Document 12947292

advertisement
 Final Practicum Report Prepared for the Atlantic Council Cyber Statecraft Initiative May 2013 Yuqi Chen Colleen Kendrick Caitlin Morrison Matt Tranquada American University -­‐ School of International Service
Table of Contents
Event overview • Project summary . . . . Future Planning Documents • Visual preparation timeline . . . • Event preparation check lists . . • School contact lists . . . . • Recommendations . . . . Transition Documents • Logistics Summary o Logistics check list . . . o Reserved locations . . . o Venue maps . . . . o Non-­‐reserved options . . o Catering . . . . o Budget Estimate . . . o Tentative competition agenda . • Marketing o Marketing plan . . . o Social media overview . . o Social media plan . . . Appendix 1 -­‐ Competition Documents . . • Response guide • Intelligence report (working draft) • Intelligence report 2 (working draft) • Grading rubric • Registration form • Competition rules • FAQ • Volunteer form (working draft) • Evaluation form (working draft) • Announcement Flyer • Correspondence letter Appendix 2 -­‐ Logistical Materials . . . • Bon Appetit catering guide • AU Summer conferences guide • Maps o SIS Building map o American University campus/parking maps • Important Contact Numbers 2 . . . . . 3 -­‐ 5 . . . . . . . . . . . . . . . . . . . . 9 -­‐ 14 15 -­‐ 19 20 -­‐ 28 29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 -­‐ 35 36 37 38 -­‐ 39 40 41 -­‐ 42 43 . . . . . . . . . . . . . . . 47 -­‐ 49 50 -­‐ 53 54 -­‐ 56 . . . . . 57 -­‐ 90 . . . . . 91 -­‐ 137 Project Summary
Organization: Atlantic Council Partners: American University, SAIC, Atlantic Council, CCSA Event: Cyber 9/12 Student Challenge Website: www.acus.org Facebook: Cyber 9/12 Student Challenge group Twitter: @cyber912_sc Date and Day of Event: Saturday June 15th, 2013 8am-­‐6pm Location: American University SIS Building, 4400 Massachusetts Ave, NW Washington, DC Planned Number of Attendees: 80 Summary: Cyber 9/12 Student Challenge is a one-­‐day, two round scenario-­‐based cyber policy competition for undergraduate and graduate students. It is designed to combine interactive learning experience with competitive scenario exercise. Students will have the opportunity to interact with expert mentors, judges, and cyber professionals while developing valuable skills in policy analysis and presentation. Event Objectives: • Increase the active participation of students from a wide range of academic disciplines in cyber policy • Promote a better understanding of the policy challenges associated with cyber conflict • Increase visibility and understanding of policy-­‐oriented programs on cyber conflict and cyber security • Engage with Washington-­‐area schools that house computer science, international relations and/or cyber policy programs Competition Design: • Two-­‐Round competition: Teams are provided with detailed scene setting material a few weeks prior to the competition event detailing a major cyber-­‐attack. Round 1 Written Policy Briefs: Teams are tasked with writing a 2500 word policy brief exploring the challenges and providing recommendations for state, military, and industry actors in relation to 3 the cyber incident described in the scenario material. This brief is to be turned in 3 weeks before the student challenge event. Oral presentation: Teams will prepare a 15-­‐minute oral presentation of their policy recommendations and submit a “decision document” detailing the team’s decision process. Judges then select ~5 teams to continue to the second round. Round Two Advancing teams are given a scenario update and have limited time to reformulate a 10 minute response with their adjusted policy recommendations. •
•
•
Team size: 3 to 4 students (undergraduate, graduate, professional degree students) Judges: Two groups of approximately five judges each round. AC-­‐CSI fellows possibly serve for first round, and big name judges recruited with the help of CCSA serve for the second. Prizes: $5,000 to be distributed amongst the top teams and the top individual performers. Convenience •
Address of the event: Address of the event: American University, 4400 Massachusetts Ave NW, Washington, DC 20016 4 School of International Service is located on the corner of Nebraska and New Mexico Avenues. Katzen Arts Center is located on the northern corner of Ward Circle. (If used) Parking space: Parking is free in the SIS building, Katzen Arts Center, and Nebraska parking lots on weekends • Transportation:  To AU main campus: Bus route N2, N3, N4, N6, N8, M4  AU shuttle service is located at the corner of Albermarle St. and 40th St. NW, just outside of Tenleytown Metro Station on the red line, or bus route 31, 32, 36 (Stop: Albemarle). Challenges: • Participation – Secure the participation of a wide range of talented faculty, students, and experts. Design competition to minimize attrition among student participants across the two rounds. • Scenario design – Create and refine scenarios that allow students to apply their knowledge of the current state of cyber conflict and related policy while challenging them. • Publicity – Raise interest in the event in a cost-­‐effective way that reaches as many potential participants as possible. • Competition design – Make the competition enjoyable, challenging, and educational for all the students involved, and if possible engage the wider community of students and faculty in the competition. •
•
•
5 6 Future Planning Guide
7 8 Vi
s
ual
Pr
epar
at
i
onT
i
mel
i
ne
T
hef
ol
l
owi
ngpa
g
e
sc
ont
a
i
nav
i
s
ua
l
r
e
pr
e
s
e
nt
a onoft
heop ma
lme
l
i
nef
orc
ompl
e ng
c
ompe onpr
e
pa
r
a ont
a
s
k
s
.
T
a
s
k
sa
r
ec
ol
orc
ode
dba
s
e
dont
hes
y
s
t
e
mbe
l
ow.
T
hec
he
c
k
l
i
s
t
s
f
ol
l
owi
ngt
hi
ss
e
conde
t
a
i
l
t
hes
a
met
a
s
k
sbr
ok
e
ndownbyc
a
t
e
g
or
y
.
9
10
11
12
13
14
Event Preparation Check Lists
Event Timeline Timeframe 9-­‐6 months prior 5-­‐3 months prior Done 3-­‐2 months prior 8-­‐6 weeks prior One month prior 3 weeks prior Event Day Task Explore Competition Design Finalize Log frame Begin Scenario Design Revise Timeline Draft Grading Rubric Draft Registration Packet Finalize Competition Rules Finalize Competition Design Finalize Registration Packet Competition FAQ sheet Launch competition on AC website, Facebook, Twitter and other social media Open Registration Final Scenario Submission Registration Deadline Webinar First Round Tasks Released Participants for Competition Notified First Round Written brief and Biography due First Round oral briefs and decision documents due 15 Planning Timeframe Done Task 9-­‐6 Launch Meeting months Project Summary or SWOT analysis ( i.e.-­‐ what is the prior goal of this year’s competition) Develop Primary Budget Explore Potential Funding and Sponsors 5-­‐3 Establish Media Partner months Explore Potential Venues prior Meet with Potential Sponsors Project Meeting with Partners Finalize Date for Event Obtain Quotes for Catering and Venue 3-­‐2 Update Budget months Select Presenters and Judges prior Finalize Keynote Speaker Send out Presentation Invitations Confirm Judges One month Create an Event Agenda prior Conference Volunteer Orientation Double Check and Sign Contracts 3 weeks Develop Play by Play for Day of Event prior Email Judges and Keynote with Specifics of Event (parking location) and Media Needs Send Email to Participants with Logistical Details of Parking, Getting to Event, What to Expect (what they need to bring-­‐formatting requirements of presentations) One week Finalize Registration Spreadsheet for the Registration prior Table 16 Marketing and Communications Timeframe 9-­‐6 months prior 5-­‐3 months prior Done 3-­‐2 months prior 8-­‐6 weeks prior One month prior Task Develop Marketing Strategy for Overall Conference Develop Social Media Plan Develop List of Targets Sponsors Identify Possible Media Partnerships Update list of Faculty Associated with Cyber Policy Update list of Student Organizations Mock ups of logo Secure Marketing and Sponsorship Draft Pitch Letter for Student Organizations Draft Pitch Letter for Faculty Draft Competition Flyer and Poster Launch Facebook, Twitter Initial Correspondence to Professors and Schools Initial correspondence with student groups Prepare and Update Conference Website and Registration Website Launch Competition on Website/Facebook/Twitter Webinar production Update Conference Website with Information about Speakers and Scenarios Webinar Update Website with Presenters and Event Details Design Conference Program Create Evaluation Forms PR and Secure News Coverage Set up Social Media for Conference Blog Send Informal Reminders 17 Logistics (venue, food, and AV) Timeframe Done Task 5-­‐3 months Meet with Catering Company prior 3-­‐2 months Send out Announcement for Conference Volunteers prior Continuously Process Registration and Send Receipts and Confirmations to Participants One month Walkthrough of Venue prior Collect Registration Forms (with dietary restrictions and media waiver) from Every Attendee 3 weeks prior 2 weeks prior One week prior Photographer Order Decoration (flowers, etc.) Confirm Space Reservation Develop Volunteer Schedule Make Reservations for Keynote Speaker, Guests, etc. Place Order for Conference Swag Reconfirm all Keynotes: Are their Logistics Set (hotels, specific AV needs, need any other materials, payment) Confirm with AV Finalize Location Logistics (AV needs-­‐mics, etc.) Develop Talking Points Create PowerPoint for Opening/ Closing Ceremonies and Receptions Finalize Name Badges and Tents 18 Wrap up and Follow up Timeframe Done Task One week Send Thank Yous after Evaluations Update Website with Results 2-­‐4 weeks Post any Multimedia Online after Post Event Meeting Finalize Accounts (deposit remaining funds make any relevant payments) Update Important Administrative Documents Lessons Learned, Update Competition Planning Guide 19 School Contact Lists
DC Student Organizations [Updated 4/2013] Name of Organization George Washington University-­‐ National Security Law Association Generic Email George Washington University-­‐Cyberlaw Students Association George Washington University-­‐International Law Society George Washington University-­‐ Student Branch of the Women in International Security DC Chapter George Washington University-­‐International Affairs Society Y ias@gwu.edu http://gwias.com/ Georgetown-­‐International relations Club irc@georgetown.edu gu.roosevelt@gmail.com ils@law.umaryland.edu president@csec.umiacs.umd.e
du defenseintel@gmail.com Georgetown University Roosevelt Institute University of Maryland-­‐International Law Society University of Maryland-­‐Cyber Security Club SAIS Defense and Intelligence Club SAIS-­‐Careers in Diplomacy Howard University -­‐Black Professional in International Affairs Howard University Law-­‐International Law Society Howard University Law-­‐The National Security and Law Society howardbpia@gmail.com 20 Y Y Georgetown Public Policy Student Association Contacte
d in 2013 Y Y Y Y Y Y Y Y Y Y Y Y Non-­‐DC Student Organizations (APSIA Schools, Major Programs) [Updated 4/2013] Name of Organization Columbia University-­‐Defense and Security Student Organization Georgia Institute of Technology-­‐International Affairs Graduate Organization Georgia Institute of Technology-­‐International Affairs Student Organization Princeton University-­‐American Foreign Policy Princeton University-­‐International Relations Council Syracuse University The Maxwell School-­‐
Student Association on Terrorism and Security Analysis Syracuse University The Maxwell School-­‐
Association of Public Diplomacy Scholars Syracuse University The Maxwell School-­‐
International Law Society Tufts University The Fletcher School of Law and Diplomacy-­‐Fletcher Diplomacy Club Tufts University The Fletcher School of Law and Diplomacy-­‐Fletcher Students in Security Tufts University The Fletcher School of Law and Diplomacy-­‐International Communications Club Tufts University The Fletcher School of Law and Diplomacy-­‐International Law Society Tufts University The Fletcher School of Law and Diplomacy-­‐Women in International Security University of California, San Diego-­‐Political Analysis and Strategy Simulations University of California, San Diego-­‐International Law Society University of Denver-­‐Organization of Security Studies University of Denver-­‐Women in International Security University of Michigan School of Public Policy-­‐
International Policy Students Association University of Minnesota School of Public Affairs Student Association Generic Email 21 afp@princeton.edu modelun@princeton.edu satsa@maxwell.syr.edu http://facebook.com/publicdiplomacy ILS@law.syr.edu linked in contact usdils@gmail.com https://sites.google.com/site/goipsa/ University of Minnesota School of Public Policy International Law Society University of Pittsburgh Graduate School of Public and International Affairs-­‐International Law Society University of Southern California -­‐USC Homeland Security Student Organization University of Southern California -­‐Women Leading Policy, Planning, and Development University of Southern California Master of Public Diplomacy-­‐Association of Public Diplomacy Scholars University of Washington -­‐Jackson School Student Association University of Washington -­‐International Law Society University of Washington -­‐Jackson School of International Studies Student Association Yale University-­‐International Relations Association Yale University-­‐ HackYale Yale University-­‐ Yale Forum on International Law Boston University-­‐Graduate International Relations Council Boston University-­‐International Affairs Association http://www.umn.edu/home/ILSlaw apds@usc.edu jssa.uw@gmail.com ils@uw.edu jsissa@uw.edu info@yira.org president@yira.org team@hackyale.com. iaa@bu.edu Boston University-­‐International Law Society ils.busl@gmail.com Boston University-­‐National Security Law Society Boston University-­‐Graduate Student Association gso@bu.edu brandeisirc@gmail.com Brandeis University-­‐International Relations Council https://sites.google.com/site/brandeisirc2/ Brandeis University-­‐Computer Operators Group cog-­‐announce-­‐request@lists.brandeis.edu DePaul University -­‐International Law Society depaul.ils@gmail.com DePaul University International Studies Program-­‐ISACA-­‐DePaul DePaul University -­‐Model United Nations-­‐ Society for International Affairs questions-­‐depaul.siamun@gmail.com. DePaul University International Studies Program-­‐Security Daemons sec-­‐daemons@mailman.depaul.edu 22 Florida International University School of International and Public Affairs-­‐International Law Society Fordham University -­‐Global Law society Monterey Institute -­‐Terrorism Studies Club Monterey Institute -­‐Conflict Resolution Society fordhamgls@gmail.com NYU-­‐International Relations Association NYU -­‐International Relations Society NYU College of Arts and Science-­‐Politics Society NYU School of Public Service-­‐Wagner Policy Alliance NYU Law-­‐Competition, Public Policy, and Development society international.relations.club@nyu.edu cas.intl.relations.club@nyu.edu politics.society.club@nyu.edu NYU Law-­‐International Law Society North Carolina State University -­‐Graduate Association of Public Administration North Carolina State University -­‐Masters of International Studies Graduate Student Association North Carolina State University –Model UN Pennsylvania State University-­‐Political Science Association Pennsylvania State University-­‐International Affairs and debate society Pepperdine University -­‐International Law Society Rutgers, The State University of New Jersey -­‐
Association of International relations internationallawsocietynyu@gmail.com Seton Hall University -­‐International Law Society Seton Hall United Nations Association Seton Hall University -­‐Graduate Diplomacy Council wagnerpolicyalliance@gmail.com ncsu.gapa@gmail.com mis.ugsa@gmail.com ncstatemun@gmail.com mpm294@psu.edu sjm5419@psu.edu ruinternationalrelations@gmail.com Stanford Law-­‐International Law Society Stanford Law-­‐Stanford National Security and the Law Society University of Oregon -­‐International Law Society Boston College Law-­‐International Law society Harvard College-­‐ Cyber Defense Club harvardcyberdefense@gmail.com http://www.hcs.harvard.edu/cyberdefense Harvard-­‐ International relations Council hirc@hcs.harvard.edu 23 http://www.harvardirc.org Harvard College-­‐International Relations on Campus Harvard Kennedy School-­‐Cybersecurity and Policy Caucus at Harvard Kennedy School iroc@hcs.harvard.edu http://www.hcs.harvard.edu/~iroc http://www.facebook.com/pages/Cyber-­‐
Security-­‐Caucus-­‐at-­‐The-­‐Harvard-­‐Kennedy-­‐
School-­‐of-­‐Government/111492132265497 Harvard Law-­‐International Law society Harvard Law-­‐Harvard National Security and Law Society nsla@mail.law.harvard.edu gunner@uchicago.edu University of Chicago-­‐The committee on International Affairs and Public Policy http://harrisschool.uchicago.edu/CIAPP University of Chicago Law-­‐International Law Society ils@law.uchicago.edu University of Chicago Law-­‐Law and Technology Society LTS@law.uchicago.edu MIT-­‐Technology and Policy Student Society UC Berkeley-­‐International Law society UC Berkeley-­‐Security Enthusiasts Club UC Berkeley-­‐IT and Public Policy tpss@mit.edu it_and_pp@lists.berkeley.edu UC Berkeley Law-­‐International Law society ils@law.berkeley.edu Cornell-­‐Briggs Society of International Law cias.cornell@gmail.com http://thecias.org dukeinternationalrelations@gmail.com Cornell International Affairs Society Cornell Security Club Duke international Relations Association Duke University-­‐International Law society Duke Law-­‐Intellectual Property and Cyberlaw Society Duke Law-­‐International Law society Duke -­‐MBA High Tech club University of San Francisco Law-­‐Intellectual property and cyber law society University of San Francisco Law-­‐International Law Society high-­‐tech-­‐club@duke.edu usfils@gmail.com 24 University Faculty (Mostly DC) [Updated 4/2013] First Name Last Name Department/ Program E-­‐mail Contacted in 2013 Tom Eric tk@airpatrolcorp.com novotny@american.edu Y Y mcarroll@wcl.american.edu Y svladeck@wcl.american.edu Y dhunter@wcl.american.edu Y jauffret@gmu.edu Y Robin Littleton Raymond J. Curtis American University-­‐SIS American University-­‐SIS American University-­‐Law school American University-­‐Law school American University-­‐Law school GMU-­‐School of Management GMU-­‐School of Management GMU cyber@gmu.edu rcurts@gmu.edu Y Y Donald GMU-­‐ School of Engineering-­‐ Applied IT dgantz@gmu.edu Y bkang5@gmu.edu Y Asood@gmu.edu Y mkick@gmu.edu Y dhart@gmu.edu Y lbreglia@gmu.edu Y pregan@gmu.edu Y jajodia@gmu.edu Y dhorn@gmu.edu Y matt@devost.net rce26@georgetown.edu libicki@rand.org lotrionc@georgetown.edu npollard@prtm.com ms2382@georgetown.edu js2236@georgetown.edu svisner@csc.com Y Y Y Y Y Y Y Y Kellerman Novotny Michael W. Carroll Stephen I Vladeck David Hunter Jean-­‐Piere Auffret Gantz Brent Kang Arun Sood Mick Kicklighter David Hart Lisa C. Breglia Priscilla M Regan Sushil Jajodia Dolores Izer-­‐Horn Matt Robert Martin Catherine Neal Micah JC Sam Devost Egnell Libicki Lotrionte Pollard Sherr Smart Visner GMU-­‐ School of Engineering-­‐ Applied IT GMU-­‐International Cyber Center GMU-­‐ Center for Infrastructure Protection GMU-­‐Center for Science and Technology Policy GMU-­‐College of Humanities and Social Sciences GMU-­‐College of Humanities and Social Sciences GMU-­‐Center for Secure Information Systems GMU-­‐ Cybersecurity Forum Georgetown-­‐Computer Science Georgetown Georgetown Georgetown-­‐Cyber Project Georgetown Georgetown Georgetown Georgetown 25 Erik Michael Voeten Nelson Dmitriy Zakharov David A Laura Koplow Donohue ev42@georgetown.edu mnelson67@bloomberg.net Y Y dsz2@georgetown.edu Y koplow@law.georgetown.edu lkdonohue@law.georgetown.edu Y Y cfc34@law.georgetown.edu Y draket@law.georgetown.edu Y grier@gwu.edu Y jlewis@csis.org paul.rosenzweig@gmail.com Y Y jjchryan@gwu.edu evincze@gwu.edu Y Y Spike Georgetown-­‐Law School Georgetown-­‐Law School Georgetown-­‐Law school-­‐ Cordero Graduate program Georgetown-­‐Law School-­‐
Zimmerman LLM GWU-­‐School of Grier International Affairs GWU-­‐School of Lewis International Affairs Rosenzweig GWU-­‐Law School GWU-­‐School of Engineering Ryan and Applied Science Vincze GWU-­‐Arts and Science GWU-­‐School of Bowman International Affairs mebowman@gwu.edu Y Stephen Biddle sbiddle@gwu.edu Y Douglas Stuart Shaw Johnson dbs@gwu.edu JohnsonS@ndu.edu. Y Y Lance Hoffman hoffman@seas.gwu.edu Y Paul Kathy Williams Kiernan GWU-­‐ Arts and Science GWU-­‐School of International Affairs GWU (visiting) GWU-­‐ Cyber Center Policy and Research Institute GWU-­‐School of International Affairs JHU pauldw@gwu.edu kiernangroup1@comcast.net Y Y Richard Steven JHU-­‐Political Science JHU-­‐Political Science richard.katz@jhu.edu sdavid1@jhu.edu Y Y Renee John Katz David Marlin-­‐
Bennett Baker JHU-­‐Political Science JHU-­‐ Business School marlin@jhu.edu jb@jhu.edu Y Y Anton Dahbura antondahbura@jhu.edu Y JHU-­‐School of engineering JHU Information Security Institute jhuisi-­‐info@jhu.edu Y Qivon Annan JHU-­‐SAIS Strategic Studies Y Forrest B. Hare JHU-­‐SAIS qannan1@jhu.edu fbh5@georgetown.edu fhare1@jhu.edu Carrie Tina Drake David Jim Paul Julie Eva Georgetown Georgetown Georgetown-­‐Security Studies 26 Y Christine Kunkel JHU-­‐SAIS Strategic Studies ckunkel4@jhu.edu Y Thomas G Mahnken JHU-­‐SAIS Strategic Studies tmahnken@jhu.edu Y Thayer McKell twmckell@jhu.edu Y Michael Bilzor bilzor@usna.edu Y wcbrown@usna.edu Y nardi@usna.edu Y stahl@usna.edu Y needham@usna.edu Y miner@usna.edu Y zotti@usna.edu Y cavaiola@usna.edu michael.schmitt@usnwc.edu Y Y kuehld@ndu.edu sam.liles@gmail.com Y Y ryand@ndu.edu Y jay.parker@ndu.edu Y bolanosa@ndu.edu Y peter.thompson@ndu.edu DukeM@ndu.edu/ christopher.yung@ndu.edu barryc@ndu.edu Y Y Y Y wellsL3@ndu.edu rforno@infowarior.org mwh@cs.umd.edu cwilson8039@gmail.com Y Y Y Y fbaker@rhsmith.umd.edu aclark1@umd.edu Y Y echapman@umd.edu Y Pete Nardi Dave Stahl Donald Needham Steven M. Priscilla H.M. Miner Larry Michael Cavaiola Schmitt Dan Sam Kuehl Liles Dan Ryan Jay Parker Alejandra Bolanos Peter Mark R. Christopher Charles Thompson Duke Yung Barry Linton Rick Michael Clay Wells Forno Hicks Wilson Faye Ann Marie Baker Clark JHU-­‐SAIS Strategic Studies Naval Academy-­‐Computer Science Naval Academy-­‐Computer Science Naval Academy-­‐Computer Science Naval Academy-­‐Computer Science Naval Academy-­‐Computer Science Naval Academy-­‐Computer Science Naval Academy-­‐Political Science Naval Academy-­‐Political Science Naval War College NDU-­‐Information resources Management College NDU NDU-­‐Information resources Management College NDU-­‐College of International Security Affairs NDU-­‐College of International Security Affairs NDU-­‐College of International Security Affairs NDU-­‐Systems Management NDU-­‐INSS NDU-­‐INSS UND-­‐Center for Technology and National Security Policy UMBC UMCP UMUC UMD, Smith School of Business UMD Eric Chapman Maryland Cybersecurity Christopher Brown Zotti 27 center Michel Cukier Scott Ping Rosemary Wibbert Wang Shumba David A. Hall Rajni Goel Moses Garuba Daryl Chao Yanggon Shiva Harris Lu Kim Agadegan Lynch Susan Maryland Cybersecurity center UMD-­‐UMUC-­‐
Cybersecurity/Cybersecurity policy UMD-­‐UMUC-­‐Cybersecurity UMD-­‐UMUC-­‐Cybersecurity Montgomery College Cyber Security Program Howard University-­‐Business school Howard University-­‐
Computer Science Howard University-­‐ Business School Towson-­‐Computer Science Towson-­‐Computer Science Towson-­‐Computer Science MIT-­‐Technology and Policy Program Harvard University-­‐
International Security Program 28 mcukier@umd.edu Y scott.wibbert@umuc.edu ping.wang@umuc.edu rosemary@shumba@umuc.edu Y Y Y david.hall@montgomerycollege.edu Y rgoel@howard.edu Y moses@scs.howard.edu Y dbharris@howard.edu clu@towson.edu ykim0831@gmail.com sazadegan@towson.edu Y Y Y Y tpp@mit.edu Y susan_lynch@harvard.edu Y Recommendations
Marketing •
•
•
•
•
•
Commence marketing further in advance o If going national/international, begin advertising 6 months in advance and select teams early so that they can make travel arrangements (schools often have early deadlines for travel grant applications) Interact with student groups on an ongoing basis Work with professors to integrate the competition into the curriculum (must begin process before the semester starts) Create a marketing video with examples from the 2013 event Expand promotion methods (examples): o Print: posters, leaflets, postcards, programs, T-­‐shirts, etc. o Direct invitation mail and print distribution to relevant faculty or academic departments o Media advertising: web, print, radio and TV o Information table at cyber events o Media releases and promotions o High-­‐profile media partnership: NPR, wired, NGS Sign high-­‐profile keynote speaker/s early to generate interest from students and experts Competition Design • Modify competition rules based on student feedback • Consider coordinating scenario content with Cyber 9/12 Project events • Assess dependencies in mechanical design of competition that create barriers to participation (ie. team size, coaching requirement, competition date) • Find ways to keep teams eliminated early in the competition involved and invested in the event 29 30 Transition Documents
2013 Logistics
31 32 Logistics Check List
Month January Due Date February March April 1-­‐Apr 1-­‐Apr 12-­‐Apr 19-­‐Apr Task Done Launch meeting List of Faculty associated with Cyber Policy List of Student Organizations Description of Competition Begin Scenario Design Explore potential locations Explore potential funding Pitch Letter for Student Organizations Pitch Letter for Faculty Complete Student organization and School contact list Mock ups of logo Budget estimates Design Grading Rubric Project meeting with CCSA Launch Facebook, Twitter Log frame Revise timeline Competition Flyer Finalize Competition design Registration Packet Finalize date for event Competition FAQ sheet Finalize Rules Launch competition on AC website, Facebook, Twitter Registration open Cyber 9/12 at Newseum Finalize scenario design Meeting with OER Exemplar production 33 X X X X X X X X X X X X X X X X X X X X X X X X X X Month May Due Date 3-­‐May 10-­‐May 10-­‐May 13-­‐May 13-­‐May 15-­‐May June 26-­‐May 1-­‐Jun 7-­‐Jun 10-­‐Jun 15-­‐Jun August Done Registration deadline Transfer Meeting/Final Meeting First Round Tasks released Participants for Competition notified Confirm catering/ reception menu Confirm VIP list Webinar Finalize Budget First Round written brief and Bios due Volunteer announcement Send out reminders Order Printed Material Send out itinerary for guests and VIPs Finalize catering and reception set-­‐
up Assemble Participant and VIP packages Staff and Volunteer Orientation Final Walk through of AU Competition event Send Thank you Update website with results Post any multimedia online Post event meeting Evaluations Finalize Accounts (deposit remaining funds make any relevant payments) Update important administrative documents Task (cont’d) 34 Major Dates
Month Task March Due Date April 1-­‐Apr Launch competition on AC website, Facebook, Twitter Registration open Cyber 9/12 at Newseum Volunteer Announcement Registration deadline Transfer Meeting/Final Meeting First Round Tasks released May June 1-­‐Apr 12-­‐Apr 3-­‐May 10-­‐
May 10-­‐
May 13-­‐
May 15-­‐
May 26-­‐
May 15-­‐Jun Launch of Facebook, Twitter Participants for Competition notified Confirm catering/ reception menu Webinar First Round written brief and Bios due Staff and Volunteer Orientation Final Walk through of AU Competition event *Bold items indicate deadlines that effect participants. 35 Reserved Locations
SIS Building Facilities Time Reserved: 8-­‐6pm, June 15th Contact: Alicia Cummings Founders Room Dimensions Capacity/w tables Founders Room 1937 sq feet 130 Founders room set-­‐up without tables Capacity w/o tables 150 Cost Free Stairs leading down to Founders and space to be used for registration, excluding stairs Set up: The space outside of Founders is included. You may use it for coffee in the morning and registration as well. SIS 300 Dimensions Capacity/w tables Capacity w/o tables 40 lecture style SIS 300 754 sq ft 25 hollow square Other potential costs: • Additional Tables: $15 • Easels: $10 • Flip Chart and marker: $ 5 • Additional Chairs: $5 • Table skirt: $15 • Tablecloth: $10 • Table cloths are available at additional cost (outside of table catering service) for Table skirts 10/each, 4.65-­‐5.25 depending on size. 36 Cost Free 37 Non-reserved options
Katzen Theater Capacity Abramson Family 213 recital Hall Rotunda 1st floor 238 Possible other expenses: • Security-­‐ $45/hr • Light or audio operator-­‐ $18 or 16/hr • Equipment rentals-­‐various costs Non Profit Full Day $1913.00 Non Profit Half Day $956.50 $1020.00 $510.00 Rental Package includes: • Access 8am-­‐midnight: corridors, dressing rooms, lobby, stage, audience area • HVAC, basic custodial, open and close of facilities • House audio system with basic announcement and playback (1 mic and CD, MD or Cassette) • House ticketing system • Consultation with production staff • Standard orchestra chairs, music stands, stand lights, conductor’s podium Does not include: • Stage labor • House staff • Special set-­‐ups for stage, seating area, rehearsals, lobby • Security • Special custodial Each event must engage at a minimum: • Facilities Manager (entire duration of the rental) • House manager (Showtime 1 hr before and after) If equipment used, Katzen engineers must be engaged to run equipment or shadow. 38 Mary Graydon Center (Possible Lunch location) MGC 2-­‐6 *Two hr minimum Capacity Varies Cost for all rooms* 225.00/hr Cost* 45.00/hr/room Notes: MGC should be available, but please note that room 6 will be offline due to construction, and room 5 may not be available due to construction as well. We could look at putting you in other MGC spaces on the 2nd floor. •
•
Liability insurance is needed for any external organization who will be using AU's campus, regardless of housing or meeting space. I hope this helps. The rates are not inclusive of DC's 14.5% hotel tax. That tax can be waived if you are able to provide a copy of your DC tax exemption certificate or if you are a 501c3 organization and you can provide a copy of that federal determination letter. 39 Catering
Meal Breakfast Lunch Staffing for lunch Option Early Bird Themed buffet Simple dish with salad Set-­‐up fee for MGC Reception Cost 7.30/person 15.25-­‐15.75/person 15.25-­‐15.75/person 25.00/hr (one staff per 25 people Based on an estimate of $15/person Estimated total 584.00 1,220.00-­‐1,260.00 1,220.00-­‐1,260.00 400.00 150.00 1200.00 Early Bird Continental: 7.30/person for food •
•
•
•
•
•
Assorted Mini European Style Breakfast Pastries, Mini Tea Scones, Mini Muffins Banana, Cranberry, Apple, or Blueberry Breakfast Breads (CHOOSE TWO) Orange and Cranberry Juices Pura Vida Organic Coffee Pura Vida Organic Decaf Coffee Hot water and tea Themed Lunch buffets (15.25-­‐15.75/person) Pan Asian, South of the border, The Italiano (Served with breads, iced tea or lemonade, assorted cookies or chocolate brownies) Simple Dish and one salad (15.25-­‐15.75/ person) Lasagna, Sherry braised beef tips and mushroom alfredo, Cajun chicken, Eggplant and ricotta bake (Served with assorted cookies, iced tea and lemonade) Other Costs: • Staff fee for lunch utilizing china, $25 per hour for minimum 4 hrs, one server per 25 guests. • No china fee in MGC, but at other locations china fee. • Room set up-­‐ $150 for non-­‐university groups. • Non-­‐university groups must provide DC tax exempt Certificate for group or 10% DC tax will be added to invoice. 40 Budget Estimate [Updated 4/29]
Event Budget Summary Event Date: Saturday, June 15, 2013 total budget: 25,000 total participants: 80 Total Budget Estimated Expenses Actual Expenses To-­‐Date Available Budget $20,201 Room set up Description Founders room SIS AU Katzen Center (final round location) Mary Graydon Center (lunch location) Room set up for Mary Graydon Total * The price is in condition of use by AU students or faculty Estimated Cost Actual Cost Difference Notes $0.00 $0.00 $0.00 Free* half day non-­‐
$956.50 $956.50 profit rate 225 p/h, 2 hr $450.00 $450.00 min 150 for non-­‐
university $150.00 $0.00 $0.00 groups $0.00 $1,556.50 $0.00 $1,406.50 Meal Description Estimated Cost Actual Cost Difference A: continental breakfast B: themed lunch buffet or simple dish (lower cost option) C: themed lunch or simple dish (more expensive) $584.00 $1,220.00 $1,260.00 D: Reception reception Staff Total A+B+D $1,200.00 $0.00 $3,004.00 41 Notes $7.30 per person $15.25 per person $ 15.75 per person based on $1,200.00 $15/person $0.00 Total A+C $1,844.00 Total A+C+D $3,044.00 Event promotion Description Website and other social media Facebook promotion Total Estimated Cost $0.00 * $0.00 Actual Cost $0.00 * $0.00 Difference $0.00 * $0.00 Notes 5/ day Estimated Cost $0.00 Actual Cost Difference $0.00 $0.00 $0.00 $0.00 Notes $25/ server/ 25 guests, 4 hr min $25/server/40 guests, 4 hr min Other Description Posters Programs Photography Gifts for judges Lunch Staffing Reception staffing Prizes Staff (AC) Total $400.00 $400.00 $200.00 $5,000.00 $10,000.00 $15,600.00 $200.00 42 $10,000.00 $10,600.00 $0.00 Tentative Competition Agenda
Time 8:00 a.m. Event Breakfast and Registration Location Steps to Founder’s Room 8:30 a.m. 9:00 a.m.-­‐11:30 p.m. Room: Founder’s Teams: # 1-­‐5 Judges: 3 (TBD) Room: SIS 300 Teams: #6-­‐10 Judges: 3 (TBD) 4:00 p.m.-­‐4:15 p.m. 4:15 p.m.-­‐5:00 p.m. Introductory Remarks First Round -­‐ First Session of Presentations 9:05-­‐9:20 Team Presentation #1 9:20-­‐9:25 Judging 9:25-­‐9:30 Feedback 9:35-­‐9:50 Team Presentation #2 9:50-­‐9:55 Judging 9:55-­‐10:00 Feedback 10:05-­‐10:20 Team Presentation #3 10:20-­‐10:25 Judging 10:25-­‐10:30 Feedback 10:35-­‐10:50 Team Presentation #4 10:50-­‐10:55 Judging 10:55-­‐11:00 Feedback 11:05-­‐11:20 Team Presentation #5 11:20-­‐11:25 Judging 11:25-­‐11:30 Feedback Lunch starts 11:30 Keynote speaker 12-­‐12:30 Announcement of First Round Results; 12:30 Lunch Reception 1230-­‐1:30 (Finalist Mentor Lunch) Final Round – Finalist Presentations 2:05-­‐2:20 Team Presentation #1 2:20-­‐2:25 Judging 2:25-­‐2:30 Feedback 2:35-­‐2:50 Team Presentation #2 2:50-­‐2:55 Judging 2:55-­‐3:00 Feedback 3:05-­‐3:20 Team Presentation #3 3:20-­‐3:25 Judging 3:25-­‐3:30 Feedback 3:35-­‐3:50 Team Presentation #4 3:50-­‐3:55 Judging 3:55-­‐4:00 Feedback Break and Judging Prize Ceremony /Concluding Remarks 5:30 p.m.-­‐7 p.m. Optional Networking Happy Hour/Reception 11:30 p.m.-­‐2:00 p.m. 2:00 p.m.-­‐4:00 p.m. 43 Room TBD: ( Katzen Center or Founders Room) 4-­‐5 Teams Judges: 3 (TBD) TBD: (Katzen Center or Founders Room) TBD 44 Transition Documents
2013 Marketing
45 46 Marketing Plan
1. Marketing Objectives Strategy: Academic and Atlantic Council networks primary, social media (Facebook and Twitter) Audience Profile: Primary-­‐ Students (undergraduate, graduate, and professional); Secondary-­‐ Professors and professionals in the cybersecurity realm Positioning • The reputation of the event: AU, Atlantic council, SAIC, and CCSA • The key elements of the program: competitions, networking, mentorships, promotion of the field • What the special interest area is: cybersecurity/policy/law/technology/international relations • Experience Offered: A one day policy-­‐focused simulation where student teams will have the opportunity to brainstorm with mentors and present their policy recommendations to a panel of expert judges • Unique element: cash prize, elite judge, key note speaker, and mentors SWOT Analysis Strengths Weaknesses • Unique event in calendar • Cyber community is DC is small • Strong team/mentor/partner support compared to other fields • Funded • Lack of history for cyber policy • Media and cyber contacts of Atlantic competitions Council • Uncertain funds Opportunities Threats • Affiliation with AU • Clashes with other events taking • Support from CCSA in scenario place in the local area analysis • Lack of interest/attrition • Connections with existing student • Short Timeframe groups • Happens in Summer when school is not in session 2. Communication Strategy Branding • Event name: Cyber 9/12-­‐ Student Challenge • Concept: Working off reputation of Cyber 9/12 project, while emphasizing student dimension 47 •
Logos: Concept: Cyber 9/12 name is dominant, binary code in the middle signifies year of competition Product A policy competition that would give teams of students an opportunity to interact with a realistic cyberattack scenario and assume the role of US policymakers. People who have a classical IR theory training have a better understanding of cyber policy issues than computer scientists, which makes this competition different from the popular cyber hacking competitions. Promotion •
•
Potential media sponsors: C-­‐Span, Wired, NPR Potential participant attractions: 1. Networking opportunity at the physical event (for all participants or only semifinalists) 2. Career/ organizational displays at physical event 3. Town hall Q&A with distinguished judges/panelists •
•
Potential Mentors: Cyber field experts (provided by CCSA) Potential key note speakers: Greg Rattray Marketing Tools • E-­‐mail: messages and flyers sent to academic and professional groups in coordination with the Cyber 9/12 Project: Statecraft After Catastrophes event • Social media: interactive presence on Facebook and Twitter • Website: competition information on separate page on acus.org • Networking: person-­‐to-­‐person promotion at cyber events around DC and in conjunction with Cyber 9/12 Project event 48 3. Key strategies Key Strategies Summary Key initiatives Summary 1. Effectively promote the event through increased promotion activity in local events. •
•
•
Establish event networking routine Establish an outreach network Possible classroom announcement 2. Promote via National Press •
Establish media partnerships 3. Social Media •
4. Promotion via local groups (ypfp, ypun, law students, IR groups, etc.) •
•
•
•
•
•
Creating website, Facebook page, twitter account Send out weekly e-­‐newsletter List-­‐serv in different universities Identify groups Outreach to group leadership Join their Facebook page Attend happy hour 5. Direct contact with professors •
•
•
49 Identify programs/ specific professors Initial email with information Follow up phone calls Social Media Summary
Platforms Twitter Facebook @cyber912_sc Cyber 9/12 Student Challenge group Atlantic Council Website www.acus.org •
•
•
st
Password Novtony13 You have to log in as yourself if you are an administrator and then switch over to the page n/a Facebook
Event page was created on February 1 , and the competition was launched on March 2nd Paid advertisement promotion ($5 per day from April 4th to April 16th) was used to boost audience, with results detailed below. The Facebook page was linked to the Twitter account. Facebook main page 50 1 Facebook ad icon main page 1 Facebook ad promotion – chart 1 Facebook ad promotion -­‐ chart 2 51 Facebook ad promotion -­‐ chart 3 •
•
•
•
•
Total likes: 84. Accumulated reached audiences: 340 The total ‘like’ received during the paid campaign period is 33, with another 14,764 users visiting the page. The first campaign reach peak started immediately after the launch of the paid advertisement, reaching a plateau between April 7th and the Cyber 9/12 Project: Statecraft After Catastrophes event on April 12th. The paid campaign ended on 4/16, with the average reach number decreasing from hundreds to 30. Recommendation for next year: spend at least $300 on paid campaign for 30 days (on the scale of $5-­‐$10 per day) 52 Twitter
•
We tweeted during the Cyber 9/12 Event, which gave us new followers and retweets. 53 Social Media Plan for 2013 Cyber 9/12
Week Platform Action Content April 1 Facebook Post announcement, flyer, and link to registration AC Site Post announcement, flyer, and link to registration Post announcement, flyer, and link to registration Facebook promotion Facebook Promotion analysis; decide on the promotion scale Start page promotion with $5 dollar a day for the first 4days. Expecting 16-­‐30 likes and 100 reads per day. The event Facebook mini icon with brief intro will appear on targeted users' page margin as an advertisement. Admin has the liberty to alter the info, promotion scale, and end day. Analyze the result of the first stage ($5 per day) promotion, increase to $10/day if more promotion is needed. Post, link to registration "Reminder: registration is still open for teams to enter the Cyber 9/12 Student Challenge! $5000 of cash prizes will be awarded, as well as opportunities to work with prominent members of the cyber security community as mentors." Twitter April 6 April 8 Facebook "Join the Atlantic Council & SAIC in the inaugural Cyber 9/12 Student Challenge! Registration is now open for teams to compete in this competition, where students will respond to major day-­‐after cyber incidents and provide policy recommendations to a panel of high level judges from the cyber security field." Join the Atlantic Council & SAIC's Cyber 9/12 Student Challenge! Registration is now open for teams to compete in the challenge featuring major day-­‐after cyber-­‐
attack scenario! 54 On April 12, 2013 we will be hosting our rescheduled flagship event -­‐ Cyber 9/12 Project: Statecraft After Catastrophes. Be sure to join our panel of expert participants during this half-­‐day conference, as a major simulated cyber security breach will continuously evolve, forcing experts to focus on key priorities and sector-­‐specific concerns during a serious cyber incident. While the event will be broadcast live on the web, we have reserved extra space for students and faculty to attend the event in person, including a special Q&A session specifically aimed for student attendees. "Reminder: registration is still open for teams to enter the Cyber 9/12 Student Challenge! $5000 of cash prizes will be awarded, as well as opportunities to work with prominent members of the cyber security community as mentors." Advertise Cyber 9/12 Twitter Post, link to registration Twitter Advertise Cyber 9/12 Event live tweet from Cyber 9/12 Facebook Event live discussion and post Facebook Post, link to online video feed "Thank you for coming to our 9/12 event, it was a great success…" " for those of you that couldn't make it, you can watch the video on our website___________" Facebook Post YouTube Clips from 9/12 Integrate videos with challenge Twitter Post YouTube Clips from 9/12 Facebook Post deadline reminder; advertise judges/speakers Reminder: Registration closes on May 3rd! There is still time to enter your team into the cyber challenge April 12 April 13 April 22 April 29 55 of the year! May 15 Continuous Facebook Twitter AC site Facebook Twitter How to integrate cyber 9/12 content into posts? Post a webinar Post a webinar Post a webinar Update any information on competition (new judges, etc.); link to schools and organizations Re-­‐tweet cyber news and events; update any information on competition (new judges, etc.) 56 Appendix 1:
2013 Competition
Documents
57 58 Response'Guide'
'
This'document'will'guide'you'through'the'materials'you'must'produce'as'part'of'your'response.'
'
For' your' response,' your' team' must' produce' four' potential' policy' responses' that' counteract,' mitigate,' and/or'
disrupt'the'damage'and'continued'threat'of'the'current'cyber'attack.'Keep'these'general'points'in'mind'when'
planning'your'response:'
'
•'Policy'responses'should'go'beyond'purely'technical'solutions,'and'may'include'legal,'political,'and'diplomatic'
responses.'
'
•'Teams'should'consider'a'variety'of'offensive'and'defensive'responses'that'take'into'account'the'roles'of'state,'
corporate,' and' international' actors.' In' particular,' teams' should' consider' the' role' of' cooperation' between'
different'actors'necessary'to'achieve'desired'policy'outcomes.'
'
Written'policy'brief'(maximum'2500Hwords,'approx.'8H10'pages)'
'
Your' team' must' prepare' a' detailed' written' document' that' analyzes' the' implications' of' the' cyber' attack' for'
various' actors' (such' as' government' agencies,' corporate' actors,' and' average' citizens)' and' its' relation' to'
cybersecurity'policy.'Then,'each'team'should'propose'up'to'four'policy'responses'to'deal'with'the'attack.'Each'
policy' response' should' describe' the' purpose' of' the' proposed' policy' action,' the' expected' outcomes,' and' the'
theoretical' justification.' It' should' also' briefly' discuss' the' advantages' and' disadvantages' associated' with' each'
choice'of'action.'Teams'should'be'sure'to'refer'to'and'properly'cite'theoretical'sources'in'preparing'their'written'
briefs.'
'
Decision'document'(oneHpage'form)'
'
Your'team'should'modify'the'policy'options'you'proposed'in'your'paper,'adapting'them'to'fit'the'form'on'the'
next' page.' For' each' option,' perform' a' SWOT' analysis:' summarize' the' most' important' strengths,' weaknesses,'
opportunities,'and'threats'for'each'policy.'It'is'preferred'that'you'fill'out'the'form'in'Microsoft'Word,'retaining'
the'general'twoHpage'format'of'the'form,'but'you'may'fill'it'in'by'hand'if'necessary.'
'
Oral'policy'brief'(15Hminute'presentation)'
'
Building'on'the'policy'options'in'the'decision'document,'design'an'oral'presentation'for'representatives'of'the'
National'Security'Council.'Your'response'should'draw'on'your'discussion'of'the'policy'options'from'the'written'
brief,' while' touching' on' the' strengths,' weaknesses,' opportunities' and' threats' outlined' in' the' decision'
document.'In'addition,'you'must'highlight'one'policy'option'as'your'team’s'preferred'suggestion'to'the'NSC'and'
explain'your'reasoning.'
'
Your' written' brief' is' due' before' the' event,' submitted' via' eHmail' to' cyber912@acus.org' by' May' 26,' 2013.' The'
decision'document'and'oral'policy'brief'are'due'the'day'of'the'competition'event.'
'
'
Cyber'Policy'Question'Presented:'
'
'
Proposed'Policy'Options:'
(a)'
'
'
(b)'
'
'
(c)'
'
'
(d)'
'
'
Analysis'and'Impact'of'Alternatives:'
(a)'
Strengths:'
'
'
'
Weaknesses:'
'
'
'
Opportunities:'
'
'
'
Threats:'
'
'
'
(b)'
Strengths:'
'
'
'
Weaknesses:'
'
'
'
Opportunities:'
'
'
'
Threats:'
Intelligence Report Instructions You and your team will take on the role of the Cyber Policy Working Group, a team of experienced cyber policy experts working for the Cybersecurity Directorate of the National Security Staff. The date is June 15, 2014, and a major cyber incident is occurring that affects US national security. The president needs information on the full range of policy options available to respond to this crisis, and your team has been tasked with developing policy recommendations to pass on to the National Security Council. To do so, you will have to apply your understanding of cybersecurity, law, foreign policy, and security theory to synthesize useful policy measures from limited information. This packet contains information on the background and current situation of a major cyber attack on the United States. The attack takes place in June 2014, and the scenario presents a fictional account of political and economic developments leading up to the cyber incident. You may treat the following pages as nonfiction for the purpose of formulating your response. Keep in mind that you will use the scenario material presented to produce three items: • Written brief: Write an analytical paper, 2500 words maximum, discussing the implications of the cyber attack for different state and non-­‐state actors and exploring the policy options you are recommending in depth. • Oral brief: Prepare a fifteen-­‐minute oral presentation outlining four possible policy responses and recommending one to the National Security Council. • Decision document: Perform a brief SWOT analysis of the four policy options proposed. Refer to the response guide accompanying this intelligence report for details on preparing these items and the decision document form. ____________________________________________________________________________________ Before you begin, keep these tips in mind as you are reading and considering your responses: • Don’t fight the scenario. Assume all information presented is true, and use your energy to explore the implications of that information, not the plausibility. • Think multi-­‐dimensionally. When analyzing the scenario, remember to consider implications for other organizations (ie. industry, military, Dept. of State) and incorporating insights from different disciplines (ie. law, public policy, cybersecurity). • Be creative. Cyber policy is an evolving discourse, and there is no single correct response to the scenario information provided. There are many ideas to experiment with in responding to the crisis. Note: All materials included are fictional and were created for the purpose of this competition. 1 Student Challenge 2013
Intelligence Report Setting the scene… The following scenario presents a fictional cyber incident involving the United States and Russia. The subsequent background is based loosely on the following facts: •
•
•
The advancement in US shale gas production has contributed to lower gas prices around the world and has put the US in the position to become a major natural gas exporter. American energy companies are lobbying the US government for the opportunity to export liquefied natural gas, but so far the only deals that have been passed are with countries the US has free trade agreements with and the United Kingdom. Debate continues over the potential export of natural gas to other European markets. Nations, such as Russia, that are heavily reliant on gas and oil to finance their economy are being affected by lower gas prices. It has been speculated that Russia will enter a recession in the near future. While this is only partly due to oil and gas prices, a further decline in prices could significantly increase the likeliness of a recession. Recent events leading up to June 2014 In the past decade advances in the extraction of shale gas in the United States have had a dramatic effect on the energy landscape worldwide. As the US has increased its energy self-­‐sufficiency through these new technologies, it has demanded less of the world supply and created a buyer’s market for the rest of the world. The European market in particular has seen a dramatic decrease in prices as nations importing gas are placed in a stronger bargaining position relative to those exporting it. An additional factor in this situation is the surprising move by President Obama’s administration to ease restrictions on the export of shale gas, particularly to Europe. This development has come after successful lobbying by American energy companies over those who claimed that the export of natural gas would hurt the US production. Since the change in policy the Department of Energy has approved a flurry of export deals between US companies and European partners. In 2013 the first such approval was given to Sabine Pass in Louisiana, and has quickly been followed by approval for several more companies to ship liquefied natural gas (LNG) around the world. Within the next couple of years, US gas will be responsible for heating millions of Western European homes. Some political observers see this move as related to the cooling off of US-­‐Russia relations that has taken place since the end of the “Reset” policy in 2012. The change in US policy followed an unproductive G20 Leaders’ Summit in September 2013 in which cooperation between the US and Russia on issues such as Syria, Iran, North Korea, and human rights remained elusive. Complicating the tensions has been the recent decline of the Russian economy into recession. With the federal budget closely linked to oil and gas revenues, rumors have started to surface in Russia that this decline is primarily due to the US influence in the European market. The US and US energy companies have been major supporters of planned gas pipelines from Central Asia that would increase European independence from Russian energy suppliers, and now the US exports of LNG that will 2 Student Challenge 2013
Intelligence Report commence soon are driving down the price and demand for Russian gas contracts. The state controlled media has reported that some Russian officials suspect a conspiracy by the US and other countries to prevent Russia from experiencing its own shale gas boom. Cited in these conspiracy theories is the January 2014 withdrawal of ExxonMobil from a joint venture with Russian state oil company Rosneft to provide technical assistance in the extraction of shale gas from Siberia. While the Winter Olympics in February served as a distraction from the economic and political challenges plaguing the international community, these unresolved issues are bound to resurface now that the games have ended. It seems that US-­‐Russian relations will not experience a second reset as tensions continue to grow. The return to hostile politics is already becoming a reality as increasingly anti-­‐American rhetoric is expressed in the Russian media and among pro-­‐Kremlin groups on the Internet. 3 Student Challenge 2013
Intelligence Report From: National Security Staff, Cybersecurity Office To: Cyber Policy Working Group Re: Cyber attack affecting energy industry June 15, 2014 As you are aware, in the past week thirteen oil refineries have been taken off line due to a dangerous piece of malware known as “Cobalt”. This malware has the potential to threaten not only oil refineries and energy infrastructure, but also a much wider range of SCADA systems involved in industry and critical infrastructure. The Department of Homeland Security is spearheading the criminal investigation into the attacks with the help of all relevant government agencies, in addition to several private security firms retained by the energy companies. At the request of the National Security Council, the NSS Cybersecurity Office is contacting your team to solicit national policy solutions to respond to the situation. Given the unprecedented nature of this attack, the President is seeking to assemble the maximum possible range of policy options before determining a course of action. This message is accompanied by several documents to assist your team in preparing its recommendations for the NSC: • Initial report from the DHS lead investigator • Article from the US Times describing the refinery outage • ICS-­‐CERT initial report on Cobalt malware These documents should provide you with enough details on the incident to formulate your policy recommendations. Good luck. 4 Student Challenge 2013
Intelligence Report Department of Homeland Security Preliminary Report on Refinery Outages Summary The Department of Homeland Security is taking the lead in the investigation into the refinery outages that occurred beginning on June 10, 2014. The outages are currently affecting thirteen oil refineries in four different states. Analysis of the refineries’ computer systems indicates that equipment malfunction was caused by a piece of malware called Cobalt. Details • Infected targets belong to three companies: The thirteen confirmed affected refineries belong to three different companies: ExxonMobil (4 refineries, ~1,560,000 bbl/d capacity); Phillips 66 (6 refineries, ~1,138,000 bbl/d capacity); and Chevron (3 refineries, ~891,000 bbl/day capacity). Both ExxonMobil and Chevron are considered part of the five “supermajor” energy companies and are in the Top 10 of the Fortune 500 corporations. Phillips 66 was spun off from ConocoPhillips in 2012, but ConocoPhillips was formerly considered the sixth “supermajor”. All companies are based in the United States. • Attacks were closely coordinated: Malfunctions began to occur at all refineries during a 48-­‐hour window beginning on June 10, 2014. The exact activation method of the malware remains uncertain, although at least one refinery was connected to via a serial port server from an IP address in Russia immediately preceding the attack. • Analysis indicates advanced design: Reverse engineering and analysis of the Cobalt malware is being coordinated by ICS-­‐CERT. They have already determined that Cobalt is an extremely sophisticated piece of malware, with a modular design similar to Stuxnet and Shamoon. Analysis is incomplete, but researchers from Kaspersky Labs have identified at least three zero-­‐day exploits used by the malware as well as four different unique rootkits targeting programmable logic controllers from different vendors. • Code scrubbed of identifying elements: The authors of the Cobalt malware were careful to remove any identifying comments or language from most of the code. However, at least one subprogram contained comments in Russian. The FBI and NSA are working to try to establish the author of the code based on the comments and other distinguishing code features. • Intelligence suggests involvement of Russian hacker: The FBI reports that intelligence obtained from surveillance of a known Russian “black hat” chat forum several months ago indicate a former Russian military hacker may have been involved with the production of code targeting some of the programmable logic controllers affected by the attack under contract by an unknown buyer. Information on the hacker’s background and experience in the Russian military is limited. The FBI is comparing its intelligence to information from other sources. 5 Student Challenge 2013
Intelligence Report • Identification of infections difficult: Investigators have yet to determine a way to scan for systems infected with Cobalt. As a result, all SCADA system operators need to remain on alert for irregularities in operations. • State Department mobilizing diplomatic resources: While not directly involved in the investigation, the State Department is working closely with DHS and the Department of Defense to coordinate requests for information sharing with other governments. Secretary Kerry and the ambassadors to Russia and the UN are being briefed on the situation regularly in preparation for diplomatic action. Analysis • Strong indications of state support: While analysis is ongoing, the complexity of the malware strongly indicates state support in the development of Cobalt. The sophistication of the design rivals Stuxnet, and there are other indications the code required a resource intensive development process. • Attack appears highly planned and targeted: The geographic distribution of the infections supports the theory that the attack specifically targeted these companies and that physical security was breached in order to deliver the code. DHS is investigating the possibility that the attacker may have employed agents on the ground in those areas to infiltrate facilities or compromise staff members with access to supervisory control and data acquisition (SCADA) systems. • Threat not limited to refinery systems: Cobalt poses an ongoing threat to national cybersecurity. Cobalt’s ability to spread via network connections and USB devices could result in widespread computer infections beyond the refineries, similar to the spread of Stuxnet. Critical infrastructure in particular could be at risk because of Cobalt’s ability to cause malfunctions in SCADA equipment. • Defensive strategy complicated: The sophistication of the Cobalt malware could pose challenges for the defense of domestic networks and systems. Defense of national networks could require the involvement of the Department of Defense or other federal agencies to coordinate efforts and provide resources. Private companies may be tempted to employ offensive measures to deter further attacks based on limited information of Cobalt’s source and design. Conclusions Cobalt poses the single biggest threat to US cybersecurity witnessed to date. Stopping Cobalt and mitigating its damage will take a concerted effort from both public and private entities. At the moment, DHS cannot determine a clear motive for the attack, nor can it establish the identity of the attacker. However, indications are that this is a state-­‐supported attack, with some evidence pointing to the involvement of Russia, Russian citizens or Russian-­‐speaking individuals. DHS will coordinate further with the Department of State, the Department of Defense, and intelligence services to develop more information on the origin of the attack.
6 Student Challenge 2013
Intelligence Report The US Times June 14, 2014 Multiple refinery outages threaten summer fuel prices Since at least Wednesday, more than ten oil refineries in four different states have shut down in response to equipment problems, taking almost one-­‐fifth of the United States’ refining capacity offline. While the cause of the outages remains unknown, the loss of refining capacity will almost surely create headaches for a variety of petrochemical consumers. The refineries, located in Texas, Louisiana, Mississippi, and California, are owned by several different companies. Though the affected companies are not disclosing the extent of the outages, the Times has confirmed that refineries owned by ExxonMobil, Chevron, and Phillips 66 are among those affected. These companies are facing millions of dollars in lost revenue for each day their refineries aren’t operating, but beyond the financial damage the effects of this disruption in production are difficult to predict, especially for the country’s fragile economic recovery. The effects of such a mass refinery outage are unknown, but the situation during Hurricane Katrina does share some similarities. Roughly 1.9 million barrels per day of refining capacity in the Gulf Coast was taken offline during the storm, in addition to the shutdown of offshore oil platforms and regional pipelines due to weather and electricity problems. Oil companies lost millions of dollars due to production disruptions, while fuel prices across the US suffered due to supply and transport problems. It is unlikely that the current refinery outages will have the same impact, but if reports on the affected refineries are true, the current refining capacity taken offline is close to 3 million barrels per day. This is a problem because the US has a typical utilization rate of around 95% of refinery capacity, meaning any long-­‐term outage could result in significant supply problems. However, with over 27 days worth of finished gasoline in circulation in the US market according to statistics from the Energy Information Agency, it is unlikely that shortages would become critical for months even with the refineries offline. In the short-­‐term, the most visible effect of the outage will be higher fuel prices for businesses and consumers. Gasoline prices have already risen several cents around the US as the busy summer travel season ramps up. In California, where several refineries have been affected, consumers have already seen price jumps as large as 25 cents. Drivers around the country will almost certainly face additional price increases in the weeks ahead as the oil companies and the government craft a response plan. While economists and analysts continue to focus on the economic damage resulting from the refinery outage, the investigation into causes is just beginning to ramp up. According to one anonymous official, the government has already created an investigatory team to assist the affected companies, but their response has been delayed by the secretiveness of the energy companies involved. Worried about the effects on stock prices, the energy companies have yet to reveal any details on the outages to the public. While few potential clues as to the cause of the outages have been revealed, it is rumored that computer security firms McAfee and Kaspersky Labs have been retained in the cases. This raises the troubling possibility that the outages resulted from a cyber attack or malware infection. If so, many more refineries and other facilities could be at risk. However, sources from McAfee, Kaspersky Labs, and the oil companies still refuse to comment on their involvement in the ongoing incident.
7 Student Challenge 2013
Intelligence Report ICS-­‐CERT ICS-­‐ALERT-­‐13-­‐XXX-­‐XX Initial Report on Cobalt Malware Targeting Energy Industry Summary ICS-­‐CERT is investigating the cyber attacks against oil refineries in the southern and western United States. Initial analysis of the malware used in the attack, nicknamed Cobalt, indicates a sophisticated operation using multiple variants to infect different systems at three separate energy companies. The modular structure of the malware and significant number of previously unknown vulnerabilities used in the code indicate extreme technical proficiency on the part of the attacker and possible state support for the operation. Overview Beginning on June 10, 2014, the three affected companies (ExxonMobil, ConocoPhillips, and Chevron) began experiencing subtle irregularities to refinery operations caused by malfunctioning elements of the supervisory control and data acquisition (SCADA) system, including programmable logic controllers (PLCs). Technicians did not examine the SCADA systems as the source of the malfunctions until equipment damage forced refineries to idle production, delaying the discovery of the malware for several days. The affected companies contacted McAfee and Kaspersky Labs for technical support on June 13, 2014. Recognizing the sophistication of the malware involved, ICS-­‐CERT was contacted the next day to coordinate the investigation. Preliminary forensic analysis of the malware in conjunction with McAfee and Kaspersky Labs indicates a two-­‐part modular structure. The first module infects PCs operating SCADA system control software or connected via a local network to the SCADA control system, with variants for both Linux and Windows devices. Once inside the SCADA network, the first module installs an additional vendor-­‐specific PLC exploit module that causes equipment malfunction. Similar to the Stuxnet malware, initial infection likely occurs via USB drive, though the investigation also indicates use of serial port servers to gain access to refinery networks. Further infections can occur via network shares and SQL databases. However, unlike Stuxnet, the use of multiple vendor-­‐specific PLC exploit tools makes Cobalt a more robust threat to industry. The investigation has already determined that the malware has deployed modules affecting Siemens, Honeywell, GE, and Rockwell Automation equipment. Infection Risk The danger posed to industry and critical infrastructure by Cobalt cannot be understated. Given the adaptive nature of the software, all operators of SCADA systems should be on alert for indications of 8 Student Challenge 2013
Intelligence Report system infection or malfunction. ICS-­‐CERT is working closely with security firms to identify the complete set of SCADA vendors and products potentially affected by Cobalt. While Cobalt is believed to have been deployed as part of a carefully targeted attack, the vulnerabilities utilized in the malware could also allow the software to spread to a far wider range of PCs in the same manner as Stuxnet. Organizations should be careful to isolate industrial production and control networks from connections to outside networks, computers, and portable drives. Additionally, researchers are still working to develop a tool to identify machines infected by Cobalt. Until such a tool is developed, operators should treat all external network connections to infrastructure and industrial control systems as infection risks and act accordingly. Mitigation As ICS-­‐CERT is only in the initial stages of reverse engineering and analyzing this malware, SCADA system vendors and operators are advised to closely monitor the ICS-­‐CERT website for additional information as it becomes available. ICS-­‐CERT strongly encourages all operators of SCADA systems, regardless of vendor, to immediately take defensive action to secure their systems using defense-­‐in-­‐depth principles. ICS-­‐CERT also reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures. However, organizations are reminded to be mindful of legal restrictions on the use of countermeasures in responding to attacks and malicious infections, especially when retaining outside security firms to assist them. Organizations that observe any suspected malicious activity should follow their established internal procedures and report their findings to ICS-­‐CERT for tracking and correlation against other incidents. 9 Student Challenge 2013
Intelligence Report 2 From: National Security Staff, Cybersecurity Office To: Cyber Policy Work Group Re: URGENT UPDATE – Cyber attack affecting energy industry June 16, 2014 Since the last intelligence report was sent to you, the situation has evolved. This brief is to make you aware of several new developments before you brief the NSC. • New infections in Gulf Coast oil pipelines; possible command and control server identified Three different oil pipelines (two intrastate, one interstate) in the Gulf Coast region have been shutdown after malfunctions occurred over the weekend. Analysis shows that they have been infected with the Cobalt malware and that the SCADA systems of the affected pipelines had components from the same vendors seen in the oil refinery attacks. Several other pipelines in the region have been preemptively shutdown to search for possible infections. The shutdowns are causing transport problems for the energy industry in the gulf coast region, and if prolonged a variety of petrochemical production and supply problems could emerge. It is unknown how Cobalt infected the pipelines, but there is still no evidence that any systems outside the oil industry have been affected yet. Additionally, investigators have identified a server in Russia that all three infected pipelines connected to via serial port servers, possibly indicating a command and control server used to activate Cobalt. • DDoS attack in progress against SCADA vendors An ongoing distributed denial of service (DDoS) attack is in progress against the four vendors specified in the report from ICS-­‐CERT, hitting company servers in both the United States and Germany. The NSA has identified a large number of PCs involved in the attack that have known links to botnets operated by the Russia Business Network. The majority of attack traffic seems to be coming from locations in Russia, Eastern Europe, and the Middle East. • Public hysteria growing in reaction to Cobalt; markets affected Following heavy coverage in the news and online over the weekend, the stock market has suffered heavy losses as the trading day opened on Monday. Investors are concerned that the government is not giving companies sufficient legal authority to protect themselves. Citizens are also overwhelming law enforcement and government officials with questions about the vulnerability of critical infrastructure such as water treatment and electrical utilities to infection by Cobalt. Manufacturers have also expressed concerns that their equipment may be infected, and some factories may idle their production lines while they check for evidence of system infection. Please be advised of these developments while making your second presentation. Student Challenge 2013
Judges’ instructions
Instructions and Grading Rubric To the competition judges: Thank you for taking the time to join us for the Cyber 9/12 Student Challenge. This memo will guide you through your role in judging the competition. This memo is divided into three parts: • Student task description • Judge task description • Grading rubric explanation Student task description Each student team, consisting of three to four students, has been asked to complete three separate items before the competition: • Written policy brief (2500 words max.) • Decision document (1-­‐2 pages) • Oral policy brief (15 minutes max.) Based on a fictitious “intelligence report”, student teams take the role of the “Cyber Policy Working Group”, a group of cyber policy experts consulting for the Cybersecurity Office of the National Security Staff. In the wake of a major cyber incident, the group is asked to develop several policy options to present to the National Security Council in response to the crisis. Ideally, each team will develop four policy options to present to the NSC. The written policy brief, submitted and graded several weeks in advance of the competition, asks students to explain the implications of the cyber incident for a variety of private, state, and international actors before explaining the details of the four policy options the team would recommend to the NSC. The decision document focuses solely on the four policy options explored in the brief, and asks teams to briefly outline the advantages and disadvantages in the form of a SWOT (strengths, weaknesses, opportunities, and threats) analysis. Teams are also asked to select the option they recommend most and provide a brief justification. The oral policy brief repackages the information in the written brief and decision document as a 15-­‐
minute presentation intended to brief high-­‐level policy officials. Students are encouraged only the Cyber 9/12 Student Challenge
Judges’ instructions
most vital and relevant information to make their case. Both the decision document and the oral policy brief will be due at the beginning of the competition. Teams advancing to the final round will have to deliver another 10-­‐minute presentation. Intended to challenge participants to respond quickly to changing circumstances, this round presents teams with another “intelligence report” describing changes to the evolving cyber incident. Students have limited time to absorb and analyze the new information before delivering and adapted presentation to a panel of judges who will follow up with questions. Students will receive three scores (written brief, decision document/first oral presentation, and second oral presentation), the first two of which combined determine the teams to advance to the final round, and the sum of all three determines the winning teams. Judge task description Judges will be asked to score one or more of the three major scoring elements: written brief, first oral presentation, and second oral presentation. Regardless of which element you are judging, the scoring rubric is identical. However, procedures vary from element to element. Written brief evaluation For this part of the competition, judges will receive essays to evaluate via e-­‐mail. Judges are asked to read the essay thoroughly and then assess it based on the dimensions of the grading rubric. Judges do not need to correct grammar or provide notations on the essays, but judges are encouraged to prepare brief feedback for teams at their own discretion. However, this feedback will not be distributed to teams before the first round of the competition event has been completed. First oral presentation In this part of the competition, student teams will present their oral policy briefs directly to the panel of expert judges. While presenting, judges will be provided a copy of the team’s decision document, providing a brief outline of participants’ responses for judges to refer to. Judges are asked to refrain from asking teams questions during the first round, and in the interest of fairness comments and feedback on the oral briefs should be saved for the end of the first round session. Judges will fill out the same grading rubric to determine the score. Second oral presentation In this final round of the competition, students will have 10-­‐minutes to present an amended oral policy brief to another panel of expert judges. Once finished, judges will have between 5-­‐ and 15-­‐minutes to question the group about their policy options. Each team will present without the presence of the other teams during this round, so feedback immediately following presentations is permissible, time permitting. Cyber 9/12 Student Challenge
Judges’ instructions
Grading rubric explanation Each element of the score is graded on a 50-­‐point scale. Thus teams will have a maximum possible score of 100-­‐points at the end of the first round, and a maximum score of 150-­‐points at the end of the competition. For each element, the final score is the average of the scores received from each judge. The 50-­‐point score is divided into five dimensions: 1) Clarity and organization (10 pts) 2) Identification of key issues (10 pts) 3) Policy responses proposed (10 pts) 4) Policy knowledge demonstrated (10 pts) 5) Originality/creativity of response (10 pts) Each dimension is rated on a scale of one to ten based on a qualitative scale: Criteria
Clarity and
Organization
10 point response
5 point response
0 point response
Team concisely and
effectively presented their
response to deliver maximum
impact to the reader/listener.
Team effectively expressed
their position, though the
response could be more
concise or coherent.
Identification of key
issues
The team identified and
responded to the most
important policy issues posed
by the scenario.
Policy knowledge
demonstrated
The response exhibited a
thorough, nuanced
understanding of cyber
conflict policy issues.
The proposed policy response
actively and effectively
addresses the scenario
problems.
The team identified only
some of the policy issues
posed by the scenario or
failed to respond to some of
the policy issues identified.
The response exhibited a
limited or selective
understanding of cyber
conflict policy issues.
The proposed policy
response only partially
addresses the scenario
problems or lacked
sufficient justification.
The team exhibited a
distinctive approach to the
scenario problems but
largely drew on a wellknown solution.
Organization of the
response severely
hampered the
effectiveness of the
response.
The team failed to
reference the specific
policy issues associated
with the scenario.
Policy response
proposed
Originality/creativity The team offered innovative
solutions to the scenario
of response
problems that go beyond
canonical policy literature.
The response did not
indicate a specific
knowledge of cyber
conflict policy.
The proposed policy
response is not properly
grounded in cyber
conflict related theory.
The team copied their
policy solutions from
other sources with no
apparent adaptation.
In general, the numerical score for each dimension can be interpreted like this: (10) exceptional, (9)
excellent, (8) very good, (7) good, (6) above average, (5) average, (4) sufficient, (3) lacking, (2) poor,
(1) very poor, and (0) unacceptable.
Cyber 9/12 Student Challenge
Section I: Team Information
School: ____________________________________________________________________________ Location: ___________________________________________________________________________ Primary team contact e-­‐mail: _________________________________________________________ Faculty adviser/coach: _______________________________________________________________ Faculty adviser e-­‐mail: _______________________________________________________________ Number of team members: _______________ Please list below if you have any special needs or accommodations: Section II: Team member information
Team member #1 Name: _____________________________________________________________________________ Major/field of study: _________________________________________________________________ Overall GPA: ______________________ Graduation date: ______________________ E-­‐mail address: _______________________________ Phone number: ______________________ Program: ☐ Undergraduate ☐ Graduate ☐ Doctoral ☐ Professional Briefly explain your interest in/experience working with cyber policy issues: Team member #2 Name: _____________________________________________________________________________ Major/field of study: _________________________________________________________________ Overall GPA: ______________________ Graduation date: ______________________ E-­‐mail address: _______________________________ Phone number: ______________________ Program: ☐ Undergraduate ☐ Graduate ☐ Doctoral ☐ Professional Cyber 9/12 Student Challenge 2013
Briefly explain your interest in/experience working with cyber policy issues: Team member #3 Name: _____________________________________________________________________________ Major/field of study: _________________________________________________________________ Overall GPA: ______________________ Graduation date: ______________________ E-­‐mail address: _______________________________ Phone number: ______________________ Program: ☐ Undergraduate ☐ Graduate ☐ Doctoral ☐ Professional Briefly explain your interest in/experience working with cyber policy issues: Team member #4 Name: _____________________________________________________________________________ Major/field of study: _________________________________________________________________ Overall GPA: ______________________ Graduation date: ______________________ E-­‐mail address: _______________________________ Phone number: ______________________ Program: ☐ Undergraduate ☐ Graduate ☐ Doctoral ☐ Professional Briefly explain your interest in/experience working with cyber policy issues: Cyber 9/12 Student Challenge 2013
Section III: Letter of Interest
Using no more than one page (500 words), explain your team’s interest in participating in the competition and what you hope to gain from the experience. Cyber 9/12 Student Challenge 2013
The Cyber 9/12 Student Challenge
Description and Rules
Updated March 5, 2013
Competition Mission
The Cyber 9/12 Student Challenge is designed to offer students, across a wide range of
academic disciplines, a better understanding of the policy challenges associated with cyber
conflict. Part interactive learning experience and part competitive scenario exercise, the Cyber
9/12 Student Challenge gives students interested in cyber conflict policy an opportunity to
interact with expert mentors, judges, and cyber professionals while developing valuable skills in
policy analysis and presentation. Student teams will be challenged to respond to an evolving
scenario involving a major cyber-attack and analyze the threat it poses to state, military, and
private sector interests. Teams will be judged based on the quality of their policy responses,
their decision-making processes, and their oral presentation to a panel of judges. Along the
way, teams will have the advantage of pre-competition online policy seminars to develop their
policy skills, as well as networking opportunities during the competition to ensure that all
participants have an opportunity to improve their skills.
Importance of the Rules
All participants must be familiar with the rules before participating in the event. Because teams
will be evaluated based on a combination of written and oral tasks, a thorough understanding
of the rules is important to success.
Competition Rules
Rule 1. Format
The Cyber 9/12 Student Challenge consists of a cyber-attack scenario that evolves over the
course of the exercise, prompting teams to modify their policy priorities and recommendations
as part of successive oral presentations.
1
During round one, teams will deliver a 15 minute oral presentation based on written policy
briefs prepared before the competition (see Rule 5 below). Teams will receive feedback from a
panel of judges who will score students based on their oral presentations. The judges’ score on
the oral presentation will be combined with the team score from the more detailed written
policy brief submitted in advance of the competition (see Rule 7 below).
The final round will involve a spontaneous response to an intelligence report that further alters
the original scenario. Teams will have to respond to questions from the panel of judges with
only little preparation, testing their ability to analyze information as a team and synthesize a
response on the spot. Judges will deliver a final evaluation, and winners will be selected based
on the final round scores.
Rule 2. Registration
To be considered for competition, interested teams must submit all registration materials,
including team information and a letter of interest, by the registration deadline. After all
registration materials have been received, teams selected to compete will receive invitations
and competition materials.
Rule 3. Eligibility
All students currently enrolled in an undergraduate, graduate, doctoral, professional, or law
program on the date of the registration deadline are eligible to compete. There is no explicit
major, coursework, or prior experience in cyber conflict necessary to compete, but successful
applicants will have a strong link between cyber conflict policy and their current academic
interest.
Students with an interest in cyber conflict policy from around the world are invited to apply to
compete. However, the Cyber 9/12 Student Challenge cannot guarantee any funds to support
team travel and accommodation expenses. Applicants are encouraged to inquire about funding
from their home institutions.
Rule 4. Team Composition
Each team must include at least two and not more than four students, with teams of three or
four preferred. There are no requirements for team composition based on the majors or
education levels of team members. Each team must also recruit a faculty member to act as
their team coach and mentor. While coaches are not required to take part in the competition
event, their participation is necessary to ensure that all teams have access to assistance in
crafting their responses.
Rule 5. Pre-competition Preparation
Background information on the competition scenario for the first round will be distributed
before the competition. This information will be distributed to all teams after participants have
completed registration and selected teams have been notified. For the first round of the
scenario exercise (see Rule 7), teams will prepare both written and oral policy briefs based on a
2
response to the initial scenario intelligence report. The written policy brief will be due prior to
the competition event. The oral policy brief will be presented at the competition as part of the
first round and must be accompanied by a “decision document” handed to the judges at the
beginning of the competition round (see Rule 7 below). Teams are also required to find a
faculty member to serve as coach who can help review and develop student policy briefs.
Rule 6. Team Selection and Notification
Teams will be selected based on registration materials submitted in accordance with Rule 3.
Selected teams will be notified via e-mail of their invitation to the competition. Teams selected
to participate will complete a supplementary information packet with team photos and
biographies in advance of the competition.
Rule 7. The Scenario Exercise
The competition will focus on a single cyber-attack scenario described through several
intelligence reports. The exercise encompasses tasks, both written and oral, that challenge
students to respond to the political, economic, and security problems created by the evolving
cyber attack scenario. At all stages of the competition, scenario information and tasks will be
distributed in a manner that ensures all teams an equal chance to prepare.
Round One
Teams will be provided with a detailed scenario background packet that sets the scene for the
fictional cyber-attack. This scenario will be focused on a state-supported cyber-attack against
the United States or one of its Allies. Teams will also receive two scenario tasks to prepare
before the competition event.
• Written Cyber Policy Brief
Teams will write a policy brief exploring the challenges faced by state, military, and industry
actors related to the cyber incident described in the scenario materials. The brief must also
recommend appropriate actions and policy responses for the actors involved. The length of the
brief is limited to 2,500 words in length. Further detailed instructions will be distributed to
teams selected for the competition.
• Oral Cyber Policy Brief
Teams will prepare a 15 minute oral presentation of their policy recommendations. This
presentation will be delivered to a panel of judges in the first round of the competition event.
Teams will also be required to submit a “decision document” accompanying their oral
presentation at the beginning of the competition’s first round. The “decision document” will be
a prepared form outlining the team’s decision process. More information about this form and
the oral presentation will be distributed to teams selected for the competition.
3
Final Round
After the completion of Round One, participants will receive another intelligence report. This
intelligence report will describe some change in or escalation of the original scenario and entail
new problems for the actors involved. Teams will be presented with another intelligence report
detailing further changes to the scenario and will be provided with a short amount of time to
use the new information to revise their policy responses.
• Oral Cyber Policy Brief
One at a time, each team will meet with the panel of judges. The teams will present a five
minute response regarding further changes to their policy recommendations, followed by up to
ten minutes of questions from the judges.
Rule 8. Permissible Assistance and Cheating
Before the competition, teams are encouraged to seek outside help to develop their policy
briefs. Teams are expected to rely on their coaches in particular to help develop and revise their
policy ideas for the competition.
During competition events, no outside assistance is allowed for teams. However, teams
advancing from the first to final round may confer with their coaches during the breaks
between stages. During the final round, teams will again not be allowed to rely on outside
assistance.
Teams will not be allowed to use electronic devices such as cellular phones and computers
during the competition events. However, paper notes are highly encouraged.
Cheating during the competition will not be tolerated and will result in the immediate
disqualification of a team. All teams are expected to comply by the rigorous standards of
academic honesty in place at their home institutions. Any team suspected of cheating may be
subject to immediate disqualification. The home institutions of disqualified teams will also be
notified of the disqualification.
Rule 9. Judges
Each round of the competition will be judged by a panel of three experts in cyber conflict policy.
To standardize scoring and encourage consensus, all judges will score the teams based on a
common grading sheet in accordance with Rule 12.
Judges may vary between sessions and rounds subject to their availability.
Rule 10.
Observers, Media and Broadcasting
A limited number of observers may be present at the event. Every effort will be taken to ensure
that they do not disturb or assist any of the participating teams in the competition.
4
The Cyber 9/12 Student Challenge reserves the right to partner with the media to provide live
coverage of the event via broadcast or internet livestream. Additionally, members of the press
may be present to cover the event in person. All participants in the event and observers in the
event are expected to conduct themselves in a responsible and professional manner.
Rule 11.
Timekeeping
Competition staff will manage a clock to keep track of time limits for the presentations. Teams
will be kept advised of the time using a “green-yellow-red” system of cards. At the five-minute
mark a staff member will display a green card to the team presenting; at the one-minute mark a
staff member will display a yellow card; and at the time limit a staff member will display a red
card. A penalty will be assessed for teams exceeding the time limit.
Rule 12.
Team Evaluation and Scoring
All teams will be evaluated based on three main dimensions of their responses: interpretation
of the scenario problems; analysis of policy solutions presented; and quality of writing or oral
presentation. These dimensions will be scored based on a common grading sheet and
instructions shared by all the judges. The resulting numerical scores will be used to determine
the winners of each round.
At the conclusion of each round, teams will be provided specific, detailed feedback on strengths
and weaknesses to improve their policy and presentation skills.
Grading sheets and guidelines will be distributed to all teams in advance of the competition.
Rule 13.
Elimination
In the event a team is eliminated, they are invited to participate in the rest of the competition
as observers. Eliminated or not, all teams are welcome and encouraged to take part in the
networking functions, speeches, and other events accompanying the event. Please note that
eliminated teams are still eligible for some of the prizes and awards to be offered (see Rule 14).
Rule 14.
Prizes and Awards
In addition to the main prize of the competition, the Cyber 9/12 Student Challenge will, at its
discretion, award additional prizes for outstanding achievement during the course of the
competition. The categories of prizes to be offered will be announced before the date of the
competition. Teams will also be eligible for awards based on their final standing in the
competition, and all teams will receive certificates in commemoration of their participation.
Rule 15.
Notification of Rule Changes
The above rules are provided for planning purposes only. The Cyber 9/12 Student Challenge
reserves the right to alter the rules based on logistical and technical considerations. In the
event of changes to the competition rules, a new version of this document will be posted and
distributed to teams before the start of the competition.
5
Frequently Asked Questions
Participation
Who should participate in the Cyber 9/12 Student Challenge? The Student Challenge is designed to offer students across a wide range of academic disciplines a better understanding of the policy challenges associated with cyber conflict. All students enrolled in an undergraduate, graduate, doctoral, professional or law program on the date of the registration deadline with an interest in cyber policy are encouraged to compete. No academic background in cyber policy in necessary. What are the requirements for each team? Teams must be composed of 2-­‐ 4 students, fitting the eligibility requirements listed above. Additionally, each team is required to find a faculty member who can act as their coach and mentor. While coaches are not required to take part in the competition event, their participation is necessary to ensure that all teams have access to assistance in crafting their responses. Why do I need a team? The competition is designed to emulate the decision making process of real life cyber policy. The process, as in real life, requires collaboration and cooperation amongst multiple actors. Do I need to have a background in cyber security or computer studies to participate? No. Unlike many other cyber competitions the Cyber 9/12 Student Challenge focuses on the policy side of cyber security. No technical computer skills are required and there is no explicit major, coursework, or prior experience in cyber security or computer studies necessary to compete. However, as the competition is designed to offer students a better understanding of the policy issues associated with cyber conflict, applicants should be able to demonstrate a strong link between cyber conflict policy and their current academic interest. Can I still participate if I'm not in the Washington DC area? Yes. Students with an interest in cyber conflict policy from around the world are invited to apply to compete. However, the Cyber 9/12 Student Challenge cannot guarantee funds to support team travel and accommodation expenses. Applicants are encouraged to inquire about funding from their home institutions. Registration
How do I register? Registration materials are available at the Atlantic Council’s Cyber Statecraft Initiative website: http://www.acus.org/tags/cyber-­‐statecraft-­‐initiative To be considered for competition, interested teams must submit all registration materials, including team information and a letter of interest, by the registration deadline. After all registration materials have been received, teams selected to compete will receive invitations and competitor materials. When is the registration deadline? All primary registration material must be received by May 3, 2013. This includes the completed application form and letter of interest. Teams selected to participate will complete a supplementary information packet with team photos and biographies. Details on the final deadline for this additional material will be given at a later date. How will I be informed if I have been selected to participate in the Cyber 9/12 Student Challenge? Teams will be selected based on their application and letter of interest. Participants will be notified via e-­‐mail of their invitation to the competition or their elimination by May 10. Can I register as a free agent and then move to a team later? No. Teams must be formed by the final registration deadline. What happens if we add or remove team members? Team members cannot be added after the final registration deadline May 3. If a team member is unable to participate in the competition, the team will be allowed to compete shorthanded, as long as they meet the minimum requirements of 2 students. Competition
What is the best way to prepare for the event? Before the competition teams will have the opportunity view an exemplar policy brief prepared by the Atlantic Council. The exemplar will demonstrate one way in which to diagnose cyber-­‐conflict and determine policy in a similar type of scenario to the one students will encounter. Additionally, to keep up to date on current issues in cyber policy participants are encouraged to visit the Atlantic Council’s Cyber Statecraft Initiative at http://www.acus.org/tags/cyber-­‐statecraft-­‐initiative. Teams should also seek outside assistance, either from their coaches or other mentors, to help develop and revise their policy ideas for the competition. What is the format of the competition? The Cyber 9/12 Student Challenge is a single day competition consisting of two separate rounds. Student teams will be challenged to respond to an evolving scenario involving a major cyber-­‐attack and analyze the threat it poses to state, military, and private sector interests. Both rounds will address the same cyber-­‐ attack, but over the course of the day additional information will require the teams to modify their policy priorities and recommendations. Background information on the competition scenario will be distributed before the competition. Teams will have a couple of weeks before the competition to prepare their written and oral briefs for the June 15th event. During round one, teams will deliver a 15 minute oral presentation based on policy briefs prepared before the competition. Teams will receive feedback from a panel of judges and scores based on their oral presentations. The judges will then select teams to advance to the final round based on the combined scores from their oral presentation and more detailed written policy brief submitted in advance of the competition. The final round will involve a spontaneous response to an intelligence report that further alters the original scenario. Teams will have to respond to questions from the panel of judges with only ten minutes to prepare, testing their ability to analyze information as a team and synthesize a response on the spot. Judges will deliver a final evaluation, and winners will be selected based on the total accumulated scores. What tasks are part of the competition? The exercise encompasses tasks, both written and oral, that challenge students to respond to the political, economic, and security problems created by the evolving cyber-­‐attack scenario. For the first round students are required to produce a policy brief with their recommendations for the US government. Additionally, the teams will present their analysis and recommendations to a panel of judges on the day of the event. Those teams selected to advance to the final around will give an additional 5 minute presentation in response to a scenario prompt. What does the policy memo entail? Teams will write a policy brief exploring the challenges faced by state, military, and industry actors related to the cyber incident described in the scenario materials. The brief must also recommend appropriate actions and policy responses for the actors involved. The length of the brief is limited to 2,500 words in length and is due prior to the event. How is the competition scored and how are teams ranked? Each round of the competition will be judged by a panel of three experts in cyber conflict policy. All teams will be evaluated based on three main dimensions of their responses: interpretation of the scenario problems; policy solutions presented; and quality of writing or oral presentation. These dimensions will be scored based on a common grading rubric and instructions shared by all the judges. The resulting numerical scores will be used to determine the winners of each round. When and where will the event be held? The Student Challenge will be held on Saturday June 15th in Washington, DC at American University. The event will consists of two rounds extending over the entire day. What prizes will be offered? Up to $5,000 dollars in prize money will be split among the top three teams and those receiving awards for individual achievements. Students will also receive certificates of participation. !
!
Volunteer!Form!
Cyber!9/12!Student!Challenge!is!a!one7day,!scenario7based!cyber!policy!competition!for!undergraduate!and!
graduate!students.!!Designed!to!engage!young!leaders!in!the!issues!surrounding!cyber!policy,!the!event!is!part!
interactive!learning!experience!and!part!competitive!scenario!exercise.!!!
!
Name:!
Phone:!
Email:!
Describe!any!experience!with!events:!
!
!
Describe!interest!in!volunteering!for!Cyber!9/12:!Student!Challenge:!
!
!
Available!June!15th:!□!Yes!!!!□No!!
*Please!Note1Volunteers!must!be!available!June!15th!all!day!and!one!day!in!May!for!a!volunteer!meeting.!
!
Emergency!Contact:!
Emergency!Phone:!
Please!return!this!form!to!Jason!at!the!Atlantic!Council!by!May!___.!
Email:!cyber@acus.org!
Phone:!202777874952!
Fax:!202746377241!
!
!
!
Evaluation!Form!
How!did!you!find!out!about!Cyber!9/12?!
Student!Organization□!
Twitter!□!
Professor□!
Atlantic!Council!Website□!
Facebook!Ad!□!
Atlantic!Council!Event!□
!
Other!□!
!
!
Please!evaluate!the!following:!(Circle!your!answer)!
Scenario:!!
!
Excellent!
Difficulty!of!scenario!
!
Reaction!to!conference!as!a!whole:!
!
Mentorship!
opportunities!
!
Quality!of!mentorship!
!
Networking!
opportunities!
!
Keynote!Speaker!
!
Organization!of!event!
!
Very!
good!
4!
Average!
Below!
Average!
2!
Poor!
Average!
5!
Very!
good!
4!
Poor!
3!
Below!
Average!
2!
5!
4!
3!
2!
1!
5!
4!
3!
2!
1!
5!
4!
3!
2!
1!
5!
4!
3!
2!
1!
5!
Excellent!
3!
1!
1!
!
!
Excellent!
Very!
good!
Average!
Below!
Average!
Poor!
!
!
Physical!Facilities:!
Meals!
5!
4!
3!
!
!
Meeting!Facilities!
5!
4!
3!
!
!
!
!
Did!the!competition!live!up!to!your!expectations!based!on!the!description?!
Why!or!Why!not:!
!
Would!you!participate!again?! □!Yes! □!No!
!
!
!
Recommendation!for!what!you!would!like!to!see!included!in!the!future:!
!
!
!
!
!
!
!
!
Additional!Comments:
2!
1!
2!
1!
□!Yes! □!No!
!
!
The Atlantic Council’s Cyber Statecraft Initiative is excited to announce two upcoming
opportunities for students in the Washington, DC area as part of our Cyber 9/12 Project. Both
events offer students a chance to engage with real-world cyber policy issues and professionals in
interactive environments.
First, on April 12, 2013 we will be hosting our rescheduled flagship event - Cyber 9/12 Project:
Statecraft After Catastrophes. Be sure to join our panel of expert participants during this half-day
conference, as a major simulated cybersecurity breach will continuously evolve, forcing experts to
focus on key priorities and sector-specific concerns during a serious cyber incident. While the event
will be broadcast live on the web, we have reserved extra space for students and faculty to attend
the event in person, including a special
Q&A session specifically aimed for student
attendees.
Second, to complement our main event and
encourage student engagement with cyber
conflict policy, we are holding our first
Cyber 9/12 Student Challenge on June 15,
2013. Teams will be selected to participate in a scenario exercise that will challenge them to
formulate policy responses to an ongoing cyber-attack for the chance to win up to $5,000 in cash
prizes. Participating students will also receive feedback from high level expert judges and mentors
drawn from the top levels of US government and private sector. More information about the event
including competition details, prizes, and registration materials will be released on April 1st. Both
programs are brought to you as part of the Cyber 9/12 Project in partnership with the Science
Applications International Corporation (SAIC).
How to Participate?
2013 competition registration will open April 1, 2013. More information will be posted on
our website as it becomes available. You can also download the competition
announcement here and reach out to us by email and on social media.
•
•
Facebook: Cyber 9/12 Student Challenge group
Twitter:@ cyber912_sc
Cyber 9/
12 StudentChallenge
Th
eCy
b
e
r9
/
1
2St
u
d
e
n
tCh
a
l
l
e
n
g
ei
st
h
eo
n
l
ys
t
u
d
e
n
tc
o
mp
e
t
i
t
i
o
nd
e
v
o
t
e
dt
o
p
r
o
d
u
c
i
n
gh
i
g
h
l
e
v
e
lp
o
l
i
c
yr
e
c
o
mme
n
d
a
t
i
o
n
sf
o
rd
a
y
a
f
t
e
rr
e
s
p
o
n
s
e
st
oama
j
o
r
c
y
b
e
ri
n
c
i
d
e
n
t
. Or
g
a
n
i
z
e
db
yt
h
eAt
l
a
n
t
i
cCo
u
n
c
i
la
n
dSc
i
e
n
c
eAp
p
l
i
c
a
t
i
o
n
s
I
n
t
e
r
n
a
t
i
o
n
a
lCo
r
p
o
r
a
t
i
o
n(
SAI
C)
,t
h
i
si
sa“
mu
s
ta
t
t
e
n
d
”e
v
e
n
tf
o
rs
t
u
d
e
n
t
so
f
i
n
t
e
r
n
a
t
i
o
n
a
l
c
y
b
e
r
s
e
c
u
r
i
t
yp
o
l
i
c
y
.
Th
ec
o
mp
e
t
i
t
i
o
ne
n
g
a
g
e
ss
t
u
d
e
n
tt
e
a
mswi
t
has
ma
l
l
g
r
o
u
po
fe
x
p
e
r
t
sr
e
p
r
e
s
e
n
t
i
n
g
v
a
r
i
o
u
ss
e
c
t
o
r
si
n
c
l
u
d
i
n
gg
o
v
e
r
n
me
n
t
,
f
i
n
a
n
c
e
,
t
e
l
e
c
o
m,
a
n
dt
h
ep
r
e
s
s
.
Th
eg
o
a
l
i
st
o
p
r
o
mo
t
ea
wa
r
e
n
e
s
so
fc
y
b
e
rs
e
c
u
r
i
t
yp
o
l
i
c
yi
s
s
u
e
swh
i
l
ep
r
o
v
i
d
i
n
gs
t
u
d
e
n
t
sa
n
d
e
x
p
e
r
t
sa
no
p
p
o
r
t
u
n
i
t
yt
on
e
t
wo
r
ka
n
dd
e
v
e
l
o
pn
e
wi
d
e
a
so
nt
h
ef
u
t
u
r
eo
fc
y
b
e
r
s
e
c
u
r
i
t
yp
o
l
i
c
y
.
Wha
ti
st
heCy
be
r9
/
1
2St
ude
ntCha
l
l
e
nge
?
Du
r
i
n
gt
h
ec
o
mp
e
t
i
t
i
o
n
,
s
t
u
d
e
n
t
swi
l
l
c
o
n
f
r
o
n
t
as
e
r
i
o
u
sc
y
b
e
rs
e
c
u
r
i
t
yb
r
e
a
c
hs
c
e
n
a
r
i
o
,
c
h
a
l
l
e
n
g
i
n
g
t
h
e
mt
of
o
r
mu
l
a
t
ep
o
l
i
c
yr
e
c
o
mme
n
d
a
t
i
o
n
sa
n
dj
u
s
t
i
f
yt
h
e
i
rc
h
o
i
c
e
s
.Du
r
i
n
gt
h
ec
o
u
r
s
eo
ft
h
e
c
o
mp
e
t
i
t
i
o
n
,t
h
es
c
e
n
a
r
i
owi
l
lc
o
n
t
i
n
u
et
oe
v
o
l
v
e
,f
o
r
c
i
n
ga
d
v
a
n
c
i
n
gt
e
a
mst
or
e
e
v
a
l
u
a
t
et
h
e
i
r
r
e
c
o
mme
n
d
a
t
i
o
n
sd
u
r
i
n
gama
j
o
rc
y
b
e
ra
t
t
a
c
ka
g
a
i
n
s
tt
h
eUn
i
t
e
dSt
a
t
e
s
.Pa
r
t
i
c
i
p
a
n
t
swi
l
l
r
e
c
e
i
v
e
f
e
e
d
b
a
c
kf
r
o
mj
u
d
g
e
st
h
a
t
a
r
ep
r
o
f
e
s
s
i
o
n
a
l
e
x
p
e
r
t
si
nc
y
b
e
r
s
e
c
u
r
i
t
yp
o
l
i
c
y
.
Th
e2
0
1
3c
o
mp
e
t
i
t
i
o
nwi
l
l
f
e
a
t
u
r
eu
pt
o$
5
,
0
0
0i
nc
a
s
hpr
i
z
e
sf
o
rt
h
et
o
pa
c
h
i
e
v
i
n
gt
e
a
ms
,
a
swe
l
l
a
sn
u
me
r
o
u
sn
e
t
wo
r
k
i
n
go
p
p
o
r
t
u
n
i
t
i
e
sa
n
ds
o
c
i
a
l
e
v
e
n
t
s
.Ex
p
e
r
t
sa
tt
h
eh
i
g
h
e
s
tl
e
v
e
l
so
ft
h
e
Wh
i
t
eHo
u
s
e
,Pe
n
t
a
g
o
n
,St
a
t
eDe
p
a
r
t
me
n
t
,a
n
dI
n
t
e
l
l
i
g
e
n
c
eCo
mmu
n
i
t
ya
r
ee
x
p
e
c
t
e
dt
o
c
o
n
t
r
i
b
u
t
e
.
Th
ee
v
e
n
t
wi
l
l
b
eh
e
l
do
nJ
une1
5
t
ha
tAme
r
i
c
a
nUni
v
e
r
s
i
t
y
.
WhoCa
nPa
r
t
i
c
i
pa
t
e
?
Gr
a
d
u
a
t
ea
n
du
n
d
e
r
g
r
a
d
u
a
t
es
t
u
d
e
n
t
si
nt
h
eWa
s
h
i
n
g
t
o
n
,
D.
C.
a
r
e
awh
oa
r
ei
n
t
e
r
e
s
t
e
di
nt
h
e
d
i
s
c
i
p
l
i
n
e
so
fc
y
b
e
rs
e
c
u
r
i
t
yp
o
l
i
c
y
,i
n
t
e
r
n
a
t
i
o
n
a
lr
e
l
a
t
i
o
n
s
,c
o
mp
u
t
e
rs
c
i
e
n
c
e
,l
a
w,a
n
do
t
h
e
r
r
e
l
a
t
e
df
i
e
l
d
sa
r
ei
n
v
i
t
e
dt
oa
p
p
l
yt
oc
o
mp
e
t
ei
nt
e
a
mso
f
t
h
r
e
et
of
o
u
ri
n
d
i
v
i
d
u
a
l
s
.
Howt
oPa
r
t
i
c
i
pa
t
e
?
2
0
1
3c
o
mp
e
t
i
t
i
o
nr
e
g
i
s
t
r
a
t
i
o
nwi
l
l
o
p
e
no
nAp
r
i
l
1
,
2
0
1
3
.
Fo
r
mo
r
ei
n
f
o
r
ma
t
i
o
no
nt
h
eCy
b
e
r
9
/
1
2
St
u
d
e
n
t
Ch
a
l
l
e
n
g
ep
l
e
a
s
ev
i
s
i
t
:
Ema
i
l
:c
y
b
e
r
9
1
2
@a
c
u
s
.
o
r
g
We
bs
i
t
e
:www.
a
c
u
s
.
o
r
g
/
e
v
e
n
t
/
c
y
b
e
r
9
1
2
s
t
u
d
e
n
t
c
o
mp
e
t
i
t
i
o
n
Fa
c
e
book
:Cy
b
e
r9
/
1
2St
u
d
e
n
t
Ch
a
l
l
e
n
g
eg
r
o
u
p
Twi
t
t
e
r
:www.
t
wi
t
t
e
r
.
c
o
m/
c
y
b
e
r
9
1
2
_
s
c
“
St
ude
nt
sbe
ne
f
i
tf
r
om
wor
k
i
ngwi
t
he
x
pe
r
t
sa
tt
he
hi
ghe
s
tl
e
v
e
l
oft
heWhi
t
e
Hous
e
,
Pe
nt
a
gon,
St
a
t
e
De
pa
r
t
me
nta
ndt
he
I
nt
e
l
l
i
ge
nc
eCommuni
t
y
.
”
Greg Rattray
CEO and Foundi
ng
Partner,DeltaRi
sk
Appendix 2:
2013 Logistic
Materials
91 92 11-3144
O N R E C Y C L E D PA P E R
BROCHURE HAS BEEN PRINTED
W W W. C I R C L E O F R E S P O N S I B I L I T Y. C O M
C O M M U N I T Y A N D Y O U R W E L L B E I N G AT
L E A R N H O W F O O D C H O I C E S I M PA C T T H E E N V I R O N M E N T,
C O M PA N Y AT A M E R I C A N U N I V E R S I T Y
BON APPÉTIT MANAGEMENT
preparing authentic, made from scratch food
in a socially responsible manner
2011-2012
catering
at
american
university
We look forward to the opportunity to serve you.
If we can offer you more information, if you would like to make an
appointment or place an order, please call us at (202) 885-3181 or email us
at aucatering@american.edu
We are proud to share with you the menus and ideas on the following
pages. However, they represent only a starting point. Our specialty is
designing innovative menus for any occasion. The Bon Appétit staff will
work with you to understand your particular needs and present you with a
variety of high-quality and creative options. Whether you are planning an
informal lunch meeting or a reception for 5000 guests, our knowledgeable
catering staff will work with you to create an event you will be proud to
host.
After over 100,000 events, we’ve learned to pay attention to excellence in
food preparation, superior presentation, and quality service. Whatever your
event—a breakfast meeting, a conference luncheon, a reception for a visiting
dignitary or a banquet—you will find that we offer the finest, freshest
ingredients, prepared with creativity and passion, and presented with style
and elegance.
To determine your food and beverage needs, please review the enclosed
menus. If you require a special menu, our catering team will be happy to
customize one for your group. After reviewing proposed menus, please
contact the catering department to make final arrangements. Once your
Food and Beverage Orders
Food and beverage orders require a minimum of two weeks advance notice.
The catering department will try to accommodate late requests (see last
minute orders).
Type of Event
To fully service your event and ensure its success, we need to know what
type of event it will be: breakfast, lunch, dinner, meeting, reception, etc. and
the nature of the event. Along with the type of event, the catering
department will need to know what type of set up is needed for your event.
Number of Attendees
An estimated number of expected attendees for the event are necessary to
determine your needs when booking space for an event.
Time of Event
To fully service your event, you will need to provide the start and end time of
each event. If the event is scheduled in rooms outside of the Mary Graydon
Center Banquet Rooms, the Catering Department will also need to know the
time our staff will have access to the room assigned for set up. Please allow
ample time for set up and breakdown. We need at least 1.5 hours for set up
of breakfast services and at least 1 hour for breakdown and clean up. Please
allow at least 2 hours for set up of lunches, dinners, and receptions with at
least 1.5 hours breakdown and clean up.
Date of Event
Due to the hectic pace of the University special event and meeting calendar,
we recommend that you call to reserve the date and location of your event
as early as possible, even if the date is tentative. For Mary Graydon Center
Banquet room spaces I-VII please call University Event Scheduling at
(202)885-3989 or email ues@american.edu
You will need the following information to reserve your space:
Date and Location Reservations
The Catering Department at American University invites you to use our
services for your entire special event needs. In an effort to make your event
planning process as easy as possible, we are providing you with the
following guidelines.
Thank you for Choosing Catering by Bon Appétit.
While you may be familiar with our on-campus café and other venues, you
may not know that Bon Appétit was actually founded as a catering
company. We are driven to create food that is alive with flavor and nutrition,
prepared from scratch using authentic ingredients. We do this in a socially
responsible manner for the well being of our guests, communities, and the
environment. We start with food in its simplest, most natural form
purchased locally and seasonally.
catering guidelines
dear colleague
Accepted forms of payment are VISA, MasterCard, AMEX, certified check, or
money order. A 50% deposit is required with a signed event contract. The
balance is due 24 hours prior to the date of the event. To qualify for tax
exempt status, you need to provide a DC Tax Exempt Certificate for your
group or organization. Otherwise, a 10% DC tax will be added to your
invoice.
Non-university Groups
An authorized signature and budget number must be applied to the catering
contract and returned to the catering office prior to your event. We will be
unable to fulfill any catering order without an authorized signature and
budget number applied to the contract and remitted to the catering
department 3 days prior to the event.
University Groups
All catered events require an authorized method of payment prior to
your event.
Payment Information
The catering staff is available to assist in accommodating special dietary
needs for your event as well as aid with the ordering of themes, floral décor,
linen and signage.
Additional Items to Consider
Audio/Visual Equipment
If your event requires audio/visual equipment please contact the Audio Visual
Department at 202-885-2296. When placing your catering order, please let
the catering associate know if audio/visual will be needed so that we can
prepare the event space appropriately.
Last Minute Orders
Catering will accept last minute (within 24 hours) orders and additions to
existing orders if possible. A 25% rush charge will apply.
Attendance Guarantee
menu selections are made, a Catering event contract will be processed by
the catering associate and provided to you. Please review the information in
the contract, verifying that all information is accurate i.e.; date, time,
location, guest count. Upon review please return a copy of the contract to
the Catering Department with an authorized signature and budget number.
We will be unable to fulfill any catering order without an authorized
signature and budget number applied to the contract and remitted to the
catering department 3 days prior to the event.
Coffee or Beverage China Service $3.30 per guest
Reception China Service $4.50 per guest
Full Meal China Service $5.90 per guest
In partnership with University Sustainability we offer quality compostable
paper which is included, at no additional charge with every event. China is
included at no additional cost in the Mary Graydon Center Banquet Rooms
I-VII but events over 15 may require a catering attendant. In all other
locations, china service is available at an additional cost.
China Fees
52" square table cloth $4.65 ea.
85" square table cloth $5.25 ea.
Banquet Table Cloth $5.25 ea.
Table Skirts $10.00 ea.
Tablecloths and skirting for meetings and reception guest tables are available
at an additional cost.
Tablecloths and skirting are included with all food and beverage services. The
Catering Department has a selection of colors available to you at no
additional cost. Tablecloths for dining tables are included with lunch, dinner,
and buffet entrée meals.
Linen Fees
As host of your event, you are responsible for the equipment provided for
your event. Service equipment must remain at the original event location.
Any equipment missing from your event will be charged to your account
number, at replacement costs.
Missing Equipment
Notification of cancellation of any event is required three business days prior
to the event. If cancellation occurs after this time, any expenses incurred by
the Catering Department will be billed to the canceling party.
Cancellations
The catering department requires a confirmation of the final attendance
guarantee. This number is required 72 hours or 3 business days prior to your
event. This is the minimum number of attendees that you will be charged
for. If the actual number of attendees falls below the guaranteed number,
the Catering Department will charge your department for the guaranteed
number. If the actual number exceeds the guaranteed number you will be
charged accordingly.
catering guidelines
catering guidelines
Please contact Support Services or University Center to provide equipment i.e.;
tables, chairs, podiums, trash receptacles for events in rooms outside of Mary
Graydon Center Banquet Rooms.
University Center (202) 885-3539
Support Service (202) 885-2299
Additional specialty equipment and linens are available. We can rent a
variety of china, linen, silverware, platters, serving equipment, chairs, and
tables to give your event a unique touch. Please contact us to view samples.
The University Club is for the exclusive use of faculty, staff, and their guests.
Groups of 16 or fewer may reserve Mary Graydon Banquet Rooms 4, 5 or 6
and serve themselves from the buffet in Mary Graydon Banquet Room 2.
Please contact UES to book a room at (202) 885-3989. You will need to
contact the Catering Department to discuss set up of your room and arrange
billing. Groups larger than 16 must arrange lunch to be catered. Weekly
menus are posted on Today@AU as well as on our website at
www.cafebonappetit.com/americanuniversity. At various times of the year
the University Club will be closed for special events, please contact us via
email at aucatering@american.edu or call us at (202)885-3177 to ensure the
club will be open on the date you would like to be our guest.
For table reservations please call (202) 885-3177, or email us at
aucatering@american.edu
University Club
Contact University Event Scheduling at (202) 885-3989 or at
ues@american.edu to reserve space in Mary Graydon Center Banquet Rooms
I-VII. For university groups there is a room set up fee of $35.00 per room in
the Mary Graydon Center Banquet Room I-VII. For non-university groups the
fee is $150. The fee only covers the labor to set up and breakdown tables,
chairs, and walls for your event. Additional staffing and equipment charges
may apply depending on the needs of each event. An additional fee of
$35.00 is charged for breakdown of the University Club located in Mary
Graydon Center Banquet Room I-III.
Room Set-up Fee in Mary Graydon Center Catering
Buffet Lunch or Dinner/ one server per 25 guests
Served Plated Lunch or Dinner/ one server per 10 guests
Reception/ one server per 40 guests
Staffing is required for all buffet breakfast, lunches, dinners, and receptions
in the Mary Graydon Center Banquet Rooms I-VII, utilizing china and for any
events outside the Mary Graydon Center rooms utilizing china. Staff
attendant fees are applied for any event, including drop offs, in evenings
(after 6pm) or on weekends. The fee for each attendant is $25 per hour for
a minimum of 4 hours. The fee for a chef station is $125
The required number of staffing for your event is as follows:
Audio Visual: (202) 885-2296
University Event Scheduling Department :(202) 8853989/
ues@american.edu
University Center:(202) 885-3539
Support Services:(202) 885-2299
Important Contact Information at American
Bar Set-up Fee: $3.00 per person on Consumption and Cash Bar Service
Wine and beer are the only alcoholic beverage permitted for sale on campus.
Alcohol may not be served at any university event where undergraduate
students are in attendance. Alcohol can be served in most designated event
spaces on campus. An authorized alcohol approval form must be submitted to
the Catering Department along with your authorized signed contract and
budget number prior to the event or alcohol cannot be served. Our Catering
Department can assist you in recommending a variety of quality imported and
domestic beers as well as wines.
Alcoholic Beverage Policy
We will gladly take care of your dining needs during these periods on a cost
incurred basis.
Weekends, Non-business Hours and Holidays
Set-up in Locations other than Mary Graydon Center
Specialty Equipment
Staff Fees
catering guidelines
catering guidelines
Assorted flavored low-fat yogurts served with
sunflower seeds, golden raisin, chopped dried fruit, and granola
$6.95 per person
Assorted Mini European Style Breakfast Pastries
Assorted Mini Tea Scones
Assorted Mini Muffins
Banana, Cranberry, Apple, or Blueberry Breakfast Breads
(CHOOSE TWO)
Orange and Cranberry Juices
Pura Vida Organic Coffee
Pura Vida Organic Decaf Coffee
Hot Water with Assorted Teas
$7.30 per person
Assorted Low-Fat Muffins
Assorted Cold Cereals
Low Fat Plain and Fruit Yogurts with Granola
Assorted Chilled Fresh Fruit Juices
Pura Vida Organic Regular and Decaf Coffee
Hot Water and Assorted Teas
$10.45 per person
The Natural Booster
A Bakery Assortment of Muffins, Breakfast Pastries and Mini Bagels
Bacon
Red Pepper Frittata
Skillet Home Fries
Fruit Topped French Toast
Assorted Chilled Fresh Fruit Juices
Pura Vida Organic Regular and Decaf Coffee
Hot Water and Assorted Teas
$14.25 person
Good Morning Breakfast
Scrambled Egg Whites with Baby Spinach
Turkey Bacon
Sliced Fruit
Whole Wheat and Multigrain Bagels
Light Cream Cheese Spread
Orange, Cranberry, or Grapefruit Juices
Pura Vida Organic Coffee, Decaf, and Hot Water with Assorted Teas
$14.00 per person
The Lighter Side
Yogurt Bar
Early Bird Continental
Bakery Assortment of Muffins, Breakfast Pastries, Mini Bagels and
Buttermilk Biscuits
Scrambled Eggs
Quiche Florentine
French Toast
Turkey Sausage
Omelet Station*
Sliced Fresh Fruit
Assorted Chilled Fresh Fruit Juices
Pura Vida Organic Regular and Decaf Coffee
Hot Water and Assorted Teas
$20.50 per person
Add $5.25 per person for champagne
*Staffing charges will apply for omelet station
The Executive Brunch
Served with chopped apple, dried fruit, chopped nuts, brown sugar, honey,
and cinnamon
$8.95 per person
Hot Oatmeal Bar
our breakfast and brunch selections
our breakfast and brunch selections
Thinly sliced house-roasted beef and breast of turkey, baked ham, salami,
pepperoni, tuna and egg salads, with aged cheddar, natural Swiss or
provolone cheese, served with house salad and assorted sliced breads
and rolls
$14.25 per person
Fanned Parmesan crusted breast of chicken on a bed of freshly chopped
romaine, herbed croutons, Asiago cheese, and our house-made roasted
garlic Caesar dressing
$11.50 per person
Ask us about our variety of savory sides or our house-made soups of the day
to add to your salad luncheon.
Thinly sliced ginger-marinated beef with a spicy peanut dressing, pickled
cucumber, shredded carrot, and lo mien noodles served with bibb
lettuce cups
$13.50 per person
Thai Beef Lettuce Wraps
Our all time favorite….. tender strips of chicken on a bed of garden greens
with julienne snow peas, scallions, rice noodles, water chestnuts, bamboo
shoots, and our house-made sesame-soy dressing, garnished with crispy
lo mein
11.95 per person
Asian Chicken Salad
Mixed baby greens tossed with sliced granny smith apple, candied pecans,
and crumbled blue cheese served with our house-made champagne
vinaigrette
$10.45 per person
Served with house salad, potato chips, cookies, assorted canned sodas,
and water
Roasted turkey, smoked mozzarella and arugula on herbed
foccacia panini
Prosciutto, Granny Smith Apple and Gruyere Cheese on ciabatta panini
Grilled eggplant, arugula and mozzarella on ciabatta panini
$16.25 per person
Panini Express
Served with house salad, potato chips, cookies, assorted canned sodas,
and water
Grilled chicken with Boursin spread, Dijon mustard, sliced avocado, arugula,
and shaved red onion
Oven-roasted turkey breast with grilled zucchini, creamy brie, and spicy
honey mustard
Grilled zucchini and eggplant with roasted peppers, balsamic-glazed endive,
and sun-dried tomato tuscany spread
$16.25 per person
High Profile Sandwich Platter
Served with house salad, potato chips, cookies, assorted canned sodas,
and water
Roast beef with beefsteak tomato and sliced red onion with
horseradish mayo
Turkey and Swiss with herbed mayo
Marinated grilled portobello mushroom with caramelized onion
Ham and cheddar on sweet potato biscuit and honey mustard spread
$13.25 per person
Keep it Simple Sandwich Platter
The Capitol Deli Platter
Parmesan Encrusted Chicken Caesar Salad
Granny Smith Apple and Pecan Salad
sandwich selection
light fare lunch selections
AND
SWISS
AND
CHEDDAR
AND
TOMATO
Executive boxed lunch package comes with cookie, bagged chips, whole
fruit, pasta, fruit or garden green side salad, assorted canned soda, and
bottle water
$12.95 per person
Chopped romaine lettuce, kalamata olive, feta cheese, grape tomato, and
oregano vinaigrette
GREEK WRAP
Fresh sliced cucumber and ripe tomato on seven grain roll with house-made
red pepper hummus spread
CUCUMBER
Tomato, fresh mozzarella, and fresh basil with balsamic glaze on
French baguette
MARKET CAPRESE
Chopped romaine lettuce, fresh shredded Parmesan cheese, garlic croutons
and Caesar dressing
GRILLED CHICKEN CAESAR WRAP
Baked ham on sweet potato roll with aged cheddar cheese, and
chipotle mayo
HAM
House-roasted beef with caramelized onion, and herbed Boursin spread
ROAST BEEF
House-roasted turkey breast with Swiss cheese, lettuce, tomato,
and cranberry mayo
TURKEY
Choose four of the following:
Executive
Traditional Boxed Lunch Package comes with potato chips, garden green side
salad, whole fruit, cookie, bottled water, or soda
Served with assorted rustic and artisan breads, iced tea or lemonade,
assorted cookies, or chocolate brownies
Herb grilled breast of chicken and grape tomatoes over a bed of organic
field greens and topped with sweet corn, red pepper, and black bean relish
served with smokey poblano vinaigrette
$18.95
Herbed Grilled Chicken Salad and Corn Relish
Marinated and slow roasted sliced flank steak on a bed of mixed greens with
sweet caramelized onion chutney served with dill yogurt tossed roasted red
bliss potato salad
$18.95
Marinated Flank Steak Salad
Grilled breast of chicken marinated in greek yogurt, garlic, and fresh mint,
sliced and served on a bed of tabbouleh couscous served with fresh tomato
and cucumber salad
$16.95
Grilled Yogurt Chicken
Mesclun mixed greens tossed with orange segments and citrus-lime
vinaigrette topped with light and flaky salmon filet served with steamed
vegetable pot stickers
$19.95
Poached Salmon Salad
All luncheon salad platters serve 20 guests
The Traditional
Fresh baked ham and cheddar on Kaiser roll
Roasted turkey breast and Swiss on Kaiser roll
Roasted vegetable on Kaiser roll
$10.95 per person
luncheon salad platters
boxed lunch
Beef or vegetable lasagna served with Caesar salad and garlic bread
$15.75
Teriyaki chicken served on a bed of vegetable noodle salad served with
vegetable egg rolls, slaw, and sliced seasonal fruit
$15.25
Served with assorted rustic and artisan breads, iced tea or lemonade,
assorted cookies, or chocolate brownies
Lemony chicken piccatta served with smoked butter tossed linguini noodles,
fresh steamed vegetable medley with julienne red pepper and sicilian house
salad
$15.75
The Italiano
Cilantro-lime marinated breast of chicken on a bed of mixed greens
shredded Monterey Jack Cheese, red onion, chiles, and black olives
corn and black bean salad, soft flour tortillas, and crispy tortilla chips
guacamole, sour cream, and smokey poblano vinaigrette
$15.75
Served with assorted cookies, iced tea, or lemonade
Alternating layers of roasted eggplant, ricotta cheese, and marinara sauce
Served with house salad and garlic bread
$15.25
Eggplant and Ricotta Bake
Blackened chicken strips tossed and bell peppers in a Gorgonzola cream
sauce served over rigatoni pasta served with house salad and rustic and
artisan breads
$15.75
Cajun Chicken and Pasta
Sherry braised beef tips tossed in a creamy mushroom Alfredo served on a
bed of pappardelle noodles
Served with house salad and rustic and artisan breads
$15.75
Sherry Braised Beef Tips and Mushroom Alfredo
Lasagna
Pan Asian Express
South of the Border
simple dish and one salad
themed lunch buffets
An array of marinated and grilled fresh garden vegetables
$4.00 per person
Boneless breast of chicken sautéed in Marsala wine with whole
mushrooms served with rosemary roasted potatoes and a balsamic glazed
vegetable platter
$26.00 per person
Brie
All Dinners are served with soup of the day or house salad, rustic and artisan
breads, coffee and tea service, freshly brewed iced tea, water, and a your
choice of gourmet dessert
Vegetarian, vegan and gluten friendly options are available, just ask us!
All Dinners include disposable plastic ware and table linen
TOP YOUR OWN CIABATTA CROSTINI WITH THREE OF THE FOLLOWING:
Tomato basil, wild mushroom, Gorgonzola, chevre with artichoke and
parsley, roasted red pepper, or kalamata olive tapenade
$5.25 per person
PLATTER SERVES 15 GUESTS
Try a sample platter of our favorite appetizers:
Mozzarella sticks with marinara dip, buffalo wings with ranch or blue cheese
dressing, sour cream and chive potato bites, warm queso dip, and housemade crispy tortilla chips
$21.00 per platter
Eagle’s Nest
SERVES 12 GUESTS
Topped with dried cranberries and candied pecans
En croute (baked in puff pastry) with apricot preserves
Raspberry, blackberry, or fig jam
$27.00 per wheel
Bruschetta Bar
Italian-style stuffed flank steak with herbed bread crumbs, sun-dried
tomatoes, and parmesan served with simple tomato sauce, garlic roasted
mashed potatoes, and fresh steamed vegetables with julienne red pepper
$29.00 per person
Pico de gallo salsa, tomatillo salsa, and guacamole served with house-made
tortilla chips and sour cream
$4.25 per person
Tortilla Platter
Hummus, babaghanoush, tzatziki, stuffed grape leaves, feta cheese, tomato,
and marinated greek olives, served with crispy pita chips
$7.00 per person
Middle Eastern Platter
An assortment of our favorite dips including, white bean, kalamata olive,
sun-dried tomato, and creamy spinach, served with toasted crostini rounds
$4.00 per person
Braciole
$33.00 per person
*asparagus is a seasonal item may have to be replaced with seasonal vegetable
Based on Montery Bay Aquarium Recommendations
Served with charred garlic oil and tomato relish with brown rice pilaf and
lemon scented grilled asparagus*
Catch of the Day
Boneless breast of chicken stuffed with sautéed spinach and goat cheese
drizzled with sun-dried tomato cream sauce served with wild rice pilaf and
fresh steamed vegetable medley tossed with lemon-thyme vinaigrette
$28.00 per person
Spinach and Cheese Chicken Roulade
Roasted Vegetable Display
Chicken Marsala Rustica
Tapenade Trio
reception hors d’oeuvres
buffet dinner selections
Choose from the following:
Toasted crostini rounds or house-made tortilla chips
Spinach and artichoke, artichoke and two cheeses, walnut and goat cheese
Warm salsa and queso
$2.65 per person
SELECT THREE OF THE FOLLOWING MINIATURE SANDWICHES:
Roasted vegetable with sun-dried tomato mayo
House-roasted turkey with cranberry chutney
House-roasted beef with sweet onion marmalade and Brie
Ham and cheddar with chipotle mayo
Tarragon chicken salad with red grapes
Curry chicken salad with cashews
All miniature sandwich platters are served with house-made
sweet potato chips
$20.95
Taquitos
CHOOSE FROM THE FOLLOWING:
2 pieces of your choice of the following per person:
Shredded chicken, pork, or beef
Black bean and queso
Served with salsa fresca and cilantro sour cream
$3.65 per person
Cold Skewers
CHOOSE FROM THE FOLLOWING:
2 pieces of your choice of the following per person:
Tomato, basil, and mozzarella marinated with garlic olive oil
Tortellini pasta with marinara and pesto cream dips
Jicama and pineapple dusted with ground chili
Seasonal fruit with honey vanilla yogurt dip
Watermelon and feta
$13.65 per dozen
Sausage
CHOOSE FROM THE FOLLOWING:
2 pieces of your choice of the following per person:
Chorizo with red onion served with sweet chili aïoli
Andouille with green and red bell pepper with red pepper aïoli
Italian with green pepper and red onion served with marinara
$15.00 per dozen
Empanadas
CHOOSE FROM THE FOLLOWING:
3 pieces of your choice of the following per person:
Italian sausage, spinach and cheese, blue cheese, or sherry mushroom
$2.00 per person
Mushroom Caps
CHOOSE FROM THE FOLLOWING:
3 pieces of your choice of the following per person:
Spanish sherry, teriyaki, barbecue, marinara, Swedish style, sweet and sour,
spanakopita chicken with cucumber raita, or lamb with cilantro raita
$1.65 per person
Meatballs
Crab and artichoke
$3.65 per person
CHOOSE FROM THE FOLLOWING:
2 pieces of your choice of the following per person:
Spicy beef served with salsa rojo
Shredded chicken served with cilantro sour cream
Black bean and cheese served with salsa fresca
Spinach and feta served with dill sour cream
Curry potato and pea served with cucumber raita
$3.65 per person
CHOOSE FROM THE FOLLOWING:
2 pieces of your choice of the following per person:
Thai chicken sate with spicy peanut sauce
Coconut chicken sate served with pineapple salsa
Tandoori chicken sate with cucumber and mint riata
Jerk chicken sate served with mango chutney
Cilantro and lime chicken served with tomatillo salsa
Beef tenderloin sate served with horseradish mayo
Balsamic glazed portobello mushroom sate served with herbed aïoli
$15.00 per dozen
Hot Skewers
All hors d’ oeuvres include plastic ware, linen, and skirting for the
buffet table
Warm Dips
Assorted Mini Sandwich Platter
Cheddar and Crab
reception hors d’oeuvres
reception hors d’oeuvres
2 PIECES OF YOUR CHOICE OF THE FOLLOWING
Bacon and cheddar
Sweet onion and red pepper
Chorizo sausage
Mushroom
Spinach
Tomato and basil
Ham and Swiss
$2.65 per person
Mini Savory Quiche
PER PERSON:
2 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Black bean and cheese served with pico de gallo salsa
Chicken and Monterey Jack cheese served with cilantro sour cream
Pear and Brie served with pear and scallion salsa
$2.65 per person
Quesadillas
2 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Seasoned and oven roasted new potatoes filled with your choice of:
Bacon and cheddar
Eggplant relish
Sour cream and chive
Buffalo chicken and blue cheese
$1.85 per person
2 PIECES OF YOUR CHOICE OF THE FOLLOWING
Lamb and raisin
Goat cheese and walnut
Smoked chicken with peach mayo
Wild mushroom
Black olive tapenade
Gorgonzola and pine nut
Eggplant caviar
Spinach and caramelized onion
$2.35 per person
2 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Mini Maryland style crab cakes with Cajun remoulade
Mini salmon cakes with smoky poblano aïoli
Scallops wrapped in bacon with lemon-caper butter sauce
$4.25 per person
Seafood
3 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Fried and tossed in your choice of sauce:
Honey barbecue
Sweet and spicy barbecue
Buffalo
Teriyaki
Sweet and sour
Parmesan and garlic
Caribbean Jerk
Served with ranch or blue cheese dressing and carrot and celery sticks
$4.00 per person
Wild Wings
Potato Bites
Phyllo Tartlets
PER PERSON:
3 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Lightly breaded and fried chicken with your choice of dipping sauce:
Barbecue, honey mustard, blue cheese, sweet chili, chipotle salsa, ranch,
southwest chili aïoli
$3.65 per person
2 PIECES OF YOUR CHOICE OF THE FOLLOWING PER
Mushroom and mascarpone
Gorgonzola, apple, and toasted pecan
Spinach and cheese
Wild mushroom and goat cheese
Sun-Dried tomato and artichoke
$2.65 per person
Chicken Tenders
3 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Fresh artichoke with lemon-parsley aïoli
Vegetable tempura with soy-sesame dip
Corn and red pepper with basil herb remoulade
Parmesan and herb risotto cakes topped with sun-dried tomato tapenade
$3.25 per person
2 PIECES OF YOUR CHOICE OF THE FOLLOWING PER PERSON:
Asian vegetable or duck served with our house-made hoisin-plum or sweet
chili sauces
$3.00 per person
PERSON:
Fritters
Spring and Egg Rolls
Phyllo Turnovers
planning your event
reception hors d’oeuvres
SERVES 8
Key Lime, pecan, pumpkin, apple, sweet potato, lemon meringue, peach,
Boston Cream, banana cream, French Silk
$28.00 each
Sheet Cakes
Full Sheet (serves 60-70)
$80.00
Assortment of mini French style pastries including:
Mini éclairs, Mini opera cakes, lemon, berry or fruit tarts, mini cream Puffs,
and passion fruit cake squares
$19.50 per dozen
All Things Chocolate
Chocolate brownies, chocolate mousse filled chocolate cups, double
chocolate cookies, chocolate diamonds, and chocolate chip cookies
$13.00 per dozen
$4.50 each
$4.50 each
$4.50 Each
$4.00 each
$5.00 each
$4.50 each
$4.50 each
$5.00 each
$5.00 each
Seasonal Fruit Tarts
Premiere Individual Strawberry Shortcake
Caramel Apple Tart
Tiramisu
Triple Chocolate Charlotte
Apple Caramel Bread Pudding
served with Warm Caramel Sauce
Pumpkin Bread Budding with Warm Caramel Sauce
Fruit Topped Cheesecake
Coconut Passion Fruit Teardrop
Gourmet Desserts
Chocolate chip, sugar, peanut butter, double chocolate, oatmeal raisin, and
white chocolate macadamia nut cookies
$10.50 per dozen
Cookie Jar
Lemon, chocolate chip, caramel apple, chocolate walnut, raspberry
cheesecake, coconut, and pecan bars
$14.75 per dozen
Assorted Dessert Bars
Pies
Petit Sweets
We can accommodate gluten friendly and vegan dessert requests
Just ask us!
Ask about our special customized cakes to celebrate your office birthday
parties, farewell and welcome parties, and more
Ten Inch Cake Round Cake (serves 16)
$35.00
Half Sheet (serves 25-35)
$60.00
our bakery selection
our bakery selection
Canned Coke, Diet Coke, and Sprite Sodas
Bottled water and bottled assorted fruit juices
$1.75 each
Bottled Soda and Juice
Watermelon, mango, guava, berry, citrus and lime, tropical limeade
15.00 per gallon
Aqua Frescas
Lemonade
Unsweetened Iced Tea
Sparkling Cranberry Punch
Italian Sparkling Lemonade
Citrus Punch
$14.65 per gallon
Thirst Quenching
Assorted Fresh Fruit Juices
Apple, orange, grapefruit, and cranberry
$13.00 per gallon
Juice Bar
$13.65 per gallon
Hot chocolate with mini marshmallows
$8.50 per air pot (served 8-10)
Air pots of regular and decaffeinated coffee
Freshly brewed Pura Vida regular and decaffeinated organic coffee
Hot water and assorted teas
$14.95 per gallon
Hot Stuff
beverage selection
notes
notes
Summer at American University
Your Planning Guide
Live
Conference & Residential
Services
Explore
Learn
www.american.edu/ocl/housing/crs
Discover
summerconferences@american.edu
202-885-3370
www.american.edu/ocl/housing/crs
1
Table of Contents
Introduction to Summer Conferences at American University
Getting to Know the American University Staff
Professional Staff with Conference & Residential Services
Getting to Know your Conference Manager
Key Campus Contacts
Housing for Residential/ Conferences
Residence Hall Types
Room and Hall Amenities
Residence Hall Front Desks
Contracting for Housing
Housing Rosters
Important American University Housing Policies
Checking-In and Checking-Out of the Residence Halls
Helpful Information for a Smooth Registration/Check-In Process
Helpful Information for a Smooth Check-Out Process
Summer Guest Cards
General Summer Guest Card Information
Access to Exterior Doors of Residence Halls
Meals in the Terrace Dining Room
EagleBucks Program
Access to the Jacobs Fitness Center
Use of the American University Shuttle to the Tenleytown/AU Metro Station
Troubleshooting Problems with Your Summer Guest Card
Dining and Catering Services
Dining Halls
Catering Services
Retail Operations
Meeting, Classroom, Event and Recreation Spaces
Computer Labs
Classroom and Auditorium Spaces
Meeting and Multipurpose Spaces
Outdoor Event Spaces
Outdoor Recreation Facilities
William I. Jacobs Fitness Center
Audio Visual and Other Rental Services/Equipment
Equipment and Supplies Available for Rental
Parking and Transportation Services
Transportation Considerations
Parking Arrangements and Logistics
Residence Hall and Campus Safety
Residence Hall Safety
Campus Safety
Contracts and Billing
Beginning the Conference Planning Process
www.american.edu/ocl/housing/crs
Page 3
Pages 4-5
Pages 6-8
Page 9
Pages 10-11
Pages 12-13
Pages 14-16
Page 16
Page 17
Page 18
Page 19
Page 20
Page 22
2
Welcome to Summer Conferences at American University!
Thank you for your interest in American University! AU is an ideal location for summer conferences in the
nation’s capital. Located in one of northwest Washington, DC’s most beautiful residential areas, AU is just
minutes by bus, cab, Metro (subway), or car from the city’s most famous sites. AU’s free shuttle service
connects campus to Washington’s Metro line at the Tenleytown/AU station, just three-quarters of a mile
from the main campus.
During the summer, the American
University campus is open to
conference guests from all over the
country and world. From large
national adult conferences to
visiting high school groups and
Washington, DC interns, we host
over 100 conferences and
meetings averaging over 10,000
visitors each year.
One of the benefits of choosing
American University as your
conference host site is that
Conference & Residential Services serves as your host for all of your needs on campus. Think of it as "onestop shopping" you will describe your needs (housing, dining, meeting space, parking, etc.) to our
Conference & Residential Services staff, and we will navigate all the channels at AU on your behalf to
make your summer experience more positive for you as the planner. We have proven ourselves hosting
small and large conferences and events and look forward to working with you to make your event a
success!
Our residence halls are among the best equipped in the metropolitan area. All rooms are carpeted and airconditioned with in-room temperature controls. All floors are equipped with laundry, kitchenettes, lounge
facilities, and separate communal men’s and women’s bathroom and shower facilities. Additionally, our
entire campus, including the residence halls, has wireless internet connectivity for your convenience.
It is our hope that this guide will provide you with all of the information you need to have a successful event
with us in the near future. The following pages offer you a thorough guide to our summer conferences
services and facilities. After reading this material, please let us know if you have any other questions or if
you would like a tour of our beautiful campus.
www.american.edu/ocl/housing/crs
3
Getting to Know the American University Staff
Professional Staff with Conference & Residential Services
Housing and Dining Programs at American University is home to all summer conference activity not only
during the summer months, but throughout the academic year. In Housing and Dining Programs, the
following full time Conference & Residential Services staff members oversee the planning, implementation
and evaluation of summer conference activities:
Curtis Hoover
Director, Conference & Residential Services
(202)885-3370
hoover@american.edu
Nancy Martin
Conference and Events Coordinator
(202)885-3370
summerconferences@american.edu
Our Conference & Residential Services full time staff works throughout the year to assist you in planning
your summer conference event by serving as your representatives to various campus offices. From the
initial site tour to final invoicing, our staff members will be your link to the university. Our offices are located
on the first floor of Anderson Hall on the main campus. We would welcome the opportunity to meet with you
and take you on a tour of our facilities.
Getting to Know Your Conference Manager
During the summer months, American University hires student leaders who serve as Conference
Managers. Conference Managers have extensive experience and training in Housing & Dining Programs
and in summer conferences. They are a tremendous asset to you in your final planning stages, as well as
while you are on campus.
Your Conference Manager will be assigned in early May and will be your main point of contact prior to your
conference’s arrival to finalize your conference’s logistics. He or she will work closely with the Conference
& Events Coordinator to execute all of your conference’s needs.
Once on campus, your Conference Manager will be the individual responsible for coordinating your checkin and check-out arrangements, meeting and classroom space reservations, audio visual requests, and any
other on site needs that you may have while at AU..
Your Conference Manager will provide you with a contact number while you are on campus and will likely
ask for yours as well so that the two of you can remain in close contact. This cell phone number should only
be given to key conference staff members and not to your general participants. From May to August, there
will always be at least one Conference Manager on-call for needs that occur outside of the traditional work
day. If there is a true emergency, the Resident Director on-call will respond; if there is a logistics need, the
Conference Manager on-call will respond.
www.american.edu/ocl/housing/crs
4
Key Campus Contacts
Please write in the following information once your Conference Manager contacts you:
Resident Hall Front Desk Number: 202-______-___________
24 Hour Resident Hall Front Desk Phone Number: 202-______-___________
To contact the Summer Assistant on Duty or the Full-Time Resident Director on Duty
Conference Manager Cell Phone: 202-______-___________
During Traditional Weekly Work Hours
Conference Manager on Duty Cell Phone: 202-______-___________
During Weekend and After Traditional Weekday Hours
Housing & Dining Programs Main Office: 202-885-3370
Weekdays, 9:00am-5:00pm
University Public Safety (non-emergency): 202-885-2527
Emergency Services: 202-885-3636
For simple requests and questions, the residence hall front desk staff should be your first resource. If they
are not able to answer your question or request, they will contact the appropriate Conference Manager on
your behalf.
www.american.edu/ocl/housing/crs
5
Summer at American University
Residential Accommodations
AU offers affordable housing for conference groups from May 12 – August 10, 2013 in one of our residence
halls on Main campus.
Residence Hall Types
 Residence halls range in size and configuration with most of the halls having rooms that are 12’ x
15’ double rooms for shared occupancy.
 Common bathroom facilities are located on each wing of each residence hall floor and are
designated by gender. Each bathroom has several shower stalls, toilet stalls and sinks.
 Single and triple rooms are available, but are limited.
 Centennial Hall offers semi-private suite living with two double rooms sharing one bathroom. This
residence hall is traditionally reserved for AU summer students as well as adult guests, so
availability is limited.
 Nebraska Hall apartments offer 2, 3 & 4 bedrooms with a common living area, bathroom and full
kitchen. This residence hall is traditionally reserved for AU summer students and adult groups
staying over two weeks.
Room and Hall Amenities
 All residence hall facilities are fully air conditioned with in-room temperature controls.
 Wireless internet connectivity is available for all of campus. If wireless internet connectivity is
requested, your Conference Manager must be informed two weeks prior to your event. There are
Ethernet ports in every residence hall room, but we do not provide Ethernet cards. International
laptops may not be eligible for internet connectivity or may require additional technical support
when on site. The Office of Information Technology’s Help Desk can be reached at 202-885-2550
when on-site assistance is needed.
 Conference group rates include the cost of linens consisting of bed sheets, a blanket, pillow,
pillowcase and a towel for each participant. If a conference group does not wish to have linen
available for participants, the cost of housing is reduced by $2.00 per person, per night.
 Each residence hall floor has a TV social lounge and/or kitchenette area that can be used by
conference groups. There are no refrigerators in any of the residence hall lounges, but you may
rent one through www.myfridgerental.com.
 Laundry facilities are available on every residence hall floor on Main campus. Our laundry system
only accepts EagleBucks payment on your Summer Guest Card. Laundry is $1.50 to wash and
$1.50 to dry.
 Residence hall rooms do not include phones or phone lines.
Residence Hall Front Desks
 Each side of main campus has one residence hall front desk that remains open 24 hours a day.
There is also a Conference Manager on Duty overnight to assist with any emergencies that arise
after traditional business hours. The Conference Manager on Duty can be contacted through the
front desk.
www.american.edu/ocl/housing/crs
6









Spare keys to all residence hall rooms are kept at the
front desks on Main campus. Conference guests
should also come to the front desk with appropriate
identification if they lose a room key. The desk staff
will issue a spare key to the individual and will also
order a new key for the room.
Only the individuals who are assigned to a room are
permitted to check out a spare key to that room.
Parents/guardians and conference leaders are not
permitted to check out any keys other than their own.
Lost keys will incur a $100 for room key and $20 for a
mailbox key to cover the cost of the replacement.
Lost Summer Guest Cards should be reported
immediately to the residence hall front desk so that a
replacement card can be issued immediately.
Replacements cost $25 each.
Package delivery and mail services are available for
conference guests who are staying for more than 4
weeks. Large shipments are not accepted at the front
desks and should be delivered to a nearby shipping
agency.
Maintenance/housekeeping concerns should be
addressed to the front desk or by calling 202-885-2FIX. Emergency maintenance may require the
participants of a room to relocate so that work can be completed.
Hand trucks and carts are available at the residence hall front desk to move heavy items.
A limited supply of extra blankets and pillows are available for rent at each residence hall desk.
Any materials not returned will be invoiced to the conference group in final billing.
The front desks can also provide you with contact information and resources to help you locate
local restaurants, retail, and grocery stores in the Northwest DC area.
Contracting for Housing
 American University begins contracting housing space in January for the upcoming summer.
 When you sign a contract, your conference group is required to pay for a minimum of 90% of the
housing spaces under contract, regardless of the number of participants who check-in.
 We reserve 10% additional bed spaces above the number of housing spaces in your contract in
case your conference numbers increase during your registration process. (Any housing needed
over the 10% additional bed spaces may or may not be available.)
 A deposit of 40% of the estimated housing and meal costs is due when the contract is signed. The
remaining balance and any other additional costs will be billed to the conference following their
stay.
www.american.edu/ocl/housing/crs
7
Housing Rosters
 Once we have received your signed contract and deposit, your Conference Manager will send you
a housing room roster for you to complete and a floor plan to assist you with completing room
assignments. AU will designate which rooms are singles, doubles and triples for your convenience
in completing your roster.
 If you wish for American University staff to do the room assignments for you, based on your
registration database, we are happy to do so at the rate of $2.50 per residential participant needing
to be assigned.
 Conferences groups are required to send a
complete housing room roster to American
University two weeks prior to the start of
the event. Once the final roster is
submitted to AU, changes to that roster
can only be made by the conference
group’s primary contact or his/her
designee. We will not make room
changes for conference guests without
the coordinator’s approval.
 Any conference groups with minors (under
18 years of age) must provide home
address and emergency contact
information. Conferences must provide one
adult chaperone/guardian for every seven
conference guests under the age of 18.
 If you wish to have internet access while
on campus, we will need a ten digit
telephone number for each person who
needs internet access. This information
should be submitted on the housing roster.
Important American University Housing Policies
 Alcohol is not permitted in any campus residence hall facility regardless of the occupant’s age. Any
alcohol found in the residence halls will be removed from the premises. The Director will confer
with the conference group leader to determine the appropriate course of action if the alcohol policy
is violated.
 Smoking indoors is also prohibited. Smoking is allowed outside, in areas not attached to
residence halls.
 Candles/incense/open flames/BBQ grills are not allowed in any buildings on campus.
 Hall sports are also not allowed due to the sensitivity of hallway sprinkler systems.
www.american.edu/ocl/housing/crs
8
Checking-In and Checking-Out of the Residence Halls
Helpful Information for a Smooth Registration/Check-In Process




Check-in begins at 3:00pm on the date of your group’s arrival. Exceptions are considered on a case by
case basis by your Conference Manager. After the established check-in time, conference guests are
able to begin check-in to their room assignment at any time.
Housing check-in consists of having the conference participant sign and date a registration card, and
receive a room key and Summer Guest Card. If a conference guest is on campus for more than a
month, we will also provide him/her with a mailbox key. If internet
usernames and passwords have been requested, we will provide
that information on the key envelope for the guest’s convenience.
 American University does not manage any financial
transactions with conference guests who are under contract.
Payments for conference registration and housing must be paid
directly to the conference.
 American University will have your Conference Manager (or
his/her designee) at your check-in process for additional resource
information and assistance if needed.
 If your conference group contains high school aged
participants, we would like to provide them with a “Welcome to AU”
information folder with your permission. We are happy to provide
you and your conference guest with any AU materials upon checkin at your request.
All liability waivers for use of the Jacobs Fitness Center must be submitted by the end of the
registration/check-in period. Many groups will obtain an electronic copy from us months in advance and
send them out with their own registration packets, and this is the encouraged method for the collection
of forms. All guests 14-17 years of age must have signed parent/guardian consent on the liability
waiver form.
Linens will already be in each room on the bed. Additional blankets and pillows are available from the
front desk in limited supply and can be requested after check-in is complete for an additional cost.
Helpful Information for a Smooth Check-Out Process



The contract states that all participants should be checked-out of their residence hall rooms by noon on
the date of your group’s check-out and exceptions are considered on a case by case basis. Any
changes to the check-out process/time should be reported to your Conference Manager as soon as the
change occurs so that we can attempt to adjust staffing.
In order to check out of your room, all items should be removed from the residence hall with the door to
your room closed and locked. Conference guests should leave linens in their room as found at checkin.
Conference guests should bring their key to the residence hall front desk or designated check-out
location to sign and date their key back to American University staff. Lost keys will incur a $100.00
room key a $25.00 lost guest card fee and/or $20.00 mailbox key to the conference to cover
replacement.
www.american.edu/ocl/housing/crs
9
Summer Guest Cards
Any summer conference guest who needs housing or meals at American University will be issued a
Summer Guest Card. This card is uniquely coded for each conference attendee for five specific uses while
on campus.
General Summer Guest Card Information


Summer conference guests should carry their Summer Guest Card on them at all times and be able to
produce it to American University staff when needed.
If any Summer Guest Cards are lost during the conference, a replacement cost of $25.00 will be
assessed to the conference group. Conference cards are assigned to specific individuals, so we will be
able to provide the name and card number of the person who had a card lost during the event.
Access to Exterior Doors of Residence Halls


The Summer Guest Card is your pass to enter the designated residence hall where you will be staying.
In order to provide additional security for the residence halls, the doors to all of our halls are locked 24
hours a day but you can swipe the computer stripe on your Summer Guest Card to gain entry.
Once you enter the building and the card reader turns from red to green, each conference guest will be
asked to show their Summer Guest Card to the staff member at the front desk to provide additional
assurance that you are approved to be in that hall. We call this our “Swipe and Show” policy. Your
assistance in educating your conference group about this procedure allows us to provide excellent
security for your guests, so please make sure to “Swipe and Show” when you enter the residence halls.
The front desk staff will prompt you to show your Summer Guest Card to them before proceeding into
the hall.
Meals in the Terrace Dining Room



Once your meal numbers, dates and times have been finalized three (3) weeks prior to your
conference start date, we will pre-code your Summer Guest Cards for all of your meals.
Summer Guest Cards are coded for an exact meal on an exact date. For example, if you have 100
people having dinner on June 12th, your meal card will only allow access for dinner on June 12th.
Someone who misses that meal will not be able to have dinner on any other date in exchange. Coding
your cards in this manner allows you greater control of your dining invoice so that conference guests
will not eat meals outside of your approved dining contract.
Some groups will often have a guest speaker or executive board member who unexpectedly decides to
stay for a meal with the conference group. We can provide you with one Summer Guest Card that has
unlimited access for meals and will simply keep track of all of the meals eaten that are in addition to
your contract dining numbers. This does require you to have one of your conference staff members
available at the entrance to the dining hall who will have the unlimited access Summer Guest Card to
approve and swipe your extra meal participant(s) into the dining hall.
www.american.edu/ocl/housing/crs
10
EagleBucks Program






EagleBucks is a convenient, cashless way to pay on and off campus at the area's most popular
businesses. A pre-paid, stored value account that is part of your Summer Guest Card, EagleBucks has
you covered with whatever you need, 24 hours a day.
EagleBucks is accepted at a variety of locations both on and off campus. A complete list of EagleBucks
vendors can be found at www.eaglebucks.com.
EagleBucks are required for all laundry machines in the residence halls. Coin machines are not
available.
EagleBucks funds can be added to your Summer Guest Card in several ways: 1) Add funds to each
card of your conference participants in advance, 2) Have conference guests add money using cash at
several “value stations” location in residence halls and in the Mary Graydon Center, or 3) Come to the
Housing and Dining Programs office in Anderson Hall with any form of payment during the weekday
business hours of 9:00am-5:00pm.
EagleBucks can be used for printing, copying and vending machines needs throughout campus.
Any EagleBucks funds left unused at the end of the conference are non-refundable to the individual
guest or to the conference group.
Access to the Jacobs Fitness Center


Summer conference guests who are approved for use of the Jacobs Fitness Center at American
University will also have their access to the fitness center programmed onto their Summer Guest Card.
The front desk of the Jacobs Fitness Center will take your Summer Guest Card upon entry to the
center and swipe your card for approval of entry.
All guests wishing to use the Jacobs Fitness Center must sign a liability waiver and all guests 14-17
must have signed parent/guardian consent. Any conference guests who do not sign the Jacobs Fitness
Center liability waiver by the conclusion of conference registration will not have access .
Use of the American University Shuttle to the Tenleytown/AU Metro Station



One of the perks of hosting your event at American University is the free use of the AU shuttle to and
from Main campus and the Tenleytown/AU Metro Station on the Red Line of the DC metro system.
When leaving from campus, make sure to ask the front desk for the location of the closest campus to
metro shuttle pick-up point. When you get on the bus, the driver may ask for your AU identification and
you should show him/her your Summer Guest Card.
If you are arriving on campus for the first time and want to use the shuttle from the Tenleytown/AU
Metro Station, simply inform the driver which residence hall or campus building you would like to go to,
and he/she will direct you towards the correct stop.
Troubleshooting Problems with Your Summer Guest Card


Your Conference Manager and the residence hall front desk staff are your first and most convenient
resource for addressing any problems you may experience with your Summer Guest Card.
If a Summer Guest Card is lost, please report it immediately by contacting the residence hall front desk,
the Housing and Dining Programs office, or Public Safety. When your new card is produced, we will
transfer any unused meals or EagleBucks.
www.american.edu/ocl/housing/crs
11
Dining and Catering Services
Our office is proudly partnered with Bon Appétit Management Company to provide the highest quality food,
catering and customer service to all of our summer conference guests.
Dining Halls





American University has an allyou-can-eat dining facility where
you pay one flat rate for each
meal. The Terrace Dining Room
is located in the Mary Graydon
Center. All of the dining hall
meals will be programmed onto
your participants’ Summer Guest
Cards to give you maximum
control over expenses charged to
your conference group.
Once a contract is signed for
meals, you cannot reduce the
number by more than 10% but
we can add meals in addition to
your contract. Final meal numbers are due 10 business days prior to the beginning of your summer
program and cannot be increased after that date.
Both dining halls offer a variety of food selections including a vegan and vegetarian bar, comfort
food, salad and cold pasta bar, grilled foods, pizza and pasta, cereals and breakfast foods, stir fry
selections, and a dessert station. Coca-Cola is the beverage provider for the American University
campus dining and vending operations.
The chef of Bon Appétit is proud of its proven ability to accommodate special dietary needs. We
request that you also inform us of any special dietary needs at least two weeks prior to your arrival.
If your summer conference is at AU for an extended period of time, we do offer summer meal plans
in blocks of 25 or 50 meals plus varying values in EagleBucks at a reduced cost. Meal plan blocks
should only be used for conference groups who will be staying on campus for more than 2-3 weeks
in order to find block package to be a savings.
Boxed Meals

Planning a trip to the National Mall or other sights and sounds of Washington, DC? Let us prepare
boxed breakfasts or lunches for you at the same cost as eating in one of the dining halls! All boxed
meals can be picked up at the loading dock to the Terrace Dining Room near the Mary Graydon
Center tunnel entrance on South Campus. Boxed meals should be ordered with your Conference
Manager at the same time you submit your final meal requests (ten business days prior to the start
date of your event).
www.american.edu/ocl/housing/crs
12
Catering Services





Catering services are also available from Bon Appétit, but are not required to be used by any
conference group using AU space. Outside vendors and caterers are permitted on AU grounds, but
we think you will find Bon Appetit’s catering department to be better than any other option
available.
Conference groups are required to enter a separate contract with Bon Appétit for catering services
in advance of the event. At least one month notice is important to ensure that menus can be
selected and contracts signed for a successful event. We will certainly be a part of your planning
process for catered events as well.
Catering options are limitless and include buffet style meals, seated meals and banquets, an in
house pastry chef, as well as soda, coffee or water refreshment breaks.
Hard copy and electronic menus are available for your review upon request. Menus are a starting
point to provide you with ideas and suggested items, but the catering staff can customize your
selection.
Vegan and vegetarian meal options are available for catered events upon request.
Retail Operations

American University is home to several retail outlets: Megabytes Cafe, Chevy Chase Bank,
American University’s Bookstore, Subway, and the Eagles Nest. All retail stores will be open during
scheduled hours during the summer for your enjoyment. All campus retail operations accept
EagleBucks.
www.american.edu/ocl/housing/crs
13
Meeting, Classroom and Event Spaces
University meeting, classroom and facility spaces vary in size, set-up and price. AU cannot guarantee
spaces in classroom buildings until late April each year since AU academic classes have the highest
priority at all times, but we do make every effort to accommodate the specific needs of each conference.
 All spaces have a minimum rental time of two hours per space, per day in order to cover staffing
and room set-up expenses associated with hosting your event at a specific location.
 We do host day only meetings during the summer months if space is available after residential
conference groups have made their requests.
 Final meeting and event space requests are due three weeks prior to the start of your conference
program. Requests for new space or changes to reserved space made two weeks or less prior to
the start of the conference will incur a ten percent (10%) late processing fee for each reservation
submitted after the previously mentioned two week deadline.
 Audio visual requests are also due three weeks prior to the start of the conference program and
are subject to an additional 10% service charge similar to the meeting space confirmation
requirement.
 All indoor spaces are fully air conditioned and have wireless internet connectivity available.
 Classrooms and meeting spaces also have a wireless connection. The Office of Information
Technology’s Help Desk can be reached at 202-885-2550 if on-site assistance is needed.
 All meeting and classroom spaces are fully accessible for mobility considerations. Please consult
your Conference Manager for suggested accessible routes to and from event spaces.
 The Office of Public Safety is responsible for locking and unlocking any meeting spaces you have
reserved during the early morning or late evening hours. To request an officer’s assistance, please
contact your Conference Manager.
Classroom and Auditorium Spaces






American University has a variety of classroom spaces ranging from theatre style auditoriums to
rooms with desks in a concentric U-shaped arrangement.
Our classrooms will seat anywhere from 25-65 people at once.
There are three classroom auditorium spaces that can seat 200 to 388 people. Two of the
auditoriums are located on the terrace level of the Ward classroom building (Ward 1 seats 388 and
Ward 2 seats 200). The third auditorium, the Kay Chapel, is located in the Kay Spiritual Life Center
located next to the Ward classroom building on AU’s main quad (Kay seats 300).
Furniture cannot be moved out of
any classroom space even if only
temporarily.
Most classroom furniture is affixed
and does not allow for various
arrangements or set-ups.
If there is someone in your reserved
space, contact your Conference
Manager to receive an alternate
room assignment or to have us
address the individuals present in
your room.
www.american.edu/ocl/housing/crs
14




Posting on walls and doors in the Ward classroom building is not permitted. You may bring or rent
easel stands for posting signs outside of classroom spaces if you would like.
Most classrooms in the Ward building contain chalkboards (dry erase boards are typically located
in meeting and multipurpose spaces). If you intend on using a chalkboard, you will need to bring
your own chalk, as there may not be any in the room upon your arrival.
Ward classrooms contain smart technology (a pull down screen and an overhead LCD projection
system for use with laptop or DVD/VCR player), but conference groups must still request and pay
for audio visual services to be activated in classrooms.
Video conferencing is available in the Ward auditoriums with significant advance notice (at least
one month).
Meeting and Multipurpose Spaces
Many conferences enjoy hosting their events in spaces where the furniture and room set-ups can be
customized to their specifications. Our residence hall lounge spaces and Mary Graydon Center are perfect
locations for hosting meetings, activities and banquets or catered meals.
Outdoor Event Space
If you’re not looking for a traditional classroom or lounge space, AU also has several outdoor venues that
could work nicely for a summer barbeque, field day or other outdoor activity.
 Options for rental of outdoor event spaces include the Friedheim Quadrangle, and the Woods
Brown Amphitheatre.
 Additionally, summer conference groups can work with our office to rent outdoor recreation space
including the AU track, intramural fields, tennis and basketball courts, and the sand volleyball
courts.
 Any requests for tables, chairs, trash cans or electrical outlets for outdoor event spaces will result
in the conference group being invoiced for any costs incurred for the rental and/or set-up of
equipment.
 Banners/signs cannot be hung on the exterior of campus buildings or light posts by summer
conference groups. If you are interested in placing ground stakes for directional signs, please notify
your Conference Manager in advance for approval.
www.american.edu/ocl/housing/crs
15
Fitness and Recreation Facilities
William I. Jacobs Fitness Center
During your conference experience, you'll enjoy access to most of American University's athletic and
recreation facilities, including the William I. Jacobs Fitness Center, a state-of-the-art recreation and fitness
club. The center, located in Bender Arena, features weight and exercise equipment, and newly refurbished
locker rooms.
 AU offers the opportunity for residential conference guests to access the Jacobs Fitness Center at
no additional cost for participants who are over the age of 14.
 All guests wishing to use the Jacobs Fitness Center must sign a liability waiver in advance, and all
guests 14-17 must have signed parent/guardian consent as well. We prefer to have all fitness
center liability forms in advance, but we will accept them at the time of check-in.
 Residential guests have unlimited access to the Jacobs Fitness Center during scheduled hours of
operation.
 There is an opportunity to use the recreational indoor pool during open swim hours. There is no
additional charge for use of the indoor pool for residential guests and time use is limited to open
swim hours only. The indoor pool cannot be rented for private events by conference groups.
 Other outdoor facilities include an all-weather running track, soccer field, outdoor tennis, and
volleyball and basketball courts.
www.american.edu/ocl/housing/crs
16
Audio Visual and Other Rental Services/Equipment
The University’s Audio-Visual Services Office can provide your conference with state-of-the-art systems,
including LCD projection, video projection, DVD and TV capabilities at most sites, portable audio systems,
overhead projectors and slide projectors. Most meeting spaces are fully equipped for AV and audio hookups.
 Audio-visual requests should be submitted with meeting space requests at least three weeks prior
to the beginning date of the conference. Requests for new arrangements or changes made to
previous arrangements that are made two weeks or less prior to the start of the conference will
incur a ten percent (10%) late processing fee for each addition or change submitted after the
previously mentioned two week deadline.
 If there is a last minute change in your audio visual request or the equipment is not setup properly,
we ask that you call your Conference Manager, not the audio visual department.
 Laptop computers and printers are not available in classrooms or meeting spaces and are the
responsibility of the conference group to provide if needed. We are not able to provide extension
cords or Ethernet cords.
 Audio visual staff is available to assist with set-ups upon request at a fee. Large events (500+
people) or events in Bender Arena require the rental of an AU technician on site paid at an hourly
rate.
 Audio visual staff will arrive to set up your rental equipment 30 minutes prior to the start of your
meeting space reservation/event start time. If you wish to have audio visual arrive earlier than this
time, you must change your meeting space reservation to reflect the time you want access to the
space and audio visual set-up.
Equipment and Supplies Available for Rental



The summer conference staff maintains a limited supply of other equipment and resources that can
be purchased or rented for special events. Each of the items below can be rented from American
University for a daily rental fee:
o Tablecloths
o Flip Charts
o Trash Cans
o Easels
Tables and chairs are already included in most room rental costs unless your request exceeds the
room capacity.
In previous summers, the Conference & Residential Services staff has worked with outside
vendors to rent other supplies and equipment that you may need, including; pianos, tents and other
large items. You will be invoiced at cost for any rentals we coordinate on your behalf, plus a service
fee of 17% to cover staffing and ordering costs.
www.american.edu/ocl/housing/crs
17
Parking and Transportation Services
Transportation Considerations
AU is accessible from all three major airports located in the metropolitan area. Reagan National Airport
near downtown Washington, DC, is accessible to the AU campus by Metro (subway) and taxi.
 AU is located less than a mile from the Tenleytown/American University Metro Station and shuttle
service is provided daily to the Metro for AU students, faculty, staff and summer conference guests
at no additional charge. The shuttle schedule can be found at:
http://www.american.edu/finance/ts/shuttle.html. There is also a shuttle from Main Campus to AU’s
Washington College of Law. Shuttles run approximately every 15 minutes from 7:00 am until
12:30am and hours are extended on weekends. The AU shuttle is accessible for any individuals
with mobility considerations.
 Taxis are often available near the Asbury Building on campus or by calling from the front desk of
any residence hall.
 Private transportation or shuttle services for conference groups are not available from American
University.
 According to the District of Columbia Municipal Regulations: Title 20 Chapter 9, Motor Vehicular
Pollutants, Lead, Odors, And Nuisance Pollutants, commercial bus idling is not permitted.
However, you should be aware that there are 2 exceptions to the above rule as stated in paragraph
900.1 that apply to American University: to operate for 15 minutes air conditioning equipment on
buses with an occupancy of 12 or more persons and to operate heating equipment when the
temperature is below 32° F or below.
Parking Arrangements and Logistics
The Nebraska Avenue parking lot is the main location for conference guest parking on the American
University campus. The lot is located at the corner of New Mexico and Nebraska Avenues.
 Each conference is eligible to receive up to one parking permit per residential guest at no cost to
the conference.
 All final requests for parking permits are due two weeks prior to the start date of your conference
program in order for us to have the appropriate passes ready in time. Parking permits will be
distributed at check-in/registration. Some permits may be distributed prior to a group’s arrival upon
one month advance notice of this request.
 Directions to the Nebraska Avenue parking lot and American University are located online at:
http://www.american.edu/maps/.
 All vehicles are required to park in the Nebraska Avenue parking lot (including buses). Any special
requests or handicap parking permits must be accompanied by a doctor’s notice to Public Safety
upon arrival to campus. Parking in front of buildings is only approved for loading and unloading
purposes only. Idling by any vehicle is not permitted on-campus or in the Nebraska Avenue parking
lot at any time.
www.american.edu/ocl/housing/crs
18
Residence Hall and Campus Security
Residence Hall Safety





Each side of the American University campus has a minimum of one residence hall desk that is open
and staffed 24 hours a day for increased security of the halls. While working the desk, our summer
team is easily identifiable by their staff shirt and nametag.
Summer guests are required to display their Summer Guest Card to our summer staff at the desk each
time they enter the building for increased safety measures in the hall.
In addition to the residence hall 24 hour desk, there is also a Conference Manager on Duty overnight to
address any situation that needs University attention. The Conference Manager on Duty will be able to
contact the professional staff member on duty as well in the event of an emergency.
We require all residential conference guests to provide an emergency contact person at check-in in
case of an emergency situation. If your conference group is large in size, we can use your registration
database to obtain emergency contact information ahead of time to allow for faster check-in
procedures.
Evacuation procedures are posted in each building and should be followed closely in the event of an
emergency. American University staff will be on hand to assist with any emergency procedures and all
summer conference guests must follow instructions for their safety and the safety of others. Residence
halls must be evacuated in the event of an emergency.
Campus Safety

American University has its own Public Safety office with officers trained by the Metropolitan Police
Department. These officers do not have Police authority but are the University’s first line of emergency
and crisis response. Public Safety Officers work very closely with the summer staff in maintaining a
safe living and campus atmosphere for our
summer guests. Officers do not “patrol” the
halls but can often be seen in the residence
halls as an additional presence and comfort for
those staying with us residentially.
 Emergency phones and blue lights are
located throughout campus for individuals to
report issues of safety and security if needed.
 For your information, the closest hospital
facilities to American University are Sibley,
Suburban, Georgetown and George
Washington Hospitals.
www.american.edu/ocl/housing/crs
19
Contracts and Billing










At least three months before the group’s arrival date, all conference groups sign a contract for housing
and dining services with Housing and Dining Programs.
Each conference group must also provide (with their contract) a certificate of liability insurance for itself
and its participants with limits of no less than one million dollars (combined single limit for each
person/occurrence for bodily injury and/or property damage). The University must be named as an
additional insured on the policy.
The District of Columbia Treasurer requires a 14.5% hotel tax be applied to any rented housing
accommodations unless the organization is tax exempt in the District of Columbia or is a 501(c)(3)
organization. A copy of an organization’s 501(c)(3) determination letter or of the tax exempt certificate
should be submitted with the contract in order to waive the required hotel tax.
Additionally, a 40% deposit for housing and dining costs must accompany the contract in order for any
reservations or confirmations to be held.
Once the contract is signed, conferences may not decrease the amount of room commitments by more
than 10%. Any increases over the contracted amount will be accommodated on a space availability
basis only. Conferences either pay the contracted amount or the amount actually used, whichever is
higher.
All requests for changes to meeting spaces or other reservations/confirmations must be submitted in
writing to the Conference & Events Coordinator or your Conference Manager.
Deposits and final payments can be made in the form of credit card, personal or business check, or
American University account to account transfer (JE or JV transfer).
All summer refund requests must be submitted in writing and will be considered at the end of the
summer conference season.
All conferences will be invoiced within 60 business day following their visit. Invoices will include
charges for housing, meeting spaces, audio visual, food services, lost keys, room damages, and
special meeting room setups, including phone jacks, computer lines, special AV equipment and
equipment rental.
Payment of your final bill can be made using one of the following methods: check drawn within the
United States (with a routing number on the check), credit card (Master Card, Visa or Discover) or
Inter-Departmental transfer of funds within 30 days of receiving a billing statement. Once payment
exceeds 30 days, a late charge of 5% will be assessed for overdue accounts receivable according to
your summer conference contract. A $30.00 charge will be assessed for a returned check.
www.american.edu/ocl/housing/crs
20
Beginning the Conference Planning Process
As we have previously mentioned, AU's summer conference program provides you as the event planner
with a "one-stop conference planning" experience: you tell us what you need and we navigate all of the
University offices on your behalf. We want your onsite logistics to be as smooth as possible and have found
this system to work best in hosting successful conferences.
To begin making progress, we break planning down into several phases:
 Reservations – AU begins accepting reservations the fall prior to the upcoming summer.
 Contracting – We will begin contracting housing and dining needs in January each year. Please keep
in mind a contract must be signed three months prior to your arrival.
 Final Logistics – Three weeks prior to your arrival, we will be in contact for final numbers, meeting
space/AV requests, room roster, etc.
 On Site Coordination – You will work closely with your Conference Manager to have great conference
from check-in to check-out.
 Final Invoicing – You will receive a final invoice within 60 business days of your departure from
campus.
We would love the opportunity to walk you through our facilities and services to determine the best possible
plan for your upcoming program. We hope to see you soon at American University!
www.american.edu/ocl/housing/crs
21
2)),&(2)81,9(56,7<$5&+,7(&7
$0(5,&$181,9(56,7<
3K'
70
VI
9,6,7,1*
6&+2/$56
71
VI
23(1722876,'(
8S
VI
%$
(/(&
VI
%
6725$*(
3K'
7.
VI
3K'
7VI
6.</,*+7
3K'
7+
VI
3K'
7*
VI
VI
3K'
7)
&23,(5
5220
7$
VI
0(1 6
5(6750
7
VI
-&
7
VI
3K'
7(
VI
&255,'25
7 VI
5DPS
8S
8S
3K'
7&
VI
3K'
7'
VI
5(6($5&+
6&+2/$56
74
VI
3K'
7%
VI
:20(1 6
5(6750
7
VI
*5((1
5220
7
VI
6,6
35()81&7,21
7
VI
&$7(5,1*
7
VI
81,6(;
72,/(750
7
VI
&867(48,3
7
VI
&255,'25
7
VI
672
7
VI
&/
7%
VI
&/
7$
VI
/,%5$5<
/281*(
%$
VI
$950
%
VI
75$1
6&5,37,21
6(59,&(
(48,30(17
7
VI
67$,5
7
VI
VI
7
6725$*(
7(&+
6833257
7
VI
VI
7(&+
6833257
7
VI
7(&+
6833257
7
VI
2)),&(
%
VI
/281*(
%
VI
6.</,*+7
5(&(37,21
%
VI
:25.
$5($
%&
VI
:25.
$5($
%
VI
$3DUWRIWKHVWIORRU
(/(9
77
VI
&255,'25
7
VI
:25.
$5($
%
VI
7HUUDFH)ORRU3ODQ
0(1 6
/2&.(5
50
7
VI
0(1 6
5(6750
7$
VI
7(55$&(/(9(/
3$5.,1**$5$*(
75$6+5(&<&/,1*
5220
7
VI
9(67,%8/(
7
VI
:20(1 6
/2&.(5
50
7
VI
:20(1 6
5(6750
7$
VI
6+2:(5
&/26(7
%%
VI
6+2:(5
&/26(7
%$
VI
VI
%
&/$665220
6FKRRORI,QWHUQDWLRQDO6HUYLFH
3K'
7/
VI
7
VI
5(6($5&+
6&+2/$56
7
VI
VI
73
678'(17
25*6
7
VI
)281'(565220
7
&2//$%$725<
678'(17
25*6
7&
VI
%$
VI
&/26(7
VI
%
&/$665220
6725$*(
%
VI
5$03
83
&RUULGRU
%%
VI
-DQXDU\
)HHW
2)),&(
%
VI
2)),&(
VI
6725$*(
$
VI
6725$*(
VI
2)),&(
&
VI
2)),&(
VI
&867
VI
2)),&(
'
VI
2)),&(
VI
&255,'25
VI
:20(165(6750
VI
2)),&(
VI
2)),&(2)81,9(56,7<$5&+,7(&7
0$,/69&
VI
0(165(6750
VI
$75,80
$0(5,&$181,9(56,7<
2)),&(
VI
23(1
2)),&(
VI
VI
&/$665220
VI
23(12)),&(
2)),&(
$
VI
2)),&(
VI
(/(&
VI
7(/&2
',*,7$/
VI
2)),&(
%
VI
2)),&(
*
VI
2)),&(
&
VI
'2:1
6725$*(
VI
67$,56
VI
672
$
VI
2)),&(
VI
2)),&(
'
VI
23(1
2)),&(
VI
2)),&(
(
VI
&/$665220
VI
&/$665220
VI
$75,80
VI
)LUVW)ORRU3ODQ
6FKRRORI,QWHUQDWLRQDO6HUYLFH
2)),&(
$
VI
2)),&(
)
VI
$03+,7+($7(5
$
VI
(/(9
VI
&255,'25
VI
2)),&(
VI
6721(%(1&+
5(&(37,21
$
VI
'$9(13257
/281*(
VI
9(67,%8/(
VI
&255,'25
VI
)HHW
2)),&(
)
VI
2)),&(
(
VI
2)),&(
'
VI
2)),&(
&
VI
%RRN6KHOI
2)),&(
$
VI
-DQXDU\
2)),&(
+
VI
2)),&(
*
VI
(/(&
VI
67$,56
VI
23(12)),&(
VI
2)),&(
%
VI
2)),&(
%
VI
&867
VI
2)),&(
VI
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(2)81,9(56,7<$5&+,7(&7
2)),&(
VI
:20(165(6750
VI
/281*(
$
VI
0(165(6750
VI
&255,'25
&255
2)),&(
VI
&255,'25
.,7&+(1
VI
&23<
6833/<
5(&<&/(
VI
2)),&(
VI
$0(5,&$181,9(56,7<
2)),&(
$
VI
23(12)),&(
VI
&/$665220
VI
2)),&(
VI
2)),&(
$
VI
/&5'$7$
VI
2)),&(
VI
(/(&
VI
(/(9
VI
&255,'25
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
(/(&
VI
67$,5
VI
2)),&(
VI
&255
2)),&(
VI
2)),&(
VI
2)),&(
VI
VI
23(12)),&(
&21)(5(1&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
%$/&21<
+
VI
2)),&(
VI
2)),&(
VI
:$,7,1*
*
VI
2)),&(
VI
2)),&(
%
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
&255,'25
VI
2)),&(
VI
23(1
72
%(/2:
VI
23(12)),&(
2)),&(
$
VI
6HFRQG)ORRU3ODQ
2)),&(
'
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
6725$*(
VI
2)),&(
VI
2)),&(
)
VI
&255,'25
5
VI
2)),&(
&
VI
6FKRRORI,QWHUQDWLRQDO6HUYLFH
2)),&(
VI
&255,'25
VI
%$/&21<%5,'*(
VI
23(1
72
%(/2:
2)),&(
VI
%5($.287
VI
&255
VI
%$/&21<
VI
(
VI
67$,5
&21)(5(1&(
VI
2)),&(
VI
&255,'25
VI
(/(&
VI
6725$*(
.
VI
2)),&(
$
VI
2)),&(
*
VI
2)),&(
)
VI
2)),&(
(
VI
-DQXDU\
)HHW
23(12)),&(
VI
2)),&(
'
VI
2)),&(
&
VI
2)),&(
%
VI
2)),&(
%
VI
&867
VI
2)),&(
VI
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(2)81,9(56,7<$5&+,7(&7
2)),&(
VI
:20(165(6750
VI
/281*(
$
VI
0(165(6750
VI
&255,'25
&255
2)),&(
VI
&255,'25
.,7&+(1
VI
&23<
6833/<
5(&<&/(
VI
2)),&(
VI
$0(5,&$181,9(56,7<
2)),&(
$
VI
23(12)),&(
VI
&/$665220
VI
23(12)),&(
VI
2)),&(
$
VI
/&5'$7$
VI
2)),&(
VI
(/(&
VI
(/(9
VI
&255,'25
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
(/(&
VI
2)),&(
VI
2)),&(
VI
VI
23(12)),&(
VI
&255
2)),&(
VI
&21)(5(1&(
2)),&(
VI
2)),&(
VI
2)),&(
VI
%$/&21<
$
VI
2)),&(
VI
2)),&(
VI
&21)(5(1&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
&255,'25
VI
2)),&(
VI
23(1
72
%(/2:
VI
23(12)),&(
2)),&(
VI
7KLUG)ORRU3ODQ
2)),&(
VI
2)),&(
VI
6FKRRORI,QWHUQDWLRQDO6HUYLFH
2)),&(
VI
&255,'25
VI
2)),&(
VI
67$,5
VI
%$/&21<%5,'*(
VI
23(1
72
%(/2:
2)),&(
VI
6725$*(
VI
2)),&(
VI
%5($.287
VI
&255
VI
%$/&21<
VI
&/$665220
VI
67$,5
VI
2)),&(
VI
&255,'25
VI
(/(&
VI
2)),&(
VI
2)),&(
VI
2)),&(
VI
-XO\
)HHW
23(12)),&(
VI
&21)(5(1&(
VI
Albemarble
Ri
ve
Alton
rR
oa
d
Chesapeake
Yuma
4620 Wisconsin Avenue
4000 Brandywine Street
Brandywine
4545 42nd Street
Windom
Tenleytown/
AU Metro Station
Red Line
M
Butterworth
Albemarble
Albemarble
Alton
4801 MASSACHUSETTS AVENUE
Warren
ch
Van Ness
Van Ness
ue
Ne
br
as
ka
Av
en
46t
h S
tre
et
le
gw
ic
ue
k
ven
gd
a
Sed
Rodman
Aven
ue
th
le
47th
Sp
rin
Sedgwick
A
sin
da
Tin
45
th
Upton
48th
45
46th
Ford
ham
ue
con
Wis
Av
en
Tilden
49th
46th
Qu
rsity
Upton
4200 Wisconsin
Avenue
Verplanck
tts
45th
us
e
46th
th
47th
50
Van Ness
Tenley Circle
Warren
as
49th
46th
en
ue
Ford
ham
M
sa
Av
47th
tts
48th
50th
Verplanck
Yuma
Tenley Campus
4300 NEBRASKA AVENUE
Windom
ac
hu
se
49th
th
44th
Washington
College ofYumaLaw
43rd
Warren
as
s
50
42nd
48th
50th
M
Un
ive
ebec
Ward Circle
Tilden
M
ch
us
W
es
to
ve
rP
as
sa
45
th
ts
Av
en
ue
3201 New
Mexico Avenue
ico
e.
Av
45th
Vicinity Map
k
ic
ew
44th
dg
Se
Lowell St.
et
k Dr.
sy Par
x
Me
k
ood
ckw
Ro
Embas
w
Ne
roo
nb
Gle
4801 Massachusetts Avenue, N.W.
Washington, D.C. 20016
la
ce
St
re
et
47th
48th
Washington College of Law
Main Campus
4400 MASSACHUSETTS
AVENUE
St
44
th
St
re
et
et
re
M
as
sa
ch
us
Katzen
Arts
Center
br
as
ka
Glover
Gate
Leonard
Un
Nebraska
e
Admissions
Welcome
Center
Av
e
sity
ive
r
ue
President's
Building
Av
enu
e
Wesley
Theological
Seminary
Av
en
nu
et
ts
Mc
Do
Ne
we
ll
McDowell
Tenley Campus
gh
es
Hughes
4000 Brandywine Street
4200 Wisconsin Avenue
4620 Wisconsin Avenue
Hu
Ce Sp
nt ort
er
s
An
ne
x
Woods - Brown
Amphitheater
Kogod
Ward Circle
Kay
METRO
Sports Center
Bender Arena
Butler Pavilion
Reeves Field
Osborn
Ward Circle
Building
M
as
sa
ch
u
rk
ing
Ga
r
ag
e
Battelle-Tompkins
e
Ce
n
ter
Hurst
or
ts
Av
en
Media
Production
Center
Bender
Library
Centennial
Jacobs Field
Child
Development
Center
Anderson
SIS
Letts
Ne
w
Watkins
ic
Main Campus
50
150
350
500 FEET
0
100
250
Roper
Reeves
Gate
(closed)
Gray
d
S
o
Av
en
ue
Metropolitan
Memorial
United Methodist
Church
Fletcher
Gate
oo
Ro
ck
w
afe
ty
LF
Pu
bli
cS
Ha
mi
lto
n
McCabe
Lot
Closed
M
ex
Clark
Kreeger
Nebraska Avenue
Parking Lot
Ne
br
East Quad
McKinley
as
Woods
Gate
ka
Av
e
nu
Beeghly
(MGC)
se
tts
ue
Hannay
Gate
Eric Friedheim
Quadrangle
Mary Graydon
Sp
AU
Central
Pa
Asbury
Newark Street
3201 New Mexico Ave.
Parkway
ood
ckw
Ro
American University - Main Campus
4400 Massachusetts Avenue, N.W.
Washington, D.C. 20016
Office of University Architect
2-20-11
0
50
Child
Development
Center
100
150
250
350
500 FEET
Main Campus
Kreeger
Watkins
Jacobs Field
U
Media
Production
Center
Anderson
Centennial
Beeghly
Ro
od Parkway
o
ckw
Fletcher
Gate
McCabe
Letts
AU
Central
Asbury
ell
Butler Pavilion
Gray
Lot
Closed
Clark
Roper
Bender
Library
McKinley
Kogod
Glover
Gate
M
Hannay
Gate
co
ex
i
Newark Street
Metropolitan
Memorial
United Methodist
Church
Ne
w
Woods
Gate
Hurst
Katzen
Arts
Center
Ward Circle
Building
Kay
Admissions
Welcome
Center
Av
ue
en
Ward Circle
Nebraska
t
as
sa
ch
u
M
ts
se
t
en
ue
Av
METRO
th
50
4000 Brandywine Street
4200 Wisconsin Avenue
4620 Wisconsin Avenue
Tenley Campus
Rodman
Sedgwick
e
R
w
ock
ood
Van Ness
Verplanck
Warren
Windom
50
100
150
le
250
350
500 FEET
Main Campus
Ro
ad
Chesapeake
4545 42nd Street
Ward Circle
Lowell St.
M
.
as
sa
ch
us
et
ts
Av
en
ue
3201 New
Mexico Avenue
Dr
y Park
Embass
Tenleytown/
AU Metro Station
Red Line
4200 Wisconsin
Avenue
Tenley Circle
ven
ue
2-20-11
Van Ness
M
4000 Brandywine Street
Main Campus
4400 MASSACHUSETTS
AVENUE
Warren
Yuma
Albemarble
4620 Wisconsin Avenue
er
Tenley Campus
4300 NEBRASKA AVENUE
Sp
rin
gd
a
Capital
Tenley
Circle
Vicinity Map
Ri
v
0
e.
Av
ic
44th
45th
45th
46th
roo
k
Office of University Architect
Qu
ebec
Av
en
u
Upton
tts
us
e
Tilden
ch
sa
M
as
Butterworth
4801 MASSACHUSETTS AVENUE
Yuma
Washington
College of Law
Alton
Albemarble
Brandywine
Warren Street
Dunblane
Congressional
Federal
Yuma Street
Constitution
Tenley Campus
e
3201 New Mexico Ave.
Nebraska Avenue
Parking Lot
Main Campus
Reeves
Gate
(closed)
SIS
East Quad
Eric Friedheim
Quadrangle
Battelle-Tompkins
Mary Graydon
(MGC)
en
ue
Av
President's
Building
ts
et
ch
us
sa
as
Hughes
McDowell
Woods - Brown
Amphitheater
Sports Center
Bender Arena
Sp
o
ow
Mc
D
et
St
re
Leonard
Ga
ing
46t
h
Ce Sp
n
ter orts
An
ne
x
4
rk
Pa
gh
es
t
dS
42 n
Str
eet
Wesley
Theological
Seminary
rts
Ce
n
ter
Hu
5t
h
ra
ge
M
44
th
St
re
e
a
sity
Av
enu
e
n
ilto
ra
Av
en
u
sk
a
br
Ne
niv
er
Ha
m
ue
ham
Ford
Osborn
LF
P
en
Av
sk
a
Ne
b
N
Reeves Field
S
ty
ue
ue
tree
nb
Gle
afe
48th
ub
lic
S
w
Ne
od
k
wo
Aven
sity
49th
ce
47th
rP
la
47th
ve
w
dg
Se
ico
x
Me
Ro
ck
le
da
Tin
es
to
in A
W
en
Av
46th
ka
48th
s
con
Un
iver
Ne
nu
e
Av
e
br
as
ka
Washington College of Law
th
44th
eb
ra
s
t
e
re
St
43rd
45
Ca
mp
us
Ma
in
k
ic
ew
dg
e
S
42nd
Wis
49th
50th
Ri
ve
rR
oa
d
Chesapeake
4620 Wisconsin Avenue
Ne
b
4000 Brandywine Street
Brandywine
Chesapeake
4545 42nd Street
Tenleytown/
AU Metro Station
Red Line
M
Butterworth
Ri
Albemarble
Albemarble
rR
42nd
ve
Alton
43rd
44th
Washington
College of Law
oa
Yuma
Tenley Circle
Yuma
d
4801 MASSACHUSETTS AVENUE
Tenley Campus
4300 NEBRASKA AVENUE
Windom
Warren
Warren
as
sa
ch
Verplanck
us
Av
en
Van Ness
45th
ts
46th
et
50
47th
th
49th
Av
en
ue
sk
a
Ne
br
a
Ford
ham
45
th
ale
ic
w
dg
Se
Ave
nu
e
Rodman
ity
Que
be
Uni
vers
la
ce
rP
ve
sa
to
es
W
Av
en
ue
as
us
et
.
Park Dr
ts
Av
en
ue
3201 New
Mexico Avenue
ico
e.
Av
as
M
ch
x
Me
45th
Lowell St.
44th
br
Main Campus
4400 MASSACHUSETTS
AVENUE
ssy
Emba
w
Ne
k
roo
nb
ood
ckw
Ro
nue
ka
Ward Circle
Gle
Ave
Van Ness
sin
c on
Wis
Warren
ue
k
Tenley Circle
c
Ne
n
Ave
sin
le
da
Tin
gd
47th
48th
49th
43rd
42nd
Sp
rin
Sedgwick
con
46th
Upton
Tilden
Yuma
Tenley Campus
Vicinity Map
nd
Ti
4300 Nebraska Avenue, N.W.
Washington, D.C. 20016
e
al
Yuma Street
Tenley
Circle
Federal
Capital
e
Av
en
u
ka
dS
tree
t
Constitution
42n
4200 Wisconsin
Avenue
Van Ness
ue
Wis
M
M
48th
50th
Albemarble
Tenleytown/
AU Metro Station
Red Line
Ne
br
as
Congressional
Dunblane
50
150
350
Ca
Ma
in
Main
TenleyCampus
Campus
mp
us
Warren Street
500 FEET
0
100
250
Office of University Architect
2-20-11
Ri
ve
rR
oa
d
Chesapeake
4620 Wisconsin Avenue
4000 Brandywine Street
Brandywine
4545 42nd Street
Butterworth
Albemarble
Albemarble
42nd
Alton
43rd
44th
Washington
College of Law
Yuma
Tenley Circle
Yuma
4801 MASSACHUSETTS AVENUE
Tenley Campus
4300 NEBRASKA AVENUE
Windom
48th
50th
M
Warren
Warren
as
sa
ch
Verplanck
us
Av
46th
ts
47th
et
en
Van Ness
45th
49th
th
50
Tenleytown/
AU Metro Station
Red Line
M
Van Ness
aA
sk
e
al
Tilden
ra
ven
ue
Rodman
yA
Main Campus
4400 MASSACHUSETTS
Ward Circle
AVENUE
rsit
Qu
ebe
ive
c
M
rP
la
ce
C-06
C-02
C-01
C-05
C-01
Un
ve
to
es
Ne
od
wo
ico
et
ts
Av
ue
3201 New
Mexico Avenue
e.
Av
45th
Lowell St.
ch
us
en
x
Me
ck
Ro
w
k
roo
nb
Gle
Dr.
y Park
mbass
E
as
sa
W
49th
ue
k
ic
w
dg
Se
Ne
b
le
n
Ave
gd
a
47th
48th
Sp
rin
Sedgwick
sin
nd
Ti
45
th
Upton
con
46th
ve
nu
dha
e
m
Wis
ue
For
4200 Wisconsin
Avenue
44th
Vicinity Map
Office of University Architect
2-20-11
Legend
Yuma Street
Shuttle Bus Stop
Federal
Handicapped Parking Spaces
Self Payment Station
e
Tenley
Campus
Ca
mp
us
et
re
St
Ma
in
ew
dg
Se
k
ic
QUESTIONS or CONCERNS?
r
St
ee
en
Wesley
Theological
Seminary
Glover
Gate
Leonard
Un
Katzen
Arts
Center
President's
Building
F/S
ive
rsit
Admissions
Welcome
Center
ue
RESIDENT
yA
ven
ue
Av
RESIDENT
Nebraska
e
et
ts
ve
nu
us
as
ka
A
ch
(202) 885-3111
dpscustomerservice@american.edu
Adjunct, Commuter,
and Visitor parking
All AU permits valid
sa
PAY
Ne
br
as
th
Katzen Arts Center
Parking Lot
M
Monday - Friday, 8:00am - 7:30 pm
St
re
et
t
Contact Department of Public Safety
located in the Public Safety Building.
44
"Pay As You Go"
45
th
PAY
Ne
br
as
ka
Warren Street
Commuter Student Parking
COMMUTER
Av
en
u
t
dS
Dunblane
46t
h
Visitors - Guest Pass Required (V)
or "Pay As You Go"
V
Congressional
Str
eet
Resident Student Parking
RESIDENT
F/S
42n
Faculty/Staff
Capital
Constitution
tree
Motorcycle
F/S
Tenley
Circle
Mc
Do
we
ll
McDowell
V
Tenley Campus
Hu
gh
es
Hughes
Ce Sp
nt ort
er
s
An
ne
x
Woods - Brown
Amphitheater
Kogod
4000 Brandywine Street
4200 Wisconsin Avenue
4620 Wisconsin Avenue
Ward Circle
Kay
METRO
Sports Center
Bender Arena
Butler Pavilion
Reeves Field
Osborn
Ward Circle
Building
Ga
ra
ge
Battelle-Tompkins
M
as
sa
rk
ing
us
nt
er
or
ts
Ce
Mary Graydon
F/S
(MGC)
Hurst
East Quad
McKinley
RESIDENT
Bender
Library
Centennial
Anderson
Watkins
McCabe
od
ck
wo
ty
S
LF
cS
afe
Ro
Public Safety Parking Office
Pu
bli
n
ilto
Ha
m
Kreeger
as
ka
A
PAY
Ne
Lot
F/S
Closed
F/S
F/S
SIS
Letts
Gray
w
PAY
Clark
F/S
et
ts
Av
en
u
e
Roper
Reeves
Gate
(closed)
M
ex
ic
o
Adjunct, Commuter,
and Visitor parking
All AU permits valid
Av
en
ue
Metropolitan
Memorial
United Methodist
Church
Fletcher
Gate
ood
ckw
Nebraska
Nebraska Avenue Avenue
Parking Lot
Parking Lot
Ne
br
Woods
Gate
Child
Development
Center
PAY
ve
nu
F/S
F/S
Media
Production
Center
Jacobs Field
Hannay
Gate
Eric Friedheim
Quadrangle
e
Beeghly
Sp
AU
Central
Pa
Asbury
ch
Parkway
Ro
Restricted and resident student parking areas enforced
General Permits and Nebraska Avenue Commuter Lot
Sports Center Garage enforced
"Pay As You Go" Self Payment Stations enforced
Newark Street
Main
Campus
24 hours/day, 7 days/week
8am - 5pm Monday - Friday
8am - 5pm Monday - Friday
8am - 5pm Monday - Friday
www.american.edu/finance/publicsafety/parking
AU Important Contact List
AV Phone 202-­‐885-­‐2296 Email helpdesk@american.edu Contact (Tim Cegnar) IT Helpdesk 202-­‐885-­‐2550 av@american.edu Facilities AU Tech services Public Safety 202-­‐885-­‐2525 202-­‐885-­‐3229 202-­‐885-­‐2527 202-­‐885-­‐2525 (access) AUTechservices@gmail.com dps@american.edu Access@american.edu-­‐for requesting access to rooms and buildings ahead of time SIS HUB 202-­‐885-­‐6101 sishub@american.edu Alicia Cummings Summer 202-­‐885-­‐3370 Conferences Katzen Arts Center 202-­‐885-­‐3668 Catering 202-­‐885-­‐3180 202-­‐885-­‐3181 202-­‐885-­‐3187 summerconferences@american.edu Nancy Martin Reason Mics, LCD Projectors, Filming Etc. Request guest ids and passwords, IT issues (computer, phones) Building issues Laptop rental Security, Access to buildings, Parking permits and passes for faculty and guest speakers SIS Building stuff for events ager@american.edu aucatering@american.edu Lisa Ager 
Download