Course Syllabus

Future of Cybersecurity Workshop (Spring 2021)
LAW 276.12 sec. 001 (1 credit---thanks ABA!)

aka

Future of Cybersecurity Reading Group (FCRG)
INFO 290 sec. 002 (2 credits)

Fridays 11:20 am – 12:45 pm
Please note, we start at 11:20, not "Berkeley Time"

Zoom Link

Office Hours:
Professor Urban: Tuesdays at 10 AM PT (use this Zoom link)
Professor Hoofnagle: Tuesdays at 11 AM (use normal zoom link)

Instructors: Chris Jay Hoofnagle, Professor of Law In Residence; Jennifer M. Urban, Clinical Professor of Law.

We will discuss cybersecurity policy among a group of graduate, professional, and undergraduate students. In Spring 2021, we will focus on two topics:

  • cybersecurity and nation-state hacking through the lens of International Relations theory (Buchanan)
  • cybersecurity and the concept of anti-racism (Benjamin)

Ben Buchanan's new book, the Hacker and the State, contains detailed and careful case studies on recent state-involved cyber offensive activity. We will use Buchanan's book, which is written from a political science/international relations lens, to discuss legal and policy approaches to address computer and network security.

Ruha Benjamin's new book, Race After Technology, will provide a framework and sounding board for an issue that is not developed in the cybersecurity literature: what would it mean to promote security online in a way that is not merely race-neutral, but also anti-racist

If there is time, we will focus on Hoofnagle's new book with Simson Garfinkel, Law and Policy for the Quantum Age.

This course is open to law students, graduate students, and undergraduates (with permission). Undergraduates should be prepared to read and engage at a level commensurate with your graduate school peers--there's no "back benching" this seminar.

Note: law students participate from January 22, 2021 to March 19, 2021.

Introductions

One of the best things about the Future of Cybersecurity Reading Group is the diverse community of participants. Each person brings something unique to the discussion. So we can all get to know one another, please: 1) Fill out the very brief class survey, so we can accommodate your needs or preferences; and 2) Introduce yourself to the class via our Piazza discussion board.

Assessment

Students are expected to participate in weekly discussions, lead class discussions (50%) twice, and write two response pieces (3-4 pages) to be circulated in advance of class (50%). (Response writers will also serve as discussion leaders.) We will circulate a sign up sheet for discussion leadership/response writing duties; you will circulate your response piece in advance of class on the Piazza discussion board.

We have a pedagogical purpose in using student discussion leaders--the purpose is to give you a challenging speaking assignment. The ability to run a structured discussion is an invaluable skill, but it only develops from practice. FCRG is a friendly atmosphere to learn this skill.

When you are assigned to write a response, get in touch with your other discussion leaders (if 2 or more are assigned that week). You are free to self-organize and write a joint response piece. We also encourage you to participate in office hours the week of your discussion leadership.

Please use this template for your reading responses. Your reading response is due 24 hours before class--Thursdays around Noon. Please post your response as a discussion in Piazza. Use the week assigned to your topic.

For your response pieces, it is important to not simply recount the reading. Assume that everyone has read carefully. Your response piece should follow at least one of the following strategies:

  • You could analyze a major theme or problem in the readings and tie it to challenges in cybersecurity generally, or to larger theoretical frameworks used in cybersecurity.
  • You could show the linkages among multiple themes/readings in the course.
  • You could analyze the arguments raised in the reading by assessing strengths, the merits of counterarguments, and of course by identifying the implicit/explicit assumptions that underly the argument. 

The best response pieces integrate themes of the course, raise high-level discussion questions, and/or present original arguments and the limitations of those arguments. It's a good idea to identify specific themes that you would like to develop in conversation. Pay attention to the footnotes--you might find context and color from extrinsic sources.

This term we will be using Piazza for class discussion. The system is highly catered to getting you help fast and efficiently from classmates and instructors. If you have any problems or feedback for the developers, email team@piazza.com.

Find our class page at: 

APM-015 Part II statement

This course will deal with material concerning current events and exploration of government actions and their possible consequences. Class discussion will feature such material.

BCLT Certificate

Law students: Hoofnagle & Urban's courses count toward's BCLT's certificate program.

Course Materials

Please purchase:

Sometimes readings are behind paywalls. In order to get the readings at no cost, you will have to use the Berkeley Library VPN or the Library Proxy. These tools enable you to obtain all UCB-subscribed journals and books from your home computer. If you have problems, see your helpdesk. 

This Zoom Life

This explains the plan for facilitating our reading group in the face of the COVID-19 outbreak and the policy guidance the law school and campus have set out. We know these are distressing and uncertain times. Your first and foremost priority should be preserving your health and sense of well-being, as well as contributing to protecting the broader public health.

We’ve all engaged in a fair amount of remote learning at this point. We also know that things may change as the semester unfolds. We’ll check in periodically to make sure these policies are working and will consider adjustments if needed. Please do not hesitate to ask questions or offer comments about anything that works especially well, doesn’t work at all, is confusing, etc.

  • General Class Procedure

Chris and Jennifer will set up the Zoom room and open it up 10 minutes or so before class. Please log on 5 minutes before class time, if you can. That will help us immensely in getting settled and started efficiently. Your promptness will help the discussion leaders begin as easily as possible.

We will be recording each class, as required by school policy. However, we will discuss as a group whether to record the chat, and make a decision together. Please be mindful of your colleagues’ privacy and remember that class recordings (including video, audio, or screenshots), must not be distributed, per Academic Rule 7.

  • Attendance and Absences.
    • Illness. If you miss class because you are sick, please tell Chris and Jennifer as soon as possible. That is an excused absence.
    • Other absences. For other types of absences (e.g., conflict with travel schedule, other obligations), tell us in advance of class. We will offer you an alternative method of participation. This will enable you to earn participation credit and allow us to count you as “present” for participation purposes.
  • Video participation. A reading group engages in active discussion. In this setting, everyone’s ability to engage and join the discussion is greatly enhanced if we can all see each other. Accordingly, we ask that you use your camera unless you are having connection problems or another issue arises.
  • Virtual backgrounds. We also know that there are any number of reasons that you may not want to share your living space or background with your colleagues. We encourage you to use a virtual background if you prefer and your computer supports it. Berkeley has created a number of backgrounds from around the Law School (https://drive.google.com/drive/folders/1Mxe9tXI1sCC8NU1hPsPWqpfazBPmO-YO) and Campus (https://news.berkeley.edu/2020/04/14/miss-campus-use-the-new-berkeley-branded-zoom-backgrounds/).
  • Mute. Please keep yourself on “mute” when you are not speaking. This will help to minimize background noise for everyone.

If this set of requirements creates difficulties for you, please don't hesitate to reach out to us to discuss. We are trying to balance protecting everyone’s health and doing our part for public health while also doing our best to ensure the quality of your learning experience and to develop and maintain community. Of course, if you become ill—whether with COVID-19 or another bug floating around—please, prioritize your health! That is, as noted above, an excused absence. Just send us a note when you can, so your colleagues and we aren’t looking for you.

Tech Cred

If you are feeling at sea with cybersecurity or hacking techniques, you might explore the relevant courses on lynda.com. UCB has a site license, so you can watch as many as you'd like :) For instance:

The quality of these videos vary, but some are excellent.

To log in, you need to use this link and your calnet: https://hr.berkeley.edu/development/learning/online-learning 

Course Schedule

Week Date (Fridays) Discussion Leaders Readings / Topics
1 22-Jan JU & CH Buchanan Introduction to 61
2 29-Jan MR & JS Buchanan 62-128
3 5-Feb CF & MS Buchanan 129-186
4 12-Feb MM & GL Benjamin ix-48
5 19-Feb KV & HJ Buchanan 187-239
6 26-Feb NS & AH Benjamin 49-76 ; Buchanan 240-268
7 5-Mar SS & SC Benjamin 77-96; Buchanan 268-305
8 12-Mar AW & AK Benjamin 97-136 (Chapter 3); Buchanan 305-319 (end)
9 19-Mar RP & SH

Benjamin 137-197 (Chapters 4 and 5) (end)
Summary & Reflection (last day law students)

10 2-Apr RC & MY

You will need to use the campus VPN or library proxy to access these resources:

Robert D'A. Henderson (1997) Operation Vula against apartheid, International Journal of Intelligence and Counter Intelligence, 10:4, 418-455

Garrett RK, Edwards PN. Revolutionary Secrets: Technology’s Role in the South African Anti-Apartheid MovementSocial Science Computer Review. 2007;25(1):13-26.

 

11 9-Apr PB & ZS

Phillip Rogaway, "The Moral Character of Cryptographic Work." IACR Cryptol. ePrint Arch. 2015 (2015): 1162.

Nina Jankowicz et al., Malign Creativity: How Gender, Sex, and Lies are Weaponized Against Women Online, (Wilson Center, Jan. 2021)

Optional 14-Apr, 12-1 Chris to give a private talk to CLTC on his forthcoming quantum technology book, you are welcome to participate!
12 16-Apr MY & SH

Quantum computing & communications applications:

Quantum computing: pages 139-167

Quantum communications: pages 189-193; 200-205; 217-223

 

13 23-Apr NS & WW

EU's "Leaked" Draft on AI, pages: 1, 19-37, 47-49, 67-69

Quantum technologies scenarios & policy:

Quantum strategic surprise: 228-255

Quantum policy: 300-321

14 30-Apr PB & AK

Summary & Reflection

No memo this week

Everyone is responsible for generating reflection points

 

 

 

 

 

 

 

 

 

 

 

 

 

School-Wide Policies and Resources

  • A “credit hour” at Berkeley Law is an amount of work that reasonably approximates three to four hours of work per week for 15 weeks, including: (a) classroom time; (b) time spent preparing for class; (c) time spent studying for, and taking, final exams; (d) time spent researching, writing, and revising papers and other written work; and (e) time spent preparing for and completing any other final project, presentation, or performance. For the purposes of these calculations, 50 minutes of classroom instruction counts as one hour, and the 15 weeks includes the exam period. You can expect to spend this amount of time per unit per week on in-class and out-of-class, course-related work.
  • Students who need classroom accommodations or want to discuss implementation of their accommodations in these courses are advised to contact Kyle Valenti, Senior Director of Student Services (kvalenti@law.berkeley.edu) or Kyle Kate Dudley, Assistant Director of Student Services, Accessible Education (kylekatedudley@law.berkeley.edu) as soon as possible.
  • The Academic Honor Code governs the conduct of all students during examinations and in all other academic and pre-professional activities at Berkeley Law. We expect students to adhere to this code scrupulously. If you have any question about whether your conduct may violate the code, please contact your professor or the Dean of Students before you act. You may face severe consequences, including a failing grade in this class or removal from the program, and the Bar will receive notification of your conduct.
  • If you are in need of economic, food, or housing support, you can find help at basicneeds.berkeley.edu. You may be eligible for money to buy groceries via calfresh.berkeley.edu or our Food Assistance Program. If you are in need of food immediately, please visit our UC Berkeley Food Pantry at pantry.berkeley.edu.
  • The University of California is committed to creating and maintaining a community dedicated to the advancement, application and transmission of knowledge and creative endeavors through academic excellence, where all individuals who participate in University programs and activities can work and learn together in an atmosphere free of harassment, exploitation, or intimidation. Every member of the community should be aware that the University prohibits sexual violence and sexual harassment, retaliation, and other prohibited behavior (“Prohibited Conduct”) that violates law and/or University policy. The University will respond promptly and effectively to reports of Prohibited Conduct and will take appropriate action to prevent, to correct, and when necessary, to discipline behavior that violates this policy. For the complete UC Policy, definitions, compliance and procedures, please access the full text: http://policy.ucop.edu/doc/4000385/SVSH.

Resources: If you have further questions or concerns about reporting behavior related to sexual harassment, sexual violence, and/or protected category discrimination, please contact the Office for the Prevention of Harassment and Discrimination (OPHD) by phone 510-643-7985 or email ask_ophd@berkeley.edu.

Path to Care Center Confidential Advocates provide affirming, empowering, and confidential support for those that have experienced gendered violence, including: sexual harassment, emotional abuse, dating and intimate partner violence, sexual assault, stalking, and sexual exploitation. Advocates bring a non-judgmental, caring approach to exploring all options, rights, and resources. They can be reached by phone (510) 642-1988 or email (http://sa.berkeley.edu/dean/confidential-care-advocate).

Course Summary:

Date Details Due