Training Courses For a Counter Terrorism Degree Online

1 view
Skip to first unread message

Daniel Sommer

unread,
May 18, 2013, 11:36:03 PM5/18/13
to publish-the...@googlegroups.com
*****************************************************************

Message delivered directly to members of the group:
publish-the...@googlegroups.com

*****************************************************************

Please consider this free-reprint article written by:
Daniel Sommer

*****************************
IMPORTANT - Publication/Reprint Terms

- You have permission to publish this article electronically in free-only publications such as a website or an ezine as long as the bylines are included.

- You are not allowed to use this article for commercial purposes. The article should only be reprinted in a publicly accessible website and not in a members-only commercial site.

- You are not allowed to post/reprint this article in any sites/publications that contains or supports hate, violence, porn and warez or any indecent and illegal sites/publications.

- You are not allowed to use this article in UCE (Unsolicited Commercial Email) or SPAM. This article MUST be distributed in an opt-in email list only.

- If you distribute this article in an ezine or newsletter, we ask that you send a copy of the newsletter or ezine that contains the article to http://www.isnare.com/eta.php?aid=1840471

- If you post this article in a website/forum/blog, ALL links MUST be set to hyperlinks and we ask that you send a copy of the URL where the article is posted to http://www.isnare.com/eta.php?aid=1840471

- We request that you ask permission from the author if you want to publish this article in print.

The role of iSnare.com is only to distribute this article as part of its Article Distribution feature ( http://www.isnare.com/distribution.php ). iSnare.com does NOT own this article, please respect the author's copyright and this publication/reprint terms. If you do not agree to any of these terms, please do not reprint or publish this article.
*****************************

Article Title: Training Courses For a Counter Terrorism Degree Online
Author: Daniel Sommer
Word Count: 607
Article URL: http://www.isnare.com/?aid=1840471&ca=Education
Format: 64cpl
Contact The Author: http://www.isnare.com/eta.php?aid=1840471

Easy Publish Tool: http://www.isnare.com/html.php?aid=1840471

*********************** ARTICLE START ***********************
There is an ongoing debate in academia about the effectiveness of online degrees versus training courses. These discussions encompass the different concepts of education and training and if these concepts can be as effectively implemented online as in the classroom. Education is defined as the mental process of understanding concepts and principles and why things work; training is viewed as the process to develop skills that allow a person to do something. For example, an individual can be educated as an aeronautical engineer but not be skilled as a pilot without the associated pilot training. Counter terrorism training courses should offer the student the opportunity to have an interactive experience that combines education with hands-on training. Terrorist groups actively provide education and training; one of most effective platforms for terrorists to do training is the Internet. In addition, the internet allows terrorists to reach supporters, motivate potential recruits, and perpetuate their messages that justify their violent causes. The Internet allows for the sharing of information, for networking, and the purchase of weapons, cash cards, and other tools that allow terrorists to carry out their violent agendas. The Internet also allows them to select and research targets for future attacks. A medium that is so heavily utilized by terrorists makes the argument that earning a counter terrorism degree online places the student on the same level as a modern terrorist by utilizing this valuable communications and information tool.

The various rebel forces who brought about the Arab Spring also used the Internet extensively to communicate to the outside world what was occurring within their countries as well as internally to coordinate their attack efforts; Egypt, Syria and Libya are prime examples showing how Internet technology was used. The involvement of the incumbent governments using the Internet was demonstrated in their ability to shut the Internet down; this was done in order to thwart the rebel communication efforts; the incumbents also used the Internet to spread misinformation to both internal and external users. This is remarkable because this government control over the Internet now has transitioned to the new �reform� governments.

As the U.S. Intelligence Community evaluates the potential friendliness of these �reform� governments to U.S. interests, there is a major concern that the new governments are facing problems with terror groups such as al Qaeda and the Muslim Brotherhood. It is critical to the U.S. to track what information is placed on the Internet in these countries by terrorists; such information also becomes essential background for the intelligence services and to formulate up-to-date programs for a counter terrorism degree online and counter terrorism training courses.

Understanding how terrorists use the Internet supports the U.S. government and private entities� efforts to provide �learning� in the counter terrorism discipline; this knowledge gives counterterrorism forces an edge to leverage strategic factors against the threat realities in an adaptive counterterrorism curriculum. Students pursuing a counter terrorism degree online can learn and work in a virtual 100% computer-based environment similar to how terrorists learn and work. Students who take counter terrorism training courses online will find the playbook of techniques the same as the counterterrorism tools utilized by resident students; however the advantage for those earning their degree online resides in the ability to more freely time-mange the learning process. Thus contemporary �learning� in a counter terrorism discipline means instructors must bring a blend of experience operating in the field and strong grounding in the broad enduring principles of counter terrorism in the new online learning environment. This places a new standard on educational institutions for faculty staffing to provide security and counterterrorism instruction.


About The Author: Dan Sommer works for Henley-Putnam University, a leading educational institution in the field of Strategic Security. For more info on Henley-Putnam University, counter terrorism degree online, counter terrorism training courses, call 888-852-8746 or visit us online at http://www.Henley-Putnam.edu

Please use the HTML version of this article at:
http://www.isnare.com/html.php?aid=1840471
*********************** ARTICLE END ***********************

- To distribute your articles go to http://www.isnare.com/distribution.php
- For more free-reprint articles go to http://www.isnare.com
Reply all
Reply to author
Forward
0 new messages