Documente Academic
Documente Profesional
Documente Cultură
COMM 5610/6610
Dr. Sean Lawson
Email: lawson.sean2005+ITGC@gmail.com
Phone: 801-585-7127
**Once you have read through this syllabus carefully, please go to http://bit.ly/
PKaJB and fill in the Syllabus Understanding and Agreement Form. YOU WILL NOT
BE ENTERED INTO THE GRADE SHEET FOR THE COURSE UNTIL YOU DO.**
"Smart bombs," GPS, cruise missiles, space-based surveillance and communication systems,
unmanned aerial vehicles--all of these and more are the tools that have revolutionized the
conduct of warfare over the last fifty years. And all of them have been powered by
advancements in information and communication technologies (ICTs). In this course, we
will explore the role of ICTs in global conflict, from traditional forms of warfare to newer
forms of conflict such as "cyberwar" and "softwar." We will begin with a series of readings
and lectures aimed at helping you to think better about technology in general, both what it
is and how change in technology relates to society more generally, as well as the general
relationship between technology and warfare. Next, to provide historical perspective for our
discussion of technology and warfare in the Information Age, we will examine a number of
theories and technologies of Industrial Age warfare. We will see that the key technologies
of the "information revolution"--i.e. the digital computer and the Internet--were themselves
products of World War II, and later Cold War, military research. We will then explore the
way that these technologies were being incorporated into a whole new generation of military
systems in the 1970s and 1980s, so much so that more than any other activity, the very
conduct of warfare came to be seen as an exercise in the collection and communication of
information. Beyond the conduct of traditional warfare by traditional military forces, we will
examine the way that new ICTs have shaped the conduct of terrorism and counterterrorism,
the collection and analysis of intelligence, theories of international relations in the
Information Age, as well as the emergence of new forms of conflict such as "cyberwar" and
"softwar." Finally, we will end by examining recent military use of two particular new media
technologies, blogs and videogames.
Course Objectives
1. For students to become knowledgeable about the the various ways that the conduct
of warfare in particular, and global conflict more generally, have shaped the
development of information and communication technologies;
2. For students to become knowledgeable about the various ways that the conduct of
warfare in particular, and global conflict more generally, have been shaped by the
development of information and communication technologies; and
3. For students to hone their research, writing, and analytical skills by participating in
a real-world, "open source intelligence" research project.
Required Readings
All readings will be available as electronic documents via WebCT or elsewhere on the Web.
Unless otherwise noted, all readings are available in WebCT, in a folder labeled with the
corresponding week number. Readings available somewhere other than WebCT with have a
hyperlink to a publicly available document on the Internet.
Readings should be completed prior to the Monday class session each week. Some weeks
have more reading than others, so be aware and plan ahead. In general, you are
responsible for completing all of the assigned reading each week. I do understand that in
some weeks it may not be possible for you to get through all of it. In those cases, you
should push yourself to do as much as possible so that you can still make an informed and
valuable contribution to class discussions both online and in class.
You are expected both to attend all scheduled class sessions each week and to participate
when you are in class. Of course, you cannot participate if you are not in class. Thus,
attendance will be taken at the beginning of each scheduled class session. You will be
allowed two (2) absences, for whatever reason, for the semester.
More details about the project, its procedures, terminology, and work products are provided
in WebCT.
Weekly Schedule
In general, Monday class sessions will be devoted to lecture while Wednesday sessions will
be devoted to in-class discussion of the week's readings and/or coordination and work on
the course research project. There will be some exceptions to this general pattern,
however. They are noted in the schedule below.
Readings:
• Chpt 1, "Gulf War--Infowar," in Dorothy E. Denning, Information Warfare and
Security, 1st ed. (Addison-Wesley Professional, 1998).
• Drapeau, M. & L. Wells II (2009) Social Software and National Security: An Initial
Net Assessment (Washington, D.C.: National Defense University).
• Fitsanakis, Joseph & Ian Allen (2009) 'Cell Wars: The Changing Landscape of
Communications Intelligence', RIEAS Research Paper 131.
Readings:
• "The Nature of Technology," in R. Volti, Society and technological change. New
York: St (Martin's Press, 1995).
• Marx, Leo (1997) 'Technology: The Emergence of a Dangerous Concept', Social
Research 64(3): 965-88.
• Hughes, "Technological Momentum," in Merritt Roe Smith and Leo Marx, Does
Technology Drive History?: The Dilemma of Technological Determinism (MIT Press,
1994).
• "Introduction" and "Conclusions: The Logic of Technology and War," in Van Creveld,
Martin L. Technology and War: From 2000 B.C. to the Present. New York: Free
Press, 1991.
Recommended:
• Law, "Technology and Heterogeneous Engineering: The Case of Portuguese
Expansion," in Wiebe Bijker, Thomas P. Hughes, and Trevor Pinch, The Social
Construction of Technological Systems: New Directions in the Sociology and History
of Technology (The MIT Press, 1989).
• Marx, Leo (1994) 'The Idea of 'Technology' and Postmodern Pessimism', in Merritt
Roe Smith & Leo Marx (eds), Does Technology Drive History? The Dilemma of
Technological Determinism (Cambridge: MIT Press): 237-58.
Recommended:
◦ Hughes, Thomas P. "A Commentary on Bien's 'Military Education in 18th
Century France; Technical and Non-technical Determinants'." In Science,
Technology, and War: The Proceedings of the Third Military History
Symposium, edited by Lt. Col. Monte Wright and Lawrence Paszek, 69-74.
Washington, D.C.: U.S. Government Printing Office, 1969.
◦ Shy, John. "Western Military Education, 1700-1850, a Commentary on
Bien's 'Military Education in 18th Century France; Technical and Non-
technical Determinants'." In Science, Technology, and War: The Proceedings
of the Third Military History Symposium, edited by Lt. Col. Monte Wright and
Lawrence Paszek, 60-68. Washington, D.C.: U.S. Government Printing
Office, 1969.
War on Land
• Hacker, Barton C. "Imaginations in Thrall: The Social Psychology of Military
Mechanization, 1919-1939." Parameters 12 (1982): 50-61.
• "Land Warfare," in Van Creveld, Martin L. Technology and War: From 2000 B.C. to
the Present. New York: Free Press, 1991.
• "The Future of Land Warfare," in Fuller, J.F.C. The Reformation of War. New York:
E.P. Dutton and Company, 1923.
Assignments:
• 9/9 - Planning and Direction Work Product due.
Week 4 (9/14 & 9/16) - Warfare, Cybernetics, and Computers: WWII to Vietnam
Readings:
• Peter Galison, "The Ontology of the Enemy: Norbert Wiener and the Cybernetic
Vision," Critical Inquiry 21, no. 1 (Autumn 1994): 228-266.
• Chpt 2, "MIT as System Builder: SAGE," and Chpt 6, "Networking: ARPANET," in
Thomas P. Hughes, Rescuing Prometheus: Four Monumental Projects That Changed
the Modern World, Reprint. (Vintage, 2000).
Recommended:
• "WWMCCS: Worldwide Military Command and Control System" from
GlobalSecurity.org (http://www.globalsecurity.org/wmd/systems/wwmccs.htm)
• Pearson, David E. "Organization, Technology and Ideology in Worldwide Command
and Control." Defense Analysis 15, no. 2 (1999): 197-214.
Week 5 (9/21 & 9/23) - From Igloo White to OODA Loops: Informatic Warfare in
the 1970s & 1980s
Readings:
• Correll, John T. "Igloo White." Air Force Magazine. November 2004, 56-61;
http://www.afa.org/magazine/Nov2004/1104igloo.asp
• Chpt 4, "Military Innovation in the Shadow of Vietnam: The Offset Strategy," in
Tomes, Robert R. U.S. Defense Strategy from Vietnam to Operation Iraqi Freedom:
Military Innovation and the New American Way of War, 1973-2003. London:
Routledge, 2007.
• William Perry, "Perry on Precision Strike," Air Force Magazine 80, no. 4,
http://www.afa.org/magazine/April1997/0497perry.asp.
• Grant T Hammond, The Essential Boyd, 2000.
• Romjue, John L. "The Evolution of the Airland Battle Concept." Air University
Review, May-June (1984); http://www.airpower.maxwell.af.mil/airchronicles/
aureview/1984/may-jun/romjue.html
Week 6 (9/28 & 9/30) - From RMA to NCW: The 1990s & Beyond
Readings:
Assignments:
Readings:
• Joseph Nye, Jr. and William Owens, "America's Information Edge," Foreign Affairs,
no. March/April (1996).
• "Summary" in John Arquilla and David Ronfeldt, The Emergence of Noopolitik:
Toward an American Information Strategy (Santa Monica: RAND Corporation,
1999), http://www.rand.org/pubs/monograph_reports/MR1033/MR1033.sum.pdf
• Thomas Barnett, "The Pentagon's New Map," Esquire, March 1, 2003,
http://www.esquire.com/ESQ0303-MAR_WARPRIMER.
• Thomas Barnett and Arthur Cebrowski, "The American Way of War," Transformation
Trends, January 13, 2002.
• Thomas Barnett and Henry Gaffney, Jr., "The Global Transaction Strategy,"
Transformation Trends, December 16, 2002.
Readings:
Readings:
• Michele Zanini and Sean Edwards, "The Networking of Terror in the Information
Age," in Networks and Netwars: The Future of Terror, Crime, and Militancy (RAND
Corporation, 2002), 29-60; http://www.rand.org/pubs/monograph_reports/
MR1382/MR1382.ch2.pdf
• Timothy Thomas, "Al Qaeda and the Internet: The Dange of 'Cyberplanning',"
Parameters, no. Spring (2003): 112-123; http://www.carlisle.army.mil/usawc/
Parameters/03spring/thomas.pdf
• 'Al-Qaeda Online: Understanding Jihadist Internet Infrastructure', Janes Intelligence
Review (2 December 2005).
• 304th MI Bn OSINT Team. 'Sample Overview: Al Qaida-Like Mobile Discussions &
Potential Creative Uses', 304th MI Bn Periodic Newsletter (16 October 2008).
• Melanthia Mitchell, “Cyber sleuths patrol Web for terrorism signs,” Great Falls
Tribune, July 4, 2004, http://www.greatfallstribune.com/news/stories/20040704/
localnews/777400.html.
• Richard Roesler, "Terrorist hunters get mixed welcome," Spokesman Review, May
15, 2004, http://www.spokesmanreview.com/local/
story_txt.asp?date=051504&ID=s1519976.
• Blaine Harden, "In Montana, Casting A Web for Terrorists," The Washington Post,
June 4, 2006; http://www.washingtonpost.com/wp-dyn/content/article/2006/06/
03/AR2006060300530.html
• Mike Carter, "It's 4 a.m. in Montana, and a cyberspy is at work," Seattle Times,
June 16, 2004, http://seattletimes.nwsource.com/html/localnews/
2001957222_montana16m.html.
Assignments:
Readings:
Readings:
Readings:
• Chpt 2, "The Information Battle," in Jon Latimer, Deception in War: The Art of the
Bluff, the Value of Deceit, and the Most Thrilling Episodes of Cunning in Military
History, from the Trojan Horse to the Gulf War (Overlook TP, 2003).
• Chpt 7, "Seizing the Signals," in Dorothy E. Denning, Information Warfare and
Security, 1st ed. (Addison-Wesley Professional, 1998).
• Tracking Ghostnet: Investigating a Cyber Espionage Network (Toronto: Munk Center
for International Studies, University of Toronto, 2009).
• D. Calvin Andrus, "Toward a Complex Adaptive Intelligence Community: The Wiki
and the Blog," Studies in Intelligence 49, no. 3 (2005), https://www.cia.gov/library/
center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/
html_files/Wik_and_%20Blog_7.htm.
• Matthew Burton, "How the Web Can Relieve Our Information Glut and Get Us
Talking to Each Other: Connecting the Virtual Dots," Studies in Intelligence 49, no.
3 (2005), https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-
publications/csi-studies/studies/vol49no3/html_files/
Intelligence_Networking_6.htm.
Recommended:
• Shane Harris, "Intelligence Veteran Aims to Motivate Young Analysts," National
Journal, September 24, 2007, http://www.govexec.com/
story_page.cfm?articleid=38114&dcn=e_wfw.
• "U.S. Intelligence Community A-Space," in Wikipedia, http://en.wikipedia.org/wiki/
US_intelligence_community_A-Space.
• "Intellipedia," in Wikipedia, http://en.wikipedia.org/wiki/Intellipedia.
Assignments:
Readings:
• Intro from Matthew Currier Burden, The Blog of War: Front-Line Dispatches from
Soldiers in Iraq and Afghanistan (Simon & Schuster, 2006).
• Maj. Elizabeth Robbins, "Muddy Boots IO: The Rise of Soldier Blogs," Military
Review, no. Sept-Oct (2007): 109-118; http://usacac.army.mil/CAC/milreview/
English/SepOct07/robbinsengseptoct07.pdf
• Cori E Dauber, "Life in Wartime: Realtime War, Realtime Critique; Fighting in the
New Media Environment," in Military Life: The Psychology of Serving in Peace and
Combat, Vol. 4 Military Culture, ed. Thomas Britt, Carl Castro, and Amy Adler
(Praeger Security International, 2006), 180-210.
• Sean Lawson, "Loosing the Blogs of War: The Advent of Milblogging in the Post-9/11
U.S. Military," (presented at the Association of Internet Researchers Annual
Conference, Vancouver, BC, 2007), http://seanlawson.rhetorical-devices.net/
confpapers/Lawson_Loosing%20the%20Blogs%20of%20War.pdf.
Assignments:
Readings:
Assignments:
Assignments:
• 12/15 & 12/17 - Incident Briefings (if needed).
Policies
Disability Accommodation
The University of Utah seeks to provide equal access to its programs, services and activities
for people with disabilities. If you will need accommodations in the class, reasonable prior
notice needs to be given to the Center for Disability Services, 162 Olpin Union Building,
581-5020 (V/TDD). CDS will work with you and the instructor to make arrangements for
accommodations.
All written information in this course can be made available in alternative format with prior
notification to the Center for Disability Services.
Content Accommodation
The University recognizes that students’ sincerely-held core beliefs may make it difficult for
students to fulfill some requirements of some courses or majors. It is the student’s
obligation to determine, before the last day to drop courses without penalty, when course
requirements conflict with the student’s sincerely-held core beliefs. If there is such a
conflict, the student should consider dropping the class. A student who finds this solution
impracticable may request a content accommodation from the instructor. Though the
University provides, through this policy, a process by which a student may make such a
request, the policy does not oblige the instructor to grant the request, except in
those cases when a denial would be arbitrary and capricious or illegal.
Attendance
You [the student] may not attend a University course unless you are officially registered and
your name appears on the class roll.
The University expects regular attendance at all class meetings. You are not
automatically dropped from your classes if you do not attend. You must officially
drop your classes by the published deadline in the academic calendar to avoid a "W" on your
record.
You are responsible for satisfying the entire range of academic objectives, requirements and
prerequisites as defined by the instructor. If you miss the first 2 class meetings, or if you
have not taken the appropriate requisites, you may be required to withdraw from the
course.
In general, the policy in this course is that extensions will not be given for assignment due
dates. You will know the due dates for all assignments from the beginning of the course
and should plan accordingly to get your assignments turned in on time. If you are absent
from class to participate in officially sanctioned University activities (e.g. band, debate,
student government, intercollegiate athletics), religious obligations, or with instructor's
approval, you should make arrangements to turn your work in ahead of the assigned
deadline. Extensions will only be granted in the case of documented cases of personal or
family illness, a death in the family, or some other serious circumstance. If you believe that
you have such a circumstance, please contact me and we can discuss the possibility of an
extension.
An Incomplete will only be given for work not completed due to circumstances beyond your
control. Additionally, you must be passing the course and have completed at least 80% of
the required coursework to be eligible for an Incomplete. If you feel that you have met
these criteria, please contact me and we will discuss the possibility of an Incomplete, as well
as what would be required for you to see a successful outcome in the course. For more on
the university's policy on Incompletes, see http://www.acs.utah.edu/sched/
handbook/grpolicy.htm.
Finally, extra credit assignments will not be given under any circumstances, and certainly
not in lieu of a missed regular assignment. Your grade will based solely upon your
completion of the assignments identified in this syllabus and quality of your work on those
assignments.
Academic Honesty
It is expected that your work will be your own or, in the case of group exercises and
projects, the original work of you and assigned members of your group. Cases of plagiarism
and/or any other form of cheating will be dealt with severely, either with failure on the
assignment in question or failure for the entire courses depending upon the particular
circumstances. The university's definition of plagiarism is as follows:
Ultimately, it is your responsibility to read and understand the university policy on student
academic conduct (see http://www.admin.utah.edu/ppmanual/8/8-10.html). As they say in
legal proceedings, "Ignorance is no excuse before the law."
WebCT
Students sometimes have difficulty understanding how WebCT works, and sometimes
students find that their personal computers, home Internet connections, or preferred Web
browsers have difficulty working with WebCT. Additionally, WebCT is sometimes quirky and
can have problems. Figuring out how you will use WebCT to suit your needs is entirely your
responsibility. Be persistent when faced with a technical problem—try again before giving
up. Visit the university’s library to use a WebCT-friendly computer. Also, WebCT has an
extensive "Help" function, you can find many discussion forums dedicated to
troubleshooting in WebCT through a Google search, and the university’s TACC office
(http://tacc.utah.edu) exists to help you with WebCT issues. The instructor is your very last
resort for WebCT troubleshooting.