THE POLICY, POLITICS AND LAW OF CYBERSECURITY POLITICAL SCIENCE AND INTERNATIONAL AFFAIRS LAW SUMMER SESSION II 2024 MONDAY – THURSDAY Three (3) Credits Professor Tracy Mitrano
COURSE DESCRPTION AND SUMMARY OF COURSE CONTENT This course explores selected topics in the policy, politics, and law of cybersecurity. Of specific interest will be a historical understanding of the development of the internet and how that history laid the foundation for insecurity of products and internet users’ experience. Using a four-factor approach: law, market, social norms, and technology, we will explore the domestic U.S. social and political development of the internet as well as the global landscape and its implications for international law. Topical areas include federal government structure for cyber, information security and risk management in the corporate environment, the National Cybersecurity Strategy, national defense generally and global internet governance.
| |||||||||||||||||||||||||||||||||||||||||||||
LEARNING OUTCOMES Define and scope cybersecurity. History of insecurity products and use of information technology resources. Identify three security threats: individuals; organized crime; national states. Review legal remedies to software and security threats. Learn about U.S. government cybersecurity organization and structure. Discuss U.S. government defensive and offensive approaches to cyber threats. Obtain a working command of zero-day exploits. Balance information security and risk management in corporate organizations. Appreciate the relationship of cybersecurity and mis/disinformation campaigns. Formulate a cybersecurity framework national security and the global context. | |||||||||||||||||||||||||||||||||||||||||||||
TEXTBOOK:
| |||||||||||||||||||||||||||||||||||||||||||||
COURSE STYLE This course is listed as a lecture class, but the professor will deploy a modified Socratic method. Students should be prepared to answer questions aloud in class from the readings and accumulative knowledge developed throughout the course. Please see COURSE REQUIREMENTS below for more information.
NOTA BENE: BOOKS! Several important books are available on this topic. We will be drawing many of our readings from them. Also, in taking a 300-level course, it is pedagogically significant for you to be able to digest intellectually full-length books. Part of the pedagogy is to learn how to skim a book for its relevant content. The other part is how to read a book more thoroughly to analyze it. Of the books we will be reading, one of them – your choice – will be the subject of a required book report.
BOOK REPORT These reviews should not be more than three (3) pages, 1-inch margins, 1.5 spacing, 12-point regular Times New Roman type. Every review should include these four points: Thesis: What is the author’s main idea? Methodology: What methodology does the author use? Analysis: Does the methodology prove/present/explain the thesis? Conclusion: How does this book fit into the themes of this course and other course materials?
EXTRA, EXTRA, READ ALL ABOUT IT! The Wall Street Journal and the Washington Post have a Monday-Friday email Newsletter on Cybersecurity. Every student should sign up for this email that comes in between 6-7am every weekday. Many classes I will be referring to it and very likely asking questions of class members about it. Your response is a good example of what will be included in the participation portion of grade (worth 15%). Be sure to read it Monday-Thursday and be prepared to speak about it in our classes. Sign up for these newsletters is free.
ASSESSMENT METHODS
ASSESSMENT CRITERIA ATTENDANCE REQUIREMENTS AND EXAMINATION POLICY Absences from class due to the observance of a religious holiday will normally be excused. Individual students who will have to miss class to observe a religious holiday should notify the instructor by the end of the Add/Drop period to make prior arrangements for making up any work that will be missed. assessments). Timeliness is critical for the book report and final paper. A point per minute of tardiness will be deducted from the grade. Extensions will not be permitted. | |||||||||||||||||||||||||||||||||||||||||||||
ACADEMIC INTEGRITY | |||||||||||||||||||||||||||||||||||||||||||||
STUDENTS WITH LEARNING OR OTHER DISABILITIES | |||||||||||||||||||||||||||||||||||||||||||||
Class 1: Introduction and Governance Don’t forget to read WP and WSJ Cyber M-F Email National Cybersecurity Strategy (https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf)
Class 2: International Law Don’t forget to read WP and WSJ Cyber M-F Email Declaration of the Rights of Cyberspace (https://www.eff.org/cyberspace-independence) Law of the Horse (https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=2147&context=journal_articles) Lessig, Code, Chapter One, and pp. 121-125 (available on the internet)
Class 3: Operations and International Law, pp. 1-14, “Does International Law Matter in Cyberspace?” (If not available, I will lecture on it.) Deibert, pp. 1-29, 112-133
Class 4: Historical Background Don’t forget to read WP and WSJ Cyber M-F Email Deibert, pp. 29-69
Class 5: Case Studies Don’t forget to read WP and WSJ Cyber M-F Email Fancy Bear, Introduction, Chapters One and Two
Class 6: Case Studies Don’t forget to read WP and WSJ Cyber M-F Email Fancy Bear, Chapters Three and Four
Class 7: Case Studies Don’t forget to read WP and WSJ Cyber M-F Email Fancy Bear, Chapters Five and Six
Class 8: Case Studies Don’t forget to read WP and WSJ Cyber M-F Email Fancy Bear, Chapters Seven and Eight
Class 9: Case Studies Don’t forget to read WP and WSJ Cyber M-F Email Fancy Bear, Chapter Nine and Ten, Conclusion and Epilogue
Class 10: Privacy and Information Security Policy Don’t forget to read WP and WSJ Cyber M-F Email Solove and Hartzog, Breached! Part I
Class 11: Privacy and Information Security Policy Don’t forget to read WP and WSJ Cyber M-F Email Solove and Hartzog, Breached Part II, pp. 65-128
Class 12: Privacy and Information Security Policy Don’t forget to read WP and WSJ Cyber M-F Email Solove and Hartzog, Breached, Part II, pp. 128-198
Class 13: Privacy and Information Security Don’t forget to read WP and WSJ Cyber M-F Email Review of Cornell University Information Technology Policy Deibert, 112-133, 195-217
Class 14: Contemporary Landscape of Cybersecurity Don’t forget to read WP and WSJ Cyber M-F Email Fifth Domain, Part I
Class 15: Contemporary Landscape of Cybersecurity: Corporations Don’t forget to read WP and WSJ Cyber M-F Email Fifth Domain, Part II
Class 16: Course Preparation for Debate Don’t forget to read WP and WSJ Cyber M-F Email Topic and Materials TBA
Class 17: Class Debate
Class 18: Contemporary Landscape of Cybersecurity: Government and Military Don’t forget to read WP and WSJ Cyber M-F Email Fifth Domain, Part III and IV
Class 19: Contemporary Landscape of Cybersecurity: International Don’t forget to read WP and WSJ Cyber M-F Email Fifth Domain, Part V and VI
Class 20: What Dreams May Come Don’t forget to read WP and WSJ Cyber M-F Email Deibert, 232-245 Declaration for the Future of the Internet (https://www.state.gov/declaration-for-the-future-of-the-internet)
Final Paper A Final Paper will be due in Moodle on the date and time of the Final Exam Schedule for this course. The Final Paper should not be more than three (5) pages, 1-inch margins, 1.5 spacing, 12-point regular Times New Roman type. It will be a synthetic rendering of what you have learned in the course based on a prompt you will be provided at the end of the semester. The best way to prepare for it is to maintain consistent attention to class, readings, lectures, etc. and take note of the connections in the materials in the course to reach a larger understanding of the politics, policy, and law of cybersecurity. |
- Instructor: Tracy Mitrano