Asymmetric Threats 2104-ERASMUS-AS
I. Contemporary definition of security, concept of asymmetric threats
- evolution of the term ‘security’
- the concept of asymmetric threats
- asymmetric threats vs. transnational and non-military threats vs. hybrid warfare/threats
II. Terrorism – definition
- main characteristics
- domestic and international terrorism, terrorism and other forms of political violence
III. Motivations of terrorism
- main typologies of motivations
- religious motivation – general view
- Islamic terrorism – genesis, ideology, differences between groups
- ethno-nationalist terrorism
- leftist terrorism
- other motivations
IV. Terrorism – aspect of organization
- typical organizational structures
- financing of terrorism
- state sponsored – terrorism
V. Terrorism – operational aspect
- typical modes and means of terrorist operations
- suicide terrorism – the essence, forms, development geographic and cultural patterns
VI Transnational Organized Crime (TOC) as a national security threat
- TOC – question of definition
- specificity (peculiarity) of TOC’ impact on security
- contemporary TOC – main evolutional trends
– main areas of criminal activity (drug production and trade, smuggling, trafficking of humans and arms, corruption as a security threat)
VII. Non-state use of Weapon of Mass Destruction (WMD)
- WMD – main categories
- Psychological aspect of non-state use of WMD
- probability of non-state use of nuclear weapons
- probability of non-state use of radiological weapons
- biological and chemical weapons and materials (toxic weapons included) – probability of use by non-state actors
- case studies: Aum Shinrikyo i Al Qaeda
VIII. Cybersecurity – non-state use of Information Technologies (IT) as a national threats
- information security – key terms and definitions
- typologies of IT-activities of non-state actors
- cybercrime and cyberterrorism
- hackers, crackers and hacking and cracking
- the issue of critical infrastructure
IX. Piracy
- definitional issues
- specificity in relation to other forms of organised crime
- geographical distribution and intensity of the phenomenon
- main methods and problems of countering
Term 2023Z:
None |
Term 2024Z:
None |
Type of course
elective monographs
general courses
Mode
Prerequisites (description)
Course coordinators
Learning outcomes
After the course student should have knowledge concerning theory of asymmetric threats, be able to use correctly relevant terminology, should know basic information about contemporary terrorism (groups, attacks, ideologies), transnational crime (groups, activities), non-state use of WMD or IT. Should also be able to assess current strategic relevance of asymmetric threats (intensity of threat, consequences etc.) (K_W01; K_W03, K_W04, K_W05)
That means all that after the course the student should be familiar with basic rules of strategic analysis (K_U01; K-U02; K_U03)
Should be also able to make an effort to predict future evolution of these threats and responses to them. (K-K01)
Assessment criteria
attendance and active participation (10%), final written exam – test (multiple choice) + short open questions (90%) - done - if conditions permit - in class or - if pandemic situation requires - on-line
Practical placement
none
Bibliography
Selected literature:
1. M. Madej, Zagrożenia asymetryczne bezpieczeństwa państw obszaru transatlantyckiego, Warszawa 2007
2. P. Hough, Understanding Global Security, London 2004 or later
3. W. Laquer, No End to War, Terrorism in the Twenty-First Century, London-New York 2003
4. W. Laquer, Ch. Wall, The future of terrorism, New York 2018
5. J. Arquilla, D. Ronfeldt (eds), Networks and Netwars: The Future of Terror, Crime and Militancy, RAND, Santa Monica 2001
6. A. Castle, Transnational Organized Crime and International Security, Institute of International Relations, Vancouver 1997
7. M. Naim, Illicit, New York 2005
7. Ch. Ferguson (ed.), The Four Faces of Nuclear Terrorism, Center for Nonproliferation Studies, Monterey 2004
8. N. Gurr, B. Cole, The New Face of Terrorism: Threats from Weapons of Mass Destruction, I.B. Tauris Publishers New York 2001
9. B. Schmitt B. (ed.) Information security. A new challenge for the EU, Paris 2005
10. P. J. Springer (ed.), Encyclopedia of Cyber Warfare, Santa Barbara-Denver 2017
11. M. N. Murphy, Contemporary piracy and maritime terrorism: the threat to international security, London 2007
12. P. Singer, A. Friedman, Cybersecurity and cyberwar. What everyone needs to know, Oxford University Press, London-New York 2014
Selected articles from scientific journals and readers like International Security, Terrorism and Political Violence, Studies in Conflict and Terrorism, Small wars and Insurgencies, Foreign Policy, Foreign Affairs.
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: