Future of Cybersecurity Reading Group (FCRG)
Info 290 Section 004 (Course no. 46669)
South Hall Room 205
Lunch provided by CLTC (come at 12:30 for lunch)
Law students: please note that Berkeley Law starts classes on Monday, August 21, but campus starts Wednesday the 23rd. Our first class will be on Monday, August 28th. We will make up the missed class.
This one-credit reading group, sponsored by the Center for Long-Term Cybersecurity, will discuss contemporary cybersecurity policy problems. The seminar will focus on future trends in technology, as well as the economy and politics, and how those are affecting cybersecurity policy. Topics may include encryption, autonomous vehicles, and the ethics of artificial intelligence.
Students are required to attend weekly 50-minute sessions, lead paper discussions (50%), and write two short response pieces (2-3 pages) to be circulated in advance of class (50%). We will circulate a sign up sheet for discussion leadership duties; you will circulate your response piece in advance of class on the discussion board. Here is a good template to use for your assignments.
For your response pieces, you have several options. Although you may summarize a reading, your response piece should be more than that. You could analyze a major theme or problem in the readings and tie it to challenges in cybersecurity generally. Or perhaps you could show the linkages among multiple themes/readings in the course. The best response pieces integrate themes of the course, raise high-level discussion questions, and/or present original arguments and the limitations of those arguments.
APM-015 Part II statement
This course will deal with material concerning current events and exploration of government actions and their possible consequences. Class discussion will feature such material.
Law students: Hoofnagle's courses count toward's BCLT's certificate program.
- P.W. Singer, Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, 2014) 978-0199918119
- Cliff Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (this book originally published in 1990--that version or a reprint is sufficient).
In addition to these books, we will read academic articles and policy papers. Some readings will be behind paywalls. In order to get the readings at no cost, you will have to use the Berkeley Library VPN or the Library Proxy. These tools enable you to obtain all UCB-subscribed journals and books from your home computer. If you have problems, see your helpdesk.
|#||D||Date||Topic||Reading||Discussion Leads||Response Paper|
|1||M||28-Aug-17||Introduction to cybersecurity||Singer: 1-66.|
|Introduce yourself on the discussion board.|
|Please complete the discussion leader and hot topics survey|
|X||M||4-Sep-17||No Class Labor Day|
|M||T||5-Sep-17||Makeup: PhotoDNA||Law students, please attend Reigning in Online Abuses by Hany Farid, 4 PM, location TBD South Hall. (Or one other makeup talk.)|
|2||M||11-Sep-17||Case Study 1||Stoll: 1-70. Discussants: MJ & GN||MJ&GN|
|M||W||13-Sept-17||Makeup: Edgar||Timothy Edgar: Beyond Snowden: Privacy, Mass Surveillance and the Struggle to Reform the NSA, 5:30 PM location TBD|
|3||M||18-Sep-17||Introduction to cybersecurity 2||Singer: 65-165.||VR&AR|
|4||M||25-Sep-17||Case Study 2||Stoll: 70-133.||MB&LL||AS&TK|
|5||M||2-Oct-17||Government Device Hacking (Cooper)||Ahmed Ghappour, "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web," 69 Stanford Law Review (April 2017), https://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2742706.||D-MdL&RD||LL&DLT|
|Orin S. Kerr and Sean D. Murphy, Government Hacking to Light the Dark Web: What Risks to International Relations and International Law?, Stanford Law Review Online (2017, Forthcoming), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2957361.|
|6||M||9-Oct-17||Case Study 3||Stoll: 134-207.||MG&GN|
|7||M||16-Oct-17||Current Events 1: Election Hacking (Hoofnagle)||Class, for this discussion, we would like to focus on the special approaches taken by the Macron campaign. There is not a proper case study yet. We might update these assignments with material from the upcoming German election. For now, please read: Gadi Evron, How Macron just Changed Cyber Security Forever, International Policy Digest, May 20, 2017; Christopher Dickey, Fighting Back Against Putin’s Hackers, Daily Beast, Apr. 25, 2017.||KF&WT||DH&CSAU&TFH|
|8||M||23-Oct-17||Case Study 4 (Cooper)||Stoll: 208-274.||CR&BB||VR&MG&RR|
|9||M||30-Oct-17||Cyberoperations and its Consequences||
Joshua Rovner & Tyler Moore, Does the Internet Need a Hegemon? 2(3) Journal of Global Security Studies 184–203, Jul. 2017
Ben Buchanan, Cyber-Operations and the Misunderstood Doomsday Machine: A Rebuttal, War on the Rocks, Aug, 24, 2017
|M||W||1-Nov-17||Makeup||Please attend the talk of David Sanger, 4-6pm, location TBD.|
Attribution: Going Beyond Stoll
John S. Davis, II, et al., Stateless Attribution Toward International Accountability in Cyberspace (2017), https://www.rand.org/pubs/research_reports/RR2081.html
|11||M||13-Nov-17||Case Study 5||Stoll: 275-337.||PR&CSTR&RR||KH&KF|
|12||M||20-Nov-17||Future of Cybersecurity||Excerpts from Scenarios 2020 & draft scenario prompts from CLTC||DLT&TFH||D-MdL&BB&MB|
|13||M||27-Nov-17||Case Study 6||Stoll: 338-end.||TK&AS||CR&MJ&KC|
The syllabus page shows a table-oriented view of the course schedule, and the basics of course grading. You can add any other comments, notes, or thoughts you have about the course structure, course policies or anything else.
To add some comments, click the "Edit" link at the top.