BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Understanding Cyberattack as an Instrument of U.S. Policy - Herber
 t Lin (The National Academies\, USA)
DTSTART:20101025T150000Z
DTEND:20101025T160000Z
UID:TALK27564@talks.cam.ac.uk
CONTACT:Eiko Yoneki
DESCRIPTION:Much has been written about the possibility that terrorists or
  hostile nations might conduct cyberattacks against critical sectors of th
 e U.S.\neconomy. However\, the possibility that the United States might co
 nduct its own cyberattacks -- defensively or otherwise -- has received alm
 ost no public discussion. Recently\, the US National Academies performed a
  comprehensive unclassified study of the technical\, legal\, ethical\, and
  policy issues surrounding cyberattack as an instrument of U.S. policy. Th
 is talk will provide a framework for understanding this emerging topic and
  the critical issues that surround it.\n\nBio: Dr. Herbert Lin is chief sc
 ientist at the Computer Science and Telecommunications Board\, National Re
 search Council of the National Academies\, where he has been study directo
 r of major projects on public policy and information technology. These stu
 dies include a 1996 study on national cryptography policy (Cryptography's 
 Role in Securing the Information Society)\, a 1991 study on the future of 
 computer science (Computing the Future)\, a 1999 study of Defense Departme
 nt systems for command\, control\, communications\, computing\, and intell
 igence (Realizing the Potential of C4I: Fundamental Challenges)\, a 2000 s
 tudy on workforce issues in high-technology (Building a Workforce for the 
 Information Economy)\, a\n2002 study on protecting kids from Internet porn
 ography and sexual exploitation (Youth\, Pornography\, and the Internet)\,
  a 2004 study on aspects of the FBI's information technology modernization
  program (A Review of the FBI's Trilogy IT Modernization Program)\, a 2005
  study on electronic voting (Asking the Right Questions About Electronic V
 oting)\, a 2005 study on computational biology (Catalyzing Inquiry at the 
 Interface of Computing and Biology)\, a 2007 study on privacy and informat
 ion technology (Engaging Privacy and Information Technology in a Digital A
 ge)\, a 2007 study on cybersecurity research (Toward a Safer and More Secu
 re Cyberspace)\, a 2009 study on healthcare informatics (Computational Tec
 hnology for Effective Health Care: Immediate Steps and Strategic Direction
 s)\, and a 2009 study on offensive information warfare (Technology\, Polic
 y\, Law\, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Cap
 abilities).  Prior to his NRC service\, he was a professional staff member
  and staff scientist for the House Armed Services Committee (1986-1990)\, 
 where his portfolio included defense policy and arms control issues. He re
 ceived his doctorate in physics from MIT.\n\n
LOCATION:LT1\, Computer Laboratory\, William Gates Builiding
END:VEVENT
END:VCALENDAR
