Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] At Stanford on Feb 2nd - Government Hacking: Assessing and Mitigating the Security Risk

Yosem Companys companys at tmp.ucsb.edu
Sat Jan 28 16:31:07 PST 2017


From: Stanford Center for Internet & Society<cis at law.stanford.edu>

https://cis-static.law.stanford.edu/emails/20170202-governmenthacking.html

Thursday, February 2, 2017

4:30pm-6:30pm - Room 190 - Stanford Law School

559 Nathan Abbott Way, Stanford, CA 94305

Everyone is welcome to attend.

RSVP IS REQUIRED for this free event:
https://docs.google.com/a/law.stanford.edu/forms/d/e/1FAIpQLScP7Gz_9Bq2PX2bo8Acev8BnxvcVJ8MK5VwBCEDhfHvPy4C5g/viewform

More Info:
https://cyberlaw.stanford.edu/events/government-hacking-assessing-and-mitigating-security-risk
________________________________

Join Mozilla and Stanford Center for Internet and Society for the third
installment in a series of conversations about government hacking.
Information from our first two events is available online: discussing the
vulnerabilities disclosure process and recent changes to Federal Rule of
Criminal Procedure 41.

The growing availability of default-on encryption tools means that
governments cannot make sense of data they would otherwise be able to
lawfully access in a criminal or intelligence investigation. Instead,
governments are finding work-arounds, such as hacking into the computers
that store data investigators need to access and remotely searching,
monitoring user activity on, or even interfering with the operation of
those machines. Technologists have played a critical role identifying the
security risks that would be created by various proposals to mandate
government access to encrypted data. In contrast, comparatively little
discussion has occurred about the security risks inherent in government
hacking.

Our third discussion, to be held on February 2, 2017, will bring together
leading technologists to examine that risk in more detail, focusing on the
computer security implications of government hacking. When the government
operates as an attacker on the network, how does that impact network
security for Internet users overall? What security risks does this create
for those other than the immediate targets? How do those risks materialize
and what is the magnitude of that risk for the overall Internet ecosystem?
How, if at all, can it be mitigated? And how should these security risks
inform the government’s overall policy regarding hacking?

Presented by the Stanford Center for Internet and Society and Mozilla, the
event series is dedicated to convening experts in cybersecurity, government
surveillance technologies, and public policy to examine the legal,
technical, and policy challenges associated with government hacking.

Confirmed speakers:

Professor Dan Boneh, Professor of Computer and Information Science at
Stanford University, Moderator

Dr. Sandy Clark, University of Pennsylvania

Richard Barnes, Firefox Security Lead at Mozilla

Oren J. Falkowitz is a co-founder and the CEO of Area 1 Security.
Previously Mr. Falkowitz held senior positions at United States Cyber
Command (USCYBERCOM) and at the National Security Agency (NSA) where he
focused on Computer Network Operations and Big Data.

Stephan Somogyi, Security and Privacy Product Manager at Google

Logan Brown, President and CEO of Exodus Intelligence

This event is co-hosted by Mozilla and the Stanford Center for Internet and
Society. This event also receives support from the Stanford Cyber
Initiative.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20170128/419dfcc6/attachment.html>


More information about the liberationtech mailing list