Teaching Information Warfare -- Lessons Learned

Wednesday, 1:30, Regency F

Chair

PRESENTATION

Panelists:

The growing importance of information assurance is reflected in new relevant course offerings at universities, which often include simulations of information warfare scenarios.  This panel presents individual descriptions of successes and failures in bringing this topic to the classroom, and touches on where these courses fit in the overall university curricula.

Background of audience we are trying to attract:
technical and senior and middle management who did not have an information warfare course when they went to college (or afterwards)


Professor Lance J. Hoffman is in charge of the computer security graduate program in computer science at The George Washington University.  Author or editor of five books and numerous articles on computer security and privacy, he has headed a number of cryptographic policy projects and is Director of the School of Engineering's Cyberspace Policy Institute. His most recent readings book, Building in Big Brother, was the first book devoted to the topic of cryptography policy.  A Fellow of the Association for Computing Machinery and a senior member of the Institute of Electrical and Electronic Engineers (IEEE), Dr. Hoffman has served as general chairman of the Conference on Computers, Freedom, and Privacy and is a member of the National Advisory Board of the newsletter Privacy and American Business; he also sits on the Advisory Committee of the Center for Democracy and Technology and is GW’s representative to the Advisory Committee of the World Wide Web Consortium.   His recent research includes a survey of cryptographic products available outside the United States, development of a privacy policy for an electronic payments system, and risk analyses for telemedicine privacy and security.   His recent teaching innovations include multidisciplinary courses on electronic commerce and information warfare.

Dr. Dorothy E. Denning is professor of Computer Science and professor and member of the advisory board of the Communication, Culture and Technology program at Georgetown University.  Her current work encompasses the areas of information warfare and assurance, encryption policy and technology, and the impact of technology on law enforcement and society.  Before coming to Georgetown in 1991, she worked at Digital Equipment Corporation, SRI International, and Purdue University.  She has served as president of the International Association for Cryptologic Research, chair of the International Cryptography Institute, and chair of the National Research Council Forum on Rights and Responsibilities of Participants in Networked Communities.  She is presently a member of the President's Export Council Subcommittee on Encryption Policy.  Denning has testified before Congress on encryption policy and authored more than 100 publications.  Her most recent book, Information Warfare and Security, was published by Addison Wesley in late 1999.  Denning is an ACM Fellow and recipient of the 1990 Distinguished Lecture in Computer Security Award.  She received the A.B. and A.M. degrees in mathematics from the University of Michigan and the Ph.D. degree in computer science from Purdue University.

Professor Daniel T. Kuehl teaches military strategy and national security policy in the School of Information Warfare & Strategy, an element of the Information Resources Management College at National Defense University in Washington, DC.   He is the director of the Information Strategies Concentration Program, a specialized curriculum for selected students at the National War College and Industrial College of the Armed Forces, in which he teaches on the law of war, the strategic use of the internet, and information warfare and strategy. His dissertation focused on the Air Force's employment of electronic warfare in the decade after WW II.  In his final assignment at the Air Staff he was part of the "Checkmate" planning team that in August 1990 developed the "Instant Thunder" plan for a strategic air campaign against Iraq, after which he served as chief of the Air Staff element that supported the Secretary of the Air Force's landmark Gulf War Air Power Survey (GWAPS). He authored the "Air Campaign" chapter in the DOD's Final Report to Congress on the Persian Gulf War (also known as the "Title V Report"), and was the editor of the GWAPS volume of Gulf War statistics, A Statistical Compendium.   Other publications include articles in Air University Review, Civil War History, Air Power History, Journal of Military History,  Journal of Strategic Studies, Joint Force Quarterly, Enjeux Atlantiques, and the Pakistan Defense Journal, and he has contributed chapters to Airpower: Theory and Practice (by Cass), The Eagle in the Desert: Looking Back on US Involvement in the Persian Gulf War  (by Praeger), Cyberwar: Security, Strategy and Conflict in the Information Age, and its sequel Cyberwar: Myths, Mysteries and Realities (both published by the Armed Forces Communications and Electronics Association).  His most recent publications are "Strategic Information Warfare: a Concept", by the Australian National University's Strategic and Defence Studies Centre in Canberra, and "Information IN War or Information Warfare--is the Distinction Meaningful?", published by The Canadian in Fall 1998. His current research focuses on the relationship between the information age and national security, and he is currently writing a book on the early history of electronic warfare.

Dr. Roger Molander, a senior research scientist at RAND, currently leads the development of RAND’s “Day After...” exercise methodology for exploring new types of strategic conflicts.  This methodology was originally developed to explore the counter-nuclear proliferation problem and more recently has been applied to cyberspace warfare against critical U.S. infrastructures; the potential impact of various emerging facets of electronic commerce such as e-cash, Internet banking, and Internet gambling on the U.S. and global anti-money laundering strategy, and the international Y2K problem.   Dr. Molander was a member of the National Security Council staff at the White House from 1974 through 1981 where his principal area of responsibility was strategic nuclear arms control.  Prior to joining the NSC staff he was employed in the U.S. Department of Defense.  From 1981 to 1989 he was involved in developing educational materials on nuclear war and other major national policy issues at Ground Zero and the Roosevelt Center for American Policy Studies.  He has a PhD in engineering science and nuclear engineering from the University of California at Berkeley.
 

 

Close this Window