Request for Input (RFI)-National Cyber Leap Year, 60724-60726 [E8-24257]
Download as PDF
60724
Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices
The proposed amendment to the
Endowment’s systems of records will
become effective 30 days from the date
of this publication in the Federal
Register.
DATES:
Karen Elias; Acting General
Counsel; National Endowment for the
Arts; 1100 Pennsylvania Avenue, NW.;
Room 518; Washington, DC 20506;
telefax at (202) 682–5572 or by
electronic mail at
eliask@arts.endow.gov.
ADDRESSES:
FOR FURTHER INFORMATION CONTACT:
Karen Elias, (202) 682–5418.
SUPPLEMENTARY INFORMATION: The
Endowment is today making an
amendment to its notice of the existence
and character of its systems of records,
which was published in the Federal
Register on June 30, 2008 (73 FR 36908)
in accordance with 5 U.S.C. 552a(e)(4),
by adding one general routine use.
Statement of General Routine Uses
12. To appropriate agencies, entities,
and persons when (1) The Endowment
suspects or has confirmed that the
security or confidentiality of
information in the system of records has
been compromised; (2) the Endowment
has determined that as a result of the
suspected or confirmed compromise
there is a risk of harm to economic or
property interests, identity theft or
fraud, or harm to the security or
integrity of this system or other systems
or programs (whether maintained by the
Endowment or another agency or entity)
that rely upon the compromised
information; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
in connection with the Endowment’s
efforts to respond to the suspected or
confirmed compromise and prevent,
minimize, or remedy such harm.
Kathleen Edwards,
Director, Administrative Services, National
Endowment for the Arts.
[FR Doc. E8–24324 Filed 10–10–08; 8:45 am]
BILLING CODE 7537–01–P
NATIONAL SCIENCE FOUNDATION
jlentini on PROD1PC65 with NOTICES
Advisory Committee for Computer and
Information Science and Engineering;
Notice of Meeting
In accordance with the Federal
Advisory Committee Act (Pub. L. 92–
463, as amended), the National Science
Foundation announces the following
meeting:
Name: Advisory Committee for Computer
and Information Science and Engineering—
(1115).
VerDate Aug<31>2005
15:37 Oct 10, 2008
Jkt 217001
Date and Time: October 17, 2008, 8:30
a.m.–5 p.m. (EDT).
Place: The National Science Foundation,
4201 Wilson Blvd., Room 1235, Arlington,
VA 22230.
Type of Meeting: Open.
Contact Person: Maggie Whiteman, Office
of the Assistant Director, Directorate for
Computer and Information Science and
Engineering, National Science Foundation,
4201 Wilson Blvd., Suite 1105, Arlington, VA
22230. Telephone: (703) 292–8900.
Minutes: May be obtained from the contact
person listed above.
Purpose of Meeting: To discuss strategic
priorities in computing. To advise NSF on
the impact of its policies, programs and
activities on the CISE community. To provide
advice to the Assistant Director/CISE on
issues related to long-range planning, and to
form ad hoc subcommittees to carry out
needed studies and tasks.
Reason for Late Notice: Due to
administrative complications and scheduling
issues. However, there is necessity to proceed
with this meeting at this time.
Agenda: Report from the Assistant
Director. Discussion of research, education,
diversity, workforce issues in IT and longrange funding outlook.
Dated: October 8, 2008.
Susanne Bolton,
Committee Management Officer.
[FR Doc. E8–24243 Filed 10–10–08; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
National Science Board Task Force on
the NSB 60th Anniversary; Sunshine
Act Meetings; Notice
The National Science Board’s Task
Force on the NSB 60th Anniversary,
pursuant to NSF regulations (45 CFR
Part 614), the National Science
Foundation Act, as amended (42 U.S.C.
1862n–5), and the Government in the
Sunshine Act (5 U.S.C. 552b), hereby
gives notice in regard to the scheduling
of meetings for the transaction of
National Science Board business and
other matters specified, as follows:
DATE AND TIME: Tuesday, October 28,
2008 from 3 p.m. to 4 p.m.
SUBJECT MATTER: Discussion of ideas for
the NSB 60th Anniversary.
STATUS: Open.
PLACE: This meeting will be held by
teleconference originating at the
National Science Board Office, National
Science Foundation, 4201 Wilson Blvd.,
Arlington, VA 22230. Room 110 will be
available to the public to listen to this
teleconference meeting.
Please refer to the National Science
Board Web site (https://www.nsf.gov/nsb)
for information or schedule updates, or
contact: Ann Ferrante, National Science
Board Office, 4201 Wilson Blvd.,
PO 00000
Frm 00053
Fmt 4703
Sfmt 4703
Arlington, VA 22230. Telephone: (703)
292–7000.
Ann Ferrante,
Writer-Editor.
[FR Doc. E8–24304 Filed 10–10–08; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Request for Input (RFI)—National
Cyber Leap Year
The National Coordination
Office (NCO) for Networking
Information Technology Research and
Development (NITRD).
ACTION: Request for Input (RFI).
AGENCY:
FOR FURTHER INFORMATION, CONTACT:
Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292–4873. Individuals who use a
telecommunications device for the deaf
(TDD) may call the Federal Information
Relay Service (FIRS) at 1–800–877–8339
between 8 a.m. and 8 p.m., Eastern time,
Monday through Friday.
DATES: To be considered, submissions
must be received by December 15, 2008.
SUMMARY: This request is being issued to
initiate the National Cyber Leap Year
under the Comprehensive National
Cybersecurity Initiative (CNCI). The goal
of the National Cyber Leap Year is to
identify the most promising gamechanging ideas with the potential to
reduce vulnerabilities to cyber
exploitations by altering the
cybersecurity landscape. This RFI is the
first step in constructing a national
research and development agenda in
support of the CNCI. Multidisciplinary
contributions from organizations with
cybersecurity interests are especially
encouraged.
SUPPLEMENTARY INFORMATION:
Overview: This Request for
Information (RFI) is issued under the
Comprehensive National Cybersecurity
Initiative (CNCI), established within
Homeland Security Presidential
Directive (HSPD)–23. The RFI was
developed by the Networking and
Information Technology Research and
Development (NITRD) Program Senior
Steering Group (SSG) for Cybersecurity
to invite participation in a National
Cyber Leap Year whose goal is an
integrated national approach to make
cyberspace safe for the American way of
life.
Background: We are a cyber nation.
The U.S. information infrastructure—
including telecommunications and
computer networks and systems and the
data that reside on them—is critical to
virtually every aspect of modern life.
This information infrastructure is
E:\FR\FM\14OCN1.SGM
14OCN1
jlentini on PROD1PC65 with NOTICES
Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices
increasingly vulnerable to exploitation,
disruption and destruction by a growing
array of adversaries. The President’s
CNCI plan calls for leap-ahead research
and technology to reduce vulnerabilities
to asymmetric attack in cyberspace.
Unlike many research agenda that aim
for steady progress in the advancement
of science, the leap-ahead effort seeks
just a few revolutionary ideas with the
potential to reshape the landscape.
These game-changing technologies (or
non-technical mechanisms that are
made possible through technology),
developed and deployed over the next
decade, will fundamentally change the
cyber game into one where the good
guys have an advantage. Leap-ahead
technologies are so-called because they
enable us to leap over the obstacles
preventing us from being where we
want to be. These advances may require
years of concerted research and
development to be fully realized, good
ideas often do, however the intent is to
start now and gain momentum as
intermediate results emerge.
Objective: The National Cyber Leap
Year has two main goals: (1)
Construction of a national research and
technology agenda that both identifies
the most promising ideas and describes
the strategy that brings those ideas to
fruition; and (2) jumpstarting gamechanging, multi-disciplinary
development efforts.
The Leap Year will run during fiscal
year 2009, and will comprise two stages,
prospecting and focusing.
Stage One, which we open with this
formal announcement and describe in
detail below, canvasses the
cybersecurity community for ideas. Our
aim is to hear from all those who wish
to help.
The heart of Stage Two, which begins
February 1, 2009, is a series of
workshops to develop the best ideas
from Stage One. As the year progresses
we will publish four types of findings:
(1) Game-changers—descriptions of
the paradigm-busters that technology
will make possible; (2) Technical
Strategy—as specifically as possible, the
invention and/or research which needs
to be done; (3) Productization/
Implementation—how the capability
will be packaged, delivered and used,
and by whom; and (4)
Recommendations—prescriptions for
success, to include funding, policies,
authorities, tasking-whatever would
smooth the way to realization of the
game-changing capability.
Deadline for Submission under this
RFI: We anticipate multiple cycles of
Stage One opportunities. The first Stage
One cycle is covered by this RFI and
will close December 15, 2008.
VerDate Aug<31>2005
15:37 Oct 10, 2008
Jkt 217001
Subsequent cycles will be announced
by separate RFIs. All Stage One cycles
are expected to be complete by April 15,
2009.
Stage One Description
What We Are Looking For
Contributors may submit up to 3 leapahead technology concepts.
Multidisciplinary contributions from
organizations with cybersecurity
interests are especially encouraged.
Cognizant of the limits of
conventional studies and reports,
substantial thought has been given to
what framework and methodology
might render the community’s best
ideas understandable, compelling and
actionable to those who need to support
them, fund them and adopt them. Since
our search is for game-changing
concepts, we ask that submitters explain
their ideas in terms of a game. Many
ideas will fall into the following three
categories. Ideas that:
Morph the gameboard—(change the
defensive terrain (permanently or
adaptively) to make it harder for the
attacker to maneuver and achieve his
goals).
Example: Non-persistent virtual
machines—every time the enemy takes
a hill, the hill goes away.
Change the rules—(lay the foundation
for cyber civilization by changing
network protocols and norms to favor
our society’s values).
Example: The no-call list—direct
marketers have to ‘‘attack’’ on customer
terms now.
Raise the stakes—(make the cost to
play less advantageous to the attacker by
raising risk, lowering value, etc.).
Example: Charging for e-mail—
making the SPAMmer ante up means a
lot more fish have to bite for SPAM to
pay.
Ideas that change the game in some
other dimension are also welcome; just
be sure to explain how.
Who Can Participate
This RFI is open to all and we
especially encourage public and private
sector groups (e.g. universities,
government laboratories, companies,
non-profit groups, user groups) with
cybersecurity interests to participate.
Collaborative, multi-disciplinary efforts
are also highly encouraged. Participants
in Stage One must be willing to
participate in Stage Two should one of
their ideas be selected. Participants
must also be willing to have their ideas
posted for discussion on a public Web
site and/or included in our final report.
PO 00000
Frm 00054
Fmt 4703
Sfmt 4703
60725
How We Will Use It
The best ideas from Stage One will go
on to Stage Two. Stage One submissions
may be posted on our Web site for
elaboration and improvement, as a key
goal of the leap year is to engage diverse
sectors (e.g. government, academia,
commercial, international) in
identifying multi-dimensional strategies
and, where it makes sense, in rolling up
their sleeves and starting to work.
Submissions crafted with that larger
community in mind will be the most
compelling and influential.
Leap Year interim result and emerging
guidance will be posted at: https://
www.nitrd.gov/leapyear/. Questions and
submissions should be addressed to:
leapyear@nitrd.gov.
In accordance with FAR 15.202(3),
responses to this notice are not offers
and cannot be accepted by the
Government to form a binding contract.
Responders are solely responsible for all
expenses associated with responding to
this RFI, including any subsequent
requests for proposals.
All responses must be no more than
two pages long (12 pt font, 1″ margins)
and in this form:
Who you are—Name, credentials,
group membership.
Game-changing dimension—Board,
Rules, Stakes?
Concept—What is the idea and why
does it change the game?
Vision—Make us believe in your idea
(What would the world look like if this
were in place? How would people get it,
use it? What makes you think this is
possible? What needs to happen for this
to become real? Which parts already
exist; which parts need to be invented?).
Method—What process did you use to
formulate and refine your concept?
What assumptions or dependencies
underlie your analysis?
Dream team—Who are the people
you’d need to have on your team to
make this real? If you just know
disciplines that’s OK. If you have
names, explain what those people do. If
your idea is selected for further
consideration, we will do our best to
bring these people together for a phase
two workshop. Responses must be
submitted via https://www.nitrd.gov/
leapyear/ or e-mailed to
leapyear@nitrd.gov. Responses to this
RFI must be received by December 15,
2008 so that arrangements can be made
for Stage Two activities beginning on or
about February 1, 2009. Additional
Stage One cycles, if any, will be
announced by separate RFI with all
Stage One activities expected to be
complete by April 15, 2009.
Appendix A contains a sample
submission and review considerations.
E:\FR\FM\14OCN1.SGM
14OCN1
60726
Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices
Appendix A
jlentini on PROD1PC65 with NOTICES
Sample Submission
Who you are—
quieteveningathome.org—We are a
501c3 group with 50,000 members
dedicated to the preservation of the
dinner hour as the core of American
civilization.
Game-changing dimension—Change
the rules.
Concept—Telemarketers are using our
resources and time to market their
products. They can call and interrupt
our dinners and use our own telephones
to reach us. What if we changed the
rules to ‘‘don’t call us, we’ll call you?’’
Vision—The vision is a national donot-call register. People should be able
to go to donotcall.gov and register their
phone number. It would be illegal for
telemarketers who have not been given
permission to call someone. If a
telemarketer makes an illegal call, the
recipient should be able to report them
to a government agency and they should
be fined. The technology to do this is
easy, we are not sure about the laws and
policies. Courts have ruled differently
on this issue at different times. We think
the political climate is friendly today for
Federal legislation.
Method—We announced our search
for ideas on our website and
submissions were made there. We also
publicized through restaurant and
catering associations with whom we
often partner, who offered interruptionfree free meals for brainstorming
sessions. Participation was not limited
to members, but could not be
anonymous, since it was our intention
to follow up with submitters. The Board
of Directors of QEAH enlisted the aid of
Prandia University to work with the
submitters of the best ideas to develop
them into even better ideas. The Board
ensured all the aspects described in the
Leap Year RFI were addressed in our
final submissions.
Dream team—Federal Trade
Commission, Federal Communications
Commission, constitutional lawyer,
Telemarketers’ Association, Consumer
Union, Oracle or other database
company.
Review Considerations
Submissions will be reviewed by the
NITRD Senior Steering Group for
Cybersecurity using the following
considerations:
Would it change the game?
How clear is the way forward?
What heights are the hurdles that may
be found in the way forward?
Submitted by the National Science
Foundation for the National
Coordination Office (NCO) for
VerDate Aug<31>2005
15:37 Oct 10, 2008
Jkt 217001
Networking and Information
Technology Research and Development
(NITRD) on October 8, 2008.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. E8–24257 Filed 10–10–08; 8:45 am]
BILLING CODE 7555–01–P
NUCLEAR REGULATORY
COMMISSION
[Docket Nos. 52–029 AND 52–030]
Progress Energy Florida, Inc.
Acceptance for Docketing of an
Application for Combined License for
Levy County Nuclear Power Plant
Units 1 and 2
By letter dated July 28, 2008, Progress
Energy Florida, Inc. (PEF) submitted an
application to the U.S. Nuclear
Regulatory Commission (NRC) for a
combined license (COL) for two AP1000
advanced passive pressurized water
reactors in accordance with the
requirements contained in 10 CFR 52,
‘‘Licenses, Certifications and Approvals
for Nuclear Power Plants.’’ These
reactors will be identified as Levy
Nuclear Power Plant (LNP) Units 1 and
2 and located at a site in Levy County,
Florida. A notice of receipt and
availability of this application is
currently awaiting publication in the
Federal Register.
The NRC staff has determined that
PEF has submitted information in
accordance with 10 CFR Part 2, ‘‘Rules
of Practice for Domestic Licensing
Proceedings and Issuance of Orders,’’
and 10 CFR Part 52 that is acceptable for
docketing. The docket numbers
established for the LNP Units 1 and 2
COL application are 52–029 and 52–
030, respectively.
The NRC staff will perform a detailed
technical review of the application.
Docketing of the application does not
preclude the NRC from requesting
additional information from the
applicant as the review proceeds, nor
does it predict whether the Commission
will grant or deny the application. The
Commission will conduct a hearing in
accordance with Subpart L, ‘‘Informal
Hearing Procedures for NRC
Adjudications,’’ of 10 CFR Part 2 and
will receive a report on the COL
application from the Advisory
Committee on Reactor Safeguards in
accordance with 10 CFR 52.87, ‘‘Referral
to the Advisory Committee on Reactor
Safeguards (ACRS).’’ If the Commission
finds that the COL application meets the
applicable standards of the Atomic
Energy Act and the Commission’s
PO 00000
Frm 00055
Fmt 4703
Sfmt 4703
regulations, and that required
notifications to other agencies and
bodies have been made, the Commission
will issue a COL, in the form and
contain conditions and limitations that
the Commission finds appropriate and
necessary.
In accordance with 10 CFR Part 51,
the Commission will also prepare an
environmental impact statement for the
proposed action. Pursuant to 10 CFR
51.26, and as part of the environmental
scoping process, the staff intends to
hold a public scoping meeting. Detailed
information regarding this meeting will
be included in a future Federal Register
notice.
Finally, the Commission will publish
in the Federal Register a notice of
hearing, which will notice the
opportunity to petition to intervene.
Documents may be examined, and/or
copied for a fee, at the NRC’s Public
Document Room (PDR), located at One
White Flint North, Public File Area O1
F21, 11555 Rockville Pike (first floor),
Rockville, Maryland 20852, and will be
accessible electronically through the
Agencywide Documents Access and
Management System (ADAMS) Public
Electronic Reading Room link at the
NRC Web site https://www.nrc.gov/
reading-rm/adams.html. The
application is also available at https://
www.nrc.gov/reactors/new-licensing/
col.html. Persons who do not have
access to ADAMS or who encounter
problems in accessing documents
located in ADAMS should contact the
NRC PDR Reference staff by telephone
at 1–800–397–4209, 301–415–4737, or
by e-mail to pdr@nrc.gov.
Dated at Rockville, Maryland, this 6th day
of October 2008.
For the Nuclear Regulatory Commission.
Brian Anderson,
Lead Project Manager, AP1000 Projects
Branch 1, Division of New Reactor Licensing,
Office of New Reactors.
[FR Doc. E8–24266 Filed 10–10–08; 8:45 am]
BILLING CODE 7590–01–P
NUCLEAR REGULATORY
COMMISSION
Progress Energy Florida, Inc. Notice of
Receipt and Availability of Application
for a Combined License
On July 30, 2008, Progress Energy
Florida (PEF, or the applicant) filed
with the Nuclear Regulatory
Commission (NRC, the Commission)
pursuant to Section 103 of the Atomic
Energy Act and Title 10 of the Code of
Federal Regulations (10 CFR) Part 52,
‘‘Licenses, Certifications, and Approvals
for Nuclear Power Plants,’’ an
E:\FR\FM\14OCN1.SGM
14OCN1
Agencies
[Federal Register Volume 73, Number 199 (Tuesday, October 14, 2008)]
[Notices]
[Pages 60724-60726]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-24257]
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Request for Input (RFI)--National Cyber Leap Year
AGENCY: The National Coordination Office (NCO) for Networking
Information Technology Research and Development (NITRD).
ACTION: Request for Input (RFI).
-----------------------------------------------------------------------
FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292-4873. Individuals who use a telecommunications device for the
deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1-
800-877-8339 between 8 a.m. and 8 p.m., Eastern time, Monday through
Friday.
DATES: To be considered, submissions must be received by December 15,
2008.
SUMMARY: This request is being issued to initiate the National Cyber
Leap Year under the Comprehensive National Cybersecurity Initiative
(CNCI). The goal of the National Cyber Leap Year is to identify the
most promising game-changing ideas with the potential to reduce
vulnerabilities to cyber exploitations by altering the cybersecurity
landscape. This RFI is the first step in constructing a national
research and development agenda in support of the CNCI.
Multidisciplinary contributions from organizations with cybersecurity
interests are especially encouraged.
SUPPLEMENTARY INFORMATION:
Overview: This Request for Information (RFI) is issued under the
Comprehensive National Cybersecurity Initiative (CNCI), established
within Homeland Security Presidential Directive (HSPD)-23. The RFI was
developed by the Networking and Information Technology Research and
Development (NITRD) Program Senior Steering Group (SSG) for
Cybersecurity to invite participation in a National Cyber Leap Year
whose goal is an integrated national approach to make cyberspace safe
for the American way of life.
Background: We are a cyber nation. The U.S. information
infrastructure--including telecommunications and computer networks and
systems and the data that reside on them--is critical to virtually
every aspect of modern life. This information infrastructure is
[[Page 60725]]
increasingly vulnerable to exploitation, disruption and destruction by
a growing array of adversaries. The President's CNCI plan calls for
leap-ahead research and technology to reduce vulnerabilities to
asymmetric attack in cyberspace. Unlike many research agenda that aim
for steady progress in the advancement of science, the leap-ahead
effort seeks just a few revolutionary ideas with the potential to
reshape the landscape. These game-changing technologies (or non-
technical mechanisms that are made possible through technology),
developed and deployed over the next decade, will fundamentally change
the cyber game into one where the good guys have an advantage. Leap-
ahead technologies are so-called because they enable us to leap over
the obstacles preventing us from being where we want to be. These
advances may require years of concerted research and development to be
fully realized, good ideas often do, however the intent is to start now
and gain momentum as intermediate results emerge.
Objective: The National Cyber Leap Year has two main goals: (1)
Construction of a national research and technology agenda that both
identifies the most promising ideas and describes the strategy that
brings those ideas to fruition; and (2) jumpstarting game-changing,
multi-disciplinary development efforts.
The Leap Year will run during fiscal year 2009, and will comprise
two stages, prospecting and focusing.
Stage One, which we open with this formal announcement and describe
in detail below, canvasses the cybersecurity community for ideas. Our
aim is to hear from all those who wish to help.
The heart of Stage Two, which begins February 1, 2009, is a series
of workshops to develop the best ideas from Stage One. As the year
progresses we will publish four types of findings:
(1) Game-changers--descriptions of the paradigm-busters that
technology will make possible; (2) Technical Strategy--as specifically
as possible, the invention and/or research which needs to be done; (3)
Productization/Implementation--how the capability will be packaged,
delivered and used, and by whom; and (4) Recommendations--prescriptions
for success, to include funding, policies, authorities, tasking-
whatever would smooth the way to realization of the game-changing
capability.
Deadline for Submission under this RFI: We anticipate multiple
cycles of Stage One opportunities. The first Stage One cycle is covered
by this RFI and will close December 15, 2008.
Subsequent cycles will be announced by separate RFIs. All Stage One
cycles are expected to be complete by April 15, 2009.
Stage One Description
What We Are Looking For
Contributors may submit up to 3 leap-ahead technology concepts.
Multidisciplinary contributions from organizations with cybersecurity
interests are especially encouraged.
Cognizant of the limits of conventional studies and reports,
substantial thought has been given to what framework and methodology
might render the community's best ideas understandable, compelling and
actionable to those who need to support them, fund them and adopt them.
Since our search is for game-changing concepts, we ask that submitters
explain their ideas in terms of a game. Many ideas will fall into the
following three categories. Ideas that:
Morph the gameboard--(change the defensive terrain (permanently or
adaptively) to make it harder for the attacker to maneuver and achieve
his goals).
Example: Non-persistent virtual machines--every time the enemy
takes a hill, the hill goes away.
Change the rules--(lay the foundation for cyber civilization by
changing network protocols and norms to favor our society's values).
Example: The no-call list--direct marketers have to ``attack'' on
customer terms now.
Raise the stakes--(make the cost to play less advantageous to the
attacker by raising risk, lowering value, etc.).
Example: Charging for e-mail--making the SPAMmer ante up means a
lot more fish have to bite for SPAM to pay.
Ideas that change the game in some other dimension are also
welcome; just be sure to explain how.
Who Can Participate
This RFI is open to all and we especially encourage public and
private sector groups (e.g. universities, government laboratories,
companies, non-profit groups, user groups) with cybersecurity interests
to participate. Collaborative, multi-disciplinary efforts are also
highly encouraged. Participants in Stage One must be willing to
participate in Stage Two should one of their ideas be selected.
Participants must also be willing to have their ideas posted for
discussion on a public Web site and/or included in our final report.
How We Will Use It
The best ideas from Stage One will go on to Stage Two. Stage One
submissions may be posted on our Web site for elaboration and
improvement, as a key goal of the leap year is to engage diverse
sectors (e.g. government, academia, commercial, international) in
identifying multi-dimensional strategies and, where it makes sense, in
rolling up their sleeves and starting to work. Submissions crafted with
that larger community in mind will be the most compelling and
influential.
Leap Year interim result and emerging guidance will be posted at:
https://www.nitrd.gov/leapyear/. Questions and submissions should be
addressed to: leapyear@nitrd.gov.
In accordance with FAR 15.202(3), responses to this notice are not
offers and cannot be accepted by the Government to form a binding
contract. Responders are solely responsible for all expenses associated
with responding to this RFI, including any subsequent requests for
proposals.
All responses must be no more than two pages long (12 pt font, 1''
margins) and in this form:
Who you are--Name, credentials, group membership.
Game-changing dimension--Board, Rules, Stakes?
Concept--What is the idea and why does it change the game?
Vision--Make us believe in your idea (What would the world look
like if this were in place? How would people get it, use it? What makes
you think this is possible? What needs to happen for this to become
real? Which parts already exist; which parts need to be invented?).
Method--What process did you use to formulate and refine your
concept? What assumptions or dependencies underlie your analysis?
Dream team--Who are the people you'd need to have on your team to
make this real? If you just know disciplines that's OK. If you have
names, explain what those people do. If your idea is selected for
further consideration, we will do our best to bring these people
together for a phase two workshop. Responses must be submitted via
https://www.nitrd.gov/leapyear/ or e-mailed to leapyear@nitrd.gov.
Responses to this RFI must be received by December 15, 2008 so that
arrangements can be made for Stage Two activities beginning on or about
February 1, 2009. Additional Stage One cycles, if any, will be
announced by separate RFI with all Stage One activities expected to be
complete by April 15, 2009.
Appendix A contains a sample submission and review considerations.
[[Page 60726]]
Appendix A
Sample Submission
Who you are--quieteveningathome.org--We are a 501c3 group with
50,000 members dedicated to the preservation of the dinner hour as the
core of American civilization.
Game-changing dimension--Change the rules.
Concept--Telemarketers are using our resources and time to market
their products. They can call and interrupt our dinners and use our own
telephones to reach us. What if we changed the rules to ``don't call
us, we'll call you?''
Vision--The vision is a national do-not-call register. People
should be able to go to donotcall.gov and register their phone number.
It would be illegal for telemarketers who have not been given
permission to call someone. If a telemarketer makes an illegal call,
the recipient should be able to report them to a government agency and
they should be fined. The technology to do this is easy, we are not
sure about the laws and policies. Courts have ruled differently on this
issue at different times. We think the political climate is friendly
today for Federal legislation.
Method--We announced our search for ideas on our website and
submissions were made there. We also publicized through restaurant and
catering associations with whom we often partner, who offered
interruption-free free meals for brainstorming sessions. Participation
was not limited to members, but could not be anonymous, since it was
our intention to follow up with submitters. The Board of Directors of
QEAH enlisted the aid of Prandia University to work with the submitters
of the best ideas to develop them into even better ideas. The Board
ensured all the aspects described in the Leap Year RFI were addressed
in our final submissions.
Dream team--Federal Trade Commission, Federal Communications
Commission, constitutional lawyer, Telemarketers' Association, Consumer
Union, Oracle or other database company.
Review Considerations
Submissions will be reviewed by the NITRD Senior Steering Group for
Cybersecurity using the following considerations:
Would it change the game?
How clear is the way forward?
What heights are the hurdles that may be found in the way forward?
Submitted by the National Science Foundation for the National
Coordination Office (NCO) for Networking and Information Technology
Research and Development (NITRD) on October 8, 2008.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. E8-24257 Filed 10-10-08; 8:45 am]
BILLING CODE 7555-01-P