COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Systems Research Group Seminar > Understanding Cyberattack as an Instrument of U.S. Policy
Understanding Cyberattack as an Instrument of U.S. PolicyAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Eiko Yoneki. Much has been written about the possibility that terrorists or hostile nations might conduct cyberattacks against critical sectors of the U.S. economy. However, the possibility that the United States might conduct its own cyberattacks—defensively or otherwise—has received almost no public discussion. Recently, the US National Academies performed a comprehensive unclassified study of the technical, legal, ethical, and policy issues surrounding cyberattack as an instrument of U.S. policy. This talk will provide a framework for understanding this emerging topic and the critical issues that surround it. Bio: Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. These studies include a 1996 study on national cryptography policy (Cryptography’s Role in Securing the Information Society), a 1991 study on the future of computer science (Computing the Future), a 1999 study of Defense Department systems for command, control, communications, computing, and intelligence (Realizing the Potential of C4I : Fundamental Challenges), a 2000 study on workforce issues in high-technology (Building a Workforce for the Information Economy), a 2002 study on protecting kids from Internet pornography and sexual exploitation (Youth, Pornography, and the Internet), a 2004 study on aspects of the FBI ’s information technology modernization program (A Review of the FBI ’s Trilogy IT Modernization Program), a 2005 study on electronic voting (Asking the Right Questions About Electronic Voting), a 2005 study on computational biology (Catalyzing Inquiry at the Interface of Computing and Biology), a 2007 study on privacy and information technology (Engaging Privacy and Information Technology in a Digital Age), a 2007 study on cybersecurity research (Toward a Safer and More Secure Cyberspace), a 2009 study on healthcare informatics (Computational Technology for Effective Health Care: Immediate Steps and Strategic Directions), and a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities). Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT . This talk is part of the Computer Laboratory Systems Research Group Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsEngineering Department Energy, Fluids and Thermo seminars St John's College Larmor Society 2011-12 Cambridge EnvironmentOther talksCambridge Rare Disease Summit 2017 Why Do We Need Another Biography of Hitler? A physical model for wheezing in lungs Cohomology of the moduli space of curves Why does cardiac function deteriorate in heart failure and how does phosphodiesterase 5 inhibition help? Single Cell Seminars (October) Crowding and the disruptive effect of clutter throughout the visual system Sneks long balus How to Deploy Psychometrics Successfully in an Organisation Towards a whole brain model of perceptual learning Transcription by influenza virus RNA polymerase: molecular mechanisms, cellular aspects and inhibition |