Technology & Policy Overview |
01 |
January 22 |
Introduction |
 |
|
02 |
January 27 |
Policy Overview |
|
Readings: (Compare and contrast themes b/w U.S. administrations)
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, by The White House, May 2011
National Cyber Strategy of the United States of America, by The White House, September 2018
Lucas Kello, The Meaning of the Cyber Revolution: Perils to Theory and Statecraft International Security 2013
Optional Resources:
The West's Crisis of Confidence
by Carl Bildt, Project Syndicate, April 19, 2018
Under the Sea: The Vulnerability of the Commons, Foreign Affairs Magazine, January/February 2015 Issue.
Trump Us Cyber Diplomacy
Lessons from the First Great Cyberwar Era, A. M. Rutkowski, Info, Vol. 12, No. 1, February 2010.
60 Minutes Show on Cyber War: Sabotaging the System 1:2, June 13, 2010. A minute video.
|
03 |
January 29 |
Intro to Hardware and Software |
|
|
04 |
February 3 |
Hardware and Software Vulnerabilities |
|
|
05 |
February 5 |
The Role of Intelligence and Information
Sharing Mike Steinmetz, President, Digital Executive
and
Director and General Partner, College Hill Ventures (Guest) |
|
Readings:
18 U.S. Code B' 1385 - Use of Army and Air Force as posse
comitatus, Legal Information Institute,
Retrieved, January 13, 2020
Emergency Management and National Guard Duties/Authorities, Retrieved January
13, 2020,
Executive Order — Improving Critical
Infrastructure Cybersecurity, The White House,
February 12, 2013
Executive Order 13691, Promoting Private Sector
Cybersecurity Information Sharing, The White
House, February 13, 2015
Intelligence Reform and Terrorism Prevention Act
of 2004
Obama Administration Releases Long Awaited New
E.O. 12333 Rules on Sharing of Raw Signals
Intelligence Information Within IC by Jane
Chong, LAWFARE, January 12, 2017
How the IC Works, Office of the Director of
National Intelligence, 2009
Presidential Policy Directive 21
Implementation, Interagency Security
Committee, February 2015
Security Breach and Spilled Secrets Have Shaken
the N.S.A. to Its Core New York Times, November 12, 2017
Worldwide Threat Asessment of the US Intelligence Community, by
Daniel R. Coats, Director of National Intelligence, January 29, 2019
|
06 |
February 10 |
Design and Operation of the Internet |
|
|
07 |
February 12 |
Internet Naming and Routing Protocols |
|
|
|
February 18 |
Long Weekend |
|
|
Security |
|
08 |
February 19 |
Cyber Exploits |
|
Readings:
The Security Dilemma of Cyberspace: Ancient Logic, New Problems, by Lucas Kello, 2017
The New Norm: Trend Micro Security Predictions for 2020
US Electrical Grid Hacked By Russia
Wired Guide To Data Breaches
Optional Resources:
Deep Web and Cyber Crime
Wikileaks Files Show the CIA Repurposing Hacking
Code to Save Time, Not to Frame Russia by Kim
Zetter, The Intercept, March 8, 2017
Economic Impact of Cybercrime — No Slowing
Down, McAfee and CSIS, February 2018
Leaked Files Show How the NSA Tracks Other
Countries' Hackers by Kim Zetter, The
Intercept, March 6, 2018
|
09 |
February 24 |
Attribution and Privacy |
|
|
10 |
February 26 |
Major Cyber Attacks |
|
|
15 |
March 16 |
Canceled |
|
|
Internet Governance |
|
16 |
March 30 |
Transborder Issues |
|
|
17 |
April 1 |
Internet Governance |
|
Readings:
Milton L. Mueller. Network and States: The Global Politics of Internet Governance, pp.1-13.
Joseph S. Nye, Jr. The Regime Complex for Managing Global Cyber Activities.
Matthias Spielkamp. Internet governance - why you should care.
Bruce W. McConnell & John E. Savage. Exploring Multi-Stakeholder Internet Governance. Follow download link. Read pp.2-10.
Optional Resources:
Nationalistic Hierarchies vs Multi-stakeholder Networks.
ICANN, Russia, China and Internet Reform.
The Clarifying Lawful Overseas Use of Data (CLOUD) Act, signed into law in
March 2018, is explained in this article by the Electronic Privacy
Information Center (EPIC).
The WIRED Guide to Data Breaches by Lily Hay Newman, Wired, December
7, 2018
GDPR impact complex, expert warns by Warwick Ashford, Computer Weekley, November 15, 2017
Cross-Border Data
Sharing Under the CLOUD Act
What is net neutrality
|
18 |
April 6 |
International Norms Process |
|
|
Contemporary Topics |
19 |
April 8 |
Social Media and Propaganda |
|
Readings:
The Global Disinformation Order: 2019 Global Inventory of Organised Social Media Manipulation, The Oxford Internet Institute, 2019
The Existential Threat from Cyber-Enabled Warfare, Herbert Lin, 2019
Information operations on Twitter: principles, process, and disclosure, Twitter, 2019
How We Respond to Inauthentic Behavior on Our Platforms, Facebook, 2019
Can New Forensic Tech Win War On AI-Generated Fake
Images? by Steven Melendez, FastCompany, April 4, 2018
Optional Resources:
Russia Deployed Its Trolls to Cover Up the Murder of 298 People on MH17, 2019
Can New Forensic Tech Win War On AI-Generated Fake
Images? by Steven Melendez, FastCompany, April 4, 2018
Report: Haglund was quick to pick up on Russia's
information campaigns
How IT Threatens Democracy by Kofi Annan
The Big Loophole That Helped Russia Exploit Facebook: Doctored Photos
The Psychology Of Fake News
Video Resources:
Inside Russia's Network of Bots and
Trolls
Synthesizing Obama: Learning Lip Synch from Audio
Real-Time Face Capture and Reenactment of RGB
Videos
Sneak Peek at #VoCo, Adobe's audio editor
How To Spot A Deepfake Like The Barack Obama—Jordan Peele Video by Craig
Silverman, BuzzFeed, April 17, 2018
This "deepfake" video starring Jordan Peele as Barack
Obama shows how easy it's getting to create convincing
audio and video fakes. Here's how to fight back.
Face2Face:
Real-Time Face Capture and Reenactment of RGB
Videos. The techniques used to produce this video are
described here.
|
20 |
April 13 |
AI and Ethics |
|
Readings:
The WIRED Guide to Artificial Intelligence, 2018
Artificial Intelligence and Ethics:
Ethics and the dawn of decision-making
machines by Jonathan Shaw, Harvard
Magazine, January-February, 2019
Artificial Intelligence Rules More of Your Life. Who Rules AI? by Heidi Vogt, The Wall Street Journal, March 13, 2018
One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority, NYT, 2019
Optional Readings:
2018 ACM Code of Ethics and Professional Conduct: Draft 3
'The Business of War': Google Employees Protest Work for the Pentagon by Scott Shane and Daisuke Wakabayashi, The New York Times, April 4, 2018
Artificial Intelligence Seeks an Ethical Conscience by Tom Simonite, Wired, December 7, 2017
The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems
|
21 |
April 15 |
Engineering for Security |
|
Readings:
Making Security Sustainable by Ross Anderson, Communications of the ACM, Vol. 61 No. 3, Pages 24-26, 2018
Cybersecurity's Human Factor: Lessons from the Pentagon by James A. Winnefeld Jr., Christopher Kirchhoff, and David M. Upton, Harvard Business Review, September 2015
Rethinking Cybersecurity: Strategy, Mass Effect, and States by James Andrews Lewis, Center for Strategic and International Studies, January 9, 2018 Security Development Lifecycle
OWASP Top Ten: Surviving in the cyber wilderness By Peter Loshin, TechTarget, December 7, 2017
|
22 |
April 20 |
Defense in Depth |
|
Readings:
Thomas Rid.
Think Again: Cyberwar, Foreign Policy, March/April, 2012
John Arquilla.
Cyberwar Is Already Upon Us, Foreign Policy, March/April, 2012xs
Ellen Nakashima.
U.S. accelerating cyberweapon research, Washington Post, March 18, 2012.
Video Resources:
NSA TAO Chief on Disrupting Nation State Hackers by
Rob Joyce, USENIX Enigma Conference, January 28 2016
(34:55 minutes)
Optional Resources:
2015 DoD Law of War Manual [1200+ Pages -- for reference only]
David
Sanger.
A Eureka Moment for Two Times Reporters: North Korea
|
23 |
April 22 |
Future Directions |
|
Readings:
Alternate Cybersecurity Futures, The Atlantic Council, 2019
Diversity in Cybersecurity, by John Knight,
Jack Davidson, Anh Nguyen-Tuong, Jason Hiser, and
Michele Co, Computer, 2016
Shuffler: Fast and Deployable Continuous Code Re-Randomization
by King, Gobieski, Williams-King, Blake, Yuan,
Colp, Zheng, Kermerlis, Yang and Aiello, OSDI,
2016
|