Back to Top
Skip to Site Search Skip to Utility Nav Skip to Top Nav Skip to Left Nav Skip to Content
Close Main Menu

Civil-Military Symposium

Symposium on “Civil-Military Cooperation and International Collaboration in Cyber Operations”

The University of North Georgia Institute for Leadership and Strategic Studies, in collaboration with the Center for Cyber Operations Education and the College of Arts and Letters, invites academics, graduate and undergraduate students, international cadets from foreign military academies, and cadets from U.S. service academies and other senior military colleges, to present papers or posters addressing this topic at the second annual UNG Security Symposium. Through this symposium, UNG and the ILSS intend to contribute to the scholarly discussion of security and strategic issues in this increasingly complex domain.


November 7-9, 2017


UNG Dahlonega Campus
Library Technology Center, 
Third Floor


If you need closed captioning for this event, please email Keith Antonia or call 706 867-4576 before October 28.


Civil-Military Symposium to focus on cyber operations Nov. 8-9 at UNG

Many of the major threats to U.S. national security are occurring in the cyber domain. In a 2015 Department of Defense article, the former U.S. Chairman of the Joint Chiefs of Staff, General Martin Dempsey, noted that civilian infrastructure and businesses “present a significant vulnerability to our nation.” Some of the threats include adversaries that constantly seek “to infiltrate networks and degrade capabilities, disrupt operations, or steal information.” He added that “In cyber, we have competitors, and we have competitors who maybe aren’t as constrained by legal systems and freedoms as we are.”

However, the question of what entity has ultimate responsibility for defending U.S. interests in the cyber domain remains unanswered. The mission of the Department of Defense is to provide military forces needed to deter war and to protect the security of our country. The U.S Department of Homeland Security ensures a homeland that is safe, secure, and resilient against terrorism and other hazards. What is the role of the U.S. Department of State, and how does the U.S. plan to partner with foreign nations? To what extent are other entities, government or commercial, responsible? What is U.S. policy regarding this issue, and is it adequate to the task, now and in the future?  


Major General Stephen G. Fogarty

Chief of Staff of the U.S. Cyber Command

Watch Major General Fogarty's speech.

Major General Stephen G. Fogarty, a native of Savannah, Georgia, was commissioned as a Second Lieutenant in Military Intelligence (MI) in May 1983, after earning his Bachelor of Arts in History at North Georgia College. He also holds a Master of Science in Administration from Central Michigan University, and a Master in Strategic Studies from the U.S. Army War College. His military education includes Airborne School, the Military Intelligence Officer Basic and Advanced Courses, Ranger School, Jumpmaster Course, Combined Arms & Services Staff School, Long Range Surveillance Leaders Course, U.S. Army Command and General Staff College, and the U.S. Army War College.

MG Fogarty’s command tours include the Long Range Surveillance Detachment, 125th MI Battalion, 25th Infantry Division (Light); the 732nd MI Battalion; the 116th MI Brigade and National Security Agency-Georgia; the U.S. Army Intelligence and Security Command; and, most recently, the U.S. Army Cyber Center of Excellence and Fort Gordon.

His Joint and Combined assignments include Chief, Integrated Survey Program, for the United States Special Operations Command; Director, Joint Intelligence Operations Center—Afghanistan; Director of Intelligence, J-2, United States Central Command; and Deputy Chief of Staff, Intelligence, CJ-2, for NATO’s International Security Assistance Force, Afghanistan. During his Joint and Combined assignments, he deployed to Afghanistan three times in support of OPERATION ENDURING FREEDOM.

His other Army assignments include S2, 2d Battalion, 327 Infantry Regiment, S-3, 311th MI Battalion, Chief, Plans and Exercises, Chief, Analysis and Control Element, and G-2 of the 101st Airborne Division (Air Assault); S-2, 2nd Battalion, 75th Ranger Regiment, to include OPERATION JUST CAUSE; S2, 2d Brigade and G2 Operations Officer 25th Infantry Division (Light); and S-2, 75th Ranger Regiment.

His awards and decorations include the Distinguished Service Medal (2 awards), Defense Superior Service Medal (3 awards), Legion of Merit, Bronze Star Medal (2 awards), Defense Meritorious Service Medal, Meritorious Service Medal (5 awards), Joint Service Commendation Medal, Army Commendation Medal (2 awards), Master Parachutist Badge (w/bronze star), Air Assault Badge, and the Ranger Tab.

Major General Fogarty has been married for the past 34 years to the former Sharon Zelasky of Atlanta, Georgia.  


Bill Smullen

Director of National Security Studies at the Maxwell School of Citizenship and Public Affairs

Watch Bill Smullen's speech.

Bill Smullen was appointed as the Director of National Security Studies at the Maxwell School of Citizenship and Public Affairs in June of 2003. He is also Maxwell’s Senior Fellow in National Security and a member of the faculty of Syracuse University’s S.I. Newhouse School of Public Communications as a Professor of Public Relations.

Prior to his appointment at Syracuse University, he was the Chief of Staff to Secretary of State Colin L. Powell and of the U.S. Department of State beginning in January 2001. As principal advisor to the Secretary, he was responsible for monitoring and evaluating the formulation and implementation of departmental policies. He was also involved in the planning and development of concept strategy associated with foreign policy matters.

A professional soldier for 30 years, he retired from the U.S. Army in 1993. His military career included a series of infantry and command and staff assignments at the platoon, company, battalion, brigade and division levels, as well as several public affairs positions including Media Relations Officer at West Point and Chief of Media Relations for the Department of the Army. Overseas Army tours took him to Korea, Panama and twice to Vietnam. His military schooling included the Army’s Command and General Staff College and the Army War College. His military citations include the Defense Superior Service Medal, the Legion of Merit, the Bronze Star Medal, the Army Meritorious Service Medal, the Air Medal, the Combat Infantryman’s Badge and the Parachutist’s Badge.

His last assignment on active duty was Special Assistant to the eleventh and twelfth Chairmen of the Joint Chiefs of Staff, Admiral William J. Crowe, Jr., and General Colin L. Powell. Upon leaving active duty, he became the Executive Assistant to General Powell, assisting with the writing and promotion of his best-selling autobiography, “My American Journey,” published in 1995. From 1993 to 2001 he had daily responsibility for managing the General’s private office and professional activities. Beginning in 1997 he doubled his responsibilities by becoming the Chief of Staff for America’s Promise—The Alliance for Youth, which General Powell chaired from May 1997 to January 2001.

Among his career accomplishments, he has been elected to Syracuse University’s S.I. Newhouse School of Public Communications Hall of Fame, the U.S. Army Public Affairs Hall of Fame, the University of Maine ROTC Hall of Fame, and was chosen as the recipient of the University of Maine 2007 Alumni Career Award, which is the highest honor presented by the University of Maine Alumni Association. He received the 2007 Public Relations Society of America’s Lloyd B. Dennis Distinguished Leadership Award.

He earned a Bachelor of Arts Degree in Business and Economics from the University of Maine in 1962 and a Master of Arts Degree in Public Relations from the S.I. Newhouse School of Public Communications at Syracuse University in 1974.

An accomplished speaker, he appears before audiences nationwide on subjects of contemporary and topical interest. Featured topics includes those from his book, “Ways and Means for Managing Up,” which was published in 2014 by McGraw-Hill. In addition, he has written two more books: “There’ll Never Be Another Beauregard” published in 2014 and “Prime Time Primer” published in 2016.

Colonel Jeffrey Collins

Director of Air Force CyberWorx

Watch Colonel Collins' speech.

Colonel Jeffrey A. Collins directs Air Force CyberWorx, a new venture comprising a public-private design center at the Air Force Academy focused on cyber capabilities and melding military, academic, and industry expertise with state of the art technology and design thinking to solve operational problems. Before his assignment to CyberWorx, Colonel Collins was the Deputy Director for Air Force Cyberspace Strategy and Policy at the Pentagon and also served as the Director of Staff for the Air Force Chief of Information Dominance and Chief Information Officer.

Colonel Collins is the former Research & Technology Director of the Air Force Command and Control (C2) Battlelab and commanded the 766th and 966th Air Expeditionary Squadrons in Afghanistan. He also previously commanded the 19th Services Squadron, Little Rock Air Force Base, Arkansas, where he executed all programs promoting unit cohesion, individual and family resiliency, physical fitness and the quality of life for 5,200 military and civilians and 49,000 retirees.

Colonel Collins was commissioned through the Air Force Reserve Officer Training Corps at Purdue University. He earned graduate and management degrees from Rensselaer Polytechnic, Troy University, and his Ph.D. from Carnegie Mellon University in Pittsburgh. He most recently completed the CIO certificate program at the National Defense University, Washington, D.C. He was honored as the Air Force Field Grade Officer of the Year in 2005 by the Air Force’s Warfighter Integration and Chief Information Officer and won the United States Air Forces in Europe’s Leo Marquez Award for outstanding communications-electronics maintenance in 2004.

Leo Scanlon

Deputy Chief Information Security Officer

Watch Leo Scanlon's speech.

Leo Scanlon is the HHS Senior Advisor for Healthcare and Public Health (HPH) Sector Cybersecurity and the Deputy Chief Information Security Officer for the Department of Health and Human Services. He serves as chairman of the HHS Cyber Security Working Group, which coordinates cybersecurity collaboration between HHS Operating Divisions and their partners in the private sector. He is the executive sponsor of the HHS Healthcare Cybersecurity Communications and Integration Center (HCCIC). The HCCIC supports cyber threat and indicator sharing across HHS Operating Divisions, DoD and civilian agency partners, and healthcare cybersecurity stakeholders in the intelligence and law enforcement communities, and the National Health Information Sharing and Analysis Center (NHISAC).

Leo has worked at the interagency level as a co-chair of the Identity Credential and Access Management sub-committee of the Information Security and Identify Management Committee (ISIMC), and as a tri-chair of the ISIMC. He is co-chair of the Government Advisory Council of the International Information System Security Certification Consortium (ISC2), and government chair of the ACT-IACT Cybersecurity Community of Interest.

Prior to joining HHS, Leo served as the CISO for the National Archives and Records Administration (NARA) from 2005 to 2015. While at NARA, he put in place and matured the agency IT Security Program and the Insider Threat program. He came to federal service from the private sector where he developed cybersecurity programs as a federal contractor and in the telecommunications industry.

Colonel Laszlo Kovacs

Professor at the National University of Public Service

Watch Colonel Kovacs' speech.

colonel kovacsColonel Laszlo Kovacs is a professor at the National University of Public Service (NUPS). He graduated from the Military Technical College as an electronic warfare officer in the Hungarian Army in 1991. During his military career, he served in various positions in different electronic warfare units. He earned his master's degree at NUPS in Budapest in 1999, and his Ph.D. in the field of military technical science in 2004. He has been working in military higher education since 2002.

Colonel Kovacs is a full-time professor in the Department of Electronic Warfare at NUPS, Hungary. He engages in scientific research in cyber warfare, cyber terrorism, information warfare and critical information infrastructure protection. He won the Research Scholarship for the Hungarian Academy of Sciences with cyber terrorism research themes in 2005 and 2009. He leads Ph.D. students as a scientific adviser in the fields aforementioned. He also serves as the head of the NUPS Cybersecurity Research Team.

Dr. Janice Wethington

Chief, National Security Agency - Georgia College of Cyber

Dr. Wethington holds a Ph.D. in mathematics from the University of Georgia and has been working for the Department of Defense since 2005. Her current occupational responsibilities are in cyber-related education and training for intelligence community personnel.

Panels & Posters

 Wednesday, 8 November, 0930 Panel

Topic 1: Building a Civil-Military Framework for Cyber Deterrence
Topic 2: Designing A Military Cyber Strategy for South Africa


Dr. Bryson R. Payne Victor C. Parker Dr. Edward L. Mienie Noelle Cowling, South Africa Moderator: Dr. Robin Dorff
University of North Georgia (UNG) Department of Computer Science UNG Mike Cottrell College of Business UNG Department of Political Science and International Affairs Chair, School for Geospatial Studies and Information Systems. Faculty of Military Science, Stellenbosch University Kennesaw State University, Dean for College of Humanities and Social Sciences


Wednesday, 8 November, 1330 Panel 

Topic 1: Cybersecurity as a Horizontal Issue in Public Service
Topic 2: Cyber-Resilience Strategies for Small Countries
Topic 3: A Taxonomy of National Challenges in Cyber Defense


COL Lazlo Kovacs Dr. Csaba Kraznay Lech Jenczewski, New Zealand Dr. Bruce W. Watson Given Shingange, South Africa Moderator: Matthew (Matt) Stern
Ph.D., Professor, Department of Electronic Warfare, National University of Public Service, Hungary Assistant Professor and Director of Cybersecurity Academy, National University of Public Service, Hungary Associate Professor, University of Auckland, Department of Information Science and Operations Management

Chief Scientist at IP Blox

Professor, Centre for Al Research, Stellenbosch University, South Africa

Visiting Professor, Computer Science, King's College London

Director, Connecting the Dots Training and Consulting Services Vice President, Cyber for Intelligent Waves, LLC.

Thursday, 9 November, 1000 Panel

Topic 1: Classification of Web Service-based Attacks and Mitigation Techniques
Topic 2: Hybrid Wars: The 21st Century's New Threats to Global Peace and Security
Topic 3: Is Cyber Shape Shifting


Mr. William T Bond Dr. Sascha Bachmann, Sweden Dr. Bruce W. Watson Mr. Neal Kushwaha, Canada Moderator: Alfred S. Barker, MSIS
Master of Information Technology Graduate Student, Department of Information Technology, College of Computing and Software Engineering, Kennesaw State University, Georgia, USA The Media School: Swedish Defence University (FHS): Bournemouth University,
Interview on Hybrid Warfare

Chief Scientist at IP Blox

Professor, Centre for Al Research, Stellenbosch University, South Africa

Visiting Professor, Computer Science, King's College London

Founder and CEO, Impendo Inc. Assistant Vice Chancellor/CISO, Cybersecurity, Board of Regents, University System of Georgia

Poster Presentations

Cadet Shintaro Shiga, National Defense Academy of Japan
Iuri Khijakadze, Davit Aghmashenebeli National Defence Academy of Georgia Cadet Vinícius Chitolina, Argulhas Negras Military Academy, Brazil 2nd. Lt. Federico Lagrasta, Army Institute for Applied Military Studies (Scuola di Applicazione), Turin, Italy Bradford T. Regeski, University of North Georgia
Title: "Challenges and Advantages in Civil-Military Partnerships for Cyber Operations" Title: "Civil-military cooperation and international collaboration in cyber operations" Title: “Use of force in cyberspace under Article 2(4) of the UN Charter: an analysis of Stuxnet virus based on “Schmitt Criteria” in cyber-attacks.” Title: "At War with TOR" Title: "Cyber Mercenaries: Private Entities’ Offensive Intrusions and Militaristic Surveillance Capabilities"
Marek Olšan, University of Defense, Czech Republic Jacob C. Malimban, University of North Georgia Cadet Roger Causey, Virginia Military Institute Lieutenant Andrew Tye, Naval ROTC, The Citadel
Title: "Applying the Kill-Chain Model on an Attack against Military Networks" Title: "Corrupted Certificates" Title: "On the Viability of Open Source in Cyber Security" Title: "VMI Cyber Club" Title: "Efficient Insider Threat Detection System with Proactive Testing"



Discussion Forum

We are excited for you to be a part of the Civil-Military Symposium on November 7-9! In order to help facilitate discussion before and after the symposium, we have created a discussion forum for participants to use.

Please follow the link below, click "Register" in the top-right corner of the page, and then create an account for this discussion board. A message will be displayed that your account is pending approval. Once approved, you can access the board and begin your conversation. We look forward to everyone's posts!

Reading List

@War: The Rise of the Military-Internet Complex

Shane Harris - 2014 - Internet

The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

3D Printing Will Rock the World

John Hornick - 2015 - 3D Printing

In 3D Printing Will Rock the World, author John Hornick presents an insightful look at how 3D printing could potentially change the planet. said "John Hornick's '3D Printing Will Rock the World' Rocks." called it a "must read." Professor Aric Rindfleisch, who teaches the Coursera course, calls it "the best book about 3D Printing available today!" To see what industry experts say, see the back cover.

With chapters titled "Morphing Manufacturing," "Merging Science and Nature," "Shrinking the World and Bringing Jobs Home," "3D Printing New Kinds of Crime," and "Rocking Kids' Futures," Hornick discusses a wide range of topics, including the impact of 3D printing on business and personal life, how mass production could be replaced with production by the masses, 3D printing's legal (and illegal) side effects, and how today's kids will 3D print our future.

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

Joel Brenner - 2011 - Threat

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.

Big Data: A Revolution that will Transform How We Live, Work, and Think 

Viktor Mayer-Shönberger, Kenneth Cukier - 2013 - Big Data

Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?

The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Kim Zetter - 2014 - Offensive Ops

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

Cyber War: The Next Threat to National Security and What to Do About It

Richard Clarke, Robert Knake - 2012 - Strategy

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Cyberpower and National Security

Franklin D. Kramer - 2009 - Strategy

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.

Cybersecurity and Cyberwar: What Everyone Needs to Know

P.W. Singer, Allan Friedman - 2014 Strategy

In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Dark Territory: The Secret History of Cyber War

Fred Kaplan - 2017 - History

As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan.

Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades.

From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles, in fascinating detail, a little-known past that shines an unsettling light on our future.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Bruce Schneier - 2015 - Privacy

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Delivering on Digital: The Innovators and Technologies that are Transforming Government

William D. Eggers - 2016 - Innovation

What if you could file your taxes or open a business online in mere minutes? It's already possible in Estonia. So why are some US government agencies still running software from the 1960s with no upgrades in sight? 

When went live in October 2013, many called the website a catastrophe. For the U.S. Federal government, however, the launch ultimately proved pivotal: it underscored the necessity of digital excellence in public institutions and inspired hundreds of the tech industry’s best and brightest to come to Washington with the singular mission to modernize government. 

So how do you take a government built on analog, industrial-era frameworks and redesign it as a fully digital state? We must imagine a new kind of government. 

Imagine prison systems that use digital technology to return nonviolent offenders promptly and securely into society. Imagine a veterans health care system built around delivering a personalized customer experience for every Vet. We now have the digital tools (cloud computing, mobile devices, analytics) and the talent to stage a real transformation. This book provides the handbook to make it happen. 

William D. Eggers, author of nine books and a leading authority on government reform, knows how we can use tech-savvy teams, strong leadership, and innovative practices to reduce the risks and truly achieve a digitally transformed government.

Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It

Marc Goodman - 2015 - Future

Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services. 

Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.

With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.

Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Joel Brenner - 2013 - Espionage

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.

Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Hackers: Heroes of the Computer Revolution

Steven Levy - 1984 - Hacking

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

Inside Cyber Warfare, Mapping the Cyber Underworld, 2nd Edition

Jeffery Carr - 2011 - Strategy

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

  • Discover how Russian investment in social networks benefits the Kremlin
  • Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa
  • Explore the rise of anarchist groups such as Anonymous and LulzSec
  • Look inside cyber warfare capabilities of nations including China and Israel
  •  Understand how the U.S. can legally engage in covert cyber operations
  • Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations

Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

Ted Koppel - 2015 - Catastrophe

Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.  

It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”  

And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid.  The current Secretary of Homeland Security suggests keeping a battery-powered radio.

In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?

With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.

Our Robots, Ourselves: Robotics and the Myths of Autonomy

David A. Mindell - 2015 - Robotics

From drones to Mars rovers—an exploration of the most innovative use of robots today and a provocative argument for the crucial role of humans in our increasingly technological future.

In Our Robots, Ourselves, David Mindell offers a fascinating behind-the-scenes look at the cutting edge of robotics today, debunking commonly held myths and exploring the rapidly changing relationships between humans and machines.

Drawing on firsthand experience, extensive interviews, and the latest research from MIT and elsewhere, Mindell takes us to extreme environments—high atmosphere, deep ocean, and outer space—to reveal where the most advanced robotics already exist. In these environments, scientists use robots to discover new information about ancient civilizations, to map some of the world’s largest geological features, and even to “commute” to Mars to conduct daily experiments. But these tools of air, sea, and space also forecast the dangers, ethical quandaries, and unintended consequences of a future in which robotics and automation suffuse our everyday lives.

Mindell argues that the stark lines we’ve drawn between human and not human, manual and automated, aren’t helpful for understanding our relationship with robotics. Brilliantly researched and accessibly written, Our Robots, Ourselves clarifies misconceptions about the autonomous robot, offering instead a hopeful message about what he calls “rich human presence” at the center of the technological landscape we are now creating.

Society and the Internet: How Networks of Information and Communication are Changing Our Lives

Mark Graham (Ed.), William H. Dutton (Ed.), Manuel Castells (Forward) - 2014 -Social Media

How is society being shaped by the diffusion and increasing centrality of the Internet in everyday life and work? By bringing together leading research that addresses some of the most significant cultural, economic, and political roles of the Internet, this volume introduces students to a core set of readings that address this question in specific social and institutional contexts. 

Internet Studies is a burgeoning new field, which has been central to the Oxford Internet Institute (OII), an innovative multi-disciplinary department at the University of Oxford. Society and the Internet builds on the OII's evolving series of lectures on society and the Internet. The series has been edited to create a reader to supplement upper-division undergraduate and graduate courses that seek to introduce students to scholarship focused on the implications of the Internet for networked societies around the world. The chapters of the reader are rooted in a variety of disciplines, but all directly tackle the powerful ways in which the Internet is linked to political, social, cultural, and economic transformations in society. This book will be a starting point for anyone with a serious interest in the factors shaping the Internet and its impact on society. 

The Circle

Dave Eggers - 2013 - Social Media

When Mae Holland is hired to work for the Circle, the world’s most powerful internet company, she feels she’s been given the opportunity of a lifetime. The Circle, run out of a sprawling California campus, links users’ personal emails, social media, banking, and purchasing with their universal operating system, resulting in one online identity and a new age of civility and transparency. 

As Mae tours the open-plan office spaces, the towering glass dining facilities, the cozy dorms for those who spend nights at work, she is thrilled with the company’s modernity and activity. There are parties that last through the night, there are famous musicians playing on the lawn, there are athletic activities and clubs and brunches, and even an aquarium of rare fish retrieved from the Marianas Trench by the CEO. 

Mae can’t believe her luck, her great fortune to work for the most influential company in America - even as life beyond the campus grows distant, even as a strange encounter with a colleague leaves her shaken, even as her role at the Circle becomes increasingly public. What begins as the captivating story of one woman’s ambition and idealism soon becomes a heart-racing novel of suspense, raising questions about memory, history, privacy, democracy, and the limits of human knowledge.

The Future of Power

Joseph S. Nye Jr. - 2011 - Smart Power

Power evolves. At the beginning of the twenty-first century, unsurpassed in military strength and ownership of world resources, the United States was indisputably the most powerful nation in the world. But the global information age is rendering these traditional markers of power obsolete. To remain at the pinnacle of world power, the United States must adopt a strategy that considers the impact of the internet on global power resources. The Future of Power examines what it means to be powerful in the twenty-first century and illuminates the road ahead.

The Instigators: How a Small Brand of Digital Activists Risked Their Lives and Helped Bring Down the Government of Egypt

David Wolman - 2011 - Social Media

In 2008, a small band of political activists in Egypt led by a young engineer named Ahmed Maher began organizing on Facebook under the moniker April 6 Youth. Dodging the secret police both online and off, they built a Web page into a movement. Then, in January 2011, they helped architect a final showdown with the country's dictator. David Wolman unspools the riveting behind-the-scenes story of these daring activists and how they planted the digital seeds of a revolution. 

The Net Delusion: The Dark Side of Internet Freedom

Evgeny Morozov - 2011 Social Media

“The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran. But as journalist and social commentator Evgeny Morozov argues in The Net Delusion, the Internet is a tool that both revolutionaries and authoritarian governments can use. For all of the talk in the West about the power of the Internet to democratize societies, regimes in Iran and China are as stable and repressive as ever. Social media sites have been used there to entrench dictators and threaten dissidents, making it harder—not easier—to promote democracy.

Marshalling a compelling set of case studies, The Net Delusion shows why the cyber-utopian stance that the Internet is inherently liberating is wrong, and how ambitious and seemingly noble initiatives like the promotion of “Internet freedom” are misguided and, on occasion, harmful.

The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries

Andrei Soldatov, Irina Borogan - 2015 - Russia

The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.

On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks.

But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad—such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia—there is a radical or an opportunist who is using the web to chip away at the power of the state at home.

Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.

The Seventh Sense: Power, Fortune, and Survival in the Age of Networks

Joshua Cooper Ramo - 2016 - Strategy

Endless terror. Refugee waves. An unfixable global economy. Surprising election results. New billion-dollar fortunes. Miracle medical advances. What if they were all connected? What if you could understand why? The Seventh Sense examines the historic force now shaking our world--and explains how our leaders, our businesses, and each of us can master it.

All around us now we are surrounded by events that are difficult to understand. But every day, new figures and forces emerge that seem to have mastered this tumultuous age. Sometimes these are the leaders of the most earthshaking companies of our time, accumulating billion-dollar fortunes. Or they are successful investors or our best generals. Other times, however, quick success is going to terrorists, rebels, and figures intent on chaos. What if we could know the secret of those who can make sense of this age? What if we could apply it to the questions that worry us most?

In this groundbreaking new book, Joshua Cooper Ramo, author of the international bestseller The Age of the Unthinkable, introduces a powerful way of seeing the world. The Seventh Sense is the story of what all of today's successful figures see and feel--forces that are invisible to most of us but explain everything from explosive technological change to uneasy political ripples. The secret to power now is understanding our new age of networks--not merely the Internet but also networks of trade and DNA and finance. Based on his years of advising generals, CEOs, and politicians, Ramo takes us into the opaque heart of our world's rapidly connected systems and teaches us what the victors of this age know--and what the losers are not yet seeing.

But The Seventh Sense won't merely change the way you see the world. It will also give you the power to change it.

Wired for War: The Robotics Revolution and Conflic in the 21st Century

P.W. Singer - 2009 - Robotics AI

P. W. Singer explores the great­est revolution in military affairs since the atom bomb: the dawn of robotic warfare

We are on the cusp of a massive shift in military technology that threatens to make real the stuff of I, Robot and The Terminator. Blending historical evidence with interviews of an amaz­ing cast of characters, Singer shows how technology is changing not just how wars are fought, but also the politics, economics, laws, and the ethics that surround war itself. Travelling from the battlefields of Iraq and Afghanistan to modern-day "skunk works" in the midst of suburbia, Wired for War will tantalize a wide readership, from military buffs to policy wonks to gearheads.

Date Time Event
Nov. 7 (Tuesday) 6:00 p.m. Dinner by invitation with presenters, speakers, symposium organizing group
Nov. 8 (Wednesday) 7:30 a.m. Registration
8:30 a.m.  Welcome, administrative remarks and introduce guests and presenters
8:45 a.m.  Speaker - Dr. Wethington, Chief of the National Security Agency - Georgia College of Cyber
Introduced by Dr. Bryson Payne, Director of UNG’s Center for Cyber Operations Education and Professor of Computer Science
9:15 a.m. Discussion and Q & A
9:30 a.m. Panel Discussion:
  • Building a Civil-Military Framework for Cyber Deterrence - Dr. Payne, Dr. Mienie; Victor Parker - University of North Georgia
  • Designing a Military Cyber Strategy for South Africa - Ms. Noelle van der Waag-Cowling - South African Military Academy at Stellenbosch University

Panel Moderator: Dr. Robin Dorff, Kennesaw State University, Dean for College of Humanities and Social Sciences

10:30 a.m. Discussion and Q & A
10:45 a.m. Break - Poster Sessions
11:00 a.m. Keynote Speaker, Major General Fogarty, Chief of Staff, U.S. Cyber Command
Introduced by Dr. Bonita Jacobs, President of the University of North Georgia
11:45 a.m. Discussion and Q & A
12:00 p.m. Lunch Break - No Host
1:30 p.m. Panel Discussion:
  • Cybersecurity as a Horizontal Issue in Public Service - Colonel Kovacs, Ph.D.; Dr. Csaba Krasznay - National University of Public Service, Hungary
  • Cyber-Resilience Strategies for Small Countries - Dr. Watson, Chief Scientist at IP Blox and Professor at Stellenbosch University, S. Africa; and Dr. Jenczewski - University of Auckland, New Zealand
  • A Taxonomy of National Challenges in Cyber Defense -Dr. Watson, Chief Scientist at IP Blox and Professor at Stellenbosch University, S. Africa; Mr. Given Shingange, Consultant and Graduate Student at Stellenbosch University

Panel Moderator: Matthew (Matt) Stern, Vice President, Cyber for Intelligent Waves, LLC.

2:30 p.m. Discussion and Q & A
2:45 p.m. Break - Poster Sessions
3:00 p.m. Speaker, Leo Scanlon, Deputy Chief Information Security Officer for U.S. Department of Health and Human Services
Introduced by Dr. Conner-Kerr, Dean and Professor of the UNG College of Health Sciences and Professions
3:30 p.m. Discussion and Q & A
3:45 p.m. Break
4:00 p.m. Speaker, COL (Ret) Bill Smullen, Director of National Security Studies at Syracuse University
Introduced by Dr. Edward Mienie, UNG Executive Director, Strategic Studies & Partnerships, Associate Professor of Strategic & Security Studies
4:30 p.m. Discussion and Q & A
4:45 p.m. Break
6:30 p.m. Symposium Social and Poster Session
8:00 p.m. End of Day One
Nov. 9 (Thursday) 8:00 a.m. Registration
8:45 a.m. Welcome, administrative remarks and introduce guests and presenters
9:00 a.m. Speaker, COL Collins, Director of Air Force CyberWorx, U.S. Air Force Academy
Introduced by Keith Antonia, UNG Associate Vice President for Military Programs
9:30 a.m. Discussion and Q & A
9:45 a.m.  Break - Poster Sessions
10:00 a.m. Panel Discussion:
  • Classification of Web Service-Based Attacks and Mitigation Techniques - Dr. Shahriar; Mr. Bond - Kennesaw State University
  • Hybrid Wars: The 21st-Century's New Threats to Global Peace and Security - Dr. Sascha Bachmann - The Media School; Swedish Defence University (FHS); Bournemouth University
  • Is Cyber Shape Shifting? - Dr. Watson, Chief Scientist at IP Blox and Professor at Stellenbosch University, S. Africa; and Mr. Kushwaha, Impendo, Inc.

Panel Moderator: Alfred S. Barker, MSIS, Assistant Vice Chancellor/CISO, Cybersecurity, Board of Regents, University System of Georgia

11:00 a.m. Discussion and Q & A
11:15 a.m. Break
11:30 a.m. Speaker - Colonel Kovacs, Director of the National University of Public Service Cybersecurity Research Team, Hungary
Introduced by Dr. Billy Wells, Senior Vice President for Leadership and Global Engagement
12:00 p.m. Discussion and Q & A
12:15 p.m. Recognitions
12:30 p.m. Closing Remarks, Dr. Billy Wells, Senior Vice President for Leadership and Global Engagement
12:45 p.m. End of Conference
Call for Abstracts

We invite scholars to submit abstracts for papers or posters on topics related to Civil-Military Cooperation and International Collaboration in Cyber Operations. Possible topics include:

  • Identify the entity that has ultimate responsibility for defending U.S. interests in the cyber domain. Is it the U.S. Department of Defense, the U.S. Department of Homeland Security, or other entity, government or commercial?
  • The extent to which the U.S. military should collaborate through training and education with military allies, U.S. government, and private entities in cyber operations.    
  • Determine U.S. policy related to U.S. national security in the cyber domain, including the role of the U.S. Department of State and partnering with foreign nations. Is U.S. policy adequate to the task now and in the future? 
  • Define and identify examples of “hostile acts” or “acts of war” involving engagements in cyberspace. Are cyber engagements acts of war when there is no imminent threat to human life? Are cyber-physical attacks (cyber-based attacks with kinetic effects, like shutting down a power grid, sabotaging traffic lights in a busy city, shutting down hospital systems, opening a dam) that threaten human life considered acts of war? How does the right to self-defense change in cyberspace?
  • The application of the Just War Theory to acts of cyber aggression and cyber espionage. 
  • Attribution (determining who launched an attack) in cyber. How certain must a nation be that an attack came from a particular source before taking retaliatory action? Do cyber attacks from a rogue entity inside a sovereign state justify the use of force (cyber and/or kinetic) against that state?
  • Cyber attacks against U.S. and allied economic interests. Do massive cyber attacks against private sector entities constitute acts of war? What civil-military response/use of force is appropriate to protect the economic security interests of the U.S. and our allies?   

Extended papers from selected abstracts will be published by the University of North Georgia Press in a peer-reviewed and edited Symposium Monograph.

The November 7-9, 2017 Symposium will consist of

  • Panel Presentations (15-20 minute individual papers),
  • Roundtable discussions/Q&A sessions, and
  • Poster Sessions

Submission Guidelines

For Panel Sessions: Please submit abstracts (500 words) and short bio (150 words) by Aug 22, 2017 to and OR and Papers will be a maximum 20 minutes in length. Participants will be notified of acceptance by September 1, 2017

For Poster Sessions: Undergraduate and graduate students and cadets are invited to submit poster proposals (250 words) and short bio (150 words) by Aug 22, 2017 to [see above]. Bios should include Name, Phone, Email, University, Location, and Poster Title. Posters should be 36 inches x 48 inches in landscape or portrait layout orientation. Participants will be notified of acceptance by September 1, 2017

Aug. 2 Close call for abstracts
Aug. 16 Notify authors of abstracts accepted for publication and symposium presentation
Nov. 7 Dinner for speakers, presenters and symposium papers due to the UNG Press
Nov. 8-9 Symposium
Jan. 31 Presenters: Symposium papers due to the UNG Press
Feb. 28 Presenters: Organizing Group editors' single blind peer review reports on completed papers due
March 15 Presenters: Author revisions of papers due
March 30 Presenters: Editorial approval of revisions due
April 16 Presenters: Layout and design due
April 23 Presenters: Proofing notes from authors and editors due
April 30 Presenters:  Final proof due. Send to LS for printing.
May 23 Presenters: Symposium Monograph release digitally and in print
Admin Info

About the Area

The University of North Georgia is located in the foothills of the Blue Ridge Mountains in Dahlonega, Georgia. Site of the first major gold rush in the United States, UNG is also home to the Army’s 5th Ranger Training Battalion, the mountain phase of the elite Ranger School.

Information about lodging and things to do is at the Dahlonega Chamber of Commerce website.

Where to Park

There are 50 spaces reserved for symposium participants who are not UNG faculty, staff or students in parking lot 49 behind the Library Technology Center. The walk from the parking area to the symposium location on the 3rd floor of the Library Technology Center is about 5 minutes.

historic downtown dahlonega square
UNG dahlonega campus at dusk with mountains in background
historic shopping in old houses in historic downtown dahlonega

UNG follows Section 508 Standards and WCAG 2.0 for web accessibility. If you require the content on this web page in another format, please contact the ADA Coordinator.

Back to Top