The Role of Criminal Justice in Terrorism
  Union Institute and University
  CJM 304 
  (Classroom Version)
        
          
  Home | 
          
  Module One | 
          
  Module Two | 
          
  Module Three | 
          
  Module Four
          
        Group Project  |
          
          
  Course Resources |
  
          
  About the Instructor |
  
          
  Course Calendar
Module Two
(The Modus Operandi of Terrorists)
Assignments
Readings:
1. Understanding Terrorism (Poland)
a. Chapter Six: The Dynamics of Hostage Taking and Negotiation
b. Chapter Seven: Terrorism and Bombing
c. Chapter Eight: Suicide Bombers: A Global Problem
2. Terrorism (Snowden & Whitsel)
a. Chapter Six: Islamic Extremists: How do they Mobilize Support?
b. Chapter Seven: An Analysis of Organizational Characteristics for Groups use
Radiological Weapons of Mass Victimization
c. Chapter Eight: Steganography and Terrorism: An Introduction to Data Hiding
and its use in Terrorist activities
d. WMD Yesterday's News: The WMD Terrorism Threat Today.
e. Leaderless Resistance: Are Terrorist Groups a Thing of the Past?
Activities:
1. Lecture
2. Individual presentations
3. Work on panel project
4. Online forum participation
Individual Presentations:
Each learner will be assigned one of the following supplemental readings. The 
learner is to digest the information and prepare a ten minute class presentation 
and one-page briefing paper on the reading.  The learner must provide a copy of 
the briefing paper to each class member.  These articles can be accessed 
via the Union 
Library here,  or are available directly on the web.
(Available via the Union Institute and University electronic library)
Ganor, B. (2002). Defining Terrorism: Is One Man's Terrorist another Man's 
Freedom Fighter? Police Practice & Research, 3(4), p287. 
Sunhauseen, U. (2004) Terrorism and America. Social Alternatives. 23(2), p6.
Laquer, W. (2004) World of Terror. National Geographic. 206(5), p72.
Larabee, A. (2003). A Brief History of Terrorism in the United States. 
Knowledge, Technology & Policy, 16(1), p21.
Duff, R. (2005). Notes on Punishment and Terrorism. American Behavioral 
Scientist, 48(6), p758.
Atran, S. (2003). Genesis of Suicide 
Terrorism. Science, 299(5612), p1534. 
Hoffman, B. (2003). The logic of suicide terrorism. Atlantic Monthly, 291(5) 
p40. 
Ciampi, D. (2005). Developmental and motivational factors of transnational 
terrorists. The Forensic Examiner, 4(3), p29.
Salij, J. (2005). The Significance of 
"Ineffective" Methods of Fighting Terrorism. American Behavioral Scientist, 
48(6) p.700.
Thornburgh, D. (2005). Balancing civil liberties and homeland security: does the 
USA patriot act avoid justice Robert H. Jackson's "suicide pact"? Albany Law 
Review, 68(4) p801.
Gause, F. (2005). Can Democracy Stop Terrorism? Foreign Affairs, 84(5), p62.
Dolan, J. (2005). United States' narco-terrorism policy: a contingency approach 
to the convergence of the wars on drugs and against terrorism. The Review of 
Policy Research, 22(4), p451.
Light, J. (2004). Urban planning and defense planning, past and future. Journal 
of the American Planning Association, 70(4), p399.
(Available via the Internet)
The Changing Faces of Terrorism
http://www.bbc.co.uk/history/war/sept_11/changing_faces_01.shtml
A Brief History of Terrorism
http://www.cdi.org/friendlyversion/printversion.cfm?documentID=1502
Terrorism in the United States
http://www.fbi.gov/publications/terror/terror2000_2001.htm#page_11
Defeating Terrorism: Strategic Issue 
Analyses
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=273
Confronting the “Enemy Within” What 
Can the United States Learn About Counterterrorism and Intelligence from Other 
Democracies
http://www.rand.org/publications/RB/RB9047/
Countering Terrorism: Integration of 
Practice and Theory
http://www.fbi.gov/filelink.html?file=/publications/counterr/counterrorism.pdf
Interagency Domestic Terrorism 
Concept of Operations Plan
http://www.fbi.gov/filelink.html?file=/publications/conplan/conplan.pdf
Participation Assignment
Go to the Criminal Justice Online forum you will find the second threaded discussion question here.
© 2007 - 2008 Raymond E. Foster, Leadership in Hi Tech Criminal Justice