12
CONF 345 Section 2 Spring 2017 1 CONF 345, DL2 (Spring 2017) The Social Dynamics of Terrorism, Security, and Justice Instructor: Dr. Will David Classroom: Blackboard 9.1 Email: [email protected] Week runs Monday-Sunday starting on 23 January Course Description The term terrorism has become a fixture within our security discourses. We fight a war on terrorism, identify foreign terrorist groups and state sponsors of terrorism, and worry about home-grown, domestic, lone wolf, and suicide terrorism. We even link the term to other security concerns as evidenced in cyber-terrorism and narco-terrorism. These discourses give rise to terrorism studies and responses that typically focus on security, preventive measures, laws and policies, intelligence, law enforcement, risk management, and military operations. While this course prepares students to interact with traditional security-centric approaches to terrorism, it also seeks to understand the social phenomenon of terrorism through a multidisciplinary set of lenses, including a critical framework situated within the field of conflict analysis and resolution. In the course, students will describe terrorism, thinking critically about the discourses that socially construct our understanding of the phenomenon. Students will also seek to understand and explain terrorism, examining contemporary and historical case studies to discern underlying causes and key social dynamics that beget extremism and terrorism. Finally, students will consider counterterrorism and anti-terrorism strategies, evaluating current approaches and reflecting on alternative prescriptions. Course Overview This course uses a distance learning format with Blackboard 9.1 as our primary meeting space. Though the delivery method is different, the course closely mirrors the traditional, in-class version and thus should take you about the same amount of time (6-8 hours each week less research and paper writing). We will cover one topic each week. In a typical week, you will: Read 50-100 pages of topic-specific material, watch 1-2 videos, watch short lectures, and self-pace through two books that support other scheduled requirements. Participate with classmates and instructor via journal, blog, discussion board, and/or wiki. Work in groups to develop one presentation and to summarize material in a book. Work on written assignments to be submitted to Blackboard. Syllabus and Learning Objectives I view the syllabus as a contract. By enrolling in the course, you agree to fulfill the requirements presented in the syllabus. By the end of the course, you will have developed: An understanding of the political, structural, social, and psychological sources of terrorism A familiarity with various theoretical perspectives on terrorist motivations and behavior Subject matter expertise in origins, evolution, ideologies, strategies, tactics, and dynamics of selected terrorist/extremist groups

CONF 345 DL2 syllabus Spring 2017 WDavid

Embed Size (px)

Citation preview

CONF 345 Section 2 Spring 2017

1

CONF 345, DL2 (Spring 2017) The Social Dynamics of Terrorism, Security, and Justice

Instructor: Dr. Will David Classroom: Blackboard 9.1 Email: [email protected] Week runs Monday-Sunday starting on 23 January

Course Description

The term terrorism has become a fixture within our security discourses. We fight a war on terrorism, identify foreign terrorist groups and state sponsors of terrorism, and worry about home-grown, domestic, lone wolf, and suicide terrorism. We even link the term to other security concerns as evidenced in cyber-terrorism and narco-terrorism. These discourses give rise to terrorism studies and responses that typically focus on security, preventive measures, laws and policies, intelligence, law enforcement, risk management, and military operations. While this course prepares students to interact with traditional security-centric approaches to terrorism, it also seeks to understand the social phenomenon of terrorism through a multidisciplinary set of lenses, including a critical framework situated within the field of conflict analysis and resolution. In the course, students will describe terrorism, thinking critically about the discourses that socially construct our understanding of the phenomenon. Students will also seek to understand and explain terrorism, examining contemporary and historical case studies to discern underlying causes and key social dynamics that beget extremism and terrorism. Finally, students will consider counterterrorism and anti-terrorism strategies, evaluating current approaches and reflecting on alternative prescriptions.

Course Overview

This course uses a distance learning format with Blackboard 9.1 as our primary meeting space. Though the delivery method is different, the course closely mirrors the traditional, in-class version and thus should take you about the same amount of time (6-8 hours each week less research and paper writing). We will cover one topic each week. In a typical week, you will: Read 50-100 pages of topic-specific material, watch 1-2 videos, watch short lectures, and

self-pace through two books that support other scheduled requirements. Participate with classmates and instructor via journal, blog, discussion board, and/or wiki. Work in groups to develop one presentation and to summarize material in a book. Work on written assignments to be submitted to Blackboard.

Syllabus and Learning Objectives

I view the syllabus as a contract. By enrolling in the course, you agree to fulfill the requirements presented in the syllabus. By the end of the course, you will have developed:

An understanding of the political, structural, social, and psychological sources of terrorism

A familiarity with various theoretical perspectives on terrorist motivations and behavior

Subject matter expertise in origins, evolution, ideologies, strategies, tactics, and dynamics of selected terrorist/extremist groups

CONF 345 Section 2 Spring 2017

2

Skills to analyze the social, psychological and political impacts of terrorism and anti-terrorism/counterterrorism strategies; and the ability to develop an intervention strategy

An appreciation for the narratives and discourses that influence our understanding of terrorism and shape our responses to it

Required Texts

Aboul-Enein, Youssef H. 2013. Militant Islamist Ideology. Annapolis: Naval Institute Press. Burrough, Bryan. 2015. Days of Rage: America’s Radical Underground, the FBI, and the Forgotten Age of Revolutionary Violence. New York: Penguin. Martin, Gus. 2015. Understanding Terrorism: Challenges, Perspectives, and Issues. Fifth Edition. Los Angeles: Sage. Other required readings/videos will be annotated on the course schedule as follows:

ER Electronic Reserve, found under the E-Reserve tab in Blackboard (BB) CC Course Content, found under the course content tab in BB EJ Electronic Journal, found online through GMU Libraries I Internet, found via the listed web address

Summary of Requirements Participation 45 pts FTO Wiki 10 pts 12, 19 Feb; 5, 26 Mar; 23 Apr FTO Presentation/Blog 10 pts Posted NLT 25 Apr, Blog interaction 26-30 Apr Journal (10 of 12) 10 pts 1, 8, 15, 22 Feb; 1, 8, 22, 29 Mar; 12, 19 Apr; 3 May Discussion Board (5 of 7) 10 pts 4, 17 Feb; 3, 24 Mar; 14, 21 Apr; 5 May Days of Rage Blog 5 pts Summary on Blog 4 Apr, Blog interaction 5-9 Apr Written Assignments 55 pts Essay #1 10 pts 23 Feb Essay #2 15 pts 30 Mar Term Paper 30 pts NLT 7 May (early submissions encouraged)

Participation This course closely mirrors the traditional classroom version of CONF 345, but replaces classroom sessions with recorded lectures and Blackboard’s interactive components (wikis, journal, blog, discussion boards). Your remarks should integrate course concepts and synthesize information from your experiences, courses, and research. Points are awarded based on the quality of your entries. Entries that do not evidence comprehension of the material or are purely composed of opinion will not earn points. As needed, I will provide personal feedback in your journal or by email. Foreign Terrorist Organization (FTO) Wiki and Presentation. You will be assigned to a team

that develops expertise on an FTO. Each team will have a BB wiki to which all team

CONF 345 Section 2 Spring 2017

3

members are expected to contribute in accordance with the due dates. Using Kaltura, each group will develop and post a presentation (with a voice track) on a blog worthy of presenting to an audience of security professionals. You will be required to comment on other group presentations and to respond to questions about your presentation. Peer assessments will help me to evaluate individual contributions to presentations.

Journal. Each student will have a journal shared only with the instructor, providing a forum

for checking your comprehension of course material. Journal entries must be accompanied by citations. You must complete 10 of 12 journal requirements, each worth 1 point.

Discussion Boards. Discussion boards provide a class forum for synthesizing information in

response to a writing prompt and to other students’ entries. Typically, you are required to provide a well-considered, well-written response to a prompt and then comment on two other student responses. There are 5 required discussions, each worth 2 points.

Domestic Terrorism (Days of Rage) Discussion. You will be assigned to a team focused on a

historical case study. Each group will briefly summarize its assigned terrorist group on a blog. Each student will read the summaries, respond to instructor prompts, and respond to at least two other student responses.

Written Assignments (see format requirements below in Expectations for Students) Essays. Essay questions require you to integrate material from the course into your

responses. Essay #1 requires a 3-page response to a question posed by a senior member of the U.S. national security enterprise. Essay #2 requires a 5-page response that draws on your knowledge of your assigned FTO and the text Militant Islamist Ideology. Assignments are provided at least two weeks before the due date.

Term Paper. This 15-page research paper will analyze an FTO or domestic

terrorist/extremist group using course concepts, propose objectives for contending with the group, and develop a counterterrorism/anti-terrorism strategy to achieve the proposed objectives. You will select your FTO/group from a list early in the course.

Grading Timeliness. Assignments are due by 11:59 pm on the due date as listed in the schedule. I do not accept late work without prior approval. Failure to submit either of the essays or the term paper earns an F for the course. Scale (points). A (95-100) B (85-89) C (75-79) D (65-69)

A-(90-94) B-(80-84) C-(70-74) F (0-64)

CONF 345 Section 2 Spring 2017

4

Schedule

Dates Requirements Assignments Part 1: Describe

Week 1 23-29 Jan 4 lectures 77 pages 2 videos

Thinking Critically about Terrorism & Historical Survey of Terrorism Lectures (CC)

Topic: Welcome and Instructor Introduction

Topic: Couse Overview

Topic: Critical Thinking

Topic: Historical Survey of Terrorism Readings

Syllabus (BB)

Martin 2015: Ch 1, 2-19 (text)

Stampnitzky, Lisa. 2013. “The Invention of Terrorism and the Rise of the Terrorism Expert.” In Disciplining Terror: How Experts Invented “Terrorism.” Cambridge University Press, 21-48. (ER)

Rapoport, D.C. 2002. “The Four Waves of Rebel Terror and September 11th.” Anthropoetics 8: 1-19. (EJ)

Holland, Jack and Lee Jarvis, 2014. “Night Fell on a Different World: Experiencing, Constructing, and Remembering 9/11.” Critical Studies on Terrorism 7:2, 187-199. (EJ)

Videos

Gilbert, Dan, 2005. “Why We Make Bad Decisions,” TED Talks (I) (33:38 min) http://www.ted.com/talks/dan_gilbert_researches_happiness

9/11 Attacks Videos. History. (I) (4:45) http://www.history.com/topics/9-11-attacks/videos/911-timeline

25 Jan: Journal #1 (1 pt) NLT 29 Jan: Personal introductions on Discussion Board (0 pts) -no prescribed format, but please let us know what name you prefer to be addressed by, your location (state or country), your academic major and expected graduation date, and any information about you that you think is relevant to our study of terrorism (e.g., previous/current employment, job interests, academic studies, research interests, life experiences)

Week 2 30 Jan-5 Feb 1 lecture 68 pages

Defining and Conceptualizing Terrorism Lecture (CC)

Topic: Defining and Conceptualizing Terrorism Readings Martin 2015: Ch 2, 22-43 (text) Ganor, Boaz. 2010. “Defining Terrorism—Is one Man’s Terrorist Another

Man’s Freedom Fighter?” International Institute for Counter-Terrorism. (I) http://www.ict.org.il/Article/1123/Defining-Terrorism-Is-One-Mans-Terrorist-Another-Mans-Freedom-Fighter

Richards, Anthony. 2014. “Conceptualizing Terrorism.” Studies in Conflict & Terrorism 37:3, 213-231. (EJ)

Matusitz, Jonathan. 2013. “Terrorism as a Communication Process: The Audience.” In Terrorism and Communication: A Critical Introduction. Los Angeles: Sage, 77-102. (ER)

Skim: Combating Terrorism Center at West Point (I) https://www.ctc.usma.edu/

[look at the topics in recent issues of the CTC Sentinel]

“Counterterrorism 2016 Calendar.” The National Counterterrorism Center (I) http://www.nctc.gov/site/index.html [look at the FTOs listed under the

groups-tab]

30 Jan: Submit rank ordered preferences for your FTO (contemporary case study) and domestic terrorist group (historical case study) from the posted list 1 Feb: Journal #2 (1 pt) 4 Feb: Discussion Board #1 (2 pts)

CONF 345 Section 2 Spring 2017

5

Part 2: Explain/Understand

Week 3 6-12 Feb 2 lectures 62 pages

Causes of Terrorism Lectures (CC)

Topic: The Explanatory Poles

Topic: Theoretical Lenses (Basic Human Needs, Social Identity Theory, Structural/Cultural Violence)

Readings

Martin 2015: Ch 3, 46-71 (text)

Crenshaw, Martha. 1998. “The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice.” In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich. Woodrow Wilson Center Press, 7-24. (ER)

Newman, Edward. 2006. “Exploring the ‘Root’ Causes of Terrorism.” Studies in Conflict & Terrorism 29, 749-772. (EJ)

Ehrlich, Paul R. and Jianguo Liu. 2002. “Some Roots of Terrorism.” Population and Environment 24: 2, 183-190. (EJ)

Sprinzak, Ehud. 1991. “The Process of Delegitimation: Toward a Linkage Theory of Political Terrorism.” Terrorism and Political Violence 3:1, 50-68. (CC)

6 Feb: Essay #1 assigned 8 Feb: Journal #3 (1 pt) 12 Feb: Wiki #1- Summary of the FTO (2 pts) -Origins/brief history -Significance of name and symbols -Key leaders and organization -Grievances -Areas of operation -Major recent activities

Week 4 13-19 Feb 2 lectures 90 pages 2 videos

Terrorism in/and the Media & Terrorist Tactics, Targets, and Measures of Effectiveness Lectures (CC) Topic: Terrorism in/and the Media Topic: The Elements of Terrorist Strategy

Readings Martin 2015: Ch 10, 266-299 and Ch 11, 303-324 (text) Hoffman, Bruce. 2006. “The New Media, Terrorism, and the Shaping of

Global Opinion.” In Inside Terrorism. New York: Columbia University Press, 197-228. (ER)

Videos Jihad TV: Terrorism and Mass Media. 2006. (47:11) (I/GMU Films on

Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=37557&loid=48164

Hamas to Kids: Shoot all the Jews. 2014. Al-Aqsa TV. Palestinian Media Watch. (1:28) (I) https://www.youtube.com/watch?v=0ORAM-usqhQ

15 Feb: Journal #4 (1 pt) 17 Feb: Discussion Board #2 (2 pts) 19 Feb: Wiki #2- Contextual Factors (2 pts) -geographic -social/cultural -demographic -economic -political

Week 5 20-26 Feb 1 lecture 55 pages 1 video

Dissident & Criminal Dissident Terrorism Lecture (CC) Topic: Dissident Terrorism Readings Martin 2015: Ch 5, 107-130 and Ch 9, 246-264 (text) Sanchez-Cuenca, Ignacio. 2007. “The Dynamics of Nationalist Terrorism: ETA

and the IRA.” Terrorism and Political Violence 19:3, 289-303. (EJ) Videos

In the Name of Liberation: Freedom by any Means. 2002. (48:51) (I/GMU Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.asp

20 Feb: Submit your top three term paper topic preferences from the posted list of FTOs and domestic terrorist/extremist groups 22 Feb: Journal #5 (1 pt) 23 Feb: Essay #1 (10 pts)

CONF 345 Section 2 Spring 2017

6

x?wID=96306&xtid=31761 Week 6 27 Feb-5 Mar 1 lecture 53 pages 1 video

State Terrorism Lecture (CC) Topic: State Terrorism Readings Martin 2015: Ch 4, 76-105 (text) Collins, Stephen D. 2014. “State-Sponsored Terrorism: In Decline, Yet Still a

Potent Threat.” Politics & Policy 42:1, 131-155. (EJ) Videos In the Name of the State: When Might Makes Right. 2002. (48:02) (I/GMU

Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31764

1 Mar: Journal #6 (1 pt) 3 Mar: Discussion Board #3 (2 pts) 5 Mar: Wiki #3- FTO Strategy (2 pts) -Why resort to terrorism? -Goals/Objectives -Targets/Victims -Audiences (supporters/recruits) -Audiences (onlookers, analysts, decision makers) -Intended Message(s)

Week 7 6-12 Mar 1 lecture 42 pages 2 videos

Ideology and Terrorism Lecture (CC) Topic: Ideology and Terrorism Readings Martin 2015: Ch 7, 163-205 (text) Videos In the Name of Politics: Gun Barrel Politics. 2002. (48:27) (I/GMU Films on

Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31762

Why We Fight—FARC-EP. (5:57) (I) https://www.youtube.com/watch?v=UpOW0XAppUY&list=UU_0s__EG%20M7SprOWwiO-mlyA

6 Mar: Essay #2 assigned 8 Mar: Journal #7 (1 pt)

Week 8 13-19 Mar

Spring Break

Week 9 20-26 Mar 1 lecture 57 pages 2 videos

Religion and Terrorism Lecture (CC) Topic: Religion and Terrorism Readings Martin 2015: Ch 6, 133-161 (text) Gregg, Heather S. 2014. “Defining and Distinguishing Secular and Religious

Terrorism.” Perspectives on Terrorism 8:2, 36-47. (EJ) Rudner, Martin. 2013. “Al Qaeda’s Twenty-Year Strategic Plan: The Current

Phase of Global Terror.” Studies in Conflict & Terrorism 36:12, 953-971. (EJ) Videos In the Name of God: Holy Word, Holy War. 2002. (48:16) (I/GMU Films on

Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=31763

Failed Suicide Bomber Interview. (27:24) (I) https://www.youtube.com/watch?v=OYSyoY4cRw4

22 Mar: Journal #8 (1 pt) 24 Mar: Discussion Board #4 (2 pts) 26 Mar: Wiki #4- FTO Operations (2 pts) -Use of Islamist ideology -Recruiting -Funding -Propaganda/Communication -Tactics

CONF 345 Section 2 Spring 2017

7

Week 10 27 Mar-2 Apr 1 lecture 76 pages 2 videos

Domestic Terrorism Lecture (CC) Topic: Domestic Terrorism Readings Martin 2015: Ch 8, 212-214 and Ch 12, 328-367 (text) Bjelopera, Jerome P. 2013. The Domestic Terrorist Threat: Background and

Issues for Congress. Washington, D.C.: Congressional Research Service, January 17, 2013, 1-34. (CC)

Video Democracy Now. 2015. “Does US. Ignore Right-Wing Terror? More Killed by

White Extremists than Jihadists Since 9/11,” (17:42) (I) https://www.youtube.com/watch?v=GxUK7o7_s0I

The Oklahoma Bomber: International Terrorism Since 1945. (26:14) (I/GMU Films on Demand) http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=96306&xtid=57565

Skim: Southern Poverty Law Center. “Hate and Extremism.” (I)

http://www.splcenter.org/what-we-do/hate-and-extremism [look at the map and note the groups active in Virginia or other states of interest to you]

29 Mar: Journal #9 (1 pt) 30 Mar: Essay #2 (15 pts)

Week 11 3-9 Apr

Domestic Terrorism Seminar: Days of Rage Discussion Historical case studies: Weatherman, BLA, SLA, FALN, SMJJ Extremism in the U.S. and Responses to it Reflections on current U.S. domestic conditions

3 Apr: Finish reading Days of Rage 4 Apr: Domestic terrorism case study summary posted to Blog by each group 5, 7, and 9 Apr: Domestic Terrorism Seminar Blog (5 pts)

Part 3: Prescribe

Week 12 10-16 Apr 1 lecture 72 pages 2 videos

Responding to Terrorism I: U.S. National Security Lecture (CC) Topic: Fundamentals of US National Security Strategy

Readings Martin 2015: Ch 13, 374-408 (text) Abrahms, Max. 2014. “Deterring Terrorism: A New Strategy.” Perspectives on

Terrorism 8:3, 2-12. (EJ) Crelinsten, R.D. 2014. “Perspectives on Counterterrorism: From Stovepipes

to a Comprehensive Approach.” Perspectives on Terrorism 8:1, 2-12. (EJ) Maan, Ajit. 2015. “Narrative: The Critical Component of Counter-Terrorism

Strategy.” Small Wars Journal, June 14 (I) http://smallwarsjournal.com/jrnl/art/narrative-the-critical-component-of-counter-terrorism-strategy

Morehouse, Matthew. 2014. “It’s Easier to Decapitate a Snake than it is a Hydra: An Analysis of Colombia’s Targeted Killing Program.” Studies in Conflict & Terrorism 37:7, 541-556. (EJ)

Videos Are We Safer. 2011. PBS (21:25) (I)

http://www.pbs.org/wgbh/pages/frontline/are-we-safer/ Fighting Terror with Torture. 2015. (29:28) (I/GMU Films on Demand)

http://mutex.gmu.edu/login?url=http://fod.infobase.com/PortalPlaylists.asp

12 Apr: Journal #10 (1 pt) 14 Apr: Discussion Board #5 (2 pts)

CONF 345 Section 2 Spring 2017

8

x?wID=96306&xtid=115638

Skim: National Security Strategy of the United States 2015 (CC) U.S Department of State. 2016. “Chapter 6. Foreign Terrorist

Organizations.” Country Reports on Terrorism 2015, 349-404. (CC) Committee Study of the Central Intelligence Agency’s Detention and

Interrogation Program. Senate Select Committee on Intelligence. Updated for release April 3, 2014. (CC) [Focus on the 20 findings and conclusions]

Week 13 17-23 Apr 1 lecture 85 pages 1 video

Responding to Terrorism II: U.S. Homeland Security Lecture (CC) Topic: Counter-terrorism and Anti-Terrorism Approaches Readings Martin 2015: Ch 14, 413-439 (text) Brady, Patricia. 2004. “The Impact of the September 11, 2001 Terrorist

Attacks on Civil Liberties.” In Understanding Terrorism: Threats in an Uncertain World, Akorlie A. Nyatepe-Coo and Dorothy Zeisler-Vralsted, ed. New Jersey: Prentice Hall, 175-182. (ER)

“Preventing Terrorism.” Department of Homeland Security. (I) http://www.dhs.gov/preventing-terrorism (Read the page worth of material under each of the ten subordinate headings)

Jenkins, Brian M. 2014. “When Jihadis Come Marching Home.” Perspectives. RAND Corporation, 1-27. (I) http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE130-1/RAND_PE130-1.pdf

Schimmel, Kimberly S. 2012. “Protecting the NFL/Militarizing the Homeland.” International Review for the Sociology of Sport 47(3), 338-352. (EJ)

Video Krebs, Valdis. 2014. Ending Up on the Wrong Side of the Tracks. TEDx (15:55)

(I) https://www.youtube.com/watch?v=opPh67ImhfE&feature=iv&src_vid=R-y71DEMZHc&annotation_id=annotation_1597129955

Skim one of the following: Terrorism. Federal Bureau of Investigation. (I) http://www.fbi.gov/about-

us/investigate/terrorism Terrorism. National Institute of Justice. (I)

http://nij.gov/topics/crime/terrorism/pages/welcome.aspx “Terrorism and Homeland Security.” RAND. (I)

http://www.rand.org/topics/terrorism-and-homeland-security.html

19 Apr: Journal #11 (1 pt) 21 Apr: Discussion Board #6 (2 pts) 23 Apr: Wiki #5- Responding to the FTO (2 pts) -Strengths & vulnerabilities -CT/AT strategies used against the FTO to date -Effectiveness of strategies

Week 14 24-30 Apr

FTO Presentations and Q & A

FTO Presentation and Q &A (10 pts) 25 Apr: FTO Presentation posted to blog 27 Apr: Comments and questions posted on Blog 30 Apr: Follow up comments and replies to questions posted on Blog

CONF 345 Section 2 Spring 2017

9

Expectations of Students Effective Preparation. Student preparation and interaction in this upper level course are essential elements of the learning environment. You must complete all readings and videos and actively participate in the Blackboard environment. You must follow current affairs related to terrorism and you should use a variety of news sources to contrast their coverage of the same issues.

Blackboard Protocol. Blackboard is our classroom and thus you must visit it regularly to stay abreast of course updates, participate with your classmates, and complete requirements. I use Blackboard Announcements to provide guidance on upcoming readings/assignments, updates to the course, commentary on breaking events, and links to newly found articles and websites. You will interact with me and your classmates via journal, discussions, and wikis. Your contributions are expected to demonstrate comprehension of the assigned material and evidence synthesis as you draw on what you have learned in this course, other academic pursuits, research, and relevant life experiences. While opinion is sometimes welcomed, the preponderance of your contributions must reflect a scholarly approach to the subject matter. Accordingly, you must cite references in your entries as appropriate. Some material may be controversial and perhaps disturbing at times. Be mindful of the sensitivities of others when contributing to discussions; however, critical thinking and open dialogue are our goals.

Instructor-Student Communication. Please feel free to email me with questions or concerns. I will respond to emails within 48 hours and usually much sooner. Unless the email is of a personal nature, please check the following (available on Blackboard) prior to contacting me: syllabus, help forum, Blackboard videos on features, Blackboard Q&A, and Technology Requirements. Mason requires that Mason email be used for all courses. When you email me, be sure to include CONF 345 DL2 at the beginning of the subject heading to alert me that I have a message from one of my online students.

Week 15 1-7 May 1 lecture 35 pages 2 videos

How Terrorism Ends & Course Wrap Up Lecture (CC) Topic: Course Wrap Readings

Martin 2015: Ch 15, 443-463 (text) Rogers, Paul. 2013. “Lost Cause: Consequences and Implications of the War

on Terror.” Critical Studies on Terrorism 6:1, 13-27. (EJ) Videos Goodman, Marc. 2012. “A Vision of Crimes in the Future.” TED (19:22) (I)

http://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future?language=en#t-1138285

McCue, Jason. 2012. “Terrorism is a Failed Brand.” TED (18:55) (I) https://www.ted.com/talks/jason_mccue_terrorism_is_a_failed_brand?language=en

1 May: FTO-group peer assessments 3 May: Journal #12 (1 pt) 5 May: Discussion Board #7 (2 pts) NLT 7 May: Term Paper (30 pts) 7 May: End of course evaluation

CONF 345 Section 2 Spring 2017

10

Written assignments. I expect well-written papers that adhere to the prescribed length and required format. Edit your papers carefully as spelling and grammatical errors will lower your score. Papers must comply with the following:

Typed and double-spaced, using Times New Roman 12-point font and one-inch paper margins. Requirement applies to all elements of the paper, including footnotes if used.

Body of the paper must be left justified. Do not manipulate margins or fonts to lengthen or shorten the paper.

Material/ideas from other sources must be properly cited, using a standard citation format (e.g., APA, MLA). Papers will be submitted through Safe Assign on Blackboard.

Pages must be numbered, beginning with the first page of your essay, excluding the title page. Endnotes, footnotes, works cited, bibliography, pictures/graphics, and title pages do not count towards the assigned paper length.

Paper must be the required length. The 3-page essay must be between 2 ½ to 3 ½ pages, the 5-page essay between 4 ½ to 5 ½ pages, and the 15-page term paper between 14 ½ to 15 ½ pages.

Page footers or headers must include CONF 345-DL2, the date turned in, and your name on a single line (i.e., CONF 345-DL2/19 February 2017/ (your name here).

Papers must be typed in black on a white background. Papers (digital copy) is due by midnight on the due date. Extensions will be arranged

only for documented personal illness or emergencies. Late papers will not be accepted.

Academic Integrity Students must be responsible for their own work, and students and faculty must take on the responsibility of dealing explicitly with violations. The tenet must be a foundation of our university culture. [See http://academicintegrity.gmu.edu]. Assignments for this course will be run through a SafeAssign module within Blackboard, which electronically checks for plagiarism.

Honor Code Students must adhere to the guidelines of the GMU Honor Code [See http://oai.edu/the-

mason-honor-code/]. You are expected to abide the Honor Code while preparing all work for this

class:

“To promote a stronger sense of mutual responsibility, respect, trust, and fairness among all members

of the George Mason University community and with the desire for greater academic and personal

achievement, we, the student members of the University Community, have set forth this: Student

members of the George Mason University community pledge not to cheat, plagiarize, steal, and/or lie

in matters related to academic work.”

"All George Mason University students have agreed to abide by the letter and the spirit of the Honor Code. You can find a copy of the Honor Code at academicintegrity.gmu.edu. All violations of the Honor Code will be reported to the Honor Committee for review. With specific regards to plagiarism, there are three fundamental principles to follow: (1) all work submitted be your own; (2) when using the work or ideas of others, including fellow students, give full credit through accurate citations; and (3) if you are

CONF 345 Section 2 Spring 2017

11

uncertain about the ground rules on an assignment, ask for clarification. If you have questions about when the contributions of others to your work must be acknowledged and appropriate ways to cite those contributions, please talk with the professor.” “S-CAR requires that all written work submitted in partial fulfillment of course or degree requirements must be available in electronic form so that it can be compared with electronic databases, as well as submitted to commercial services to which the School subscribes. Faculty may at any time submit a student's work without prior permission from the student. Individual instructors may require that written work be submitted in electronic as well as printed form. S-CAR's policy on plagiarism is supplementary to the George Mason University Honor Code; it is not intended to replace or substitute for it."

Patriot Pass

Once you sign up for your Patriot Pass, your passwords will be synchronized, and you will use

your Patriot Pass user name and password to log in to the following systems: Blackboard,

University Libraries, MasonLive, Patriot Web, and the Virtual Computing Lab.

University Policies

Students must follow university policies. [See http://universitypolicy.gmu.edu]

Responsible Use of Computing

Students must follow university policy. [See

http://universitypolicy.gmu.edu/policies/responsible-use-of-computing].

University Calendar

Details regarding the current Academic Calendar. [See

http://registrar.gmu.edu/calendars/index.html].

Student Services

Technical Support

If you have difficulty logging into Blackboard, contact the ITU support center at

[email protected] or 703-993-8870. If you have questions regarding Blackboard features or

other course materials, email [email protected].

University Libraries

University Libraries provides resources for distance students. [See

http://library.gmu.edu/distance and http://infoguides.gmu.edu/distance_students ].

CONF 345 Section 2 Spring 2017

12

Writing Center

The GMU Writing Center staff provides a variety of resources and services (e.g., tutoring,

workshops, writing guides, handbooks) intended to support students as they work to construct

and share knowledge through writing [See http://writingcenter.gmu.edu]. You can now sign up

for an Online Writing Lab (OWL) session just like you sign up for a face-to-face session in the

Center, which means you can set the time and date of your appointment.

Counseling and Psychological Services

The GMU Counseling and Psychological Services (CAPS) staff consists of professional counseling

and clinical psychologists, social workers, and counselors who offer a wide range of services

(e.g., individual and group counseling, workshops, and outreach programs) to enhance

students’ personal experience and academic performance [See http://caps.gmu.edu]

Disability Support Services

Students with disabilities who seek accommodations in a course must be registered with the

GMU Office of Disability Services (ODS) and inform their instructor, in writing, at the beginning

of the semester [See http://ods.gmu.edu].

Family Educational Rights and Privacy Act (FERPA) FERPA, also known as the “Buckley Amendment,” is a federal law that gives protection to student educational records and provides students with certain rights. [See http://registrar.gmu.edu/privacy]