copyright 2007-2008 raymond e. foster the role of criminal justice in terrorism criminal justice...
Post on 27-Dec-2015
222 Views
Preview:
TRANSCRIPT
Copyright 2007-2008 Raymond E. Foster
The Role of The Role of Criminal Justice Criminal Justice in in
TerrorismTerrorism
Course Orientation and Course Orientation and IntroductionIntroduction
Copyright 2007-2008 Raymond E. Foster
Today’s ScheduleToday’s Schedule
Instructor IntroductionInstructor Introduction University EducationUniversity Education Course Outline and ExpectationsCourse Outline and Expectations Website OrientationWebsite Orientation Course BeginningCourse Beginning
Copyright 2007-2008 Raymond E. Foster
Contact MeContact Me
Office Hours:Office Hours: By Appointment By Appointment
Office Telephone: 909.599.7530Office Telephone: 909.599.7530 raymond@hitechcj.comraymond@hitechcj.com
Copyright 2007-2008 Raymond E. Foster
What does a university education What does a university education mean?mean?
You can manage a long term project.
You can work independently.
You can work in a group.
You can manage competing resources.
You can read and write.
You learned new ideas.
You were exposed to a variety of cultures.
You enhanced your critical thinking skills
Copyright 2007-2008 Raymond E. Foster
Course Objectives:Course Objectives:
This course employs a This course employs a criminal justicecriminal justice framework for framework forthe analysis and evaluation of terrorist groups andthe analysis and evaluation of terrorist groups andindividuals, terrorist origins, goals, dynamics,individuals, terrorist origins, goals, dynamics,ideologies and counterterrorism. The course willideologies and counterterrorism. The course willinclude a discussion of the task of defining terrorism, aninclude a discussion of the task of defining terrorism, anexploration of the history and causes of terrorism (bothexploration of the history and causes of terrorism (bothinternationally and domestically), the structure andinternationally and domestically), the structure andorganization of terrorist groups, an overview of the organization of terrorist groups, an overview of the
methodsmethodsand weapons of terrorists, and public policies, strategies and weapons of terrorists, and public policies, strategies
andandapproaches for combating and preventing terrorism. approaches for combating and preventing terrorism.
Copyright 2007-2008 Raymond E. Foster
How this Course Relates to MajorHow this Course Relates to Major
•• Summarize and interpret current issues in the Summarize and interpret current issues in the field of criminal justice and how these issues field of criminal justice and how these issues impact criminal justice organizations, criminal impact criminal justice organizations, criminal justice personnel and other stakeholders; justice personnel and other stakeholders;
•• Analyze, critique and defend criminal justice Analyze, critique and defend criminal justice policy and service delivery from a management policy and service delivery from a management point of view; and,point of view; and,
•• Summarize, interpret and relate meta, Summarize, interpret and relate meta, normative and applied ethical theories in a normative and applied ethical theories in a dynamic environment such as criminal justice dynamic environment such as criminal justice management.management.
Copyright 2007-2008 Raymond E. Foster
Course Specific OutcomesCourse Specific Outcomes Formulate a working definition of terrorism and assess the Formulate a working definition of terrorism and assess the
problems associated with the various social, political and problems associated with the various social, political and cultural contexts of that meaning;cultural contexts of that meaning;
Construct a framework from a criminal justice perspective Construct a framework from a criminal justice perspective to analyze terrorism and terrorists;to analyze terrorism and terrorists;
List and summarize the historical and theoretical List and summarize the historical and theoretical perspectives that have been a major influence on our perspectives that have been a major influence on our understanding of violence and modern day terrorism;understanding of violence and modern day terrorism;
Analyze and evaluate the patterns and trends of terrorism, Analyze and evaluate the patterns and trends of terrorism, including methods, modes of attack, tactics, and strategies;including methods, modes of attack, tactics, and strategies;
Discuss terrorism against the United States and foreign Discuss terrorism against the United States and foreign governments;governments;
Apply theories and policies of counter terrorism, including Apply theories and policies of counter terrorism, including scholarly controversies relating to the media and civilians; scholarly controversies relating to the media and civilians; and,and,
Identify key people who have influenced our understanding Identify key people who have influenced our understanding of the characteristics, causes, and controls of terrorism.of the characteristics, causes, and controls of terrorism.
Copyright 2007-2008 Raymond E. Foster
Required Text:Required Text:
Snowden, L. & Whitsel, B. (2005)Snowden, L. & Whitsel, B. (2005)
Terrorism: Research, Readings Terrorism: Research, Readings andand
Realities. Prentice HallRealities. Prentice Hall
Poland, J. (2005) UnderstandingPoland, J. (2005) Understanding
Terrorism: Groups, Strategies andTerrorism: Groups, Strategies and
Responses.Responses.
Copyright 2007-2008 Raymond E. Foster
Supplemental MaterialSupplemental Material
Various Web-based resources, Various Web-based resources, including the MIPT;including the MIPT;
Union e-library; and, Union e-library; and, The Battle of Algiers (Video).The Battle of Algiers (Video).
Copyright 2007-2008 Raymond E. Foster
Course Requirements:Course Requirements:
This course is organized into four This course is organized into four modules ofmodules of
instruction. In this eight week session, instruction. In this eight week session, eacheach
module is two weeks in length. A module is two weeks in length. A coursecourse
calendar is attached as the last page of calendar is attached as the last page of your your
syllabus. Each module includes specific syllabus. Each module includes specific activities and assignments. activities and assignments.
Copyright 2007-2008 Raymond E. Foster
MODULE ONEMODULE ONE(Defining Terrorism)
Readings:1. Understanding Terrorism (Poland) a. Chapter One: Concepts of Terror and Terrorism b. Chapter Two: Historical Antecedents of Terrorism and Violence c. Chapter Five: Designated Foreign Terrorist Organizations: The "A
List."2. Terrorism (Snowden & Whitsel) a. Chapter One: Identity and the Terrorist Threat: An Interpretive and
Explanatory Model b. Chapter Two: The Changing Face of American Terrorism c. Chapter Five: Implementing Justice through Terror and Destruction:
Ecoterror's Violent Agenda to "Save" Nature. d. Chapter Ten: The Right to Revise History: The Institute for
Historical Review E. Chapter Fourteen: Zealous Before the Lord: The Construction of
Christian Identity Theology
Copyright 2007-2008 Raymond E. Foster
MODULE ONEMODULE ONE(Defining Terrorism)
Activities:Activities:1.1.Course orientationCourse orientation2.2.Video – Battle of AlgiersVideo – Battle of Algiers3.3.Online forum participationOnline forum participation4.4.Panel formation and topic selectionPanel formation and topic selection5.5.Selection of individual presentationsSelection of individual presentations6.6.LectureLecture7.7.Roundtable discussion on videoRoundtable discussion on video8.8.Paper onePaper one
Copyright 2007-2008 Raymond E. Foster
MODULE TWOMODULE TWO(The Modus Operandi of Terrorists)
Readings:1. Understanding Terrorism (Poland) a. Chapter Six: The Dynamics of Hostage Taking and Negotiation b. Chapter Seven: Terrorism and Bombing c. Chapter Eight: Suicide Bombers: A Global Problem2. Terrorism (Snowden & Whitsel) a. Chapter Six: Islamic Extremists: How do they Mobilize Support? b. Chapter Seven: An Analysis of Organizational Characteristics for
Groups use Radiological Weapons of Mass Victimization
c. Chapter Eight: Steganography and Terrorism: An Introduction to Data
Hiding and its use in Terrorist activities d. WMD Yesterday's News: The WMD Terrorism Threat Today. e. Leaderless Resistance: Are Terrorist Groups a Thing of the Past?
Copyright 2007-2008 Raymond E. Foster
MODULE TWOMODULE TWO(The Modus Operandi of Terrorists)
Activities:Activities:
1.1. LectureLecture
2.2. Individual presentationsIndividual presentations
3.3. Work on panel projectWork on panel project
4.4. Online forum participationOnline forum participation
Copyright 2007-2008 Raymond E. Foster
MODULE THREEMODULE THREE(Response to Terrorism)
1. Understanding Terrorism (Poland) a. Chapter Three: Violence and Terrorism: The Role of the Mass
Media b. Chapter Nine: Counterterrorist Measures: The Response2. Terrorism (Snowden & Whitsel) a. Chapter Four: The Diplomacy of Counterterrorism: Lessons
Learned, Lessons Ignored
b. Chapter Nine: Interpol and the Policing of International Terrorism:
Developments and Dynamics since September 11. c. Chapter Nineteen: Planning for Campus Security after
September 11: One University's Experience d. Chapter Twenty: Post 9/11: Are we Really Safer Now?3. The National Response Plan is available on the internet.
Copyright 2007-2008 Raymond E. Foster
MODULE THREEMODULE THREE(Response to Terrorism)
Activities:Activities:
1.1. LectureLecture
2.2. Work on panel projectWork on panel project
3.3. Paper twoPaper two
4.4. Online forum participationOnline forum participation
Copyright 2007-2008 Raymond E. Foster
MODULE FOURMODULE FOUR(Future and Emerging Trends)
Readings:1. Understanding Terrorism (Poland) a. Chapter Four: The Palestine Question and Al Qaeda b. Chapter Ten: The Future of Terrorism 2. Terrorism (Snowden & Whitsel) a. Chapter Eleven: New Age Groups and Public Order b. Chapter Fifteen: Security-Threat Groups: The Threats Posed by White-Supremacist Organizations c. Chapter Seventeen: Extremism in the Military: The Burmeister
Case and Policy Response. d. Chapter Eighteen: Rural Radical Religion: Christian Identity
Movement and Community Militias.
Copyright 2007-2008 Raymond E. Foster
MODULE FOURMODULE FOUR(Future and Emerging Trends)
ActivitiesActivities
1.1. LectureLecture
2.2. Work on panel projectWork on panel project
3.3. Panel discussionPanel discussion
4.4. Panel written reportPanel written report
5.5. Online forum participationOnline forum participation
Copyright 2007-2008 Raymond E. Foster
Week Date Activity Assignment Due
Module One
OneCourse Orientation, Group Project Instructions, Select individual
presentations, first half of Battle of AlgiersNone
TwoGroup Project Topic Selection, second half of Battle of Algiers,
roundtable discussion of video, lecturePaper One
Module Two
ThreeNo Class (Work on presentations, work as a group on panel
assignment)None
Four Individual Presentations, Lecture Individual Presentations
Module Three
Five No Class (Work as a group on panel assignment) None
Six Lecture Paper Two
Module Four
Seven No Class (Work on group assignment) None
Eight Panel Presentations, lecture Panel Presentations, including paper
Copyright 2007-2008 Raymond E. Foster
Method of Evaluation:Method of Evaluation:
Exam One 10%Exam Two 20%Group Project 20%Issue Paper One 10%Issue Paper Two 10%Practical Exercise 10%Website Presentation 10%Participation 10%Semester Total 100%
A 90-100%
B 80-89%
C 70-79%
U 69% and Under
Copyright 2007-2008 Raymond E. Foster
Attendance Attendance Within the university setting, learners are expected to attend class on a regular Within the university setting, learners are expected to attend class on a regular basis, complete all readings and assignments before the stated dates and basis, complete all readings and assignments before the stated dates and participate in topic discussions to enhance their overall learning experience. As participate in topic discussions to enhance their overall learning experience. As participation is directly related to attendance, and because of the abbreviated participation is directly related to attendance, and because of the abbreviated nature of the eight week session, learners missing any class will not receive nature of the eight week session, learners missing any class will not receive
credit credit for participation. Attendance will be recorded by a class roster that will be for participation. Attendance will be recorded by a class roster that will be
passed passed among the learners during each class. It is the learner’s responsibility to sign among the learners during each class. It is the learner’s responsibility to sign
the the roster.roster.
Copyright 2007-2008 Raymond E. Foster
Ethical ConductEthical Conduct
Learners should be aware that there are severeLearners should be aware that there are severeconsequences for violations of academic ethicalconsequences for violations of academic ethicalconduct. Primarily, we are concerned withconduct. Primarily, we are concerned withcheating and plagiarism. Learners who arecheating and plagiarism. Learners who aredetermined to have cheated or committeddetermined to have cheated or committedplagiarism will face disciplinary action as identifiedplagiarism will face disciplinary action as identifiedwithin UI&U regulations. For additional within UI&U regulations. For additional clarification of cheating and/or plagiarism, refer toclarification of cheating and/or plagiarism, refer tothe UI&U Catalog for policies regarding Academicthe UI&U Catalog for policies regarding AcademicIntegrity.Integrity.
Copyright 2007-2008 Raymond E. Foster
Schedule ChangesSchedule Changes
The syllabus and schedule are subject The syllabus and schedule are subject to change in the event of extenuating to change in the event of extenuating circumstances and/or upon due notice circumstances and/or upon due notice and at the discretion of the instructor. and at the discretion of the instructor.
Copyright 2007-2008 Raymond E. Foster
Issue Papers Issue Papers
At a minimum, it is expected that the students will At a minimum, it is expected that the students will produceproduce
an academically sound and properly formatted work an academically sound and properly formatted work (APA(APA
format is strongly encouraged). All work is format is strongly encouraged). All work is evaluated onevaluated on
exposition as well as composition. Superior work exposition as well as composition. Superior work willwill
incorporate independent research as well as incorporate independent research as well as assigned andassigned and
supplemental readings.supplemental readings.
Copyright 2007-2008 Raymond E. Foster
Paper OnePaper One
Using the readings and your own research, complete a 4-6Using the readings and your own research, complete a 4-6page paper. Explore the various definitions of terrorism. page paper. Explore the various definitions of terrorism. What definition would you use? As you complete your What definition would you use? As you complete your paper, consider the following questions: What are thepaper, consider the following questions: What are thestrengths of your definition of terrorism? What are thestrengths of your definition of terrorism? What are theweaknesses? Is terrorism a military problem or a criminalweaknesses? Is terrorism a military problem or a criminaljustice problem? How does your definition cover statejustice problem? How does your definition cover stateterror, state involvement in terror, state sponsorship ofterror, state involvement in terror, state sponsorship ofterror and stateless terrorist groups? What, if any, theoriesterror and stateless terrorist groups? What, if any, theorieson violence, particularly political violence support youron violence, particularly political violence support yourdefinition? How is your definition shaped by your owndefinition? How is your definition shaped by your owncultural, political and social views?cultural, political and social views?
Copyright 2007-2008 Raymond E. Foster
Paper TwoPaper Two
Using the readings and your own research,Using the readings and your own research,
complete a 4-6 page analysis of how technologycomplete a 4-6 page analysis of how technology
has changed terrorism. Consider comparing andhas changed terrorism. Consider comparing and
contrasting pre-1970 terrorism with post-1970contrasting pre-1970 terrorism with post-1970
terrorism. How has technology changed theterrorism. How has technology changed the
terrorist’s targets and methods? How hasterrorist’s targets and methods? How has
technology changed their ability to transmit theirtechnology changed their ability to transmit their
messages to other members and the public? messages to other members and the public?
Copyright 2007-2008 Raymond E. Foster
Group Project Group Project The group project involves an analysis of an active terrorist group. The group project involves an analysis of an active terrorist group. Using the Country Reports on Terrorism and Patterns of GlobalUsing the Country Reports on Terrorism and Patterns of GlobalTerrorism, United States Department of State, 2006, your groupTerrorism, United States Department of State, 2006, your groupshould choose a designated terrorist group for analysis. There areshould choose a designated terrorist group for analysis. There aretwo parts to the final project. First, your group must prepare atwo parts to the final project. First, your group must prepare acomprehensive written analysis of the group. At a minimum, this 8-10 comprehensive written analysis of the group. At a minimum, this 8-10
pagepagereport should address the group history, structure, organization, current report should address the group history, structure, organization, current
activitiesactivitiesand major goals of the group. Additionally, the report should considerand major goals of the group. Additionally, the report should considercounterterrorism policies, strategies or tactics that are being or should counterterrorism policies, strategies or tactics that are being or should
bebeemployed against the group; and, focus on criminal justice responses to employed against the group; and, focus on criminal justice responses to
thethegroup. group.
In addition to the written report, your group should prepare a 30 minuteIn addition to the written report, your group should prepare a 30 minutepanel discussion on the group you choose. panel discussion on the group you choose.
Copyright 2007-2008 Raymond E. Foster
Individual PresentationsIndividual Presentations
Each learner will be assigned one of theEach learner will be assigned one of the
supplemental readings. The learner is tosupplemental readings. The learner is to
digest the information and prepare a tendigest the information and prepare a ten
minute class presentation and one-pageminute class presentation and one-page
briefing paper on the reading. The learnerbriefing paper on the reading. The learner
must provide a copy of the briefing paper must provide a copy of the briefing paper toto
each class member.each class member.
Copyright 2007-2008 Raymond E. Foster
ParticipationParticipation
Participation is ten percent of the learner’s Participation is ten percent of the learner’s final grade. In addition to attendance, final grade. In addition to attendance, participation will also be measured by the participation will also be measured by the use of an online threaded discussion. use of an online threaded discussion. Specific instructions regarding the online Specific instructions regarding the online forum will be presented during the course forum will be presented during the course orientation and are available on the course orientation and are available on the course website.website.
Copyright 2007-2008 Raymond E. Foster
Extra CreditExtra Credit
There is no extra credit available There is no extra credit available in this course.in this course.
Copyright 2007-2008 Raymond E. Foster
Students with DisabilitiesStudents with Disabilities
Please refer to the Catalog for policies regarding Please refer to the Catalog for policies regarding American American
Disabilities’ Act or Disabilities’ Act or
http://www.tui.edu/ASN/serv_learner_disab/default.asp for http://www.tui.edu/ASN/serv_learner_disab/default.asp for
further assistance regarding UI&U compliance with ADA.further assistance regarding UI&U compliance with ADA.
Copyright 2007-2008 Raymond E. Foster
General StuffGeneral Stuff
You must read the text and the You must read the text and the supplemental material before the supplemental material before the lecture.lecture.
Reading will enhance your ability to Reading will enhance your ability to participateparticipate
Participation will increase your grade, Participation will increase your grade, enhance not only your learning, but enhance not only your learning, but your enjoyment of the class.your enjoyment of the class.
Copyright 2007-2008 Raymond E. Foster
WebsiteWebsite
The course has one companion website. At The course has one companion website. At
that website the students will find that website the students will find hyperlinks hyperlinks
to the readings, important course to the readings, important course downloads downloads
(such as the syllabus) and hyperlinks to (such as the syllabus) and hyperlinks to
other course related multimedia other course related multimedia
presentations (such as PowerPoint presentations (such as PowerPoint
presentations, short videos, etc). presentations, short videos, etc).
Copyright 2007-2008 Raymond E. Foster
WebsiteWebsite
www.hitechcj.com/union-terrorismwww.hitechcj.com/union-terrorism
Copyright 2007-2008 Raymond E. Foster
Your UsernameYour Username
First Initial, Last Name, (location), First Initial, Last Name, (location), (Course)(Course)
rfosterbrea410rfosterbrea410 rfosterarcadia304rfosterarcadia304 rfostertwintowers410rfostertwintowers410
Copyright 2007-2008 Raymond E. Foster
Who Are you?Who Are you?
NameName AgencyAgency Terrorism experienceTerrorism experience Reason for returning to universityReason for returning to university I have always been ………………I have always been ……………… I have always wanted to …………I have always wanted to …………
top related