Asymmetric Threats
General data
Course ID: | 2104-ERASMUS-AS |
Erasmus code / ISCED: |
14.6
|
Course title: | Asymmetric Threats |
Name in Polish: | Asymmetric Threats |
Organizational unit: | Faculty of Political Science and International Studies |
Course groups: |
ERASMUS courses - winter semester |
ECTS credit allocation (and other scores): |
5.00
|
Language: | English |
Type of course: | elective monographs |
Prerequisites (description): | none |
Mode: | Classroom |
Short description: |
The concept of asymmetric threats – roots, the essence, specificity, weaknesses. Typologies of asymmetric threats Domestic and international terrorism – key terms and classifications, main forms and trends, strategic importance. Transnational Organized Crime – the nature of influence on state security, forms, strategic importance. Information security threats posed by non-state actors – characteristics, main forms, strategic importance, countermeasures. Use of WMD by non-state actors – probability of it (psychological, organizational, technical and strategic aspects). Piracy as an asymmetric security threat (or hype ?). |
Full description: |
I. Contemporary definition of security, concept of asymmetric threats - evolution of the term ‘security’ - the concept of asymmetric threats - asymmetric threats vs. transnational and non-military threats vs. hybrid warfare/threats II. Terrorism – definition - main characteristics - domestic and international terrorism, terrorism and other forms of political violence III. Motivations of terrorism - main typologies of motivations - religious motivation – general view - Islamic terrorism – genesis, ideology, differences between groups - ethno-nationalist terrorism - leftist terrorism - other motivations IV. Terrorism – aspect of organization - typical organizational structures - financing of terrorism - state sponsored – terrorism V. Terrorism – operational aspect - typical modes and means of terrorist operations - suicide terrorism – the essence, forms, development geographic and cultural patterns VI Transnational Organized Crime (TOC) as a national security threat - TOC – question of definition - specificity (peculiarity) of TOC’ impact on security - contemporary TOC – main evolutional trends – main areas of criminal activity (drug production and trade, smuggling, trafficking of humans and arms, corruption as a security threat) VII. Non-state use of Weapon of Mass Destruction (WMD) - WMD – main categories - Psychological aspect of non-state use of WMD - probability of non-state use of nuclear weapons - probability of non-state use of radiological weapons - biological and chemical weapons and materials (toxic weapons included) – probability of use by non-state actors - case studies: Aum Shinrikyo i Al Qaeda VIII. Cybersecurity – non-state use of Information Technologies (IT) as a national threats - information security – key terms and definitions - typologies of IT-activities of non-state actors - cybercrime and cyberterrorism - hackers, crackers and hacking and cracking - the issue of critical infrastructure IX. Piracy - definitional issues - specificity in relation to other forms of organised crime - geographical distribution and intensity of the phenomenon - main methods and problems of countering |
Bibliography: |
Selected literature: 1. M. Madej, Zagrożenia asymetryczne bezpieczeństwa państw obszaru transatlantyckiego, Warszawa 2007 2. P. Hough, Understanding Global Security, London 2004 or later 3. W. Laquer, No End to War, Terrorism in the Twenty-First Century, London-New York 2003 4. W. Laquer, Ch. Wall, The future of terrorism, New York 2018 5. J. Arquilla, D. Ronfeldt (eds), Networks and Netwars: The Future of Terror, Crime and Militancy, RAND, Santa Monica 2001 6. A. Castle, Transnational Organized Crime and International Security, Institute of International Relations, Vancouver 1997 7. M. Naim, Illicit, New York 2005 7. Ch. Ferguson (ed.), The Four Faces of Nuclear Terrorism, Center for Nonproliferation Studies, Monterey 2004 8. N. Gurr, B. Cole, The New Face of Terrorism: Threats from Weapons of Mass Destruction, I.B. Tauris Publishers New York 2001 9. B. Schmitt B. (ed.) Information security. A new challenge for the EU, Paris 2005 10. P. J. Springer (ed.), Encyclopedia of Cyber Warfare, Santa Barbara-Denver 2017 11. M. N. Murphy, Contemporary piracy and maritime terrorism: the threat to international security, London 2007 12. P. Singer, A. Friedman, Cybersecurity and cyberwar. What everyone needs to know, Oxford University Press, London-New York 2014 Selected articles from scientific journals and readers like International Security, Terrorism and Political Violence, Studies in Conflict and Terrorism, Small wars and Insurgencies, Foreign Policy, Foreign Affairs. |
Learning outcomes: |
After the course student should have knowledge concerning theory of asymmetric threats, be able to use correctly relevant terminology, should know basic information about contemporary terrorism (groups, attacks, ideologies), transnational crime (groups, activities), non-state use of WMD or IT. Should also be able to assess current strategic relevance of asymmetric threats (intensity of threat, consequences etc.) (K_W01; K_W03, K_W04, K_W05) That means all that after the course the student should be familiar with basic rules of strategic analysis (K_U01; K-U02; K_U03) Should be also able to make an effort to predict future evolution of these threats and responses to them. (K-K01) |
Assessment methods and assessment criteria: |
attendance and active participation (10%), final written exam – test (multiple choice) + short open questions (90%) - done - if conditions permit - in class or - if pandemic situation requires - on-line |
Practical placement: |
none |
Classes in period "Winter semester 2023/24" (past)
Time span: | 2023-10-01 - 2024-01-28 |
Navigate to timetable
MO TU W KON
TH FR |
Type of class: |
Seminar, 20 hours
|
|
Coordinators: | Marek Madej | |
Group instructors: | Marek Madej | |
Students list: | (inaccessible to you) | |
Examination: |
Course -
Examination
Seminar - Grading |
|
Full description: |
Copyright by University of Warsaw.