%0 Book %A National Research Council %T Avoiding Technology Surprise for Tomorrow's Warfighter: Symposium 2010 %@ 978-0-309-15568-7 %D 2010 %U https://nap.nationalacademies.org/catalog/12919/avoiding-technology-surprise-for-tomorrows-warfighter-symposium-2010 %> https://nap.nationalacademies.org/catalog/12919/avoiding-technology-surprise-for-tomorrows-warfighter-symposium-2010 %I The National Academies Press %C Washington, DC %G English %K Conflict and Security Issues %P 62 %X The Symposium on Avoiding Technology Surprise for Tomorrow's Warfighter is a forum for consumers and producers of scientific and technical intelligence to exchange perspectives on the potential sources of emerging or disruptive technologies and behaviors, with the goal of improving the Department of Defense's technological warning capability. This volume summarizes the key themes identified in the second and most recent symposium, a two-day event held in Suffolk, Virginia, on April 28 and 29, 2010. The symposium combined presentations highlighting cutting-edge technology topics with facilitated discourse among all participants. Three categories of surprise were identified: breakthroughs in product and process technology, new uses of existing technology, and the unexpectedly rapid progression of a technology to operational use. The incorporation of an adversary's own culture, history, beliefs, and value systems into analyses also emerged in discussions as an important factor in reducing surprise. %0 Book %A National Research Council %T Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy %@ 978-0-309-16035-3 %D 2010 %U https://nap.nationalacademies.org/catalog/12997/proceedings-of-a-workshop-on-deterring-cyberattacks-informing-strategies-and %> https://nap.nationalacademies.org/catalog/12997/proceedings-of-a-workshop-on-deterring-cyberattacks-informing-strategies-and %I The National Academies Press %C Washington, DC %G English %K Conflict and Security Issues %K Computers and Information Technology %P 400 %X In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed. %0 Book %A National Research Council %E Pato, Joseph N. %E Millett, Lynette I. %T Biometric Recognition: Challenges and Opportunities %@ 978-0-309-14207-6 %D 2010 %U https://nap.nationalacademies.org/catalog/12720/biometric-recognition-challenges-and-opportunities %> https://nap.nationalacademies.org/catalog/12720/biometric-recognition-challenges-and-opportunities %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %K Engineering and Technology %K Conflict and Security Issues %P 182 %X Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.