• Class Number 5622
  • Term Code 2940
  • Class Info
  • Unit Value 6 units
  • Mode of Delivery In Person
  • COURSE CONVENER
    • Prof Roger Bradbury
  • LECTURER
    • Prof Roger Bradbury
  • Class Dates
  • Class Start Date 03/04/2019
  • Class End Date 20/05/2019
  • Census Date 12/04/2019
  • Last Date to Enrol 12/04/2019
  • TUTOR
    • Melanie Broder
SELT Survey Results

The course examines the changing role of intelligence in the cyber age, and the profound national security policy implications that flow from that. It explores new and emerging sources of intelligence emanating from the interactions of people, machines and the environment as these interactions increasingly occur in cyberspace. It examines the new ways in which traditional intelligence is being merged with cyber-intelligence using big data technologies. The role and future of secret intelligence in a world awash with open source information is also analysed. As a course explicitly focusing on a challenge occurring at the nexus of domestic and international policy, this course offers an analytical window into the security challenges of the very near future.

Learning Outcomes

Upon successful completion, students will have the knowledge and skills to:

Upon completion of this course, students should be able to:

1. Evaluate the dynamics of intelligence in the age of cyber.
2. Synthesise a body of knowledge of the role of intelligence in the age of cyber and its impact on national security.
3. Analyse the technical, social and political drivers of cyber-intelligence.
4. Demonstrate a good understanding of the interaction of these drivers through the application of theoretical constructs to practical case studies.
5. Demonstrate a sophisticated appreciation of the emerging forces shaping the future of cyber-intelligence  through written and oral work.
6. Demonstrate an enhanced capacity to conduct independent research through written and oral work.

Research-Led Teaching

The course is convened by Roger Bradbury, who is actively engaged in cyberspace research with national and international colleagues. He leads theStrategy and Statecraft in Cyberspace research program at the National Security College. He was also, from 2005-2015, the principal cyber analyst for the Office of National Assessments. His main areas of research are on hegemony in cyberspace, information warfare and cyber terrorism. Melanie Broder, the course tutor, is undertaking a PhD on cyber deterrence in the program.

Required Resources

Details available on Wattle

Details available on Wattle

Staff Feedback

Students will be given feedback in the following forms in this course:
  • Written comments
  • Verbal comments
  • Feedback to the whole class, to groups, to individuals, focus groups

Student Feedback

ANU is committed to the demonstration of educational excellence and regularly seeks feedback from students. Students are encouraged to offer feedback directly to their Course Convener or through their College and Course representatives (if applicable). The feedback given in these surveys is anonymous and provides the Colleges, University Education Committee and Academic Board with opportunities to recognise excellent teaching, and opportunities for improvement. The Surveys and Evaluation website provides more information on student surveys at ANU and reports on the feedback provided on ANU courses.

Class Schedule

Week/Session Summary of Activities Assessment
1 Day 1 9.00 am 10 April 2019 Introduction — Cyberspace and the problem of intelligence Roger Bradbury Lecture, no assessment
2 Day 1 10:00 am 10 April 2019 New and emerging sources of intelligence in the cyber age Roger Bradbury Lecture, no assessment
3 Day 1 11.30 am 10 April 2019 Security’s agency quagmire Guest lecture - Jack Waterford Lecture, no assessment
4 Day 1 2.00 pm 10 April 2019 Tutorial & syndicate work Submit policy brief by 6 pm
5 Day 2 9:00 am 12 April 2019 The future of human intelligence in the cyber age Roger Bradbury Lecture, no assessment
6 Day 2 10:00 am 12 April 2019 Intelligence collection by non-state actors Guest lecture - Toby Feakin Lecture, no assessment
7 Day 2 11:30 am 12 April 2019 Cyber-enabled information warfare Roger Bradbury Lecture, no assessment
8 Day 2 2:00 pm 12 April 2019 Tutorial & syndicate work Submit policy brief by 6 pm
9 Day 3 9.00 am 15 April 2019 Information, privacy and aggregation Guest lecture - Adam Henschke Lecture, no assessment
10 Day 3 10.00 am 15 April 2019 Open source intelligence and big data Roger Bradbury Lecture, no assessment
11 Day 3 11.30 am 15 April 2019 Experimental intelligence: A looming metamorphosis Roger Bradbury Lecture, no assessment
12 Day 3 2:00 pm 15 April 2019 Tutorial & syndicate work Submit policy brief by 6 pm
13 Day 4 9:00 am 17 April 2019 Cyber deterrence Guest lecture - Melanie Broder Lecture, no assessment
14 Day 4 10.00 am 17 April 2019 Counter-intelligence in the cyber age Guest lecture - David Irvine Lecture, no assessment
15 Day 4 11:30 am 17 April 2019 Reflections — Cyberintelligence and security: lessons for Australian policymakers Roger Bradbury Lecture, no assessment
16 Day 4 2:00 pm 17 April 2019 Tutorial & syndicate work Submit policy brief by 6 pm Submit research essay by 11.55 pm 13 May 2019

Tutorial Registration

Tutorials and syndicate work will be conducted each afternoon of the course

Assessment Summary

Assessment task Value Due Date Return of assessment Learning Outcomes
Day 1 Policy brief 10 % 10/04/2019 12/04/2019 1,2,3,4,5,6
Day 2 Policy brief 10 % 12/04/2019 15/04/2019 1,2,3,4,5,6
Day 3 Policy brief 10 % 15/04/2019 17/04/2019 1,2,3,4,5,6
Day 4 Policy brief 10 % 17/04/2019 23/04/2019 1,2,3,4,5,6
Research essay 60 % 13/05/2019 04/07/2019 1,2,3,4,5,6

* If the Due Date and Return of Assessment date are blank, see the Assessment Tab for specific Assessment Task details

Policies

ANU has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University’s academic standards, and implement them. Students are expected to have read the Academic Misconduct Rule before the commencement of their course. Other key policies and guidelines include:

Assessment Requirements

The ANU is using Turnitin to enhance student citation and referencing techniques, and to assess assignment submissions as a component of the University's approach to managing Academic Integrity. For additional information regarding Turnitin please visit the ANU Online website Students may choose not to submit assessment items through Turnitin. In this instance you will be required to submit, alongside the assessment item itself, hard copies of all references included in the assessment item.

Moderation of Assessment

Marks that are allocated during Semester are to be considered provisional until formalised by the College examiners meeting at the end of each Semester. If appropriate, some moderation of marks might be applied prior to final results being released.

Examination(s)

No final exam

Assessment Task 1

Value: 10 %
Due Date: 10/04/2019
Return of Assessment: 12/04/2019
Learning Outcomes: 1,2,3,4,5,6

Day 1 Policy brief

Task

Prepare and submit a policy brief during the tutorial and syndicate session today.

The brief is to respond to the hypothetical cyber event scenario provided in the tutorial.

It is to be written against the briefing template provided.

Due

The brief is due at 6.00 pm on Day 1.

Weighting

10%

Rationale

The purpose of the brief is to test your knowledge and capacity for critical analysis under the pressure of tight time constraints - the type of pressure common in the world of public policy.

If you have been keeping up with the essential reading and contributing to the tutorials and syndicate sessions, you should not need to do any additional research for these briefs.

Assessment Task 2

Value: 10 %
Due Date: 12/04/2019
Return of Assessment: 15/04/2019
Learning Outcomes: 1,2,3,4,5,6

Day 2 Policy brief

Task

Prepare and submit a policy brief during the tutorial and syndicate session today.

The brief is to respond to the hypothetical cyber event scenario provided in the tutorial.

It is to be written against the briefing template provided.

Due

The brief is due at 6.00 pm on Day 2.

Weighting

10%

Rationale

The purpose of the brief is to test your knowledge and capacity for critical analysis under the pressure of tight time constraints - the type of pressure common in the world of public policy.

If you have been keeping up with the essential reading and contributing to the tutorials and syndicate sessions, you should not need to do any additional research for these briefs.

Assessment Task 3

Value: 10 %
Due Date: 15/04/2019
Return of Assessment: 17/04/2019
Learning Outcomes: 1,2,3,4,5,6

Day 3 Policy brief

Task

Prepare and submit a policy brief during the tutorial and syndicate session today.

The brief is to respond to the hypothetical cyber event scenario provided in the tutorial.

It is to be written against the briefing template provided.

Due

The brief is due at 6.00 pm on Day 3.

Weighting

10%

Rationale

The purpose of the brief is to test your knowledge and capacity for critical analysis under the pressure of tight time constraints - the type of pressure common in the world of public policy.

If you have been keeping up with the essential reading and contributing to the tutorials and syndicate sessions, you should not need to do any additional research for these briefs.

Assessment Task 4

Value: 10 %
Due Date: 17/04/2019
Return of Assessment: 23/04/2019
Learning Outcomes: 1,2,3,4,5,6

Day 4 Policy brief

Task

Prepare and submit a policy brief during the tutorial and syndicate session today.

The brief is to respond to the hypothetical cyber event scenario provided in the tutorial.

It is to be written against the briefing template provided.

Due

The brief is due at 6.00 pm on Day 4.

Weighting

10%

Rationale

The purpose of the brief is to test your knowledge and capacity for critical analysis under the pressure of tight time constraints - the type of pressure common in the world of public policy.

If you have been keeping up with the essential reading and contributing to the tutorials and syndicate sessions, you should not need to do any additional research for these briefs.

Assessment Task 5

Value: 60 %
Due Date: 13/05/2019
Return of Assessment: 04/07/2019
Learning Outcomes: 1,2,3,4,5,6

Research essay

Task

Answer the question provided in class on the last day of the course.

Due

11.55 pm 13 May 2019

Length

3,000 words

Weighting

60%

Rationale

The research essay assessment task is an opportunity for you to:

  • apply and improve your research skills using library, electronic and other resources
  • develop your understanding of information and ideas at the frontiers of knowledge regarding cyberintelligence and security
  • apply critical thinking and produce a logical, structured argument
  • develop your ability to write succinctly in an academic style that conforms to conventions on proper referencing

Take time to get a good understanding of what the essay question requires, and think about how you might structure your argument in answer to the question. In conducting your research, be sure to identify and concentrate on only those issues which are directly relevant to the essay question. The purpose of the essay is not to survey a general topic but rather to answer a deliberately-worded, specific question. Ensure that your argument in response to the question is supported by reliable evidence and that the source of evidence is properly referenced. In the introduction to your essay it is a good idea to include a brief explanation of what you think the question requires of you and how you propose to answer it.

Academic Integrity

Academic integrity is a core part of our culture as a community of scholars. At its heart, academic integrity is about behaving ethically. This means that all members of the community commit to honest and responsible scholarly practice and to upholding these values with respect and fairness. The Australian National University commits to embedding the values of academic integrity in our teaching and learning. We ensure that all members of our community understand how to engage in academic work in ways that are consistent with, and actively support academic integrity. The ANU expects staff and students to uphold high standards of academic integrity and act ethically and honestly, to ensure the quality and value of the qualification that you will graduate with. The University has policies and procedures in place to promote academic integrity and manage academic misconduct. Visit the following Academic honesty & plagiarism website for more information about academic integrity and what the ANU considers academic misconduct. The ANU offers a number of services to assist students with their assignments, examinations, and other learning activities. The Academic Skills and Learning Centre offers a number of workshops and seminars that you may find useful for your studies.

Online Submission

The ANU uses Turnitin to enhance student citation and referencing techniques, and to assess assignment submissions as a component of the University's approach to managing Academic Integrity. While the use of Turnitin is not mandatory, the ANU highly recommends Turnitin is used by both teaching staff and students. For additional information regarding Turnitin please visit the ANU Online website.

Hardcopy Submission

For some forms of assessment (hand written assignments, art works, laboratory notes, etc.) hard copy submission is appropriate when approved by the Associate Dean (Education). Hard copy submissions must utilise the Assignment Cover Sheet. Please keep a copy of tasks completed for your records.

Late Submission

Late submission of assessment tasks without an extension are penalised at the rate of 5% of the possible marks available per working day or part thereof. Late submission of assessment tasks is not accepted after 10 working days after the due date, or on or after the date specified in the course outline for the return of the assessment item. Late submission is not accepted for take-home examinations.

Referencing Requirements

Accepted academic practice for referencing sources that you use in presentations can be found via the links on the Wattle site, under the file named “ANU and College Policies, Program Information, Student Support Services and Assessment”. Alternatively, you can seek help through the Students Learning Development website.

Extensions and Penalties

Extensions and late submission of assessment pieces are covered by the Student Assessment (Coursework) Policy and Procedure The Course Convener may grant extensions for assessment pieces that are not examinations or take-home examinations. If you need an extension, you must request an extension in writing on or before the due date. If you have documented and appropriate medical evidence that demonstrates you were not able to request an extension on or before the due date, you may be able to request it after the due date.

Privacy Notice

The ANU has made a number of third party, online, databases available for students to use. Use of each online database is conditional on student end users first agreeing to the database licensor’s terms of service and/or privacy policy. Students should read these carefully. In some cases student end users will be required to register an account with the database licensor and submit personal information, including their: first name; last name; ANU email address; and other information. In cases where student end users are asked to submit ‘content’ to a database, such as an assignment or short answers, the database licensor may only use the student’s ‘content’ in accordance with the terms of service — including any (copyright) licence the student grants to the database licensor. Any personal information or content a student submits may be stored by the licensor, potentially offshore, and will be used to process the database service in accordance with the licensors terms of service and/or privacy policy. If any student chooses not to agree to the database licensor’s terms of service or privacy policy, the student will not be able to access and use the database. In these circumstances students should contact their lecturer to enquire about alternative arrangements that are available.

Distribution of grades policy

Academic Quality Assurance Committee monitors the performance of students, including attrition, further study and employment rates and grade distribution, and College reports on quality assurance processes for assessment activities, including alignment with national and international disciplinary and interdisciplinary standards, as well as qualification type learning outcomes. Since first semester 1994, ANU uses a grading scale for all courses. This grading scale is used by all academic areas of the University.

Support for students

The University offers students support through several different services. You may contact the services listed below directly or seek advice from your Course Convener, Student Administrators, or your College and Course representatives (if applicable).
Prof Roger Bradbury
0419 221 003
Roger.Bradbury@anu.edu.au

Research Interests


Roger Bradbury heads up the Strategy and Statecraft in Cyberspaceresearch program at the National Security College in the Crawford School of Public Policy, Australian National University. He is a complex systems scientist, trained originally as a zoologist. His research interests lie in the modelling and simulation of the dynamics of coupled social and natural systems. In recent years he has worked in the Australian Intelligence Community on the strategic analysis of international science and technology issues. And he is particularly interested in cyberspace as a strategic domain.

Prof Roger Bradbury

Prof Roger Bradbury
0419 221 003
roger.bradbury@anu.edu.au

Research Interests


Prof Roger Bradbury

Melanie Broder
melanie.broder@anu.edu.au

Research Interests


Melanie Broder

Responsible Officer: Registrar, Student Administration / Page Contact: Website Administrator / Frequently Asked Questions