Computing Research Policy Blog


Posts categorized under: Security

President’s Immigration Order is Latest in a Series Vexing Computing Research Community


On Monday, June 22nd, President Trump issued the latest in a series of immigration and visa related orders designed to limit the involvement of foreign students and researchers, particular those from mainland China, in U.S. research efforts. The order follows a series of other proposals and orders emanating from the White House and Capitol Hill that have raised the ire of higher-education, U.S. industry, and the computing research community over recent weeks.

Department of Defense FY 2021 Request: With Few Exceptions, this is a Very Bad Budget


In our continuing series following the Trump Administration’s Fiscal Year 2021 (FY21) budget request, we now turn to the Department of Defense (DOD). The DOD’s Science and Technology (DOD S&T) program is made up of three accounts: 6.1 (basic research), 6.2 (applied research), and 6.3 (advanced technology development). These accounts are themselves made up of individual accounts for each of the three services (Army, Navy, and Air Force), as well as a Defense Wide account. The Defense Advanced Research Projects Agency (DARPA) is a section under the Defense Wide account. Unfortunately, with few exceptions, most of these accounts are cut under the Trump Administration’s plans for FY21.

In Advance of Facebook Testimony, ACM’s US Public Policy Committee Raises Issues for Congress to Consider


In advance of Facebook CEO Mark Zuckerburg’s three days of appearances before congressional committees starting today, ACM’s US Public Policy Council sent the following letter to the members of the Senate Commerce, Science and Transportation Committee and the Senate Judiciary Committee. It’s a strong statement from USACM, noting the importance of  “understand[ing] how privacy and […]

IBM Hosts “Cognitive Computing” Panel to Discuss Power of Supercomputers


On Tuesday, June 18th, IBM Research hosted a presentation and panel discussion on the Hill with House Representatives on cognitive computing. According to IBM Research, cognitive computing systems include “systems that learn and interact naturally with people to extend what either man or machine could do on their own.” Essentially, these systems help human experts […]

House Passes NITRD, Cybersecurity Bills During Cyber Week


It’s “cyber week” on Capitol Hill and yesterday that meant the House passing H.R. 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, and H.R. 756, the Cybersecurity Enhancement Act of 2013, two bills we discussed in detail and endorsed last month. CRA, along with ACM, SIAM, and IEEE-CS, submitted […]

Two Computing Bills Marked Up Today


Today the House Science, Space, and Technology Committee marked up two computing bills for floor consideration. HR 756, the Cybersecurity Enhancement Act of 2013, and HR 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, both of which had passed in the House of Representatives in previous Congressional sessions but […]

House Tech Transfer Hearing


Robert Atkinson, president of ITIF, and Dennis Shea, chair of the U.S. China Economic and Security Review Commission, testified today before the House Science, Space, and Technology Committee Subcommittee on Investigation and Oversight hearing on “The Impact of International Technology Transfer on American Research and Development”. Chairman Paul Broun (R-GA) started the hearing with the […]

JASON on “Science of Cyber Security,” Recommends New Centers


Steven Aftergood, of the always excellent Secrecy News blog, notes the release of a new report by the JASON panel, an influential, independent advisory committee for the Department of Defense that focuses on issues in science and technology, on the “Science of Cyber Security.” Specifically, DOD asked the panel to examine the theory and practice […]

House Panel Examines Cyber Attack Attribution


This morning, the House Committee on Science and Technology’s subcommittee on Technology and Innovation held a hearing entitled “Planning for the Future of Cyber Attack Attribution”. The hearing contained a panel of four witnesses — Dr. David Wheeler, a Research Staff Member of the Information Technology and Systems Division at the Institute for Defense Analyses, […]