DIP 600: Cybersecurity

Spring 2016

Patterson School of Diplomacy and International Commerce

Thursday 10am-12:30pm

420 Patterson Office Tower


Dr. Robert M. Farley

Office: POT 1177

Office Hours: Wednesday, 9am-11am

Office Telephone: 859-257-4668

E-mail: farls0@gmail.com


This course seeks to familiarize students with the basic concepts associated with cyber-space, cyber-security, and cyber-conflict.  We will work through the history of the internet, the political problems that the digitization of knowledge poses, and the implications that these political problems have for international politics. Students will develop projects associated with the practical, organizational implications of cyber-security in the United States.


The course primarily revolves around class discussion, with some interactive lecture.  Students are expected to come prepared to discuss readings, as well as to have familiarity with current events in the area of cyber-conflict and cyber-security.

Student Learning Outcomes*:

After completing the course, students should have the capacity to:

*Courtesy of Frakes, EKU HLS 341

Students with Disabilities

If you have a documented disability that requires academic accommodations, please see me as soon as possible during scheduled office hours.  In order to receive accommodations in this course, you must provide me with a Letter of Accommodation from the Disability Resource Center (2 Alumni Gym, 257-2754, email address jkarnes@email.uky.edu) for coordination of campus disability services available to students with disabilities.

Absence Policy

You must inform me in writing if you know in advance that you will miss an exam due to an excused reason such as: illness, serious illness or death in your immediate family, a University-sanctioned field trip, or religious holiday.  Excuses for missed exams will be granted as per University policy.

Academic Integrity

Per university policy, students shall not plagiarize, cheat, or falsify or misuse academic records. Students are expected to adhere to University policy on cheating and plagiarism in all courses.  The minimum penalty for a first offense is a zero on the assignment on which the offense occurred.  If the offense is considered severe or the student has other academic offenses on their record, more serious penalties, up to suspension from the university may be imposed. 

Plagiarism and cheating are serious breaches of academic conduct.  Each student is advised to become familiar with the various forms of academic dishonesty as explained in the Code of Student Rights and Responsibilities.  Complete information can be found at the following website: http://www.uky.edu/Ombud.  A plea of ignorance is not acceptable as a defense against the charge of academic dishonesty. It is important that you review this information as all ideas borrowed from others need to be properly credited.

 Plagiarism includes reproducing someone elses work, whether it be a published article, chapter of a book, a paper from a friend or some file, or something similar to this. Plagiarism also includes the practice of employing or allowing another person to alter or revise the work which a student submits as his/her own, whoever that other person may be. Students may discuss assignments among themselves or with an instructor or tutor, but when the actual work is done, it must be done by the student, and the student alone.  However, nothing in these Rules shall apply to those ideas which are so generally and freely circulated as to be a part of the public domain (Section 6.3.1).


Grading will be based on class participation (15%), two 7-9 page analytical papers (25% each), and one class project (35%).

Each of the two 7-9 page analytical papers must be typed and double-spaced.  Please do not exceed the page limit.  Although specific topic is up to you, one paper should have an institutional or regional focus, while the other should concentrate on a particular nation-state (not necessarily a country studied in the course).  The papers need not hold to any particular format (policy oriented memo, for example), but should be internally consistent in focus.  Additional research is welcome, and may be necessary for the adequate presentation of some topics.  The first paper is due on April 1, and the second on the final day of the course. The papers will be evaluated on both content and presentation.  Information must be accurate, arguments must be well thought out, and style must be compelling.  The memos must conform to standards of academic citation (system of your choice).

Class participation includes active discussion of the week’s reading material, as well as the development of discussion questions 1-2 times during the course.  You are expected to demonstrate engagement and familiarity with the subject matter in question.

The class project involves the development of a poster session for the Bluegrass Intelligence Colloquium, April 1, 2016 at William T. Young Library.   You will revise and revisit this project for a paper and presentation on the final day of the course. The project should involve policy-oriented proposals for managing significant problems in cybersecurity.  Details pending.


Class Materials

Purchase of the following books is recommended, but not required.  These texts are best acquired through Amazon or similar service. Edition is irrelevant.

P.W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxofrd University Press, 2014.

Kevin Poulsen, Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. New York: Crown, 2011.

Brandon Valeriano and Ryan Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford: Oxford University Press, 2015.


Most of the rest of the class readings are available online.  A few will be available through photocopies.  Note that many of the online readings are available on JSTOR or other secure databases, which requires either a University computer or a properly configured connection.


Week 1: January 14 What is Cyberspace?

Singer, 1-66

Betz, David J. and Tim Stevens, “Power and Cyberspace”

Kello, Lucas, “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft”, International Security

Week 2: January 21 What is Cybersecurity?

Singer, 67-165

Roger Hurwitz, Depleted Trust in the Cyber Commons, Strategic Study Quarterly (Fall 2012).

Week 3: January 28 Basic tools of Cyberwarfare

Singer, 166-256

Rid, Thomas and Peter McBurney, “Cyber-Weapons”, RUSI Journal, Vol. 157, No. 1, 2012

Valeriano, 1-44

Week 4: February 4 Cyberwarfare and International Politics

David Betz, Cyber Power in Strategic Affairs

Rid, Thomas, “Cyber War Will Not Take Place”, Journal of Strategic Studies, Vol. 35, No. 1, 2012. pp. 5-32.

Valeriano, 45-163

Week 5: February 11 Cybercrime

Poulsen, Prologue-18

Week 6: February 18 Cybersecurity and Law Enforcement

Poulsen, 19-Epilogue

Federal Bureau of Investigation, Cyber Crime

Week 7: February 25 Cyber Terror

Joseph Marks, ISIL Aims to Launch Cyber Attacks on US

David Fidler, Countering Islamic State Exploitation of the Internet

Ines von Behr et al, Radicalisation in the Digital Era

Week 8: March 3 Organizational Response

CNAS, Contested Commons, chapters 1, 5

James Stavridis and David Weinstein, Time for a US Cyber Force

Week 9: March 10 Cybersecurity and the Private Sector

Ash Carter, “Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity," Department of Defense, April 23, 2015

Christopher Meissner and August Cole, When the Pentagon Comes Knocking

Amitai Etzioni, Cybersecurity in the Private Sector

Week 10: March 24 Law of Cyberspace

Tallinn Manual on the International Law Applicable to Cyberwarfare

Michael N. Schmitt and Liis Vihul, The Nature of International Law Cyber Norms

Week 11: March 31 No Class: Bluegrass Intelligence Colloquium

Prepare Poster Presentation

Week 12: April 7 US-China Relationship

Mandiant, “APT1: Exposing One of China’s Cyber Espionage Units”, February 2013.

Lindsay, Jon R. “The Impact of China on Cybersecurity: Fiction and Friction”, International Security, Vol. 39, No. 3, Winter 2014/15. pp. 7-47.

Benjamin Wittes, “James Lewis on the Cyber Deal,” Lawfare (also listen to podcast)

Week 13: April 14 US Cyber-Strategy

US Department of Defense Cyber Strategy

Comprehensive National Cyber Security Initiative

Week 14: April 21: Future Trends


Daniel Burrus, The Internet of Things is Far Bigger Than Anyone Realizes

Evgeny Morozov, The Rise of Data and the Death of Politics

Week 15: April 28: Presentations Revisited