Course Syllabus
Semester & Location: |
Fall 2024 - DIS Copenhagen |
Type & Credits: |
Elective Course - 3 credits |
Major Disciplines: |
Human Rights, International Relations, Political Science |
Faculty Members: |
Mikkel Storm Jensen Ulrik Graff (current students please use the Canvas Inbox to contact) |
Time & Place: |
Tuesdays 13:15-16:10 Classroom: F24-306 |
Course Description
DIS Cyber Warfare introduces you to how states use cyber as a weapon to achieve strategic objectives. It combines basic strategic theory with an understanding of the technological, tactical and legal attributes of military cyber operations with a practical introduction to what hacking actually is. It examines what new aspects cyber weapons adds to the realm of international conflict and great power competition. Furthermore it explores the special challenges to international law and norms in the cyber domain. All through analysis of current cases and national strategies. At the course's conclusion, the students develop their own cyber strategies and experience the accompanying strategic and legal dilemmas as they test them in a war game.
Course Objectives:
This course aims to provide you with a thorough understanding of the strategic and legal aspects of conflict and espionage in cyber space. It is also the aim to provide you with an introduction to the technical aspects of cyber conflict.
The objectives of this course are to enable you to:
Gain an idea of the military possibilities and limitations in cyber space and separate facts from myths about cyber conflict through selected readings and class discussions of current cases.
Gain an understanding of the difficulties of applying international law to conducting or defending against cyber operations.
Examine and conduct basic analyses of contemporary cases in light of national security policy to enable students to analyze cyber events through a prism of strategy .
Increase students' ability to write analytical papers using strategic argumentation, including considerations regarding international law and norms.
Prerequisites:
Knowledge of political science or international law. No knowledge of computer science is necessary.
Course Instructors:
Mikkel Storm Jensen
Major, Danish army. PhD (University of Southern Denmark, 2023). M.Sc. (Political Science, University of Copenhagen, 1996). Staff College (Royal Danish Defence College (RDDC), 2008). Research interests: Cyber strategy: States’ use of offensive cyberspace operations. His PhD explores the cyber weapons' influences and use in alliances. Has also written on defensive cyber strategies examening the state’s roles in establishing societal cyber resilience. Furthermore: Grey Zone Operations, Intelligence analysis, counterinsurgency and stabilisation operations. Work experience: Danish armed forces since 1986. RDDC since 2016. Has represented RDDC in national printed and electronic media extensively for press comments, lately mostly on the war in Ukraine. With DIS since 2023. Deployed to Ex-Jugoslavia 2000, Afghanistan 2006-7, 2010.
Disclaimer: While Mikkel Storm Jensen is serving in the Danish armed forces at the RDDC, his statements throughout these lectures are his own and does not represent those of the Danish government, the Danish armed forces or the RDDC.
Ulrik Graff
Cand.jur. (Law, University of Copenhagen, 2006). European Legal Diploma, University of Kent, 2003. Head of Section, Danish Defense Command-Afghanistan, 2009. Head of Section, Danish Defense Command - Maritime operations, 2008. Deployed to Iraq in 2007 and Afghanistan in 2009. With DIS since 2010.
Evaluation and Assessment:
- Two research papers (first paper is synopsis for final paper) on self chosen relevant topic, approved by Jensen or Graff.
- Participation (preparation for class, active participation during discussions in class with quality inputs rather than quantity – based an analysis and reflection).
- Participation in strategy development and -evaluation during semester's concluding wargame.
Assignment | Percentage of grade |
1st research paper | 20% |
2nd research paper | 35% |
Active Participation | 35% |
Presentation | 10% |
Main Themes:
- Cyber as a military means to achieve national security ends as part of a strategy
- What is "hacking"?
- Military cyberspace operations and international law
- Grey zone operations, hybrid warfare and cyber
- The state's role in cyber resilience
- Planning and decision making during cyber crisis
Literature:
Biden, J. (2023). National Cybersecurity Strategy 2023. The White House. https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
DOD. (2023). 2023 DOD Cyber Strategy Summary. https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_Strategy_Summary.PDF
Dunn-Cavelty, M., & Suter, M. (2009). Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection. International Journal of Critical Infrastructure Protection, 2(4), 179–187. https://doi.org/10.1016/j.ijcip.2009.08.006
Hillebrand, Gregory D, og Bill Ault. “Strategic Cyberspace Operations Primer”. US Army War College, 2023. https://csl.armywarcollege.edu/USACSL/Publications/Strategic_Cyberspace_Operations_Guide.pdf.
Jensen, M. S. (2022). Five good reasons for NATO’s pragmatic approach to offensive cyberspace operations. Defence Studies, 1–25. https://doi.org/10.1080/14702436.2022.2080661
Jensen, M. S. (2024). Denmark’s Sector Responsibility Principle: A Tedious Cyber Resilience Strategy. Applied Cybersecurity & Internet Governance, 4(2/2024). https://doi.org/10.60097/ACIG/190789
Jensen, M. S. (Forthcoming). Cyberspace Operations, Grey zone conflict and Small States. In Modern War and Grey Zones: Design For Small States.
Jervis, R. (2017). Robert Jervis, “Offense, Defense, and the Security Dilemma,” in AJ, 93-112. In International Politics: Enduring Concepts and Contemporary Issues (13th ed.). Pearson.
Joint Chiefs of Staff. (2018, August 6). JP 3-12 Cyberspace Operations (2018). US Joint Chiefs of Staff. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf
Libicki, M. C. (with Project Air Force (U.S.)). (2009). Cyberdeterrence and cyberwar. RAND. https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf
Lonergan, E., & Poznansky, M. (2023, May 2). Are We Asking Too Much of Cyber? War on the Rocks. https://warontherocks.com/2023/05/are-we-asking-too-much-of-cyber/
Mazarr, M. J. (2018). Understanding Deterrence (p. 14). RAND.
Nilsson, P.-E. (2023). Unravelling the Myth of Cyberwar. FOI. https://www.foi.se/rapporter/rapportsammanfattning.html?reportNo=FOI-R--5513--SE
Smeets, M. (2021, August). NATO allies’ offensive cyber policy: A growing divide? The Hague Centre for Strategic Studies. https://hcss.nl/report/nato-allies-offensive-cyber-policy-a-growing-divide/
Soesanto, S. (2023). Ukraine’s IT Army. Survival, 65(3), 93–106. https://doi.org/10.1080/00396338.2023.2218701
Taddeo, M. (2018). The Limits of Deterrence Theory in Cyberspace. Philosophy & Technology, 31(3), 339–355. https://doi.org/10.1007/s13347-017-0290-2
Troxell, J. F. (2010). Military Power and the Use of Force. In J. B. Bartholomees (Ed.), U. S. Army War College Guide to National Security Issues Volume I: Theory of War and Strategy (pp. 226–238). https://marshallcenterciss.contentdm.oclc.org/digital/collection/p16378coll5/id/453/
UK MoD. (2023). Responsible Cyber Power in Practice. GOV.UK. https://www.gov.uk/government/publications/responsible-cyber-power-in-practice/responsible-cyber-power-in-practice-html
US Air Force. (2023, February 1). Air Force Doctrine Publication 3-12, Cyberspace Operations. US Air Force. https://www.google.com/search?rlz=1C1GCEA_en&sxsrf=APwXEddlIDebLCjKu6M0E5rKYa0WIB-WNA:1687337290580&q=jp+3-12+cyberspace+operations&sa=X&ved=2ahUKEwiTnMie_dP_AhXEYPEDHeFPC8QQ1QJ6BAhHEAE
Valeriano, B. (2022). The Failure of Offense/Defense Balance in Cyber Security. Cyber Defense Review, Summer, 91–101.
What is the Cyber Kill Chain? Introduction Guide - CrowdStrike. (n.d.). Crowdstrike.Com. Retrieved September 10, 2023, from https://www.crowdstrike.com/cybersecurity-101/cyber-kill-chain/
Yarger, H. R., & Bartholomees, J. B. (2012). Toward a Theory of Strategy: Art Lykke and the U.S. Army War College Strategy Model (VOLUME I:, pp. 45–52). Strategic Studies Institute, US Army War College. https://www.jstor.org/stable/resrep12116.6
The literature for each class is available in the calendar and under files. Open the class and click on the links to access.
Approach to teaching
Class sessions will include short lectures by the course instructor, academic discussions, group work, guest lectures, field studies, creative assignments and simulation games.
Expectations of the students
It is expected that all students actively participate in class: do the reading for each class; come with notes and questions for the instructor and other students; actively and responsibly participate in their project group.
Academic Regulations
Please make sure to read the Academic Regulations on the DIS website. There you will find regulations on:
DIS - Study Abroad in Scandinavia - www.DISabroad.org
Course Summary:
Date | Details | Due |
---|---|---|