Executive Curriculum

Executive Program Curriculum

The curriculum for the Executive Program is designed to enhance the ability of participants to implement best practices in the protection of critical infrastructure, organizations and people. The program pedagogy enables participants to effectively network and acquire methods for information sharing through targeted mini-lectures on contemporary counter terrorism topics, practical application focused collaborative problem-solving and guided experiential learning.

To effectively deter terrorism, systems that secure and protect assets and provide early warning of terrorist attacks must be employed. Terrorism is the oldest form of warfare. It has existed for centuries and will continue to evolve as a complex problem that threatens world order for years to come. Solving international terrorism requires that communities of global teams come together and collaborate to resolve this crisis. World leaders, executive managers, and government agencies require strategies, policies, procedures and technology to implement effective counterterrorism programs. This program maximizes this effort by bringing together world leaders with diverse expertise in counter-terrorism with practitioner leaders to solve world relevant terrorism problems.

Program Goals

The CREATE Summer Executive Program has two high impact goals. It is intended to (1) institute best practices in counterterrorism problem solving, and (2) facilitate and enable informed networking of public and private officials for homeland security success. Instructed by academic, research and governmental experts from around the world, each of the one-day program modules in the Executive Program offers contemporary lectures, interactive problem solving focused discussions and site visits on selected topics related to detection, deterrence and preparedness for counter-terrorism events. The program modules are aligned with the divisions of the U.S. Department of Homeland Security’s Science and Technology Directorate. All program module topics are discussed on a strategic, policy, and organizational design level with particular attention to intergovernmental planning challenges and mitigation, while simultaneously leveraging CREATE’s expertise in economic and risk analysis.

Summer 2017 Executive Program Modules

Broad-Based Policy

Many countries, states, and local authorities struggle with developing and implementing effective counter-terrorism policies. At one level, important decisions must be implemented about implementing specific countermeasures, for threats such as Man-portable air defense systems (MANPADS) attacks. At a broader level, major policy decisions must be made relating to resource allocations different types of terrorist threats – for example, explosive devices vs. biological or radiological attacks. This module presents models and tools for risk-based evaluations of proposed decisions on countermeasures and public policies to fight terrorism.

Expected Module Outcomes

Participants will develop:

  • Shared understanding of the definition of terrorism at global level.
  • Shared understanding of the importance of foreign policy in counter-terrorism.
  • Decision making strategies on effective resource allocation for prioritizing risks and threats related to current global, national and local threats
  • Ability to succinctly describe the risks and threats in their respective countries and domains.
  • Ability to succinctly discuss the challenges of counterterrorism on a democracy with impacts on citizens’ rights.

Infrastructure/Geophysical

Critical infrastructure is indicated nation’s assets, systems, networks and functions that provide vital services. Specifically, the infrastructure includes, but is not limited to telecommunications, energy, banking and finance, transportation, water systems and emergency services, both public and private. As a result of decades of experience responding to non-catastrophic natural disasters, industrial accidents and the deliberate acts of malicious individuals, critical infrastructure in most countries is generally resilient. However, government and business contingency, incident and emergency response plans and preparedness efforts must now address the unique aspects of the terrorist threat and catastrophic natural disasters. This module will present and provide interaction related to risk-based resource allocation methodologies for the identification, prioritization and protection of critical infrastructure.

Expected Module Outcome

Participants will develop:

  • Shared understanding of effective use of risk-based resource allocation methods that enable effective identification, prioritization and protection of national critical infrastructures.

Risk Assessment & Intelligence Analysis

This module is focused on risk assessment and intelligence analysis. Risk assessment is a modeling technique used to quantify and prioritize terrorist threats. Game theory and its use in risk assessment will be introduced in this module. Many principles of intelligence and counter-intelligence can be adapted and applied across work environments to assist organizations in protection of their assets from terrorism and other threats. Intelligence analysis concerns the extraction and aggregation of intelligence information and drawing conclusions about future terrorist threats. The focus of the module will be on policymakers as “customers” of risk assessment and intelligence information.

Expected Module Outcomes

Participants will develop:

  • Collective understanding of domestic national intelligence enterprise.
  • Strategies to identify external intelligence.
  • Understanding of the use of game theory on risk assessment.

Human Factors

Terrorists do not think like the general population. Researchers and practitioners concerned with homeland security need to understand what motivates terrorists and how such ideology can take root among both privileged and poor, the educated and the illiterate. Similarly, to effectively respond to terrorism, leaders in counter-terrorism need to fully understand why certain events trigger social disruption but others do not, and how populations best interact with technology to accomplish their missions. This module presents the social and behavioral sciences systems to improve detection, analysis, and understanding of threats posed by individuals, groups, and radical movements.

Expected Module Outcome

Participants will develop:

  • Shared understanding of modeling attack packs, decision trees, rational decision making, social behavior component, radical decision and recruitment in terrorism.

Chemical/Biological & Explosives

Weapons of mass destruction (WMD) broadly encompasses several areas of weapon synthesis, including nuclear, biological, chemical and, increasingly, radiological weapons. This module provides an overview of the different types of WMD and their potential use by terrorist groups. The module includes a review the fundamentals of these weapons including: production and development, weapon delivery systems, physical effects of use, and psychological and economic effects. Both political and technological issues will be addressed in the module. The focus is on prevention, protection, response, and recovery to a WMD terrorism event.

Expected Module Outcomes

Participants will develop:

  • Shared understanding of types and effects of WMD.
  • Strategies to identify effective methods of prevention of, protection against, response to and recovery from WMD terrorism events.

Maritime

Border security and the threat of international terrorism are issues of intense concern and debate. The challenge for policy makers is to provide for a level of border security that is commensurate with threats from abroad, while facilitating legitimate cross-border travel and commerce, and protecting civil liberties. Terrorism has also redefined supply-chain security. The consequences of an attack on or via a critical global port could be a tremendous loss of life and a crippling of the international economy. This module will apply layered capabilities framework to the analysis of current efforts to improve border and supply-chain security.

Expected Module Outcomes

Participants will develop:

  • Shared understanding of developing the attack path for a maritime target.
  • Ability to identify the consequences of a terrorist attack on the global supply chain.
  • Strategies to improve border and supply chain security.

Application