Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.
OCR for page 83
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues B SYMPOSIUM AGENDA Opening Address Wm A. Wulf President, National Academy of Engineering Setting the Stage Eric Benhamou Chairman, 3Com Corporation “The Internet as a Critical Infrastructure” Philip R. Reitinger Deputy chief, Computer Crime and Intellectual Property Section, U.S. Department of Justice “Critical Infrastructure Protection: The Law Enforcement Perspective” John G. Grimes Chair, Industry Executive Subcommittee, National Security Telecommunications Advisory Council (NSTAC) and vice president, Raytheon Company “NSTAC: A Proven Industry-Government Partnership to Protect Critical Information Infrastructures”
OCR for page 84
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues Colonel Timothy Gibson (U.S. Army) Director of technology, Joint Task Force-Computer Network Operations “Vulnerabilities of Military Information Infrastructures and the Consequences: DDOS Case Study” James Dempsey Deputy director, Center for Democracy and Technology “Protecting Information Infrastructure, Protecting Personal Information and Expression” Information Sharing: What, When, How, and with Whom? Lieutenant General (retired) David J. Kelley Vice president of Information Operations, Lockheed Martin “Overcoming Reluctance: Cooperation Between the Government and Private Sectors” William E. Cohen Assistant general counsel for policy studies, Federal Trade Commission “Understanding Antitrust: A Vehicle for Maintaining Market Forces” David Sobel General counsel, Electronic Privacy Information Center “Freedom of Information Act: Public Safety Confronts Public Information” Legal Issues Henry (Hank) Perritt, Jr. Dean and professor of law, Illinois Institute of Technology, Chicago-Kent College of Law “The Many Legal Faces of CIP” Craig Silliman Director of the network and facilities legal team, WorldCom “The View from an ISP” Elliot Turrini Assistant U.S. attorney, U.S. Department of Justice “Criminal Law and Critical Information Infrastructure Protection”
OCR for page 85
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues The Role of Privacy and Civil Liberties in Protecting Critical Infrastructures Richard M. Smith Chief technology officer, Privacy Foundation “The View from a Privacy Advocate” Harriet Pearson Chief privacy officer, IBM “The View from the Private Sector” Organizing for Action Ronald L. Dick Director, National Infrastructure Protection Center, Federal Bureau of Investigation “Public-Private Partnership: Keys to Success” Captain J. Katharine Burton (U.S. Navy) Assistant deputy manager, National Communications System “The Telecommunications Infrastructure During a National Emergency: Lessons from September 11th” Judith Miller Partner, Williams & Connolly LLP “Regulating Government Intervention in the Information Age” Glenn Schlarman Office of Management and Budget “Defense of the Homeland: How Government Agencies Can Work Together” Motivating the Private Sector Frederick R. Chang President and CEO, SBC Technology Resources, Inc. “Economic Incentives” William J. Semancik Director, Laboratory for Telecommunications Sciences, National Security Agency “Building the Case for Economically Sound Investments in Security”
OCR for page 86
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues Ty R. Sagalow Executive vice president and chief operating officer, American International Group, Inc., eBusiness Risk Solutions “Cyber Insurance: Improving Security Through Risk Management” Milo Medin Chief technology officer, Excite@Home “Protection Efforts Meet Business Pressures” Herbert H. Yan Director, Allegheny Energy Supply Co. LLC “Comparative Perspective from the Energy Business” Creative Alternatives Steven M. Bellovin Fellow, AT&T Research Whitfield Diffie Distinguished engineer, Sun Microsystems
Representative terms from entire chapter: