91tv

The Middlebury Institute Master of Arts in Nonproliferation and Terrorism Studies (NPTS) is a four-semester, 60-credit program.

Start Dates Credits Thesis Language Competency Program Chair
August or January 60 Optional Required Jeff Knopf

Learning Goals

Our rigorous, professionally-focused curriculum will prepare you for a career addressing domestic and global security concerns. You will learn to counter threats posed by terrorism, financial crimes such as money laundering, and nuclear, biological, and chemical weapons. Our unique program involves a blend of classes, workshops, and hands-on experiences that provide students with both subject-matter expertise and training in practical skills that are in high demand by employers. Review the learning Goals

Requirements

Core course work:

  • International Security Research and Analysis (2 credits)
  • Global Politics (4 credits)
  • Introduction to WMD Nonproliferation (4 credits)
  • Introduction to Terrorism Studies (4 credits)
  • Science and Technology for NPTS (4 credits)

Methods/Skills Courses (2 or 4 credits) sample courses:

  • Writing and Briefing Memos
  • Tabletop Exercise Design and Operation
  • Geospatial Tools for NPTS

NPTS Seminars (8 credits) and NPTS Courses (8 credits) sample courses:

  • Cybersecurity governance
  • Proliferation and Intelligence
  • Counterterrorism
  • Chemical and Biological Weapons and Arms Control
  • Global Jihadism
  • Deterring and Influencing Terrorism and WMD
  • Drones and Surveillance

Electives (10-12 credits) sample courses:

  • Nonproliferation Treaty Simulation
  • Evolution of Chinese Nuclear Policy
  • Cyberwar
  • Terrorism in Southeast Asia
  • Introduction to Network Analysis
  • Financial Investigation and Compliance

Language (12 credits) sample courses:

  • Topics in Security and International Relations (in Arabic)
  • Citizenship, Security, and Development in Latin America (in Spanish)
  • Challenges in Peacebuilding—Congo (in French)
  • Vladimir Putin: Russia and Its President (in Russian)
  • Japan in the World (in Japanese)

Core Course Work

These courses introduce the fields of nonproliferation and terrorism studies, including the technical aspects of weapons proliferation; how these issues fit into the broader context of world politics; and practical training in research methods and other analytical techniques.

NPTS Seminars and Courses

Advanced courses allow for deeper knowledge on a particular region or specialized topic.

Electives

Electives—chosen in consultation with your career and academic adviser—build on expertise that can benefit your career. Elective credits can be used to take workshops, regular courses, and seminars. This is also an opportunity to take classes in other Institute degree programs.

Language Studies

Courses taught in your chosen language combine language skills development with topics related to your NPTS degree work and professional interests.

Professional Internship Option

An internship is not required, but for students who wish to do an internship during their studies, the Institute can assist with securing an internship, including the possibility of intern positions in government agencies, international organizations, and think tanks. Check out where our students recently interned.

Thesis Option

The NPTS honors thesis is a highly selective program. Students are challenged to design and conduct an independent research project of professional scope and quality with the guidance of a thesis adviser. A limited number of students are selected to participate in the honors thesis program each academic year. Students apply to participate in their second semester and, if selected, conduct research during their third and/or final terms. Students present their findings to a panel of faculty, students, and the public.

Additional Program Options

Financial Crime Management

The Financial Crime Management specialization gives you the skills and confidence to pursue a career in private-sector compliance and investigations, government intelligence, training and research with multilateral organizations, and anticorruption compliance for NGOs.

Accelerated Entry and Advanced Entry

Students who meet our requirements for accelerated entry or advanced entry may be eligible to complete the degree in three or two full-time semesters. See How to Apply for details.

Projected Course Availability

This table outlines anticipated offerings for the coming two academic years. Please note that the projected course availability may be subject to change at any time, and, depending on the circumstances, the Institute may not be able to provide advance notice of changes. 

Enrolled students should consult the Course Schedule for course dates, times, and locations for the current and upcoming semester. Degree maps for enrolled students are provided via Canvas through the “Front Desk” site.

  • offered in: FA25
    offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    An introductory survey of research methods, with special attention to how research can be utilized to inform policies related to international security. The course gives particular emphasis to the processes of identifying research topics and designing research projects. It will also address the basic elements of doing policy analysis. Students who complete the course will be able to read with comprehension and critically assess research produced across a wide range of qualitative and quantitative research methods. The course will also address how to write up and present research proposals and finished research products, and will consider the ethics of doing research. The course will be conducted primarily in lecture format, but some class time will also be devoted to exercises that involve active student participation.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course examines the role of intelligence in the conduct of US national security. The course will cover the basics of intelligence, to include the intelligence cycle, intelligence requirements, types of collection and analysis, and the roles and capabilities of organizations that make up the US intelligence community. The course will look at the role of intelligence over history and include case studies.
  • offered in: FA25
    offered in: SP26
    offered in: FA26
    offered in: SP27

    Course Description

    Understanding the complex dynamics of global politics requires examination of a number of issues and characteristics of the international system. The key objective of this class is to provide students with the ability to approach different perspectives to any global political issue. These elements of the study of global politics include theoretical frameworks and historical trajectories, without which no global issue can be understood adequately. Other topics of discussion will include global governance, transnational global problems, and the international financial system. The course reflects the evolving nature of international relations, a continuous process since recorded history, which included the rise of the Westphalian nation-state system. The continuous transformation now includes the rise of non-state actors as influential participants and protagonists (not necessarily always benign) in the global system; entities that include terrorist and insurgent groups, non-governmental organizations, multi-national corporations, for example.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This course introduces students to the formulation of U.S. national security policy. It summarizes the roles played by different governmental actors, including the President, Congress, and relevant bureaucratic departments and agencies, and describes the interagency process. It then covers the influence of domestic politics on national security policy, including the impact of interest groups, the media, and public opinion.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This class provides a comprehensive introduction to the field of threat intelligence. Students will explore the core methods, tools, and sources used to identify and analyze threats across various domains, including physical security, geopolitical risks, and emerging challenges to gain a foundational understanding of how threat intelligence informs decision-making and risk mitigation strategies. The course examines key topics such as open-source intelligence, human intelligence, social media monitoring, and ethical considerations in intelligence work. Additionally, students will explore the wide range of careers available in threat intelligence, spanning government agencies, private organizations, and non-profit sectors.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    TBD
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course is a simulation of the third NPT Preparatory Committee (PrepCom) meeting, which will be held in New York from April 28-May 9, 2025. The focus of the next PrepCom is hard to anticipate, but it is apt to be especially contentious as it is charged to present recommendations to the next NPT Review Conferenced scheduled for 2026, including with respect to nuclear disarmament, nonproliferation, and peaceful uses of nuclear energy, as well as regional security. Among major subjects likely to be debated are: the pace of and potential for meaningful nuclear disarmament, arms control, and nuclear risk reduction; further strengthening of the NPT review process; the erosion of nuclear norms accentuated by imprudent rhetoric about nuclear weapons use and attacks on and foreign occupation of civilian nuclear facilities; the integrity of nuclear security assurances; the deployment of nuclear weapons outside of national territories, sharing of naval propulsion technology; viability of nuclear-weapon-free zones; DPRK nuclear brinkmanship; Iran’s nuclear intentions; the future of the CTBT; the potential for nuclear terrorism; and the prospects for peaceful nuclear use. The base point for the simulation is the “real world” at the time of the course. 
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course is an introduction to open source analysis used in the context of nonproliferation and terrorism studies. The instructors will give policy lectures as well as hands-on training in the lab. The course is designed as an overview of geospatial and data analysis techniques which are only just recently being applied to the nonproliferation and terrorism research fields. Students will study policy and intelligence analysis using deep web searching, ground and satellite imagery analysis, basic GIS, 3D modeling, crowd-sourcing, text mining, and network analysis.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    “But what if they’re lying?” By the end of the course, students will know exactly how to respond to the most common question ethnographers face. This workshop will introduce students to a key qualitative data methodology: conducting ethnographic and semi-structured field interviews. It will provide an overview of qualitative research techniques, specifically focusing on the development of effective interviewing skills to uncover the depth of human stories and perspectives. A significant portion of the course will center on researching in complex environments and will include a discussion on research ethics. Through practical exercises, participants will gain firsthand experience in designing an interview plan, formulating impactful questions, finding and establishing a connection with subjects, and employing analytical strategies to interpret complex data.
  • not offered in: FA25
    offered in: SP26 (j-term)
    not offered in: FA26
    offered in: SP27 (j-term)

    Course Description

    This practicum is organized within the framework of a partnership between the James Martin Center for Non-proliferation Studies, Institute of International Studies at Monterey (MIIS) and the Faculty of Nuclear Sciences and Physical Engineering of the Czech Technical University in Prague, Czech Republic (CTU). This course relates directly to issues having to do with nuclear proliferation and nuclear terrorism. The technology, materials, and know-how involved in running a nuclear reactor are potentially “dual use” and can be diverted to efforts to develop nuclear weapons. For these reasons, international efforts to prevent proliferation and terrorism require putting nuclear reactors under safeguards and providing physical security of the nuclear materials. The course will enable students to observe how safeguards and nuclear security measures are implemented in practice.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    TBD
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Strategic export controls – which include export, brokering, transshipment and transit controls, as well as sanctions and supply chain security mechanisms – are important tools used in international and national security efforts, including countering WMD proliferation and terrorism. Traditionally, they have focused on raising the cost of WMD development programs and reducing access to advanced military capabilities by terrorist organizations or states active in proscribed proliferation activities or regional conflict. Strategic export controls have also become a prominent feature of the international trade landscape, and as such, are calibrated to facilitate legal trade in dual-use goods and technologies while reducing risk of instability and conflict. This lecture course will explore the role of strategic export controls in balancing security and trade. Course participants will learn how strategic controls are applied at global, multilateral, national and industry levels. Course participants will also acquire an understanding of policies and legal-regulatory frameworks used by governments to shape strategic export controls – as well as strategies used by exporters in industry and the private sector to comply with them. The course will also examine challenges to these controls, in the form of illicit trafficking networks, evolving supply chains and new means of distribution, and emerging dual-use technologies – and implications for the future of balancing security and trade. The course will also feature a ‘red-teaming’ exercise, simulating the operation of trafficking networks. The exercise will give course participants an opportunity to apply knowledge gained through the lectures and readings to better understand illicit procurement and diversion of dual-use goods and technologies – and consider strategies for addressing this challenge while facilitating legal trade and its advantages for global prosperity and human welfare.
  • not offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course provides an historical narrative—constructed in a highly interdisciplinary fashion—of the nuclear age from the discovery of fission in the late 1930s until the 2015 nuclear deal with Iran. The course will trace the primary milestones—concepts, strategic doctrines, political and legal agreements, democratic and moral puzzles, and personalities—that were all involved in the making of the nuclear age. Our interest is twofold: the science and technology as well as the international and domestic politics of the bomb. As such the course provide basic familiarity with the history of the bomb—its invention, use, vertical and horizontal proliferation—and the history of the efforts to constrain, limit and even banning it. The course will be organized by looking at concrete historical milestones and their historical manifestation as well as by examining specific themes.
  • not offered in: FA25
    offered in: SP26
    offered in: FA26
    offered in: SP27

    Course Description

    The goal of this workshop is to hone students’ professionally-relevant, policy-oriented communication abilities, including memo writing and briefing. The course will include a combination of lectures, seminar-style discussion, small working group engagement, and individual student work.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    Unlike the surface level web, the dark web is a network of sites hidden behind powerful encryption technology. Encryption allows individuals to access sites on the dark web without being easily observed by law enforcement or others. Given these high levels of secrecy, the dark web has become a hub for illegal activity, including dark web marketplaces (where individuals buy and sell illegal goods) and hacker forums (where individuals advertise and hire expert hackers). In recent years, researchers have collected dark web data to explore a range of phenomena, including the dynamics of dark web marketplaces and the characteristics of victims of double extortion ransomware attacks. In this workshop, students will learn safety protocols and ethical standards for accessing sites on the dark web. Students will learn about the range of potential data sources available via sites on the dark web and engage in hands-on exploration of these sources. Students will also become familiar with how dark web data has been used in current research , as well as how it might be applied in future research. By the end of the workshop, students will have developed an understanding of how to safely access sites on the dark web and the wide range of potential research applications for dark web data. 
  • offered in: FA25
    not offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This workshop explores the complexities of geographic risk assessment, with a focus on financial crime (money laundering, corruption, sanctions evasion, terrorism financing and proliferation financing), but with the opportunity to apply the skills to other areas of interest. The first day will be spent critically evaluating existing risk indices and scrutinizing the quality of possible source data. On the second day students will pair up to develop their own models, spending time on selection of variables and weighting of variables, and fine-tuning models to enhance accuracy and reliability. On the third and final day, students will complete their final reports and then consider how they might develop a similar risk model for other areas of risk such as organized crime or conflict. This hands-on exercise will provide insights into how suspicious activity is identified and risks mitigated.
  • not offered in: FA25
    offered in: SP26 (j-term)
    not offered in: FA26
    offered in: SP27 (j-term)

    Course Description

    The “crime terror nexus” is a major area of concern for policymakers. In a globalized world, extremist groups use criminal relationships or skills for a range of purposes: from sourcing weapons to smuggling operatives into and out of countries to ‘simply’ circumventing financial regulations designed to starve such groups of needed monetary support. Thus far, countermeasures have had uneven results in disrupting or deterring transnational criminal activities by violent non-state actors. This course will explore the problems of international crime and terrorism in today’s strategic environment, with a particular emphasis on the ‘why’ and ‘how’ of the crime-terrorism relationship. Students will gain an understanding of the factors that have contributed to the proliferation of transnational crime and terrorism, the types of crimes that pose the greatest threat to lawful societies, the institutions and tactical responses that have been developed to combat transnational crime, and the extent to which transnational crime and terrorism threaten the national security interests of the United States and the world community. By the end of this course, students should be familiar with the prevailing explanations for why terrorist groups use crime in the modern era, the organizational consequences of such a funding stream, and how states can and should respond to these challenges. 
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    Students will develop and hone digital investigation techniques as they learn a risk-based approach to tracing the source of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. From Cryptocurrency 101 to writing reports to aid law enforcement with writing subpoenas, after the completion of the course students will be able to: -Trace the source of blockchain funds and de-anonymize cryptocurrency transactions with cryptocurrency (or blockchain) forensic tools - Quickly risk-rate tokens, transactions, and digital asset businesses - Use advanced open-source techniques (like darknet research) to help complete enhanced due diligence reports - Produce reports that can be given to law enforcement for asset recovery
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    TBD
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This workshop will examine human trafficking as an emerging public issue, while focusing on the real-world challenges to identifying and rescuing victims, prosecuting traffickers, while also addressing the socio-economic and cultural dynamics that are leveraged by traffickers. This course will focus heavily on the multi-disciplinary, victim-centered approach promoted through international and domestic anti-human trafficking protocols and policies, including the Trafficking Victims Protection Act of 2000 and the subsequent reauthorizations. The course will include an examination of relevant existing data, types of trafficking, legal definitions, domestic and international efforts to combat trafficking, challenges faced by law enforcement, the nexus between trafficking and other transnational crime, the role of traditional NGOs and social entrepreneurs, and corporate social responsibility. Finally, we will examine potential career opportunities related to combating human trafficking and the leadership, collaboration and consensus-building skills necessary for success, whether working in the global arena or for a local agency.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course will cover the basic concepts involved in the design and operation of nuclear reactors. Students will build an understanding of how nuclear reactors work and how they relate to nuclear weapons. The course will cover how various designs are more or less proliferation resistant and how reactors use and produce nuclear material. This course is strongly recommended for students considering taking the J-Term practicum held at the Czech Technical University’s VR-1 “Sparrow” research reactor
  • not offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course is a comprehensive introduction to the study of Israel’s nuclear history and policy within the broader context of understanding the nuclear dimension of Middle East politics. The course focuses on the uniqueness and the exceptionality that constitutes Israel’s nuclear history and policy. By that uniqueness we mean the original policy which Israel devised to acquire and possess nuclear weapons that ultimately made Israel an exceptional case both vis-à-vis the United States non-proliferation policies and vis-a-vis the non-proliferation regime. That policy is known as Israel’s policy of “nuclear opacity” or “nuclear ambiguity,” under which Israel has never officially acknowledged to acquire or possess nuclear weapons, even though since 1970s Israel is universally presumed as a nuclear weapons state. The course ends with reflections about challenge that Israel’s nuclear uniqueness poses both to the United States nonproliferation policy and the non-proliferation regime as a whole.
  • offered in: FA25
    not offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    This course provides students with a solid foundation in scientific and technical fundamentals critical to nonproliferation and terrorism policy analysis. Such policy analyses often require strong foundational knowledge of basic scientific and technical concepts in order to understand, create, and inform policy decisions. The course begins with an introduction to science and the scientific method and then evolves into the three main areas: biological weapons, chemical weapons, nuclear weapons and relevant technologies. Topics covered in the biological component include fundamental concepts related to microorganisms, DNA, RNA, proteins, and processes of infection and disease. Topics covered in the chemistry component include fundamental concepts related to atomic structure and the periodic table, chemical structural representations, functional groups, reactivity, toxicity, as well as modern separation, purification and analytic techniques commonly used for chemical species. Applications of the fundamental concepts in the first two topics are further developed in relation to features of chemical and biological weapons and warfare, including agents, delivery methods and effects. Topics covered in the nuclear component part of the course includes radioactivity, uranium, nuclear weapons, radiation detection instrumentation and applications, environmental plumes, and various instrumentation and analysis techniques. Upon completion of this course students will have a deeper appreciation for the debate on various verification solutions that have been proposed for compliance under the Biological and Toxin Weapons Convention (BWC), Chemical Weapons Convention (CWC) and nuclear treaties.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    This course, on the evolution of Chinese nuclear policy, is divided into three parts. The first part outlines early Chinese attitudes to nuclear weapons, proliferation and disarmament, prior to and immediately following China’s nuclear test in 1964. The second part examines enduring concepts in Chinese nuclear policy, such as No First Use, and introduces students to important debates in China since the 1980s on nuclear deterrence. The third part focuses on contemporary issues and challenges that shape Chinese nuclear policy, from ballistic missile defense, to the South Asian nuclear tests in 1999, and the North Korean nuclear crisis. The nature of the US-China nuclear relationship will also be explored. The principal objective of the course is to give students a better understanding of China’s nuclear policy, both past and present. A secondary objective is to introduce to students key literature and sources, both in English and Chinese, on this issue.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    One of the abiding features of international relations and history is competition and rivalry between great powers—countries (and empires in the past) that have global influence, based on key indicators of power: military, economic, diplomatic, and technological. Contemporary great power competition is centered especially around the United States and China, and manifests through tensions and confrontations across a range of sectors and areas, such as: in the South China Sea; the semi-conductor industry and broader technological competition; global tariffs, as part of economic statecraft. Meanwhile, traditional conventional military and nuclear weapons strategies remain an integral part of the competition. This is especially true of the second such contemporary dyad, the traditional great power rivalry between the West and Russia, which emerged from the ideological confrontation during the Cold War. Key issues that are covered in this course include: how do we conceptualize great powers? What are the strategies pursued by these powers, including regional alliances? How do middle and regional powers react to great power competition? What are the implications of great power rivalry for regional and global stability? How does the emergence of the cyber realm impact great power competition?
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    Why is Costa Rica politically stable with little domestic violence while Colombia has struggled with eighty years of civil conflict? Why are drug cartels a problem in Mexico but not in Argentina? This course is an introduction to the dynamics and intricacies of political violence in Latin America. Understanding why political violence occurs, how it is used, what its effects are, and how it can be countered, is crucial to a clear understanding of the problems facing states and non-state actors, as well as the dynamics of a conflict-ridden global environment. Latin America has been particularly challenged by a high level of domestic violence, perpetrated by criminal, non-state, and state actors, but has attracted less public and policymaker attention than other regions. We will cover numerous subjects, including: why non-state actors and states use violent means to pursue political ends, as well as state repression and terrorism, riots, coups, revolutions, civil wars, communal conflict, and violence by insurgents, criminals, and terrorists.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course provides a comprehensive introduction to the issues surrounding the proliferation of nuclear, biological, chemical, and radiological (NBCR) weapons and their means of delivery, the consequences of proliferation, and means to stem it or ameliorate its dangers.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    The Emergency Response to Terrorism Workshop is a two-weekend workshop. Students will have the opportunity to learn how emergency services function and how they respond to incidents of mass violence, including shootings, bombings, and chemical, biological, radiological, or nuclear (CBRN) attacks. Coursework will combine lecture-based instruction with hands-on, experiential emergency response training on topics such as bleeding control, explosives recognition, and CBRN response. Subject matter experts from regional emergency services organizations, all certified as instructors with the agencies pertinent to their disciplines (e.g. California POST, California State Fire Marshal, California Emergency Medical Services Authority), will join as guest instructors. Although students will gain insights into emergency services operations, and gain some practical skills, they will not earn emergency services certifications.
  • offered in: FA25
    offered in: SP26
    offered in: FA26
    offered in: SP27

    Course Description

    The course is an introduction to the subject of terrorism. The course will focus on a range of fundamental questions, such as: What is Terrorism? What causes Terrorism? Why do terrorist groups emerge and how do they end? What is extremism? Why do individuals join terrorist groups? What are lone wolf terrorists? What is leaderless jihad? These are but a few of the elements that will be explored over the course of the semester. The course also aims to expose students to a wide range of terrorist groups and ideologies.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This workshop is designed to provide the student with a basic knowledge of the issues relating to… read more drone and satellite usage in a variety of situations. The workshop will focus more on the issues relating to drones and surveillance, but other issues such as satellite use will also be addressed. Consideration will be given to the use of drones and satellites to perform both commercial and military/intelligence tasks and the policy issues raised by use of drones in domestic (US) and international airspace. Issues of privacy, the 4th Amendment right to be free from intrusive searches and seizures, and the legal regimes that affect the use of drones and satellites will be discussed. The impact of changing technical capabilities and potential collisions with civil liberties in these and other areas will be addressed. This workshop will deal with the technical, policy, and legal issues involved in these subjects. It will provide the student with a working understanding of the issues involved in the current use of drones and overhead surveillance and will provide a look at the future uses and limitations, examining how civil liberties are and can be balanced against security interests.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Over the course of this semester, students will encounter often outlandish, but very real, tales of those who commit financial crimes using many ruses, including fraudulent shell companies and existing front companies. Regardless of their techniques and schemes, one theme is prevalent: to investigate and prosecute these crimes, you must combine puzzle solving skills, organizational techniques that allow you to categorize and analyze information, research abilities and legal creativity. To effectively build prosecutions against complex criminal activity, investigators combine creative investigative strategies that work within the confines of the law, often working closely with attorneys. These matters may arise in challenging circumstances, which is very often the situation in the investigation of financial crimes, regardless of whether the cases are brought through criminal or civil enforcement. One of the goals in this course is to provide students with a strong foundation to allow them to understand the relevant legal and other governance principles applicable to global financial crime and then apply what is learned about identifying, investigating and combating those activities. In this course, we will explore multi-faceted efforts used to protect the financial integrity of private businesses and organizations from global financial crime. We will focus on regulatory, investigative (by state actors and non-government investigative bodies) and legal aspects of compliance with applicable laws and regulations. We will review corporate governance, as well as US and international investigative and prosecutorial agencies. We will also discuss the applicable judicial systems and laws. We will also spend time considering the ethical and moral implications of the underlying crimes, the purported harms, and the approaches used to prevent, mitigate and punish the criminal activity.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This course focuses on the radical right. The course will examine both U.S.-based and transnational aspects of the extreme far right. Right wing extremism and terrorism are not monolithic. There is a range of diverse actors that populate the fringes of the far right. In the United States, the challenge of right-wing initiated violence (and extremist beliefs that motivate acts of violence) is long standing. White supremacy has been an unfortunate mainstay within the extreme far-right movement. And, as the events of January 6 have demonstrated, the challenge of white supremacy extremism remains an indelible part of American society. The 6th of January also illustrated the rising influence of anti-government and militia groups. Right-wing anti-government and militia movements, however, are not a recent phenomenon. The course will examine both historic and contemporary manifestations of these fringe movements. And, how some of these movements’ ‘beliefs’ have become more normalized in the United States and overseas. The rise of the extreme far-right in the United States has seen an accompanying rise of overseas based extremist movements. While the course primarily focuses on U.S. based right-wing extremists, there will be a module that examines international manifestations of the challenge. The transnational linkages, in fact, between the U.S. and overseas far-right has expanded in the 21st Century. Terrorists like Anders Breivik and Brenton Tarrant, for instance, have been influenced by American terrorists, like Dylan Roof. And, of course, there are tracts and manifestoes created by right-wing American ideologues that have influenced the overseas based right-wing terrorists. Similarly, there are influential writings (and actions), both historic and more recent, by European far-right figures that have shaped U.S. right-wing narratives. The myths and key-concepts, which often serve as drivers for radicalization within this milieu will be foundational to understanding the extreme far right. At the same time, the course will examine conspiracy theories and how they have animated QAnon followers. The spread of disinformation, which often allows for the growth of conspiracy theories, is also key to the rise of the radical right in the United States and overseas. Recruitment and propaganda associated with the extreme far-right is especially important in understanding the recent uptick in extreme right-wing violence. How does the far-right red-pill potential recruits? What tools have extreme right-wing recruiters used, both in the past and currently, to expand their membership? This course will examine these important issues. Finally, what kinds of policies have been adopted to counter the extreme far-right? Have they been successful? What other policies are being examined? What are the risks associated with certain government and private sector initiatives designed to counter the radical right? How should historic issues, such as government overreach, be factored into discussions related to future policymaking? The radical right does not consist solely of white supremacist, anti-government, and militia groups. The course (to a lesser extent) will examine smaller subsets of the far-right as well, to include sovereign citizens, INCELS, and tax-resistor movements.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Welcome to a course that delves into the heart of 21st-century power dynamics. We’ll explore how the digital revolution, spearheaded by AI and tech giants, is reshaping international security and social norms. From presidents being deplatformed to elections influenced by foreign startups, we’ll analyze real-world cases that highlight the shifting balance between governments and the private sector. The course encourages critical thinking about the ethical implications of this new world order: How do we support equity and protect democratic values in an era of unprecedented technological power? Through lively debates and hands-on projects, students will develop the skills to navigate and influence the complex intersection of technology, politics, and social justice in a rapidly evolving international system. Special attention will be given to career opportunities in this critical issue area.
  • offered in: FA25
    not offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    The counterterrorism seminar is designed to address the challenges of terrorism in the current and future global security environment in a participatory format. Specifically, the seminar briefly reviews the threat terrorism poses to liberal democratic states, citizens and policymakers, then explores how liberal democracies can best predict, prevent, preempt and, if necessary, directly combat terrorism and terrorists. The course will assess the history and future of terrorism; analyze terrorist and state strategies; and then focus on the tools to fight terrorism - military, intelligence, police, diplomatic institutions and approaches; the “targets” of counterterrorism - leaders, finances, safe havens, networks, ideologies; and the technologies used to counter terrorism - drones, social media, and more. Case studies and simulations will be used throughout the course.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This course on Countering Violent Extremism (CVE) will examine the non-violent approaches to countering violent extremism, such as prevention (preventing violent extremism, PVE), intervention, rehabilitation, and reintegration programs. The course will also examine the pathways individuals take to extremism, with a focus on the myriad of push and pull factors that can contribute to radicalization. The course will also examine the various types of CVE/PVE programs developed by governmental and non-governmental entities. The course is experiential by design and the class will participate in the Invent 2 Prevent (I2P) program sponsored by the Department of Homeland Security, the McCain Institute and EdVenture Partners. I2P is a national competition whereupon, specifically, students in the class will create a tool, product, or initiative to prevent targeted violence and extremism.
  • not offered in: FA25
    not offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Global, national, and local communities have struggled with individuals unfairly exploiting their positions for personal gain. Today, corruption seems more ubiquitous than ever, and the consequences are similarly vast. Corruption creates financial crises, allows terrorist attacks, facilitates WMD trafficking, sends innocent people to jail while letting guilty ones walk free, destroys the environment, wastes collective resources, causes unnecessary death and disease, damages markets, distorts news and information, increases poverty, fuels conflict, supports organized crime, and eviscerates public policy. This seminar covers corruption’s causes and consequences, the various ways to define and measure it, economic and political models vulnerable to it (and those capable of withstanding it), influencing structural and individual factors, and possible solutions to corruption. Students will leave this class with an understanding of corruption’s presentation and effects on international development, security, domestic politics, and financial systems.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    This course prepares students to compete in the Cyber 9/12 Strategy Challenge, a global competition that simulates national-level cyber crisis response. Students will develop practical skills in cyber policy analysis, crisis management, and strategic communication while working in teams to tackle evolving cyber threat scenarios. Through immersive scenarios and hands-on exercises, participants will learn to assess complex cyber incidents, evaluate their implications for national and international security, and craft comprehensive policy recommendations for decision-makers. This course is ideal for students interested in cybersecurity policy, national security, international relations, and crisis management.
  • not offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    This seminar aims to examine moral dilemmas that have confronted us throughout the nuclear age as well as in the current war with terrorism. The seminar will start by exploring the basic concepts of moral thinking and the principles of the “just war tradition.” Then we explore how and to what extent the tools and concepts of “just war tradition” apply to the fundamentals of contemporary world—the nuclear age on the one hand, and the war on terrorism on the other. As such, we will examine historical cases and practices involving both nuclear weapons and terrorism: from the “decision” to drop the first atomic bombs on Hiroshima and Nagasaki, the practice of nuclear deterrence, through the morality of interrogation methods, intelligence gathering, and targeted assassination as tools against terrorism.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Students will apply their on-chain tracing skills gained from the Blockchain Analytics course as they research a specific crypto-related threat intelligence topic such as a ransomware group or sanctions evasion case. Students will learn how to use Crystal Intelligence’s tracing tool, research and analyze digital asset flows related to a particular case or topic, write up a full crypto threat intelligence report with detailed findings and explanations, in addition to a short brief that is understandable to executives with no knowledge of the topic. At the end of the semester, students will deliver oral presentations in front of a Panel of Experts from academia and public and private sectors.
  • not offered in: FA25
    not offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    This course will provide an in-depth overview into the terrorist group known as the Islamic State of Iraq and the Levant (also known as the Islamic State, the Arabic acronym Daesh, the Islamic State of Iraq and Syria, in addition to other aliases). The rapid rise of the Islamic State has taken counterterrorism policymakers and foreign policy practitioners by surprise. The course will also provide students a baseline understanding of Islamic jurisprudence, meaning of the caliphate, the five pillars of Islam, and Shar’ia law. Students will also learn about some of the key thinkers that have inspired global jihadist movements like ISIS and al-Qa’ida. The course will trace the history of the Islamic State’s rise and will examine the leadership figures/personalities behind the group. The course will also examine the Islamic State’s connection and ultimate divorce from al-Qa’ida. The course will also explore how the group finances its operations as well as the rise of its affiliates. Finally, the course will also look at ISIS’s use of foreign fighters and social media to further its agenda. Global responses to counter the Islamic State will also be discussed.
  • offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    Behind nearly every international crime involving money lies a money laundering scheme. In this course we look at how corrupt dictators, terrorists, drug traffickers, sanctions evaders, and North Korean cyber hackers, among others, hide and launder their ill-gotten gains. We will identify red flags of suspicious behavior and explore traditional money laundering techniques, trade-based laundering techniques, black market peso exchange, Chinese mirror trades, the use of virtual assets, shell companies, etc. There are no prerequisites for this course. What makes for a great investigator is curiosity, great research/analytical/writing skills, and broad knowledge about the world.
  • offered in: FA25
    not offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    Throughout the nuclear age – from the Manhattan Project to our own challenge of assessing with Iran’s nuclear program – the history of nuclear proliferation intelligence has been largely an history of failures. No doubt, intelligence about nuclear proliferation is a tricky business. And yet policy makers do need intelligence to make decisions on proliferation matters. The seminar is both a study of one generis problem, and also a story of a history of that problem. Understanding the complexity of the problem defines our historical survey, while history will be also an aid to appreciate better the problem. In a way, the seminar’s overall interest is to narrate and revisit the history of nuclear proliferation from the perspective of problem of intelligence. The course examines the problem of nuclear intelligence by revisiting key cases in the history of nuclear proliferation: Germany in World War II, the Soviet Union in the mid-late 1940s, the early NIEs on proliferation, Israel in the late 50s and the 1960s, India in 1974, Pakistan in the 1980s, South Africa in the late 1970s and 1980s, Iraq (twice) in the 1980s, India (second time) in 1998, and Iran today.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    not offered in: SP27

    Course Description

    This seminar surveys the interrelated issues of conflict, war and security in contemporary Middle East. The seminar starts with a quick introduction on the historically-reconstructed geographical definition of the Middle East, in relation to its demographic, religious and linguistic diversity of the region. The seminar then surveys historically the creation of the modern Middle East state system after World War I and the demise of the Ottoman Empire. From that introductory part, the seminar moves to focus on the creation and evolution of the Arab-Israeli/Palestinian Israeli conflict throughout the last century (1918-present). Later, the seminar also explores the geopolitical rise of Shite Iran since the 1979 Islamic revolution, the creation of the Iranian-led “resistance” axis and its impact on the conflict. The seminar examines the significance the October 7 Hamas-led onslaught on Israel, and the ensuing Gaza/Hezbollah multi-dimensional ongoing war, as redefining conflict and security in contemporary Middle East. The seminar ends with raising ideas and options how towards conflict transformation in the Middle East.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    The goal of this seminar is to develop the skills necessary to analyze the motivations and capabilities of non-state actors to acquire and use weapons of mass destruction (WMD), more specifically chemical, biological, radiological and nuclear (CBRN) weapons and materials, for terrorist purposes. Through class discussions, simulation exercises, and individual research, students will review the technical aspects of CBRN, examine the history of CBRN use by terrorists, assess CBRN terrorism threats and vulnerabilities, and assess policy responses to CBRN terrorism. Students are required to have substantial background knowledge of either CBRN or terrorism before joining the seminar. Students will prepare weekly short memos, conduct group work for integrative simulation exercises, prepare an independent research project, and have various presentation opportunities.
  • offered in: FA25
    offered in: SP26
    offered in: FA26
    offered in: SP27

    Course Description

    The MANPTS Honors Thesis is a highly selective program through which a limited number of students will design and conduct individual research projects of professional length, scope, and quality under the guidance of a faculty advisor. Applications for the honors thesis will be accepted in the Spring from students in their second or subsequent semesters in the NPTS MA program who are currently maintaining a GPA of 3.7 or higher. Applications will require a personal statement, academic transcript, sample of research writing, proposal for the thesis, and recommendation from a member of the faculty or research staff. In recommending a student for the honors thesis, a faculty or staff member must agree to serve as the student’s thesis advisor if the student is selected for the program. The NPTS Program Chair will appoint a selection committee composed of NPTS faculty and staff from the appropriate MIIS research centers to review applications. Students will be selected for the honors thesis on the basis of GPA, demonstrated proficiency in research and analytical writing, and any other relevant criteria as determined by the selection committee. Throughout the Fall semester, thesis advisors will provide students enrolled in NPTG 8662 with individualized supervision of their thesis projects in a manner similar to a directed study. Thesis advisors will set a schedule for research and writing of the thesis and will meet with students as needed to review progress and provide comments and advice. At the end of the Fall semester, students will present their projects to the Monterey Institute community in a symposium at which invited experts will provide comments and suggestions for further development and publication of research. 
  • not offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    Africa is a paradox: a region with frequent coups and multiple, active terrorist groups, but also the fastest growing, youngest population in the world and the second fastest growing economic region. How will the continent navigate such a complex environment? This course considers the critical security challenges facing the African continent, with a particular focus on military coups, terrorism, and the predicament of fragile states. Students will engage with detailed case studies to understand the root causes, implications, and regional dynamics of instability, as well as the suite of tools available for responses. By examining the intricate interplay between internal vulnerabilities and external pressures, the course aims to provide insights into the complex security landscape of Africa.
  • not offered in: FA25
    not offered in: SP26
    offered in: FA26
    not offered in: SP27

    Course Description

    Various parts of South-East Asia have been plagued by terrorist violence in recent decades. South-East Asia refers to the region eastward from Burma/Myanmar till the Philippines. This course studies the phenomenon of terrorism in countries of the region such as Thailand, Indonesia, Malaysia and the Philippines. Some of the groups that this course examines include – Jemaah Islamiyah, Abu Sayyaf, Moro Islamic Liberation Front – their objectives, characteristics, composition, ideologies, tactics and fund-raising. Apart from these cases, the course also examines thematic issues such as the prospect of WMD terrorism and proliferation of WMD materials, maritime terrorism and piracy, and U.S. policy on counter-terrorism in South-East Asia. We also discuss connections between groups in South-East Asia and regional and global terrorist groups elsewhere, such as Al Qaeda and the Taliban. In order to have a comprehensive picture of non-state security threats in the region, the course also examines the various insurgent movements in Myanmar. Finally, given the close security dynamics between Australia and South-East Asia, this course also looks at terrorism-related issues in Australia.
  • not offered in: FA25
    not offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    In the realm of weapons of mass destruction (WMD), South Asia is one of the key regions of analysis. This course takes a comprehensive look at the role of WMD in the strategic thinking of various actors involved in the South Asian security framework. It is important to note that South Asian nuclear issues cannot be studied in isolation from other regional and global dynamics. States such as the U.S., China, and Russia are crucial players in the South Asian strategic framework. The course examines various reasons behind WMD acquisition by India and Pakistan, concentrating especially on nuclear weapons. These factors include threat perceptions, domestic imperatives and nationalistic attitudes. A key element of nuclear weapons programs is the development of effective delivery systems such as missiles and aircraft. Analysis of such programs provides an indicator of current and future strategy. In this context, both India and Pakistan have made major strides in their cruise and ballistic missile programs to make their nuclear strategy more credible. At the same time, neither side has a clearly enunciated nuclear doctrine, although attempts have been made in this direction. This is crucial in context of a reliable command and control system and for crisis stability. Another major issue covered in this course is the proliferation of WMD materials to non-state actors or aspiring nuclear states by proliferation networks connected to South Asia. Relatedly, policymakers in the region and elsewhere are also concerned with the danger of nuclear terrorism. These are some of the prominent issues concerning weapons of mass destruction in South Asia. The two sides have periodically taken steps to prevent nuclear crises situations. Apart from nuclear weapons, this seminar also examines chemical and biological weapons policy in the two countries. 
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    The Cyber Practicum offers hands-on experience in analyzing cybersecurity challenges through the lens of international relations. In this project-based practicum, students will draft white papers, policy essays, and grant proposals, working either independently or in small teams. Projects will also include data collection and analysis from online sources, focusing on critical issues such as ransomware, hacktivism, and threat actor social media activity. Students may also propose their own research topics for white papers or projects, subject to instructor approval. Content developed through this practicum will be featured on the Cyber Collaborative’s website or submitted to relevant professional publications. Through this practicum, students will learn about emerging cybersecurity threats while developing essential skills in online investigations, analytical writing, grant writing, and data and policy analysis. 
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    In the National Security Practicum, students will work in small, problem-focused teams to develop early-stage solutions to critical defense problems. This practicum will give students hands-on experience in creating actionable solutions to complex security challenges, while broadening their technical and entrepreneurial skills. By the end of the semester, students will have contributed meaningfully to solving a key issue as identified by the Department of Defense and gained a unique perspective on how their expertise can impact national security. Note: US Citizenship is not a requirement for this course.
  • not offered in: FA25
    offered in: SP26
    not offered in: FA26
    offered in: SP27

    Course Description

    The course examines how terrorist groups finance their operations. It also explores current policy approaches to curb financial support to terrorists through the application of U.S. and international sanctions, in particular how multilateral fora, such as the United Nations and the Financial Action Task Force, disrupt and deter terrorist financing. At the completion of the course, students will have a better understanding of the key tools, including law enforcement, diplomacy, and intelligence, that are used to counter terrorists’ financial networks and activities. Students will use structured analytic tools such as weighted ranking methods, scenario trees, causal flow programming, game theory, and logic to form analytic judgments. Prior coursework or professional experience in intelligence, (counter) terrorism, or finance recommended.
  • Offered in:
    SP26 (j-term) SP27 (j-term)
    not offered in: FA25
    offered in: SP26 (j-term)
    not offered in: FA26
    offered in: SP27 (j-term)

    Course Description

    This course introduces the theory and application of relational databases and structured query language (SQL). Using a project-based approach, students will practice how to retrieve, filter, analyze, and visualize datasets using SQL and then create a final application project that demonstrates their ability to employ SQL logic to solve a real-world case. The course will be conducted using asynchronous content and interactive hands-on lab sessions.