Difference between revisions of "Reading Schedule"

From CyberSecurity
Jump to: navigation, search
m (October 26: Biological Weapons; Remediation and Recovery Technologies)
(October 19: Nuclear, Radiological & Chemical Weapons)
 
(3 intermediate revisions by one other user not shown)
Line 4: Line 4:
  
 
Modern terrorism has been with us since the 1870s.  What can history teach us about the strategy, tactics, and limits of terrorism?
 
Modern terrorism has been with us since the 1870s.  What can history teach us about the strategy, tactics, and limits of terrorism?
<i>Steve Maurer, UC Berkeley:  What Can History Teach Us?</i>
+
* Steve Maurer, UC Berkeley:  <i>What Can History Teach Us?</i>
  
 
<B>Readings:</b>
 
<B>Readings:</b>
Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com).  Please read this text in three segments, concluding 9/21.
+
* Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com).  Please read this text in three segments, concluding 9/21.
  
  
Line 13: Line 13:
  
 
Historically, nation states were the only entities that could credibly make war.  Have new technologies and the vulnerabilities of modern life changed the rules?
 
Historically, nation states were the only entities that could credibly make war.  Have new technologies and the vulnerabilities of modern life changed the rules?
<i>Steve Maurer, UC Berkeley:  Can Terrorism Challenge the Nation State?</i>
+
* <i>Steve Maurer, UC Berkeley:  Can Terrorism Challenge the Nation State?</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com).  Please read this text in three segments, concluding 9/21.
+
* Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com).  Please read this text in three segments, concluding 9/21.
  
  
Line 22: Line 22:
  
 
Can US foreign policy discourage rogue nations from putting WMD into the hands of terrorists?
 
Can US foreign policy discourage rogue nations from putting WMD into the hands of terrorists?
<i>Michael Nacht, UC Berkeley:  Post 9/11 Diplomacy:  The Bush Doctrine, Rogue Nations, and US Non-Proliferation Policy</i>
+
* Michael Nacht, UC Berkeley:  <i>Post 9/11 Diplomacy:  The Bush Doctrine, Rogue Nations, and US Non-Proliferation Policy</i>
  
 
<B>Readings:</b>
 
<B>Readings:</b>
Line 32: Line 32:
 
Can new technologies improve current trade-offs between civil liberties and security?  How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets?
 
Can new technologies improve current trade-offs between civil liberties and security?  How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets?
  
<i>Don Prosnitz, LLNL:  Security and Civil Liberties:  Can Technology Improve the Balance?
+
* Don Prosnitz, LLNL:  Security and Civil Liberties:  <i>Can Technology Improve the Balance?</i>
Steve Maurer, UC Berkeley:  The Bioshield Dilemma: Developing New Technologies at an Affordable Price
+
* Steve Maurer, UC Berkeley:  <i>The Bioshield Dilemma: Developing New Technologies at an Affordable Price</i>
Eric Norman, LLNL:  Cargo screening technologies.</i>
+
* Eric Norman, LLNL:  <i>Cargo screening technologies</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 45: Line 45:
 
What are the motives and capabilities of current terrorist groups?  How likely are they to use WMD or attack the nation’s cyber-infrastructure?
 
What are the motives and capabilities of current terrorist groups?  How likely are they to use WMD or attack the nation’s cyber-infrastructure?
  
<i>Gary Ackerman & Jeffrey Bale, Monterey Institute:  Profiling the Terrorist Adversary</i>
+
* Gary Ackerman & Jeffrey Bale, Monterey Institute:  <i>Profiling the Terrorist Adversary</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 54: Line 54:
  
 
Comprehensive introduction to basic computer security principles, mechanisms, and approaches.  Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours.
 
Comprehensive introduction to basic computer security principles, mechanisms, and approaches.  Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours.
<i>Geoff Voelker, UCSD</i>
+
 
 +
* <i>Geoff Voelker, UCSD</i>
  
 
<b>Readings: </b>
 
<b>Readings: </b>
Line 64: Line 65:
 
=== October 12:  Cyber Security In-The-Large ===
 
=== October 12:  Cyber Security In-The-Large ===
  
Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure
+
Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure.
  
<i>Ed Lazowska, UW:  Assessing Cyber-Vulnerabilities:  PITAC and Beyond
+
* Ed Lazowska, UW:  <i>Assessing Cyber-Vulnerabilities:  PITAC and Beyond</i>
Phil Venables, CISO, Goldman Sachs:  The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky
+
* Phil Venables, CISO, Goldman Sachs:  <i>The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky</i>
Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle</i>
+
* Kirk Bailey, ex-CISO, City of Seattle: <I>Cyber-attacks and cyber-defense in the City of Seattle</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 75: Line 76:
 
* [http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ Washington Post] Washington Post articles on cyber terrorism, August 2005.   
 
* [http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ Washington Post] Washington Post articles on cyber terrorism, August 2005.   
 
* New York Times article,  [http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html “The Rise of the Digital Thugs,”] August 2005.  
 
* New York Times article,  [http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html “The Rise of the Digital Thugs,”] August 2005.  
* Time article, [http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm “The Invasion of the Chinese Cyberspies,”] September 2005.
+
* Time article, [http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm “The Invasion of the Chinese Cyberspies,”] September 2005.
 
 
  
 
=== October 19:  Nuclear, Radiological & Chemical Weapons ===
 
=== October 19:  Nuclear, Radiological & Chemical Weapons ===
Line 82: Line 82:
 
The physics and technology of WMD.
 
The physics and technology of WMD.
  
<i>Richard A. Muller, UC Berkeley and LBNL:  The Physics of WMD
+
* Richard A. Muller, UC Berkeley and LBNL:  <i>The Physics of WMD</i>
Christine Hartmann-Siantar, LLNL:  Radiation and Human Health
+
* Christine Hartmann-Siantar, LLNL:  <i>Radiation and Human Health</i>
Steve Maurer, UC Berkeley:  Nuclear Fear</i>
+
* Steve Maurer, UC Berkeley:  <i>Nuclear Fear</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
* Online papers
 
  
 +
R. Muller, "Chain Reactions, Nuclear Reactors, and Atomic Bombs,"
 +
http://muller.lbl.gov/teaching/Physics10/chapters_Jan_2005/Chapter05.pdf
 +
 +
R. Muller, "The Dirty Bomb Distraction,"
 +
http://muller.lbl.gov/TRessays/29-Dirty_Bombs.htm
 +
 +
R. Muller, "Crop Duster Terrorism,"
 +
http://muller.lbl.gov/TRessays/02_Cropduster_Terrorism.htm
 +
 +
R. Muller, "Al Qaeda's Anthrax,
 +
http://muller.lbl.gov/TRessays/03_Al_Qaeda_Anthrax.htm
  
 
=== October 26:  Biological Weapons; Remediation and Recovery Technologies ===
 
=== October 26:  Biological Weapons; Remediation and Recovery Technologies ===
Line 94: Line 104:
 
The biological weapons threat: today and tomorrow.  Recovering from WMD attacks.
 
The biological weapons threat: today and tomorrow.  Recovering from WMD attacks.
  
* J. Patrick Fitch, LLNL:  Biological Weapons and Detection Technologies
+
* J. Patrick Fitch, LLNL:  <I>Biological Weapons and Detection Technologies</I>
* J. Keasling, UC Berkeley:  Synthetic Biology and Tomorrow’s Bioweapons
+
* J. Keasling, UC Berkeley:  <I>Synthetic Biology and Tomorrow’s Bioweapons</I>
* Tina Carlson, LLNL: Remediation
+
* Tina Carlson, <I>LLNL: Remediation</I>
* Christine Hartmann-Siantar, LLNL:  Recovery Technologies
+
* Christine Hartmann-Siantar, LLNL:  <I>Recovery Technologies</I>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 105: Line 115:
 
Technology and Policy Options for Early Detection of WMD.
 
Technology and Policy Options for Early Detection of WMD.
  
<i>Michael Nacht & B. Perez, UC Berkeley:  Port Security. </i>
+
* Michael Nacht & B. Perez, UC Berkeley:  <i>Port Security. </i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 115: Line 125:
 
Internet crime.  Denial of service, extortion, phishing, botnet reselling, spam, spyware, etc.
 
Internet crime.  Denial of service, extortion, phishing, botnet reselling, spam, spyware, etc.
  
<i>Dave Aucsmith, Senior Director, Institute for Advanced Technology in Governments, Microsoft Corp.
+
* Dave Aucsmith, Senior Director, Institute for Advanced Technology in Governments, Microsoft Corp.
Steve Gribble, UW:  Spyware </i>
+
* Steve Gribble, UW:  <i>Spyware </i>
  
 
Readings:
 
Readings:
Line 129: Line 139:
 
What do we know about the Internet’s vulnerabilities?  History of past exploits, worms, viruses.  What could a determined, well-funded adversary accomplish?
 
What do we know about the Internet’s vulnerabilities?  History of past exploits, worms, viruses.  What could a determined, well-funded adversary accomplish?
  
* Hal Varian, Berkeley, incentive-based strategies for enhancing cyber security
+
* Hal Varian, Berkeley: <i> incentive-based strategies for enhancing cyber security</i>
* Stefan Savage, UCSD, Internet outbreaks: Epidemiology and Defenses
+
* Stefan Savage, UCSD: <i>Internet outbreaks: Epidemiology and Defenses</i>
* Vern Paxson, ICIR and LBNL, Network intrusion detection systems
+
* Vern Paxson, ICIR and LBNL: <i>Network intrusion detection systems</i>
  
 
Readings:  
 
Readings:  
Line 143: Line 153:
 
Host-based, network-based, software engineering with security goals
 
Host-based, network-based, software engineering with security goals
  
* Mark Pustilnik, Microsoft, Eliminating security vulnerabilities from commercial software.
+
* Mark Pustilnik, Microsoft, <i>Eliminating security vulnerabilities from commercial software.</i>
* Josh Lackey, Microsoft (ex-IBM), Ethical hacking: Using white-hat cyber-attacks to improve security.
+
* Josh Lackey, Microsoft (ex-IBM), <i>Ethical hacking: Using white-hat cyber-attacks to improve security.</i>
* Eric Rescorla, consultant, does it make sense to discover/publicize vulnerabilities?
+
* Eric Rescorla, consultant, <i>Does it make sense to discover/publicize vulnerabilities?</i>
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 156: Line 166:
 
How can IT improve US intelligence capabilities?
 
How can IT improve US intelligence capabilities?
  
(TBD)
+
* (TBD)
 
+
* Steve Maurer:  <i>Databases and Intelligence</i>
Steve Maurer:  Databases and Intelligence
+
* S. Scotchmer:  <i>Do Terrorism Futures Make Sense?</i>
 
 
S. Scotchmer:  Do Terrorism Futures Make Sense?
 
  
 
<b>Readings:</b>
 
<b>Readings:</b>
Line 168: Line 176:
 
What constitutes evidence for computer exploitation crimes, how is it gathered, etc.
 
What constitutes evidence for computer exploitation crimes, how is it gathered, etc.
  
Possible:  Butler Lampson
+
* Possible:  Butler Lampson
 
+
* Possible:  FBI
Possible:  FBI
 
  
 
Readings:
 
Readings:

Latest revision as of 03:26, 17 October 2005

Reading schedule

August 31: The Logic of Terrorism

Modern terrorism has been with us since the 1870s. What can history teach us about the strategy, tactics, and limits of terrorism?

  • Steve Maurer, UC Berkeley: What Can History Teach Us?

Readings:

  • Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21.


September 7: Terrorism as Warfare

Historically, nation states were the only entities that could credibly make war. Have new technologies and the vulnerabilities of modern life changed the rules?

  • Steve Maurer, UC Berkeley: Can Terrorism Challenge the Nation State?

Readings:

  • Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21.


September 13 (Tuesday): The Al Qaida Threat

Can US foreign policy discourage rogue nations from putting WMD into the hands of terrorists?

  • Michael Nacht, UC Berkeley: Post 9/11 Diplomacy: The Bush Doctrine, Rogue Nations, and US Non-Proliferation Policy

Readings:


September 21: Technology Policy and the War on Terror

Can new technologies improve current trade-offs between civil liberties and security? How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets?

  • Don Prosnitz, LLNL: Security and Civil Liberties: Can Technology Improve the Balance?
  • Steve Maurer, UC Berkeley: The Bioshield Dilemma: Developing New Technologies at an Affordable Price
  • Eric Norman, LLNL: Cargo screening technologies

Readings:


September 28: Profiling the Terrorist Adversary

What are the motives and capabilities of current terrorist groups? How likely are they to use WMD or attack the nation’s cyber-infrastructure?

  • Gary Ackerman & Jeffrey Bale, Monterey Institute: Profiling the Terrorist Adversary

Readings:


October 5: Computer Security Primer

Comprehensive introduction to basic computer security principles, mechanisms, and approaches. Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours.

  • Geoff Voelker, UCSD

Readings:


October 12: Cyber Security In-The-Large

Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure.

  • Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond
  • Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky
  • Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle

Readings:

October 19: Nuclear, Radiological & Chemical Weapons

The physics and technology of WMD.

  • Richard A. Muller, UC Berkeley and LBNL: The Physics of WMD
  • Christine Hartmann-Siantar, LLNL: Radiation and Human Health
  • Steve Maurer, UC Berkeley: Nuclear Fear

Readings:

R. Muller, "Chain Reactions, Nuclear Reactors, and Atomic Bombs," http://muller.lbl.gov/teaching/Physics10/chapters_Jan_2005/Chapter05.pdf

R. Muller, "The Dirty Bomb Distraction," http://muller.lbl.gov/TRessays/29-Dirty_Bombs.htm

R. Muller, "Crop Duster Terrorism," http://muller.lbl.gov/TRessays/02_Cropduster_Terrorism.htm

R. Muller, "Al Qaeda's Anthrax, http://muller.lbl.gov/TRessays/03_Al_Qaeda_Anthrax.htm

October 26: Biological Weapons; Remediation and Recovery Technologies

The biological weapons threat: today and tomorrow. Recovering from WMD attacks.

  • J. Patrick Fitch, LLNL: Biological Weapons and Detection Technologies
  • J. Keasling, UC Berkeley: Synthetic Biology and Tomorrow’s Bioweapons
  • Tina Carlson, LLNL: Remediation
  • Christine Hartmann-Siantar, LLNL: Recovery Technologies

Readings:

November 2: WMD Defenses

Technology and Policy Options for Early Detection of WMD.

  • Michael Nacht & B. Perez, UC Berkeley: Port Security.

Readings:

  • Online Paper


November 9: Large-Scale Internet Criminal Activity

Internet crime. Denial of service, extortion, phishing, botnet reselling, spam, spyware, etc.

  • Dave Aucsmith, Senior Director, Institute for Advanced Technology in Governments, Microsoft Corp.
  • Steve Gribble, UW: Spyware

Readings:


November 16: Incentives to Exploit and Protect

What do we know about the Internet’s vulnerabilities? History of past exploits, worms, viruses. What could a determined, well-funded adversary accomplish?

  • Hal Varian, Berkeley: incentive-based strategies for enhancing cyber security
  • Stefan Savage, UCSD: Internet outbreaks: Epidemiology and Defenses
  • Vern Paxson, ICIR and LBNL: Network intrusion detection systems

Readings:

November 23: Cyber-defenses

Host-based, network-based, software engineering with security goals

  • Mark Pustilnik, Microsoft, Eliminating security vulnerabilities from commercial software.
  • Josh Lackey, Microsoft (ex-IBM), Ethical hacking: Using white-hat cyber-attacks to improve security.
  • Eric Rescorla, consultant, Does it make sense to discover/publicize vulnerabilities?

Readings:

November 30: Intelligence and Interrogation

How can IT improve US intelligence capabilities?

  • (TBD)
  • Steve Maurer: Databases and Intelligence
  • S. Scotchmer: Do Terrorism Futures Make Sense?

Readings:

December 7: Cyberforensics

What constitutes evidence for computer exploitation crimes, how is it gathered, etc.

  • Possible: Butler Lampson
  • Possible: FBI

Readings: