Terrorism is complicated and deadly. Plus, terrorism has hybrid or asymmetric characteristics and comorbid qualities. That is, terrorism morphs or changes, and terrorism usually occurs simultaneously or along with other irregular threats such as insurgency, instability, unconventional warfare, corruption, crime, transnational organized crime, and the proliferation of weapons of mass destruction. The irregular nature and spill-over effect of terrorism reinforcement the complexity.
This course is an advanced level, on-line, non-classified, state-of-the-art course about irregular threats. It has a Introduction and six modules. The course first defines and explains irregular threats and then explores the various parts and pieces of a multidisciplinary approach that can be used to mitigate a variety of irregular threats. From there, the course provides a well-throughout framework in which to analyze and synchronize efforts against irregular threats. Risk based approaches are set forth for each of the established domains. A multidisciplinary approach is an effective counter to irregular threats. Professional referencing and citations are used to reinforce the validity of the content.
Teaching/Learning Objectives are threefold. The first objective is to provide clarity and knowledge which is gained by-way of an extensive review of terms, definitions, and concepts. The second objective is to illustrate the importance of Info and Intel and cooperation and collaboration. Then third, the course provides an advanced level of understanding that can be advanced further by each student, with additional study.
These three goals are achieved with Prezi lectures, videos, reading assignments, and online reference and video libraries.
What to Expect? E-learning is a rather new phenomena and is different from face-to-face learning. Since 2010 numerous scholarly studies have provided a wealth of knowledge about the benefits, drawbacks, and best practices associated with e-learning. Scientifically substantiated techniques and methods have been integrated into this course-ware set to improve the quality and efficacy of the teaching/learning experience.
Intended Audience; Anyone interested in or working within the anti-terrorism (AT), counter-terrorism (CT) and combating terrorism (CbT) communities. Or anyone that deals diretly with irregular thretas. This is not a U.S. centric course. It is intended for a worldwide audience.
Requirements: Participants will need a home or office computer with Windows 7, 8, or XP, or an OS that is equal to Windows 7, 8, or XP. Or other comparable operating system.The student will also need a high speed internet connection of 1MB or better with a valid email address. The student must also be able to communicate in English at a 3/3 level. A graduate degree is highly recommended, but not mandatory.
Richard J. Campbell developed the Irregular Threats course-ware, over a three-year period and is the primary instructor for the course. He spent over 22 years in the United States Army and retired in 1995. He served with the 2nd 75th Ranger Battalion at Fort Lewis WA for over 7-years and was assigned to the JFK Special Warfare Center at Fort Bragg NC for over 6-years. He retired in 1995 and then completed a BA and MA in psychology and worked on in-patient psychiatric wards, with court committed patients. He acted as a member of a multidisciplinary psychiatric treatment team.
In 2005 he was offered a job as an instructor and observer/controller on the Iraq-Kuwait border. In that position he trained coalition and US forces as they deployed to Iraq and Afghanistan. He primarily taught traffic check point operations and search and site exploitation in a JIEDDO funded search house. He taught and developed training in that position for over four years. Between 2009 and 2010 he wrote and published a book titled Asymmetric Tactical Training (2010).
In 2010 he was offered a position at the Counterinsurgency Training Center in Kabul Afghanistan (CTC-A). CTC-A was a part of the NATO Training Mission for Afghanistan (NTM-A). While there he acted as the curriculum developer, site-lead, and lessons learned coordinator. He held that position for two years or until the school closed.
His published papers can be viewed on Academia.edu, or on the Joint Center for International Security Force Assistance (JCISFA) website within the Community of Interest page. The links to his publications, LinkedIn profile, and Twitter account are below.
Academia.edu:
https://henley-putnam.academia.edu/RichardJCampbell
LinkedIn:
Twitter:
https://twitter.com/asytactrain