News Release 09-115
When the Country Called: How a Team of Academic Experts Contributed to the President's Cyberspace Review
NSF coordinated contributions of dozens of academic experts to help shape the President's comprehensive review of the nation’s cybersecurity policy
May 29, 2009
This material is available primarily for archival purposes. Telephone numbers or other contact information may be out of date; please see current contact information at media contacts.
When President Obama tapped Melissa Hathaway of the National Security Council to review the nation's cyberspace policy in 60 days, she knew she needed to gather insights and perspectives from an array of different stakeholder groups.
In addition to consulting with private industry and all levels of government, Hathaway turned to the nation's top academic experts in the cyberspace arena by reaching out to the National Science Foundation (NSF). NSF's innovative collaboration with Hathaway could be a template for creating links between the academic community and policy makers who are tackling the great policy challenges facing our country.
Shortly after the review began, Hathaway's staff contacted Jeannette Wing, NSF assistant director for computer & information science & engineering (CISE), and asked her to reach out to the academic computing research community to assist Hathaway with the review. Wing has worked for years on trustworthy computing--the study of computing and communication systems that should be secure, preserve privacy, be usable, and reliably deliver the quality of service they are designed to achieve without disruption. To be viable, solutions here must be holistic and incorporate perspectives from law, economics, and the social sciences in addition to computer science. Technology alone cannot solve the problem, because social, political, and economic realities dictate whether new solutions will be embraced and whether systems will evolve in ways that make them more trustworthy.
NSF arranged for a teleconference between Hathaway and a small group of academics. Wing asked Fred Schneider, a computer science professor at Cornell University and chief scientist of the NSF-funded TRUST Science and Technology Center, and Ed Lazowska, a professor of computer science at the University of Washington, to gather ideas from experts in trustworthy computing from a variety of academic institutions and turn them into a viable set of policy recommendations.
An initial draft of the document formed the basis for the academics' presentations to Hathaway at the teleconference, and the final version was ultimately signed by 67 academics. The document addresses two sides of an academia-government relationship: how the academic community can help the administration by addressing deep and difficult technical challenges through fundamental, open, long-term research and education; and how the administration can help the academic community be more effective participants in the nation's efforts to design, build, and deploy trustworthy systems.
During the teleconference, Hathaway posed eight questions to the assembled experts and asked them to send her their responses. This led to the community writing a second document. Mike Reiter of the University of North Carolina, Chapel Hill, organized this effort and populated subcommittees with 20 other academic experts to prepare written responses. The questions covered a broad range of topics, from ensuring privacy to the status of research on self-repairing networks.
"The entire process was a watershed moment for a research community that has long wanted to help solve what is clearly a pressing national problem - the need to create and deploy trustworthy systems to run our nation's critical infrastructures," according to Schneider.
NSF enabled the academic community involved in trustworthy computing to move beyond research activities and publishing papers for their peers to helping policymakers at the highest level of our government.
"When the chance to provide input to an important activity such as Ms. Hathaway's review presented itself, many of us jumped at the opportunity," Reiter said recently. "I believe there is significant interest in the computer security research community to help with new initiatives in this area."
For their part, officials at NSF hope this process can serve as a template for future collaborations and consultations between policymakers and academic experts. The report, Cyberspace Policy Review, along with supporting documents and videos of cybersecurity experts, including NSF's Jeannette Wing, is accessible at http://www.whitehouse.gov/CyberReview.
-NSF-
Media Contacts
Maria C. Zacharias, NSF, (703) 292-8454, email: mzachari@nsf.gov
Dana W. Cruikshank, NSF, (703) 292-7738, email: dcruiksh@nsf.gov
Principal Investigators
Fred B. Schneider, Cornell University, 607 255-9221, email: fbs@cs.cornell.edu
Michael Reiter, University of North Carolina at Chapel Hill, 919-962-1836, email: reiter@cs.unc.edu
Related Websites
Securing Our Digital Future: http://www.whitehouse.gov/CyberReview/
The U.S. National Science Foundation propels the nation forward by advancing fundamental research in all fields of science and engineering. NSF supports research and people by providing facilities, instruments and funding to support their ingenuity and sustain the U.S. as a global leader in research and innovation. With a fiscal year 2023 budget of $9.5 billion, NSF funds reach all 50 states through grants to nearly 2,000 colleges, universities and institutions. Each year, NSF receives more than 40,000 competitive proposals and makes about 11,000 new awards. Those awards include support for cooperative research with industry, Arctic and Antarctic research and operations, and U.S. participation in international scientific efforts.
Connect with us online
NSF website: nsf.gov
NSF News: nsf.gov/news
For News Media: nsf.gov/news/newsroom
Statistics: nsf.gov/statistics/
Awards database: nsf.gov/awardsearch/
Follow us on social
Twitter: twitter.com/NSF
Facebook: facebook.com/US.NSF
Instagram: instagram.com/nsfgov