Press Releases

Five cyber intelligence courses to be offered starting this August

IWP is pleased to announce that five cyber intelligence courses will be offered by its Cyber Intelligence Initiative, starting this August. Details on the courses may be found below.

Course Name

Instructor

Course Duration

Day(s)

Cyber Terrorism

Paul de Souza

25 Aug – 22 Sep 2018

5 Saturdays  9 AM – 5 PM

Insider Threat

Chris Kay

28 Aug – 09 Oct 2018

7 Tuesdays   6 PM – 9 PM

Technologies Underpinning Cyber Intelligence

Ray Koch

25 Aug – 22 Sep 2018

10 Saturdays 9 AM – 1 PM

International Law and Conflict in the Cyber Domain

Ethan Burger

24 Aug – 15 Sep 2018

2 Fridays 6:30 – 9:30 PM, 2 Saturdays 9:30 AM – 5:30 PM

Artificial Intelligence and Cyber

Sam Chughtai

27 Aug – 29 Aug 2018

2½ days (8hrs, 8hrs, 4hrs)


Cyber Terrorism

25 Aug – 22 Sep 2018
5 Saturdays  9 AM – 5 PM

The Cyber Terrorism Certificate is a 5-day (40 hr.) certificate program. The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. CTC addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of CI (Critical Infrastructure).  

Instructor: Paul de Souza
Paul de Souza is the Founder/President of the nonprofit organization CSFI (Cyber Security Forum Initiative). Paul is the co-author of the book Strategic Intelligence Management (National Cyber Defense Strategy), he serves as an advisor for the MCPA (Military Cyber Professionals Association), and he is a recipient of the Order of Thor Medal. Paul serves as a CENTRIC (Centre of Excellence in Terrorism, Resilience, and Intelligence & Organized Crime Research) Visiting Researcher at Sheffield Hallam University, UK, Guest Lecturer at The Swedish Defence University (SEDU) Försvarshögskolanand, and served as a Visiting Research Fellow at the National Security Studies, Tel Aviv University, Israel (INSS) – Cyber Security and Military & Strategic affairs Programs.  Mr. de Souza has over 15 years of cyber security experience and has worked as the Chief Security Engineer for AT&T, where he designed and approved secure networks for MSS (Managed Security Services). Mr. de Souza also worked for Computer Sciences Corporation (CSC) and US Robotics as a security engineer. He has consulted for several governments, military organizations, and private institutions.


Insider Threat

28 Aug – 09 Oct 2018
7 Tuesdays   6 PM – 9 PM

As this course is designed for the non-technical professional, we will begin with a basic review of cybersecurity issues pertinent to the study of insider threats. We will then focus on the various types of insider threats prevalent today — to include state and non-state actors, as well as the motivations and methodologies (both technical, and increasingly non-technical) they employ. In addition, we will touch upon the legal framework within which insider threat prevention and mitigation must operate. From there, we will focus on the development of effective mitigation strategies as part of an overall risk management program leading to more effective anti-insider threat mechanisms.

Instructor: Chris Kay
Chris Kay is a Senior Policy Advisor and retired Naval Officer, with over 20 years of management expertise in strategy and policy, intelligence analysis, multi-lateral secure communications systems, information security, international engagement, and executive level support. He was part of the establishing team to build the first Intelligence Center for the NATO Alliance, as the systems and training officer, where he managed the implementation of the systems and advanced tools and developed the training for allied personnel using them. Of his two decades posted overseas, he was involved in numerous operations in Asia, Africa, Europe, and the Middle East. He is a qualified Information Warfare Officer and holds a subspecialty as a Foreign Area Officer and Information Systems Security Manager. He is an Institute of World Politics graduate, as well as a regular lecturer at the Institute.


Technologies Underpinning Cyber Intelligence

25 Aug – 22 Sep 2018
10 Saturdays 9 AM – 1 PM

This course will begin by introducing the main principles of cryptography to build a solid foundation undergirding the cyber technology needed for good cyber intelligence.  We will then address some of the major technical pillars that rest on this foundation, including: financial technology, Big Data, and Machine Learning, and later, we will dive deeply into digital currencies and digital ledgers, computer viruses, Malware, and automation. Finally, we will tie all this knowledge into a heuristic overview of the cyber intelligence industry and the major public and private players and how they collaboratively work together to form defensive and, in some cases, offensive capabilities.

Instructor: Ray Koch
Ray is an experienced leader who delivers high metric results using agile methodologies constantly meeting project deadlines. He has managed high-performing and resilient cloud applications by employing sound cloud architectural design patterns and implementing effective cyber security policies. He leads large teams in a dynamic, fast-paced environment in domestic and global operations. Ray manages a technology digital ledger project with records of all civil affairs assets worth billions of dollars.


International Law and Conflict in the Cyber Domain

24 Aug – 15 Sep 2018
2 Fridays 6:30 – 9:30 PM, 2 Saturdays 9:30 AM – 5:30 PM

Russia’s aggressive cyber operations against Georgia, Ukraine, and many NATO states present novel legal, practical, and political challenges. Some analysts have described Russian cyber operations as an attempt to operate in the “gray zone.” Others believe that offensive cyber operations have fundamentally changed the nature of international ‘armed’ conflict and needs new legal norms.

While there is general agreement that long-standing international legal principles and norms of armed conflict survive technological change, there is not a consensus among experts about how these rules should apply to cyber operations. The NATO Cooperative Cyber Defense Center of Excellence’s “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” offers the best ‘baseline’ for evaluating the behavior of states in cyberspace. 

Although the team of experts who developed the Tallinn Manual produces a set of 156 ‘black letter’ rules, their opinions diverged in many critical areas about how these rules were to operate in practice, particularly when non-state actors are involved. This absence of consensus is evident in the lengthy commentaries following individual rules.

This course will examine the impact of international legal principles and norms on Russian, Chinese, North Korean, and U.S. decisionmakers’ cyber operations and national security policy. It will consider the need for refinement of the international law of armed conflict and international humanitarian law to better reflect current activities of state and non-state actors in the cyber domain, particularly concerning espionage, the commission of financial crime, and the role of non-state actors.

Instructor: Ethan Burger
Ethan S. Burger, Esq. is a Washington-based international legal consultant, attorney, and academic. He recently taught about cybersecurity and participated in curriculum development at Vilnius University on a grant from the Fulbright Foundation. His areas of specialty include: Transnational Financial Crime and Corruption, Cybersecurity Law, Corporate Governance, Russian Country Conditions, and Legal Ethics / Professional Responsibility / Legal Malpractice. He has worked on programs funded by the Australian Federal Police and the U.S. Department of Justice. He is on the Fulbright Foundation’s Senior Specialist Program Roster, and is eligible to work on qualified academic projects.


Fundamentals of Artificial Intelligence and Cyber Security

27 Aug – 29 Aug 2018
2½ days (8hrs, 8hrs, 4hrs)

This is an entry level course on the upcoming role of artificial intelligence as it applies to cyber strategy and national defense. The development of technology is expanding faster than the policy to shape it. This course will work to provide the fundamentals of understanding how artificial intelligence and cyber tools will affect the global battlefield in the years to come.

We will first explore the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. We will look at the projected abilities of artificial intelligence and the implications on warfare, based on released statements by both the private sector and government actors. The course will conclude with student papers and presentations on research conducted on subjects of interest relevant to the course material.

The course will be taught in a combined lecture-demonstration-seminar format. Students will be expected to complete all assigned readings before each class and be prepared to discuss them during the seminar portion — especially with guest speakers. Students will be encouraged to venture beyond these readings and to pursue research topics of interest to them (in consultation with the instructor) as they prepare their writing assignments.

Instructor: Sam Chughtai
Mr. Chughtai has served as a U.S. State Department Advisor, and was the recipient of the Microsoft Military Affairs Award for Veterans Recruitment. He serves as an Adjunct Professor for UW Bothell School of Business, and the Seattle University School of Law. Mr. Chughtai dedicates his time as a board member for Attain Housing and as a Council Chair for the Pacific Northwest Cybersecurity Business Leadership Council at the University of Washington. He is globally recognized for his work with world’s leading organizations, including IBM, Microsoft, KPMG, Accenture, US Federal & State Governments in Cybersecurity, Privacy, Digital Innovation, Blockchain, Artificial Intelligence, Fintech & Smart Cities.