Request for Input No. 2 (RFI-2)-National Cyber Leap Year, 79919-79921 [E8-30979]

Download as PDF Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices (Open). 4 p.m.–5 p.m. Executive Sessions and discussion with the High Energy Physics (Closed). DEPARTMENT OF LABOR Employment and Training Administration [TA–W–64,598] True Textiles, Inc., Also Known As Interface Fabrics, Elkin, NC; Notice of Termination of Investigation Pursuant to Section 221 of the Trade Act of 1974, as amended, an investigation was initiated on December 8, 2008 in response to a worker petition filed by workers of True Textiles, Inc., also known as Interface Fabrics, Elkin, North Carolina. The Department has determined that this petition is a photocopy of petition number TA–W–64,595, instituted on December 8, 2008. The investigation in that case is ongoing and a determination has not yet been issued. Therefore, further investigation in this case would serve no purpose, and the investigation is terminated. Signed at Washington, DC, this 12th day of December 2008. Linda G. Poole, Certifying Officer, Division of Trade Adjustment Assistance. [FR Doc. E8–30920 Filed 12–29–08; 8:45 am] BILLING CODE 4510–FN–P Thursday, January 15 8 a.m.–8:30 a.m. Executive Session (Closed). 8:30 a.m.–10:30 a.m. Video from CERN, tour of lab/facilities (Open). 11:15 a.m.–2:30 p.m. Meetings with Faculty, students, and executive session (Closed). 2:30 p.m.–3 p.m. Close-out session (Open). Reason for Closing: The proposal contains proprietary or confidential material, including technical information on personnel. These matters are exempt under 5 U.S.C. 552b(c)(2)(4) and (6) of the Government in the Sunshine Act. Dated: December 22, 2008. Susanne Bolton, Committee Management Officer. [FR Doc. E8–30879 Filed 12–29–08; 8:45 am] BILLING CODE 7555–01–P NATIONAL SCIENCE FOUNDATION Request for Input No. 2 (RFI–2)— National Cyber Leap Year AGENCY: The National Coordination Office (NCO) for Networking Information Technology Research and Development (NITRD). ACTION: Request for Input 2 (RFI–2). NATIONAL SCIENCE FOUNDATION Physics Proposal for Physics; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L. 92– 463, as amended), the National Science Foundation announces the following meeting. pwalker on PROD1PC71 with NOTICES Name: Syracuse University Site Visit, Proposal Review Panel for Physics (1208). Date and Time: Wednesday, January 14, 2009; 8:30 a.m.–6 p.m.; and Thursday, January 15, 2009, 8:30 a.m.–3 p.m. Place: Syracuse University. Type of Meeting: Partially Closed. Contact Person: Dr. James Reidy, Program Director for Elementary Particle Physics, National Science Foundation, 4201 Wilson Blvd., Arlington, VA 22230. Telephone: (703) 292–7392. Purpose of Meeting: To provide an evaluation concerning the LHCb and CLEO–c proposal submitted to the National Science Foundation for support. Agenda: Wednesday, January 14 8:30 a.m.–9 a.m. Executive Session (Closed). 9 a.m.–11:30 a.m. Overview and presentations (Open). 11:30 a.m.–12 p.m. Executive Session (Closed). 1 a.m.–4 p.m. Presentation by Faculty VerDate Aug<31>2005 23:46 Dec 29, 2008 Jkt 217001 FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or (703) 292–4873. Individuals who use a telecommunications device for the deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1–800–877–8339 between 8 a.m. and 8 p.m., Eastern time, Monday through Friday. DATES: To be considered, submissions must be received by February 20, 2009. SUMMARY: This request is being issued as the second for the National Cyber Leap Year under the Comprehensive National Cybersecurity Initiative (CNCI). The goal of the National Cyber Leap Year is to identify the most promising gamechanging ideas with the potential to reduce vulnerabilities to cyber exploitations by altering the cybersecurity landscape. The first RFI prompted over 160 responses; indicating a strong interest from the technical community to participate. This RFI–2 expands the opportunities for participation by permitting submitters to designate parts of submissions as proprietary. Continued multidisciplinary contributions from organizations with cybersecurity interests are strongly encouraged. Overview: This Request for Information No. 2 (RFI–2) is the second PO 00000 Frm 00131 Fmt 4703 Sfmt 4703 79919 issued under the Comprehensive National Cybersecurity Initiative (CNCI), established within Homeland Security Presidential Directive (HSPD)–23. RFI–2 was developed by the Networking and Information Technology Research and Development (NITRD) Program Senior Steering Group (SSG) for Cybersecurity to invite participation in a National Cyber Leap Year whose goal is an integrated national approach to make cyberspace safe for the American way of life. Over 160 responses were submitted to the first RFI issued by the NITRD SSG (October 14, 2008), indicating a strong desire by the technical community to participate. RFI–2 expands the opportunities for participation by permitting submitters to designate parts of submissions as proprietary. Background: We are a cyber nation. The U.S. information infrastructure— including telecommunications and computer networks and systems and the data that reside on them—is critical to virtually every aspect of modern life. This information infrastructure is increasingly vulnerable to exploitation, disruption, and destruction by a growing array of adversaries. The President’s CNCI plan calls for leapahead research and technology to reduce vulnerabilities to asymmetric attack in cyberspace. Unlike many research agenda that aim for steady progress in the advancement of science, the leap-ahead effort seeks just a few revolutionary ideas with the potential to reshape the landscape. These gamechanging technologies (or non-technical mechanisms that are made possible through technology), developed and deployed over the next decade, will fundamentally change the cyber game into one where the good guys have an advantage. Leap-ahead technologies are so-called because they enable us to leap over the obstacles preventing us from being where we want to be. These advances may require years of concerted research and development to be fully realized; good ideas often do. However, the intent is to start now and gain momentum as intermediate results emerge. Objective: The National Cyber Leap Year has two main goals: (1) Constructing a national research and technology agenda that both identifies the most promising ideas and describes the strategy that brings those ideas to fruition; and (2) jumpstarting gamechanging, multi-disciplinary development efforts. The Leap Year will run during fiscal year 2009, and will comprise two stages: prospecting and focusing. Stage One canvasses the cybersecurity community for ideas. Our aim is to hear E:\FR\FM\30DEN1.SGM 30DEN1 79920 Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices from all those who wish to help. The heart of Stage Two, which begins February 1, 2009, is a series of workshops to explore the best ideas from Stage One. As the year progresses, we will publish four types of findings: (1) Gamechangers—descriptions of the paradigmbusters that technology will make possible; (2) Technical Strategy—as specifically as possible, the invention and/or research that needs to be done; (3) Productization/Implementation— how the capability will be packaged, delivered, and used, and by whom; and (4) Recommendations—prescriptions for success, to include funding, policies, authorities, tasking—whatever would smooth the way to realization of the game-changing capability. Deadline for Submission under this RFI–2: The second round of the Stage One cycle is covered by this RFI–2 and will close February 20, 2009. Subsequent cycles will be announced by separate RFIs. All Stage One cycles are expected to be complete by April 15, 2009. Stage One Description pwalker on PROD1PC71 with NOTICES What we are looking for? Contributors may submit up to 3 leapahead technology concepts. Multidisciplinary contributions from organizations with cybersecurity interests are especially encouraged. Cognizant of the limits of conventional studies and reports, we have given substantial thought to what framework and methodology might render the community’s best ideas understandable, compelling, and actionable to those who need to support them, fund them, and adopt them. Since our search is for game-changing concepts, we ask that submitters explain their ideas in terms of a game. Many ideas will fall into the following three categories. Ideas that: Morph the gameboard (change the defensive terrain [permanently or adaptively] to make it harder for the attacker to maneuver and achieve his goals). Example: Non-persistent virtual machines—every time the enemy takes a hill, the hill goes away. Change the rules (lay the foundation for cyber civilization by changing network protocols and norms to favor our society’s values). Example: The no-call list—direct marketers have to ‘‘attack’’ on customer terms now. Raise the stakes (make the cost to play less advantageous to the attacker by raising risk, lowering value, etc.) Example: Charging for e-mail— making the SPAMmer ante up means a VerDate Aug<31>2005 22:55 Dec 29, 2008 Jkt 217001 lot more fish have to bite for SPAM to pay. Ideas that change the game in some other dimension are also welcome; just be sure to explain how. The rationale for why the idea is game-changing should be the central focus of each submission. Who can participate? This RFI–2 is open to all and we especially encourage public- and private-sector groups (e.g., universities, government laboratories, companies, non-profit groups, user groups) with cybersecurity interests to participate. Collaborative, multidisciplinary efforts are also highly encouraged. Participants in Stage One must be willing to participate in Stage Two should one of their ideas be selected. Excluding proprietary information, participants must also be willing to have their ideas posted for discussion on a public Website and/or included in our final report. How we will use it? The best ideas from Stage One will go on to Stage Two. Non-proprietary elements of Stage One submissions may be posted on our Website for elaboration and improvement, as a key goal of the Leap Year is to engage diverse sectors (e.g., government, academia, commercial, international) in identifying multidimensional strategies and, where it makes sense, in rolling up their sleeves and starting to work. Submissions crafted with that larger community in mind will be the most compelling and influential. Leap Year interim results and emerging guidance will be posted at: https://www.nitrd.gov/leapyear/. Questions and submissions should be addressed to: leapyear@nitrd.gov. In accordance with FAR 15.202(3), responses to this notice are not offers and cannot be accepted by the Government to form a binding contract. Responders are solely responsible for all expenses associated with responding to this RFI–2, including any subsequent requests for proposals. All responses must be no more than two pages long (12 pt font, 1″ margins) and in this form: RFI Name: RFI–2—National Cyber Leap Year Title of Concept. RFI Focus Area (Morph the gameboard, Change the rules, Raise the stakes). Submitter’s Contact Information— Name, Organization, Address, Telephone number, E-mail address. Summary of who you are— credentials, group membership. Concept—What is the idea? Explain why it would change the game. PO 00000 Frm 00132 Fmt 4703 Sfmt 4703 Introducing a good idea alone is not sufficient; you must explain how it changes the game. Vision—Make us believe in your idea (What would the world look like if this were in place? How would people get it, use it? What makes you think this is possible? What needs to happen for this to become real? Which parts already exist; which parts need to be invented?). Method—What process did you use to formulate and refine your concept? What assumptions or dependencies underlie your analysis? Dream team—Who are the people you’d need to have on your team to make this real? If you just know disciplines that’s okay. If you have names, explain what those people do. If your idea is selected for further consideration, we will do our best to bring these people together for a Stage Two workshop. Labeling of Proprietary Information— Clearly label any part of the submission designated as proprietary. The proprietary information will be restricted to government use only. If the submission is selected for Stage Two, we will work with the submitter to determine exactly what information warrants proprietary protection and to establish appropriate controls for managing, protecting, and negotiating as appropriate the relevant intellectual property rights. Responses must be submitted via https://www.nitrd.gov/leapyear/ or emailed to leapyear@nitrd.gov, and must be received by February 20, 2009. Additional Stage One cycles, if any, will be announced by separate RFI with all Stage One activities expected to be complete by April 15, 2009. Appendix A contains a sample submission and review considerations. Appendix A—Sample submission Who you are— quieteveningathome.org—We are a 501c3 group with 50,000 members dedicated to the preservation of the dinner hour as the core of American civilization. Game-changing dimension—Change the rules. Concept—Telemarketers are using our resources and time to market their products. They can call and interrupt our dinners and use our own telephones to reach us. What if we changed the rules to ‘‘don’t call us, we’ll call you?’’ Changing this rule changes the game to one where we decide which marketers to contact and when, returning control of the dinner hour to us. Vision—The vision is a national donot-call register. People should be able to go to donotcall.gov and register their E:\FR\FM\30DEN1.SGM 30DEN1 Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices phone number. It would be illegal for telemarketers who have not been given permission to call someone. If a telemarketer makes an illegal call, the recipient should be able to report them to a government agency and they should be fined. The technology to do this is easy, we are not sure about the laws and policies. Courts have ruled differently on this issue at different times. We think the political climate is friendly today for Federal legislation. Method—We announced our search for ideas on our website and submissions were made there. We also publicized through restaurant and catering associations with whom we often partner, who offered interruptionfree free meals for brainstorming sessions. Participation was not limited to members, but could not be anonymous, since it was our intention to follow up with submitters. The Board of Directors of QEAH enlisted the aid of Prandia University to work with the submitters of the best ideas to develop them into even better ideas. The Board ensured all the aspects described in the Leap Year RFI were addressed in our final submissions. Dream team—Federal Trade Commission, Federal Communications Commission, constitutional lawyer, Telemarketers’ Association, Consumers Union, Oracle or other database company. Review considerations Submissions will be reviewed by the NITRD Senior Steering Group for Cybersecurity using the following considerations: Would it change the game? How clear is the way forward? What heights are the hurdles that may be found in the way forward? Submitted by the National Science Foundation for the National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD) on December 23, 2008. Suzanne H. Plimpton, Management Analyst, National Science Foundation. [FR Doc. E8–30979 Filed 12–29–08; 8:45 am] pwalker on PROD1PC71 with NOTICES BILLING CODE 7555–01–P VerDate Aug<31>2005 22:55 Dec 29, 2008 Jkt 217001 NUCLEAR REGULATORY COMMISSION [DOCKET NO. 50–298] Notice of Acceptance for Docketing of the Application and Notice of Opportunity for Hearing Regarding Renewal of Facility Operating License No. DPR–46 for an Additional 20-Year Period Nebraska Public Power District Cooper Nuclear Station The U.S. Nuclear Regulatory Commission (NRC or the Commission) is considering an application for the renewal of operating license DPR–46, which authorizes Nebraska Public Power District (NPPD), to operate the Cooper Nuclear Station (CNS), at 2419 megawatts thermal. The renewed license would authorize the applicant to operate the Cooper Nuclear Station for an additional 20 years beyond the period specified in the current license. CNS is located near Brownville, NE, and its current operating license expires on January 18, 2014. CNS submitted the application dated September 24, 2008, pursuant to Title 10, Part 54, of the Code of Federal Regulations (10 CFR Part 54), to renew operating license DPR–46 for CNS. A notice of receipt and availability of the license renewal application (LRA) was published in the Federal Register on November 17, 2008 (73 FR 67896). The Commission’s staff has determined that Nebraska Public Power District has submitted sufficient information in accordance with 10 CFR sections 54.19, 54.21, 54.22, 54.23, 51.45, and 51.53(c), to enable the staff to undertake a review of the application, and the application is therefore acceptable for docketing. The current Docket No. 50–298, for operating license DPR–46, will be retained. The determination to accept the license renewal application for docketing does not constitute a determination that a renewed license should be issued, and does not preclude the NRC staff from requesting additional information as the review proceeds. Before issuance of the requested renewed license, the NRC will have made the findings required by the Atomic Energy Act of 1954 (the Act), as amended, and the Commission’s rules and regulations. In accordance with 10 CFR 54.29, the NRC may issue a renewed license if it finds that actions have been identified and have been, or will be, taken with respect to: (1) Managing the effects of aging during the period of extended operation on the functionality of structures and components that have been identified as requiring aging management review; PO 00000 Frm 00133 Fmt 4703 Sfmt 4703 79921 and (2) time-limited aging analyses that have been identified as requiring review, such that there is reasonable assurance that the activities authorized by the renewed license will continue to be conducted in accordance with the current licensing basis (CLB), and that any changes made to the plant’s CLB will comply with the Act and the Commission’s regulations. Additionally, in accordance with 10 CFR 51.95(c), the NRC will prepare an environmental impact statement that is a supplement to the Commission’s NUREG–1437, ‘‘Generic Environmental Impact Statement for License Renewal of Nuclear Power Plants,’’ dated May 1996. In considering the LRA, the Commission must find that the applicable requirements of Subpart A of 10 CFR Part 51 have been satisfied, and that matters raised under 10 CFR 2.335 have been addressed. Pursuant to 10 CFR 51.26, and as part of the environmental scoping process, the staff intends to hold a public scoping meeting. Detailed information regarding the environmental scoping meeting will be the subject of a separate Federal Register notice. Within 60 days of this notice, any person(s) whose interest may be affected may file a request for hearing/petition to intervene. As required by 10 CFR 2.309, a petition for leave to intervene shall set forth with particularity the interest of the petitioner/requestor in the proceeding, and how that interest may be affected by the results of the proceeding. The petition should specifically explain the reasons why intervention should be permitted with particular reference to the following general requirements: (1) The name, address, and telephone number of the requestor or petitioner; (2) the nature of the requestor’s/petitioner’s right under the Act to be made a party to the proceeding; (3) the nature and extent of the requestor’s/petitioner’s property, financial, or other interest in the proceeding; and (4) the possible effect of any decision or order which may be entered in the proceeding on the requestor’s/petitioner’s interest. The petition must also identify the specific contentions which the petitioner/ requestor seeks to have litigated at the proceeding. Each contention must consist of a specific statement of the issue of law or fact to be raised or controverted. In addition, the petitioner/requestor shall provide a brief explanation of the bases for the contention and a concise statement of the alleged facts or expert opinion which support the contention and on which the petitioner intends to rely in proving the contention at the E:\FR\FM\30DEN1.SGM 30DEN1

Agencies

[Federal Register Volume 73, Number 250 (Tuesday, December 30, 2008)]
[Notices]
[Pages 79919-79921]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-30979]


-----------------------------------------------------------------------

NATIONAL SCIENCE FOUNDATION


Request for Input No. 2 (RFI-2)--National Cyber Leap Year

AGENCY: The National Coordination Office (NCO) for Networking 
Information Technology Research and Development (NITRD).

ACTION: Request for Input 2 (RFI-2).

-----------------------------------------------------------------------

FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or 
(703) 292-4873. Individuals who use a telecommunications device for the 
deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1-
800-877-8339 between 8 a.m. and 8 p.m., Eastern time, Monday through 
Friday.

DATES: To be considered, submissions must be received by February 20, 
2009.
SUMMARY: This request is being issued as the second for the National 
Cyber Leap Year under the Comprehensive National Cybersecurity 
Initiative (CNCI). The goal of the National Cyber Leap Year is to 
identify the most promising game-changing ideas with the potential to 
reduce vulnerabilities to cyber exploitations by altering the 
cybersecurity landscape. The first RFI prompted over 160 responses; 
indicating a strong interest from the technical community to 
participate. This RFI-2 expands the opportunities for participation by 
permitting submitters to designate parts of submissions as proprietary. 
Continued multidisciplinary contributions from organizations with 
cybersecurity interests are strongly encouraged.
    Overview: This Request for Information No. 2 (RFI-2) is the second 
issued under the Comprehensive National Cybersecurity Initiative 
(CNCI), established within Homeland Security Presidential Directive 
(HSPD)-23. RFI-2 was developed by the Networking and Information 
Technology Research and Development (NITRD) Program Senior Steering 
Group (SSG) for Cybersecurity to invite participation in a National 
Cyber Leap Year whose goal is an integrated national approach to make 
cyberspace safe for the American way of life. Over 160 responses were 
submitted to the first RFI issued by the NITRD SSG (October 14, 2008), 
indicating a strong desire by the technical community to participate. 
RFI-2 expands the opportunities for participation by permitting 
submitters to designate parts of submissions as proprietary.
    Background: We are a cyber nation. The U.S. information 
infrastructure--including telecommunications and computer networks and 
systems and the data that reside on them--is critical to virtually 
every aspect of modern life. This information infrastructure is 
increasingly vulnerable to exploitation, disruption, and destruction by 
a growing array of adversaries. The President's CNCI plan calls for 
leap-ahead research and technology to reduce vulnerabilities to 
asymmetric attack in cyberspace. Unlike many research agenda that aim 
for steady progress in the advancement of science, the leap-ahead 
effort seeks just a few revolutionary ideas with the potential to 
reshape the landscape. These game-changing technologies (or non-
technical mechanisms that are made possible through technology), 
developed and deployed over the next decade, will fundamentally change 
the cyber game into one where the good guys have an advantage. Leap-
ahead technologies are so-called because they enable us to leap over 
the obstacles preventing us from being where we want to be. These 
advances may require years of concerted research and development to be 
fully realized; good ideas often do. However, the intent is to start 
now and gain momentum as intermediate results emerge.
    Objective: The National Cyber Leap Year has two main goals: (1) 
Constructing a national research and technology agenda that both 
identifies the most promising ideas and describes the strategy that 
brings those ideas to fruition; and (2) jumpstarting game-changing, 
multi-disciplinary development efforts. The Leap Year will run during 
fiscal year 2009, and will comprise two stages: prospecting and 
focusing.
    Stage One canvasses the cybersecurity community for ideas. Our aim 
is to hear

[[Page 79920]]

from all those who wish to help. The heart of Stage Two, which begins 
February 1, 2009, is a series of workshops to explore the best ideas 
from Stage One.
    As the year progresses, we will publish four types of findings: (1) 
Game-changers--descriptions of the paradigm-busters that technology 
will make possible; (2) Technical Strategy--as specifically as 
possible, the invention and/or research that needs to be done; (3) 
Productization/Implementation--how the capability will be packaged, 
delivered, and used, and by whom; and (4) Recommendations--
prescriptions for success, to include funding, policies, authorities, 
tasking--whatever would smooth the way to realization of the game-
changing capability.
    Deadline for Submission under this RFI-2: The second round of the 
Stage One cycle is covered by this RFI-2 and will close February 20, 
2009. Subsequent cycles will be announced by separate RFIs. All Stage 
One cycles are expected to be complete by April 15, 2009.

Stage One Description

What we are looking for?

    Contributors may submit up to 3 leap-ahead technology concepts. 
Multidisciplinary contributions from organizations with cybersecurity 
interests are especially encouraged. Cognizant of the limits of 
conventional studies and reports, we have given substantial thought to 
what framework and methodology might render the community's best ideas 
understandable, compelling, and actionable to those who need to support 
them, fund them, and adopt them. Since our search is for game-changing 
concepts, we ask that submitters explain their ideas in terms of a 
game. Many ideas will fall into the following three categories. Ideas 
that:
    Morph the gameboard (change the defensive terrain [permanently or 
adaptively] to make it harder for the attacker to maneuver and achieve 
his goals).
    Example: Non-persistent virtual machines--every time the enemy 
takes a hill, the hill goes away.
    Change the rules (lay the foundation for cyber civilization by 
changing network protocols and norms to favor our society's values).
    Example: The no-call list--direct marketers have to ``attack'' on 
customer terms now.
    Raise the stakes (make the cost to play less advantageous to the 
attacker by raising risk, lowering value, etc.)
    Example: Charging for e-mail--making the SPAMmer ante up means a 
lot more fish have to bite for SPAM to pay.
    Ideas that change the game in some other dimension are also 
welcome; just be sure to explain how. The rationale for why the idea is 
game-changing should be the central focus of each submission.

Who can participate?

    This RFI-2 is open to all and we especially encourage public- and 
private-sector groups (e.g., universities, government laboratories, 
companies, non-profit groups, user groups) with cybersecurity interests 
to participate. Collaborative, multidisciplinary efforts are also 
highly encouraged. Participants in Stage One must be willing to 
participate in Stage Two should one of their ideas be selected. 
Excluding proprietary information, participants must also be willing to 
have their ideas posted for discussion on a public Website and/or 
included in our final report.

How we will use it?

    The best ideas from Stage One will go on to Stage Two. Non-
proprietary elements of Stage One submissions may be posted on our 
Website for elaboration and improvement, as a key goal of the Leap Year 
is to engage diverse sectors (e.g., government, academia, commercial, 
international) in identifying multidimensional strategies and, where it 
makes sense, in rolling up their sleeves and starting to work. 
Submissions crafted with that larger community in mind will be the most 
compelling and influential.
    Leap Year interim results and emerging guidance will be posted at: 
https://www.nitrd.gov/leapyear/.
    Questions and submissions should be addressed to: 
leapyear@nitrd.gov.
    In accordance with FAR 15.202(3), responses to this notice are not 
offers and cannot be accepted by the Government to form a binding 
contract. Responders are solely responsible for all expenses associated 
with responding to this RFI-2, including any subsequent requests for 
proposals.
    All responses must be no more than two pages long (12 pt font, 
1 margins) and in this form:
    RFI Name: RFI-2--National Cyber Leap Year
    Title of Concept.
    RFI Focus Area (Morph the gameboard, Change the rules, Raise the 
stakes).
    Submitter's Contact Information--Name, Organization, Address, 
Telephone number, E-mail address.
    Summary of who you are--credentials, group membership.
    Concept--What is the idea? Explain why it would change the game. 
Introducing a good idea alone is not sufficient; you must explain how 
it changes the game.
    Vision--Make us believe in your idea (What would the world look 
like if this were in place? How would people get it, use it? What makes 
you think this is possible? What needs to happen for this to become 
real? Which parts already exist; which parts need to be invented?).
    Method--What process did you use to formulate and refine your 
concept? What assumptions or dependencies underlie your analysis?
    Dream team--Who are the people you'd need to have on your team to 
make this real? If you just know disciplines that's okay. If you have 
names, explain what those people do. If your idea is selected for 
further consideration, we will do our best to bring these people 
together for a Stage Two workshop.
    Labeling of Proprietary Information--Clearly label any part of the 
submission designated as proprietary. The proprietary information will 
be restricted to government use only. If the submission is selected for 
Stage Two, we will work with the submitter to determine exactly what 
information warrants proprietary protection and to establish 
appropriate controls for managing, protecting, and negotiating as 
appropriate the relevant intellectual property rights.
    Responses must be submitted via https://www.nitrd.gov/leapyear/ or 
e-mailed to leapyear@nitrd.gov, and must be received by February 20, 
2009. Additional Stage One cycles, if any, will be announced by 
separate RFI with all Stage One activities expected to be complete by 
April 15, 2009.
    Appendix A contains a sample submission and review considerations.

Appendix A_Sample submission

    Who you are_quieteveningathome.org--We are a 501c3 group with 
50,000 members dedicated to the preservation of the dinner hour as the 
core of American civilization.
    Game-changing dimension--Change the rules.
    Concept--Telemarketers are using our resources and time to market 
their products. They can call and interrupt our dinners and use our own 
telephones to reach us. What if we changed the rules to ``don't call 
us, we'll call you?'' Changing this rule changes the game to one where 
we decide which marketers to contact and when, returning control of the 
dinner hour to us.
    Vision--The vision is a national do-not-call register. People 
should be able to go to donotcall.gov and register their

[[Page 79921]]

phone number. It would be illegal for telemarketers who have not been 
given permission to call someone. If a telemarketer makes an illegal 
call, the recipient should be able to report them to a government 
agency and they should be fined. The technology to do this is easy, we 
are not sure about the laws and policies. Courts have ruled differently 
on this issue at different times. We think the political climate is 
friendly today for Federal legislation.
    Method--We announced our search for ideas on our website and 
submissions were made there. We also publicized through restaurant and 
catering associations with whom we often partner, who offered 
interruption-free free meals for brainstorming sessions. Participation 
was not limited to members, but could not be anonymous, since it was 
our intention to follow up with submitters. The Board of Directors of 
QEAH enlisted the aid of Prandia University to work with the submitters 
of the best ideas to develop them into even better ideas. The Board 
ensured all the aspects described in the Leap Year RFI were addressed 
in our final submissions.
    Dream team--Federal Trade Commission, Federal Communications 
Commission, constitutional lawyer, Telemarketers' Association, 
Consumers Union, Oracle or other database company.

Review considerations

    Submissions will be reviewed by the NITRD Senior Steering Group for 
Cybersecurity using the following considerations:
    Would it change the game?
    How clear is the way forward?
    What heights are the hurdles that may be found in the way forward?


    Submitted by the National Science Foundation for the National 
Coordination Office (NCO) for Networking and Information Technology 
Research and Development (NITRD) on December 23, 2008.
Suzanne H. Plimpton,
Management Analyst, National Science Foundation.
[FR Doc. E8-30979 Filed 12-29-08; 8:45 am]
BILLING CODE 7555-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.