use  of  each  counterterrorism.  

If  you  are  planning  to  get  a  Certificate,  all  graded  activities  have  to  be  submitted  by  December  2nd  at  9:00  EDT/13:00  UTC.  

 


Recommended