part 1. course description and teaching methods...jul 05, 2012  · cyberspace domain, cyber...

22

Upload: others

Post on 25-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

  3

PART 1. COURSE DESCRIPTION AND TEACHING METHODS

1.1 General Information Full course title: Global Security Topical Issues: Weapons of Mass Destruction, Cyberthreats, Terrorism and Organized Crime Type of Course: Elective Level of Course: Master of Arts Year of Study: 2nd Number of ECTS credits allocated: 2,0 Name of lecturer and office hours:

Sergey Veselovskiy, Ph.D. in Political Science, Associate Professor Department of World Politics Office hours: Monday 17.30-19.30 (by appointment only) E-mail: [email protected]

1.2 Course aims and learning outcomes: The course is centered around four topics of nontraditional international security threats agenda: safeguard and proliferation of weapons of mass-destruction, contemporary cybersecurity threats, the rise of Islamist terrorism in the XXI century and illicit international organized crime activities. From Iran to North Korea, from the New START treaty to Syria's chemical stockpile, nuclear, chemical, and biological weapons are on the political agenda around the world. The course will explore the policy and academic aspects of WMD use, construction, and proliferation, both by state and non-state actors. It also will give an understanding of the global efforts to control their spread and reduce their danger. The second part of the course will examine the current international cybersecurity environment, the main principles of cybersecurity, as well as the predicted future of cybersecurity threats. Students will understand the interconnectedness between policy and technology, as well as the efforts to combat contemporary cybersecurity threats. The course will also examine fundamental questions about the political phenomenon known as terrorism. It will explore multiple theories on political violence, what the various forms of political violence are, why terrorism constitutes a distinct form of political violence, and how nations respond to terrorism. Students will gain insight through the review of research on the causes of political violence, its consequences, major terrorist organizations background and the evolution of modern terrorist threat.

  4

In the fourth and final part the course will provides a general overview of transnational crime and narcotics and its effects on political, economic, and social development of countries around the world. It will cover the definitional problem of transnational organized crime, its different manifestations, interconnections between organized criminals and respectable organizations and people. Students will also explore the legislative and policy issues and measures that could help minimize the organized crime problem. Course objectives are the following:

familiarize the students with the concept of weapons of mass destruction;

explain the contemporary problems of WMD nonproliferation;

define the main cybersecurity threats;

understand the difficulties of fighting cyber security threats in the current international environment;

define terrorism as a distinct act of political violence on national and international levels;

familiarize with different modern terrorist groups and their motivation for committing terrorist acts;

get acquainted with the main efforts in fighting terrorism at the global level;

explore the different types of transnational crime and their peculiarities;

understand the problems of fighting transnational organized crime on political as well as legislative level. Learning outcomes: Students will acquire the following intellectual skills:

- familiarize with key academic literature on problems of contemporary nontraditional international security threats;

- know key data and most up to date information on contemporary nontraditional international security threats;

- learn to understand the main development trends in the field of WMD proliferation, cybercrimes and cybersecurity, terrorism and organized crime; Students will also acquire the following practical (professional) skill:

- learn to formulate their own proposals for the use of appropriate measures in the fight of nontraditional international security threats.

  5

1.3. Course requirements Students will be required to attend at least 90% of classes (15 out of 17) and be prepared for in-class discussion of the week’s topic. Conscientious reading of the assigned materials is also mandatory. Students will also be required to take three in-class tests based on lectures, class discussions and readings (see 2.4 for details). 1.3.1. Academic Etiquette Students are required to behave in a courteous manner and maintain a professional demeanor at all times (both in person and in virtual communication). Side conversations in class are disruptive and show a lack of respect for your fellow classmates and for the instructor. Please keep mobile phones on silent or vibrate mode and keep in mind that use of electronic devices (phones, laptops, tablets etc.) may be prohibited at my discretion at any time and are banned during in-class tests. 1.4. Grading plan The final grade is calculated based on three test’s results, as well as in-class activities. PART 2. COURSE CONTENTS 2.1. Types of Work

Types of Work Academic Hours Total workload 144 Total for lectures and seminars 30

Lectures 14

Seminars 16 Homework, preparation for lectures, seminars and tests 114 Evaluation Three In-Class Tests

  6

2.2. Course outline

Course Outline

Academic Hours

Lectures Seminars Homework Academic Hours per

Topic 1. Course Introduction. What is International Security

2 8 10

2. The concept of WMD threat: Chemical, Biological, Radiological and Nuclear Weapons

2 8 10

3. Countering the WMD Threat

2 8 10

4. Aspects of Nuclear Proliferation

2 8 10

5. Nuclear Proliferation: the cases of Iran and North Korea

2 8 10

6. Introduction to the Cyberspace Domain, Cyber Conflict and Cyber Crime

2 8 10

7. Cyber Operations and Cyber War

2 8 10

8. Presumed Cyber Warfare: Case Studies of China, Russia, Iran and North Korea

4 10 14

9. Theory of Political Violence. The Definition of Terrorism

2 8 10

10. Strategies if Terrorism 2 8 10 11. The Islamic Terrorist Threat: from Al-Qaeda to the Islamic State

2 8 10

12. The Global War on Terror and its Provisional

2 8 10

  7

Results 13. Definition of Organized Crime. International Organized Crime Cases

2 8 10

14. Fight Against Transnational Crime: Strategy and Policy Issues

2 8 10

Overall 14 16 114 144 2.3. COURSE CONTENTS Topic 1. Course Introduction. What is International Security?

The establishment of security studies. The concept of international security threat. The difference between national, international and global security threats. The difference between the narrow and broad scope of international security in the academic discourse.

The studies of nontraditional security threats in international relations. Required readings:

1. Buzan, Barry and Hensen, Lene. The Evolution of International Security Studies. – Cambridge: Cambridge University Press, 2009. – Chapter 1.

2. Dannreuther, Roland. International Security: The Contemporary Agenda – Cambridge: Polity Press, 2013. – Introduction.

3. Williams Paul D. Security Studies: An Introduction / Security Studies: An Introduction / ed. by Paul D. Williams. – 2nd ed. – New York: Routledge, 2013.

4. Walt, Stephen. The Renaissance of Security Studies // International Studies Quarterly. – 1991. – Vol.35. – Iss.2.

2. The Concept of WMD Threat: Chemical, Biological, Radiological and Nuclear Weapons.

The development of state chemical weapons programs in the XX century. Cases of chemical’s weapons use in the last decades.

The difference between biological and chemical weapons. Terrorist’s interest in biological weapons.

Radiological, biological and chemical weapons: the differences and similarities.

Why states seek to acquire nuclear weapons. State proliferation of nuclear weapons: the case of AQ Khan.

  8

Required readings:

1. Dolnik, Adam. 13 Years since Tokyo: Re-Visiting the Superterrorism Debate // Perspectives on Terrorism. – 2008. – Iss.2. – Vol.2.

2. Friedman, David. Biological and Chemical Weapons Arms Control in the Middle East: Challenges and Opportunities for a WDM-Free Zone // The Nonproliferation Review. – 2012. – Vol.19. – Iss.3.

3. Hymans, Jacques E.C. Nuclear Proliferation and Non-Proliferation // Oxford Research Encyclopedia of International Studies. – 2010 // Mode of Access: http://internationalstudies.oxfordre.com/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-271?print=pdf

Additional Readings:

1. Clinehens, Neal A. Aum Shinrikyo and Weapons of Mass Destruction: A Case Study – Air Command and Staff College, Maxwell Air Force Base, Alabama, U.S.A. – Mode of Access: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.167.7334&rep=rep1&type=pdf

2. Nuclear Regulatory Commission, Uranium Enrichment // Mode of Access: https://www.nrc.gov/materials/fuel-cycle-fac/ur-enrichment.html

3. Tucker, Jonathan B. The Yellow Rain Controversy: Lessons for Arms Control Compliance // The Nonproliferation Review – 2001. – Vol.8. – Iss.1.

3. Countering the WMD Threat.

The necessary tools for effectively countering WMD. The major nonproliferation treaties: Nuclear Non-Proliferation Treaty, Biological and Toxin Weapons Convention, and the Chemical Weapons Convention. The Problem of their effectiveness.

What can the international community do to more effectively deal with WMD proliferation? Required readings:

1. Boyd, Daniel. Revealed Preferences and the Minimum Requirements of Nuclear Deterrence // Strategic Studies Quarterly. – 2016. – Spring. – Mode of Access: https://pdfs.semanticscholar.org/4c84/248e8ba17cdcee5d789b698fd865212811bb.pdf

  9

2. Report to the President of The United States. Regarding Weapons of Mass Destruction // Commission on the Intelligence Capabilities of the United States. – 2005. – Mode of Access: https://fas.org/irp/offdocs/wmd_report.pdf

3. Zolotukhina, Elizabeth. Nuclear Materials Smuggling in Moldova: A Watershed Moment? // Center for Geopolitics & Security in Realism Studies. – 2015. – Mode of Access: http://cgsrs.org/files/files/publications_28.pdf

4. Aspects of Nuclear Proliferation.

From the Nuclear Nonproliferation Treaty to the Proliferation Security Initiative. The 2015 NPT Review Conference and its results. State reasoning in acquiring nuclear weapons. Required readings:

1. Baklitskiy, Andrey. The 2015 NPT Review Conference and the Future of the Nonproliferation Regime // Arms Control Today – 2015. –July/August.

2. Early, Bryan R. & Asal, Victor. Nuclear Weapons and Existential Threats: Insights from a Comparative Analysis of Nuclear-Armed States // Comparative Strategy. – 2014. – October.

3. Kristensen, Hans; Norris, Robert. Global Nuclear Weapons Inventories, 1945- 2013 // Bulletin of the Atomic Scientists. – 2013. – Vol.69. – Iss.5.

4. Nuclear posture review // The Pentagon. – February 2018. – Mode of Access: https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF  

5. U.S. Department of State, Proliferation Security Initiative – Washington, D.C.: Department of State, 5 July 2012. – Mode of Access: https://www.state.gov/t/isn/c10390.htm

6. Wolf, Amy F. The New START Treaty: Central Limits and Key Provisions // Congressional Research Service – 2014. – Mode of Access: https://fas.org/sgp/crs/nuke/R41219.pdf

Additional readings:

1. Sagan, Scott. Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb // International Security. – 1996-1997. – Vol.21. – Iss.3.

2. Arms Control Association. 2014. U.S.-Russia Arms Control Agreements at a Glance // Arms Control Association – 2017. – Mode of Access: https://www.armscontrol.org/factsheets/USRussiaNuclearAgreementsMarch2010

3. Du Preez, Jean. Half Full or Half Empty? Realizing the Promise of the Nuclear Nonproliferation Treaty // Arms Control Today. – 2006. – December.

  10

5. Nuclear Proliferation: cases of Iran and North Korea.

The historical background and current status of the Iranian and North Korean nuclear programs. The Joint Comprehensive Plan of Action and its implementation. The consequences of US withdrawal from the treaty. Required readings:

1. Albright, David; Kelleher-Vergantini, Serena. Plutonium, Tritium, and Highly Enriched Uranium Production at the Yongbyon Nuclear Site: North Korea’s Arsenal May be Growing Significantly // Institute for Science and International Security – June 2016. – Mode of Access: http://isis-online.org/uploads/isis-reports/documents/Pu_HEU_and_tritium_production_at_Yongbyon_June_14_2016_FINAL.pdf

2. Chantlett-Avery, Emma; Rinehart Ian E.; Nikitin Mary Beth D., North Korea. U.S. Relations, Nuclear Diplomacy, and Internal Situation. // Congressional Research Service. – 2016. – Mode of Access: https://fas.org/sgp/crs/nuke/R41259.pdf

3. Implementation of the NPT Safeguards Agreement and Relevant Provisions of Security Council Resolutions in the Islamic Republic of Iran // International Atomic Energy Agency Vienna: IAEA, 8 November 2011. – Mode of Access: https://www.iaea.org/sites/default/files/gov2011-65.pdf (Read Annex on weaponization activities)

4. Katzman, Kenneth. Iran Sanctions // Congressional Research Service. – 2015. – April 21. – Mode of Access: https://fas.org/sgp/crs/mideast/RS20871.pdf

5. Mazza, Michael. End America’s ‘Strategic Patience’ With North Korea // The National Interest. – 2016. – February 9.

6. Introduction to the Cyberspace Domain, Cyber Conflict and Cyber Crime

Cyber conflict as a topic of study. Cyberspace analogy to the “natural” physical domains of land, sea, air, and water.

The impact of cyber crimes on the challenge of addressing state-based cyber threats.

Addressing cyber crime: the role of governments and corporations/private sector entities.

  11

Required readings: 1. Singer, P.W.; Friedman, Allan. Cybersecurity and Cyberwar: What Everyone

Needs to Know – New York: Oxford University Press, 2014 – Part 1. 2. Valeriano, Brandon; Maness, Ryan C. Cyber War vs. Cyber Realities: Cyber

Conflict in the International System – New York: Oxford University Press, 2015 – Chapter 1.

3. Emm, David. Navigating the Threat Landscape: A Practical Guide – Mode of Access: https://media.kaspersky.com/pdf/kaspersky-threat-navigation-10-tips.pdf

4. Naughton, John. The Evolution of the Internet: From Military Experiment to General Purpose Technology // Journal of Cyber Policy. – 2016. – Vol.1 – Iss.1.

7. Cyber Operations and Cyberwar.

The notion of “cyberwar”: from the alleged Russian hacks against the DNC to the cyber operations associated with the War in Iraq.

Various aspects of cyberwar and their peculiarities. Cyberwar and the military: a new emerging battlefield.

Required readings:

1. Arquilla, John. Cyber war is already upon us // Foreign Policy. – 2012. – March/April.

2. Chernenko, Elena. Political Cyberwar on Doorstep // Russia in Global Affairs. – 2017. – Iss.1.

3. Goldsmith, Jack. Cybersecurity treaties: A skeptical view // Koret-Taube Task Force on National Security and Law, Hoover Institution – Mode of Access: http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf

4. Nye, Joseph. Nuclear lessons for cyber security // Strategic Studies Quarterly – 2011. – Vol.5. – Iss.4.

5. Rid, Thomas. Cyber war will not take place // Journal of Strategic Studies. – 2012. – Vol.35. – Iss.1.

8. Presumed Cyber Warfare: Case Studies of China, Russia, Iran and North Korea.

Possible use of cyber weapons by China in a conflict with the US. Russian alleged cyber operations alongside physical operations in Georgia and

Ukraine.

  12

Development of sophisticated cyber capabilities by Iran and North Korea’s. Had the United States and/or Israel not allegedly engaged in CNA operations against Iran (e.g. Stuxnet), how would Iran have developed its cyber capabilities? Required readings:

1. Valeriano, Brandon; Maness Ryan C. Cyber War vs. Cyber Realities: Cyber Conflict in the International System – New York: Oxford University Press, 2015 – Chapter 6.

2. Singer, P.W.; Friedman, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know – New York: Oxford University Press, 2014 – P.138-168.

3. Nye, Joseph. Deterrence and Dissuasion in Cyberspace // International Security. – 2016/17. – Vol.41. – Iss.43.

4. Bezrukov, Andrey. Save and Protect // Russia in Global Affairs. – 2017. – Iss.1.

5. Lindsay, Jon R. The Impact of China on Cybersecurity: Fiction and Friction // International Security. – 2014. – Vol.39. – Iss.3.

6. Connell, Michael. Deterring Iran’s Use of Offensive Cyber: A Case Study // CNA Analysis and Solutions. – October. 2014. – Mode of Access: https://www.cna.org/CNA_files/PDF/DIM-2014-U-008820-Final.pdf

9. Theory of Political Violence. Definition of Terrorism.

Terrorism as a form of political violence. Persistent difficulties and dilemmas in defining terrorism. Distinctions as a

path to working out a definition of terrorism. Definitions of terrorism within the United Nations. The most commonly used definitions of terrorism and their relation to diverse violent political behaviors.

Required readings:

1. Abrahms, Max. What Terrorists Really Want: Terrorist Motives and Counter Terrorist Strategies // International Security. – 2008. – Vol. – Iss.4.

2. Piazza, James. Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism? // International Studies Quarterly. – 2008. – Vol.52. – Iss.3.

3. Honig, Or & Yahel, Ida. A Fifth Wave of Terrorism? The Emergence of Terrorist Semi-States // Terrorism and Political Violence. – 2017. – June.

  13

Additional readings: 1. Ganor, Boaz. Defining Terrorism: Is One Man’s Terrorist Another Man’s

Freedom Fighter? // Police Practice and Research – 2002. – Vol.3. – Iss.4. 2. Duyvesteyn, Isabelle. How New Is the New Terrorism? // Studies in Conflict &

Terrorism. – 2004. – Vol.27. – Iss.5. 10. Strategies of Terrorism.

Terrorism activities strategies. How terrorism shape domestic and foreign policy.

Major theories regarding psychological, economic, societal, and political factors that lead individuals to join terror groups and use terror violence to achieve political goals.

The rationale behind terrorist activity. Exploring the possible link between poverty, level of education and terrorism. Required readings:

1. Gadarian, Shana K. The politics of threat: How terrorism news shapes foreign policy attitudes // The Journal of Politics. – 2010. – Vol.72. – Iss.2.

2. Kearns, Erin M., Conlon, Brendan, & Young, Joseph K. Lying about terrorism // Studies in Conflict & Terrorism. – 2014. – Vol.37. – Iss.5.

3. Kydd, Andrew H., and Barbara F. Walter. The Strategies of Terrorism // International Security. – 2006. – Vol.31. – Iss.1.

Additional readings:

1. Krueger, Alan; Malecková, Jitka. Education, Poverty, and Terrorism: Is There a Causal Connection? // Journal of Economic Perspectives – 2003. – Vol.17. – Iss.4.

11. The Islamic Terrorist Threat: from Al-Qaida to the Islamic State.

The role of Al-Qaeda as an Islamist’s foreign fighters base during the war in Afghanistan in the 1980-ies. The evolution of Al-Qaeda in the 1990-ies. September 11 terrorist attacks and the US response.

The civil war in Syria as a catalyst for the Islamic State of Iraq and the Levant. The current situation in Syria and Iraq. The possibility of the Islamic State to further propagate in different regions of the world. Required readings:

1. Hoffman, Bruce. Inside Terrorism. Third Edition. – New York: Columbia University Press, 2017. – Chapter 4.

  14

2. McCants, William. The ISIS Apocalypse: the History, Strategy and Doomsday Vision of the Islamic State. – St. Martin’s Press, 2015, Chapter 1 and 6.

3. Berger, J.M. The Islamic State vs. al Qaeda // Foreign Policy. – 2014. – September.

4. Cronin, Audrey K. How al-Qaida ends: The decline and demise of terrorist groups // International Security. – 2006. – Vol.31. – Iss.1.

5. Kuznetsov, Vassily. The Islamic State: Alternative Statehood? // Russia in Global Affairs. – 2015. – №4.

12. The Global War on Terror and its Provisional Results

The military actions undertaken by US military in Afghanistan. The retreat of the Taliban and Al-Qaeda fighters to Pakistan territory. The evolution of Al-Qaeda and the eventual death of Osama bin Laden.

The US invasion of Iraq and its costly mistakes. The fall of the Saddam Hussein regime and the atomization of Iraq.

Other nonmilitary measures undertaken to stop terrorist activities since September 11th 2001. Required readings:

1. Davis, Lynn E.; Martini, Jeffrey; Cragin, Kim. A Strategy to Counter ISIL as a Transregional Threat // RAND Corporation. – 2017. – P.1-24. – Mode of Access: https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE228/RAND_PE228.pdf

2. Gaibulloev, Khusrav & Sandler, Todd. Determinants of the Demise of Terrorist Organizations // Southern Economic Journal. – 2013. – Vol.79. – Iss.4.

3. Rudner, Martin. Al Qaeda's Twenty-Year Strategic Plan: The Current Phase of Global Terror // Studies in Conflict & Terrorism. – 2013. – Vol.35. – Iss.12.

4. Moghadam, Assaf. How Al Qaeda Innovates // Security Studies. – 2013. – Vol.22. – Iss.3.

13. Definition of “organized crime”. International Organized Crime Cases.

What constitutes “organized crime” and its peculiarities. Why organized crime is flourishing and the world is losing control on international illicit activities.

The different illicit international activities: human trafficking and corruption, tobacco smuggling and organized crime, drugs and money laundering, informal financial networks.

  15

Required readings: 1. Finckenauer, James O. Problems of definition: What is organized crime? //

Trends in Organized Crime – 2005. – Iss. 8(3) 2. FATF Illicit Tobacco Trade // Financial Action Task Force on Money

Laundering– 2012. – PP.7-18; 23-38. – Mode of Access: https://www.fatf-gafi.org/media/fatf/documents/reports/Illicit%20Tobacco%20Trade.pdf

3. Passas, Nikos. Financial intermediaries – Anti-money laundering allies in cash-based societies? // Bergen: U4 Issue 2015:10. Chr. Michelsen Institute – 2015. – Mode of Access: https://www.u4.no/publications/financial-intermediaries-anti-money-laundering-allies-in-cash-based-societies

4. Soudijn, Melvin, & Reuter, Peter. Cash and carry: the high cost of currency smuggling in the drug trade // Crime, Law and Social Change. – 2016. – Vol.66. – Iss.3.

5. UN Global Report on Trafficking in Person // United Nations Office on Drugs and Crime. – 2016. – PP. – 13-46. – Mode of Access: https://www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf

14. Fight Against Transnational Crime: Strategy and Policy Issues.

Political and administrative problems of fighting transnational crimes. Examining different national cases of fighting transnational crime and main achievements on the international level.

Required readings:

1. Dupont, Benoit. Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime // An Interdisciplinary Journal. – 2017. – Vol. 67. – Iss.1.

2. Sharman, J. C., & Chaikin, David. Corruption and anti-money-laundering systems: Putting a luxury good to work // Governance. – 2009. – Vol.22. – Iss.1.

3. Thoumi, Francisco & Anzola, Marcela. Asset and money laundering in Bolivia, Colombia and Peru: a legal transplant in vulnerable environments? // An Interdisciplinary Journal. – 2010. – Vol.53 – Iss.5.

4. UN Convention Against Transnational Organized Crime and the Protocols Thereto // United Nations. – 2004 – Mode of Access: https://www.unodc.org/documents/middleeastandnorthafrica/organised-crime/UNITED_NATIONS_CONVENTION_AGAINST_TRANSNATIONAL_ORGANIZED_CRIME_AND_THE_PROTOCOLS_THERETO.pdf

  16

2.4. QUESTIONS FOR TESTS In-Class Tests

The test will have two versions with an equally distributed types of questions. It will contain 10 theoretical and practical questions on reading material, lectures and class discussions. Fully correct answers to a question will be awarded 10 points. For partially correct answers, the number of points may vary from 1 to 9. Incorrect answers will receive 0 points. The overall result of the midterm test consists of the total score for all the 10 questions summed up.

The test will include: A. Open questions (Example: Define the notion of «organized crime »); B. Question on the knowledge of a specific historical date or figure (Example:

Which terrorist group is responsible for the highest number of terrorist attacks in 2016?).

Sample Examination questions

1. The difference between traditional and nontraditonal security issues. 2. Security threats on the national, regional and international levels. 3. Difference between different types of WMD. 4. Main WMD non-proliferation treaties. 5. The main problems of proliferation of weapons of mass destruction. 6. The 2015 NPT conference and its main results. 7. Conflict over the Iranian nuclear program. 8. Conflict over the North Korean nuclear program. 9. Definitions of cyber conflict and cyber crimes. 10. The role of government and private sector in countering cyber crimes. 11. Examples of contemporary cyberwarfare. 12. Cyberwarfare: the role of the military. 13. Cyberwarfare case studies: a critical overview of the China, Iran, Russia and

North Korean cases. 14. Terrorism as a peculiar form of political violence. 15. The problem of defining terrorism. 16. Different strategies of terrorism. 17. Factors that lead individuals to join terrorist groups. 18. Al-Qaeda as a terrorist organization: roots and evolution. 19. The formation and evolution of the Islamic state. 20. The military operation in Afghanistan and Iraq and their consequences. 21. Nonmiitary measures undertaken since September 11, 2001 to stop terrorist

activities. 22. The problem of defining organized crime.

  17

23. Different types of international illicit activities and their peculiarities. 24. Political and administrative problems of fighting transnational crime.

2.5. TYPES OF EXCTACURRICULUM WORK

1. Reading the assigned material; 2. Studying for the three in-class test.

2.6. TEST TIMING Test will be taken in-class on the 5th, 9th and 14th class. The tests will be announced a week before they will be taken. 2.7. READING LIST Required reading: Main readings:

1. Hoffman, Bruce. Inside Terrorism. Third Edition. – New York: Columbia University Press, 2017. – Chapter 4.

2. McCants, William. The ISIS Apocalypse: the History, Strategy and Doomsday Vision of the Islamic State. – St. Martin’s Press, 2015. – Chapter 1, Chapter 6.

Additional Readings:

1. Abrahms, Max. What Terrorists Really Want: Terrorist Motives and Counter Terrorist Strategies // International Security. – 2008. – Vol. – Iss.4.

2. Albright, David; Kelleher-Vergantini, Serena. Plutonium, Tritium, and Highly Enriched Uranium Production at the Yongbyon Nuclear Site: North Korea’s Arsenal May be Growing Significantly // Institute for Science and International Security – June 2016. – Mode of Access: http://isis-online.org/uploads/isis-reports/documents/Pu_HEU_and_tritium_production_at_Yongbyon_June_14_2016_FINAL.pdf

3. Arms Control Association. 2014. U.S.-Russia Arms Control Agreements at a Glance // Arms Control Association – 2017. – Mode of Access: https://www.armscontrol.org/factsheets/USRussiaNuclearAgreementsMarch2010

4. Arquilla, John. Cyber war is already upon us // Foreign Policy. – 2012. – March/April.

5.  Baklitskiy, Andrey. The 2015 NPT Review Conference and the Future of the Nonproliferation Regime // Arms Control Today – 2015. –July/August.

6. Berger, J.M. The Islamic State vs. al Qaeda // Foreign Policy. – 2014. – September.

  18

7. Bezrukov, Andrey. Save and Protect // Russia in Global Affairs. – 2017. – Iss.1.

8. Boyd, Daniel. Revealed Preferences and the Minimum Requirements of Nuclear Deterrence // Strategic Studies Quarterly. – 2016. – Spring. – Mode of Access: https://pdfs.semanticscholar.org/4c84/248e8ba17cdcee5d789b698fd865212811bb.pdf

9. Buzan, Barry and Hensen, Lene. The Evolution of International Security Studies. – Cambridge: Cambridge University Press, 2009. – Chapter 1.

10. Chantlett-Avery, Emma; Rinehart Ian E.; Nikitin Mary Beth D., North Korea. U.S. Relations, Nuclear Diplomacy, and Internal Situation. // Congressional Research Service. – 2016. – Mode of Access: https://fas.org/sgp/crs/nuke/R41259.pdf

11. Chernenko, Elena. Political Cyberwar on Doorstep // Russia in Global Affairs. – 2017. – Iss.1.

12. Clinehens, Neal A. Aum Shinrikyo and Weapons of Mass Destruction: A Case Study – Air Command and Staff College, Maxwell Air Force Base, Alabama, U.S.A. – Mode of Access: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.167.7334&rep=rep1&type=pdf

13. Connell, Michael. Deterring Iran’s Use of Offensive Cyber: A Case Study // CNA Analysis and Solutions. – October. 2014. – Mode of Access: https://www.cna.org/CNA_files/PDF/DIM-2014-U-008820-Final.pdf

14. Cronin, Audrey K. How al-Qaida ends: The decline and demise of terrorist groups // International Security. – 2006. – Vol.31. – Iss.1.

15. Dannreuther, Roland. International Security: The Contemporary Agenda – Cambridge: Polity Press, 2013. – Introduction.

16. Davis, Lynn E.; Martini, Jeffrey; Cragin, Kim. A Strategy to Counter ISIL as a Transregional Threat // RAND Corporation. – 2017. – P.1-24. – Mode of Access: https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE228/RAND_PE228.pdf

17. Dolnik, Adam. 13 Years since Tokyo: Re-Visiting the Superterrorism Debate // Perspectives on Terrorism. – 2008. – Iss.2. – Vol.2.

18. Du Preez, Jean. Half Full or Half Empty? Realizing the Promise of the Nuclear Nonproliferation Treaty // Arms Control Today. – 2006. – December.

19. Dupont, Benoit. Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime // An Interdisciplinary Journal. – 2017. – Vol. 67. – Iss.1.

  19

20. Duyvesteyn, Isabelle. How New Is the New Terrorism? // Studies in Conflict & Terrorism. – 2004. – Vol.27. – Iss.5.

21. Early, Bryan R. & Asal, Victor. Nuclear Weapons and Existential Threats: Insights from a Comparative Analysis of Nuclear-Armed States // Comparative Strategy. – 2014. – October. 

22. Emm, David. Navigating the Threat Landscape: A Practical Guide – Mode of Access: https://media.kaspersky.com/pdf/kaspersky-threat-navigation-10-tips.pdf

23. FATF Illicit Tobacco Trade // Financial Action Task Force on Money Laundering– 2012. – PP.7-18; 23-38. – Mode of Access: https://www.fatf-gafi.org/media/fatf/documents/reports/Illicit%20Tobacco%20Trade.pdf

24. Finckenauer, James O. Problems of definition: What is organized crime? // Trends in Organized Crime – 2005. – Iss. 8(3)

25. Friedman, David. Biological and Chemical Weapons Arms Control in the Middle East: Challenges and Opportunities for a WDM-Free Zone // The Nonproliferation Review. – 2012. – Vol.19. – Iss.3.

26. Gadarian, Shana K. The politics of threat: How terrorism news shapes foreign policy attitudes // The Journal of Politics. – 2010. – Vol.72. – Iss.2.

27. Gaibulloev, Khusrav & Sandler, Todd. Determinants of the Demise of Terrorist Organizations // Southern Economic Journal. – 2013. – Vol.79. – Iss.4.

28. Ganor, Boaz. Defining Terrorism: Is One Man’s Terrorist Another Man’s Freedom Fighter? // Police Practice and Research – 2002. – Vol.3. – Iss.4.

29. Goldsmith, Jack. Cybersecurity treaties: A skeptical view // Koret-Taube Task Force on National Security and Law, Hoover Institution – Mode of Access: http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf

30. Honig, Or & Yahel, Ida. A Fifth Wave of Terrorism? The Emergence of Terrorist Semi-States // Terrorism and Political Violence. – 2017. – June.

31. Hymans, Jacques E.C. Nuclear Proliferation and Non-Proliferation // Oxford Research Encyclopedia of International Studies. – 2010 // Mode of Access: http://internationalstudies.oxfordre.com/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-271?print=pdf

32. Implementation of the NPT Safeguards Agreement and Relevant Provisions of Security Council Resolutions in the Islamic Republic of Iran // International Atomic Energy Agency Vienna: IAEA, 8 November 2011. – Mode of Access: https://www.iaea.org/sites/default/files/gov2011-65.pdf (Read Annex on weaponization activities)

  20

33. Katzman, Kenneth. Iran Sanctions // Congressional Research Service. – 2015. – April 21. – Mode of Access: https://fas.org/sgp/crs/mideast/RS20871.pdf

34. Kearns, Erin M., Conlon, Brendan, & Young, Joseph K. Lying about terrorism // Studies in Conflict & Terrorism. – 2014. – Vol.37. – Iss.5.

35. Kristensen, Hans; Norris, Robert. Global Nuclear Weapons Inventories, 1945- 2013 // Bulletin of the Atomic Scientists. – 2013. – Vol.69. – Iss.5.

36. Krueger, Alan; Malecková, Jitka. Education, Poverty, and Terrorism: Is There a Causal Connection? // Journal of Economic Perspectives – 2003. – Vol.17. – Iss.4.

37. Kuznetsov, Vassily. The Islamic State: Alternative Statehood? // Russia in Global Affairs. – 2015. – №4.

38. Kydd, Andrew H., and Barbara F. Walter. The Strategies of Terrorism // International Security. – 2006. – Vol.31. – Iss.1.

39. Lindsay, Jon R. The Impact of China on Cybersecurity: Fiction and Friction // International Security. – 2014. – Vol.39. – Iss.3.

40. Mazza, Michael. End America’s ‘Strategic Patience’ With North Korea // The National Interest. – 2016. – February 9.

41. Moghadam, Assaf. How Al Qaeda Innovates // Security Studies. – 2013. – Vol.22. – Iss.3.

42. Naughton, John. The Evolution of the Internet: From Military Experiment to General Purpose Technology // Journal of Cyber Policy. – 2016. – Vol.1 – Iss.1.

43. Nuclear posture review // The Pentagon. – February 2018. – Mode of Access: https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF  

44. Nuclear Regulatory Commission, Uranium Enrichment // Mode of Access: https://www.nrc.gov/materials/fuel-cycle-fac/ur-enrichment.html

45. Nye, Joseph. Deterrence and Dissuasion in Cyberspace // International Security. – 2016/17. – Vol.41. – Iss.43.

46. Nye, Joseph. Nuclear lessons for cyber security // Strategic Studies Quarterly – 2011. – Vol.5. – Iss.4.

47. Passas, Nikos. Financial intermediaries – Anti-money laundering allies in cash-based societies? // Bergen: U4 Issue 2015:10. Chr. Michelsen Institute – 2015. – Mode of Access: https://www.u4.no/publications/financial-intermediaries-anti-money-laundering-allies-in-cash-based-societies

48. Piazza, James. Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism? // International Studies Quarterly. – 2008. – Vol.52. – Iss.3.

  21

49. Report to the President of The United States. Regarding Weapons of Mass Destruction // Commission on the Intelligence Capabilities of the United States. – 2005. – Mode of Access: https://fas.org/irp/offdocs/wmd_report.pdf

50. Rid, Thomas. Cyber war will not take place // Journal of Strategic Studies. – 2012. – Vol.35. – Iss.1.

51. Rudner, Martin. Al Qaeda's Twenty-Year Strategic Plan: The Current Phase of Global Terror // Studies in Conflict & Terrorism. – 2013. – Vol.35. – Iss.12.

52. Sagan, Scott. Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb // International Security. – 1996-1997. – Vol.21. – Iss.3.

53. Sharman, J. C., & Chaikin, David. Corruption and anti-money-laundering systems: Putting a luxury good to work // Governance. – 2009. – Vol.22. – Iss.1.

54. Singer, P.W.; Friedman, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know – New York: Oxford University Press, 2014. – Part 1, P.138-168.

55. Soudijn, Melvin, & Reuter, Peter. Cash and carry: the high cost of currency smuggling in the drug trade // Crime, Law and Social Change. – 2016. – Vol.66. – Iss.3.

56. Thoumi, Francisco & Anzola, Marcela. Asset and money laundering in Bolivia, Colombia and Peru: a legal transplant in vulnerable environments? // An Interdisciplinary Journal. – 2010. – Vol.53 – Iss.5.

57. Tucker, Jonathan B. The Yellow Rain Controversy: Lessons for Arms Control Compliance // The Nonproliferation Review – 2001. – Vol.8. – Iss.1.

58. U.S. Department of State, Proliferation Security Initiative – Washington, D.C.: Department of State, 5 July 2012. – Mode of Access: https://www.state.gov/t/isn/c10390.htm

59. UN Convention Against Transnational Organized Crime and the Protocols Thereto // United Nations. – 2004 – Mode of Access: https://www.unodc.org/documents/middleeastandnorthafrica/organised-crime/UNITED_NATIONS_CONVENTION_AGAINST_TRANSNATIONAL_ORGANIZED_CRIME_AND_THE_PROTOCOLS_THERETO.pdf

60. UN Global Report on Trafficking in Person // United Nations Office on Drugs and Crime. – 2016. – PP. – 13-46. – Mode of Access: https://www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf

61. Valeriano, Brandon; Maness Ryan C. Cyber War vs. Cyber Realities: Cyber Conflict in the International System – New York: Oxford University Press, 2015. – Chapter 1, Chapter 6.

  22

62. Walt, Stephen. The Renaissance of Security Studies // International Studies Quarterly. – 1991. – Vol.35. – Iss.2.

63. Williams Paul D. Security Studies: An Introduction / Security Studies: An Introduction / ed. by Paul D. Williams. – 2nd ed. – New York: Routledge, 2013.

64. Wolf, Amy F. The New START Treaty: Central Limits and Key Provisions // Congressional Research Service – 2014. – Mode of Access: https://fas.org/sgp/crs/nuke/R41219.pdf

65. Zolotukhina, Elizabeth. Nuclear Materials Smuggling in Moldova: A Watershed Moment? // Center for Geopolitics & Security in Realism Studies. – 2015. – Mode of Access: http://cgsrs.org/files/files/publications_28.pdf

Russia in Global Affairs: a Russian journal dealing with the Foreign affairs and international relations of Russia and other countries. Analytics, stories and reviews of global events. Issues of diplomatic affairs and international legislature. International conflicts and clashes. http://eng.globalaffairs.ru/