Course Syllabus

stillness-inmotion-HAq24cfcdLg-unsplash.jpg

 

Semester & Location:

Fall 2024 - DIS Copenhagen

Type & Credits:

Elective Course - 3 credits

Major Disciplines:

Human Rights, International Relations, Political Science

Faculty Members:

Mikkel Storm Jensen

Ulrik Graff

(current students please use the Canvas Inbox to contact)

Time & Place:

Tuesdays 13:15-16:10 

Classroom: F24-306

 

Course Description 

DIS Cyber Warfare introduces you to how states use cyber as a weapon to achieve strategic objectives. It combines basic strategic theory with an understanding of the technological, tactical and legal attributes of military cyber operations with a practical introduction to what hacking actually is. It examines what new aspects cyber weapons adds to the realm of international conflict and great power competition. Furthermore it explores the special challenges to international law and norms in the cyber domain. All through analysis of current cases and national strategies. At the course's conclusion, the students develop their own cyber strategies and experience the accompanying strategic and legal dilemmas as they test them in a war game.

 

Course Objectives: 

This course aims to provide you with a thorough understanding of the strategic and legal aspects of conflict and espionage in cyber space. It is also the aim to provide you with an introduction to the technical aspects of cyber conflict.

The objectives of this course are to enable you to:

Gain an idea of the military possibilities and limitations in cyber space and separate facts from myths about cyber conflict through selected readings and class discussions of current cases.

Gain an understanding of the difficulties of applying international law to conducting or defending against cyber operations.

Examine and conduct basic analyses of contemporary cases in light of national security policy to enable students to analyze cyber events through a prism of strategy .

Increase students' ability to write analytical papers using strategic argumentation, including considerations regarding international law and norms.

 

Prerequisites: 

Knowledge of political science or international law. No knowledge of computer science is necessary. 

 

Course Instructors: 

Mikkel Storm Jensen

Major, Danish army. PhD (University of Southern Denmark, 2023). M.Sc. (Political Science, University of Copenhagen, 1996). Staff College (Royal Danish Defence College (RDDC), 2008). Research interests: Cyber strategy: States’ use of offensive cyberspace operations. His PhD explores the cyber weapons' influences and use in alliances. Has also written on defensive cyber strategies examening the state’s roles in establishing societal cyber resilience. Furthermore: Grey Zone Operations, Intelligence analysis, counterinsurgency and stabilisation operations. Work experience: Danish armed forces since 1986. RDDC since 2016. Has represented RDDC in national printed and electronic media extensively for press comments, lately mostly on the war in Ukraine. With DIS since 2023. Deployed to Ex-Jugoslavia 2000, Afghanistan 2006-7, 2010.

Disclaimer: While Mikkel Storm Jensen is serving in the Danish armed forces at the RDDC, his statements throughout these lectures are his own and does not represent those of the Danish government, the Danish armed forces or the RDDC.

 

Ulrik Graff

Cand.jur. (Law, University of Copenhagen, 2006). European Legal Diploma, University of Kent, 2003. Head of Section, Danish Defense Command-Afghanistan, 2009. Head of Section, Danish Defense Command - Maritime operations, 2008. Deployed to Iraq in 2007 and Afghanistan in 2009. With DIS since 2010.

 

Evaluation and Assessment: 

  • Two research papers (first paper is synopsis for final paper) on self chosen relevant topic, approved by Jensen or Graff. 
  • Participation (preparation for class, active participation during discussions in class with quality inputs rather than quantitybased an analysis and reflection). 
  • Participation in strategy development and -evaluation during semester's concluding wargame. 

 

Assignment Percentage of grade
1st research paper 20%
2nd research paper 35%
Active Participation 35%
Presentation 10%

Main Themes: 

  • Cyber as a military means to achieve national security ends as part of a strategy
  • What is "hacking"?
  • Military cyberspace operations and international law
  • Grey zone operations, hybrid warfare and cyber
  • The state's role in cyber resilience
  • Planning and decision making during cyber crisis

 

Literature:  

Biden, J. (2023). National Cybersecurity Strategy 2023. The White House. https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf

DOD. (2023). 2023 DOD Cyber Strategy Summary. https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_Strategy_Summary.PDF

Dunn-Cavelty, M., & Suter, M. (2009). Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection. International Journal of Critical Infrastructure Protection, 2(4), 179–187. https://doi.org/10.1016/j.ijcip.2009.08.006

Hillebrand, Gregory D, og Bill Ault. “Strategic Cyberspace Operations Primer”. US Army War College, 2023. https://csl.armywarcollege.edu/USACSL/Publications/Strategic_Cyberspace_Operations_Guide.pdf.

Jensen, M. S. (2022). Five good reasons for NATO’s pragmatic approach to offensive cyberspace operations. Defence Studies, 1–25. https://doi.org/10.1080/14702436.2022.2080661

Jensen, M. S. (2024). Denmark’s Sector Responsibility Principle: A Tedious Cyber Resilience Strategy. Applied Cybersecurity & Internet Governance, 4(2/2024). https://doi.org/10.60097/ACIG/190789

Jensen, M. S. (Forthcoming). Cyberspace Operations, Grey zone conflict and Small States. In Modern War and Grey Zones: Design For Small States.

Jervis, R. (2017). Robert Jervis, “Offense, Defense, and the Security Dilemma,” in AJ, 93-112. In International Politics: Enduring Concepts and Contemporary Issues (13th ed.). Pearson.

Joint Chiefs of Staff. (2018, August 6). JP 3-12 Cyberspace Operations (2018). US Joint Chiefs of Staff. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf

Libicki, M. C. (with Project Air Force (U.S.)). (2009). Cyberdeterrence and cyberwar. RAND. https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf

Lonergan, E., & Poznansky, M. (2023, May 2). Are We Asking Too Much of Cyber? War on the Rocks. https://warontherocks.com/2023/05/are-we-asking-too-much-of-cyber/

Mazarr, M. J. (2018). Understanding Deterrence (p. 14). RAND.

Nilsson, P.-E. (2023). Unravelling the Myth of Cyberwar. FOI. https://www.foi.se/rapporter/rapportsammanfattning.html?reportNo=FOI-R--5513--SE

Smeets, M. (2021, August). NATO allies’ offensive cyber policy: A growing divide? The Hague Centre for Strategic Studies. https://hcss.nl/report/nato-allies-offensive-cyber-policy-a-growing-divide/

Soesanto, S. (2023). Ukraine’s IT Army. Survival, 65(3), 93–106. https://doi.org/10.1080/00396338.2023.2218701

Taddeo, M. (2018). The Limits of Deterrence Theory in Cyberspace. Philosophy & Technology, 31(3), 339–355. https://doi.org/10.1007/s13347-017-0290-2

Troxell, J. F. (2010). Military Power and the Use of Force. In J. B. Bartholomees (Ed.), U. S. Army War College Guide to National Security Issues Volume I: Theory of War and Strategy (pp. 226–238). https://marshallcenterciss.contentdm.oclc.org/digital/collection/p16378coll5/id/453/

UK MoD. (2023). Responsible Cyber Power in Practice. GOV.UK. https://www.gov.uk/government/publications/responsible-cyber-power-in-practice/responsible-cyber-power-in-practice-html

US Air Force. (2023, February 1). Air Force Doctrine Publication 3-12, Cyberspace Operations. US Air Force. https://www.google.com/search?rlz=1C1GCEA_en&sxsrf=APwXEddlIDebLCjKu6M0E5rKYa0WIB-WNA:1687337290580&q=jp+3-12+cyberspace+operations&sa=X&ved=2ahUKEwiTnMie_dP_AhXEYPEDHeFPC8QQ1QJ6BAhHEAE

Valeriano, B. (2022). The Failure of Offense/Defense Balance in Cyber Security. Cyber Defense Review, Summer, 91–101.

What is the Cyber Kill Chain? Introduction Guide - CrowdStrike. (n.d.). Crowdstrike.Com. Retrieved September 10, 2023, from https://www.crowdstrike.com/cybersecurity-101/cyber-kill-chain/

Yarger, H. R., & Bartholomees, J. B. (2012). Toward a Theory of Strategy: Art Lykke and the U.S. Army War College Strategy Model (VOLUME I:, pp. 45–52). Strategic Studies Institute, US Army War College. https://www.jstor.org/stable/resrep12116.6

 

The literature for each class is available in the calendar and under files. Open the class and click on the links to access. 

Approach to teaching

Class sessions will include short lectures by the course instructor, academic discussions, group work, guest lectures, field studies, creative assignments and simulation games. 

 

 Expectations of the students

It is expected that all students actively participate in class: do the reading for each class; come with notes and questions for the instructor and other students; actively and responsibly participate in their project group.

 

Academic Regulations  

Please make sure to read the Academic Regulations on the DIS website. There you will find regulations on: 

 

 

DIS - Study Abroad in Scandinavia - www.DISabroad.org

Course Summary:

Date Details Due