Future of Cybersecurity Reading Group/Workshop
Future of Cybersecurity Reading Group (FCRG)
Special Topics in Information - INFO 290 LEC 001 (17899) (2 credits)
Future of Cybersecurity Workshop - LAW 276.12 SEM 001 (32369)(1 credit)
South Hall Room 205
Office Hours: Thursdays from 10-12 in South Hall 212.
We will discuss cybersecurity policy among a group of graduate, professional, and undergraduate students. In Spring 2019, we will focus on cyber conflict (Sanger), governance (Klimburg), and quantum technologies (draft paper by Hoofnagle).
This course is open to law students, graduate students, and undergraduates (with permission). Undergraduates should be prepared to read and engage at a level commensurate with your graduate school peers--there's no "back benching" this seminar.
Students are expected to participate in weekly discussions, lead paper discussions (50%) twice, and write two response pieces (3-4 pages) to be circulated in advance of class (50%). (Response writers will also serve as discussion leaders.) We will circulate a sign up sheet for discussion leadership/response writing duties; you will circulate your response piece in advance of class on the discussion board. Please submit it no later than Sunday at Noon.
Please use this template for your reading responses.
For your response pieces, it is important to not simply recount the reading. Assume that everyone has read carefully. Your response piece should follow at least one of the following strategies:
- You could analyze a major theme or problem in the readings and tie it to challenges in cybersecurity generally, or to larger theoretical frameworks used in cybersecurity.
- You could show the linkages among multiple themes/readings in the course.
- You could analyze the arguments raised in the reading by assessing strengths, the merits of counterarguments, and of course by identifying the implicit/explicit assumptions that underly the argument.
The best response pieces integrate themes of the course, raise high-level discussion questions, and/or present original arguments and the limitations of those arguments. Pay attention to the footnotes--you might find context and color from extrinsic sources.
APM-015 Part II statement
This course will deal with material concerning current events and exploration of government actions and their possible consequences. Class discussion will feature such material.
Law students: Hoofnagle's courses count toward's BCLT's certificate program.
- David Sanger's The Perfect Weapon (2018)
- Alex Klimburg's The Darkening Web (2017)
The quantum readings are available in bcourses>files.
Some readings will be behind paywalls. In order to get the readings at no cost, you will have to use the Berkeley Library VPN or the Library Proxy. These tools enable you to obtain all UCB-subscribed journals and books from your home computer. If you have problems, see your helpdesk.
If you are feeling at sea with cybersecurity or hacking techniques, you might explore the relevant courses on lynda.com. UCB has a site license, so you can watch as many as you'd like :) For instance:
- Ethical Hacking: Pen Testing: https://www.lynda.com/Security-tutorials/Ethical-Hacking-Penetration-Testing/529366-2.html
- Python Pen Testing: https://www.lynda.com/Python-tutorials/Learning-Python-Web-Penetration-Testing/521198-2.html
- Search for "ethical hacking" or "cybersecurity" for many more, filter by "course" and "beginner."
The quality of these videos vary, but some are excellent.
To log in, you need to use this link and your calnet: https://hr.berkeley.edu/development/learning/online-learning
|Th||24-Jan||Please complete the discussion leader survey by Thursday, January 24th.|
VP & AR's reading reflections are in the discussion page
|2||M||4-Feb||Lily Lin; AK & KrCa||Klimburg: Chapters 2-3|
|Sanger: Chapters 2-3|
|3||M||11-Feb||TK & OF||Klimburg: Chapter 4|
|Sanger: Chapters 4-5|
|Quantum: N.D. Mermin, Quantum mysteries for anyone, 78(7) Journal of Philosophy 397 (1981).|
|X||M||18-Feb||Class Canceled||Presidents' Day Holiday|
|F||22-Feb||Optional||FTC Hosts Competition Law Conference at Berkeley. Details TBD|
|4||M||25-Feb||RB & ABar||Please note, we will meet in Boalt Hall Room 107 this week because of a room conflict|
Klimburg: Chapters 5-6
Sanger: Chapters 6-7
|Quantum: Hoofnagle, Law and Policy for the Second Quantum Revolution; part 1 (Draft, pages 1-23)|
|5||M||4-Mar||DLT & SC||Klimburg: Chapter 7|
|Sanger: Chapter 8|
|4-Mar||Optional||This week SF hosts several major security conferences, including BsidesSF and RSA|
|6||M||11-Mar||SJ & AW||Klimburg: Chapter 8|
|Sanger: Chapter 9|
|Quantum: Hoofnagle, Law and Policy for the Second Quantum Revolution; part 2, page 25–41 (Draft)|
|Th||14-Mar||Optional||BCLT Annual Privacy Lecture: Shoshana Zuboff Free to all who register|
|7||M||18-Mar||KB & JM||Klimburg: Chapter 9|
|Sanger: Chapter 10|
|F||22-Mar||Optional||BCLT Privacy Law Forum Silicon Valley Ask Hoofnagle about participation|
|X||M||25-Mar||Class Cancelled Spring Break|
|8||M||1-Apr||ABaz & NT||Klimburg: Chapters 10-11|
|Sanger: Chapter 11|
|9||M||8-Apr||AP & VS||Klimburg: Chapters 12-14|
|Sanger: Chapter 12|
|10||M||15-Apr||JS||Klimburg: Chapter 15-16|
|11||M||22-Apr||LL & CH||Reading: Class, please read portions of the Mueller report (pages 1–5; 8–10; 14–51). The full report is here.|
|I School's DataEdge conference features former Yahoo & FB CPO + Russian influence slayer Alex Stamos|
Law students only, makeup.
Klimburg: Chapter 17 + epilogue
Last class for grad/UG
Klimburg: Chapter 17 + epilogue
|Hoofnagle: post-workshop discussion on Quantum||Sanger: done|
The syllabus page shows a table-oriented view of the course schedule, and the basics of course grading. You can add any other comments, notes, or thoughts you have about the course structure, course policies or anything else.
To add some comments, click the "Edit" link at the top.