Sign In

Communications of the ACM

ACM TechNews

How a Team of Academic Experts Contributed to Obama's Cyberspace Review

View as: Print Mobile App Share:
visualization of U.S. Internet connections

A visualization of Internet connections in the United States.

Zina Deretsky / National Science Foundation

The National Security Council's Melissa Hathaway sought the advice of a variety of computer security experts when she conducted the recently completed 60-day review of the U.S.'s cyberspace policy. The National Science Foundation arranged for a teleconference between Hathaway and a small group of academics, including Cornell University professor and TRUST Science and Technology Center chief scientist Fred Schneider and University of Washington professor Ed Lazowska, to gather ideas from experts in trustworthy computing and create a viable set of recommendations. The final version of the recommendations was signed by 67 academics. The document addresses how the academic community can help the administration by investigating difficult technical challenges through fundamental, open, long-term research and education, and how the administration can help the academic community be more effective partners in the U.S.'s efforts to design, build, and deploy trustworthy systems.

"The entire process was a watershed moment for a research community that has long wanted to help solve what is clearly a pressing national problem — the need to create and deploy trustworthy systems to run our nation's critical infrastructures," Schneider says.

From The National Science Foundation
View Full Article


Abstracts Copyright © 2009 Information Inc., Bethesda, Maryland, USA


Paul Schnegelberger

Cool graphic ! I am interested to learn what the color-codes are in the map and what map tool was used to create the visualization.

David Roman

Paul, You'll find further information about the visualization at (, including a URL for Chris Harrison (, a CMU Ph.D. candidate whose maps were adapted for the image accompanying this story.

Displaying all 2 comments

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account