Computing Research Policy Blog

The Computing Research Association (or CRA) has been involved in shaping public policy of relevance to computing research for more than two decades. More recently the CRA Government Affairs program has enhanced its efforts to help the members of the computing research community contribute to the public debate knowledgeably and effectively.

Posts in the Security category.

IBM Hosts “Cognitive Computing” Panel to Discuss Power of Supercomputers

On Tuesday, June 18th, IBM Research hosted a presentation and panel discussion on the Hill with House Representatives on cognitive computing. According to IBM Research, cognitive computing systems include “systems that learn and interact naturally with people to extend what either man or machine could do on their own.” Essentially, these systems help human experts […]

House Passes NITRD, Cybersecurity Bills During Cyber Week

It’s “cyber week” on Capitol Hill and yesterday that meant the House passing H.R. 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, and H.R. 756, the Cybersecurity Enhancement Act of 2013, two bills we discussed in detail and endorsed last month. CRA, along with ACM, SIAM, and IEEE-CS, submitted […]

Two Computing Bills Marked Up Today

Today the House Science, Space, and Technology Committee marked up two computing bills for floor consideration. HR 756, the Cybersecurity Enhancement Act of 2013, and HR 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, both of which had passed in the House of Representatives in previous Congressional sessions but […]

House Tech Transfer Hearing

Robert Atkinson, president of ITIF, and Dennis Shea, chair of the U.S. China Economic and Security Review Commission, testified today before the House Science, Space, and Technology Committee Subcommittee on Investigation and Oversight hearing on “The Impact of International Technology Transfer on American Research and Development”. Chairman Paul Broun (R-GA) started the hearing with the […]

JASON on “Science of Cyber Security,” Recommends New Centers

Steven Aftergood, of the always excellent Secrecy News blog, notes the release of a new report by the JASON panel, an influential, independent advisory committee for the Department of Defense that focuses on issues in science and technology, on the “Science of Cyber Security.” Specifically, DOD asked the panel to examine the theory and practice […]

House Panel Examines Cyber Attack Attribution

This morning, the House Committee on Science and Technology’s subcommittee on Technology and Innovation held a hearing entitled “Planning for the Future of Cyber Attack Attribution”. The hearing contained a panel of four witnesses — Dr. David Wheeler, a Research Staff Member of the Information Technology and Systems Division at the Institute for Defense Analyses, […]

The Change at DARPA

Since about 2001, the computing community – through CRA and others, and with lots of mention on this blog – has aired concerns about policy changes at the Defense Advanced Research Programs Agency (DARPA), the Defense Department’s leading-edge research arm and arguably one of the two most important agencies in the history of computer science. […]

HASC Hearing on DOD Information Technology and Cybersecurity

CRA Board member and Government Affairs Committee Chair Fred Schneider will testify along with Phillip Bond of Tech America and David Bodenheimer of Crowell and Moring, LLP at a hearing of the Terrorism, Unconventional Threats and Capabilities Subcommittee of the House Armed Services Committee on Thursday, February 25 at 2:00 pm. The hearing will address […]

House S&T Committee Considers Cyber Security R&D

The House Committee on Science and Technology’s Research and Science Education Subcommittee marked up a bill designed to amend portions of Cyber Security R&D Act of 2005 today. The aptly named Cybersecurity Research and Development Amendments Act of 2009 (PDF) touches on several things that CRA supports including: Requires the development of a cybersecurity R&D […]