Course Syllabus

Course Assignments:

Access to reading materials: All materials assigned for the course syllabus are available through the Tufts library system. Important note: sometimes the links break. All the items listed are either stored in files on Canvas or, more likely, available through the Tufts library system.  If you find a broken link, do let me know, but also log in to the Tufts library and access the material directly. Thanks.

Assignments:

You will have several short writing assignments and one short paper and lightning presentation. There will not be a final in this course. 

Assignment #0, due January 21 at noon, is a short introductory survey: 10 points.

Assignment #1, due January 30 at 5 pm, is a short—750-word—essay on cyber analogies: 60 points.

Assignment #2, due February 20 at 5 pm, is a policy brief of 1500 words: 150 points.

Assignment #3, due March 13 at 5 pm, is a policy analysis of 1000 words: 150 points.

Assignment #4 due April 12, a lightning talk (amount of time TBD, but under 5 minutes) and April 17, 5 pm, a 3000-word analysis discussing the cyber capabilities, vulnerabilities, and threats of a nation we have not studied in class: 300 points.

Assignment #5: due April 29,  a 1500-word  essay on cyber analogies: 130 points.

Class participation: 200 points.


Syllabus:

Important Note: While assignments and order of classes are fixed, I may add reading assignments. Be sure to check the reading the week before to see if there are any updates.

 

January 18: Introduction to the Conundrum: Why is it that thirty-five years after the first cyber exploit, cyber incidents are growing more serious? More pointedly, what are the causes for the failure to reach international agreements on securing aspects of our digital infrastructure? Today's class will provide an overview of the technical, political, and economic reasons behind the world's growing cyber conflict.

January 25: History of Attacks:  What is the nature of cyberconflict? What did "attacks" look like during the initial period (1986-2010) of cyberconflict? What were nation-state responses? Were they appropriate? In what ways did international international cyberconflict change over the 2010s? What caused these changes? What does that bode for the future?

Readings:

 

February 1: The Technical Side of Cyberweapons:  How do cyberweapons work? What role do vulnerabilities play? How is their use controlled? Is the use of vulnerabilities really controlled?  How did we end up here?

 

February 8: Laws and Norms: Why have law and norms failed to provide protection against cyber exploits and attacks? is the flaw in policy? Is the failure a result of the technology? Or something else?

 

February 15: The US Perspective: What has been the development of US cyber strategy? What is current strategy? Is this strategy likely to be successful?—and what does success actually mean?

Readings:

 

February 22: No Class (Fletcher "Monday").

 

March 1: The Russian Perspective: Both Russia and China seek to focus on "information security" rather than "cyber security." What's the distinction and why is it important? Both Russia and China entered the cyber domain significantly later than the United States, yet seem to have succeeded in "attacking" the U.S. Does that mean US policy "failed"? We'll start by looking at Russia.

Readings:

 

March 8: China's Cyber Activity: China is an emerging power. Thirty years ago, the discussion of China as a cyberpower did not seem plausible, but in ensuing decades, the nation has developed various types of capabilities and uses them for various purposes. What is China's long-term strategy and how does cyber fit into it?.

Readings:

 

March 11-12: The Cyber Security and Policy Program will be hosting our fourth annual Student Symposium in Cybersecurity Policy,Links to an external site. which is largely devoted to high-level and insightful discussions of student research papers; papers in previous years have subsequently appeared in law journals, been discussed in Lawfare, and elsewhere. You're urged to attend (12:45-4:30). Elizabeth Rindskopf-Parker, former General Counsel, CIA and former General Counsel, NSA will be giving the keynote on March 11. Sign up with joshua.anderson@tufts.edu.

 

March 15: Perspectives from other nations: What do North Korea, Iran, and Israel hope to accomplish in cyber? What level of capabilities do they need to do so?

Readings:

 

March 22: Spring break: No class.

 

March 29: Attribution and deterrence: Can deterrence theory apply within the cyber domain? What is the "attribution problem"? Is it a serious problem, and if so, in what ways?

IMPORTANT ANNOUNCEMENT: Class today will begin at 3:30.

Readings:

 

April 5: The role of non-state actors: What type of roles do non-state actors play? How does one determine if these are proxies or independent actors? What impact do they have on state actions in cyber? How capable are states of controlling such adversaries?

Readings:

 

April 12: First half of class: Cyber Conflict "Off the Battlefield": With its peculiar mix of private and public sector control, international cyber conflict plays out in multiple domains, including heavily in the private sector. How important to national security are the conflicts over Internet governance, Internet standards, and privacy?

Second half of class: Lightning Talks

Readings:

 

April 19: The Role of Policy and Ethics in Cyber Conflict: Cyber is a mixed battlefield. Stuxnet leaked out of Natanz. While it didn't destroy equipment elsewhere, its capabilities were duly noted—and the cyber arms race escalated. NotPetya destroyed infrastructure not just in Ukraine but around the world. A civil-sector company, Solar Wind, was used as a vector to exfiltrate and perhaps prepare a battlefield against the U.S. What are a nation's obligations as it develops cyber weapons and attacks? Is a "Digital Geneva Convention" possible? 

Second half of class: Lightning Talks 

Readings:

 

April 26:  Future Technologies—and Other Disruptions from Cyber

Readings:

 

Course Summary:

Date Details Due