16
1 School of Policy, Government, and International Affairs PUBP 710 Professor James Pfiffner Spring 2015 [email protected] Special Topics Course 524 Founders Hall Ethics, the Constitution, and National Security Room: FH TBA This course will examine a range of public policy issues concerning national security. It is not a comprehensive course on national security, nor is it a course on ethics, nor is it a course on the Constitution. Its focus rather, is the intersection of these concerns in specific areas of controversy in contemporary US national security policy. Each of the topics considered here is the subject of strongly differing opinions and the course is based on the premise that reasonable people can disagree about them. Most of the issues concern genuine dilemmas in which there is no clear answer, and tradeoffs must be made among competing values. The purpose of the course is to explore the ethical and constitutional dimensions of controversial public policies and to illuminate the range of options open to policy makers. Learning Outcomes Students having taken this course will be able to: distinguish opinions from arguments; articulate opposing views on enduring national security issues; be sensitive to the ethical issues involved in current US national security policy; be aware of the constitutional implications of the national security policy process; make sophisticated judgments about ethical and constitutional issues in national security. Texts Most reading assignments will be available on line or will be provided by the instructor. Topical Outline of the Course 1. Introduction and Overview 2. Ethical Fundamentals 3. Constitutional Fundamentals. 4. The war in Vietnam 5. President, Congress, and War Powers 6. Presidential Lies and National Security 7. The U.S. Decision to Invade Iraq 8. Interrogation and intelligence 9. Unmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military Civil Military Relations 12. The inherent ambiguity of Intelligence 13. Contractors or Mercenaries? 14. The Military-Industrial-Intelligence Complex

School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

1

School of Policy, Government, and International Affairs

PUBP 710 Professor James Pfiffner

Spring 2015 [email protected]

Special Topics Course 524 Founders Hall

Ethics, the Constitution, and National Security Room: FH TBA

This course will examine a range of public policy issues concerning national security. It is not a

comprehensive course on national security, nor is it a course on ethics, nor is it a course on the

Constitution. Its focus rather, is the intersection of these concerns in specific areas of controversy

in contemporary US national security policy. Each of the topics considered here is the subject of

strongly differing opinions and the course is based on the premise that reasonable people can

disagree about them. Most of the issues concern genuine dilemmas in which there is no clear

answer, and tradeoffs must be made among competing values. The purpose of the course is to

explore the ethical and constitutional dimensions of controversial public policies and to

illuminate the range of options open to policy makers.

Learning Outcomes

Students having taken this course will be able to:

distinguish opinions from arguments;

articulate opposing views on enduring national security issues;

be sensitive to the ethical issues involved in current US national security policy;

be aware of the constitutional implications of the national security policy process;

make sophisticated judgments about ethical and constitutional issues in national security.

Texts

Most reading assignments will be available on line or will be provided by the instructor.

Topical Outline of the Course

1. Introduction and Overview

2. Ethical Fundamentals

3. Constitutional Fundamentals.

4. The war in Vietnam

5. President, Congress, and War Powers

6. Presidential Lies and National Security

7. The U.S. Decision to Invade Iraq

8. Interrogation and intelligence

9. Unmanned Areal Vehicles (Drones)

10. National Security Agency and Surveillance of Americans

11. Civilian Control of the Military – Civil Military Relations

12. The inherent ambiguity of Intelligence

13. Contractors or Mercenaries?

14. The Military-Industrial-Intelligence Complex

Page 2: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

2

Teaching Assistant: Ms. Jennifer Smith-Heys, Public Policy PhD student

Course Evaluation

20% Analytical Book Review (Due March 26) [February 26]

10% Oral presentation of book review

15% Class participation

15% Midterm Quiz (based on course readings, March 4)

15% Final Quiz (based on course readings, April 30)

25% Research Paper (due April 30)

Written Assignments

1) Critical book review from attached list (4-5 pages).

2) Research paper due at the last class period. (8-10 pages).

Each of these assignments is explained later in the syllabus.

Class discussions are essential to the whole course, and it is expected that all students will be

present at all classes. If for some extraordinary reason, you cannot attend a class, you must

inform me before the class and write a 500 word critical summary of the readings assigned for

the week. The summary is due before the next class period.

Class participation With respect to class participation: I expect that all students will have read the weekly assignments and actively contribute to class discussions. Your comments should reflect your judgments about the assigned readings, rather than your person intuition or opinions. Opinions are fine, but they should be backed up by reasons and evidence (e.g. what the readings say and your judgments about them). Your comments should be cogent and lead to responses or observations from other students. Common courtesy is expected; no one should take offence if there are disagreements, as long as they are expressed with respect and civility. Criteria for evaluating class contributions are specified later in the syllabus.

Classroom Courtesy

Class discussions and deliberations are central to the course; paying attention to the comments of

others is essential to learning and contributing to discussion. The ability to engage others with

whom you disagree is central to this course. Treating colleagues with respect, civility, and

courtesy is essential

Use of electronic devices in class is not permitted. The main purpose of this graduate course is

to engage with the ideas of other colleagues, the instructor, and the texts. Engaging with ideas

cannot be done effectively with the distraction of laptops or other electronic devices.

Surreptitious use of cell phones, etc. will negatively affect your grade for class participation.

Page 3: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

3

Outline of the Course and Assignments

1. Introduction and Overview of the Course

(January 22)

Assignment:

Read the syllabus for the course.

Pfiffner, “Why Study Ethics?” foreword to Steven G. Koven, Public Sector Ethics:

Theory and Application (NY: Taylor and Francis, 2015).

Mary Manjikian, “When Government Tells Professors What Not to Teach,”

Chronicle of Higher Education (February 3, 2014)

American Bar Association, “The Rule of Law.” [no publication date]

Pfiffner, “The Rule of Law,” excerpt from Power Play.

Amy Zegart, “The Shortsighted Presidency,” Foreign Policy (February 14, 2014)

2. Ethical Fundamentals

(January 29)

Assignment:

Professional Curriculum Vitae due in class to be turned in.

Mark N. Jensen, “Hard Moal Choices in the Military,” Journal of Military Ethics,

Vol. 12, No. 4 (2013), pp. 342-355. [changed from final syllabus]

Alexander Moseley, “Just War Theory,” Internet Encyclopedia of Philosophy, pp. 1-12.

Machiavelli, The Prince (1532), Ch. 15-18, 21, 23 (excerpts). Barak Obama, “Nobel Peace Prize Acceptance Remarks,” (9 October 2009).

Martha Minnow, “Living Up to Rules: Holding Soldiers Responsible for Abusive

Conduct and the Dilemma of the Superior Orders Defense,” McGill Law Journal,

Vol. 52 (2007), pp. 1-25; 30-33.

James Comey, “Intelligence Under the Law,” Green Bag, Vol. 10, 2D, pp. 439-444.

3. Constitutional Fundamentals

(February 5)

Assignment:

Constitution of the United States, Article I and II.

Alexander Hamilton, Federalist Papers, Nos. 69, 70.

James Madison, Federalist Papers, No. 51.

Supreme Court Cases (excerpts):

Curtis Wright, 1939: Louis Fisher, “Judicial Errors That Magnify Presidential

Power,” The Federal Lawyer (Jan/Feb 2014).

Korematsu v. United States, 323US214, (1944) [summary].

Youngstown v. Sawyer 343US579 (1952) “Steele Seizure” Case,

Syllabus, pp. 1-2; Justice Jackson concurring opinion, pp. 6-14.

Bruce Fein and Louis Fisher, “Institutional Powers of Congress,” pp. 1-4, 7-14, 25-27.

Pfiffner, Power Play: The Bush Presidency and the Constitution (Brookings 2008)

Ch. 4, “The American Constitution,” pp. 10-18 (of manuscript).

Jay S. Bybee, “Memorandum for Alberto R. Gonzales, Counsel to the President,”

Page 4: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

4

(August 1, 2002), pp. 36-39.

Case Study: The Iran Contra Affair

Iran Contra summary, Pfiffner, The Modern Presidency, pp. 1-3.

Iran Contra, Majority (pp. 1-7) and Minority Reports )pp. 1-3.

4. The War in Vietnam

(February 12)

Assignment:

Irving Janis, “Groupthink,” in Sanctions for Evil, eds. Nevitt Sanford and Craig

Comstock (SF, CA: Jossey-Bass, 1972), pp. 71-89.

James C. Thomson, Jr., “How Could Vietnam Happen: An Autopsy,”

The Atlantic (April 1968), pp. 1-10 (pp. 47-53 in The Atlantic).

Fred I. Greenstein and John P. Burke, “The Dynamics of Presidential Reality Testing:

Evidence from Two Vietnam Decisions,” Political Science Quarterly (Winter

1989-90), pp. 557-580.

Film: Fog of War

Case Study: My Lai Massacre

History Learning Site, “My Lai Massacre”

U.S. Army, “My-Lai,” training exercise.

5. President, Congress, and War Powers

(February 19)

Assignment:

War Powers Resolution, 1973, text.

Senator Timothy Kaine, “War Powers Consultation Act,” remarks (Jan. 16, 2014).

Andrew Rudalevige, “War Powers” Libya and Syria, (May 26, 2014).

Shoon Murray, “Stretching the AUMF,” Presidential Studies Quarterly, pp. 1-16.

Matthew C. Weed, “A New Authorization for Use of Military Force Against the

Islamic State: Comparison of Current Proposals in Brief,” Congressional

Research Service (21 October 2014), pp. 1-5.

John Yoo, “The President Doesn’t Need Congress’s Approval to Attack ISIS,”

National Review online (September 11, 2014).

Jack Goldsmith, Ryan Goodman ( Steve Vladeck, “Five Principles that Should Govern

any U.S. Authorization of Force,” Washington Post (November 14, 2014).

Cases Study: Obama administration: Lybia and ISIS

Obama statement on striking ISIL in Syria, (September 23, 2014).

Louis Fisher, “Syria and the Illusion of Limited War,” pp. 1-3.

6. Presidential Lies and National Security

Critical Book Review due in class (presentations begin)

(February 26)

Assignment:

Benjamin Bradlee, “In His Own Words,” Washington Post (22 October 2014).

James P. Pfiffner, The Character Factor, (Texas A&M University Press, 2004) Ch. 2, 3.

James P. Pfiffner, “Did President Bush Mislead the country in his arguments for war with

Iraq?” in James Pfiffner and Mark Phythian, eds. Intelligence and National

Page 5: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

5

Security Policymaking on Iraq: British and American Perspectives (Manchester

University Press, 2008), pp. 59-84.

Case Study: Paul R. Camacho and William Locke Hauser, “A Response to Coletta,”

[General Shinseki’s congressional testimony on Iraq war]

Armed Forces & Society Vol. 34, No. 1 (October 2007), pp. 122-137.

background, not required: Damon Coletta, “Courage in the Service of Virtue: The Case

of General Shinseki’s Testimony before the Iraq War,” Armed Forces & Society

Vol. 34, No. 1 (October 2007), pp. 109-121).

7. The US Decision to Invade Iraq in 2002-2003

Midterm Quiz on Course Readings

(March 5)

Assignment:

President George W. Bush and Vice President Cheney, excerpts from key speeches

leading up to the war in Iraq, in Pfiffner and Phythian, pp. 247-254.

National Intelligence Estimate of 2 October 2002, “Iraq’s continuing Programs for

Weapons of Mass Destruction,“ in Pfiffner and Phythian, pp. 268-275.

Paul Pillar, “Intelligence, Policy, and the Iraq War,” in Pfiffner and Phythian,

pp. 233-243.

Robert Jervis, “The Politics and psychology of intelligence and intelligence reform,”

in Pfiffner and Phythian, pp. 162-171.

US Intelligence Professionals, “Open Letter to George Tenet,” (April 28, 2007)

in Pfiffner and Phythian, pp. 287-290.

Case Study: Martin L. Cook, “Revolt of the Generals:

A Case Study in Professional Ethics,

U.S. Strategic Studies Institute, (2008), pp. 1-11.

http://strategicstudiesinstitute.army.mil/pubs/parameters/

articles/08spring/cook

Spring Break: March 12, no class

8. Interrogation and Intelligence

Research Paper Proposal Due in Class

(March 19)

Assignment:

Jay S. Bybee, “Memorandum for Alberto R. Gonzales, Counsel to the President,”

(August 1, 2002), pp. 1-12.

Charles Krauthammer, “It’s Time to be Honest About Doing Terrible Things,”

The Weekly Standard Vol. 11, No. 12, (December 5, 2005).

Pfiffner, “Policy Making on Torture,” in Torture as Public Policy, Ch. 2, pp. 13-44.

Jose Rodriguez, author of Hard Measures (NY: Threshold Editions, 2012),

Interview with Leslie Stahl, CBS News (April 29, 2012).

John McCain, Statement on the Senate Select Committee on Intelligence Report on

Interrogation Methods (December 9, 2014).

John Yoo, “Terrorists have no Geneva Rights, WSJ,” 26 May 2004.

Page 6: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

6

Milt Bearden, “When the CIA Played by the Rules,” New York Times

(4 November 2005).

Case Study: Choose one of three to read

Pfiffner, “The Efficacy of Coercive Interrogation,” in Tracy Lightcap and James P.

Pfiffner, eds., Examining Torture: Empirical Studies of State Repression (NY:

Palgrave Macmillan, 2014), pp. 127-157.

or Senate Select Committee on Intelligence, Study of the CIA’s Detention and Interrogation

Program (December 3, 2014), Findings and Conclusions, pp. 1-19.

or

Pfiffner, “Operations: The Implementation of Policy,”

in Pfiffner, Torture as Public Policy, Ch. 3, pp. 45-82.

9. Unmanned Aerial Vehicles (armed drones)

(March 26)

Assignment:

Daniel Byman, “Why Drones Work” Foreign Affairs Vol. 92, No. 4 (2013).

Audrey Kurth Cronin, “Why Drones Fail: When Tactics Drive Strategy,” Foreign

Affairs Vol. 92, No. 44 (2013), pp. 44-54.

Scott Shane, “The Moral Case for Drones,” New York Times (July 14, 2012),

pp. 2-3 of compilation.

John Kaag and Sarah Kreps, “The Moral Hazard of Drones,” New York Times

(July 22, 2012).

Patrick Lin, “Drone-Ethics Briefing: What a Leading Robot Expert Told the CIA,”

The Atlantic (2011).

Louis Fisher, “What Grounds Secrecy?” National Law Journal (January 21, 2013).

John P. Abizaid and Rosa Brooks, Recommendations and Report of the Task Force

on US Drone Policy, (Washington: Stimson Center, June 2014), pp. 9-15.

Micah Zenko, Reforming U.S. Drone Strike Policies, Council on Foreign Relations,

Report No. 65 (January 2013), pp. 6-17.

Case study: Robots and Autonomous Weapons Systems

Wendell Wallach, “Terminating the Terminator: What to do About Autonomous

Weapons,” http://scienceprogress.org/2013/01/terminating-the-terminator-what-

to-do-about-autonomous-weapons/

10. The National Security Agency and surveillance of Americans

(April 2)

Assignment:

U.S. Senate Select Committee on Intelligence Activities Within the United States (Church

Committee Report) 1975, reprinted by Red and Black Publishers (St. Petersburg,

Florida, 2007), pp. 11-14, 22-24, 120-125.

Bruce Fein and Louis Fisher, “Institutional Powers of Congress,” pp. 17-20.

Ryan Lizza, “Why won’t the President rein in the intelligence community?”

New Yorker (December 16, 2013).

John Napier Tye, “Meet Executive Order 12333: The Reagan Rule that lets the NSA

spy on Americans,” Washington Post, July 18, 2014).

Page 7: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

7

David Cole, “Can Privacy Be Saved?” New York Review of Books

(March 6, 2014).

Senator Diane Feinstein, “Reform of FISA Programs,” Washington Post (July 30, 2013).

Case study: Edward Snowden

David Cole, “The Three Leaders and What to Do About Them,”

David Cole, New York Review of Books (Feb. 6, 2014).

Alan Rusbridger and Ewen MacAskill, “Interview with Edward Snowden,” The

Guardian (18 July 2014).

Video: United States of Secrets: The Inside Story of the Government’s Mass Surveillance Program, PBS Frontline (May 13, 2014), min. 26-152. http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#united- states-of-secrets-%28part-one%29

Recommended:

Office of the Inspector General of the National Security Agency, Central Security Service,

Working Draft ST-09-0002 (24 March 2009), classified TOPREFORM,

SECRET//STLW//COMINT/ORCON/NOFORN, pp. 3-8.

http://www.scribd.com/doc/162439434/090324-Draft-NSA-IG-Report-Working-Draft-

Office-Of-The-Inspector-General-NSA-24-March-2009.

President’s Review Group, “Liberty and Security in a Changing World,”

“Report and Recommendations of the President’s Review Group on Intelligence and

Communications Technology,” (12 December 2013), pp. 24-42, 69-77.

Privacy and Civil Liberties Oversight Board, “Report on the Telephone Records Program

Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the

Foreign Intelligence Surveillance Court, (Washington January 23, 2014), pp. 8-13.

Privacy and Civil Liberties Oversight Board, “Report on the Surveillance Program Operated

Pursuant to Section 702 of the Foreign Intelligence Surveillance Act,” (Washington,

July 2, 2014), pp. 1-11.

Pfiffner, “Presidents Bush, Obama and the Surveillance of Americans,” (book chapter).

11. Civilian Control of the Military: civil military relations

(April 9)

Assignment:

Janine Davidson, “Civil-Military Friction and Presidential Decision Making:

Explaining the Broken Dialogue,” Presidential Studies Quarterly, Vol. 43, No.

1 (March 2013), pp. 129-145.

Martin E. Dempsy, Letter to Senator Carl Levin on possible U.S. intervention in Syria

(19 July 2013).

Bush and the Generals. By: Desch, Michael C., Foreign Affairs, Vol. 86, No. 3 (May/Jun2007).

Myers, Richard B., and Richard H. Kohn. “The Military’s Place.” Foreign Affairs 86, no.

5 (September-October 2007): 147-9. (reaction to Desch)

Owens, Mackubin Thomas. “Failure’s Many Fathers.” Foreign Affairs 86, no. 5

(September-October 2007): 149-52. (second reaction to Desch)

Korb, Lawrence J. “Political Generals.” Foreign Affairs 86, no. 5 (September-October

2007): 152-153 (third reaction to Desch).

Page 8: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

8

Desch, Michael C. “Desch Replies.” Foreign Affairs 86, no. 5 (September-October

2007): 153-6.

Recommended:

James Fallows, “The Tragedy of the American Military,” The Atlantic (Jan/Feb) 2015).

12. The Inherent Ambiguity of Intelligence

(April 16)

Assignment:

Robert Jervis, “Why Intelligence and Policymakers Clash,” Political Science

Quarterly, Vol. 125, No. 2 (2010), pp. 185-204).

Pfiffner, “U.S. Blunders in Iraq: De-Baathification and Disbanding the Army,”

Intelligence and National Security Vol. 25, No. 1 (February 2010), pp. 76-85.

Michael Hayden, “The State of the Craft: Is Intelligence Reform Working?,”

World Affairs Journal (September October 2010).

Amy B. Zegart, “The Domestic Politics of Irrational Intelligence Oversight,”

Political Science Quarterly Vol. 26, No. 1 (2011).

Case Study: Benghazi

House Permanent Select Committee on Intelligence,

“HPSCI January 2014 Update on Benghazi.”

Rep. Mike Rogers, “The House Intelligence Committee’s report on Behghazi,”

The Hill (December 1, 2014).

Elias Groll, “Why No One Will Ever Be Blamed for Benghazi,” Foreign Policy

(January 15, 2014)

13. Contractors or Mercenaries?

(April 23)

Assignment:

Peter W. Singer, “Can’t Win With ‘Em, Can’t Go To War Without ‘Em: Private Military

Contractors and Counterinsurgency,” (Washington: Brookings, 2007), pp. 1-18.

Avant, Deborah D. “Contracting for Services in U.S. Military Operations.” PS: Political

Science and Politics 40, no. 2 (July 2007): 457-460.

Case Study: Blackwater in Iraq

James Risen, “Before Shooting in Iraq, a Warning on Blackwater,”

New York Times (June 29, 2014), pp. 1-5

Singer, P.W. “The Dark Truth about Blackwater,” Salon.com, 2 October 2007, pp. 1-13.

http://www.salon.com/2007/10/02/blackwater_4/ .

14. The Military/Industrial/Intelligence Complex

Second Quiz on Course Readings

(April 30)

Assignment:

President Dwight Eisenhower, “Military Industrial Complex Speech”

Public Papers of the Presidents, 1960, pp. 1035-1040.

Dana Priest and William M. Arkin, “Top Secret America: A hidden world, growing

beyond control,” Washington Post

Page 9: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

9

http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-

world-growing-beyond-control/

Lawrence Wilkerson, interview, “The Military Industrial Congressional Complex,”

(September 28, 2012).

http://www.corporatecrimereporter.com/news/200/lawrencewilkerson09282012.

Congressional Research Service, Amy Belasco, “The Cost of Iraq, Afghanistan, and

Other Global War on Terror Operations Since 9/11,” (December 8, 2014).

Hartung, William D. “The Military-Industrial Complex Revisited: Shifting Patterns of

Defense Contracting in the Post-9/11 Period.” Brown University Watson Institute

for International Studies, Costs of War Project, 14 June 2011.

http://costsofwar.org/sites/default/files/articles/40/attachments/HartungMilitaryIn

dustrialComplex.pdf

Recommended:

Dunlap, Charles J., Jr. “The Military-Industrial Complex.” Daedalus 140, no. 3 (Summer

2011): 135-47.

Grading Policy

For purposes of this course, the grades of A or A- are reserved for sustained excellence and outstanding performance that goes well beyond the minimal requirements of the course, both in written assignments and class participation. The grades of B and B+ are used to denote mastery of the material and very good performance in all aspects of the course. The grade of B- denotes marginal quality work that is not quite up to graduate level standards even though the minimal requirements of the course are met. The grade of C denotes work that is not acceptable at the graduate level. The grade of F denotes the failure to perform adequately on course assignments. In short, B means good; B+ means very good; A- means excellent; and A means outstanding. Evaluation of papers will reflect the overall adequacy and excellence of the communication, not merely evaluative comments that I make in the margins of the paper. Marginal comments on papers are meant to be helpful indicators for improvement, not full explanations of the grade. Attendance in class is required and will be taken into account in evaluation for the course. While it is possible that the requirements of full time jobs may occasionally conflict with class times, missing more than two class sessions will make it virtually impossible to earn a grade higher than B for the course. Missing more than three sessions will make a grade of C likely. If you must miss a class, notify me in advance. For any missed classes, students must submit a 500 word critical summary (two double spaced pages) of the assigned readings. Critical does not mean a negative evaluation, but rather an analysis or evaluation of the readings.

Page 10: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

10

Evaluation of Class Participation: A- A

Without these people, the quality of discussion would be diminished markedly. --Frequent contributor in seminar discussions each week. Active and engaged. Has great self-awareness and does not ramble or consistently dominate the room. --Comments grounded in the readings and demonstrate depth of understanding or attempts to grapple with them; ideas help to build momentum in discussions. Knowledge displayed indicates a wider range of reading than simply the assigned texts or articles. -- Never misses a seminar and is always courteous to other seminar participants.

B- B B+

Without these people, the quality of discussion would be diminished. --Consistent commenter each week in seminar, but some runs of silence or inactivity occasionally detectable. Active and engaged but occasionally may lack good self-awareness. --Comments are helpful and draw upon readings, but less consistently so and occasionally may be more grounded in intuition or personal experience. --Attends every seminar and is always courteous to other seminar participants.

C- C C+

Without these people, the quality of seminar discussion would be occasionally (but not frequently) diminished. --Infrequent participant each week in seminar, but may engage sporadically. May have inconsistent self-awareness. --Comments may be but not necessarily grounded in the readings; more reliant on intuition or personal experience (e.g., perhaps an excellent readings comment one day, but then a run of days with less substantive or relevant ones). --Perhaps one absence, but is always courteous to other seminar participants.*

*adapted from the syllabus of Professor Lawrence Wilkerson, College of William & Mary.

Email Communication Course notices and changes to the syllabus or assignments will be sent to students’ GMU e-mail addresses. So even if you do not regularly use your GMU e-mail account, be sure to open it and place a forwarding address to the account you use regularly so that you can get GMU, SPP, and class announcements. Also, be sure to empty your account regularly, because if you do not and it exceeds the limit, you will not receive incoming e-mail until you have cleared space. Deleting forwarded e-mail messages does not delete them from your GMU account. Writing assignments: 1. Analytical book review to be presented in class (4-5 pages, including footnotes). 2. Research paper, (8-10 pp., including footnotes); relate ideas in course to a chosen public policy issue. All papers must be double spaced, with 12 point font on 8½ X 11 inch paper and stapled in the top left corner. Do not put papers in any special cover. They must be submitted in both hard copy and electronic form (to my email address) so that they can be checked against a plagiarism database.

Page 11: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

11

You may not turn in any paper that was written for another course or for any other purpose. The papers must be written specifically for this course. Use the standard Chicago Style Manual type of citations for footnotes or “Turabian,” NOT

the APA or APSA style, in which names in parentheses refer to a list of references at the

end of the paper. For examples of the required reference style, see the endnotes in The

Character Factor or the explanation and examples later in this syllabus.

Use footnotes rather than endnotes.

In evaluating papers, degree-of-difficulty will be considered. Just as a perfectly executed swan

dive may not receive as high a score as a slightly flawed full gainer with a twist, a paper that

engages a difficult question or takes a creative approach to a public policy issue will receive

more credit than a paper that takes a relatively straight-forward issue and addresses it in a

competent, though pedestrian, manner. Analytical Book Review (4-5 pages): Each student must write an analytical review of one book from the list provided for this course. No duplicates, first choices will be honored. You may propose a book that is not on the list to review, but it must be a substantial book that takes an in-depth view of the topic, and it must be approved by the instructor. The review must be critical in the sense of comparing the ideas or arguments of the author with other (particularly opposing) perspectives, many of which we will be reading during the course of the semester. The review will be no more than six pages long (12 point font). It should be footnoted, referring to specific pages in the book and other sources; and it must include at least three citations to scholarship assigned in the course. The reviews are due in class on February 26. After February 26, each student will make an oral presentation to the class and conduct a discussion of the book. Approximately 10 minutes will be allotted to each presenter. The final paper for the class may use the book reviewed, but it cannot be the main focus of the paper. The papers will be graded as well as the oral presentation of the paper and conduct of the discussion. Research Paper (8-10 pages): Each student must choose a policy topic central to the concerns of this course. Analyze the policy by examining its origins and explaining its implementation. Place particular emphasis on analyzing opposing arguments about the constitutional or ethical dimensions of the policy. Your paper must reflect an extensive familiarity with the scholarly literature on your topic, demonstrated by citations of scholarship and analysis well beyond the

Page 12: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

12

course assignments. In addition, you must cite at least five sources that are assigned in this course. Use the citations, references, and bibliographies in the assigned readings to find further sources for your research. Paper topics must be approved by the instructor. A one page proposal, including description of the topic and several scholarly sources, is due in class on March 19.

Scholarly sources include: articles in peer-reviewed scholarly journals scholarly books (e.g. books that use footnotes or endnotes) papers from think tanks (e.g. Urban Institute, Brookings, Heritage, AEI, etc.) reports of governmental organizations (e.g. CRS, CBO, OMB, GAO, departments, etc.)

Office Hours:

Mondays: 10am to noon.

Tuesdays: 1 to 3pm

Thursdays: 3 to 5pm

Office: 524 Founders Hall; Phone: 703-993-1417; e-mail: [email protected]

I am in my Founders Hall office most days every week, and I am always available via email.

You do not have to come to see me during my office hours; just write to set up an appointment,

and we will set up a convenient appointment. Please put PUBP 710 in the subject line of your

email, so I will be sure not to miss it.

Analytical Writing For purposes of scholarly writing it is important to write analytically. Analytic writing is more than merely describing what others have said or describing institutions of government or public policy making (though description is often an essential aspect of analysis). Analysis involves more. In analysis you are asking and answering questions about the causes and consequences

of whatever you are examining. You are seeking explanations for behavior. You are developing categories and frameworks that will help us understand political

behavior and generalize insights from one case to other cases. Ask the question: Of what is this an instance? When analyzing scholarly writing: Engage different ideas. Show how they differ and where they agree. Compare and contrast. Contrast different methods of understanding a phenomenon. What different types of evidence are adduced to make a point?

Page 13: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

13

Contrast different perspectives or approaches to a topic. Judge whether the reasoning is valid. Does the author’s evidence support the conclusion of the article? In Writing an Paper, Remember: The introduction should say what the paper is about and how you will approach the topic. The paper should address one central question and have a thesis. The paper should be organized logically, with an evident structure. The reader should be told how each part of the paper is related to the other parts.. Use subheadings to label different sections (except for very short papers). Outline your paper after it is written to see if it flows logically. Proofread your paper for spelling and syntax. Be sure to cite all of your sources and use quotation marks when you use another's words.

Plagiarism is using another’s words or ideas without giving proper credit. Plagiarism is a major scholarly sin; it is unethical, dishonest, and deceptive, and it has ended some people’s careers. It can easily be avoided by giving credit where credit is due. If you use more than three word of another author, cite the quote.

Hints on Grammar The singular possessive is formed by adding an ‘s (e.g. one president’s term was cut short), the plural by s’ (e.g. both presidents’ terms were cut short). The possessive for it is “its”: its = possessive; in contrast, “it’s” is a contraction for “it is.” If you cannot remember the rule for its, do not use an apostrophe and you will be correct. (That is, use “it is” rather than a contraction and its for the possessive.) Lead is in your pencil, but led is the past tense of the verb to lead. Effect is a noun and affect is a verb, almost always; if you do not know the exceptions, do not violate this rule of thumb. Cite is short for citation, site is a place (or web location), sight refers to eyes. Horses have reins, monarchs reign over countries, and rain falls from the sky: e.g. It often

rains in London, where the Queen reigns, but the Prime Minister holds the reins of power in Parliament.

From William Strunk and E.B. White’’s classic, The Elements of Style (NY: Macmillan, 1979), table of contents: “Place a comma before a conjunction introducing an independent clause.” “Do not join independent clauses by a comma” (use a semicolon or a period). “The number of the subject determines the number of the verb.” “Use the active voice.” “Omit needless words.” “Make the paragraph the unit of composition.” “Revise and rewrite.”

Citations for Research Papers The purposes of scholarly citations are several:

Page 14: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

14

1) To show the source for a direct quote or fact not commonly known. 2) To give credit for an idea to the author of a work 3) To show the reader that you are familiar with other scholarship on your topic or to

indicate where further information or analysis can be found. 4) You may also use endnotes to explain something in the text or comment on the source.

The intention is to give readers enough information to find the source you are using so that they can see if you have quoted it correctly, interpreted it soundly, done justice to the author cited, or so they can do further research on the topic in question themselves.

Format: use the standard Chicago Manual of Style format, also known as “Turabian.” (Chicago: University of Chicago Press, most recent edition.) Books: author, title (place of publication: publisher, date), page number(s). [Titles of books should be in italics.] Example: 1. John Kingdon, Agendas, Alternatives, and Public Policies, 2nd ed. (New York: HarperCollins, 1995). After the first full citation, you may use a shortened version: e.g. 2. Kingdon, Agendas, Alternatives, and Public Policies, page number(s). Articles: author, title, name of journal (volume, number), page number(s). [Titles of articles should be enclosed in quotation marks, names of journals in italics.] Example: 1. Theodore J. Lowi, “The State in Political Science: How We Become What We Study,” American Political Science Review Vol. 86, No. 1 (1992), pp. 1-7. After first full citation, you may use a shortened version: 2. Lowi, “The State in Political Science,” p. 3. Chapters in edited Books:

author of chapter (or article), title of chapter (in quotes), “in” editor of book, title of book (place and date of publication), page numbers.

Example: Hugh Heclo, “The Changing Presidential Office,” in James P. Pfiffner, ed. The

Managerial Presidency (College Station, TX: Texas A&M University Press, 1999), pp. 23-36

Web Site Citations: In addition to author, title, etc, include the following information: Who put up the site, full URL, date of access. Number endnotes consecutively for the whole paper, with each note referring to the number in the text with the number in superscript or parentheses. Endnote numbers should be placed at the end of the sentence containing the information being cited. A bibliography of all the sources used in the paper along with other useful sources may be useful or required. Do not use more than one footnote number per sentence (even if Wiki does). If you are referencing more than one source, combine them in one footnote.

Page 15: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

15

SPGIA Policy on Plagiarism

The profession of scholarship and the intellectual life of a university as well as the field of public policy inquiry depend fundamentally on a foundation of trust. Thus any act of plagiarism strikes at the heart of the meaning of the university and the purpose of the School of Policy, Government, and International Affairs. It constitutes a serious breach of professional ethics and it is unacceptable. Plagiarism is the use of another’s words or ideas presented as one’s own. It includes, among other things, the use of specific words, ideas, or frameworks that are the product of another’s work. Honesty and thoroughness in citing sources is essential to professional accountability and personal responsibility. Appropriate citation is necessary so that arguments, evidence, and claims can be critically examined. Plagiarism is wrong because of the injustice it does to the person whose ideas are stolen. But it is also wrong because it constitutes lying to one’s professional colleagues. From a prudential perspective, it is shortsighted and self-defeating, and it can ruin a professional career. The faculty of the School of Policy, Government, and International Affairs takes plagiarism seriously and has adopted a zero tolerance policy. Any plagiarized assignment will receive an automatic grade of “F.” This may lead to failure for the course, resulting in dismissal from the University. This dismissal will be noted on the student’s transcript. For foreign students who are on a university-sponsored visa (e.g., F-1, J-1 or J-2), dismissal also results in the revocation of their visa. To help enforce the SPGIA policy on plagiarism, all written work submitted in partial fulfillment of course or degree requirements must be available in electronic form so that it can be compared with electronic databases, as well as submitted to commercial services to which the School subscribes. Faculty may at any time submit student’s work without prior permission from the student. Individual instructors may require that written work be submitted in electronic as well as printed form. The SPGIA policy on plagiarism is supplementary to the George Mason University Honor Code; it is not intended to replace it or substitute for it. (http://www.gmu.edu/facstaff/handbook/aD.html)

Academic Accommodation for a Disability: If you are a student with a disability and you need

academic accommodations, please see me and contact the Disability Resource Center (DRC) at

703-993-2474. All academic accommodations must be arranged through the DRC before the

beginning of the semester.

Jennifer Smith-Heys has served in the U.S. Army for 23 years, enlisting as a Russian interpreter

and currently serving as a Strategic Intelligence Officer. Her most recent assignments include

the Defense Intelligence Agency (DIA), the National Geospatial-Intelligence Agency (NGA),

Page 16: School of Policy, Government, and International AffairsUnmanned Areal Vehicles (Drones) 10. National Security Agency and Surveillance of Americans 11. Civilian Control of the Military

16

and International Security Assistance Force's (ISAF) Joint Command (Afghanistan). Jennifer is

the 2012 U.S. Army Strategic Intelligence Professorship Awardee; she is slated to teach at the

National Intelligence University (NIU) upon completion of her Ph.D. in Public Policy.

James P. Pfiffner is University Professor in the School of Policy, Government, and International

Affairs at George Mason University. His major areas of expertise are the U.S. Presidency,

American National Government, the national security policymaking process, and public

management. He has written or edited fifteen books on the presidency and American National

Government, including The Strategic Presidency: Hitting the Ground Running and Power Play:

The Bush Administration and the Constitution. He has also published more than 100 articles and

chapters in books, scholarly journals, reference works, and the popular press. While serving with

the 25th Infantry Division (1/8 Artillery) in 1970 he received the Army Commendation Medal

for Valor in Vietnam and Cambodia.