University of Warsaw - Central Authentication System
Strona główna

Asymmetric Threats

General data

Course ID: 2104-ERASMUS-AS
Erasmus code / ISCED: 14.6 Kod klasyfikacyjny przedmiotu składa się z trzech do pięciu cyfr, przy czym trzy pierwsze oznaczają klasyfikację dziedziny wg. Listy kodów dziedzin obowiązującej w programie Socrates/Erasmus, czwarta (dotąd na ogół 0) – ewentualne uszczegółowienie informacji o dyscyplinie, piąta – stopień zaawansowania przedmiotu ustalony na podstawie roku studiów, dla którego przedmiot jest przeznaczony. / (0312) Political sciences and civics The ISCED (International Standard Classification of Education) code has been designed by UNESCO.
Course title: Asymmetric Threats
Name in Polish: Asymmetric Threats
Organizational unit: Faculty of Political Science and International Studies
Course groups: ERASMUS courses - winter semester
ECTS credit allocation (and other scores): 5.00 Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.

view allocation of credits
Language: English
Type of course:

elective monographs
general courses
optional courses

Prerequisites (description):

none

Mode:

Classroom

Short description:

The concept of asymmetric threats – roots, the essence, specificity, weaknesses. Typologies of asymmetric threats Domestic and international terrorism – key terms and classifications, main forms and trends, strategic importance. Transnational Organized Crime – the nature of influence on state security, forms, strategic importance. Information security threats posed by non-state actors – characteristics, main forms, strategic importance, countermeasures. Use of WMD by non-state actors – probability of it (psychological, organizational, technical and strategic aspects). Piracy as an asymmetric security threat (or hype ?).

Full description:

I. Contemporary definition of security, concept of asymmetric threats

- evolution of the term ‘security’

- the concept of asymmetric threats

- asymmetric threats vs. transnational and non-military threats vs. hybrid warfare/threats

II. Terrorism – definition

- main characteristics

- domestic and international terrorism, terrorism and other forms of political violence

III. Motivations of terrorism

- main typologies of motivations

- religious motivation – general view

- Islamic terrorism – genesis, ideology, differences between groups

- ethno-nationalist terrorism

- leftist terrorism

- other motivations

IV. Terrorism – aspect of organization

- typical organizational structures

- financing of terrorism

- state sponsored – terrorism

V. Terrorism – operational aspect

- typical modes and means of terrorist operations

- suicide terrorism – the essence, forms, development geographic and cultural patterns

VI Transnational Organized Crime (TOC) as a national security threat

- TOC – question of definition

- specificity (peculiarity) of TOC’ impact on security

- contemporary TOC – main evolutional trends

– main areas of criminal activity (drug production and trade, smuggling, trafficking of humans and arms, corruption as a security threat)

VII. Non-state use of Weapon of Mass Destruction (WMD)

- WMD – main categories

- Psychological aspect of non-state use of WMD

- probability of non-state use of nuclear weapons

- probability of non-state use of radiological weapons

- biological and chemical weapons and materials (toxic weapons included) – probability of use by non-state actors

- case studies: Aum Shinrikyo i Al Qaeda

VIII. Cybersecurity – non-state use of Information Technologies (IT) as a national threats

- information security – key terms and definitions

- typologies of IT-activities of non-state actors

- cybercrime and cyberterrorism

- hackers, crackers and hacking and cracking

- the issue of critical infrastructure

IX. Piracy

- definitional issues

- specificity in relation to other forms of organised crime

- geographical distribution and intensity of the phenomenon

- main methods and problems of countering

Bibliography:

Selected literature:

1. M. Madej, Zagrożenia asymetryczne bezpieczeństwa państw obszaru transatlantyckiego, Warszawa 2007

2. P. Hough, Understanding Global Security, London 2004 or later

3. W. Laquer, No End to War, Terrorism in the Twenty-First Century, London-New York 2003

4. W. Laquer, Ch. Wall, The future of terrorism, New York 2018

5. J. Arquilla, D. Ronfeldt (eds), Networks and Netwars: The Future of Terror, Crime and Militancy, RAND, Santa Monica 2001

6. A. Castle, Transnational Organized Crime and International Security, Institute of International Relations, Vancouver 1997

7. M. Naim, Illicit, New York 2005

7. Ch. Ferguson (ed.), The Four Faces of Nuclear Terrorism, Center for Nonproliferation Studies, Monterey 2004

8. N. Gurr, B. Cole, The New Face of Terrorism: Threats from Weapons of Mass Destruction, I.B. Tauris Publishers New York 2001

9. B. Schmitt B. (ed.) Information security. A new challenge for the EU, Paris 2005

10. P. J. Springer (ed.), Encyclopedia of Cyber Warfare, Santa Barbara-Denver 2017

11. M. N. Murphy, Contemporary piracy and maritime terrorism: the threat to international security, London 2007

12. P. Singer, A. Friedman, Cybersecurity and cyberwar. What everyone needs to know, Oxford University Press, London-New York 2014

Selected articles from scientific journals and readers like International Security, Terrorism and Political Violence, Studies in Conflict and Terrorism, Small wars and Insurgencies, Foreign Policy, Foreign Affairs.

Learning outcomes:

After the course student should have knowledge concerning theory of asymmetric threats, be able to use correctly relevant terminology, should know basic information about contemporary terrorism (groups, attacks, ideologies), transnational crime (groups, activities), non-state use of WMD or IT. Should also be able to assess current strategic relevance of asymmetric threats (intensity of threat, consequences etc.) (K_W01; K_W03, K_W04, K_W05)

That means all that after the course the student should be familiar with basic rules of strategic analysis (K_U01; K-U02; K_U03)

Should be also able to make an effort to predict future evolution of these threats and responses to them. (K-K01)

Assessment methods and assessment criteria:

attendance and active participation (10%), final written exam – test (multiple choice) + short open questions (90%) - done - if conditions permit - in class or - if pandemic situation requires - on-line

Practical placement:

none

Classes in period "Winter semester 2023/24" (past)

Time span: 2023-10-01 - 2024-01-28
Selected timetable range:
Navigate to timetable
Type of class:
Seminar, 20 hours more information
Coordinators: Marek Madej
Group instructors: Marek Madej
Students list: (inaccessible to you)
Examination: Course - Examination
Seminar - Grading
Full description:
Course descriptions are protected by copyright.
Copyright by University of Warsaw.
Krakowskie Przedmieście 26/28
00-927 Warszawa
tel: +48 22 55 20 000 https://uw.edu.pl/
contact accessibility statement USOSweb 7.0.3.0 (2024-03-22)