Professional Documents
Culture Documents
Course Overview
Semester and Year: Summer 2021
Day/Times: Mondays and Wednesdays, 6:30-9:30 pm
Format: Online Web Conference (Zoom)
Faculty
Derek Reveron: reveron1636@gmail.com
Course Assistants
Alexandra Bruer (lead): alexandrab1900@gmail.com
Meridith Bell: bellmeridith@gmail.com
Coen Williams: coenwilliams2@gmail.com
In a very short time, individuals and companies have harnessed cyberspace to create new
industries, a vibrant social space, and a new economic sphere that are intertwined with our
everyday lives. At the same time, individuals, subnational groups, and governments are using
cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target
through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the
vast majority of cyberspace is a civilian space used by individuals, businesses, and governments
for legitimate purposes. Cyberspace and International Security examines current and future
threats to cyberspace, various approaches to advance and defend national interests, and contrasts
the US approach with European, Russian, and Chinese approaches in cyberspace.
Students are cast as participants of the policymaking process, in most cases as a trusted member
of the NSC reporting to the President or National Security Advisor, where they are required to
devise strategies and write “Strategic Options Memos.” Strategic Options Memos combine
careful analysis and strategic imagination, on the one hand, with the necessity to communicate to
major constituencies in order to sustain public support, on the other. Students will write three,
three-page memos.
Learning Objectives: To enhance participants’ ability to: (1) analyze challenges in cyberspace
(2) think strategically about cyber challenges; (3) contrast U.S. approaches in cyberspace with
other cyber powers; (4) communicate analyses of issues in Strategic Options Memos; operate
within current national security policymaking processes surrounded by an intrusive, inquiring
press; and (5) appreciate the complexities of communicating national security policies to
multiple audiences.
Required Readings: In addition to the assigned articles, two books are required.
• Reveron, Derek. Cyberspace and National Security: Threats, Opportunities, and Power in a
Virtual World. Georgetown University Press, 2012. (available through Harvard Hollis)
• Sanger, David E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown,
2018. (available through Harvard Hollis)
Recommended
● Abbate, Janet. Inventing the Internet, MIT Press, 1999.
Grading
Grades: Given the nature of the national security system, there are no deadline extensions or
revision options. Late papers will not be accepted. Grade appeals will be submitted no more than
five days after the assignment is returned and must address the comments and consider the
assignment as a basis.
● Class Participation: 15 percent
o Students will be expected to participate through the discussion board.
● Case Study Assignments: 50 percent
o Memo One: Sony Redux (25 percent)
o Memo Two: Cyberpower and Interstate Rivalry (25 percent)
● Final Case Study: 35 percent
o Memo Three: Final Exam
Office Hours: will be held before class or online by appointment. Given the number of students
who participate online, post questions to the discussion forum for the weekly topic or the course
FAQ.
Assignments: You are required to submit three, three-page memos. Just like the real-world, you
will adhere to a set of formatting guidelines (SOPs). Students are encouraged to discuss the case
and ideas with fellow students, but must do individual write-ups based on their own analysis. In
your write-up, you do not need to cite ideas that come from the assigned readings, but you must
cite any outside sources used. Memos should be no more than 1800 words. A complete
description will be distributed one week before the assignment is due.
Graduate Students: will have additional assignment length requirements specified in prompts.
Accessibility
DSR= Reveron, Derek. Cyberspace and National Security: Threats, Opportunities, and Power
in a Virtual World. Georgetown University Press, 2012.