nl en

Unrestricted Warfare: Crypto, Cyber SOCMINT


Admission requirements

This course is designed for the minor Intelligence Studies. It is not possible to follow single courses of this minor. You need to be enrolled in Usis for the minor to be accepted to this course. There are 150 places open for registration, on a first come first serve basis, where LDE students are given priority.


The growth of the Internet of things and our online footprint in the 21st century are the prime example that we are becoming more interconnected to the global community than ever before. This growing interconnectedness is also raising concerns about the security of cyberspace, especially with regard to our growing dependency on ICT infrastructure.

Several countries have sought to address these issues and concerns by developing a National Cyber Security Strategy. In many countries, Cyber security has become one of the top priorities alongside international terrorism. The threats emerging from cyberspace are becoming more internationally recognized. Countries are trying to keep up with their legislation and framework to put measures in place to protect their own infrastructure and population from these threats.

The complexity of our ICT infrastructure enables potential adversaries to attack or systems in more and more advanced manners in critical sectors (such as on our energy facilities, transportation). During this course on Unrestricted Warfare, the concept of
Cyber will be explained, the threat will be unraveled and possible countermeasures and policy frameworks will be discussed. This course will approach the subject of Cyber and Unrestricted Warfare from an analysis and policymaking perspective focusing on the important aspects of politics, international relations, privacy, defense and social media.

As part of this course, several past and current events will be discussed, just like the role of the intelligence community within the Cyber domain as well as the role of the corporate sector in the cyber industry.

Course objectives

  1. The student gains knowledge on historical and recent developments in the field of Digital Cryptography, different Cyber-disciplines and Social Media in regard to intelligence gathering;
  2. The student gains knowledge of current scientific theories and development in the above-mentioned disciplines;
  3. The student develops writing skills and skills in regard to the academic use of sources and online open source (OSINT) information;
  4. The student develops research skills in the development in the above-mentioned disciplines;
  5. The student is able to work together in a group with other students;
  6. The student develops creative capacities (writing, inventions, design etc.).


The timetable will be displayed with a link on this course page, the website, blackboard and on the front page of this minor programma.
The schedule 2018 will be published asap.

Mode of instruction

7 lectures of 3 hours by instructors and guest lecturers.

Participation in lectures, discussions and exercises is required in order to obtain a grade. One lecture may be missed. Being absent more than once may likely lead to expulsion from the course.

Course Load

Component % Hours
Attendance mandatory 21
Mid term paper 50% 20
Final exam 50% 3
Reading and self-study* 96
Total 100% 140

*On the basis of reading approximately eight pages per hour.

Assessment method

Mid term paper (50%)
Final exam (50%)

The Course and Examination Regulation Security Studies and the Rules and Regulation of the Board of Examiners of the Institute of Security and Global Affairs apply.



Reading list

TBA on Blackboard


Registration in uSis is possible from four weeks before the start of the course.
Also register for every course in Blackboard. Important information about the course is posted here.