Week 1: --Watch the first hour (up to the question period) of the GWU debate on national security and cyber surveillance (available on this page: http://bit.ly/1T9CTz7 ). Week 2: --Chapter 5, “Tensions Between Cybersecurity and other Public Policy Concerns,” pp. 93-115, from At The Nexus of Cybersecurity and Public Policy, D. Clark, T. Berson, and H. Lin, Eds, National Research Council, 2014. Week 3: --All the articles for Debate/Resolution1/All must read Week 4: --D is for Digital: Chapter 10: How the Web Works, pp. 161-185. --Watch: Short (8.5 minute) sideo explaining Diffie-Hellman Key Exchange (or Key agreement): https://www.youtube.com/watch?v=YEBfamv-_do Week 5: --1. D is for Digital: Part I preface and Chapter 1: What’s in a Computer? pp. 7-19. --2. Anderson, Ross. Security Engineering. Second Edition, Wiley, 2006. Chapter 1: What is Security Engineering? pp. 3-15. Available at: http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c01.pdf Week 6: --1. D is for Digital: Chapter 3: Inside the CPU and Wrapup on Hardware, pp. 35-49. --2. D is for Digital: Chapter 11: Data, Information, and Privacy, pp. 187-204 -- All articles in Debate/Resolution2/all must read Week 7: --D is for Digital: Part III Communications and Chapter 8: Networking, pp. 117-134. Week 8: --All articles in Debate/Resolution3/all must read -- Watch the 2-minute video description of Estonian voting procedures available here: http://vvk.ee/voting-methods-in-estonia/ Week 9: --D is for Digital: Chapter 9. The Internet. pp. 135-160. Week 10: -- All articles in Debate/Resolution4/all must read --Watch: Eric Green and Francis Collins, just watch about 4:00 to 30:00 (Eric Green part) https://www.youtube.com/watch?v=R1cOqafAbhk&list=PL1ay9ko4A8snN7X7EUaID6FRtNRwjwLqr&index=10 Week 11: -- D is for Digital Part II Software: Intro and Chapter 4 Algorithms (pp. 51-63) Week 12: -- All articles in Debate/Resolution5/all must read --Watch: Introduction to bitcoin https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-overview (At least the first 11-minutes) Week 13: ---Berson, T.A. and Denning, D.E. “Cyberwarfare,” Guest Editors’ Introduction to IEEE Security & Privacy Magazine special issue on Cyberwarfare, Sept-Oct., 2009, pp. 13-15. Provides a brief historical background for the topic from two experts and overviews of other articles (that are not included in the reading). --National Research Council (NRC), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Chapter 1, pp. 9-23. (Up to Section 1.8). [Note re Box 1.1: the little dialog balloon reflects a comment: these commands have been replaced by U.S. Cyber Command since this report was written”]. Provides a more detailed and somewhat more technical of cyberattack technology and issues. --Sanger, David. “U.S. Directs Cyberweapons at ISIS for First Time.” New York Times, p. 1, 25 August 2016. Week 14: