National Academies Press: OpenBook
« Previous: Appendix A: Workshop Statement of Task
Suggested Citation:"Appendix B: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×

B

Workshop Agenda

WORKSHOP ON ENCRYPTION AND MECHANISMS FOR
AUTHORIZED GOVERNMENT ACCESS TO PLAINTEXT

Keck Center, Washington, D.C.
June 23, 2016


9:00 a.m. Welcome and Opening Remarks
Fred H. Cate, Indiana University, Planning Committee Chair
Session 1. The Current Encryption Landscape
Fred H. Cate, Indiana University, Moderator
9:10 Panel Presentations
Chris Inglis, U.S. Naval Academy
Patrick Ball, Human Rights Data Analysis Group
James Baker, Federal Bureau of Investigation
10:00 Discussion
10:30 Break
Session 2. Encryption Use Cases and the Feasibility of Segmenting Encryption Policies
Susan Landau, Worcester Polytechnic Institute, and Frederick R. Chang, Southern Methodist University, Moderators
10:45 Kickoff Presentation
Marc Donner, Uber
Suggested Citation:"Appendix B: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×
11:15 Discussion
12:00 p.m. Lunch
Session 3. Security Risks of Architectures for Enabling Access to Plaintext
Susan Landau, Worcester Polytechnic Institute, and Frederick R. Chang, Southern Methodist University, Moderators
1:00 Kickoff Presentation
Matt Blaze, University of Pennsylvania
1:30 Discussion
3:15 Break
3:45 Discussion (Continued)
4:55 Day 1 Wrap-Up
5:00 Discussion

June 24, 2016

9:00 a.m. Welcome, Outline of Day’s Goals
Fred H. Cate, Steering Committee Chair
Session 4. Technical and Policy Mitigations for Inaccessible Plaintext
Orin Kerr, George Washington University, Moderator
9:05 Kick-off Presentation
Susan Landau, Worcester Polytechnic Institute
9:35 Discussion
10:55 Break
Session 5. Wrap-Up
Fred H. Cate, Moderator
10:45 Reactions and Takeaways
11:30 Concluding Remarks
Planning Committee
12:00 p.m. Adjourn
Suggested Citation:"Appendix B: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×
Page 50
Suggested Citation:"Appendix B: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×
Page 51
Next: Appendix C: Biographical Sketches of Workshop Planning Committee and Staff »
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop Get This Book
×
Buy Paperback | $42.00 Buy Ebook | $33.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!