Search in Middlebury Institute of International Studies
Results
NPTG8566A-F23
|
Terror & CT in Africa
|
NPTG8568A-F23
|
Cybersecurity:OperatnalPrspctv
Cybersecurity: An Operational Perspective
This course will provide an overview of enterprise cybersecurity programs, introduce the evolution of cybersecurity threats and associated impacts to the private and public sectors globally over the last decade, and offer an operational, “on the ground” perspective to participating in building programs while responding to threats. The content will be welcoming to non-technical audiences, and will thread how current legal and policy norms are maturing in response to geo-political necessities. The second weekend will include a guided use case in which students will have the opportunity to “war game” a scenario based on real world events.
|
NPTG8574A-F23
|
Intro to WMD Nonproliferation
This course provides a comprehensive introduction to the issues surrounding the proliferation of nuclear, biological, chemical, and radiological (NBCR) weapons and their means of delivery, the consequences of proliferation, and means to stem it or ameliorate its dangers, including:
• Nuclear, biological, chemical, and radiological weapons technologies • Means of delivery, including ballistic and cruise missile technology • Alternative perspectives on the dangers of proliferation and the utility of the term “weapons of mass destruction” (WMD) • Factors affecting why states do or don’t pursue and obtain nuclear, biological, chemical, and radiological weapons and their means of delivery • Potential and actual non-state actor pursuit, acquisition, and use of NBCR weapons • Profiles of key countries and their NBCR programs and policies • Deterrence vis-à-vis states and non-state actors • Counterproliferation, including the possible use of force • The nuclear nonproliferation regime, including the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA) safeguards system • The Biological and Toxin Weapons Convention (BWC) • The Chemical Weapons Convention (CWC) • Missile control regimes and other export control arrangements • Cooperative threat reduction and various post-9/11 initiatives • Alternative futures, including new nuclear abolition debates
|
NPTG8576A-F23
|
Intro to Crypto,Web 3.0 & DeFi
In this course, you will learn the essentials underlying cryptocurrency, Web3, and DeFi; go hands-on with crypto transactions; learn to monitor the blockchain (and understand what you are looking at); and comprehend the various ways the ways crypto and blockchain are used in real life, where the technology is headed, and how it can be abused.
|
NPTG8584A-F23
|
Introduction to Terrorism
The course is an introduction to the subject of terrorism. The course will focus on a range of fundamental questions, such as: What is Terrorism? What causes Terrorism? Why do terrorist groups emerge and how do they end? What is extremism? Why do individuals join terrorist groups? What are lone wolf terrorists? What is leaderless jihad? These are but a few of the elements that will be explored over the course of the semester. The course also aims to expose students to a wide range of terrorist groups and ideologies.
|
NPTG8610A-F23
|
Sem: Counterterrorism
The counterterrorism seminar is designed to address the challenges of terrorism in the current and future global security environment in a participatory format. Specifically, the seminar briefly reviews the threat terrorism poses to liberal democratic states, citizens and policymakers, then explores how liberal democracies can best predict, prevent, preempt and, if necessary, directly combat terrorism and terrorists. The course will assess the history and future of terrorism; analyze terrorist and state strategies; and then focus on the tools to fight terrorism - military, intelligence, police, diplomatic institutions and approaches; the "targets" of counterterrorism - leaders, finances, safe havens, networks, ideologies; and the technologies used to counter terrorism - drones, social media, and more. Case studies and simulations will be used throughout the course.
|
NPTG8619A-F23
|
Sem:CounteringViolentExtremism
This course on Countering Violent Extremism (CVE) will examine the non-violent approaches to countering violent extremism, such as prevention (preventing violent extremism, PVE), intervention, rehabilitation, and reintegration programs. The course will also examine the pathways individuals take to extremism, with a focus on the myriad of push and pull factors that can contribute to radicalization. The course will also examine the various types of CVE/PVE programs developed by governmental and non-governmental entities. The course is experiential by design and the class will participate in the Invent 2 Prevent (I2P) program sponsored by the Department of Homeland Security, the McCain Institute and EdVenture Partners. I2P is a national competition whereupon, specifically, students in the class will create a tool, product, or initiative to prevent targeted violence and extremism.
|
NPTG8623A-F23
|
Sem: Corruption
|
NPTG8639A-F23
|
Sem:Deter&InfluencTerrorsm&WMD
Seminar: Deterrence and Influence Terrorism and WMD Proliferation
This seminar examines deterrence and other strategies for responding to security threats, with a focus on how those strategies might be adapted to deal with the dangers posed by terrorism and WMD proliferation. The course will survey existing research on deterrence and various alternative policy tools such as coercive diplomacy, assurance, positive incentives, and soft power. It will introduce some of the latest thinking about whether these tools are useful for influencing actors away from support for terrorism or WMD acquisition or use.
|
NPTG8645A-F23
|
Sem:Proliferation&Intellignce
Throughout the nuclear age – from the Manhattan Project to our own challenge of assessing with Iran’s nuclear program – the history of nuclear proliferation intelligence has been largely an history of failures. No doubt, intelligence about nuclear proliferation is a tricky business. And yet policy makers do need intelligence to make decisions on proliferation matters.
The seminar is both a study of one generis problem, and also a story of a history of that problem. Understanding the complexity of the problem defines our historical survey, while history will be also an aid to appreciate better the problem. In a way, the seminar’s overall interest is to narrate and revisit the history of nuclear proliferation from the perspective of problem of intelligence. The course examines the problem of nuclear intelligence by revisiting key cases in the history of nuclear proliferation: Germany in World War II, the Soviet Union in the mid-late 1940s, the early NIEs on proliferation, Israel in the late 50s and the 1960s, India in 1974, Pakistan in the 1980s, South Africa in the late 1970s and 1980s, Iraq (twice) in the 1980s, India (second time) in 1998, and Iran today.
|