TERRORISM AND COUNTERTERRORISM: AN INTRODUCTION SELF-PACED COURSE THROUGH MARCH 24, 2018

Course Syllabus GeorgetownX

Self-Paced Course through March 24, 2018

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 TABLE OF CONTENTS Core Faculty ...... 2 Interviews ...... 3 Faculty Support Team ...... 3 What is the course about? ...... 3 Key Questions ...... 4 What does the course include? ...... 4 Course Section Outline ...... 5 What will I learn in the course? ...... 6 What should we expect from each other? ...... 6 What you can Expect from Professor Byman and the course team ...... 6 What you can expect from edX ...... 6 What we expect from you ...... 6 Appendix A: Detailed Course Section Outline ...... 9 1. What is Terrorism and Who are the Terrorists? + Strategies, Tactics, and Technology Use ...... 9 2. Al-Qaeda ...... 10 3. The Islamic State ...... 10 4. Intelligence and Counterterrorism Instruments ...... 12

1 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018

TERRORISM AND COUNTERTERRORISM What is the danger of terrorism, and how can the world respond effectively?

NOTE: The course will be available through March 24, 2018. No certificates will be issued for work completed after March 24, 2018.

CORE FACULTY • Daniel L. Byman Dr. Byman is a Professor in the Security Studies Program of the Walsh School of Foreign Service at Georgetown University and the Research Director of the Brookings Institution’s Center for Middle East Policy. Dr. Byman served as a Professional Staff Member with the National Commission on Terrorist Attacks on the United States (the “9/11 Commission”) and the Joint 9/11 Inquiry Staff of the House and Senate Intelligence Committees. He also worked as the Research Director of the Center for Middle East Public Policy at the RAND Corporation and as a Middle East analyst for the U.S. intelligence community. Dr. Byman received his B.A. in religion from Amherst College and his Ph.D. in political science from the Massachusetts Institute of Technology. Follow him @dbyman.

§ Christine Fair C. Christine Fair is a Georgetown Security Studies Program Assistant Professor, where she focuses on South Asian political and military affairs. Fair previously worked at the RAND Corporation, United Nations Assistance Mission to Afghanistan in Kabul, and at USIP’s Center for Conflict Analysis and Prevention. Fair has as authored, co-authored and co-edited several books, is a member of the Council on Foreign Relations, Women in International Security, International Studies Association, American Political Science Association, and American Institute of Pakistan Studies. She serves on the editorial board of numerous journals, and is a senior fellow with the Combating Terrorism Center at West Point. Fair received her PhD and MA from the University of Chicago. Her most recent book is Fighting to the End: The Pakistan Army’s Way of War (Oxford University Press, 2014). Many of her other publications can be found at christinefair.net

§ Bruce Hoffman Bruce Hoffman is a Professor and Director of both the Center for Security Studies and the Security Studies Program at Georgetown University. Professor Hoffman is currently a member of the National Security Preparedness Group; a Global Scholar at the Woodrow Wilson International Center for Scholars; a Senior Fellow at the Combating Terrorism Center; a Visiting Professor at the International Institute for Counter- Terrorism, Herzliya, and at the Handa Centre for the Study of Terrorism and Political Violence at St Andrews University, Scotland ; and serves in various editing capacities at The National Interest, Studies in Conflict and Terrorism, and the Columbia University Press Series on Terrorism and Irregular Warfare. Hoffman was awarded the United States Intelligence Community Seal Medallion in 1994 from the Director of Central Intelligence. Follow him @hoffman_bruce.

2 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018

§ Paul R. Pillar In 2005, Paul Pillar retired after a 28-year intelligence career in positions such as National Intelligence Officer for the Near East and South Asia; Chief of Analytic Units at the Central Intelligence Agency (CIA); an original member of the National Intelligence Council’s Analytic Group; Executive Assistant to CIA's Deputy Director for Intelligence; Executive Assistant to Director of Central Intelligence William Webster; and Head of Assessments and Information Group and Deputy Chief of the DCI Counterterrorist Center. Pillar is a retired officer in the U.S. Army Reserve and a former core faculty member at Georgetown University Security Studies Program. He received his B.A. from Dartmouth College, his Ph.D. from Princeton University, and a B.Phil. from Oxford University.

INTERVIEWS § Jacob Shapiro, Associate Professor, Princeton University and author of The Terrorist’s Dilemma: Managing Violent Covert Organizations. § Juan Zarate, Senior Adviser, Center for Strategic and International Studies, and former first Secretary of Treasury for Terrorism Financing and Financial Crimes § Major David Blair, USAF, MQ-1 Predator Pilot, United States Air Force § Mark Mazzetti, New York Times Reporter and author of The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth. § Peter Neumann, Professor, King’s College London, and Director, International Centre for the Study of Radicalisation § Rita Katz, Co-founder, SITE Intelligence Group

FACULTY SUPPORT TEAM § Brittany Marien, Teaching Assistant Brittany Marien is a Masters Candidate in the Security Studies Program at Georgetown University where she concentrates on International Security. Her research examines the nexus of weapons proliferation and counterterrorism. Brittany is currently a Pathways Student Research Trainee at the National Defense University in the Center for the Study of Weapons of Mass Destruction. Previously, Brittany has worked at the U.S. Department of State in the Bureau of International Security and Nonproliferation and the Center for the Strategic and International Studies for the Project on Nuclear Issues. Brittany originally hails from New Hampshire where she graduated summa cum laude from the University of New Hampshire.

WHAT IS THE COURSE ABOUT?

Terrorism has gone from a persistent yet marginal security concern to one of the most important security problems of our day: indeed, there are few countries that do not suffer from some form of terrorism. Though many terrorist attempts fail, some groups wage lengthy and bloody campaigns and, in exceptional cases, kill hundreds or even thousands in pursuit of their ends.

3 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 Course topics include the nuances involved in defining terrorism, the nature of Al-Qaeda, , and other important groups, the effectiveness of different counterterrorism tools like detention and military force, linkages (or the lack thereof) between terrorism and world religions like Islam, terrorist recruiting, the rule of law, the political context in South Asia and the Middle East, and terrorist use of technology.

KEY QUESTIONS • What is terrorism, and what are the components of different definitions? • What are common causes of terrorism? • What are common strategies and tactics of terrorism? How do terrorist groups respond to technological change? • What are common weaknesses of terrorist groups? Why do these occur? • What is the nature of Al-Qaeda, and why has it proven such a difficult adversary? • What is the role of intelligence in counterterrorism? • What are the strengths and weaknesses of different counterterrorism instruments? • How can you fight terrorism in accord with the rule of law? • Under what conditions does terrorism "work”? • How serious a problem is terrorism? In what ways does it manifest?

WHAT DOES THE COURSE INCLUDE? Each section of the course listed in the Course Section Outline below begins with an Introduction subsection and ends with a Conclusion & Looking Ahead subsection. In between these subsections, the topics are organized sequentially. Most of the subsections are required when working towards a certificate of completion, but there are also optional segments for those interested in learning more. These topics (listed in the Course Section Outline below) include lectures highlighting key concepts that are summarized under the Definition of Terms menu item, knowledge checks, polls, a case study simulation, and discussion activities. § The Introduction includes a weekly guide that lists the key questions to be addressed in that course section. It also lists the optional readings you can use to supplement your learning. The weekly guide is then followed by the faculty member’s introduction of the section's topic under study. § For the optional readings, students must access these materials outside the edX platform. § The Conclusion & Looking Ahead provides you with a listing of the key learning outcomes related to that particular section of the course. It features the faculty member’s summary of key points and considerations in relation to the topics addressed. The overall course content outline follows. For a complete listing of the sections, including list of key questions and readings, see Appendix A.

4 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018

COURSE SECTION OUTLINE 1. What is Terrorism and Who Are The Terrorists? + Strategies, Tactics, and Technology Use This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. We will also explore the various strategies and common tactics employed by most terrorist organizations as well as terrorist use of technology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. This section will also feature Professor Byman’s interview with terrorism scholar Jacob Shapiro, which is optional for class participants.

2. Al-Qaeda This section of the course explores the most important modern terrorist group –Al Qaeda—and its historical evolution, goals, strengths, and weaknesses. It also details how Al-Qaeda fits in with the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co- founder Rita Katz.

3. Islamic State This section of the course explores discusses the group known as the Islamic State, ISIS, ISL, or DAESH. The lectures will examine the circumstances surrounding the Islamic State’s emergence and the catalysts for its origin. This section will analyze the Islamic State’s goals, strategy, and tactics and how it differs from other terrorist organizations.

4. Intelligence and Counterterrorism Instruments This section of the course explores the role of intelligence in counterterrorism operations and considers several important post-9/11 controversies such as surveillance and torture. We will also explore various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ-1 Predator Pilot Major David Blair, USAF and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate.

5. LEARN MORE: Counterterrorism and the Rule of Law (Optional) This section of the course explores the implications of U.S. domestic and international law for counterterrorism.

5 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 WHAT WILL I LEARN IN THE COURSE? The course is designed to help you achieve the following learning goals and objectives. ¨ Recall the working definitions of terrorism and recognize their analytic limits; ¨ Identify a range of causes of terrorism and, as importantly, understand what commonly cited issues are not usually causes; ¨ Understand the strategies and tactics of terrorist groups; ¨ Identify important terrorist groups in the Middle East with an understanding of their strengths, weaknesses, and overall effectiveness; ¨ Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism.

WHAT SHOULD WE EXPECT FROM EACH OTHER?

WHAT YOU CAN EXPECT FROM PROFESSOR BYMAN AND THE COURSE TEAM Teaching Assistants will regularly participate in discussion boards to provide content clarification, guidance, and support. We will also be providing occasional current events news briefs, in addition to posting relevant news stories surrounding terrorism and counterterrorism on our social media outlets – Facebook and Twitter. WHAT YOU CAN EXPECT FROM EDX In the event of a technical problem, you should click the “Help” tab located on the left border of the screen (Figure 1). This “Help” tab opens an instruction box that directs you to student Frequently Asked Questions (FAQs) for general edX questions. You can also: § Report a problem § Make a suggestion § Ask a question You may post technical problems to the “Technical” thread of the discussion board. Finally, you may also contact [email protected] directly to report bugs. Figure 1: Screenshot with Help tab WHAT WE EXPECT FROM YOU Students should spend around eight to ten (8-10) hours per section to review optional readings, watch lectures, work through knowledge checks and other activities, including the discussion threads, polling questions, and keeping informed of current events surround terrorism and counterterrorism. In each course section we have included activities to support you in reaching the specified learning objectives for that section. The graded activities are categorized as knowledge checks; these are the activities that are counted toward achieving the certificate for the course. They include: • Multiple answer questions; • Multiple choice questions; • Peer instruction questions; • True/False questions; and 6 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 • Self-assessment open response questions. To receive a course certificate, you must complete/submit all graded assignments by March 24, 2018 (by 23:59 UTC) and receive a score of 75 percent or higher. To supplement the graded knowledge check activities listed above, we have also included other components to enable learners to explore the subject matter more deeply. These include: • Gauge your knowledge questions; • Recap challenge questions; • Discussion questions; and • Polling questions

All activities included in the course are designed to help you gauge your learning as a result of your interaction with the course content both from the video lectures and readings. Instructions on how to complete the activities are included within each course section. TIMELINE As part of this self-paced course, you are invited to complete the course on your own timeline and at your own pace. Our only due date is March 1, 2018, which marks the last day this course is available as a live course. Until then, you may submit assignments and participate in knowledge checks at your own pace. Take a look at our suggested path below for engaging with the course on a section-by-section basis.

Each section begins on Study the course Take Part in the your timeline content Activities Review the section Read the assigned Complete the guide readings for the knowledge checks Watch the course week Participate in the video introduction Watch the video discussions and lectures polls Use the Student Participate in gauge Lecture Notes area your knowledge to highlight key questions points

Figure 2: Suggested engagement

NETIQUETTE GUIDELINES Please be respectful To promote the best educational experience possible, we ask each student to respect the opinions and thoughts of other students and be courteous in the way that you choose to express yourself. Terrorism and Counterterrorism topics elicit – and should elicit -- passionate and controversial debates. However, informed debate should never give way to insult, rudeness, or anything that might detract from the learning process. GUIX-501-03x students should be respectful and considerate of all opinions.

7 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 In order for us to have meaningful discussions, we must learn to understand what others are saying and be open-minded about others’ opinions. If you want to persuade someone to see things differently, it is much more effective to do so in a polite, non-threatening way rather than to do so antagonistically. Everyone has insights to offer based on his/her experiences, and we can all learn from each other. Civility is essential: Our teaching assistants can, and will, remove students from the class who detract from the learning process with insulting comments on the course-wise discussion boards. Look before you write Prior to posting a question or comment on the discussion board, the Georgetown course team asks that you look to see if any of your classmates have the same question. Upvote questions that are similar to your own or that are also of interest to you, instead of starting a new thread. This will greatly help our Georgetown TAs best monitor the discussions and bring important questions to Professor Byman’s attention. Use the discussion board for course-related posts only Although we encourage students to get to know each other, please use the discussion board as a for course content conversations only. Properly and promptly notify us of technical issues Although we do not predict technical issues, they can and may happen. To make sure these receive prompt attention, post details about any technical issues directly on the “Technical” discussion thread or email [email protected] directly.

ACADEMIC INTEGRITY Observe edX and GeorgetownX’s honor policies Although collaboration and conversation will certainly contribute to your learning in the course, we ask students to refrain from collaborating with or consulting one another on any graded material for the course. Violations of the honor policy undermine the purpose of education and the academic integrity of the course. We expect that all work submitted will be a reflection of one’s own original work and thoughts. GeorgetownX faculty and staff expect all members of the community to strive for excellence in scholarship and character.

8 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018

APPENDIX A: DETAILED COURSE SECTION OUTLINE

1. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS? + STRATEGIES, TACTICS, AND TECHNOLOGY USE

This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. We will also explore the various strategies and common tactics employed by most terrorist organizations as well as terrorist use of technology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. This section will also feature Professor Byman’s interview with terrorism scholar Jacob Shapiro, which is optional for class participants.

KEY QUESTIONS: ¨ Why is terrorism so difficult to define? ¨ How have definitions of terrorism changed over time? ¨ What are the common, core elements of terrorism as a means to build a definition? ¨ What are the differences and similarities between terrorism and guerrilla warfare? ¨ What are the core definitional requirements of terrorism? ¨ Why do people become terrorists? ¨ What is the process that results in an individual’s radicalization and then recruitment? ¨ How do terrorists justify the violence they commit? ¨ Why is it so difficult, if not impossible, to develop a common set of reasons for why someone becomes a terrorist? ¨ What are the different strategies that terrorist groups use to advance their objectives? ¨ What are the strengths and weaknesses of the various strategies? ¨ Why does terrorism essentially functions in a technological vacuum compared with modern warfare? ¨ What are the reasons for terrorists’ operational conservatism? ¨ How do ease and low cost affect terrorist planning and operations? ¨ Why do terrorists avoid sophisticated technologies when they innovate? ¨ What role does publicity play in fostering terrorist innovation? ¨ Why are terrorists rarely attracted to more sophisticated technologies and Weapons of Mass Destruction (WMD)?

OPTIONAL READINGS: ¨ Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 3nd edition, 2017), pp. 1-44 , 242-268, and 298-331. ¨ John Mueller, The Atomic Terrorist, CATO Institute. January 2010. ¨ The United States Department of State, Country Reports on Terrorism (Washington, D.C., 2016). p. xvi only [including the footnote]. ¨ Central Intelligence Agency, “Terrorist CBRN: Materials and Effects,” June 2008. 9 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 ¨ Joby Warrick and Loveday Morris, “How ISIS nearly stumbled on the ingredients for a ‘dirty bomb’,” July 22, 2017 https://www.washingtonpost.com/world/national-security/how- isis-nearly-stumbled-on-the-ingredients-for-a-dirty-bomb/2017/07/22/6a966746-6e31-11e7-b9e2- 2056e768a7e5_story.html?utm_term=.5133fae9945e

2. AL-QAEDA

This section of the course explores the most important modern terrorist group – Al-Qaeda – and its historical evolution, goals, strengths, and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co-founder Rita Katz.

KEY QUESTIONS: ¨ How has Al-Qaeda evolved over time? ¨ Why did Al-Qaeda conduct the 9/11 attacks and how did it adjust to setbacks it suffered in the attacks’ aftermath? ¨ What are Al-Qaeda’s key organizational goals? ¨ What are some of the key traits and characteristics of senior Al-Qaeda leaders and their supporters? ¨ Why do groups affiliate with Al-Qaeda and what are common limits to cooperation between affiliates and the core organization?

OPTIONAL READINGS: ¨ Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist Movement (United Kingdom: Oxford University Press, 2015), selected pages: pp.13-14, 25-27, 47-50, 57-59, 82-83, 109-110, 157-162. ¨ National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), The 9/11 Commission Report (Norton: 2004), "The Foundation of New Terrorism," pp. 47-70. ¨ National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), "Al Qaeda Aims at the American Homeland," pp. 145-173. ¨ Lawrence Wright, “The Man Behind Bin Laden,” The New Yorker (September 16, 2002). ¨ Bruce Hoffman and Fernando Reinares, "Conclusions," The Evolving Global Terrorism Threat. Cases from 9/11 to 's Death (Columbia University Press: New York, 2014). ¨ Daniel Byman “Breaking the Bonds between Al Qaeda and Its Affiliate Organizations,” (Brookings 2012). ¨ Peter Bergen and Paul Cruickshank, “The Unraveling: Al-Qaeda’s Revolt against Bin Ladin,” The New Republic, June 2008.

3. THE ISLAMIC STATE

In this section of the course, we are discussing the group known as the Islamic State, ISIS, ISL, or DAESH. We will examine the circumstances surrounding the Islamic State’s emergence and the catalysts for its origin. Moreover, this section will analyze the Islamic State’s goals, strategy, and tactics and how it differs from other terrorist organizations.

10 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 KEY QUESTIONS: ¨ What are the origins of the Islamic State and how did it emerge? ¨ What does the Islamic State want? What are some of their core beliefs? ¨ What were the key shifts that occurred in , the surrounding countries, and the corresponding jihadist movement that contributed to the rise of the Islamic State? ¨ What are the strengths of the Islamic State? ¨ How does the Islamic State organize itself? ¨ How is the Islamic State different from Al-Qaeda? From other terrorist organizations? ¨ What role do foreign fighters have in this organization? ¨ How has the Islamic State used social media to further its organization and the message it promotes? ¨ What are some of the key questions that should be considered when determining a strategy to fight the Islamic State?

OPTIONAL READINGS: ¨ Daniel Byman and Jennifer Williams, “ISIS vs. Al Qaeda: Jihadism’s Global Civil War,” The National Interest, Iss. 136, pp. 10-18 (March/April 2015). http://nationalinterest.org/feature/isis-vs-al-qaeda- jihadism%E2%80%99s-global-civil-war-12304 ¨ Graeme Wood, “What ISIS Really Wants,” The Atlantic (March 2015) https://www.theatlantic.com/magazine/archive/2015/03/what-isis-really-wants/384980/ ¨ William McCants, “The Believer: How an Introvert With a Passion for Religion and Soccer Became Abu Bakr Al-Baghdadi Leader of the Islamic State,” Brookings (September 2015) http://csweb.brookings.edu/content/research/essays/2015/thebeliever.html ¨ Joby Warrick, Black Flags: The Rise of ISIS (Anchor, 2016) entire.

4. INTELLIGENCE AND COUNTERTERRORISM INSTRUMENTS

In this section of the course, we are exploring the role of intelligence in counterterrorism operations. We are also exploring various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limits. This section will also feature Professor Fair's optional subsection interview with New York Times reporter Mark Mazzetti on U.S. targeted killings as a counterterrorism instrument, as well as an optional subsection on renditions and interviews with MQ-1 Predator Pilot Major David Blair, USAF, and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes, Juan Zarate.

KEY QUESTIONS: ¨ What are the purposes that intelligence serves in counterterrorism? ¨ What are the limits of intelligence in counterterrorism? ¨ What are the standards of success and failure regarding counterterrorist intelligence? ¨ What governmental organizations contribute to counterterrorist intelligence, especially in the United States, and how have they changed? ¨ What are the various instruments used in counterterrorism?

11 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 ¨ What are the principal ways in which each instrument is used? ¨ What are the contributions and advantages of each instrument? ¨ What are the limitations and disadvantages of each instrument? ¨ How are these counterterrorism instruments used together in a complementary way? ¨ What are the limits of alternative counterterrorism instruments to drone strikes?

OPTIONAL READINGS: ¨ Audrey Kurth Cronin, "Why Drones Fail,” Foreign Affairs (July/August 2013). ¨ Daniel Byman, "Why Drones Work,” Foreign Affairs (July/August 2013). ¨ Daniel Byman, "The Intelligence War on Terrorism," Intelligence and National Security (2013). ¨ Paul R. Pillar, "Counterterrorist Instruments," in Terrorism and U.S. Foreign Policy (Washington, D.C.: Brookings, 2003), Chapter 4. ¨ Gabriella Blum and Philip B. Heymann, "Interrogation," in Laws, Outlaws, and Terrorists (Massachusetts: MIT Press, 2010), Chapter 6. ¨ Daniel Byman, "Diplomacy," in The Five Front War: The Better Way To Fight Global Jihad, New York: Wiley, 2007), Chapter 8. ¨ Michael Scheuer Testimony in "Extraordinary Rendition in U.S. Counterterrorism Policy: The Impact on Transatlantic Relations," House Foreign Affairs Committee, April 17, 2007. Read the Question and Answer session! ¨ Paul R. Pillar and Christopher Preble, "Don't You Know There's a War On? Assessing the Military's Role in Counterterrorism," in Benjamin H. Friedman, Jim Harper, and Christopher A. Preble (eds.), Terrorizing Ourselves (Washington, D.C.: Cato Institute, 2010). ¨ Richard A. Posner, “Principles of Intelligence,” Preventing Surprise Attacks (Rowman & Littlefield, 2005), Chapter 4.

5. COUNTERTERRORISM AND THE RULE OF LAW (LEARN MORE SECTION)

This section of the course explores the implications of U.S. domestic and international law for counterterrorism.

KEY QUESTIONS: ¨ What are the laws of war and how do they related to counterterrorism? ¨ What is the impact of criminal law on counterterrorism? ¨ What legal authorities govern which government agencies? ¨ How do the roles of various government agencies differ? ¨ How does the law affect targeted killings? ¨ How does the law affect interrogations? ¨ How does the law affect the use of force?

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.)

12 of 13

GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 ¨ Daniel O'Donnell, "International Treaties Against Terrorism and the Use of Terrorism During Armed Conflict and by Armed Forces," International Review of Red Cross, Vol. 88, No. 864, December 2006. ¨ United Nations Security Council, Resolution 1373, September 28, 2001. ¨ U.S. Constitution. ¨ U.S. Supreme Court, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (The Steel Seizure Case), with particular attention on Justice Jackson's tripartite framework and Chief Justice Vinson's dissent. ¨ U.S. Supreme Court, United States v. Curtis-Wright Export Corp, 299 U.S. 304 (1936). ¨ U.S. Supreme Court, New York Times Co. v. United States, 403 U.S. 713 (1971). ¨ U.S. Supreme Court, Katz v. United States, 389 U.S. 347 (1967). ¨ U.S. Supreme Court, U.S. v. U.S. District Court, 407 U.S. 297 (1972).

13 of 13