ࡱ> WYVa bjbj B=AbAbL L 8L`L8G FFFFFFF$HKFFF)))FF)F))?ADD>`GByXB&FG08GBBxLOLxLLDDxLD)FF8GxLL B :  GROSSMONT COLLEGE Official Course Outline ADMINISTRATION OF JUSTICE 264 - TERRORISM and HOMELAND SECURITY 1. Course Number Course Title Semester Units Semester Hours AOJ 264 Terrorism and Homeland 3 3 hours lecture: 48-54 total hours Security 96-108 outside-of-class hours 144-162 total hours 2. Prerequisites None. Corequisite None. Recommended Preparation None. 3. Catalog Description This course is an introduction to global and domestic terrorism, and the homeland security response of the United States government and local agencies. Also examined is how international and domestic terrorist groups affect the U.S. to include their history, ideological beliefs, motivation, funding, and methods of operation. The efforts of the U.S. military, intelligence, and law enforcement to combat terrorism will be examined as well as how effective the response has been and what impact its had on civil liberties and homeland security. 4. Course Objectives The student will: Recognize the evolution of terrorism in recent history. Describe the social underpinning of terrorism. Articulate the organization and financing of terrorism. Describe how terrorist organizations interact with the media. Distinguish between international and domestic terrorism. Differentiate between nationalistic, ethnocentric, religious, and ideological terrorism. Explain the concept of Homeland Security. Identify agencies responsible for Homeland Security. Identify constitutional issues surrounding Homeland Security. Propose future security issues and the changing nature of terrorism 5. Instructional Facilities Access to the Internet. Standard classroom. Computer lab for hands-on activities. 6. Special Materials Required of Student Electronic storage media. ADMINISTRATION OF JUSTICE 264 TERRORISM AND HOMELAND SECURITY page 2 7. Course Content Historical context of terrorism. International terrorism. Domestic terrorism. Terrorism based upon nationalism, ethnocentrism, religious, and ideological beliefs. The role of the Homeland Security program. Legal aspects of the Homeland Security program. 8. Method of Instruction Lecture, small group and large-group discussion, group projects, discussions, projects, use of multimedia technology, and laboratory activity and appropriate. Links to additional Internet resources for lecture enhancement and research. Qualified guest speakers may be invited to lecture on their respective fields of specialization. Field trips to local public safety agencies and security organizations may be arranged. 9. Methods of Evaluating Student Performance Written assignments (student assessment of the reading, answer designated questions). Discussion assignments. Quizzes and examinations. Final examination. Research assignments on current events and/or create an action plan for a terrorist event. Group projects such as creating questions for class discussion, conduct group led discussions. Oral presentations based on current events, presentations from research assignments. 10. Outside Class Assignments Reading in required text. Critical-thinking and problem-solving exercises. c. Topic-related research assignment on a current event such as research and create an action plan for a terrorist event). d. Topic-related oral presentation based on a current event; prepare for a presentation on a created action plan for a terrorist event. 11. Texts a. Recommended Text(s): White, Jonathan R. Terrorism and Homeland Security, 8th ed. Belmont, CA: Cengage Learning, 2014. b. Supplementary texts and workbooks: None. Addendum: Student Learning Outcomes Upon completion of this course, our students will be able to do the following: Distinguish between the operational methods of international and domestic terrorist groups. b. Identify potential targets of terrorism and propose counterterrorism security measures. c. Appraise the effectiveness of the Homeland Security program. Date approved by the Governing Board: December 10, 2013   ,/KLMOnt ɻɭzmmmm`hMhBh= OJQJ^JhMhBh;9OJQJ^JhMhBh0OJQJ^Jh= OJQJ^JhMhBhy>*OJQJ^JhMhBhhv>*OJQJ^JhMhBh-8>*OJQJ^JhMhBh>r>*OJQJ^JhMhBh >*OJQJ^Jh2Uh >*OJQJ^Jh2Uh2U>*OJQJ^JhMhBh OJQJ^J%-./op; |b   Ld*$`Lgd=    Ld*$`Lgd=   x Ld*$`Lgd=   `x$Ld*$`Lgd=  'Ld*$`Lgd=  Ld*$`Lgd=  Ld*$`Lgd=  ! $ : @ M P U V X c l n o  1 2 3 < ` a   ܦ香܈wiwwiwwh=CJOJQJ^JaJ hMhBhhvCJOJQJ^JaJ hMhBh;9CJOJQJ^JaJhMhBhhvOJQJ^JhMhBh;9OJQJ^JhMhBh:)b>*OJQJ^JhMhBh:)bOJQJ^JhMhBh >*OJQJ^JhMhBh OJQJ^JhMhBhcOJQJ^Jh= OJQJ^J); < N O V W d e l m ^gd=  $@pLd`Lgd=  @pLd*$^`Lgd=  @pLd*$`Lgd=   `x$Ld*$`Lgd=  3 b  l MNjk @pd*$`gd= L`Lgd= ! & F ^`gd=  @pLd*$`Lgd=  @pLd*$^`Lgd=  i j   ?@MNPQixp_N hMhBh?:CJOJQJ^JaJ hMhBhMhBCJOJQJ^JaJh=OJQJh!h=OJQJh=h=OJQJ^Jh=h=OJQJhMhBh@3>*OJQJ^Jh= OJQJ^JhMhBh@3OJQJ^J *hMhBh-8>*OJQJ^Jh=CJOJQJ^JaJ hMhBhhvCJOJQJ^JaJ hMhBh;9CJOJQJ^JaJk  Qxxxx 'Ld*$`Lgd=  @p2d*$^`2gd=  @pLd*$`Lgd= ! >^`>gd= ! L^`Lgd=  & F @p0d*$`0gd=  &'*48IKQRSUµšshs[NAhMhBh?:OJQJ^JhMhBhW=OJQJ^JhMhBhuOJQJ^JhUH>*OJQJ^JhMhBhhv>*OJQJ^JhMhBh0S>*OJQJ^JhMhB>*OJQJ^JhMhBhW=>*OJQJ^JhMhBhhvOJQJ^JhMhBh:)bOJQJ^JhMhBh OJQJ^J#hMhBh >*CJOJQJ^JaJhMhBCJOJQJ^JaJ hMhBh CJOJQJ^JaJQRde 4de~k{{ ! & F `gd=  @pLd*$`Lgd=  @pd*$^`gd= ! & F `gd=  @pd*$`gd=  @pLd*$^`Lgd= Uce23bcdefh}&'()*+TUViәәӈ~pbhECJOJQJ^JaJhEh=>*OJQJ^Jh= OJQJ^J h=h=CJOJQJ^JaJh=CJOJQJ^JaJh CJOJQJ^JaJhMhBh?:OJQJ^J hMhBhhvCJOJQJ^JaJ hMhBh;9CJOJQJ^JaJhMhBh OJQJ^JhMhBh >*OJQJ^J$k&'UVL : & F @pd*$^`gd= ! & F `gd=  @pLd*$`Lgd=  @pLd*$^`Lgd= ! & F `gd=  +JKZ[chk´£´£•yk•yy´•k^hMhBh OJQJ^Jh CJOJQJ^JaJhzCJOJQJ^JaJhECJOJQJ^JaJhECJOJQJ^JaJ hMhBhhvCJOJQJ^JaJhgcCJOJQJ^JaJ hMhBh;9CJOJQJ^JaJ hMhBh=CJOJQJ^JaJh=CJOJQJ^JaJh;9CJOJQJ^JaJ$hikmn #$OY[qrstuw|溬qqqdWhMhBh-8OJQJ^JhMhBhW=OJQJ^Jh7TCJOJQJ^JaJhzCJOJQJ^JaJhECJOJQJ^JaJ hMhBh;9CJOJQJ^JaJh= CJOJQJ^JaJ hMhBhhvCJOJQJ^JaJhMhBhbQOJQJ^JhMhBh >*OJQJ^JhMhBh OJQJ^JhMhBh?:OJQJ^J!:krs}~$mdm!`gd=  @pd*$`gd=  @pLd*$`Lgd=  @pLd*$^`Lgd= ! ^gd= ! ^`gd= & F @pd*$^`gd= $&+,-RXӼwj]O]>0>h/ pCJOJQJ^JaJ hMhBh;9CJOJQJ^JaJhMhBht>*OJQJ^JhMhBhtOJQJ^JhMhBhbQOJQJ^Jh= OJQJ^JhMhBh OJQJ^J,hMhBh;9B*CJH*OJQJ^JaJph,hMhBh;96B*CJOJQJ^JaJph,hMhBh;9>*B*CJOJQJ^JaJph,hzh;96B*CJOJQJ^JaJph)hMhBh;9B*CJOJQJ^JaJph$,-QRXL`Lgd= !hL^h`Lgd= ! & F`gd=  @p@ d*$^@` gd=  @p@Ld*$^@`Lgd=  @pd*$gd= XY[ƹƯƥ hPs(CJjhPs(UhPs(jhPs(CJUh0OJQJ^JhMhBhOJQJ^JhMhBhtOJQJ^J hMhBh;9CJOJQJ^JaJh/ pCJOJQJ^JaJhT+CJOJQJ^JaJ @p@Ld*$^@`Lgd= d@....()()))()00P8$:p= BP/ =!8"#`$`%88 Dp"s2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH D`D Normal1$OJQJ_HmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List 8+8  Endnote TextCJ>* > Endnote ReferenceH*::  Footnote TextCJ@& !@ Footnote ReferenceH*NN TOC 1) $ 0*$]^`0JJ TOC 2% $ 0*$]^`0JJ TOC 3% $ p0*$]^p`0JJ TOC 4% $ @ 0*$]^@ `0JJ TOC 5% $ 0*$]^`0BB TOC 6 $0*$^`0:: TOC 70*$^`0BB TOC 8 $0*$^`0BB TOC 9 $ 0*$^`0N N Index 1% $ `*$]^``N N Index 2% $ 0*$]^`0>.@>  TOA Heading *$ $.". CaptionCJ:/: _Equation CaptionZ@Z ;9List Paragraph!1$^m$CJOJPJQJaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w< &<   UX ; kQk:$ 8@0(  B S  ?_GoBack    "  3333332233aaMM2233aaMMl9 7 se#^($3UB|9]7\(,uMv"m+S\2T%aZ9aswV 1zTh^`CJOJQJ^Jo(hH.M^`Mo(()h 2 L2 ^2 `LhH.h   ^ `hH.h ^`hH.h L^`LhH.h rr^r`hH.h BB^B`hH.h L^`LhH.h^`CJOJQJ^Jo(hH.h \\^\`hH.h , L, ^, `LhH.h   ^ `hH.h ^`hH.h L^`LhH.h ll^l`hH.h <<^<`hH.h  L ^ `LhH./^`/o(. ^`hH. L^`LhH.   ^ `hH. jj^j`hH. :L:^:`LhH.   ^ `hH. ^`hH. L^`LhH.^`^J.b^b`^J.2 L^2 `L^J. ^ `^J.^`^J.L^`L^J.r^r`^J.B^B`^J.L^`L^J. ^`o(hH()^`OJPJQJ^J) pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.^`^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.^`^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J. ^`o(hH() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.h^`CJOJQJ^Jo(hH.h bb^b`hH.h 2 L2 ^2 `LhH.h   ^ `hH.h ^`hH.h L^`LhH.h rr^r`hH.h BB^B`hH.h L^`LhH.8^8`^J.^`^J. L^ `L^J. ^ `^J.x^x`^J.HL^H`L^J.^`^J.^`^J.L^`L^J.h^`CJOJQJ^Jo(hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.^`^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.m+S7 laswe#3D1H%a 1zQ9)ZD|9]7uM(P@'":ta       '        k                 %Z                                                             '                 '                  icbIn=  4} |Y.)0?:-8=qX IX&Ps(*X+G-Id.1Q*2;9l:*;MhBqC7rt\vwHPxMex\t#sI102UE$ C3;I|/hvW==E' PzT+7T>u! _y7|/cJ@3u7f@||||0@UnknownG*Cx Times New Roman5Symbol3.*Cx Arial71 Courier7@Cambria]  MS MinngsArial Unicode MSA$BCambria Math"9)&GxzgT\x \x !)P4 Jq)PHP  ?xX2!xx{ !A Course Outline Template [blank]Grossmont-Cuyamaca Comm CollBarbara PrilamanL           Oh+'0 4@ ` l x $A Course Outline Template [blank] ڰAPP-Cuyamaca Comm Coll Normal.dotmBarbara Prilaman7Microsoft Office Word@ @nd0@Q@kDBy\x  ՜.+,0  hp  GCCCD "A Course Outline Template [blank] Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEGHIJKLMOPQRSTUXRoot Entry FGByZ1TableLWordDocumentB=SummaryInformation(FDocumentSummaryInformation8NCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q