Request for Input (RFI)-National Cyber Leap Year, 60724-60726 [E8-24257]

Download as PDF 60724 Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices The proposed amendment to the Endowment’s systems of records will become effective 30 days from the date of this publication in the Federal Register. DATES: Karen Elias; Acting General Counsel; National Endowment for the Arts; 1100 Pennsylvania Avenue, NW.; Room 518; Washington, DC 20506; telefax at (202) 682–5572 or by electronic mail at eliask@arts.endow.gov. ADDRESSES: FOR FURTHER INFORMATION CONTACT: Karen Elias, (202) 682–5418. SUPPLEMENTARY INFORMATION: The Endowment is today making an amendment to its notice of the existence and character of its systems of records, which was published in the Federal Register on June 30, 2008 (73 FR 36908) in accordance with 5 U.S.C. 552a(e)(4), by adding one general routine use. Statement of General Routine Uses 12. To appropriate agencies, entities, and persons when (1) The Endowment suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Endowment has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Endowment or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Endowment’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. Kathleen Edwards, Director, Administrative Services, National Endowment for the Arts. [FR Doc. E8–24324 Filed 10–10–08; 8:45 am] BILLING CODE 7537–01–P NATIONAL SCIENCE FOUNDATION jlentini on PROD1PC65 with NOTICES Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L. 92– 463, as amended), the National Science Foundation announces the following meeting: Name: Advisory Committee for Computer and Information Science and Engineering— (1115). VerDate Aug<31>2005 15:37 Oct 10, 2008 Jkt 217001 Date and Time: October 17, 2008, 8:30 a.m.–5 p.m. (EDT). Place: The National Science Foundation, 4201 Wilson Blvd., Room 1235, Arlington, VA 22230. Type of Meeting: Open. Contact Person: Maggie Whiteman, Office of the Assistant Director, Directorate for Computer and Information Science and Engineering, National Science Foundation, 4201 Wilson Blvd., Suite 1105, Arlington, VA 22230. Telephone: (703) 292–8900. Minutes: May be obtained from the contact person listed above. Purpose of Meeting: To discuss strategic priorities in computing. To advise NSF on the impact of its policies, programs and activities on the CISE community. To provide advice to the Assistant Director/CISE on issues related to long-range planning, and to form ad hoc subcommittees to carry out needed studies and tasks. Reason for Late Notice: Due to administrative complications and scheduling issues. However, there is necessity to proceed with this meeting at this time. Agenda: Report from the Assistant Director. Discussion of research, education, diversity, workforce issues in IT and longrange funding outlook. Dated: October 8, 2008. Susanne Bolton, Committee Management Officer. [FR Doc. E8–24243 Filed 10–10–08; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION National Science Board Task Force on the NSB 60th Anniversary; Sunshine Act Meetings; Notice The National Science Board’s Task Force on the NSB 60th Anniversary, pursuant to NSF regulations (45 CFR Part 614), the National Science Foundation Act, as amended (42 U.S.C. 1862n–5), and the Government in the Sunshine Act (5 U.S.C. 552b), hereby gives notice in regard to the scheduling of meetings for the transaction of National Science Board business and other matters specified, as follows: DATE AND TIME: Tuesday, October 28, 2008 from 3 p.m. to 4 p.m. SUBJECT MATTER: Discussion of ideas for the NSB 60th Anniversary. STATUS: Open. PLACE: This meeting will be held by teleconference originating at the National Science Board Office, National Science Foundation, 4201 Wilson Blvd., Arlington, VA 22230. Room 110 will be available to the public to listen to this teleconference meeting. Please refer to the National Science Board Web site (https://www.nsf.gov/nsb) for information or schedule updates, or contact: Ann Ferrante, National Science Board Office, 4201 Wilson Blvd., PO 00000 Frm 00053 Fmt 4703 Sfmt 4703 Arlington, VA 22230. Telephone: (703) 292–7000. Ann Ferrante, Writer-Editor. [FR Doc. E8–24304 Filed 10–10–08; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION Request for Input (RFI)—National Cyber Leap Year The National Coordination Office (NCO) for Networking Information Technology Research and Development (NITRD). ACTION: Request for Input (RFI). AGENCY: FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or (703) 292–4873. Individuals who use a telecommunications device for the deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1–800–877–8339 between 8 a.m. and 8 p.m., Eastern time, Monday through Friday. DATES: To be considered, submissions must be received by December 15, 2008. SUMMARY: This request is being issued to initiate the National Cyber Leap Year under the Comprehensive National Cybersecurity Initiative (CNCI). The goal of the National Cyber Leap Year is to identify the most promising gamechanging ideas with the potential to reduce vulnerabilities to cyber exploitations by altering the cybersecurity landscape. This RFI is the first step in constructing a national research and development agenda in support of the CNCI. Multidisciplinary contributions from organizations with cybersecurity interests are especially encouraged. SUPPLEMENTARY INFORMATION: Overview: This Request for Information (RFI) is issued under the Comprehensive National Cybersecurity Initiative (CNCI), established within Homeland Security Presidential Directive (HSPD)–23. The RFI was developed by the Networking and Information Technology Research and Development (NITRD) Program Senior Steering Group (SSG) for Cybersecurity to invite participation in a National Cyber Leap Year whose goal is an integrated national approach to make cyberspace safe for the American way of life. Background: We are a cyber nation. The U.S. information infrastructure— including telecommunications and computer networks and systems and the data that reside on them—is critical to virtually every aspect of modern life. This information infrastructure is E:\FR\FM\14OCN1.SGM 14OCN1 jlentini on PROD1PC65 with NOTICES Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices increasingly vulnerable to exploitation, disruption and destruction by a growing array of adversaries. The President’s CNCI plan calls for leap-ahead research and technology to reduce vulnerabilities to asymmetric attack in cyberspace. Unlike many research agenda that aim for steady progress in the advancement of science, the leap-ahead effort seeks just a few revolutionary ideas with the potential to reshape the landscape. These game-changing technologies (or non-technical mechanisms that are made possible through technology), developed and deployed over the next decade, will fundamentally change the cyber game into one where the good guys have an advantage. Leap-ahead technologies are so-called because they enable us to leap over the obstacles preventing us from being where we want to be. These advances may require years of concerted research and development to be fully realized, good ideas often do, however the intent is to start now and gain momentum as intermediate results emerge. Objective: The National Cyber Leap Year has two main goals: (1) Construction of a national research and technology agenda that both identifies the most promising ideas and describes the strategy that brings those ideas to fruition; and (2) jumpstarting gamechanging, multi-disciplinary development efforts. The Leap Year will run during fiscal year 2009, and will comprise two stages, prospecting and focusing. Stage One, which we open with this formal announcement and describe in detail below, canvasses the cybersecurity community for ideas. Our aim is to hear from all those who wish to help. The heart of Stage Two, which begins February 1, 2009, is a series of workshops to develop the best ideas from Stage One. As the year progresses we will publish four types of findings: (1) Game-changers—descriptions of the paradigm-busters that technology will make possible; (2) Technical Strategy—as specifically as possible, the invention and/or research which needs to be done; (3) Productization/ Implementation—how the capability will be packaged, delivered and used, and by whom; and (4) Recommendations—prescriptions for success, to include funding, policies, authorities, tasking-whatever would smooth the way to realization of the game-changing capability. Deadline for Submission under this RFI: We anticipate multiple cycles of Stage One opportunities. The first Stage One cycle is covered by this RFI and will close December 15, 2008. VerDate Aug<31>2005 15:37 Oct 10, 2008 Jkt 217001 Subsequent cycles will be announced by separate RFIs. All Stage One cycles are expected to be complete by April 15, 2009. Stage One Description What We Are Looking For Contributors may submit up to 3 leapahead technology concepts. Multidisciplinary contributions from organizations with cybersecurity interests are especially encouraged. Cognizant of the limits of conventional studies and reports, substantial thought has been given to what framework and methodology might render the community’s best ideas understandable, compelling and actionable to those who need to support them, fund them and adopt them. Since our search is for game-changing concepts, we ask that submitters explain their ideas in terms of a game. Many ideas will fall into the following three categories. Ideas that: Morph the gameboard—(change the defensive terrain (permanently or adaptively) to make it harder for the attacker to maneuver and achieve his goals). Example: Non-persistent virtual machines—every time the enemy takes a hill, the hill goes away. Change the rules—(lay the foundation for cyber civilization by changing network protocols and norms to favor our society’s values). Example: The no-call list—direct marketers have to ‘‘attack’’ on customer terms now. Raise the stakes—(make the cost to play less advantageous to the attacker by raising risk, lowering value, etc.). Example: Charging for e-mail— making the SPAMmer ante up means a lot more fish have to bite for SPAM to pay. Ideas that change the game in some other dimension are also welcome; just be sure to explain how. Who Can Participate This RFI is open to all and we especially encourage public and private sector groups (e.g. universities, government laboratories, companies, non-profit groups, user groups) with cybersecurity interests to participate. Collaborative, multi-disciplinary efforts are also highly encouraged. Participants in Stage One must be willing to participate in Stage Two should one of their ideas be selected. Participants must also be willing to have their ideas posted for discussion on a public Web site and/or included in our final report. PO 00000 Frm 00054 Fmt 4703 Sfmt 4703 60725 How We Will Use It The best ideas from Stage One will go on to Stage Two. Stage One submissions may be posted on our Web site for elaboration and improvement, as a key goal of the leap year is to engage diverse sectors (e.g. government, academia, commercial, international) in identifying multi-dimensional strategies and, where it makes sense, in rolling up their sleeves and starting to work. Submissions crafted with that larger community in mind will be the most compelling and influential. Leap Year interim result and emerging guidance will be posted at: https:// www.nitrd.gov/leapyear/. Questions and submissions should be addressed to: leapyear@nitrd.gov. In accordance with FAR 15.202(3), responses to this notice are not offers and cannot be accepted by the Government to form a binding contract. Responders are solely responsible for all expenses associated with responding to this RFI, including any subsequent requests for proposals. All responses must be no more than two pages long (12 pt font, 1″ margins) and in this form: Who you are—Name, credentials, group membership. Game-changing dimension—Board, Rules, Stakes? Concept—What is the idea and why does it change the game? Vision—Make us believe in your idea (What would the world look like if this were in place? How would people get it, use it? What makes you think this is possible? What needs to happen for this to become real? Which parts already exist; which parts need to be invented?). Method—What process did you use to formulate and refine your concept? What assumptions or dependencies underlie your analysis? Dream team—Who are the people you’d need to have on your team to make this real? If you just know disciplines that’s OK. If you have names, explain what those people do. If your idea is selected for further consideration, we will do our best to bring these people together for a phase two workshop. Responses must be submitted via https://www.nitrd.gov/ leapyear/ or e-mailed to leapyear@nitrd.gov. Responses to this RFI must be received by December 15, 2008 so that arrangements can be made for Stage Two activities beginning on or about February 1, 2009. Additional Stage One cycles, if any, will be announced by separate RFI with all Stage One activities expected to be complete by April 15, 2009. Appendix A contains a sample submission and review considerations. E:\FR\FM\14OCN1.SGM 14OCN1 60726 Federal Register / Vol. 73, No. 199 / Tuesday, October 14, 2008 / Notices Appendix A jlentini on PROD1PC65 with NOTICES Sample Submission Who you are— quieteveningathome.org—We are a 501c3 group with 50,000 members dedicated to the preservation of the dinner hour as the core of American civilization. Game-changing dimension—Change the rules. Concept—Telemarketers are using our resources and time to market their products. They can call and interrupt our dinners and use our own telephones to reach us. What if we changed the rules to ‘‘don’t call us, we’ll call you?’’ Vision—The vision is a national donot-call register. People should be able to go to donotcall.gov and register their phone number. It would be illegal for telemarketers who have not been given permission to call someone. If a telemarketer makes an illegal call, the recipient should be able to report them to a government agency and they should be fined. The technology to do this is easy, we are not sure about the laws and policies. Courts have ruled differently on this issue at different times. We think the political climate is friendly today for Federal legislation. Method—We announced our search for ideas on our website and submissions were made there. We also publicized through restaurant and catering associations with whom we often partner, who offered interruptionfree free meals for brainstorming sessions. Participation was not limited to members, but could not be anonymous, since it was our intention to follow up with submitters. The Board of Directors of QEAH enlisted the aid of Prandia University to work with the submitters of the best ideas to develop them into even better ideas. The Board ensured all the aspects described in the Leap Year RFI were addressed in our final submissions. Dream team—Federal Trade Commission, Federal Communications Commission, constitutional lawyer, Telemarketers’ Association, Consumer Union, Oracle or other database company. Review Considerations Submissions will be reviewed by the NITRD Senior Steering Group for Cybersecurity using the following considerations: Would it change the game? How clear is the way forward? What heights are the hurdles that may be found in the way forward? Submitted by the National Science Foundation for the National Coordination Office (NCO) for VerDate Aug<31>2005 15:37 Oct 10, 2008 Jkt 217001 Networking and Information Technology Research and Development (NITRD) on October 8, 2008. Suzanne H. Plimpton, Reports Clearance Officer, National Science Foundation. [FR Doc. E8–24257 Filed 10–10–08; 8:45 am] BILLING CODE 7555–01–P NUCLEAR REGULATORY COMMISSION [Docket Nos. 52–029 AND 52–030] Progress Energy Florida, Inc. Acceptance for Docketing of an Application for Combined License for Levy County Nuclear Power Plant Units 1 and 2 By letter dated July 28, 2008, Progress Energy Florida, Inc. (PEF) submitted an application to the U.S. Nuclear Regulatory Commission (NRC) for a combined license (COL) for two AP1000 advanced passive pressurized water reactors in accordance with the requirements contained in 10 CFR 52, ‘‘Licenses, Certifications and Approvals for Nuclear Power Plants.’’ These reactors will be identified as Levy Nuclear Power Plant (LNP) Units 1 and 2 and located at a site in Levy County, Florida. A notice of receipt and availability of this application is currently awaiting publication in the Federal Register. The NRC staff has determined that PEF has submitted information in accordance with 10 CFR Part 2, ‘‘Rules of Practice for Domestic Licensing Proceedings and Issuance of Orders,’’ and 10 CFR Part 52 that is acceptable for docketing. The docket numbers established for the LNP Units 1 and 2 COL application are 52–029 and 52– 030, respectively. The NRC staff will perform a detailed technical review of the application. Docketing of the application does not preclude the NRC from requesting additional information from the applicant as the review proceeds, nor does it predict whether the Commission will grant or deny the application. The Commission will conduct a hearing in accordance with Subpart L, ‘‘Informal Hearing Procedures for NRC Adjudications,’’ of 10 CFR Part 2 and will receive a report on the COL application from the Advisory Committee on Reactor Safeguards in accordance with 10 CFR 52.87, ‘‘Referral to the Advisory Committee on Reactor Safeguards (ACRS).’’ If the Commission finds that the COL application meets the applicable standards of the Atomic Energy Act and the Commission’s PO 00000 Frm 00055 Fmt 4703 Sfmt 4703 regulations, and that required notifications to other agencies and bodies have been made, the Commission will issue a COL, in the form and contain conditions and limitations that the Commission finds appropriate and necessary. In accordance with 10 CFR Part 51, the Commission will also prepare an environmental impact statement for the proposed action. Pursuant to 10 CFR 51.26, and as part of the environmental scoping process, the staff intends to hold a public scoping meeting. Detailed information regarding this meeting will be included in a future Federal Register notice. Finally, the Commission will publish in the Federal Register a notice of hearing, which will notice the opportunity to petition to intervene. Documents may be examined, and/or copied for a fee, at the NRC’s Public Document Room (PDR), located at One White Flint North, Public File Area O1 F21, 11555 Rockville Pike (first floor), Rockville, Maryland 20852, and will be accessible electronically through the Agencywide Documents Access and Management System (ADAMS) Public Electronic Reading Room link at the NRC Web site https://www.nrc.gov/ reading-rm/adams.html. The application is also available at https:// www.nrc.gov/reactors/new-licensing/ col.html. Persons who do not have access to ADAMS or who encounter problems in accessing documents located in ADAMS should contact the NRC PDR Reference staff by telephone at 1–800–397–4209, 301–415–4737, or by e-mail to pdr@nrc.gov. Dated at Rockville, Maryland, this 6th day of October 2008. For the Nuclear Regulatory Commission. Brian Anderson, Lead Project Manager, AP1000 Projects Branch 1, Division of New Reactor Licensing, Office of New Reactors. [FR Doc. E8–24266 Filed 10–10–08; 8:45 am] BILLING CODE 7590–01–P NUCLEAR REGULATORY COMMISSION Progress Energy Florida, Inc. Notice of Receipt and Availability of Application for a Combined License On July 30, 2008, Progress Energy Florida (PEF, or the applicant) filed with the Nuclear Regulatory Commission (NRC, the Commission) pursuant to Section 103 of the Atomic Energy Act and Title 10 of the Code of Federal Regulations (10 CFR) Part 52, ‘‘Licenses, Certifications, and Approvals for Nuclear Power Plants,’’ an E:\FR\FM\14OCN1.SGM 14OCN1

Agencies

[Federal Register Volume 73, Number 199 (Tuesday, October 14, 2008)]
[Notices]
[Pages 60724-60726]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-24257]


-----------------------------------------------------------------------

NATIONAL SCIENCE FOUNDATION


Request for Input (RFI)--National Cyber Leap Year

AGENCY: The National Coordination Office (NCO) for Networking 
Information Technology Research and Development (NITRD).

ACTION: Request for Input (RFI).

-----------------------------------------------------------------------

FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or 
(703) 292-4873. Individuals who use a telecommunications device for the 
deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1-
800-877-8339 between 8 a.m. and 8 p.m., Eastern time, Monday through 
Friday.

DATES: To be considered, submissions must be received by December 15, 
2008.
SUMMARY: This request is being issued to initiate the National Cyber 
Leap Year under the Comprehensive National Cybersecurity Initiative 
(CNCI). The goal of the National Cyber Leap Year is to identify the 
most promising game-changing ideas with the potential to reduce 
vulnerabilities to cyber exploitations by altering the cybersecurity 
landscape. This RFI is the first step in constructing a national 
research and development agenda in support of the CNCI. 
Multidisciplinary contributions from organizations with cybersecurity 
interests are especially encouraged.

SUPPLEMENTARY INFORMATION:
    Overview: This Request for Information (RFI) is issued under the 
Comprehensive National Cybersecurity Initiative (CNCI), established 
within Homeland Security Presidential Directive (HSPD)-23. The RFI was 
developed by the Networking and Information Technology Research and 
Development (NITRD) Program Senior Steering Group (SSG) for 
Cybersecurity to invite participation in a National Cyber Leap Year 
whose goal is an integrated national approach to make cyberspace safe 
for the American way of life.
    Background: We are a cyber nation. The U.S. information 
infrastructure--including telecommunications and computer networks and 
systems and the data that reside on them--is critical to virtually 
every aspect of modern life. This information infrastructure is

[[Page 60725]]

increasingly vulnerable to exploitation, disruption and destruction by 
a growing array of adversaries. The President's CNCI plan calls for 
leap-ahead research and technology to reduce vulnerabilities to 
asymmetric attack in cyberspace. Unlike many research agenda that aim 
for steady progress in the advancement of science, the leap-ahead 
effort seeks just a few revolutionary ideas with the potential to 
reshape the landscape. These game-changing technologies (or non-
technical mechanisms that are made possible through technology), 
developed and deployed over the next decade, will fundamentally change 
the cyber game into one where the good guys have an advantage. Leap-
ahead technologies are so-called because they enable us to leap over 
the obstacles preventing us from being where we want to be. These 
advances may require years of concerted research and development to be 
fully realized, good ideas often do, however the intent is to start now 
and gain momentum as intermediate results emerge.
    Objective: The National Cyber Leap Year has two main goals: (1) 
Construction of a national research and technology agenda that both 
identifies the most promising ideas and describes the strategy that 
brings those ideas to fruition; and (2) jumpstarting game-changing, 
multi-disciplinary development efforts.
    The Leap Year will run during fiscal year 2009, and will comprise 
two stages, prospecting and focusing.
    Stage One, which we open with this formal announcement and describe 
in detail below, canvasses the cybersecurity community for ideas. Our 
aim is to hear from all those who wish to help.
    The heart of Stage Two, which begins February 1, 2009, is a series 
of workshops to develop the best ideas from Stage One. As the year 
progresses we will publish four types of findings:
    (1) Game-changers--descriptions of the paradigm-busters that 
technology will make possible; (2) Technical Strategy--as specifically 
as possible, the invention and/or research which needs to be done; (3) 
Productization/Implementation--how the capability will be packaged, 
delivered and used, and by whom; and (4) Recommendations--prescriptions 
for success, to include funding, policies, authorities, tasking-
whatever would smooth the way to realization of the game-changing 
capability.
    Deadline for Submission under this RFI: We anticipate multiple 
cycles of Stage One opportunities. The first Stage One cycle is covered 
by this RFI and will close December 15, 2008.
    Subsequent cycles will be announced by separate RFIs. All Stage One 
cycles are expected to be complete by April 15, 2009.

Stage One Description

What We Are Looking For

    Contributors may submit up to 3 leap-ahead technology concepts. 
Multidisciplinary contributions from organizations with cybersecurity 
interests are especially encouraged.
    Cognizant of the limits of conventional studies and reports, 
substantial thought has been given to what framework and methodology 
might render the community's best ideas understandable, compelling and 
actionable to those who need to support them, fund them and adopt them. 
Since our search is for game-changing concepts, we ask that submitters 
explain their ideas in terms of a game. Many ideas will fall into the 
following three categories. Ideas that:
    Morph the gameboard--(change the defensive terrain (permanently or 
adaptively) to make it harder for the attacker to maneuver and achieve 
his goals).
    Example: Non-persistent virtual machines--every time the enemy 
takes a hill, the hill goes away.
    Change the rules--(lay the foundation for cyber civilization by 
changing network protocols and norms to favor our society's values).
    Example: The no-call list--direct marketers have to ``attack'' on 
customer terms now.
    Raise the stakes--(make the cost to play less advantageous to the 
attacker by raising risk, lowering value, etc.).
    Example: Charging for e-mail--making the SPAMmer ante up means a 
lot more fish have to bite for SPAM to pay.
    Ideas that change the game in some other dimension are also 
welcome; just be sure to explain how.

Who Can Participate

    This RFI is open to all and we especially encourage public and 
private sector groups (e.g. universities, government laboratories, 
companies, non-profit groups, user groups) with cybersecurity interests 
to participate. Collaborative, multi-disciplinary efforts are also 
highly encouraged. Participants in Stage One must be willing to 
participate in Stage Two should one of their ideas be selected. 
Participants must also be willing to have their ideas posted for 
discussion on a public Web site and/or included in our final report.

How We Will Use It

    The best ideas from Stage One will go on to Stage Two. Stage One 
submissions may be posted on our Web site for elaboration and 
improvement, as a key goal of the leap year is to engage diverse 
sectors (e.g. government, academia, commercial, international) in 
identifying multi-dimensional strategies and, where it makes sense, in 
rolling up their sleeves and starting to work. Submissions crafted with 
that larger community in mind will be the most compelling and 
influential.
    Leap Year interim result and emerging guidance will be posted at: 
https://www.nitrd.gov/leapyear/. Questions and submissions should be 
addressed to: leapyear@nitrd.gov.
    In accordance with FAR 15.202(3), responses to this notice are not 
offers and cannot be accepted by the Government to form a binding 
contract. Responders are solely responsible for all expenses associated 
with responding to this RFI, including any subsequent requests for 
proposals.
    All responses must be no more than two pages long (12 pt font, 1'' 
margins) and in this form:
    Who you are--Name, credentials, group membership.
    Game-changing dimension--Board, Rules, Stakes?
    Concept--What is the idea and why does it change the game?
    Vision--Make us believe in your idea (What would the world look 
like if this were in place? How would people get it, use it? What makes 
you think this is possible? What needs to happen for this to become 
real? Which parts already exist; which parts need to be invented?).
    Method--What process did you use to formulate and refine your 
concept? What assumptions or dependencies underlie your analysis?
    Dream team--Who are the people you'd need to have on your team to 
make this real? If you just know disciplines that's OK. If you have 
names, explain what those people do. If your idea is selected for 
further consideration, we will do our best to bring these people 
together for a phase two workshop. Responses must be submitted via 
https://www.nitrd.gov/leapyear/ or e-mailed to leapyear@nitrd.gov. 
Responses to this RFI must be received by December 15, 2008 so that 
arrangements can be made for Stage Two activities beginning on or about 
February 1, 2009. Additional Stage One cycles, if any, will be 
announced by separate RFI with all Stage One activities expected to be 
complete by April 15, 2009.
    Appendix A contains a sample submission and review considerations.

[[Page 60726]]

Appendix A

Sample Submission

    Who you are--quieteveningathome.org--We are a 501c3 group with 
50,000 members dedicated to the preservation of the dinner hour as the 
core of American civilization.
    Game-changing dimension--Change the rules.
    Concept--Telemarketers are using our resources and time to market 
their products. They can call and interrupt our dinners and use our own 
telephones to reach us. What if we changed the rules to ``don't call 
us, we'll call you?''
    Vision--The vision is a national do-not-call register. People 
should be able to go to donotcall.gov and register their phone number. 
It would be illegal for telemarketers who have not been given 
permission to call someone. If a telemarketer makes an illegal call, 
the recipient should be able to report them to a government agency and 
they should be fined. The technology to do this is easy, we are not 
sure about the laws and policies. Courts have ruled differently on this 
issue at different times. We think the political climate is friendly 
today for Federal legislation.
    Method--We announced our search for ideas on our website and 
submissions were made there. We also publicized through restaurant and 
catering associations with whom we often partner, who offered 
interruption-free free meals for brainstorming sessions. Participation 
was not limited to members, but could not be anonymous, since it was 
our intention to follow up with submitters. The Board of Directors of 
QEAH enlisted the aid of Prandia University to work with the submitters 
of the best ideas to develop them into even better ideas. The Board 
ensured all the aspects described in the Leap Year RFI were addressed 
in our final submissions.
    Dream team--Federal Trade Commission, Federal Communications 
Commission, constitutional lawyer, Telemarketers' Association, Consumer 
Union, Oracle or other database company.

Review Considerations

    Submissions will be reviewed by the NITRD Senior Steering Group for 
Cybersecurity using the following considerations:
    Would it change the game?
    How clear is the way forward?
    What heights are the hurdles that may be found in the way forward?
    Submitted by the National Science Foundation for the National 
Coordination Office (NCO) for Networking and Information Technology 
Research and Development (NITRD) on October 8, 2008.

Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
 [FR Doc. E8-24257 Filed 10-10-08; 8:45 am]
BILLING CODE 7555-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.