[The] Law and Technology of Cyber Conflict (20022). 3 units each term (6 units total). This new cross-disciplinary year-long course on cyber security will be taught jointly by faculty from the Law School and Computer Sciences Department. The course is motivated by the conviction that the field of cyber security in general and the emerging subfield of cyber conflict are plagued by the failure of experts to talk across disciplinary divides: Lawyers do not know what technologies are available to address cyber threats and so are often oblivious to technical problems and solutions. Cyber security technologists are often indifferent to the social or political context in which cyber attacks take place and ignorant of the legal regimes that apply. As a result, they often focus solely on technical solutions and fail to leverage the power of law to make bad actors cease and desist. As a matter of international law, “countermeasures” can be undertaken when there is both “necessity” and “proportionality,” but, from a technological perspective, what do these legal terms mean? Progress on cyber security policy is hampered when technologists do not fully grasp the problems that lawyers and regulators are trying to solve and when lawyers and regulators do not understand the possibilities and limitations of technological responses. The first semester of this year-long course will be a classroom seminar that will address the fundamental disconnect between the state of the law and the state of technology by engaging in a joint exercise of learning and teaching. Students and faculty will participate in a crash course on the relevant technology. The course assumes no prior technological or legal expertise and is aimed at building common knowledge and creating a community of shared terminology and inquiry. The second semester will be a hands-on practicum in which students will write policy papers, develop the computational theory of cyber conflict, and/or design and prototype novel technology. These projects will be designed to address some of the critical research gaps that have hindered long-term development of effective policy and technological responses to cyber conflict, including issues such as cyber deterrence in operations short of war, corporate cyber espionage, cyber vandalism/ terrorism, international cyber regulation, and related free speech and privacy concerns. Specific project topics will be formulated based on the first semester’s explorations and in consultation with policymakers who work on issues of cyber security. A year-long (two-semester) commitment is required. Paper or project required. Enrollment limited to ten Law students. Permission of instructors required. Also CPSC 510a. O. Hathaway, J. Feigenbaum, and S.J. Shapiro.