Lectures

Lectures

Lecture # Date Lecture Topic Class Notes Readings
Technology & Policy Overview
01 January 24 Introduction pdfImg
02 January 29 Policy Overview pdfImg
Readings:
  • Defending a New Domain: The Pentagon's Cyberstrategy,by William F. Lynn III, Foreign Affairs, September/October 2010
  • The West's Crisis of Confidence by Carl Bildt, Project Syndicate, April 19, 2018
    Optional Resources:
  • Under the Sea: The Vulnerability of the Commons, Foreign Affairs Magazine, January/February 2015 Issue.
  • Cyber-security: The vexed question of global rules, An independent report on cyber-preparedness around the world, February 2012. Read what 250 experts have to say about cybersecurity.
  • Cybersecurity - Two Years later, CSIS, 2011. (For 1st assignment this paper is part of the preceding one.)
  • Lessons from the First Great Cyberwar Era, A. M. Rutkowski, Info, Vol. 12, No. 1, February 2010.
  • 60 Minutes Show on Cyber War: Sabotaging the System 1:2, June 13, 2010. A minute video.
  • 03 January 31 Hardware and Software pdfImg
    Readings:
  • How the Internet Got Its Rules
  • How a 22-Year-Old Discovered the Worst Chip Flaws in History by Jeremy Kahn, Alex Webb, and Mara Bernath, Bloomberg Technology, January 17, 2018
  • What He Did on His Summer Break: Exposed a Global Security Flaw by Isabella Kwai, The New York Times, January 30, 2018

  • Optional Resources:
  • A Tiny Computer Attracts a Million Tinkerers, by John Biggs of the New York Times.
  • Computer Architecture
  • 04 February 5 Hardware and Software Vulnerabilities pdfImg
    05 February 7 Internet Naming and Routing Protocols pdfImg
    Readings:
  • Chapter 6.1 of Introduction to Computer Security. Please use the password in class email to access. Chapter 6.1 required; the rest of the chapter for reference.
  • Understanding Autonomous Systems

  • Optional Resources:
  • Intro to BGP4, inter-AS routing
  • 06 February 12 Design and Operation of the Internet pdfImg
    Readings:
  • Beginner's Guide to Internet Protocol (IP) Addresses
  • Packets, routers, and reliability
  • This is a six minute, 25 second video narrated by Vint Cerf, one of the Fathers of the Internet
    Security  
    07 February 14 Cyber Exploits pdfImg
      February 19 Long Weekend    
    08 February 21 Attribution and Privacy pdfImg
    Readings:
  • Attributing Cyber Attacks, Rid and Buchanan.
    Optional Resources:
  • Untangling Attribution, Clark and Landau, Procs. Workshop on Deterring Cyberattacks, National Research Council, 2010.
  • A Survey of Challenges in Attribution
  • New Brunswick licks identity management with virtual directory
  • The Dark Side of the Digital Revolution Examines the approach taken by autocratic governments to obtain control over Internet communications.
  • Amid cyberattacks, ISPs try to clean up the Internet, by Michael Kan, COMPUTERWORLD, February 23, 2017
  • Twitter is (finally) cracking down on bots, Techcrunch, February 22, 2018
  • The State of Fakery by Esther Shein, Communications of the ACM, Vol. 61 No. 3, Pages 21-23, 2018
  • 09 February 26 Major Cyber Attacks pdfImg
    10 February 28 Secure Communications and Authorization pdfImg
    11 March 5 Cyber Conflict pdfImg
    Economics
    12 March 7 Cyber Economics pdfImg
    13 March 12 Bitcoin and Blockchains pdfImg
    Internet Governance  
    14 March 14 Transborder Cybercrime pdfImg
    Readings:
  • May It Please the Court (.5 pages)
    This a nice summary of the Microsoft Ireland Case.
  • A Primer on Microsoft Ireland, the Supreme Court's Extraterritorial Warrant Case (2.5 pages)
    This is a good primer on this important case.
  • EU to intervene in Microsoft's U.S. Supreme Court data protection case (1 page)
  • Google, unlike Microsoft, must turn over foreign emails: U.S. judge (2 pages)
  • Court reveals another overseas-data fight between Google and feds
  • Opinion There's No Good Decision in the Next Big Data Privacy Case (3 pages)
  • Article 32b of the Cybercrime Convention is called the "transborder provision." (0 pages)
    The Russian Federation will not sign the treaty because they view this provision as a violation of their sovereignty.
  • The CLOUD Act, S. 2383/H.R. 4943
  • Coalition Letter on CLOUD Act
  • 15 March 19 Careers in Cyber Security, Holly Ridgeway (Guest) pdfImg
    16 March 21 Internet Governance pdfImg
    17 April 2 International Norms Process pdfImg
    Contemporary Topics
    18 April 4 Social Media and Propaganda pdfImg
    19 April 9 AI and Ethics pdfImg
    Readings:
  • Volkswagen Official Gets 7-Year Term in Diesel-Emissions Cheating by Bill Vlasic, The New York Times, December 6, 2017
  • Artificial Intelligence Rules More of Your Life. Who Rules AI? by Heidi Vogt, The Wall Street Journal, March 13, 2018
  • Reforming the U.S. Approach to Data Protection and Privacy by Nuala O'Connor, Council on Foreign Relations, January 30, 2018
  • France goes after companies for deliberately shortening life of hardware: French prosecutors investigate a 'planned obsolescence' complaint against printer maker Epson. A conviction could have far-reaching global ramifications by Patrick Nelson, NETWORKWORLD, January 5, 2018
    Optional Readings:
  • 2018 ACM Code of Ethics and Professional Conduct: Draft 3
  • 'The Business of War': Google Employees Protest Work for the Pentagon by Scott Shane and Daisuke Wakabayashi, The New York Times, April 4, 2018
  • Artificial Intelligence Seeks an Ethical Conscience by Tom Simonite, Wired, December 7, 2017
  • The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems
  • How Evil Is Tech? by David Brooks, The New York Times, November 20, 2017
  • Artificial Intelligence and Chinese Power: Beijing's Push for a Smart Military — and How to Respond
  • The Future Computed: Artificial Intelligence and its role in society by Brad Smith and Harry Shum, Microsoft, January 17, 2018
  • Partnership on AI
    "Established to study and formulate best practices on AI technologies, to advance the public's understanding of AI, and to serve as an open platform for discussion and engagement about AI and its influences on people and society."
  • 20 April 11 Engineering for Security pdfImg
    Readings:
  • Making Security Sustainable by Ross Anderson, Communications of the ACM, Vol. 61 No. 3, Pages 24-26, 2018
  • Cybersecurity's Human Factor: Lessons from the Pentagon by James A. Winnefeld Jr., Christopher Kirchhoff, and David M. Upton, Harvard Business Review, September 2015
  • Rethinking Cybersecurity: Strategy, Mass Effect, and States by James Andrews Lewis, Center for Strategic and International Studies, January 9, 2018 Security Development Lifecycle
  • OWASP Top Ten: Surviving in the cyber wilderness By Peter Loshin, TechTarget, December 7, 2017
  • 21 April 16 Growing Risk of Strategic Surprise in Cyberspace,
    Vinh Nguyen, National Intelligence Council (Guest)
    pdfImg
    Readings:
  • Cybersecurity Tech Accord, April 17, 2018
    On April 17, 2018, 34 global technology and security companies signed a Cybersecurity Tech Accord, a watershed agreement among the largest-ever group of companies agreeing to defend all customers everywhere from malicious attacks by cybercriminal enterprises and nation-states.
  • Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core New York Times, November 12, 2017
  • 22 April 18 Defense in Depth pdfImg
    Readings:
  • Thomas Rid. Think Again: Cyberwar, Foreign Policy, March/April, 2012
  • John Arquilla. Cyberwar Is Already Upon Us, Foreign Policy, March/April, 2012xs
  • Ellen Nakashima. U.S. accelerating cyberweapon research, Washington Post, March 18, 2012.
  • 2015 DoD Law of War Manual
  • Michael N. Schmitt. The Law of Cyber Warfare: Quo Vadis?
  • Secure Host Baseline
    Video Resources:
  • NSA TAO Chief on Disrupting Nation State Hackers by Rob Joyce, USENIX Enigma Conference, January 28 2016 (34:55 minutes)

  • Optional Resources:
  • David Sanger. A Eureka Moment for Two Times Reporters: North Korea
  • 23 April 23 The Role of Intelligence and Information Sharing in Cyber,
    Mike Steinmetz, Rhode Island Cybersecurity Officerb (Guest)
    pdfImg  
    23 April 25 Future Directions pdfImg
    Readings:
  • Rob Joyce. Disrupting Nation State Hackers (Video), USENIX Enigma 2016 Conference, January 2016
  • John Kindervag. Network Segmentation/Zero Trust(Video), paloalto Networks.
  • Getting Started with a Zero Trust Approach to Network Security, paloalto Networks