Wednesday, June 24, 2015

RecordOfSuccess Grows with DOTCOM Approval

RecordOfSuccess Grows with DOTCOM Approval (House Commerce Committee)

WASHINGTON, DC – The House of Representatives today approved H.R. 805, the Domain Openness Through Continued Oversight Matters (DOTCOM) Act, bipartisan legislation authored by Rep. John Shimkus (R-IL). The DOTCOM Act aims to protect the future of the Internet by ensuring that Congressional oversight of the administration’s transition of the Domain Name System to the global Internet community.
“By advancing the DOTCOM Act, we are ensuring that the Internet - the world’s greatest platform of ideas, commerce, and social connection - continues to thrive to the benefit of folks in Michigan and every corner of the country,” said full committee Chairman Fred Upton (R-MI). “Once again, our committee’s efforts demonstrate that Congress can work together to achieve meaningful results and build a bipartisan record of success.”
“We have a responsibility to see that the IANA transition is done right, and the DOTCOM Act will help to ensure that it is. This legislation reaffirms our commitment to a transition that protects a free and open Internet with appropriate oversight of NTIA,” added full committee Ranking Member Frank Pallone, Jr. (D-NJ). “The DOTCOM Act also shows what we can accomplish when our work is bipartisan from the start. I want to thank Chairmen Upton and Walden and Representative Shimkus for working with us to craft this thoughtful, bipartisan solution. I look forward to continue working with you all and our colleagues in the Senate to see this bill become law.”
“From the time the administration announced their intent to transition the IANA functions from ICANN to the international multi-stakeholder community, the Energy and Commerce Committee and the Communications and Technology Subcommittee have been committed to thorough oversight of any path forward,” added Communications and Technology Subcommittee Chairman Greg Walden (R-OR). “This legislation makes clear that the Administration shall not proceed without first answering to Congress. Our oversight of the transition adds a vital check to this process, and emphasizes that the United States takes this transition seriously.”
“I’ve said time and again that this is far too important to rush and that we must carefully consider all of the potential consequences and outcomes before any transition occurs,” said Shimkus. "We get one bite at the apple on this and we need to make sure it’s done correctly."
- See more at:

Monday, June 08, 2015

Event June 11 The Internet Age: Founders to Future

View this email in your browser

June 11, 2015

2:30 - 4:00 PM

Warner Bros. Theater at the Smithsonian's National Museum of American History

The Internet is among the most powerful and influential "inventions" ever created. But where did it come from? Who were the people who first imagined it, and what are the inventive technologies that enable the Internet to exist? The evolution of the Internet continues as new innovations propel this global network of networks into seemingly impossible realities. Please join the Smithsonian's National Museum of American History, the Internet Society, Internet pioneers, and digital natives for a lively conversation about the continuum of the Internet, from how it was imagined to where the Internet is taking us in the future.

This event will be webast live from the Warner Bros Theater at the Smithsonian's National Museum of American History.


Vint Cerf

Internet Hall of Fame Pioneer and Chief Internet Evangelist,Google

Vint Cerf, widely known as one of the "Fathers of the Internet," is the co-designer of the TCP/IP protocols and the architecture of the Internet. He has served as vice president and chief Internet evangelist for Google since October 2005. Mr. Cerf was inducted into the Internet Hall of Fame in 2012.




Mitchell Baker

Internet Hall of Fame Innovator and Executive Chairwoman,Mozilla Foundation

Mitchell Baker is Executive Chairwoman of the Mozilla Foundation and the leader of the Mozilla Project. She is responsible for organizing and motivating a massive, worldwide, collective of employees and volunteers who are breathing new life into the Internet with the Firefox Web browser and other products. Ms. Baker was inducted into the Internet Hall of Fame in 2012.



David Farber

David Farber played a key role in many systems that converged into today's Internet. He is an Internet Hall of Fame inductee and the Alfred Fitler Moore Professor Emeritus at the University of Pennsylvania and Adjunct Professor at Carnegie Mellon University.


Sebastian Thrun

Founder and CEO, Udacity

Sebastian Thrun is a scientist, educator, researcher, inventor, and entrepreneur. Today, he is the founder and CEO of Udacity, a company dedicated to democratizing learning for everyone. Udacity has almost 4 million students in over 190 countries.




Eric Hintz

Historian, Smithsonian Institution

Eric Hintz is a historian and fellowship coordinator for the Smithsonian's National Museum of American History's Lemelson Center for the Study of Invention and Innovation. He currently serves as curator for two exhibitions Places of Invention and American Enterprise. His research interests lie in science and technology and US business history and economic history: he specializes in the history of invention and R&D.



Watch the webcast:

Broadcast live streaming video on Ustream

Thursday, June 04, 2015

NSF RFP Secure and Trustworthy Cyberspace (SaTC)

Program Title:

Secure and Trustworthy Cyberspace (SaTC) 

Synopsis of Program:

Cyberspace has transformed the daily lives of people for the better. The rush to adopt cyberspace, however, has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals have been victims of cyber-attacks. In December 2011, the National Science and Technology Council (NSTC) with the cooperation of NSF issued a broad, coordinated Federal strategic plan for cybersecurity research and development to "change the game," minimize the misuses of cyber technology, bolster education and training in cybersecurity, establish a science of cybersecurity, and transition promising cybersecurity research into practice. This challenge requires a dedicated approach to research, development, and education that leverages the disciplines of mathematics and statistics, the social sciences, and engineering together with the computing, communications and information sciences.

The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity from:

  • a Trustworthy Computing Systems (TWC) perspective and/or a Social, Behavioral and Economic Sciences (SBE) perspective;
  • the Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) perspective; or
  • the Transition to Practice (TTP) perspective.

In addition, we welcome proposals that integrate research addressing all of these perspectives (see the Program Description below). Proposals may be submitted in one of the following three project classes (plus Cybersecurity Education; see below):

  • Small projects: up to $500,000 in total budget, with durations of up to three years;
  • Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years; or
  • Large projects: $1,200,001 to $3,000,000 in total budget, with durations of up to five years.

For Small hardware security proposals, the Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) perspective is focused specifically on hardware research innovation that addresses SaTC goals, and includes the opportunity to collaborate closely with industry. STARSS proposals may not include the TWC, SBE, or TTP perspectives. The STARSS perspective may not be used for Medium or Large proposals.

The Transition to Practice (TTP) perspective is focused exclusively on transitioning existing research to practice. TTP proposals may not include the TWC, SBE, or STARSS perspective. The TTP perspective may be used for Small and Medium proposals, but may not be used for Large proposals.

In addition, the SaTC program seeks proposals focusing entirely on Cybersecurity Education with total budgets limited to $300,000 and durations of up to two years. These cybersecurity education projects may not include any of the perspectives named above.

Wednesday, June 03, 2015

NTIA RFC Request for Comment on Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

Request for Comment on Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

March 19, 2015
Docket Number: 

The Department of Commerce Internet Policy Task Force (IPTF) is requesting comment to identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations and consumers.  The IPTF invites public comment on these issues from all stakeholders with an interest in cybersecurity, including the commercial, academic and civil society sectors, and from relevant federal, state, local, and tribal entities.

UPDATE: Comments are now due on or before 5 p.m. Eastern Time, May 27, 2015.

NIST Privacy RFC DRAFT Privacy Risk Management for Federal Information Systems

May 28, 2015

NIST IR 8062

DRAFT Privacy Risk Management for Federal Information Systems

NIST requests comments on the draft report NISTIR 8062, Privacy Risk Management for Federal Information Systems, which describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems. 
Please send comments to by July 13, 2015 at 5:00pm EDT using the comment matrix provided (link provided below). 
Expanding opportunities in cloud computing, big data, and cyber-physical systems are bringing dramatic changes to how we use information technology. While these technologies bring advancements to U.S. national and economic security and our quality of life, they also pose risks to individuals' privacy. 
Privacy Risk Management for Federal Information Systems (NISTIR 8062) introduces a privacy risk management framework for anticipating and addressing risks to individuals' privacy. In particular, it focuses on three privacy engineering objectives and a privacy risk model. To develop this document, NIST conducted significant public outreach and research. We are soliciting public comments on this draft to obtain further input on the proposed privacy risk management framework, and we expect to publish a final report based on this additional feedback. 
Note to Reviewers:
To facilitate public review, we have compiled a number of topics of interest to which we would like reviewers to respond. Please keep in mind that it is not necessary to respond to all topics listed below, Reviewers should also feel free to suggest other areas of revision or enhancement to the document. 
   • Privacy Risk Management Framework: Does the framework provide a process that will help organizations make more informed system development decisions with respect to privacy? Does the framework seem likely to help bridge the communication gap between technical and non-technical personnel? Are there any gaps in the framework?
   • Privacy Engineering Objectives: Do these objectives seem likely to assist system designers and engineers in building information systems that are capable of supporting agencies' privacy goals and requirements? Are there properties or capabilities that systems should have that these objectives do not cover?
   • Privacy Risk Model:
     o Does the equation seem likely to be effective in helping agencies to distinguish between cybersecurity and privacy risks?
     o Can data actions be evaluated as the document proposes? Is the approach of identifying and assessing problematic data actions usable and actionable?
     o Should context be a key input to the privacy risk model? If not, why not? If so, does this model incorporate context appropriately? Would more guidance on the consideration of context be helpful? 
     o The NISTIR describes the difficulty of assessing the impact of problematic data actions on individuals alone, and incorporates organizational impact into the risk assessment. Is this appropriate or should impact be assessed for individuals alone? If so, what would be the factors in such an assessment

Draft NISTIR 8062 
Comment Matrix Form for Draft NISTIR 8062