The Role of Criminal Justice in Terrorism Course Orientation and Introduction Copyright 2007-2008 Raymond E. Foster.

Download Report

Transcript The Role of Criminal Justice in Terrorism Course Orientation and Introduction Copyright 2007-2008 Raymond E. Foster.

The Role of Criminal Justice in Terrorism

Course Orientation and Introduction Copyright 2007-2008 Raymond E. Foster

Today’s Schedule

     Instructor Introduction University Education Course Outline and Expectations Website Orientation Course Beginning Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Contact Me

   Office Hours:  By Appointment Office Telephone: 909.599.7530

[email protected]

Copyright 2007-2008 Raymond E. Foster

What does a university education mean?

You can manage a long term project.

You can work independently.

You can work in a group.

You can manage competing resources.

You can read and write.

You learned new ideas.

You were exposed to a variety of cultures.

You enhanced your critical thinking skills

Copyright 2007-2008 Raymond E. Foster

Course Objectives:

This course employs a criminal justice framework for the analysis and evaluation of terrorist groups and individuals, terrorist origins, goals, dynamics, ideologies and counterterrorism. The course will include a discussion of the task of defining terrorism , an exploration of the history and causes of terrorism (both internationally and domestically), the structure and organization of terrorist groups, an overview of the methods and weapons of terrorists, and public policies, strategies and approaches for combating and preventing terrorism . Copyright 2007-2008 Raymond E. Foster

How this Course Relates to Major

• • • Summarize and interpret current issues in the field of criminal justice and how these issues impact criminal justice organizations, criminal justice personnel and other stakeholders; Analyze, critique and defend view; and, criminal justice policy and service delivery from a management point of Summarize, interpret and relate meta, normative and applied ethical theories in a dynamic environment such as criminal justice management.

Copyright 2007-2008 Raymond E. Foster

Course Specific Outcomes

       Formulate a working definition of associated with the various social, political and cultural contexts of that meaning; terrorism and assess the problems Construct a framework from a criminal justice perspective to analyze terrorism and terrorists; List and summarize the historical and theoretical perspectives that have been a major influence on our understanding of violence and modern day terrorism; Analyze and evaluate the patterns and trends of terrorism , including methods, modes of attack, tactics, and strategies; against the United States and foreign Discuss terrorism governments; Apply theories and policies of counter terrorism , including scholarly controversies relating to the media and civilians; and, Identify key people who have influenced our understanding of the characteristics, causes, and controls of terrorism .

Copyright 2007-2008 Raymond E. Foster

Required Text:

Snowden, L. & Whitsel, B. (2005) Terrorism: Research, Readings and Realities. Prentice Hall Poland, J. (2005) Understanding Terrorism: Groups, Strategies and Responses.

Copyright 2007-2008 Raymond E. Foster

Supplemental Material

   Various Web-based resources, including the MIPT; Union e-library; and, The Battle of Algiers (Video).

Copyright 2007-2008 Raymond E. Foster

Course Requirements:

This course is organized into four modules of instruction. In this eight week session, each module is two weeks in length. A course calendar is attached as the last page of your syllabus. Each module includes specific activities and assignments.

Copyright 2007-2008 Raymond E. Foster

MODULE ONE (Defining Terrorism)

Readings:

1. Understanding Terrorism (Poland)

a. Chapter One: Concepts of Terror and Terrorism b. Chapter Two: Historical Antecedents of Terrorism and Violence c. Chapter Five: Designated Foreign Terrorist Organizations: The "A List."

2. Terrorism (Snowden & Whitsel)

a. Chapter One: Identity and the Terrorist Threat: An Interpretive and Explanatory Model b. Chapter Two: The Changing Face of American Terrorism c. Chapter Five: Implementing Justice through Terror and Destruction: Ecoterror's Violent Agenda to "Save" Nature.

d. Chapter Ten: The Right to Revise History: The Institute for Historical Review E. Chapter Fourteen: Zealous Before the Lord: The Construction of Christian Identity Theology Copyright 2007-2008 Raymond E. Foster

MODULE ONE (Defining Terrorism)

Activities: 1.Course orientation 2.Video – 6.Lecture

Battle of Algiers 3.Online forum participation 4. Panel formation and topic selection 5.Selection of individual presentations 7. Roundtable discussion on video 8.Paper one Copyright 2007-2008 Raymond E. Foster

MODULE TWO (The Modus Operandi of Terrorists)

Readings:

1. Understanding Terrorism (Poland)

a. Chapter Six: The Dynamics of Hostage Taking and Negotiation b. Chapter Seven: Terrorism and Bombing c. Chapter Eight: Suicide Bombers: A Global Problem

2. Terrorism (Snowden & Whitsel)

a. Chapter Six: Islamic Extremists: How do they Mobilize Support?

b. Chapter Seven: An Analysis of Organizational Characteristics for Groups use Radiological Weapons of Mass Victimization c. Chapter Eight: Steganography and Terrorism: An Introduction to Data Hiding and its use in Terrorist activities d. WMD Yesterday's News: The WMD Terrorism Threat Today.

e. Leaderless Resistance: Are Terrorist Groups a Thing of the Past?

Copyright 2007-2008 Raymond E. Foster

MODULE TWO (The Modus Operandi of Terrorists) Activities:

1.

Lecture 2.

Individual presentations 3.

Work on panel project 4.Online forum participation Copyright 2007-2008 Raymond E. Foster

MODULE THREE (Response to Terrorism) 1. Understanding Terrorism (Poland)

a. Chapter Three: Violence and Terrorism: The Role of the Mass Media b. Chapter Nine: Counterterrorist Measures: The Response

2. Terrorism (Snowden & Whitsel)

a. Chapter Four: The Diplomacy of Counterterrorism: Lessons Learned, Lessons Ignored b. Chapter Nine: Interpol and the Policing of International Terrorism: Developments and Dynamics since September 11.

c. Chapter Nineteen: Planning for Campus Security after September 11: One University's Experience d. Chapter Twenty: Post 9/11: Are we Really Safer Now?

3. The National Response Plan is available on the internet.

Copyright 2007-2008 Raymond E. Foster

MODULE THREE (Response to Terrorism) Activities:

1.

Lecture 2.

Work on panel project 3.

Paper two 4.Online forum participation Copyright 2007-2008 Raymond E. Foster

MODULE FOUR (Future and Emerging Trends)

Readings:

1. Understanding Terrorism (Poland)

a. Chapter Four: The Palestine Question and Al Qaeda b. Chapter Ten: The Future of Terrorism

2. Terrorism (Snowden & Whitsel)

a. Chapter Eleven: New Age Groups and Public Order b. Chapter Fifteen: Security-Threat Groups: The Threats Posed by White-Supremacist Organizations c. Chapter Seventeen: Extremism in the Military: The Burmeister Case and Policy Response.

d. Chapter Eighteen: Rural Radical Religion: Christian Identity Movement and Community Militias.

Copyright 2007-2008 Raymond E. Foster

MODULE FOUR (Future and Emerging Trends)

 1.

Activities Lecture 2.

Work on panel project 3.

Panel discussion 4.Panel written report 5.

Online forum participation Copyright 2007-2008 Raymond E. Foster

Week One Date Activity

Module One

Course Orientation, Group Project Instructions, Select individual presentations, first half of Battle of Algiers Two Group Project Topic Selection, second half of Battle of Algiers, roundtable discussion of video, lecture Three Four Five Six Seven Eight Assignment Due None Paper One

Module Two

No Class (Work on presentations, work as a group on panel assignment) Individual Presentations, Lecture

Module Three

No Class (Work as a group on panel assignment) Lecture

Module Four

No Class (Work on group assignment) Panel Presentations, lecture Copyright 2007-2008 Raymond E. Foster None Individual Presentations None Paper Two None Panel Presentations, including paper

Method of Evaluation:

Exam One Exam Two Group Project Issue Paper One Issue Paper Two Practical Exercise Website Presentation Participation Semester Total 10% 20% 20% 10% 10% 10% 10% 10% 100% A B C U 90-100% 80-89% 70-79% 69% and Under Copyright 2007-2008 Raymond E. Foster

Attendance

Within the university setting, learners are expected to attend class on a regular basis, complete all readings and assignments before the stated dates and participate in topic discussions to enhance their overall learning experience. As participation is directly related to attendance, and because of the abbreviated nature of the eight week session, learners missing any class will not receive credit for participation. Attendance will be recorded by a class roster that will be passed among the learners during each class. It is the learner’s responsibility to sign the roster.

Copyright 2007-2008 Raymond E. Foster

Ethical Conduct

Learners should be aware that there are severe consequences for violations of academic ethical conduct. Primarily, we are concerned with cheating and plagiarism. Learners who are determined to have cheated or committed plagiarism will face disciplinary action as identified within UI&U regulations. For additional clarification of cheating and/or plagiarism, refer to the UI&U Catalog for policies regarding Academic Integrity.

Copyright 2007-2008 Raymond E. Foster

Schedule Changes

 The syllabus and schedule are subject to change in the event of extenuating circumstances and/or upon due notice and at the discretion of the instructor. Copyright 2007-2008 Raymond E. Foster

Issue Papers

At a minimum, it is expected that the students will produce an academically sound and properly formatted work (APA format is strongly encouraged). All work is evaluated on exposition as well as composition. Superior work will incorporate independent research as well as assigned and supplemental readings.

Copyright 2007-2008 Raymond E. Foster

Paper One

Using the readings and your own research, complete a 4-6 page paper. Explore the various definitions of terrorism. What definition would you use? As you complete your paper, consider the following questions: What are the strengths of your definition of terrorism? What are the weaknesses? Is terrorism a military problem or a criminal justice problem? How does your definition cover state terror, state involvement in terror, state sponsorship of terror and stateless terrorist groups? What, if any, theories on violence, particularly political violence support your definition? How is your definition shaped by your own cultural, political and social views?

Copyright 2007-2008 Raymond E. Foster

Paper Two

Using the readings and your own research, complete a 4-6 page analysis of how technology has changed terrorism. Consider comparing and contrasting pre-1970 terrorism with post-1970 terrorism. How has technology changed the terrorist’s targets and methods? How has technology changed their ability to transmit their messages to other members and the public? Copyright 2007-2008 Raymond E. Foster

Group Project

The group project involves an analysis of an active terrorist group. Using the Country Reports on Terrorism and Patterns of Global Terrorism, United States Department of State, 2006, your group should choose a designated terrorist group for analysis. There are two parts to the final project. First, your group must prepare a comprehensive written analysis of the group. At a minimum, this 8-10 page report should address the group history, structure, organization, current activities and major goals of the group. Additionally, the report should consider counterterrorism policies, strategies or tactics that are being or should be employed against the group; and, focus on criminal justice responses to the group. In addition to the written report, your group should prepare a 30 minute panel discussion on the group you choose. Copyright 2007-2008 Raymond E. Foster

Individual Presentations

Each learner will be assigned one of the supplemental readings. The learner is to digest the information and prepare a ten minute class presentation and one-page briefing paper on the reading. The learner must provide a copy of the briefing paper to each class member.

Copyright 2007-2008 Raymond E. Foster

Participation

Participation is ten percent of the learner’s final grade. In addition to attendance, participation will also be measured by the use of an online threaded discussion. Specific instructions regarding the online forum will be presented during the course orientation and are available on the course website.

Copyright 2007-2008 Raymond E. Foster

Extra Credit

There is no extra credit available in this course.

Copyright 2007-2008 Raymond E. Foster

Students with Disabilities

Please refer to the Catalog for policies regarding American Disabilities’ Act or http://www.tui.edu/ASN/serv_learner_disab/default.asp for further assistance regarding UI&U compliance with ADA.

Copyright 2007-2008 Raymond E. Foster

General Stuff

   You must read the text and the supplemental material before the lecture.

Reading will enhance your ability to participate Participation will increase your grade, enhance not only your learning, but your enjoyment of the class.

Copyright 2007-2008 Raymond E. Foster

Website

The course has one companion website. At that website the students will find hyperlinks to the readings, important course downloads (such as the syllabus) and hyperlinks to other course related multimedia presentations (such as PowerPoint presentations, short videos, etc). Copyright 2007-2008 Raymond E. Foster

Website

www.hitechcj.com/union-terrorism Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down Copyright 2007-2008 Raymond E. Foster

Scroll Up Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Your Username

    First Initial, Last Name, (location), (Course) rfosterbrea410 rfosterarcadia304 rfostertwintowers410 Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Who Are you?

      Name Agency Terrorism experience Reason for returning to university I have always been ……………… I have always wanted to ………… Copyright 2007-2008 Raymond E. Foster