Course Syllabus

Future of Cybersecurity Reading Group (FCRG)

Info 290 Section 004 (Course no. 46669)
Mondays, 12:40–1:30pm
South Hall Room 205
Lunch provided by CLTC (come at 12:30 for lunch)

Law students: please note that Berkeley Law starts classes on Monday, August 21, but campus starts Wednesday the 23rd. Our first class will be on Monday, August 28th. We will make up the missed class.

Instructors: Betsy Cooper, Executive Director, Center for Long-Term Cybersecurity & Chris Jay Hoofnagle, Adjunct Professor of Information and Law

This one-credit reading group, sponsored by the Center for Long-Term Cybersecurity, will discuss contemporary cybersecurity policy problems. The seminar will focus on future trends in technology, as well as the economy and politics, and how those are affecting cybersecurity policy. Topics may include encryption, autonomous vehicles, and the ethics of artificial intelligence.


Students are required to attend weekly 50-minute sessions, lead paper discussions (50%), and write two short response pieces (2-3 pages) to be circulated in advance of class (50%). We will circulate a sign up sheet for discussion leadership duties; you will circulate your response piece in advance of class on the discussion board. Here is a good template to use for your assignments.

For your response pieces, you have several options. Although you may summarize a reading, your response piece should be more than that. You could analyze a major theme or problem in the readings and tie it to challenges in cybersecurity generally. Or perhaps you could show the linkages among multiple themes/readings in the course. The best response pieces integrate themes of the course, raise high-level discussion questions, and/or present original arguments and the limitations of those arguments.  

APM-015 Part II statement

This course will deal with material concerning current events and exploration of government actions and their possible consequences. Class discussion will feature such material.

BCLT Certificate

Law students: Hoofnagle's courses count toward's BCLT's certificate program.

Course Materials

Please purchase:

  • P.W. Singer, Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, 2014) 978-0199918119
  • Cliff Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (this book originally published in 1990--that version or a reprint is sufficient).

In addition to these books, we will read academic articles and policy papers. Some readings will be behind paywalls. In order to get the readings at no cost, you will have to use the Berkeley Library VPN or the Library Proxy. These tools enable you to obtain all UCB-subscribed journals and books from your home computer. If you have problems, see your helpdesk. 


# D Date Topic Reading Discussion Leads Response Paper
1 M 28-Aug-17 Introduction to cybersecurity Singer: 1-66.
Introduce yourself on the discussion board.
Please complete the discussion leader and hot topics survey 
X M 4-Sep-17 No Class Labor Day
M T 5-Sep-17 Makeup: PhotoDNA Law students, please attend Reigning in Online Abuses by Hany Farid, 4 PM, location TBD South Hall. (Or one other makeup talk.)
2 M 11-Sep-17 Case Study 1 Stoll: 1-70. Discussants: MJ & GN MJ&GN
M W 13-Sept-17 Makeup: Edgar Timothy Edgar: Beyond Snowden: Privacy, Mass Surveillance and the Struggle to Reform the NSA5:30 PM location TBD
3 M 18-Sep-17 Introduction to cybersecurity 2 Singer: 65-165. VR&AR
4 M 25-Sep-17 Case Study 2 Stoll: 70-133. MB&LL AS&TK
5 M 2-Oct-17 Government Device Hacking (Cooper) Ahmed Ghappour, "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web," 69 Stanford Law Review (April 2017), D-MdL&RD LL&DLT
Orin S. Kerr and Sean D. Murphy, Government Hacking to Light the Dark Web: What Risks to International Relations and International Law?, Stanford Law Review Online (2017, Forthcoming),
6 M 9-Oct-17 Case Study 3 Stoll: 134-207. MG&GN
7 M 16-Oct-17 Current Events 1: Election Hacking (Hoofnagle) Class, for this discussion, we would like to focus on the special approaches taken by the Macron campaign. There is not a proper case study yet. We might update these assignments with material from the upcoming German election. For now, please read: Gadi Evron, How Macron just Changed Cyber Security Forever, International Policy Digest, May 20, 2017; Christopher Dickey, Fighting Back Against Putin’s Hackers, Daily Beast, Apr. 25, 2017. KF&WT DH&CSAU&TFH
8 M 23-Oct-17 Case Study 4 (Cooper) Stoll: 208-274. CR&BB VR&MG&RR
9 M 30-Oct-17 Cyberoperations and its Consequences

Joshua Rovner & Tyler Moore, Does the Internet Need a Hegemon? 2(3) Journal of Global Security Studies 184–203, Jul. 2017

Ben Buchanan, Cyber-Operations and the Misunderstood Doomsday Machine: A Rebuttal, War on the Rocks, Aug, 24, 2017

M W 1-Nov-17 Makeup Please attend the talk of David Sanger, 4-6pm, location TBD.
10 M 6-Nov-17

Attribution: Going Beyond Stoll


John S. Davis, II, et al., Stateless Attribution Toward International Accountability in Cyberspace (2017),

11 M 13-Nov-17 Case Study 5 Stoll: 275-337. PR&CSTR&RR KH&KF
12 M 20-Nov-17 Future of Cybersecurity Excerpts from Scenarios 2020 & draft scenario prompts from CLTC DLT&TFH D-MdL&BB&MB
13 M 27-Nov-17 Case Study 6 Stoll: 338-end. TK&AS CR&MJ&KC


Course Summary:

Date Details Due