TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 – DECEMBER 2, 2015

Course Syllabus GeorgetownX

August 31, 2015

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 TABLE OF CONTENTS Core Faculty ...... 2 Interviews ...... 4 Faculty Support Team ...... 4 What is the course about? ...... 5 Key Questions ...... 5 What does the course include? ...... 5 Course Section Outline ...... 6 What will I learn in the course? ...... 8 What should we expect from each other? ...... 8 What you can Expect from Professor Byman and the course team ...... 8 What you can expect from edX ...... 8 What we expect from you ...... 8 Appendix A: Detailed Course Section Outline ...... 11 1. What is Terrorism and Who are the Terrorists? (Release: September 24, 2015) ...... 11 2. Stratgies, Tactics, and Technology Use (Release: October 1, 2015) ...... 12 3. Al-Qaeda (Release: October 8, 2015) ...... 12 4. Islam (Release: October 15, 2015) ...... 13 5. Area studies: (Release: October 22, 2015) ...... 14 6. Area studies: South Asia (Release: October 29, 2015) ...... 15 7. Counterterrorism and The Rule of Law (Release: November 5, 2015) ...... 15 8. Intelligence and Counterterrorism (Release: November 12, 2015) ...... 16 9. Counterterrorism Instruments (Release: November 19, 2015) ...... 17 Appendix B: Learning Checklist ...... 19 What is Terrorism and Who are the Terrorists– Section 1: September 24-31 ...... 19 Strategies, Tactics, and Technology Use – Section 2: October 1-7 ...... 19 Al-Qaeda – Section 3: October 8-14 ...... 19 Islam – Section 4: October 15-21 ...... 19 Area studies: The Terrorist Threat to Israel and the Israeli response– Section 5: October 22-28 ...... 20 Area Studies: Terrorism and Counterterrorism in South Asia– Section 6: October 29-November 4 ...... 20 Counterterrorism and the Rule of Law – Week 7: November 5-11 ...... 20 Intelligence and Counterterrorism – Section 8: November 12- 19, 2013 ...... 20 Counterterrorism Instruments – Section 9: November 20- 26, 2013 ...... 21

1 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015

TERRORISM AND COUNTERTERRORISM What is the danger of terrorism, and how can the world respond effectively?

NOTE: The course will be archived for the following duration: October 1, 2015 – May 13, 2016. No certificates will be issued for work completed after December 2, 2015.

CORE FACULTY • Daniel L. Byman Dr. Byman is a Professor in the Security Studies Program of the Walsh School of Foreign Service at Georgetown University and the Research Director of the Brookings Institution’s Center for Middle East Policy. Dr. Byman served as a Professional Staff Member with the National Commission on Terrorist Attacks on the United States (the “9/11 Commission”) and the Joint 9/11 Inquiry Staff of the House and Senate Intelligence Committees. He also worked as the Research Director of the Center for Middle East Public Policy at the RAND Corporation and as a Middle East analyst for the U.S. intelligence community. Dr. Byman received his B.A. in religion from Amherst College and his Ph.D. in political science from the Massachusetts Institute of Technology. Follow him @dbyman.

§ Jonathan Brown Dr. Jonathan Brown is a Prince Alwaleed Bin Talal Professor of Islamic Civilization in the Center for Muslim- Christian Understanding at Georgetown University, a term member of the Council on Foreign Relations, Editor- in-Chief of the Oxford Encyclopedia of Islamic Law, and publisher of several books and articles on the Hadith, Islamic law, Sufism, Arabic lexical theory and Pre-Islamic poetry. Dr. Brown's current research interests include the history of forgery and historical criticism in Islamic civilization, comparison with the Western tradition; and modern conflicts between Late Sunni Traditionalism and Salafism in Islamic thought. Dr. Brown received his B.A. in history from Georgetown University and his Ph.D. in near eastern languages and civilizations from the University of Chicago.

§ John Esposito Founding Director of the Prince Alwaleed Bin Talal Center for Muslim-Christian Understanding, John Esposito specializes in Islamic studies, religion, and international affairs as a Professor at Georgetown University. Esposito's research is published in more than 45 books and monographs, including Unholy War: Terror in the Name of Islam and The Future of Islam, translated into over 35 languages. Past President of the Middle East Studies Association and the American Academy of Religion, a member of the E. C. European Network of Experts on De-Radicalisation, the board of C-1 World Dialogue, an ambassador for the UN Alliance of Civilizations, Esposito is Editor-in-Chief of Oxford Islamic Studies Online, The Oxford Encyclopedia of the Islamic World and other Oxford reference works on the Islamic world and Islamic Studies.

§ Christine Fair C. Christine Fair is a Georgetown Security Studies Program Assistant Professor, where she focuses on South Asian political and military affairs. Fair previously worked at the RAND Corporation, United Nations Assistance 2 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Mission to Afghanistan in Kabul, and at USIP’s Center for Conflict Analysis and Prevention. Fair has as authored, co-authored and co-edited several books, is a member of the Council on Foreign Relations, Women in International Security, International Studies Association, American Political Science Association, and American Institute of Pakistan Studies. She serves on the editorial board of numerous journals, and is a senior fellow with the Combating Terrorism Center at West Point. Fair received her PhD and MA from the University of Chicago. Her most recent book is Fighting to the End: The Pakistan Army’s Way of War (Oxford University Press, 2014). Many of her other publications can be found at christinefair.net

§ Bruce Hoffman Bruce Hoffman is a Professor and Director of both the Center for Security Studies and the Security Studies Program at Georgetown University. Professor Hoffman is currently a member of the National Security Preparedness Group; a Global Scholar at the Woodrow Wilson International Center for Scholars; a Senior Fellow at the Combating Terrorism Center; a Visiting Professor at the International Institute for Counter- Terrorism, Herzliya, Israel and at the Handa Centre for the Study of Terrorism and Political Violence at St Andrews University, Scotland ; and serves in various editing capacities at The National Interest, Studies in Conflict and Terrorism, and the Columbia University Press Series on Terrorism and Irregular Warfare. Hoffman was awarded the United States Intelligence Community Seal Medallion in 1994 from the Director of Central Intelligence. Follow him @hoffman_bruce.

§ Fathali M. Moghaddam Fathali M. Moghaddam is Professor, Department of Psychology, Georgetown University, and Editor-in-Chief of Peace and Conflict: Journal of Peace Psychology (American Psychological Association). Moghaddam was born in , educated from an early age in England, and worked for the United Nations and McGill University before joining Georgetown University in 1990. He has published extensively on radicalization, intergroup conflict, and the psychology of dictatorship and democracy. His most recent book is The Psychology of Dictatorship (2013), which received Honorable Mention, 2013 Prose Awards for Professional and Scholarly Excellence. Moghaddam has received a number of recognitions for his scholarly contributions, the most recent being the Outstanding International Psychologist Award for 2012 from the American Psychological Association’s Division of International Psychology.

§ Paul R. Pillar In 2005, Paul Pillar retired after a 28-year intelligence career in positions such as National Intelligence Officer for the Near East and South Asia; Chief of Analytic Units at the Central Intelligence Agency (CIA); an original member of the National Intelligence Council’s Analytic Group; Executive Assistant to CIA's Deputy Director for Intelligence; Executive Assistant to Director of Central Intelligence William Webster; and Head of Assessments and Information Group and Deputy Chief of the DCI Counterterrorist Center. Pillar is a retired officer in the U.S. Army Reserve and a former core faculty member at Georgetown University Security Studies Program. He received his B.A. from Dartmouth College, his Ph.D. from Princeton University, and a B.Phil. from Oxford University. § Benjamin Wittes Benjamin Wittes is a senior fellow in Governance Studies at The Brookings Institution. He co-founded and is the editor-in-chief of the Lawfare blog, which is devoted to sober and serious discussion of "Hard National

3 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Security Choices," and is a member of the Hoover Institution's Task Force on National Security and Law. He is the author of Detention and Denial: The Case for Candor After Guantanamo, published in November 2011, co- editor of Constitution 3.0: Freedom and Technological Change, published in December 2011, and editor of Campaign 2012: Twelve Independent Ideas for Improving American Public Policy (Brookings Institution Press, May 2012). He is also writing a book on data and technology proliferation and their implications for security. He is the author of Law and the Long War: The Future of Justice in the Age of Terror, published in June 2008 by The Penguin Press, and the editor of the 2009 Brookings book, Legislating the War on Terror: An Agenda for Reform.

INTERVIEWS

§ Jacob Shapiro, Associate Professor, Princeton University and author of The Terrorist’s Dilemma: Managing Violent Covert Organizations. § Juan Zarate, Senior Adviser, Center for Strategic and International Studies, and former first Secretary of Treasury for Terrorism Financing and Financial Crimes § Major David Blair, USAF, MQ-1 Predator Pilot, United States Air Force § Mark Mazzetti, New York Times Reporter and author of The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth. § Peter Neumann, Professor, King’s College London, and Director, International Centre for the Study of Radicalisation § Rita Katz, Co-founder, SITE Intelligence Group

FACULTY SUPPORT TEAM § Marc Meyer, Course Manager and Lead Teaching Assistant Marc Meyer is a M.A. candidate in the Security Studies Program at Georgetown University, focusing on terrorism and sub-state violence. He also works as Dr. Daniel Byman’s research assistant, concentrating on terrorism and insurgency worldwide. He has worked in various capacities at the Government Accountability Office (GAO), US House of Representatives and the US Marshals Service. He received his B.A. in Law, Societies and Justice with a minor in comparative religion from the University of Washington-Seattle.

§ Kait Williamson, Teaching Assistant Kait Williamson is an MA Candidate in the Communication, Culture, & Technology program at Georgetown University, specializing in conflict studies through media, terrorism propaganda, and data analytics. Kait works for the PeaceTech Lab, a nonprofit created by the United States Institute of Peace. With a background in PR and politics Kait has previous experience in Governor Chris Christie's Press Office. She has worked in various cultures from London to Qatar, utilizing her foreign/public affairs skills and political knowledge.

§ Natalia Peña, Teaching Assistant Natalia Peña is an M.A. candidate in the Security Studies Program at Georgetown University, where she focuses on terrorism and sub-state violence. Prior to studying at Georgetown, Natalia has previously worked in

4 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 the Massachusetts House of Representatives and the Plymouth County District Attorney's Office. Her research interests include regional security in the Middle East, Islam, and the evolution and use of radical ideology. She graduated from Boston College with a double major in Political Science and Islamic Civilization and Societies.

WHAT IS THE COURSE ABOUT?

Terrorism has gone from a persistent yet marginal security concern to one of the most important security problems of our day: indeed, there are few countries that do not suffer from some form of terrorism. Though many terrorist attempts fail, some groups wage lengthy and bloody campaigns and, in exceptional cases, kill hundreds or even thousands in pursuit of their ends.

Course topics include the nuances involved in defining terrorism, the nature of Al-Qaeda, , and other important groups, the effectiveness of different counterterrorism tools like detention and military force, linkages (or the lack thereof) between terrorism and world religions like Islam, terrorist recruiting, the rule of law, the political context in South Asia and the Middle East, and terrorist use of technology.

KEY QUESTIONS • What is terrorism, and what are the components of different definitions? • What are common causes of terrorism? • What are common strategies and tactics of terrorism? How do terrorist groups respond to technological change? • What are common weaknesses of terrorist groups? Why do these occur? • What are the primary terrorism and counterterrorism challenges related the India-Pakistan confrontation? • What are the primary terrorism and counterterrorism lessons related to the Israeli-Palestinian confrontation? • What is the nature of Al-Qaeda, and why has it proven such a difficult adversary? • What is the relationship between Islam and violence? • What is the role of intelligence in counterterrorism? • What are the strengths and weaknesses of different counterterrorism instruments? • How can you fight terrorism in accord with the rule of law? • Under what conditions does terrorism "work”? • How serious a problem is terrorism? In what ways does it manifest?

WHAT DOES THE COURSE INCLUDE? Each section of the course listed in the Course Section Outline below begins with an Introduction subsection and ends with a Conclusion & Looking Ahead subsection. In between these subsections, the topics are organized sequentially. Most of the subsections are required when working towards a certificate of completion, but there are also optional segments for those interested in learning more. Further, Section 5 5 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 focuses on a geographical region plagued by terrorism. This section presents the learners with two options, one of which will be required for certificate of completion. Students can choose their area studies focus to be on either Israel and the Palestinians or South Asian terrorism. These topics (listed in the Course Section Outline below) include lectures highlighting key concepts that are summarized under the Definition of Terms menu item, knowledge checks, polls, a case study simulation, and discussion activities. § The Introduction includes a weekly guide that lists the key questions to be addressed in that course section. It also lists the readings, which may be links to external website or PDF files. The weekly guide is then followed by the faculty member’s introduction of the section's topic under study. § The Conclusion & Looking Ahead provides you with a listing of the key learning outcomes related to that particular section of the course. It features the faculty member’s summary of key points and considerations in relation to the topics addressed. In addition, this subsection offers you the opportunity to ask clarifying questions on the specific subsection or overall course material that will be collected by course teaching assistants and answered by Professor Byman or another expert. § The Simulation will come once the course after the course has been completed, and prompts students to engage in a fictional case study and conduct a threat assessment. This is optional for learners, but will help reinforce key concepts learned throughout the course by drawing on course content and readings to complete the threat assessment. The overall course content outline follows. Note that numbered sections listed below are released on a weekly basis. These dates are listed next to each topic. For a complete listing of the weeks, including list of key questions and readings, see Appendix A.

COURSE SECTION OUTLINE 1. What is Terrorism and Who Are The Terrorists? (Release: September 24, 2015) This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann. 2. Strategies, Tactics, and Technology Use (Release: October 1, 2015) This section of the course explores the various strategies and common tactics employed by most terrorist organizations as well as terrorist use of technology. This section will also feature Professor Byman’s interview with terrorism scholar Jacob Shapiro, which is optional for class participants. 3. Al-Qaeda (Release: October 8, 2015) This section of the course explores the most important modern terrorist group -- Al-Qaeda – and its historical evolution, goals, strengths and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co-founder Rita Katz. 4. Islam (Release: October 15, 2015) This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam – Salafism. 5. Area Studies: Israel/Palestine (Release: October 22, 2015) This section of the course explores the terrorist threat to Israel and the Israeli response. 6. Area Studies: South Asia (Release: October 29, 2015)

6 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 This section of explores terrorism and counterterrorism in South Asia. 7. Counterterrorism and the Rule of Law (Release: November 5, 2015) This section of the course explores the implications of U.S. domestic and international law for counterterrorism. 8. Intelligence and Counterterrorism (Release: November 12, 2015) This section of the course explores the role of intelligence in counterterrorism operations and considers several important post-9/11 controversies such as surveillance and torture.

9. Counterterrorism Instruments (Release: November 19, 2015) This section of the course explores various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ-1 Predator Pilot Major David Blair, USAF and former Assistant Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate .

7 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 WHAT WILL I LEARN IN THE COURSE? The course is designed to help you achieve the following learning goals and objectives. ¨ Recall the working definitions of terrorism and recognize their analytic limits; ¨ Identify a range of causes of terrorism and, as importantly, understand what commonly cited issues are not usually causes; ¨ Understand the strategies and tactics of terrorist groups; ¨ Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda; ¨ Understand the relationship between religion and terrorism; and ¨ Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism.

A Learning Checklist that organizes the learning goals above with the learning objectives for each of the course sections is available to you in Appendix B of this syllabus. Use this to help you determine what you are learning in the course. In addition, Appendix C of this syllabus includes the Definition of Terms handout that highlights the key terms used throughout the course.

WHAT SHOULD WE EXPECT FROM EACH OTHER?

WHAT YOU CAN EXPECT FROM PROFESSOR BYMAN AND THE COURSE TEAM Every week, Professor Byman will address the top five student questions, which will be emailed to you every week and posted in the ‘updates’ section. Instructions for posting questions for Professor Byman are included in the Conclusion & Looking Ahead subsections. In addition, Teaching Assistants will regularly participate in discussion boards to provide content clarification, guidance, and support. We will be providing regular updates and reminders in the Course Info page beyond Professor Byman’s weekly response to your questions. We will also be providing weekly current events news briefs, in addition to posting relevant news stories surrounding terrorism and counterterrorism on our social media outlets – Facebook and Twitter. WHAT YOU CAN EXPECT FROM EDX In the event of a technical problem, you should click the “Help” tab located on the left border of the screen (Figure 1). This “Help” tab opens an instruction box that directs you to student Frequently Asked Questions (FAQs) for general edX questions. You can also: § Report a problem § Make a suggestion § Ask a question You may post technical problems to the “Technical” thread of the discussion board. Finally, you may also contact [email protected] directly to report bugs. Figure 1: Screenshot with Help tab WHAT WE EXPECT FROM YOU

8 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Students should spend around eight to ten (8-10) hours per week to review assigned readings, watch weekly lectures, work through weekly knowledge checks and other activities, including the discussion threads, polling questions, and keeping informed of current events surround terrorism and counterterrorism. In each course section we have included activities to support you in reaching the specified learning objectives for that section. The graded activities are categorized as knowledge checks; these are the activities that are counted toward achieving the certificate for the course. They include: • Multiple answer questions; • Multiple choice questions; • True/False questions; and • Self-assessment open response questions. To receive a course certificate, you must complete/submit all graded assignments by December 2nd, 2015 at 9:00 EDT/13:00 UTC and receive a score of 75 percent or higher. To supplement the graded knowledge check activities listed above, we have also included other components to enable learners to explore the subject matter more deeply. These include: • Discussion questions; • Polling questions; and • Case study simulation: We have also created a case study simulation that draws upon each section to apply concepts learned in the class. The simulation places the student in the position of an employee at a (fictional) intelligence service tasked with stopping a potential terrorist attack. Students are encouraged to consider the case study in light of the course's content material and which concepts apply to the individual at question. All activities included in the course are designed to help you gauge your learning as a result of your interaction with the course content both from the video lectures and readings. Instructions on how to complete the activities are included within each course section. WEEKLY TIMELINE The due dates for submission for all activities are listed in each course section. Since the course opens on September 24th (Thursday), our weeks are from Thursday to Wednesday. Take a look at our suggested path below for engaging with the course on a weekly basis.

Each week begins on Thursday at 9:00 Study the course Take Part in the Each week ends EDT/13:00 UTC content Acvies on Wednsday Review the Read the Complete the Review course weekly guide assigned readings knowledge materials Watch the course for the week checks Finish any video Watch the video Parcipate in the pending acvies introducon lectures discussions and Submit any Use the Student polls clarifying Lecture Notes Consider the case quesons for the area to highlight study in light of week for key points the week's Professor Byman content material by at 9:00 EDT/ 13:00 UTC

Figure 2: Suggested weekly engagement

9 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015

NETIQUETTE GUIDELINES Please be respectful To promote the best educational experience possible, we ask each student to respect the opinions and thoughts of other students and be courteous in the way that you choose to express yourself. Terrorism and Counterterrorism topics elicit – and should elicit -- passionate and controversial debates. However, informed debate should never give way to insult, rudeness, or anything that might detract from the learning process. GUIX-501-02x students should be respectful and considerate of all opinions. In order for us to have meaningful discussions, we must learn to understand what others are saying and be open-minded about others’ opinions. If you want to persuade someone to see things differently, it is much more effective to do so in a polite, non-threatening way rather than to do so antagonistically. Everyone has insights to offer based on his/her experiences, and we can all learn from each other. Civility is essential: Our teaching assistants can, and will, remove students from the class who detract from the learning process with insulting comments on the course-wise discussion boards. Look before you write Prior to posting a question or comment on the discussion board, the Georgetown course team asks that you look to see if any of your classmates have the same question. Upvote questions that are similar to your own or that are also of interest to you, instead of starting a new thread. This will greatly help our Georgetown TAs best monitor the discussions and bring important questions to Professor Byman’s attention. Use the discussion board for course-related posts only Although we encourage students to get to know each other, please use the discussion board as a for course content conversations only. Properly and promptly notify us of technical issues Although we do not predict technical issues, they can and may happen. To make sure these receive prompt attention, post details about any technical issues directly on the “Technical” discussion thread or email [email protected] directly.

ACADEMIC INTEGRITY Observe edX and GeorgetownX’s honor policies Although collaboration and conversation will certainly contribute to your learning in the course, we ask students to refrain from collaborating with or consulting one another on any graded material for the course. Violations of the honor policy undermine the purpose of education and the academic integrity of the course. We expect that all work submitted will be a reflection of one’s own original work and thoughts. GeorgetownX faculty and staff expect all members of the community to strive for excellence in scholarship and character.

10 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015

APPENDIX A: DETAILED COURSE SECTION OUTLINE

1. WHAT IS TERRORISM AND WHO ARE THE TERRORISTS? (RELEASE: SEPTEMBER 24, 2015)

This section of the course explores the definitional debate surrounding terrorism, conditions that make individuals more susceptible to radicalization and eventual recruitment by terrorist groups, and terrorist psychology. There will also be an optional subsection interview with director of the International Centre for the Study of Radicalisation, Peter Neumann.

KEY QUESTIONS: ¨ Why is terrorism so difficult to define? ¨ How have definitions of terrorism changed over time? ¨ What are the common, core elements of terrorism as a means to build a definition? ¨ What are the differences and similarities between terrorism and guerrilla warfare? ¨ What are the core definitional requirements of terrorism? ¨ Why do people become terrorists? ¨ What is the process that results in an individual’s radicalization and then recruitment? ¨ How do terrorists justify the violence they commit? ¨ Why is it so difficult, if not impossible, to develop a common set of reasons for why someone becomes a terrorist? ¨ What are the roles of various situational and personality factors that shape terrorists?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 2nd edition, 2006), pp. 1-42 and pp. 229-256. ¨ Fathali M. Moghaddam, "The Staircase to Terrorism: A Psychological Exploration," American Psychologist, Iss. 2, (2005), pp. 161-169. ¨ R.F. Paloutzian & C. Park (Eds.), Moghaddam, F.M., Warren, Z., & Love, K., Religion and the Staircase to Terrorism, 2nd ed., pp. 632-648 (2013) in Handbook of the Psychology of Religion and Spirituality.

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Leonard Weinberg, et al., “The Challenges of Conceptualizing Terrorism,” Terrorism and Political Violence, vol. 16, no. 4 (2004), pp. 777-794. ¨ The United States Department of State, Country Reports on Terrorism (Washington, D.C., 2013). p. xvi only [including the footnote].

11 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 2. STRATGIES, TACTICS, AND TECHNOLOGY USE (RELEASE: OCTOBER 1, 2015)

This section of the course explores the various strategies and common tactics employed by most terrorist organizations, as well as terrorist use of technology. This section will also feature Professor Byman’s interview with terrorism scholar Jacob Shapiro, which is optional for class participants..

KEY QUESTIONS: ¨ What are the different strategies that terrorist groups use to advance their objectives? ¨ What are the strengths and weaknesses of the various strategies? ¨ Why does terrorism essentially functions in a technological vacuum compared with modern warfare? ¨ What are the reasons for terrorists’ operational conservatism? ¨ How do ease and low cost affect terrorist planning and operations? ¨ Why do terrorists avoid sophisticated technologies when they innovate? ¨ What role does publicity play in fostering terrorist innovation? ¨ Why are terrorists rarely attracted to more sophisticated technologies and Weapons of Mass Destruction (WMD)?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Bruce Hoffman, Inside Terrorism, Columbia University Press, 2nd. Edition (2006), pp. 267-281. ¨ John Parachini, "Putting WMD Terrorism into Perspective,” Washington Quarterly, Vol. 26, Iss. 4, pp. 37-50.

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Central Intelligence Agency, “Terrorist CBRN: Materials and Effects,” June 2008.

3. AL-QAEDA (RELEASE: OCTOBER 8, 2015)

This section of the course explores the most important modern terrorist group – Al-Qaeda – and its historical evolution, goals, strengths, and weaknesses as well as the broader jihadist movement. There will also be an optional subsection lecture featuring SITE Intelligence Group co-founder Rita Katz.

KEY QUESTIONS: ¨ How has Al-Qaeda evolved over time? ¨ Why did Al-Qaeda conduct the 9/11 attacks and how did it adjust to setbacks it suffered in the attacks’ aftermath? ¨ What are Al-Qaeda’s key organizational goals? ¨ What are some of the key traits and characteristics of senior Al-Qaeda leaders and their supporters? 12 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ Why do groups affiliate with Al-Qaeda and what are common limits to cooperation between affiliates and the core organization?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist Movement (United Kingdom: Oxford University Press, 2015), selected pages: pp.13-14, 25-27, 47-50, 57-59, 82-83, 109-110, 157-162. ¨ National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), The 9/11 Commission Report (Norton: 2004), "The Foundation of New Terrorism," pp. 47-70. ¨ National Commission on Terrorist Attacks upon the United States (the 9/11 Commission), "Al Qaeda Aims at the American Homeland," pp. 145-173. ¨ Lawrence Wright, “The Man Behind Bin Laden,” The New Yorker (September 16, 2002). ¨ Bruce Hoffman and Fernando Reinares, "Conclusions," The Evolving Global Terrorism Threat. Cases from 9/11 to 's Death (Columbia University Press: New York, 2014). ¨ "ISIS vs. Al Qaeda: Jihadism’s Global Civil War,” The National Interest, Iss. 136, pp. 10-18 (March/April 2015).

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Daniel Byman “Breaking the Bonds between Al Qaeda and Its Affiliate Organizations,” (Brookings 2012). ¨ Peter Bergen and Paul Cruickshank, “The Unraveling: Al-Qaeda’s Revolt against Bin Ladin,” The New Republic, June 2008.

4. ISLAM (RELEASE: OCTOBER 15, 2015)

This section of the course explores the relationship between Islam and violence and the attitudes of one particular school of thought within Islam – Salafism.

KEY QUESTIONS: ¨ Can Islam be viewed as a driver of terrorism? ¨ What does the term jihad mean, and what are the ways in which it has been used and/or exploited? ¨ What are the majority attitudes among Muslims towards terrorism in the name of Islam? ¨ How did the "global jihad," championed by Osama bin Laden and Al-Qaeda, emerge? ¨ What is the rationale for suicide bombing and how have Muslim religious leaders have responded? ¨ When is violent resistance in the name of jihad acceptable according to mainstream tradition? When is violence illegitimate? ¨ What is the basic nature of Salafism? ¨ What is the important difference between Salafism and mere backwardness? ¨ What is the place of Saudi Arabia in global Salafism?

13 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ Why are conservatism in religion and violence not inherently linked? ¨ How do seemingly arcane legal issues affect attitudes towards political legitimacy and the acceptability of violent uprisings?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ John L. Esposito, "Terrorism & the Rise of Political Islam," in Democracy & Terrorism: Vol. 1 The Roots of Terrorism, (ed.) Louise Richardson (London: Francis & Taylor, 2006). ¨ Mark Juergensmeyer, "Does Religion Cause Terrorism?" National Policy Forum on Terrorism, Security and America's Purpose - Washington, D.C., September 6-7, 2005. ¨ Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist Movement (United Kingdom: Oxford University Press, 2015), pp. 69-71

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Quintan Wictorowicz, "Anatomy of the Salafi Movement," Studies in Conflict and Terrorism 29, no. 3 (2006): pp. 207-239. ¨ John O. Voll, Foundations for Revival and Reform," in The Oxford History of Islam, ed. John L. Esposito, (Oxford: Oxford University Press, 1999), pp. 509-547. ¨ Ed. Basheer Nafi, "The Rise of Islamic Reformist Thought and its Challenge to Traditional Islam," in Islamic Thought in the Twentieth Century, ed. Suha Farouki and Basheer M. Nafi, (London: I.B. Tauris, 2004), pp. 28-60.

5. AREA STUDIES: ISRAEL (RELEASE: OCTOBER 22, 2013)

This section of the course explores the terrorist threat to Israel and the Israeli response.

KEY QUESTIONS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE ¨ What have Palestinian groups accomplished using terrorism? What have they failed to accomplish? ¨ What methods has Israel used to fight Palestinian terrorism? How do the methods work together? ¨ How has Israel gathered intelligence on suspected terrorists? ¨ What are the advantages and disadvantages of different Israeli counterterrorism instruments? ¨ How has terrorism interacted with the peace process?

REQUIRED READINGS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Daniel Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism (New York: Oxford University Press, 2011), pp. 29-76, 307-334, and 347-361.

14 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ Daniel Byman, "Curious Victory: Explaining Israel's Suppression of the Second Intifada," Terrorism and Political Violence (November 2012), pp. 825-852.

OPTIONAL READINGS FOR THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE: None.

6. AREA STUDIES: SOUTH ASIA (RELEASE: OCTOBER 29, 2013) This section of the course explores terrorism and counterterrorism in South Asia.”

KEY QUESTIONS: ¨ How has political Islam in Pakistan evolved? Consider in particular how the “Two Nation Theory” and the impact of the bloody process of partition shaped the two new states of India and Pakistan that emerged in 1947. ¨ What are the origins of Pakistan's “Non-State Actor Policy” in Kashmir, India and Afghanistan? ¨ Which are the main Pakistani militant groups operating in and from Pakistan? ¨ What is the role of nuclear weapons in facilitating Pakistan's Non-State Actor Policy in India and beyond? ¨ What are the questions and problems facing Pakistan as it tries to manage the spread of domestic Islamist terrorism while retaining its commitment to using Islamist militants outside of Pakistan to achieve its policy goals?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ C. Christine Fair, Fighting to the End: The Pakistan Army's Way of War (United Kingdom: Oxford University Press, 2014), Chapters 1, 3, 7, 8, & 9. ¨ Husain Haqqani, Pakistan: Between Mosque and Military, (Washington, D.C.: Carnegie Endowment for International Peace, 2005). Chapters 4, 5, 7, & 9.

OPTIONAL READINGS: None.

7. COUNTERTERRORISM AND THE RULE OF LAW (RELEASE: NOVEMBER 5, 2015)

This section of the course explores the implications of U.S. domestic and international law for counterterrorism.

KEY QUESTIONS: ¨ What are the laws of war and how do they related to counterterrorism? ¨ What is the impact of criminal law on counterterrorism? ¨ What legal authorities govern which government agencies? ¨ How do the roles of various government agencies differ? ¨ How does the law affect targeted killings? ¨ How does the law affect interrogations? 15 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ How does the law affect the use of force? REQUIRED Readings: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.)

¨ Daniel O'Donnell, "International Treaties Against Terrorism and the Use of Terrorism During Armed Conflict and by Armed Forces," International Review of Red Cross, Vol. 88, No. 864, December 2006. ¨ United Nations Security Council, Resolution 1373, September 28, 2001. ¨ U.S. Constitution. ¨ U.S. Supreme Court, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (The Steel Seizure Case), with particular attention on Justice Jackson's tripartite framework and Chief Justice Vinson's dissent.

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ U.S. Supreme Court, United States v. Curtis-Wright Export Corp, 299 U.S. 304 (1936). ¨ U.S. Supreme Court, New York Times Co. v. United States, 403 U.S. 713 (1971). ¨ U.S. Supreme Court, Katz v. United States, 389 U.S. 347 (1967). ¨ U.S. Supreme Court, U.S. v. U.S. District Court, 407 U.S. 297 (1972).

8. INTELLIGENCE AND COUNTERTERRORISM (RELEASE: NOVEMBER 12, 2013)

This section of the course explores the role of intelligence in counterterrorism operations and considers several important post-9/11 controversies such as surveillance and torture.

KEY QUESTIONS: ¨ What are the purposes that intelligence serves in counterterrorism? ¨ What are the limits of intelligence in counterterrorism? ¨ What are collection and analytic techniques that intelligence services use in counterterrorism? ¨ What are the strengths and weaknesses of different intelligence techniques? ¨ What are the standards of success and failure regarding counterterrorist intelligence? What governmental organizations contribute to counterterrorist intelligence, especially in the United States, and how have they changed? What are the principle controversies involving intelligence used for counterterrorism?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Daniel Byman, "The Intelligence War on Terrorism," Intelligence and National Security (2013). ¨ Richard A. Posner, "Principles of Intelligence," Preventing Surprise Attacks (Rowman & Littlefield, 2005), Chapter 4.

16 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Gabriella Blum and Philip B. Heymann, "Interrogation," in Laws, Outlaws, and Terrorists (Massachusetts: MIT Press, 2010), Chapter 6.

9. COUNTERTERRORISM INSTRUMENTS (RELEASE: NOVEMBER 19, 2013)

This section of the course explores the various counterterrorism instruments, such as diplomacy, financial pressure, and targeted killings, and their associated advantages and limitations. This section will also feature an optional subsection on renditions and interviews with New York Times reporter Mark Mazzetti, MQ-1 Predator Pilot Major David Blair, USAF, and former first Secretary of Treasury for Terrorism Financing and Financial Crimes Juan Zarate.

KEY QUESTIONS: ¨ What are the various instruments used in counterterrorism? ¨ What are the principal ways in which each instrument is used? ¨ What are the contributions and advantages of each instrument? ¨ What are the limitations and disadvantages of each instrument? ¨ How are these counterterrorism instruments used together in a complementary way?

REQUIRED READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Audrey Kurth Cronin, "Why Drones Fail,” Foreign Affairs (July/August 2013). ¨ Daniel Byman, "Why Drones Work,” Foreign Affairs (July/August 2013). ¨ Paul R. Pillar, "Counterterrorist Instruments," in Terrorism and U.S. Foreign Policy (Washington, D.C.: Brookings, 2003), Chapter 4.

OPTIONAL READINGS: (All Readings are available in the course itself as part of the Weekly Guide within the Introduction subsection or under Readings in the main top menu of the course.) ¨ Daniel Byman, "Diplomacy," in The Five Front War: The Better Way To Fight Global Jihad, New York: Wiley, 2007), Chapter 8. ¨ Michael Scheuer Testimony in "Extraordinary Rendition in U.S. Counterterrorism Policy: The Impact on Transatlantic Relations," House Foreign Affairs Committee, April 17, 2007. Read the Question and Answer session! ¨ Paul R. Pillar and Christopher Preble, "Don't You Know There's a War On? Assessing the Military's Role in Counterterrorism," in Benjamin H. Friedman, Jim Harper, and Christopher A. Preble (eds.), Terrorizing Ourselves (Washington, D.C.: Cato Institute, 2010).

17 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2 , 2015

18 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 APPENDIX B: LEARNING CHECKLIST This guide lists the learning goals and objectives for each section of the GeorgetownX Terrorism and Counterterrorism Course (September 24, 2015 - November 25, 2015). Use this guide as your own learning checklist while engaging with the course.

WHAT IS TERRORISM AND WHO ARE THE TERRORISTS– SECTION 1: OCTOBER 1-7 ¨ Recall the working definitions of terrorism and recognize their analytic limits. ¨ Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. ¨ Explain how terrorism has changed throughout history and how it is hard to define. ¨ Recognize how terrorism differs from other forms of conflict and violence like guerilla warfare. ¨ List the core elements of the definition of terrorism. ¨ Indicate how someone becomes a terrorist and how he or she might justify and rationalize the violence they commit. ¨ Recognize the diversity of reasons that account for someone becoming a terrorist. ¨ Recognize the distinct psychological processes and policy measures associated with each level on the staircase to terrorism. STRATEGIES, TACTICS, AND TECHNOLOGY USE – SECTION 2: OCTOBER 1-7 ¨ Understand the strategies and tactics of terrorist groups. ¨ Identify the different strategies that terrorist groups use and their associated strengths and weaknesses. ¨ Describe the most common types of terrorist attacks and how terrorists use technology. AL-QAEDA – SECTION 3: OCTOBER 8-14 ¨ Identify important terrorist groups in the Middle East and South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda. ¨ Identify a range of causes of terrorism, and as importantly, distinguish what commonly cited issues are not usually causes. ¨ Identify one or more accomplishments, weaknesses and/or problems of each group. ¨ Identify the various main militant groups and their objectives. ¨ Recognize the diversity of reasons that account for someone becoming a terrorist.

ISLAM – SECTION 4: OCTOBER 15-21 ¨ Understand the relationship between religion and terrorism. ¨ Describe jihad and ways in which it has been used and/or exploited. ¨ Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. ¨ Identify the causes if terrorism and its relationship to religion. ¨ Explain the emergence of global jihad inspired by Osama bin Laden and Al-Qaeda. ¨ Explain the ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism.

19 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ Define Salafism. ¨ Explain the place of Saudi Arabia in global Salafism. ¨ Recognize that conservatism in religion and violence are not necessarily linked. ¨ Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. ¨ AREA STUDIES: THE TERRORIST THREAT TO ISRAEL AND THE ISRAELI RESPONSE– SECTION 5: OCTOBER 22-28 ¨ Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. ¨ Recognize the strengths and limits of different counterterrorism instruments, including intelligence, economic punishment, and different uses of military force (drones/targeted killing of terrorists). ¨ Explain how intelligence is collected against terrorist groups and recognize different means (human intelligence, signals intelligence, etc.). ¨ Describe the impact of counterterrorism on peace negotiations. AREA STUDIES: TERRORISM AND COUNTERTERRORISM IN SOUTH ASIA– SECTION 6: OCTOBER 29- NOVEMBER 4 ¨ Identify important terrorist groups in the Middle East and/or South Asia with an understanding of their strengths, weaknesses, and overall effectiveness. These include Palestinian groups, Pakistani groups, and Al-Qaeda. ¨ Understand the relationship between religion and terrorism. ¨ Describe the evolution of political Islam. ¨ Describe what state supporters do and do not offer groups. ¨ Identify the various main militant groups. ¨ Explain the ways in which Islam can be viewed as the problem, the primary catalyst, and the driver of terrorism. ¨ Identify the attitudes most Muslims have today towards Islamic law and terrorism in the name of Islam. COUNTERTERRORISM AND THE RULE OF LAW – WEEK 7: NOVEMBER 5-11 ¨ Understand how counterterrorism constrained in a democratic society. o Understand the legal principles shaping detention o Understand the legal principles shaping surviellence o Understand the legal principles shaping targeted killings o Identify which authorities govern which bureaucracies? ¨ Identify the sources of law related to counterterrorism? ¨ Describe important legal issues regarding U.S. counterterrorism today INTELLIGENCE AND COUNTERTERRORISM – SECTION 8: NOVEMBER 12- 19, 2013 ¨ Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. ¨ Explain how intelligence is collected against terrorist groups and recognize the different means (human intelligence, signals intelligence, etc.). 20 of 21

GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 ¨ Identify the types of governmental organizations that contribute to counterterrorist intelligence and how they have changed. ¨ Describe the principle controversies in recent years involving intelligence used for counterterrorism.

COUNTERTERRORISM INSTRUMENTS – SECTION 9: NOVEMBER 20- 26, 2013 ¨ Understand how counterterrorism is constrained in a democratic society and several important legal debates related to counterterrorism. ¨ Recognize the strengths and limits of different counterterrorism instruments, including intelligence, economic punishment, and different uses of military force (drones/targeted killing of terrorism). ¨ Identify the tradeoffs in the use of each counterterrorism. If you are planning to get a Certificate, all graded activities have to be submitted by December 2nd at 9:00 EDT/13:00 UTC.

21 of 21