JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "PL 334"
COURSE NAME: "Terrorism and Counterterrorism"
SEMESTER & YEAR: Summer Session II 2025
SYLLABUS

INSTRUCTOR: Andrea Molle
EMAIL: [email protected]
HOURS: MTWTH 9:00 AM 10:50 AM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES: Prerequisite: PL 209 or permission of the instructor
OFFICE HOURS: By appointment

COURSE DESCRIPTION:
This course will provide the student with an understanding and basic foundation to: explain and compare the varying definitions of terrorism; distinguish the different types of terrorist motivations including left-wing, right-wing, ethnonationalist, separatists, and religious; differentiate terrorism from other forms of violence including political violence, guerilla warfare, insurgency, civil war, unconventional warfare, and crime; understand and describe the historical foundations of terrorism and apply them to modern terrorist events and methods being used to combat them.
SUMMARY OF COURSE CONTENT:
This course provides a comprehensive introduction to terrorism and counterterrorism, offering students a foundational understanding of the subject from a political science and security studies perspective. It explores key concepts, historical developments, and contemporary challenges in terrorism and counterterrorism strategies. Students will begin by examining the definitions and conceptual debates surrounding terrorism, gaining the ability to compare varying interpretations. They will then analyze different terrorist motivations, including left-wing, right-wing, ethnonationalist, separatist, and religious ideologies. The course will also distinguish terrorism from other forms of political violence such as guerrilla warfare, insurgency, civil war, and crime, helping students develop a nuanced understanding of violent political movements. Through case studies and theoretical readings, students will explore the organizational structures of terrorist groups, their methods of operation, and how these have evolved over time. The course will cover major historical trends in terrorism and how these influence modern terrorist activities. Counterterrorism strategies will be a central focus, with students evaluating various approaches, including military, intelligence, law enforcement, and counter-radicalization efforts. Ethical and legal dilemmas related to counterterrorism, such as human rights concerns, surveillance, and targeted killings, will also be discussed. The course is structured around weekly recaps, academic readings, discussions, and documentary screenings to reinforce learning. A midterm exam and a final analytical paper will assess students’ ability to critically engage with course material. By the end of the course, students will be equipped to apply historical perspectives to contemporary terrorist threats, assess counterterrorism policies, and contribute to informed discussions on security and global threats.
LEARNING OUTCOMES:
By the end of the course, students will: 
1. Understand the conceptual and definitional debates surrounding terrorism.
2. Analyze different terrorist ideologies and motivations.
3. Assess the role of state and non-state actors in terrorism and counterterrorism.
4. Evaluate counterterrorism strategies, including military, intelligence, and legal approaches. 
5. Explore ethical and legal dilemmas related to counterterrorism efforts.
TEXTBOOK:
NONE
REQUIRED RESERVED READING:
Book TitleAuthorPublisherISBN numberLibrary Call NumberComments
The Costs and Consequences of Drone WarfareBoyle, M. J. (2013)International Affairs, 89(1), 1-29   
Radicalization into Violent Extremism: A Review of Social Science TheoriesBorum, R. (2011)Journal of Strategic Security, 4(4), 7-36.   
The Causes of TerrorismCrenshaw, M. (1981)Comparative Politics, 13(4), 379-399.   
Human Rights and Counterterrorism: A Clash of Norms? Hoffman, B. (2004)Terrorism and Political Violence, 16(1), 79-97.   
From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism.Horgan, J. (2008). The ANNALS of the American Academy of Political and Social Science, 618(1), 80-94.   
Counterinsurgency Redux.Kilcullen, D. (2009)Survival, 48(4), 111-130.   
From Pablo to Osama: Counterterrorism Lessons from the War on DrugsKenney, M. (2007)Survival, 45(3), 187-206.   
Hezbollah: Financing Terror through Criminal EnterpriseLevitt, M. (2006)Studies in Conflict & Terrorism, 29(3), 123-145.   
The Salafi-Jihad as a Religious Ideology.Moghadam, A. (2013)CTC Sentinel, 6(3), 1-6.  .
The Terrorism Delusion: America's Overwrought Response to September 11Mueller, J., & Stewart, M. G. (2012)International Security, 37(1), 81-110.   
The Trouble with Countering Violent Extremism (CVE)Neumann, P. (2013)International Affairs, 89(4), 873-893   
Terrorism Financing: Trends and ChallengesNapoleoni, L. (2007)Journal of Money Laundering Control, 10(2), 170-174.   
Repression and Terrorism: A Cross-National Empirical Analysis of Types of Repression and Domestic Terrorism. Piazza, J. A. (2017)Terrorism and Political Violence, 29(1), 102-118.   
The Four Waves of Modern TerrorismRapoport, D. C. (2004)Anthropoetics, 8(1).   
Frameworks for Conceptualizing Terrorism.Schmid, A. P. (2004)Terrorism and Political Violence, 16(2), 197-221.   
The Implications of Terrorism’s Decline. Sageman, M. (2017)Perspectives on Terrorism, 11(4), 2-15.   
Cyberterrorism: How Real is the Threat?Weimann, G. (2004)United States Institute of Peace Special Report, 119.   

RECOMMENDED RESERVED READING:
NONE
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
ParticipationDaily discussions based on assigned readings.15%
Reading Responses Brief (300-500 words) critical reflections on readings (once a week).20%
Midterm Exam In-class exam at the end of Week 3.25%
Final PaperA 2,500-word analytical paper on a topic chosen in consultation with the instructor.40%

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the course.
BThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.
CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.

-ATTENDANCE REQUIREMENTS:
ATTENDANCE REQUIREMENTS AND EXAMINATION POLICY
You cannot make-up a major exam (midterm or final) without the permission of the Dean’s Office. The Dean’s Office will grant such permission only when the absence was caused by a serious impediment, such as a documented illness, hospitalization or death in the immediate family (in which you must attend the funeral) or other situations of similar gravity. Absences due to other meaningful conflicts, such as job interviews, family celebrations, travel difficulties, student misunderstandings or personal convenience, will not be excused. Students who will be absent from a major exam must notify the Dean’s Office prior to that exam. Absences from class due to the observance of a religious holiday will normally be excused. Individual students who will have to miss class to observe a religious holiday should notify the instructor by the end of the Add/Drop period to make prior arrangements for making up any work that will be missed. The final exam period runs until ____________
ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

The following schedule is subject to change, but the instructor will provide timely notice of any adjustments.

Week 1: Introduction & Theories of Terrorism

  • Day 1 (Monday): Recap & Course Overview

Introduction to the course and expectations

Overview of terrorism as a field of study

  • Day 2 (Tuesday): What is Terrorism? Definitions and Controversies

Reading: Schmid, A. P. (2004). "Frameworks for Conceptualizing Terrorism." Terrorism and Political Violence, 16(2), 197-221.

  • Day 3 (Wednesday): Historical Evolution of Terrorism

Reading: Rapoport, D. C. (2004). "The Four Waves of Modern Terrorism." Anthropoetics, 8(1).

  • Day 4 (Thursday): Documentary: The History of Terrorism (TBD)

 

Week 2: Terrorist Organizations and Strategies

  • Day 5 (Monday): Recap & Discussion on Terrorism Theories

Review of Week 1 concepts

  • Day 6 (Tuesday): Terrorist Ideologies and Motivations

Reading: Moghadam, A. (2013). "The Salafi-Jihad as a Religious Ideology." CTC Sentinel, 6(3), 1-6.

  • Day 7 (Wednesday): Organizational Structures of Terrorist Groups

Reading: Kenney, M. (2007). "From Pablo to Osama: Counterterrorism Lessons from the War on Drugs." Survival, 45(3), 187-206.

  • Day 8 (Thursday): Documentary: Inside the Terrorist Mind (TBD)

 

Week 3: Counterterrorism Strategies & Midterm

  • Day 9 (Monday): Recap & Review of Terrorist Organizations

Key takeaways from Week 2

  • Day 10 (Tuesday): Cyberterrorism and Emerging Threats

Reading: Weimann, G. (2004). "Cyberterrorism: How Real is the Threat?" United States Institute of Peace Special Report, 119.

  • Day 11 (Wednesday): Military and Intelligence Approaches to Counterterrorism

Reading: Kilcullen, D. (2009). "Counterinsurgency Redux." Survival, 48(4), 111-130.

  • Day 12 (Thursday): Documentary: War on Terror: Intelligence and Surveillance (TBD)
  • End of Week: Midterm Exam

 

Week 4: Countering Violent Extremism & Legal Considerations

  • Day 13 (Monday): Recap & Discussion on Counterterrorism Strategies

Review of lessons learned in counterterrorism

  • Day 14 (Tuesday): Countering Violent Extremism (CVE)

Reading: Neumann, P. (2013). "The Trouble with Countering Violent Extremism (CVE)." International Affairs, 89(4), 873-893.

  • Day 15 (Wednesday): Human Rights and Counterterrorism

Reading: Hoffman, B. (2004). "Human Rights and Counterterrorism: A Clash of Norms?" Terrorism and Political Violence, 16(1), 79-97.

  • Day 16 (Thursday): Documentary: The War on Terror and Human Rights Dilemmas (TBD)

 

Week 5: Ethical Considerations, Future Threats & Final Paper Preparation

  • Day 17 (Monday): Recap & Future of Counterterrorism Discussion

Ethical dilemmas and challenges

  • Day 18 (Tuesday): Drones and Targeted Killings

Reading: Boyle, M. J. (2013). "The Costs and Consequences of Drone Warfare." International Affairs, 89(1), 1-29.

  • Day 19 (Wednesday): The Future of Terrorism

Reading: Sageman, M. (2017). "The Implications of Terrorism's Decline." Perspectives on Terrorism, 11(4), 2-15.

  • Day 20 (Thursday): Documentary: The Future of Terrorism and Counterterrorism Trends (TBD)