SlideShare a Scribd company logo
1 of 25
National Security Issues
& Terrorism
SCTY 488
Overview
   Presented By Jim Bounds
Instructor – Jim Bounds
Background
Currently work as an Operational Assessment Analyst, determining the combat
effectiveness of Counter Improvised Explosive Device (C-IED) training, and
Operational Level of War (OLW) Assessments for the Department of the Navy.
Retired Navy Commander with over 28 years operational military/civilian experience
in aviation and security arenas.
I’ve logged over 3,600 hours of flight time from ships at sea and ashore locations
world-wide in helicopters and fixed wing aircraft.

•Deputy Director Maritime Homeland Defense/Security to U.S. THIRD Fleet
•Director of Safety, Security and Emergency Manager
•Director of Aviation Safety, Naval Air Reserve Force
•Navy Flight Instructor and Check Pilot

Education
Master of Science, Homeland Security & Safety Engineering, (2006)
Bachelor of Science, Management (1984)
Completing a MS in Aeronautical Science at ERAU (Present)
SCTY 488 Course Description
• Although terrorism has been a known phenomenon for centuries, it
  has become the most frequent form of conflict in the late 20th
  century.
• Success in preventing nuclear warfare and in curbing the outbreak
  of most conventional war has resulted in more forms of low
  intensity violence, a significant feature of which is overt terrorism.
  Ideological hardening, ethnic militancy, and religious revivalism have
  fueled terrorist ambitions.
• Broadly speaking, there are three types of terrorism, classified on
  the basis of actors. The course will address all three types:
  • Domestic US
  • International or group directed
  • State sponsored
SCTY 488 Course Goals
• Required for students pursuing a minor in Security &
  Intelligence

• Evaluate the cause, capabilities, limitations, implications,
  and future of terrorist threats, as well as anti- and counter-
  terrorist law enforcement/intelligence community
  responses

• Examine the following questions:
  •   How and why terrorism has re-emerged
  •   What are its implications for political and military institutions
  •   What capabilities and limitations bear on combating this threat
  •   What the future portends for national societies and global stability
SCTY 488 Learning Outcomes
1. Examine and interpret the basic definitions of terrorism, including
   domestic terrorism, special interest terrorism, foreign and
   international terrorism.
2. Interpret and analyze the criminological and “war on terrorism”
   aspects of terrorism and the positive and negative aspects of
   treating it as a criminal justice problem or a war on terrorism.
3. Assess and critique group organizational structures of terrorism; to
   include the relationship between size and effectiveness, the
   management problems, financing and the concept of leaderless
   resistance.
4. To critique the basic aspects of religion and terror as was exhibited
   between Ireland and the United Kingdom and with radical Islam
   and attacks on western society.
5. Chart and explain the origins of modern terrorism from the French
   & American revolutions to the Bolshevik Revolution in Russian in
   1917.
SCTY 488 Learning Outcomes
6. Differentiate between the development of religious and historical
    conflicts in the Middle East and the historical role of terrorism in
    the area.
7. Analyze the theories that were put into use by a Uruguayan
    terrorist group called the Tupamaros and how this Latin American
    influence has dominated the world of terrorism for the past fifty
    years.
8. Evaluate Middle Eastern Terrorism and the directions of
    revolutionary Islam and the spread of terrorism.
9. Categorize and interpret terrorism from the left and the right wing
    perspective.
10. Conceptualize and analyze technological terrorism and weapons of
    mass destruction and appropriate counterterrorism responses to
    such attacks.
11. Assess the issues surrounding terrorism and the impact of the
    media on the public.
Terrorism & Homeland
                  Security
White, J. R. (2012). Terrorism and homeland
security: An introduction (7th ed.). Belmont, CA:
Wadsworth Publishing.
ISBN: 0495913367

Jonathan R. White
•A national expert on the topic of terrorism--is
executive director of the Homeland Security
Initiative.
•Served as dean of Social Sciences at Grand
Valley State University
•Instructed on terrorism, militarism, criminology,
police administration, philosophy, and justice in
Western civilization
•Adjunct instructor with the State and Local Anti-
Terrorism Training (SLATT) Program
•Recognized expert on Middle Eastern
extremism and used his knowledge to develop
and strengthen the SLATT program on
international terrorism
Course Paper (30% of your course grade):
• National Security & Terrorism theme
• 8-10 pages of content using APA 6th Edition standards
• College level writing, don't forget the basics; spelling, grammar, and
  format
• Course Papers due on the 8th week (shown on the Course Schedule)
  The paper must be turned in before you will be allowed to take the
  final examination
• All papers/projects submitted for grading in this course will be
  submitted to safeassign.com - http://www.safeassign.com/.
• A paper/project that is turned in late will be downgraded 5 for each
  week the paper is late. (One day, -1; two days; -2; and three days
  through seven days, -3.5.)
• This paper is worth 30% and presentation 20% of your final grade
Jack R. Hunt Library
The Jack R. Hunt Library, located on the Daytona Beach
  Campus, is the primary library for all Worldwide Campus
  students.
Web: http://library.erau.edu
Phone: (800) 678-9428 (ext. 6947) or (386) 226-7656 (Voicemail
  is available after hours)
Hours: Monday - Friday, 8:00 a.m. - 5:00 p.m. EST, Email:
  Hunt.Library@erau.edu
EAGLET & ERAU Writing
Rubric
• Electronic, Access to Grammar, Language, and
  Essay Tutoring
• ERAU Writing Rubric
  • Organization
  • Language Style
  • Research and Citation’s
Participation &
Assignments:
• All assignments will be completed in a
  professional manner & on time, unless prior
  arrangements have been made
• This course includes weekly activities, each of
  which may have grade points associated with
  them
• 20% of your grade is based on participation
• Unless prior arrangements have been made with
  the instructor, you are expected to attend &
  participate each week
• If absent, make-up assignments will be required
Course Policies:
Embry-Riddle is committed to maintaining and upholding intellectual integrity. All
students, faculty, and staff have obligations to prevent violations of academic integrity
and take corrective action when they occur. The adjudication process will include the
sanction imposed on students who commit the following academic violations, which may
include a failing grade on the assignment, a failing grade for the course, suspension, or
dismissal from the University:

1.Plagiarism: Presenting as one’s own the ideas, words, or products of another.
Plagiarism includes use of any source to complete academic assignments without proper
acknowledgement of the source. All papers submitted for grading in this course will be
submitted to safeassign.com - http://www.safeassign.com/ where the text of the paper
is compared against information contained in the safeassign.com database. Papers
submitted will be included in the safeassign.com database and become source
documents for the purpose of detecting plagiarism.
2.Cheating: A broad term that includes the following:
        a)    Giving or receiving help from unauthorized persons or materials during
              examinations.
        b)    The unauthorized communication of examination questions prior to, during, or
              following administration of the examination.
        c)    Collaboration on examinations or assignments expected to be individual work.
        d)    Fraud and deceit, that include knowingly furnishing false or misleading information
              or failing to furnish appropriate information when requested, such as when applying
              for admission to the University.
3.APA 6 is the ERAU Worldwide standard for all research projects.
SCTY 488 Course Schedule:
     Date                  Topic/prep               Learning           Assignments
                                                    Outcome(s)

Session 1   Course Overview & Requirements         1, 2, 3, 4, 5, Intel Brief Demo
XX Aug                                             6, 7, 11       Read Chap 1-5
            Chap 1 Terrorism Defined
            Chap 2: The Social Underpinnings
            Chap 3: The Organization & Financing
            Chap 4: The Media
            Chap 5 Gender Roles, Tactics & Force
            Multipliers



Session 2   Chap 6 The Roots of Modern Terrorism   1, 4, 5       Read Chapters 6, 7
XX Aug      Chap 7 Long-Term Separatist
                                                                 Class Discussions


Session 3   Chap 6 The Roots of Modern Terrorism   4, 5          Read Chapters 11
XX Aug      (cont)
                                                                 Class Discussions

                                                                 *Paper Topic Due
SCTY 488 Course Schedule:
     Date                  Topic/prep                 Learning          Assignments
                                                      Outcome(s)
Session 4   Chap 11 Revolutionary, Counter            4, 5, 6, 7   Read Chapters 9, 10
XX Aug      Revolutionary, and Religious Terrorism                 Class Discussions

            Mid Term Review                                        *Paper Outline
                                                                   References (APA) Due




Session 5   Chap 9 Background to the Middle East      6, 8         Read Chapter 12
XX Sep      Chap 10 Terrorism in Israel & Palestine
                                                                   Midterm (1-6)

                                                                   Class Discussions


Session 6   Chap 12 Al Qaeda & Jihadist Networks      8            Read Chapter 13
XX Sep
                                                                   Class Discussions

                                                                   *Paper References Due
SCTY 488 Course Schedule:
    Date                    Topic/prep             Learning         Assignments
                                                   Outcome(s)

Session 7   Chap 13 Domestic Terrorism             1, 9, 10     Read Chapters 15
XX Sep
            Presentations                                       Class Discussions

                                                                *Paper Draft Due

Session 8   Chap 15 Law Enforcement & Homeland     2, 10, 11    Read Chapters 16, 17
XX Sep      Security
                                                                End of course
            Presentations                                       Evaluation

            Final Exam Review

Session 9   Chap 16 Homeland Security &            All          *Course Paper Due
XX Oct      Constitutional Issues
            Chap 17 Security, Terrorism, and the                Final exam
            Future

            Presentations
Grading:
• Participation 20% (10% Team, 10% Instructor)
• Midterm Examination 15%
• Presentation 20%
• Course Paper 30%
• Final Examination 15%
Homework & Research
• Complete the required readings assignments
 • Be prepared to discuss material in class

• Weekly Current Affairs Research
  (Group/Team)
 • Provide an brief (3-5 min) overview of homeland Security/terrorism
   issues or events in the news
 • Format: 5 W’s and 1 H (see next slide)
 • Examples:
    •   Attack(s)
    •   Technology
    •   Financing
    •   Policy
    •   Media
5 W’s and 1 H
• What happened?

• Who was there?

• Why did it happen?

• When did it happen?

• Where did it happen?

• How did it happen?

                        http://blog.journalistics.com/2010/five-ws-one-h/
Midterm and Final Exams
• Each Exam is 15% of your grade, or 30%
• Material from Readings, Class discussions,
  and course lectures.
• 50 Questions per exam using the following
  question types:
 •   Multiple Choice
 •   True/False
 •   Fill in the blank
 •   Essay
Course Project
(Group/Team) Project:
 • Homeland Security/Terrorism

• Use APA Format
• Peer Review/Evaluation within each group (See Example)
• Further project guidance will be given by instructor.
PEER Evaluations for the SCTY 488
     Group/Team Project
Here are four descriptions that characterize the type of contribution a group member could have made:
PLEASE READ ALL four carefully and think about which of these descriptions best captures the
contribution each of your group members made. Please do not take these ratings lightly—just as you
would like your group members to rate you honestly and accurately, you should do the same in return.
Typically, most students receive a rating of 3.

    #0                    #1                               #2                              #3
Basically    A generally Unreliable         An inconsistently involved      A generally reliable and
did not      and/or Unproductive            and/or inconsistently           productive member who
contribute   member; someone who            productive member who           consistently made
anything     clearly contributed much       made only                       contributions to the group
             less to the project than the   occasional/sporadic             throughout the semester.
             other members.                 contributions to the project.


=> If there is a person in your group who (you feel) did exceptional work on the project, add a + to your
rating of 3.

        In the spaces below, please write in the name of your group members (not including yourself). If
you don’t know the person’s full name, write in his/her first name. To the right of each name, circle the
number of the description that BEST DESCRIBES that person, in your opinion. Your individual ratings will
be kept completely anonymous.
Class Interview (8 mins)
• Pair up and interview each other
• Interview Questions:
 • Name
 • Major area of study & year (Senior, Junior, etc.)
 • Your Current Job
 • Why you took this course
 • Extra Curricular Activities
 • One “interesting Fact” about you
 • Dream Vacation Spot and why
Team Instructions
• Divide into 6 Teams of 4 individuals
• Team Minimums
 • 1 Senior
 • 1 Juniors
 • 1 Sophomore
 • Freshman must be in separate groups
• Create a Name & Logo for your new Team
    • E-mail name and member list to instructor/
      Team members
Experiences With Terrorism

1. _________________________________

2. _________________________________

3. _________________________________

4. _________________________________

5. _________________________________
*** IMPORTANT *** IMPORTANT *** IMPORTANT
***

  • It is Worldwide policy that all students who are enrolled in a
    class, sign into their class through Blackboard on the actual
    first day of the term and the actual last day of the term.
  • The purpose of signing into Blackboard on the first day of the
    term is to look for student assignments, announcements from
    the faculty teaching the class, check for any last minute
    changes, and to post a personal introduction.
  • The purpose of signing into Blackboard on the last day of the
    term is to look for announcements from the faculty and verify
    that all coursework submitted has been received.
  • For this term, the first day of the term is Monday, XX August.
    The last day of the term is Sunday, XX October.

More Related Content

Viewers also liked

Human vs National Security in the International arena
Human vs National Security in the International arenaHuman vs National Security in the International arena
Human vs National Security in the International arenaGabriel Orozco
 
Conflict Analysis
Conflict AnalysisConflict Analysis
Conflict Analysisaoux
 
Ch. 26 - "The New Power Balance"
Ch. 26 - "The New Power Balance"Ch. 26 - "The New Power Balance"
Ch. 26 - "The New Power Balance"Michael Rahbar
 
Threats to national security
Threats to national securityThreats to national security
Threats to national securityJoann Villareal
 
Global Issues - International Security
Global  Issues - International  SecurityGlobal  Issues - International  Security
Global Issues - International Securityguest2f82ae
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international securityParas Bhutto
 
International migration
International migrationInternational migration
International migrationKushal
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
 
National security of pakistan
National security of pakistan National security of pakistan
National security of pakistan Tallat Satti
 
Theories of war
Theories of warTheories of war
Theories of warmrlile
 
Terrorism and national security
Terrorism and national securityTerrorism and national security
Terrorism and national securityRommel Banlaoi
 
PEACE Theme 6 :Resolving and transforming conflicts
PEACE Theme 6 :Resolving and transforming conflictsPEACE Theme 6 :Resolving and transforming conflicts
PEACE Theme 6 :Resolving and transforming conflictsLeranie Fajardo
 
Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1bakri303
 

Viewers also liked (18)

C5 - Islamic Theory of IR
C5 - Islamic Theory of IRC5 - Islamic Theory of IR
C5 - Islamic Theory of IR
 
Human vs National Security in the International arena
Human vs National Security in the International arenaHuman vs National Security in the International arena
Human vs National Security in the International arena
 
Conflict Analysis
Conflict AnalysisConflict Analysis
Conflict Analysis
 
Concept Of Jihad
Concept Of JihadConcept Of Jihad
Concept Of Jihad
 
Ch. 26 - "The New Power Balance"
Ch. 26 - "The New Power Balance"Ch. 26 - "The New Power Balance"
Ch. 26 - "The New Power Balance"
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
 
Global Issues - International Security
Global  Issues - International  SecurityGlobal  Issues - International  Security
Global Issues - International Security
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
International migration
International migrationInternational migration
International migration
 
International migration
International migrationInternational migration
International migration
 
National power.......
National power.......National power.......
National power.......
 
International Security 3
International Security 3International Security 3
International Security 3
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
National security of pakistan
National security of pakistan National security of pakistan
National security of pakistan
 
Theories of war
Theories of warTheories of war
Theories of war
 
Terrorism and national security
Terrorism and national securityTerrorism and national security
Terrorism and national security
 
PEACE Theme 6 :Resolving and transforming conflicts
PEACE Theme 6 :Resolving and transforming conflictsPEACE Theme 6 :Resolving and transforming conflicts
PEACE Theme 6 :Resolving and transforming conflicts
 
Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1
 

Similar to National security & terrorism overview (sample)

Gmu terrorism student syllabus fall 2016 wednesday
Gmu terrorism student syllabus fall 2016  wednesdayGmu terrorism student syllabus fall 2016  wednesday
Gmu terrorism student syllabus fall 2016 wednesdayJames Feldkamp
 
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docx
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docxSan Francisco State UniversityFall 2014IR 104 (04) Introduc.docx
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docxkenjordan97598
 
Evaluation of Cybersecurity Threats in the Middle East, Europe,
Evaluation of Cybersecurity Threats in the Middle East, Europe, Evaluation of Cybersecurity Threats in the Middle East, Europe,
Evaluation of Cybersecurity Threats in the Middle East, Europe, ronnasleightholm
 
POL 255 Education Specialist / snaptutorial.com
POL 255 Education Specialist / snaptutorial.comPOL 255 Education Specialist / snaptutorial.com
POL 255 Education Specialist / snaptutorial.comMcdonaldRyan160
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss VinaOconner450
 
Syllabus For 2008 Gulc International Economic Crime
Syllabus For 2008 Gulc International Economic CrimeSyllabus For 2008 Gulc International Economic Crime
Syllabus For 2008 Gulc International Economic Crimeabbiesb
 
JustinLessonDraft Revised
JustinLessonDraft RevisedJustinLessonDraft Revised
JustinLessonDraft RevisedJustin Brown
 
Research methodoligies in architecture
Research methodoligies in architectureResearch methodoligies in architecture
Research methodoligies in architectureSamanth kumar
 
A Systematic Approach To Teaching Critical Thinking Through Debate
A Systematic Approach To Teaching Critical Thinking Through DebateA Systematic Approach To Teaching Critical Thinking Through Debate
A Systematic Approach To Teaching Critical Thinking Through DebateNathan Mathis
 
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docx
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docxScholar Practitioner Project (11–15 pages)TOPICAn education a.docx
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docxjeffsrosalyn
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxlefrancoishazlett
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxhelzerpatrina
 
Models of Institutional ControlEvaluate the three different mo.docx
Models of Institutional ControlEvaluate the three different mo.docxModels of Institutional ControlEvaluate the three different mo.docx
Models of Institutional ControlEvaluate the three different mo.docxannandleola
 
RESEARCH TOPICS IN ACADEMIC WRITING.pptx
RESEARCH TOPICS IN ACADEMIC WRITING.pptxRESEARCH TOPICS IN ACADEMIC WRITING.pptx
RESEARCH TOPICS IN ACADEMIC WRITING.pptxRubenAgacio
 
English 318/JAMM 328 (Science Writing) Syllabus
English 318/JAMM 328 (Science Writing) SyllabusEnglish 318/JAMM 328 (Science Writing) Syllabus
English 318/JAMM 328 (Science Writing) SyllabusJodie Nicotra
 
International Environmental Governance
International Environmental GovernanceInternational Environmental Governance
International Environmental GovernanceAmeliaBahr
 
throughout your time as a CAS student, you have been exposed to va
throughout your time as a CAS student, you have been exposed to vathroughout your time as a CAS student, you have been exposed to va
throughout your time as a CAS student, you have been exposed to vaTakishaPeck109
 

Similar to National security & terrorism overview (sample) (20)

Gmu terrorism student syllabus fall 2016 wednesday
Gmu terrorism student syllabus fall 2016  wednesdayGmu terrorism student syllabus fall 2016  wednesday
Gmu terrorism student syllabus fall 2016 wednesday
 
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docx
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docxSan Francisco State UniversityFall 2014IR 104 (04) Introduc.docx
San Francisco State UniversityFall 2014IR 104 (04) Introduc.docx
 
Evaluation of Cybersecurity Threats in the Middle East, Europe,
Evaluation of Cybersecurity Threats in the Middle East, Europe, Evaluation of Cybersecurity Threats in the Middle East, Europe,
Evaluation of Cybersecurity Threats in the Middle East, Europe,
 
POL 255 Education Specialist / snaptutorial.com
POL 255 Education Specialist / snaptutorial.comPOL 255 Education Specialist / snaptutorial.com
POL 255 Education Specialist / snaptutorial.com
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
 
Syllabus For 2008 Gulc International Economic Crime
Syllabus For 2008 Gulc International Economic CrimeSyllabus For 2008 Gulc International Economic Crime
Syllabus For 2008 Gulc International Economic Crime
 
COMM 320 syllabus
COMM 320 syllabusCOMM 320 syllabus
COMM 320 syllabus
 
Com510 syllabus
Com510 syllabusCom510 syllabus
Com510 syllabus
 
JustinLessonDraft Revised
JustinLessonDraft RevisedJustinLessonDraft Revised
JustinLessonDraft Revised
 
Research methodoligies in architecture
Research methodoligies in architectureResearch methodoligies in architecture
Research methodoligies in architecture
 
A Systematic Approach To Teaching Critical Thinking Through Debate
A Systematic Approach To Teaching Critical Thinking Through DebateA Systematic Approach To Teaching Critical Thinking Through Debate
A Systematic Approach To Teaching Critical Thinking Through Debate
 
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docx
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docxScholar Practitioner Project (11–15 pages)TOPICAn education a.docx
Scholar Practitioner Project (11–15 pages)TOPICAn education a.docx
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
 
Models of Institutional ControlEvaluate the three different mo.docx
Models of Institutional ControlEvaluate the three different mo.docxModels of Institutional ControlEvaluate the three different mo.docx
Models of Institutional ControlEvaluate the three different mo.docx
 
RESEARCH TOPICS IN ACADEMIC WRITING.pptx
RESEARCH TOPICS IN ACADEMIC WRITING.pptxRESEARCH TOPICS IN ACADEMIC WRITING.pptx
RESEARCH TOPICS IN ACADEMIC WRITING.pptx
 
English 318/JAMM 328 (Science Writing) Syllabus
English 318/JAMM 328 (Science Writing) SyllabusEnglish 318/JAMM 328 (Science Writing) Syllabus
English 318/JAMM 328 (Science Writing) Syllabus
 
International Environmental Governance
International Environmental GovernanceInternational Environmental Governance
International Environmental Governance
 
throughout your time as a CAS student, you have been exposed to va
throughout your time as a CAS student, you have been exposed to vathroughout your time as a CAS student, you have been exposed to va
throughout your time as a CAS student, you have been exposed to va
 

National security & terrorism overview (sample)

  • 1. National Security Issues & Terrorism SCTY 488 Overview Presented By Jim Bounds
  • 2. Instructor – Jim Bounds Background Currently work as an Operational Assessment Analyst, determining the combat effectiveness of Counter Improvised Explosive Device (C-IED) training, and Operational Level of War (OLW) Assessments for the Department of the Navy. Retired Navy Commander with over 28 years operational military/civilian experience in aviation and security arenas. I’ve logged over 3,600 hours of flight time from ships at sea and ashore locations world-wide in helicopters and fixed wing aircraft. •Deputy Director Maritime Homeland Defense/Security to U.S. THIRD Fleet •Director of Safety, Security and Emergency Manager •Director of Aviation Safety, Naval Air Reserve Force •Navy Flight Instructor and Check Pilot Education Master of Science, Homeland Security & Safety Engineering, (2006) Bachelor of Science, Management (1984) Completing a MS in Aeronautical Science at ERAU (Present)
  • 3. SCTY 488 Course Description • Although terrorism has been a known phenomenon for centuries, it has become the most frequent form of conflict in the late 20th century. • Success in preventing nuclear warfare and in curbing the outbreak of most conventional war has resulted in more forms of low intensity violence, a significant feature of which is overt terrorism. Ideological hardening, ethnic militancy, and religious revivalism have fueled terrorist ambitions. • Broadly speaking, there are three types of terrorism, classified on the basis of actors. The course will address all three types: • Domestic US • International or group directed • State sponsored
  • 4. SCTY 488 Course Goals • Required for students pursuing a minor in Security & Intelligence • Evaluate the cause, capabilities, limitations, implications, and future of terrorist threats, as well as anti- and counter- terrorist law enforcement/intelligence community responses • Examine the following questions: • How and why terrorism has re-emerged • What are its implications for political and military institutions • What capabilities and limitations bear on combating this threat • What the future portends for national societies and global stability
  • 5. SCTY 488 Learning Outcomes 1. Examine and interpret the basic definitions of terrorism, including domestic terrorism, special interest terrorism, foreign and international terrorism. 2. Interpret and analyze the criminological and “war on terrorism” aspects of terrorism and the positive and negative aspects of treating it as a criminal justice problem or a war on terrorism. 3. Assess and critique group organizational structures of terrorism; to include the relationship between size and effectiveness, the management problems, financing and the concept of leaderless resistance. 4. To critique the basic aspects of religion and terror as was exhibited between Ireland and the United Kingdom and with radical Islam and attacks on western society. 5. Chart and explain the origins of modern terrorism from the French & American revolutions to the Bolshevik Revolution in Russian in 1917.
  • 6. SCTY 488 Learning Outcomes 6. Differentiate between the development of religious and historical conflicts in the Middle East and the historical role of terrorism in the area. 7. Analyze the theories that were put into use by a Uruguayan terrorist group called the Tupamaros and how this Latin American influence has dominated the world of terrorism for the past fifty years. 8. Evaluate Middle Eastern Terrorism and the directions of revolutionary Islam and the spread of terrorism. 9. Categorize and interpret terrorism from the left and the right wing perspective. 10. Conceptualize and analyze technological terrorism and weapons of mass destruction and appropriate counterterrorism responses to such attacks. 11. Assess the issues surrounding terrorism and the impact of the media on the public.
  • 7. Terrorism & Homeland Security White, J. R. (2012). Terrorism and homeland security: An introduction (7th ed.). Belmont, CA: Wadsworth Publishing. ISBN: 0495913367 Jonathan R. White •A national expert on the topic of terrorism--is executive director of the Homeland Security Initiative. •Served as dean of Social Sciences at Grand Valley State University •Instructed on terrorism, militarism, criminology, police administration, philosophy, and justice in Western civilization •Adjunct instructor with the State and Local Anti- Terrorism Training (SLATT) Program •Recognized expert on Middle Eastern extremism and used his knowledge to develop and strengthen the SLATT program on international terrorism
  • 8. Course Paper (30% of your course grade): • National Security & Terrorism theme • 8-10 pages of content using APA 6th Edition standards • College level writing, don't forget the basics; spelling, grammar, and format • Course Papers due on the 8th week (shown on the Course Schedule) The paper must be turned in before you will be allowed to take the final examination • All papers/projects submitted for grading in this course will be submitted to safeassign.com - http://www.safeassign.com/. • A paper/project that is turned in late will be downgraded 5 for each week the paper is late. (One day, -1; two days; -2; and three days through seven days, -3.5.) • This paper is worth 30% and presentation 20% of your final grade
  • 9. Jack R. Hunt Library The Jack R. Hunt Library, located on the Daytona Beach Campus, is the primary library for all Worldwide Campus students. Web: http://library.erau.edu Phone: (800) 678-9428 (ext. 6947) or (386) 226-7656 (Voicemail is available after hours) Hours: Monday - Friday, 8:00 a.m. - 5:00 p.m. EST, Email: Hunt.Library@erau.edu
  • 10. EAGLET & ERAU Writing Rubric • Electronic, Access to Grammar, Language, and Essay Tutoring • ERAU Writing Rubric • Organization • Language Style • Research and Citation’s
  • 11. Participation & Assignments: • All assignments will be completed in a professional manner & on time, unless prior arrangements have been made • This course includes weekly activities, each of which may have grade points associated with them • 20% of your grade is based on participation • Unless prior arrangements have been made with the instructor, you are expected to attend & participate each week • If absent, make-up assignments will be required
  • 12. Course Policies: Embry-Riddle is committed to maintaining and upholding intellectual integrity. All students, faculty, and staff have obligations to prevent violations of academic integrity and take corrective action when they occur. The adjudication process will include the sanction imposed on students who commit the following academic violations, which may include a failing grade on the assignment, a failing grade for the course, suspension, or dismissal from the University: 1.Plagiarism: Presenting as one’s own the ideas, words, or products of another. Plagiarism includes use of any source to complete academic assignments without proper acknowledgement of the source. All papers submitted for grading in this course will be submitted to safeassign.com - http://www.safeassign.com/ where the text of the paper is compared against information contained in the safeassign.com database. Papers submitted will be included in the safeassign.com database and become source documents for the purpose of detecting plagiarism. 2.Cheating: A broad term that includes the following: a) Giving or receiving help from unauthorized persons or materials during examinations. b) The unauthorized communication of examination questions prior to, during, or following administration of the examination. c) Collaboration on examinations or assignments expected to be individual work. d) Fraud and deceit, that include knowingly furnishing false or misleading information or failing to furnish appropriate information when requested, such as when applying for admission to the University. 3.APA 6 is the ERAU Worldwide standard for all research projects.
  • 13. SCTY 488 Course Schedule: Date Topic/prep Learning Assignments Outcome(s) Session 1 Course Overview & Requirements 1, 2, 3, 4, 5, Intel Brief Demo XX Aug 6, 7, 11 Read Chap 1-5 Chap 1 Terrorism Defined Chap 2: The Social Underpinnings Chap 3: The Organization & Financing Chap 4: The Media Chap 5 Gender Roles, Tactics & Force Multipliers Session 2 Chap 6 The Roots of Modern Terrorism 1, 4, 5 Read Chapters 6, 7 XX Aug Chap 7 Long-Term Separatist Class Discussions Session 3 Chap 6 The Roots of Modern Terrorism 4, 5 Read Chapters 11 XX Aug (cont) Class Discussions *Paper Topic Due
  • 14. SCTY 488 Course Schedule: Date Topic/prep Learning Assignments Outcome(s) Session 4 Chap 11 Revolutionary, Counter 4, 5, 6, 7 Read Chapters 9, 10 XX Aug Revolutionary, and Religious Terrorism Class Discussions Mid Term Review *Paper Outline References (APA) Due Session 5 Chap 9 Background to the Middle East 6, 8 Read Chapter 12 XX Sep Chap 10 Terrorism in Israel & Palestine Midterm (1-6) Class Discussions Session 6 Chap 12 Al Qaeda & Jihadist Networks 8 Read Chapter 13 XX Sep Class Discussions *Paper References Due
  • 15. SCTY 488 Course Schedule: Date Topic/prep Learning Assignments Outcome(s) Session 7 Chap 13 Domestic Terrorism 1, 9, 10 Read Chapters 15 XX Sep Presentations Class Discussions *Paper Draft Due Session 8 Chap 15 Law Enforcement & Homeland 2, 10, 11 Read Chapters 16, 17 XX Sep Security End of course Presentations Evaluation Final Exam Review Session 9 Chap 16 Homeland Security & All *Course Paper Due XX Oct Constitutional Issues Chap 17 Security, Terrorism, and the Final exam Future Presentations
  • 16. Grading: • Participation 20% (10% Team, 10% Instructor) • Midterm Examination 15% • Presentation 20% • Course Paper 30% • Final Examination 15%
  • 17. Homework & Research • Complete the required readings assignments • Be prepared to discuss material in class • Weekly Current Affairs Research (Group/Team) • Provide an brief (3-5 min) overview of homeland Security/terrorism issues or events in the news • Format: 5 W’s and 1 H (see next slide) • Examples: • Attack(s) • Technology • Financing • Policy • Media
  • 18. 5 W’s and 1 H • What happened? • Who was there? • Why did it happen? • When did it happen? • Where did it happen? • How did it happen? http://blog.journalistics.com/2010/five-ws-one-h/
  • 19. Midterm and Final Exams • Each Exam is 15% of your grade, or 30% • Material from Readings, Class discussions, and course lectures. • 50 Questions per exam using the following question types: • Multiple Choice • True/False • Fill in the blank • Essay
  • 20. Course Project (Group/Team) Project: • Homeland Security/Terrorism • Use APA Format • Peer Review/Evaluation within each group (See Example) • Further project guidance will be given by instructor.
  • 21. PEER Evaluations for the SCTY 488 Group/Team Project Here are four descriptions that characterize the type of contribution a group member could have made: PLEASE READ ALL four carefully and think about which of these descriptions best captures the contribution each of your group members made. Please do not take these ratings lightly—just as you would like your group members to rate you honestly and accurately, you should do the same in return. Typically, most students receive a rating of 3. #0 #1 #2 #3 Basically A generally Unreliable An inconsistently involved A generally reliable and did not and/or Unproductive and/or inconsistently productive member who contribute member; someone who productive member who consistently made anything clearly contributed much made only contributions to the group less to the project than the occasional/sporadic throughout the semester. other members. contributions to the project. => If there is a person in your group who (you feel) did exceptional work on the project, add a + to your rating of 3. In the spaces below, please write in the name of your group members (not including yourself). If you don’t know the person’s full name, write in his/her first name. To the right of each name, circle the number of the description that BEST DESCRIBES that person, in your opinion. Your individual ratings will be kept completely anonymous.
  • 22. Class Interview (8 mins) • Pair up and interview each other • Interview Questions: • Name • Major area of study & year (Senior, Junior, etc.) • Your Current Job • Why you took this course • Extra Curricular Activities • One “interesting Fact” about you • Dream Vacation Spot and why
  • 23. Team Instructions • Divide into 6 Teams of 4 individuals • Team Minimums • 1 Senior • 1 Juniors • 1 Sophomore • Freshman must be in separate groups • Create a Name & Logo for your new Team • E-mail name and member list to instructor/ Team members
  • 24. Experiences With Terrorism 1. _________________________________ 2. _________________________________ 3. _________________________________ 4. _________________________________ 5. _________________________________
  • 25. *** IMPORTANT *** IMPORTANT *** IMPORTANT *** • It is Worldwide policy that all students who are enrolled in a class, sign into their class through Blackboard on the actual first day of the term and the actual last day of the term. • The purpose of signing into Blackboard on the first day of the term is to look for student assignments, announcements from the faculty teaching the class, check for any last minute changes, and to post a personal introduction. • The purpose of signing into Blackboard on the last day of the term is to look for announcements from the faculty and verify that all coursework submitted has been received. • For this term, the first day of the term is Monday, XX August. The last day of the term is Sunday, XX October.