Homeland Security / Cyber Security Autumn 2005 N.B. CONTINUALLY IN FLUX Version 24: November 22 Course Requirements: Red Team Exercise (~25%): You are a member of a 5-6 person team of engineers and policy professionals that has been hired by the Department of Homeland Security to 1) test cyber-security vulnerabilities in the US economy, and 2) recommend appropriate policy responses (if any). The team must conduct its investigation and write a 3-7 page report summarizing its findings and recommendations. White Paper (~55%): Groups of 3-5 students will provide a comprehensive report describing a particular threat, assessing possible losses in the event of an attack, assessing current vulnerabilities, presenting possible responses, and evaluating the cost-effectiveness of each. Wiki (~20%): Most class discussion in this course will be conducted on-line using a Wiki. Students will be graded on the quantity and, especially, quality of their participation. Lectures: BERKELEY ONLY: August 31 – September 21 August 31: The Logic of Terrorism Modern terrorism has been with us since the 1870s. What can history teach us about the strategy, tactics, and limits of terrorism? Steve Maurer, UC Berkeley: What Can History Teach Us? Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. September 7: Terrorism as Warfare Historically, nation states were the only entities that could credibly make war. Have new technologies and the vulnerabilities of modern life changed the rules? Steve Maurer, UC Berkeley: Can Terrorism Challenge the Nation State?Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. September 13 (Tuesday): The Al Qaida Threat Can US foreign policy discourage rogue nations from putting WMD into the hands of terrorists? Michael Nacht, UC Berkeley: Post 9/11 Diplomacy: The Bush Doctrine, Rogue Nations, and US Non-Proliferation Policy Readings: Online Bush Doctrine Memo. http://www.whitehouse.gov/nsc/nss.html September 21: Technology Policy and the War on Terror Can new technologies improve current trade-offs between civil liberties and security? How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets? Don Prosnitz, LLNL: Security and Civil Liberties: Can Technology Improve the Balance? Steve Maurer, UC Berkeley: The Bioshield Dilemma: Developing New Technologies at an Affordable Price Eric Norman, LLNL: Cargo screening technologies. Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. Steve Maurer, “When Patents Fail: Finding New Drugs for the Developing World,” May 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Maurer_When_Patents_Fail.pdf (pdf) UW AND UCSD JOIN: September 28 – December 7 September 28: Profiling the Terrorist Adversary What are the motives and capabilities of current terrorist groups? How likely are they to use WMD or attack the nation’s cyber-infrastructure? Gary Ackerman & Jeffrey Bale, Monterey Institute: Profiling the Terrorist AdversaryReadings: Jeffrey M. Bale and Gary Ackerman. Recommendations on the Development of Methodologies and Attributes for Assessing Terrorist Threats of WMD Terrorism. Center for Nonproliferation Studies, Monterey Institute of International Studies. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Bale_Ackerman_FinalReport.pdf (pdf). October 5: Computer Security Primer Comprehensive introduction to basic computer security principles, mechanisms, and approaches. Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours. Geoff Voelker, UCSD Readings: Ken Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27(8), August 1984. http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Alma Whitten and J.D. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,” Proc. USENIX Security Symposium, August 1999. http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Ross Anderson, “Why Cryptosystems Fail,” Communications of the ACM 37(11), November 1994. http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf October 12: Cyber Security In-The-Large Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle Readings: Information Technology for Counterterrorism. Computer Science & Telecommunications Board, National Research Council, 2003. http://www7.nationalacademies.org/cstb/pub_counterterrorism.html. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.Cyber Security: A Crisis of Prioritization. President’s Information Technology Advisory Committee, 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf (pdf). Washington Post articles on cyber terrorism, August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ New York Times article, “The Rise of the Digital Thugs,” August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html Time article, “The Invasion of the Chinese Cyberspies,” September 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm CIO Magazine article, “The Sky Really Is Falling,” October 2005. http://www.cio.com/archive/100105/qa_lazowska.html October 19: Nuclear, Radiological & Chemical Weapons Richard A. Muller, UC Berkeley and LBNL: The Physics of WMD J. Patrick Fitch, LLNL: Biological Weapons and Detection Technologies Readings: R. Muller, "Chain Reactions, Nuclear Reactors, and Atomic Bombs,"
View Full Document