Conferences and Workshops

Cybersecurity

Legal and Policy Dimensions of Cybersecurity

Sponsored by the Penn State Institute for Information Policy, the George Washington School of Media & Public Affairs, Penn State Law and the Journal of Information Policy

A by-invitation experts’ workshop to be held at
George Washington University School of Media and Public Affairs
September 28-29, 2016

Tuesday, Sept. 27

7:00 PM  Welcome Gathering: Bier Baron, 1523 22nd St NW, Washington, DC

Wednesday, Sept. 28

9:00-9:15 Welcome, introductions, opening comments, workshop logistics: Amit Schejter, BGU-IL and IIP/JIP; Krishna Jayakar, IIP/JIP; Anne McKenna, Penn State Law; Matt Hindman, George Washington University

Part I:  Frameworks

9:15-10:15 Session I: A framework for the analysis of Internet security – David Clark, MIT
Respondent: Prof. Henning Schulzrinne, Chief Technology Officer, FCC

10:15-10:30  Coffee Break

10:30-11:30 Session II: Broadband Industry Structure and Cybersecurity – Carolyn Gideon, Tufts University and Christiaan Hogendorn, Wesleyan University
Respondent: Prof. Katja Seim, Chief Economist, FCC
11:30-12:30 Session III: How should the limits of governmental access to personal data stored in the cloud be defined? – Tom Brier, Penn State
Respondent:

12:30-1:00 Lunch

Part II:  Civil Liberties

1:00-2:00 Session IV: The Impact of the War of Terror on Freedom of Speech in the Internet Era – Ofer Raban, University of Oregon
Respondent:

2:00-3:00 Keynote presentation: The Honorable Thomas I. Vanaskie, Circuit Judge for The United States Court of Appeals for the Third Circuit

3:00-3:15 Coffee break

3:15-4:15 Session V: Digital Feudalism in the Age of Contentious Spectrum Allocation and post-Snowden Surveillance: Technological Liberation vs. Control. – Sascha Meinrath, Penn State
Respondent: Matt Hindman – George Washington University


4:15-5:15 Session VI: Avoiding NSA Internet Surveillance Due to Boomerang Routing: IXmaps and Canadian Network Sovereignty – Jonathan Obar, York University and Andrew Clement, University of Toronto
Respondent: Jonathan Mayer, Chief Technologist, Enforcement Bureau, FCC

Part III:  Framing cybersecurity

5:15-6:15 Session VII: Cyber Pearl Harbor: Analogy, Fear, and the Framing of Cybersecurity Threats in the United States, 1991-2016 – Sean Lawson and Michael Middleton, University of Utah
Respondent:

7:30   Dinner: DC Commons - 2200 Pennsylvania Ave NW Washington, DC

Thursday, September 29


9:00-10:00 Session VIII: Kill Switches, Remote Deletion, and Intelligent Agents: Framing Everyday Household Cybersecurity in the Internet of Things – Jo Ann Oravec, University of Wisconsin at Whitewater
Respondent: Ben Cramer, Penn State

Part III:  International and transnational implications:

10:00-11:00 Session IX: The Cyber Security Implications of the Application of Blockchain Technology to Digital Identity, in the Context of United Nations’ SDG 16.9 – Clare Sullivan, Georgetown University
Respondent:

11:00-11:15  Coffee Break

11:15-12:15 Session X: Voice Phishing in South Korea: Chinese “Criminals,” Migratory Trajectories, and Transnational Techno-crimes - Claire Seungeun Lee, University of Massachusetts Boston
Respondent:

12:15-1:00 Lunch

Part IV:  Economic perspectives

1:30-2:30 Session XI: Attack-Deterring and Damage-Control Investments in Cybersecurity – Wynne Lam, University of Liege
Respondent: Brandon Valeriano - Cardiff University, School of Law and Politics & Donald Bren Chair of Armed Politics Marine Corps University

2:30-3:30 Session XII: Understanding Cyber Collateral Damage - Sasha Romanosky, RAND and Zachary Goldman, Center on Law and Security
Respondent: Allan Friedman, Director of Cybersecurity Initiatives, NTIA

3:30-3:45  Coffee Break

3:45-4:45 Session XIII: Devising Effective Economic Policies for Bug-Bounty Platforms and Security Vulnerability Discovery - Aron Laszka, Mingyi Zhao, Jens Grossklags, Penn State
Respondent: Emily Talaga, Chief Economist, Public Safety and Homeland Security Bureau, FCC

4:45-5:30 Guest speaker: Rear Admiral (ret.) David Simpson Chief of the FCC's Public Safety and Homeland Security Bureau

5:30   Closing remarks and farewells