The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
tronically, and build analyses through their deliberations. Additional expertise from around the country is tapped in a rigorous process of review and critique, further enhancing the quality of CSTB reports. By engaging groups of principals, CSTB obtains the facts and insights critical to assessing key issues.
The mission of CSTB is to:
Respond to requests from the government, nonprofit organizations, and private industry for advice on computer and telecommunications issues and from the government for advice on computer and telecommunications systems planning, utilization, and modernization;
Monitor and promote the health of the fields of computer science and telecommunications, with attention to issues of human resources, information infrastructure, and societal impacts;
Initiate and conduct studies involving computer science, computer technology, and telecommunications as critical resources; and
Foster interaction among the disciplines underlying computing and telecommunications technologies and other fields, at large and within the National Academies.
As of November 2002, current CSTB activities with a cybersecurity component address privacy in the information age, critical information infrastructure protection, authentication technologies and their privacy implications, geospatial information systems, cybersecurity research, and building certifiable dependable systems. Additional studies examine the fundamentals of computer science, information technology and creativity, computing and biology, Internet navigation and the Domain Name System, telecommunications research and development, wireless communications and spectrum management, and digital archiving and preservation. Explorations are under way in the areas of the insider threat, dependable and safe software systems, wireless communications and spectrum management, digital archiving and preservation, open source software, digital democracy, the “digital divide,” manageable systems, information technology and journalism, and women in computer science.