65
Copyright 2007-2008 Raymond E . Foster The Role of The Role of Criminal Justice Criminal Justice in in Terrorism Terrorism Course Orientation and Course Orientation and Introduction Introduction

Copyright 2007-2008 Raymond E. Foster The Role of Criminal Justice in Terrorism Criminal Justice TerrorismCriminal Justice Terrorism Course Orientation

Embed Size (px)

Citation preview

Copyright 2007-2008 Raymond E. Foster

The Role of The Role of Criminal Justice Criminal Justice in in

TerrorismTerrorism

Course Orientation and Course Orientation and IntroductionIntroduction

Copyright 2007-2008 Raymond E. Foster

Today’s ScheduleToday’s Schedule

Instructor IntroductionInstructor Introduction University EducationUniversity Education Course Outline and ExpectationsCourse Outline and Expectations Website OrientationWebsite Orientation Course BeginningCourse Beginning

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Contact MeContact Me

Office Hours:Office Hours: By Appointment By Appointment

Office Telephone: 909.599.7530Office Telephone: 909.599.7530 [email protected]@hitechcj.com

Copyright 2007-2008 Raymond E. Foster

What does a university education What does a university education mean?mean?

You can manage a long term project.

You can work independently.

You can work in a group.

You can manage competing resources.

You can read and write.

You learned new ideas.

You were exposed to a variety of cultures.

You enhanced your critical thinking skills

Copyright 2007-2008 Raymond E. Foster

Course Objectives:Course Objectives:

This course employs a This course employs a criminal justicecriminal justice framework for framework forthe analysis and evaluation of terrorist groups andthe analysis and evaluation of terrorist groups andindividuals, terrorist origins, goals, dynamics,individuals, terrorist origins, goals, dynamics,ideologies and counterterrorism. The course willideologies and counterterrorism. The course willinclude a discussion of the task of defining terrorism, aninclude a discussion of the task of defining terrorism, anexploration of the history and causes of terrorism (bothexploration of the history and causes of terrorism (bothinternationally and domestically), the structure andinternationally and domestically), the structure andorganization of terrorist groups, an overview of the organization of terrorist groups, an overview of the

methodsmethodsand weapons of terrorists, and public policies, strategies and weapons of terrorists, and public policies, strategies

andandapproaches for combating and preventing terrorism. approaches for combating and preventing terrorism.

Copyright 2007-2008 Raymond E. Foster

How this Course Relates to MajorHow this Course Relates to Major

•• Summarize and interpret current issues in the Summarize and interpret current issues in the field of criminal justice and how these issues field of criminal justice and how these issues impact criminal justice organizations, criminal impact criminal justice organizations, criminal justice personnel and other stakeholders; justice personnel and other stakeholders;

•• Analyze, critique and defend criminal justice Analyze, critique and defend criminal justice policy and service delivery from a management policy and service delivery from a management point of view; and,point of view; and,

•• Summarize, interpret and relate meta, Summarize, interpret and relate meta, normative and applied ethical theories in a normative and applied ethical theories in a dynamic environment such as criminal justice dynamic environment such as criminal justice management.management.

Copyright 2007-2008 Raymond E. Foster

Course Specific OutcomesCourse Specific Outcomes Formulate a working definition of terrorism and assess the Formulate a working definition of terrorism and assess the

problems associated with the various social, political and problems associated with the various social, political and cultural contexts of that meaning;cultural contexts of that meaning;

Construct a framework from a criminal justice perspective Construct a framework from a criminal justice perspective to analyze terrorism and terrorists;to analyze terrorism and terrorists;

List and summarize the historical and theoretical List and summarize the historical and theoretical perspectives that have been a major influence on our perspectives that have been a major influence on our understanding of violence and modern day terrorism;understanding of violence and modern day terrorism;

Analyze and evaluate the patterns and trends of terrorism, Analyze and evaluate the patterns and trends of terrorism, including methods, modes of attack, tactics, and strategies;including methods, modes of attack, tactics, and strategies;

Discuss terrorism against the United States and foreign Discuss terrorism against the United States and foreign governments;governments;

Apply theories and policies of counter terrorism, including Apply theories and policies of counter terrorism, including scholarly controversies relating to the media and civilians; scholarly controversies relating to the media and civilians; and,and,

Identify key people who have influenced our understanding Identify key people who have influenced our understanding of the characteristics, causes, and controls of terrorism.of the characteristics, causes, and controls of terrorism.

Copyright 2007-2008 Raymond E. Foster

Required Text:Required Text:

Snowden, L. & Whitsel, B. (2005)Snowden, L. & Whitsel, B. (2005)

Terrorism: Research, Readings Terrorism: Research, Readings andand

Realities. Prentice HallRealities. Prentice Hall

Poland, J. (2005) UnderstandingPoland, J. (2005) Understanding

Terrorism: Groups, Strategies andTerrorism: Groups, Strategies and

Responses.Responses.

Copyright 2007-2008 Raymond E. Foster

Supplemental MaterialSupplemental Material

Various Web-based resources, Various Web-based resources, including the MIPT;including the MIPT;

Union e-library; and, Union e-library; and, The Battle of Algiers (Video).The Battle of Algiers (Video).

Copyright 2007-2008 Raymond E. Foster

Course Requirements:Course Requirements:

This course is organized into four This course is organized into four modules ofmodules of

instruction. In this eight week session, instruction. In this eight week session, eacheach

module is two weeks in length. A module is two weeks in length. A coursecourse

calendar is attached as the last page of calendar is attached as the last page of your your

syllabus. Each module includes specific syllabus. Each module includes specific activities and assignments. activities and assignments.

Copyright 2007-2008 Raymond E. Foster

MODULE ONEMODULE ONE(Defining Terrorism)

Readings:1. Understanding Terrorism (Poland) a. Chapter One: Concepts of Terror and Terrorism b. Chapter Two: Historical Antecedents of Terrorism and Violence c. Chapter Five: Designated Foreign Terrorist Organizations: The "A

List."2. Terrorism (Snowden & Whitsel) a. Chapter One: Identity and the Terrorist Threat: An Interpretive and

Explanatory Model b. Chapter Two: The Changing Face of American Terrorism c. Chapter Five: Implementing Justice through Terror and Destruction:

Ecoterror's Violent Agenda to "Save" Nature. d. Chapter Ten: The Right to Revise History: The Institute for

Historical Review E. Chapter Fourteen: Zealous Before the Lord: The Construction of

Christian Identity Theology

Copyright 2007-2008 Raymond E. Foster

MODULE ONEMODULE ONE(Defining Terrorism)

Activities:Activities:1.1.Course orientationCourse orientation2.2.Video – Battle of AlgiersVideo – Battle of Algiers3.3.Online forum participationOnline forum participation4.4.Panel formation and topic selectionPanel formation and topic selection5.5.Selection of individual presentationsSelection of individual presentations6.6.LectureLecture7.7.Roundtable discussion on videoRoundtable discussion on video8.8.Paper onePaper one

Copyright 2007-2008 Raymond E. Foster

MODULE TWOMODULE TWO(The Modus Operandi of Terrorists)

Readings:1. Understanding Terrorism (Poland) a. Chapter Six: The Dynamics of Hostage Taking and Negotiation b. Chapter Seven: Terrorism and Bombing c. Chapter Eight: Suicide Bombers: A Global Problem2. Terrorism (Snowden & Whitsel) a. Chapter Six: Islamic Extremists: How do they Mobilize Support? b. Chapter Seven: An Analysis of Organizational Characteristics for

Groups use Radiological Weapons of Mass Victimization

c. Chapter Eight: Steganography and Terrorism: An Introduction to Data

Hiding and its use in Terrorist activities d. WMD Yesterday's News: The WMD Terrorism Threat Today. e. Leaderless Resistance: Are Terrorist Groups a Thing of the Past?

Copyright 2007-2008 Raymond E. Foster

MODULE TWOMODULE TWO(The Modus Operandi of Terrorists)

Activities:Activities:

1.1. LectureLecture

2.2. Individual presentationsIndividual presentations

3.3. Work on panel projectWork on panel project

4.4. Online forum participationOnline forum participation

Copyright 2007-2008 Raymond E. Foster

MODULE THREEMODULE THREE(Response to Terrorism)

1. Understanding Terrorism (Poland) a. Chapter Three: Violence and Terrorism: The Role of the Mass

Media b. Chapter Nine: Counterterrorist Measures: The Response2. Terrorism (Snowden & Whitsel) a. Chapter Four: The Diplomacy of Counterterrorism: Lessons

Learned, Lessons Ignored

b. Chapter Nine: Interpol and the Policing of International Terrorism:

Developments and Dynamics since September 11. c. Chapter Nineteen: Planning for Campus Security after

September 11: One University's Experience d. Chapter Twenty: Post 9/11: Are we Really Safer Now?3. The National Response Plan is available on the internet.

Copyright 2007-2008 Raymond E. Foster

MODULE THREEMODULE THREE(Response to Terrorism)

Activities:Activities:

1.1. LectureLecture

2.2. Work on panel projectWork on panel project

3.3. Paper twoPaper two

4.4. Online forum participationOnline forum participation

Copyright 2007-2008 Raymond E. Foster

MODULE FOURMODULE FOUR(Future and Emerging Trends)

Readings:1. Understanding Terrorism (Poland) a. Chapter Four: The Palestine Question and Al Qaeda b. Chapter Ten: The Future of Terrorism 2. Terrorism (Snowden & Whitsel) a. Chapter Eleven: New Age Groups and Public Order b. Chapter Fifteen: Security-Threat Groups: The Threats Posed by White-Supremacist Organizations c. Chapter Seventeen: Extremism in the Military: The Burmeister

Case and Policy Response. d. Chapter Eighteen: Rural Radical Religion: Christian Identity

Movement and Community Militias.

Copyright 2007-2008 Raymond E. Foster

MODULE FOURMODULE FOUR(Future and Emerging Trends)

ActivitiesActivities

1.1. LectureLecture

2.2. Work on panel projectWork on panel project

3.3. Panel discussionPanel discussion

4.4. Panel written reportPanel written report

5.5. Online forum participationOnline forum participation

Copyright 2007-2008 Raymond E. Foster

 

Week Date Activity Assignment Due

Module One

OneCourse Orientation, Group Project Instructions, Select individual

presentations, first half of Battle of AlgiersNone

TwoGroup Project Topic Selection, second half of Battle of Algiers,

roundtable discussion of video, lecturePaper One

Module Two

ThreeNo Class (Work on presentations, work as a group on panel

assignment)None

Four Individual Presentations, Lecture Individual Presentations

Module Three

Five No Class (Work as a group on panel assignment) None

Six Lecture Paper Two

Module Four

Seven No Class (Work on group assignment) None

Eight Panel Presentations, lecture Panel Presentations, including paper

Copyright 2007-2008 Raymond E. Foster

Method of Evaluation:Method of Evaluation:

Exam One 10%Exam Two 20%Group Project 20%Issue Paper One 10%Issue Paper Two 10%Practical Exercise 10%Website Presentation 10%Participation 10%Semester Total 100%

A 90-100%

B 80-89%

C 70-79%

U 69% and Under

Copyright 2007-2008 Raymond E. Foster

Attendance Attendance Within the university setting, learners are expected to attend class on a regular Within the university setting, learners are expected to attend class on a regular basis, complete all readings and assignments before the stated dates and basis, complete all readings and assignments before the stated dates and participate in topic discussions to enhance their overall learning experience. As participate in topic discussions to enhance their overall learning experience. As participation is directly related to attendance, and because of the abbreviated participation is directly related to attendance, and because of the abbreviated nature of the eight week session, learners missing any class will not receive nature of the eight week session, learners missing any class will not receive

credit credit for participation. Attendance will be recorded by a class roster that will be for participation. Attendance will be recorded by a class roster that will be

passed passed among the learners during each class. It is the learner’s responsibility to sign among the learners during each class. It is the learner’s responsibility to sign

the the roster.roster.

Copyright 2007-2008 Raymond E. Foster

Ethical ConductEthical Conduct

Learners should be aware that there are severeLearners should be aware that there are severeconsequences for violations of academic ethicalconsequences for violations of academic ethicalconduct. Primarily, we are concerned withconduct. Primarily, we are concerned withcheating and plagiarism. Learners who arecheating and plagiarism. Learners who aredetermined to have cheated or committeddetermined to have cheated or committedplagiarism will face disciplinary action as identifiedplagiarism will face disciplinary action as identifiedwithin UI&U regulations. For additional within UI&U regulations. For additional clarification of cheating and/or plagiarism, refer toclarification of cheating and/or plagiarism, refer tothe UI&U Catalog for policies regarding Academicthe UI&U Catalog for policies regarding AcademicIntegrity.Integrity.

Copyright 2007-2008 Raymond E. Foster

Schedule ChangesSchedule Changes

The syllabus and schedule are subject The syllabus and schedule are subject to change in the event of extenuating to change in the event of extenuating circumstances and/or upon due notice circumstances and/or upon due notice and at the discretion of the instructor. and at the discretion of the instructor.

Copyright 2007-2008 Raymond E. Foster

Issue Papers Issue Papers

At a minimum, it is expected that the students will At a minimum, it is expected that the students will produceproduce

an academically sound and properly formatted work an academically sound and properly formatted work (APA(APA

format is strongly encouraged). All work is format is strongly encouraged). All work is evaluated onevaluated on

exposition as well as composition. Superior work exposition as well as composition. Superior work willwill

incorporate independent research as well as incorporate independent research as well as assigned andassigned and

supplemental readings.supplemental readings.

Copyright 2007-2008 Raymond E. Foster

Paper OnePaper One

Using the readings and your own research, complete a 4-6Using the readings and your own research, complete a 4-6page paper. Explore the various definitions of terrorism. page paper. Explore the various definitions of terrorism. What definition would you use? As you complete your What definition would you use? As you complete your paper, consider the following questions: What are thepaper, consider the following questions: What are thestrengths of your definition of terrorism? What are thestrengths of your definition of terrorism? What are theweaknesses? Is terrorism a military problem or a criminalweaknesses? Is terrorism a military problem or a criminaljustice problem? How does your definition cover statejustice problem? How does your definition cover stateterror, state involvement in terror, state sponsorship ofterror, state involvement in terror, state sponsorship ofterror and stateless terrorist groups? What, if any, theoriesterror and stateless terrorist groups? What, if any, theorieson violence, particularly political violence support youron violence, particularly political violence support yourdefinition? How is your definition shaped by your owndefinition? How is your definition shaped by your owncultural, political and social views?cultural, political and social views?

Copyright 2007-2008 Raymond E. Foster

Paper TwoPaper Two

Using the readings and your own research,Using the readings and your own research,

complete a 4-6 page analysis of how technologycomplete a 4-6 page analysis of how technology

has changed terrorism. Consider comparing andhas changed terrorism. Consider comparing and

contrasting pre-1970 terrorism with post-1970contrasting pre-1970 terrorism with post-1970

terrorism. How has technology changed theterrorism. How has technology changed the

terrorist’s targets and methods? How hasterrorist’s targets and methods? How has

technology changed their ability to transmit theirtechnology changed their ability to transmit their

messages to other members and the public? messages to other members and the public?

Copyright 2007-2008 Raymond E. Foster

Group Project Group Project The group project involves an analysis of an active terrorist group. The group project involves an analysis of an active terrorist group. Using the Country Reports on Terrorism and Patterns of GlobalUsing the Country Reports on Terrorism and Patterns of GlobalTerrorism, United States Department of State, 2006, your groupTerrorism, United States Department of State, 2006, your groupshould choose a designated terrorist group for analysis. There areshould choose a designated terrorist group for analysis. There aretwo parts to the final project. First, your group must prepare atwo parts to the final project. First, your group must prepare acomprehensive written analysis of the group. At a minimum, this 8-10 comprehensive written analysis of the group. At a minimum, this 8-10

pagepagereport should address the group history, structure, organization, current report should address the group history, structure, organization, current

activitiesactivitiesand major goals of the group. Additionally, the report should considerand major goals of the group. Additionally, the report should considercounterterrorism policies, strategies or tactics that are being or should counterterrorism policies, strategies or tactics that are being or should

bebeemployed against the group; and, focus on criminal justice responses to employed against the group; and, focus on criminal justice responses to

thethegroup. group.

In addition to the written report, your group should prepare a 30 minuteIn addition to the written report, your group should prepare a 30 minutepanel discussion on the group you choose. panel discussion on the group you choose.

Copyright 2007-2008 Raymond E. Foster

Individual PresentationsIndividual Presentations

Each learner will be assigned one of theEach learner will be assigned one of the

supplemental readings. The learner is tosupplemental readings. The learner is to

digest the information and prepare a tendigest the information and prepare a ten

minute class presentation and one-pageminute class presentation and one-page

briefing paper on the reading. The learnerbriefing paper on the reading. The learner

must provide a copy of the briefing paper must provide a copy of the briefing paper toto

each class member.each class member.

Copyright 2007-2008 Raymond E. Foster

ParticipationParticipation

Participation is ten percent of the learner’s Participation is ten percent of the learner’s final grade. In addition to attendance, final grade. In addition to attendance, participation will also be measured by the participation will also be measured by the use of an online threaded discussion. use of an online threaded discussion. Specific instructions regarding the online Specific instructions regarding the online forum will be presented during the course forum will be presented during the course orientation and are available on the course orientation and are available on the course website.website.

Copyright 2007-2008 Raymond E. Foster

Extra CreditExtra Credit

There is no extra credit available There is no extra credit available in this course.in this course.

Copyright 2007-2008 Raymond E. Foster

Students with DisabilitiesStudents with Disabilities

Please refer to the Catalog for policies regarding Please refer to the Catalog for policies regarding American American

Disabilities’ Act or Disabilities’ Act or

http://www.tui.edu/ASN/serv_learner_disab/default.asp for http://www.tui.edu/ASN/serv_learner_disab/default.asp for

further assistance regarding UI&U compliance with ADA.further assistance regarding UI&U compliance with ADA.

Copyright 2007-2008 Raymond E. Foster

General StuffGeneral Stuff

You must read the text and the You must read the text and the supplemental material before the supplemental material before the lecture.lecture.

Reading will enhance your ability to Reading will enhance your ability to participateparticipate

Participation will increase your grade, Participation will increase your grade, enhance not only your learning, but enhance not only your learning, but your enjoyment of the class.your enjoyment of the class.

Copyright 2007-2008 Raymond E. Foster

WebsiteWebsite

The course has one companion website. At The course has one companion website. At

that website the students will find that website the students will find hyperlinks hyperlinks

to the readings, important course to the readings, important course downloads downloads

(such as the syllabus) and hyperlinks to (such as the syllabus) and hyperlinks to

other course related multimedia other course related multimedia

presentations (such as PowerPoint presentations (such as PowerPoint

presentations, short videos, etc). presentations, short videos, etc).

Copyright 2007-2008 Raymond E. Foster

WebsiteWebsite

www.hitechcj.com/union-terrorismwww.hitechcj.com/union-terrorism

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Scroll Down

Copyright 2007-2008 Raymond E. Foster

Scroll Up

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Your UsernameYour Username

First Initial, Last Name, (location), First Initial, Last Name, (location), (Course)(Course)

rfosterbrea410rfosterbrea410 rfosterarcadia304rfosterarcadia304 rfostertwintowers410rfostertwintowers410

Copyright 2007-2008 Raymond E. Foster

Copyright 2007-2008 Raymond E. Foster

Who Are you?Who Are you?

NameName AgencyAgency Terrorism experienceTerrorism experience Reason for returning to universityReason for returning to university I have always been ………………I have always been ……………… I have always wanted to …………I have always wanted to …………