On Monday, June 22nd, President Trump issued the latest in a series of immigration and visa related orders designed to limit the involvement of foreign students and researchers, particular those from mainland China, in U.S. research efforts. The order follows a series of other proposals and orders emanating from the White House and Capitol Hill that have raised the ire of higher-education, U.S. industry, and the computing research community over recent weeks.
CRA Government Affairs
Posts categorized under: Security
In our continuing series following the Trump Administration’s Fiscal Year 2021 (FY21) budget request, we now turn to the Department of Defense (DOD). The DOD’s Science and Technology (DOD S&T) program is made up of three accounts: 6.1 (basic research), 6.2 (applied research), and 6.3 (advanced technology development). These accounts are themselves made up of individual accounts for each of the three services (Army, Navy, and Air Force), as well as a Defense Wide account. The Defense Advanced Research Projects Agency (DARPA) is a section under the Defense Wide account. Unfortunately, with few exceptions, most of these accounts are cut under the Trump Administration’s plans for FY21.
In advance of Facebook CEO Mark Zuckerburg’s three days of appearances before congressional committees starting today, ACM’s US Public Policy Council sent the following letter to the members of the Senate Commerce, Science and Transportation Committee and the Senate Judiciary Committee. It’s a strong statement from USACM, noting the importance of “understand[ing] how privacy and […]
On Tuesday, June 18th, IBM Research hosted a presentation and panel discussion on the Hill with House Representatives on cognitive computing. According to IBM Research, cognitive computing systems include “systems that learn and interact naturally with people to extend what either man or machine could do on their own.” Essentially, these systems help human experts […]
It’s “cyber week” on Capitol Hill and yesterday that meant the House passing H.R. 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, and H.R. 756, the Cybersecurity Enhancement Act of 2013, two bills we discussed in detail and endorsed last month. CRA, along with ACM, SIAM, and IEEE-CS, submitted […]
Today the House Science, Space, and Technology Committee marked up two computing bills for floor consideration. HR 756, the Cybersecurity Enhancement Act of 2013, and HR 967, the Advancing America’s Networking and Information Technology Research and Development Act of 2013, both of which had passed in the House of Representatives in previous Congressional sessions but […]
Robert Atkinson, president of ITIF, and Dennis Shea, chair of the U.S. China Economic and Security Review Commission, testified today before the House Science, Space, and Technology Committee Subcommittee on Investigation and Oversight hearing on “The Impact of International Technology Transfer on American Research and Development”. Chairman Paul Broun (R-GA) started the hearing with the […]
Steven Aftergood, of the always excellent Secrecy News blog, notes the release of a new report by the JASON panel, an influential, independent advisory committee for the Department of Defense that focuses on issues in science and technology, on the “Science of Cyber Security.” Specifically, DOD asked the panel to examine the theory and practice […]
This morning, the House Committee on Science and Technology’s subcommittee on Technology and Innovation held a hearing entitled “Planning for the Future of Cyber Attack Attribution”. The hearing contained a panel of four witnesses — Dr. David Wheeler, a Research Staff Member of the Information Technology and Systems Division at the Institute for Defense Analyses, […]
Since about 2001, the computing community – through CRA and others, and with lots of mention on this blog – has aired concerns about policy changes at the Defense Advanced Research Programs Agency (DARPA), the Defense Department’s leading-edge research arm and arguably one of the two most important agencies in the history of computer science. […]