Course Syllabus

Primary Classroom is https://tufts.zoom.us/j/99094369509?pwd=LzNYNEgyZUZrWnVlakd3M1QrUVk3UT09

Weekly DHP D291 graduate seminar (TH 7:00-8:15 pm)  classroom is https://tufts.zoom.us/j/96635855421?pwd=R3UzWU01ZmtXUEpQVnRZTCtPTzE0UT09

(both meeting rooms are limited to tufts.edu users). 

DHP291 Graduate Seminar Syllabus.docx

COMP 12/DHP D291: Computer Science for Future Presidents

Important Message re the Course Schedule

This course is a Computer Science course and follows the AS&E course schedule. The first day of class is September 8, there is no class on November 10 (AS&E Wednesday), and the last day of class is December 10.  There is also no class on October 27.

 

Important message regarding enrollment:

This course is offered as both an undergraduate course (COMP 055-01) and a graduate course (DHP D291). Students at the Fletcher School should enroll in DHP D291, which will have an additional class each Thursday; any other student seeking to enroll in the graduate version will need the permission of the instructor.

Assignments:

Note that this course is offered as a mixed undergrad/graduate course.

All students are required to do Assignment #0, a no-credit assignment, due 5 pm EDT on September 10.

For students taking COMP 12: there will be weekly assignments; some are labs and some are short briefing papers—and some are a mix of both. There is also a brief presentation with a two-page paper and a final. The presentation will be a 5-minute presentation of a new cyber technology, what its purpose and value are, and will be done during the last two weeks of term. The presentation will be done for Professor Landau (that is, not in class).

Grading is as follows:

Labs: 30%

Briefing papers: 15%

Brief presentation and 2-page briefing paper: 15%

Final: 40%

For students taking DHP D291: there will be weekly assignments; some are labs and some are short briefing papers—and some are a mix of both. There is also a presentation and short paper, and a final. The presentation will be a 15-minute presentation on a new technology and what its privacy and security risks are. The presentation will be done during the last two weeks of the Thursday afternoon class.

Grading is as follows:

Labs: 30%

Briefing papers: 20%

Presentation and 5-page briefing paper: 20%

Final: 30%

 

Submission of assignments: Except for the presentations, all work should be submitted through Canvas.  All students should submit a topic by November 10 (students taking DHP D291 will need to avoid duplication of topics). The presentations, just for Professor Landau for COMP 12 students and in the Thursday afternoon class for DHP D291 students, will occur November 30-December 11.

Course Goals

Students will learn about the fundamental underpinnings of the Internet, how to learn about new cyber technologies, and how to discuss the salient points of these new technologies to those without a technical background.

Learning Objectives:

Students will develop:

  • a basic understanding of the underpinnings of cyber technologies of current policy interest;
  • some hands-on experience with these technologies; 
  • skills in writing briefing documents on new technologies;
  • skills in presenting the salient features of new technologies.

 

Course Syllabus

Any course titled "Computer Science for Future Presidents" is a course in progress. Reading assignments and other things are subject to change; check the syllabus frequently.

 

September 8-17: Communications Networks: How the Phone Network and the Internet are the Same—and Different          

September 8: Introduction and How the Internet Came into Being

Assignment #0: Due 5 pm September 10.

 

September 10:  How is SMS different from messaging? The different architecture of circuit-switched and packet-switched networks. As time permits, the architecture of mobile communications.

Readings:

Graduate Seminar: 

  • Week 1: Organizing for Cyber Policy Part I—International Organizations (NATO, UN, EU)
    • Learning Objectives:
      • Seminar introduction and expectations - what you bring to the discussion and what you hope to get out of it
      • Understand the role that international organizations play in defining, deterring, and managing cyber operations.
    • Required Readings: NONE
    • Recommended Readings:
      • “The end of the road for the UN GGE process: The future regulation of cyberspace” [Article, Journal of Cybersecurity. Author argues that failure of GGE will lead to shift towards regional agreements between “like-minded states”.]
        By: Anders Henriksen, January 22, 2019
        https://academic.oup.com/cybersecurity/article/5/1/tyy009/5298865
      • NATO - Cyber Defense Website [NATO cyber defense starting page, which gives very clear overview of NATO’s principal’s cyber activities/ its role in the field, partnerships, Evolution]
        By: NATO, March 17, 2020
        https://www.nato.int/cps/en/natohq/topics_78170.htm
      • European Commission - Cyber Security Website [Landing page for Commission on cybersecurity issues. Good overview of all different elements of EU cyber policy, as well as EU’s international cooperation in the field. Useful because this site makes clear that EU - in contrast to NATO - thinks about cybersecurity much more in cybercrime/Digital Single Market context]
        By: European Commission, May 28, 2020
        https://ec.europa.eu/digital-single-market/en/cyber-security
      • Cybersecurity Strategy of the European Union  [EU Cybersecurity Security Homepage w/ link to strategy. PDF to be uploaded to Canvas.]

By: European Union, February 7, 2013

https://www.cyberwiser.eu/content/eu-cyber-security-strategy-open-safe-and-secure-cyberspace

 

September 15: Internet Architecture Part I: TCP/IP and DNS

Readings:

Assignment#1: Due 11 pm EDT September 23.      

 

September 17: Internet Architecture Part II: Routing, BGP; Wireshark demo.

Readings:

 Graduate Seminar:

 

September 22: Internet Architecture Part III: How does an email get to its destination? How does that change of architecture affect legal protections of the confidentiality of voice communications?

Readings:

Assignment #2:  Due 11 pm EDT September 30.

 

September 24-October 8: Understanding the Web and Cloud Computing

September 24: How the Web Works Part I: Architectures: Peer-to-Peer vs. Client-Server; What is a url? How is a web page delivered?

Readings:

Graduate Seminar:

 

September 29: Cookies and Active Content

Readings:

Assignment #3: Due 11pm EDT October 7 .

 

October 1: Active Content; Attacks via the Internet

Readings:

Graduate Seminar:

  • Week 4: Cyber Strategy and Policy Basics Part II—International Strategies/Policies (Russia, China, Iran)
    • Learning Objectives:
      • Compare other national cyber strategies and policies to US cyber strategy.
      • Pick one nation as a case study and be able to provide key points in seminar discussion.
    • Required Readings (Only read the pieces for your chosen country):
      • Russia: (Read 4 pgs., Skim 24 pgs.)
        • “Russia Wants a Deal with the United States on Cyber Issues. Why Does Washington Keep Saying No?” [Article, Council on Foreign Relations.]
          By: Net Politics, August 27, 2018

Note — Read (4 pgs.)

https://www.cfr.org/blog/russia-wants-deal-united-states-cyber-issues-why-does-washington-keep-saying-no

        • Russia’s approach to cyber: the best defence is a good offence [Chaillot Papers, EU ISS.]

By: EU Institute for Security Studies, October 2018
Note – Skim through chapter 1 (~24 pgs.); Recommend skimming other chapters, as desired.
https://www.iss.europa.eu/sites/default/files/EUISSFiles/CP_148.pdf

      • China: (Read 13 pgs.)
        • “What Are China’s Cyber Capabilities and Intentions?” [Article, International Peace Institute. Author is a visiting scholar in the Cyber Policy Initiative at the Carnegie Endowment for International Peace and a retired colonel from the Chinese People’s Liberation Army.]
          By: Lyu Jinghua, IPI, March 22, 2019

Note — Read (5 pgs.)
https://theglobalobservatory.org/2019/03/what-are-chinas-cyber-capabilities-intentions/

        • China’s National Cyber Security Strategy 2016 [Link to Blog with a translation of China strategy executive summary.]

Edited By: Rogier Creemers, December 27, 2016

Note: Read blog post (~8 pgs.)
https://chinacopyrightandmedia.wordpress.com/2016/12/27/national-cyberspace-security-strategy/

Recommended Readings: NONE.

 

October 6: Cloud and Internet of Things (IoT): What is the cloud? Different types of services (Saas, PaaS, IaaS), Computing on the cloud, IoT

Readings:

 Assignment #4: Due 11 pm EDT October 14.

 

October 8: Open Source: Closed source software: free software and the Free Software Foundation; open source software and licenses; GitHub and GitLab

Readings:

Graduate Seminar:

  • Week 5: International Law and Politics of Cyber (Tallinn Manual)
    • Learning Objectives:
      • Understand the important role the law plays in the formulation of cyber policy.
      • Understand how international law shapes and constrains cyber operations.
    • Required Readings: (Read 7 pgs., Skim 6 pgs., Review 25 slides)
      • Touring the World of Cybersecurity Law [Power Point briefing with notes]
        Published by RSA Conference, February 2016

Note — Review slides 1-25
https://docplayer.net/17880622-Touring-the-world-of-cybersecurity-law.html

      • “The Application of International Law to Cyberspace: Sovereignty and Non-Intervention”
        By: Harriet Moynihan, December 13, 2019

Note — Read (7 pgs.)
https://www.justsecurity.org/67723/the-application-of-international-law-to-cyberspace-sovereignty-and-non-intervention/

      • Tallinn Manual 2.0 [One-page summary by the NATO Cooperative Cyber Defence Centre of Excellence]

By: NATO CCDCOE

Note — Skim (1 pg.)

https://ccdcoe.org/research/tallinn-manual/

      • “The Tallinn Manual 2.0: Highlights and Insights” [Article, Georgetown Journal of International Law.]

By: Eric Talbot Jensen, 2017

Note — Skim only pp. 735-740 (Abstract, Introduction, Process, and first para from The Manual)

https://www.law.georgetown.edu/international-law-journal/wp-content/uploads/sites/21/2018/05/48-3-The-Tallinn-Manual-2.0.pdf

 

October 13-20: Cryptography: What it is, how it works, and what services it provides.

October 13: Cryptography Part 1: history and uses of cryptography, why key management is essential, public-key cryptography, symmetric-key cryptography.

Readings:

Assignment #5: Due 11 pm EDT  October 21.

 

October 15: Cryptography Part II: Confidentiality, Integrity, Availability (CIA) model of security; cryptography's applications to hash functions and TLS; forward secrecy.

Readings:

Graduate Seminar:

  • Week 6: Defending Digital Democracy Part I—Russia vs. Ukraine (Proving ground for Russian TTPs)
    • Learning Objectives:
      • Recognize Russia’s long history of election interference in Europe and the former Soviet Union states (Ukraine, in particular)
      • Understand Russia’s strategic intent to use cyber operations in European elections
    • Required Readings: (Read 18 pgs., Skim 15 pgs.)
      • “Ukraine: Cyberwar’s Hottest Front” [Article, The Wall Street Journal. PDF linked here]
        By: Margaret Coker and Paul Sonne, November 9, 2015

Note — Read (5 pgs.)

https://www.wsj.com/articles/ukraine-cyberwars-hottest-front-1447121671

      • Handbook of Russian Information Warfare [Study completed for the NATO Defense College]

By: Keir Giles, November 2016

Note — Read Sections 1 and 2 (pp. 3 - 13); Skim Section 3 (pp. 16 - 30).

https://krypt3ia.files.wordpress.com/2016/12/fm_9.pdf

    • Recommended Readings:
      • “Brandishing the Cybered Bear: Information War and the Russia-Ukraine Conflict” [Journal Article, Military Cyber Affairs; assesses the Russia-Ukraine conflict from a holistic, strategic perspective with implications for U.S. cyber policy]

By: Azhar Unwala and Shaheen Ghori, 2015

https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1001&context=mca

 

October 20: Cryptography Part III: DNSSEC, digital time stamping

Readings:

Assignment #6: Due 11 pm EDT October 28 (DHP D291 students only).

 

October 22:  Digital time stamping, blockchain

Readings:

Graduate Seminar:

  • Week 7: Defending Digital Democracy Part II— S. Election Interference and Information Ops (Set up mock debate)
    • Learning Objectives:
      • Describe how Russia interfered in the U.S. election process in 2016
      • Understand the debate and proposed policy changes following the 2016 U.S. election
      • Develop and assess options for defending and responding to attacks on election infrastructure
    • Required Readings: (Read 27 pgs., Skim 7 pgs.)
      • “The Perfect Weapon: How Russian Cyberpower Invaded the U.S.” [Article, The New York Times. PDF linked here]

By: Eric Lipton, David E. Sanger and Scott Shane, December 13, 2016

Note — Read (26 pgs. It sounds long, but there’s a lot of pictures and it reads like a crime novel.)

https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html

      • “Assessing Russian Activities and Intentional in Recent US Elections” [Intelligence Community Assessment of the 2016 Russian election interference.]

By: Intelligence Community, January 6, 2017

Note — Read ‘Key Judgements’ (p. ii); Skim the rest as desired

https://www.dni.gov/files/documents/ICA_2017_01.pdf

      • Russian Targeting of Election Infrastructure During the 2016 Election: Summary of Initial Findings and Recommendations [PDF linked here]

By: Senate Select Committee on Intelligence, May 8, 2018

Note — Skim (6 pgs.)

      • Recommended Readings:
        • “Everything We Know About Russia’s Election-Hacking Playbook” [Article, WIRED.]

By: Andy Greenberg, June 9, 2017

https://www.wired.com/story/russia-election-hacking-playbook/

 

October 27-November 17: Introduction to Privacy, Security, and Malware

 

October 27: No class.

 

October 29: A quick description of attacks

Readings:

Assignment #7: Due 11 pm EST November 4.

Graduate Seminar:

  • Week 8: The Space Between Peace and War—Policy Implications of Gray Zone Conflicts
    • Learning Objectives:
      • Understand how “gray zone” conflicts challenge traditional notions of offense, defense and deterrence
      • Explain the difference between the 2015 and the 2018 U.S. National Security Strategies
      • Describe “persistent engagement” and “defending forward” as new strategic concepts in the cyber domain
    • Required Readings: (Read 12 pgs., Skim 16 pgs.)
      • “The Gray Zone” [Article, Special Warfare. PDF linked here]

By: Philip Kapusta, December 2015

Note — Read (8 pgs.)

      • The DoD Cyber Strategy [Was recommended reading in Week 3.]
        By: The Department of Defense, September 2018
        Note – Skim, but note use of “deterrence”, “persistence”, and “competition” (10 pgs.)
        https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF
      • “A Cyber Force for Persistent Operations” [Article, Joint Forces Quarterly; Author is the Commander of U.S. Cyber Command and Director of the National Security Agency]

By: GEN Paul Nakasone, January 22, 2019

Note — Read pp. 10-14, Skim pp. 4-10

https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-92/jfq-92.pdf

    • Recommended Readings:
      • National Security Strategy [Obama administration’s NSS.]

By: The White House, February 2015

Note — Skim for language related to cyber vis-à-vis national security

https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf

 

November 3: No class—go and vote (if you're eligible)!

Readings: No readings, but get ahead for Thursday's class

 

Assignment #8: due 11 pm EST November 11.

 

November 5: Privacy and Security Part II: Malware (spam and phishing, viruses, worms, Trojan horses, backdoors, ransomware, zero days) and Technical Protections for Security: Physical security, Hardware Security, OS Security, Network Security, Web Security

Readings:

Graduate Seminar:

  • Week 9: Crypto Policy Implications (Susan guest lectures)
    • Learning Objectives:
      • Understand the conflict between national security, law enforcement, public safety and privacy needs
    • Required Readings: (Read 24 pgs.)
      • “Moving the Encryption Policy Conversation Forward” [Paper, Carnegie Endowment for International Peace, Cyber Policy Initiative; Prof Landau is a member of the Encryption Working Group]

By: The Encryption Working Group, September 10, 2019

Note — Read (24 pgs.)

https://carnegieendowment.org/2019/09/10/moving-encryption-policy-conversation-forward-pub-79573

 

November 10:  No Class (AS&E Tuesday)

Assignment #9: due 11 pm EST November 18.

 

November 12:  Privacy and Security Part III: Privacy and security are the same and different; threat modeling

Readings:

  • Michael Howard and James Whitaker, Demystifying the Threat-Model Process, IEEE Security and Privacy, Vol. 3, No. 5 (September/October 2005). This is somewhat technical; please read at least the first page—and better yet if you can read the whole piece.

Graduate Seminar:

  • Week 10: Policy Implications of 5G technology
    • Learning Objectives:
      • Understand the national security and policy implications of 5G technology
      • Describe the concerns with Huawei from a national security perspective
      • Discuss challenges and opportunities associated with 5G technology
    • Required Readings: (Read 8 pgs., Skim 40 pgs)
      • “What Is 5G? Here’s What You Need to Know About the New Cellular Network” [Article, The New York Times. PDF linked here.]

By: Don Clark, December 31, 2018

Note — Read (4 pgs.)

https://www.nytimes.com/2018/12/31/technology/personaltech/5g-what-you-need-to-know.html

      • “Huawei ban: Full timeline as it reveals Mate 30 lineup in Munich” [Article, Cnet.]

By: Sean Keane, September 30, 2019

Note — Skim (This is a 30 - pg. bulletized list of key dates in the Huawei saga over the last 2.5 years)

https://www.cnet.com/news/huawei-ban-full-timeline-mate-30-pro-security-threat-china/

      • National Strategy to Secure 5G of the United States of America [Trump administration’s new 5G strategy.]

By: The White House, March 2020

Note — Skim (11 pgs.)

https://www.whitehouse.gov/wp-content/uploads/2020/03/National-Strategy-5G-Final.pdf

      • “UK bans Huawei from it 5G network in rapid about-face” [CNN Business News article]

By: Hadas Gold, July 14, 2020

Note — Read (4 pgs.)

https://www.cnn.com/2020/07/14/tech/huawei-uk-ban/index.html

    • Recommended Readings:
      • “Keeping Huawei Hardware Out of the U.S. Is Not Enough to Secure 5G” [Lawfare Blog]

By: Tom Wheeler and Robert D. Williams, February 20, 2019

https://www.lawfareblog.com/keeping-huawei-hardware-out-us-not-enough-secure-5g

      • “5G Networks Must Be Secure and Reliable” [Lawfare Blog

By: Jim Baker, March 13, 2019

https://www.lawfareblog.com/5g-networks-must-be-secure-and-reliable 

 

November 17-24: Handling Security and Privacy in Different Ways: Attribution, Identity Management, and Contact Tracing

November 17:  Attribution

Readings:

November 19: Identity Management

Readings:

Assignment #10: due 11 pm EST November 25.

Graduate Seminar: 

  • Week 11: Student Presentations

 

November 24: Contact Tracing

Readings:

November 26:  No Class (Thanksgiving)

 

December 1 – December 3: Artificial Intelligence, Machine Learning, and Deep Learning: what’s it all about?

December 1:  What is AI? What is ML?

Readings:

Briefing Paper #2: Due December 2. Please submit via Canvas 

December 3: What is ML? — plus a discussion on ethics

Readings:

Graduate Seminar:

  • Week 12: Student Presentations

 

December 8: Quantum Computing

December 8: Quantum Computing

Readings:

 

December 10: In conclusion

Graduate Seminar:

  • Week 13: Policy Implications of AI and ML
    • Learning Objectives:
      • Assess the opportunities and challenges of artificial intelligence and machine learning
      • Describe the dangers of AI and ML during wartime
      • Explain the issues of AI and ML from a national security perspective
    • Required Readings: (Read 7 pgs., Skim 26 pgs.)
      • Artificial Intelligence and National Security [CRS paper on potential issues for Congress related to military AI development; domestic perspective and summary of Chinese and Russian AI advancements.]

By: Congressional Research Service, November 21, 2019

Note — Read Summary, Introduction, and AI Terms and Background (4 pgs.); Skim the rest as desired

https://fas.org/sgp/crs/natsec/R45178.pdf

      • “AI for cybersecurity is a hot new thing—and a dangerous gamble” [Article, MIT Technology Review. PDF linked here.]

By: Martin Giles, August 11, 2018

Note — Read (3 pgs.)

https://www.technologyreview.com/2018/08/11/141087/ai-for-cybersecurity-is-a-hot-new-thing-and-a-dangerous-gamble/

      • “Artificial Intelligence: A Revolution in Strategic Affairs?” [Article, Survival. PDF linked here.]

By: Kenneth Payne, January 8, 2019

Note — Skim (26 pgs.)

https://www.asser.nl/about-the-institute/asser-today/lecture-by-dr-kenneth-payne-on-artificial-intelligence-in-strategic-affairs/           

    • Recommended Readings:
      • “National Security Commission on Artificial Intelligence Requests New Ideas; RAND Responds” [Article, RAND. Great source of links to 10 additional AI articles on topics including AI for military deception, managing security threats to machine learning, and AI for peace.]

By: Thomas Kostigen, February 21, 2020

https://www.rand.org/blog/2020/02/national-security-commission-on-artificial-intelligence.html

 

 

Course Summary:

Date Details Due