Request for Input No. 2 (RFI-2)-National Cyber Leap Year, 79919-79921 [E8-30979]
Download as PDF
Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices
(Open).
4 p.m.–5 p.m. Executive Sessions and
discussion with the High Energy Physics
(Closed).
DEPARTMENT OF LABOR
Employment and Training
Administration
[TA–W–64,598]
True Textiles, Inc., Also Known As
Interface Fabrics, Elkin, NC; Notice of
Termination of Investigation
Pursuant to Section 221 of the Trade
Act of 1974, as amended, an
investigation was initiated on December
8, 2008 in response to a worker petition
filed by workers of True Textiles, Inc.,
also known as Interface Fabrics, Elkin,
North Carolina.
The Department has determined that
this petition is a photocopy of petition
number TA–W–64,595, instituted on
December 8, 2008. The investigation in
that case is ongoing and a determination
has not yet been issued. Therefore,
further investigation in this case would
serve no purpose, and the investigation
is terminated.
Signed at Washington, DC, this 12th day of
December 2008.
Linda G. Poole,
Certifying Officer, Division of Trade
Adjustment Assistance.
[FR Doc. E8–30920 Filed 12–29–08; 8:45 am]
BILLING CODE 4510–FN–P
Thursday, January 15
8 a.m.–8:30 a.m. Executive Session
(Closed).
8:30 a.m.–10:30 a.m. Video from CERN,
tour of lab/facilities (Open).
11:15 a.m.–2:30 p.m. Meetings with
Faculty, students, and executive session
(Closed).
2:30 p.m.–3 p.m. Close-out session (Open).
Reason for Closing: The proposal contains
proprietary or confidential material,
including technical information on
personnel. These matters are exempt under 5
U.S.C. 552b(c)(2)(4) and (6) of the
Government in the Sunshine Act.
Dated: December 22, 2008.
Susanne Bolton,
Committee Management Officer.
[FR Doc. E8–30879 Filed 12–29–08; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Request for Input No. 2 (RFI–2)—
National Cyber Leap Year
AGENCY: The National Coordination
Office (NCO) for Networking
Information Technology Research and
Development (NITRD).
ACTION: Request for Input 2 (RFI–2).
NATIONAL SCIENCE FOUNDATION
Physics Proposal for Physics; Notice
of Meeting
In accordance with the Federal
Advisory Committee Act (Pub. L. 92–
463, as amended), the National Science
Foundation announces the following
meeting.
pwalker on PROD1PC71 with NOTICES
Name: Syracuse University Site Visit,
Proposal Review Panel for Physics (1208).
Date and Time: Wednesday, January 14,
2009; 8:30 a.m.–6 p.m.; and Thursday,
January 15, 2009, 8:30 a.m.–3 p.m.
Place: Syracuse University.
Type of Meeting: Partially Closed.
Contact Person: Dr. James Reidy, Program
Director for Elementary Particle Physics,
National Science Foundation, 4201 Wilson
Blvd., Arlington, VA 22230. Telephone: (703)
292–7392.
Purpose of Meeting: To provide an
evaluation concerning the LHCb and
CLEO–c proposal submitted to the National
Science Foundation for support.
Agenda:
Wednesday, January 14
8:30 a.m.–9 a.m. Executive Session
(Closed).
9 a.m.–11:30 a.m. Overview and
presentations (Open).
11:30 a.m.–12 p.m. Executive Session
(Closed).
1 a.m.–4 p.m. Presentation by Faculty
VerDate Aug<31>2005
23:46 Dec 29, 2008
Jkt 217001
FOR FURTHER INFORMATION, CONTACT:
Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292–4873. Individuals who use a
telecommunications device for the deaf
(TDD) may call the Federal Information
Relay Service (FIRS) at 1–800–877–8339
between 8 a.m. and 8 p.m., Eastern time,
Monday through Friday.
DATES: To be considered, submissions
must be received by February 20, 2009.
SUMMARY: This request is being issued as
the second for the National Cyber Leap
Year under the Comprehensive National
Cybersecurity Initiative (CNCI). The goal
of the National Cyber Leap Year is to
identify the most promising gamechanging ideas with the potential to
reduce vulnerabilities to cyber
exploitations by altering the
cybersecurity landscape. The first RFI
prompted over 160 responses;
indicating a strong interest from the
technical community to participate.
This RFI–2 expands the opportunities
for participation by permitting
submitters to designate parts of
submissions as proprietary. Continued
multidisciplinary contributions from
organizations with cybersecurity
interests are strongly encouraged.
Overview: This Request for
Information No. 2 (RFI–2) is the second
PO 00000
Frm 00131
Fmt 4703
Sfmt 4703
79919
issued under the Comprehensive
National Cybersecurity Initiative (CNCI),
established within Homeland Security
Presidential Directive (HSPD)–23. RFI–2
was developed by the Networking and
Information Technology Research and
Development (NITRD) Program Senior
Steering Group (SSG) for Cybersecurity
to invite participation in a National
Cyber Leap Year whose goal is an
integrated national approach to make
cyberspace safe for the American way of
life. Over 160 responses were submitted
to the first RFI issued by the NITRD SSG
(October 14, 2008), indicating a strong
desire by the technical community to
participate. RFI–2 expands the
opportunities for participation by
permitting submitters to designate parts
of submissions as proprietary.
Background: We are a cyber nation.
The U.S. information infrastructure—
including telecommunications and
computer networks and systems and the
data that reside on them—is critical to
virtually every aspect of modern life.
This information infrastructure is
increasingly vulnerable to exploitation,
disruption, and destruction by a
growing array of adversaries. The
President’s CNCI plan calls for leapahead research and technology to
reduce vulnerabilities to asymmetric
attack in cyberspace. Unlike many
research agenda that aim for steady
progress in the advancement of science,
the leap-ahead effort seeks just a few
revolutionary ideas with the potential to
reshape the landscape. These gamechanging technologies (or non-technical
mechanisms that are made possible
through technology), developed and
deployed over the next decade, will
fundamentally change the cyber game
into one where the good guys have an
advantage. Leap-ahead technologies are
so-called because they enable us to leap
over the obstacles preventing us from
being where we want to be. These
advances may require years of concerted
research and development to be fully
realized; good ideas often do. However,
the intent is to start now and gain
momentum as intermediate results
emerge.
Objective: The National Cyber Leap
Year has two main goals: (1)
Constructing a national research and
technology agenda that both identifies
the most promising ideas and describes
the strategy that brings those ideas to
fruition; and (2) jumpstarting gamechanging, multi-disciplinary
development efforts. The Leap Year will
run during fiscal year 2009, and will
comprise two stages: prospecting and
focusing.
Stage One canvasses the cybersecurity
community for ideas. Our aim is to hear
E:\FR\FM\30DEN1.SGM
30DEN1
79920
Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices
from all those who wish to help. The
heart of Stage Two, which begins
February 1, 2009, is a series of
workshops to explore the best ideas
from Stage One.
As the year progresses, we will
publish four types of findings: (1) Gamechangers—descriptions of the paradigmbusters that technology will make
possible; (2) Technical Strategy—as
specifically as possible, the invention
and/or research that needs to be done;
(3) Productization/Implementation—
how the capability will be packaged,
delivered, and used, and by whom; and
(4) Recommendations—prescriptions for
success, to include funding, policies,
authorities, tasking—whatever would
smooth the way to realization of the
game-changing capability.
Deadline for Submission under this
RFI–2: The second round of the Stage
One cycle is covered by this RFI–2 and
will close February 20, 2009.
Subsequent cycles will be announced by
separate RFIs. All Stage One cycles are
expected to be complete by April 15,
2009.
Stage One Description
pwalker on PROD1PC71 with NOTICES
What we are looking for?
Contributors may submit up to 3 leapahead technology concepts.
Multidisciplinary contributions from
organizations with cybersecurity
interests are especially encouraged.
Cognizant of the limits of conventional
studies and reports, we have given
substantial thought to what framework
and methodology might render the
community’s best ideas understandable,
compelling, and actionable to those who
need to support them, fund them, and
adopt them. Since our search is for
game-changing concepts, we ask that
submitters explain their ideas in terms
of a game. Many ideas will fall into the
following three categories. Ideas that:
Morph the gameboard (change the
defensive terrain [permanently or
adaptively] to make it harder for the
attacker to maneuver and achieve his
goals).
Example: Non-persistent virtual
machines—every time the enemy takes
a hill, the hill goes away.
Change the rules (lay the foundation
for cyber civilization by changing
network protocols and norms to favor
our society’s values).
Example: The no-call list—direct
marketers have to ‘‘attack’’ on customer
terms now.
Raise the stakes (make the cost to play
less advantageous to the attacker by
raising risk, lowering value, etc.)
Example: Charging for e-mail—
making the SPAMmer ante up means a
VerDate Aug<31>2005
22:55 Dec 29, 2008
Jkt 217001
lot more fish have to bite for SPAM to
pay.
Ideas that change the game in some
other dimension are also welcome; just
be sure to explain how. The rationale for
why the idea is game-changing should
be the central focus of each submission.
Who can participate?
This RFI–2 is open to all and we
especially encourage public- and
private-sector groups (e.g., universities,
government laboratories, companies,
non-profit groups, user groups) with
cybersecurity interests to participate.
Collaborative, multidisciplinary efforts
are also highly encouraged. Participants
in Stage One must be willing to
participate in Stage Two should one of
their ideas be selected. Excluding
proprietary information, participants
must also be willing to have their ideas
posted for discussion on a public
Website and/or included in our final
report.
How we will use it?
The best ideas from Stage One will go
on to Stage Two. Non-proprietary
elements of Stage One submissions may
be posted on our Website for elaboration
and improvement, as a key goal of the
Leap Year is to engage diverse sectors
(e.g., government, academia,
commercial, international) in
identifying multidimensional strategies
and, where it makes sense, in rolling up
their sleeves and starting to work.
Submissions crafted with that larger
community in mind will be the most
compelling and influential.
Leap Year interim results and
emerging guidance will be posted at:
https://www.nitrd.gov/leapyear/.
Questions and submissions should be
addressed to: leapyear@nitrd.gov.
In accordance with FAR 15.202(3),
responses to this notice are not offers
and cannot be accepted by the
Government to form a binding contract.
Responders are solely responsible for all
expenses associated with responding to
this RFI–2, including any subsequent
requests for proposals.
All responses must be no more than
two pages long (12 pt font, 1″ margins)
and in this form:
RFI Name: RFI–2—National Cyber
Leap Year
Title of Concept.
RFI Focus Area (Morph the
gameboard, Change the rules, Raise the
stakes).
Submitter’s Contact Information—
Name, Organization, Address,
Telephone number, E-mail address.
Summary of who you are—
credentials, group membership.
Concept—What is the idea? Explain
why it would change the game.
PO 00000
Frm 00132
Fmt 4703
Sfmt 4703
Introducing a good idea alone is not
sufficient; you must explain how it
changes the game.
Vision—Make us believe in your idea
(What would the world look like if this
were in place? How would people get it,
use it? What makes you think this is
possible? What needs to happen for this
to become real? Which parts already
exist; which parts need to be invented?).
Method—What process did you use to
formulate and refine your concept?
What assumptions or dependencies
underlie your analysis?
Dream team—Who are the people
you’d need to have on your team to
make this real? If you just know
disciplines that’s okay. If you have
names, explain what those people do. If
your idea is selected for further
consideration, we will do our best to
bring these people together for a Stage
Two workshop.
Labeling of Proprietary Information—
Clearly label any part of the submission
designated as proprietary. The
proprietary information will be
restricted to government use only. If the
submission is selected for Stage Two,
we will work with the submitter to
determine exactly what information
warrants proprietary protection and to
establish appropriate controls for
managing, protecting, and negotiating as
appropriate the relevant intellectual
property rights.
Responses must be submitted via
https://www.nitrd.gov/leapyear/ or emailed to leapyear@nitrd.gov, and must
be received by February 20, 2009.
Additional Stage One cycles, if any, will
be announced by separate RFI with all
Stage One activities expected to be
complete by April 15, 2009.
Appendix A contains a sample
submission and review considerations.
Appendix A—Sample submission
Who you are—
quieteveningathome.org—We are a
501c3 group with 50,000 members
dedicated to the preservation of the
dinner hour as the core of American
civilization.
Game-changing dimension—Change
the rules.
Concept—Telemarketers are using our
resources and time to market their
products. They can call and interrupt
our dinners and use our own telephones
to reach us. What if we changed the
rules to ‘‘don’t call us, we’ll call you?’’
Changing this rule changes the game to
one where we decide which marketers
to contact and when, returning control
of the dinner hour to us.
Vision—The vision is a national donot-call register. People should be able
to go to donotcall.gov and register their
E:\FR\FM\30DEN1.SGM
30DEN1
Federal Register / Vol. 73, No. 250 / Tuesday, December 30, 2008 / Notices
phone number. It would be illegal for
telemarketers who have not been given
permission to call someone. If a
telemarketer makes an illegal call, the
recipient should be able to report them
to a government agency and they should
be fined. The technology to do this is
easy, we are not sure about the laws and
policies. Courts have ruled differently
on this issue at different times. We think
the political climate is friendly today for
Federal legislation.
Method—We announced our search
for ideas on our website and
submissions were made there. We also
publicized through restaurant and
catering associations with whom we
often partner, who offered interruptionfree free meals for brainstorming
sessions. Participation was not limited
to members, but could not be
anonymous, since it was our intention
to follow up with submitters. The Board
of Directors of QEAH enlisted the aid of
Prandia University to work with the
submitters of the best ideas to develop
them into even better ideas. The Board
ensured all the aspects described in the
Leap Year RFI were addressed in our
final submissions.
Dream team—Federal Trade
Commission, Federal Communications
Commission, constitutional lawyer,
Telemarketers’ Association, Consumers
Union, Oracle or other database
company.
Review considerations
Submissions will be reviewed by the
NITRD Senior Steering Group for
Cybersecurity using the following
considerations:
Would it change the game?
How clear is the way forward?
What heights are the hurdles that may
be found in the way forward?
Submitted by the National Science
Foundation for the National Coordination
Office (NCO) for Networking and Information
Technology Research and Development
(NITRD) on December 23, 2008.
Suzanne H. Plimpton,
Management Analyst, National Science
Foundation.
[FR Doc. E8–30979 Filed 12–29–08; 8:45 am]
pwalker on PROD1PC71 with NOTICES
BILLING CODE 7555–01–P
VerDate Aug<31>2005
22:55 Dec 29, 2008
Jkt 217001
NUCLEAR REGULATORY
COMMISSION
[DOCKET NO. 50–298]
Notice of Acceptance for Docketing of
the Application and Notice of
Opportunity for Hearing Regarding
Renewal of Facility Operating License
No. DPR–46 for an Additional 20-Year
Period Nebraska Public Power District
Cooper Nuclear Station
The U.S. Nuclear Regulatory
Commission (NRC or the Commission)
is considering an application for the
renewal of operating license DPR–46,
which authorizes Nebraska Public
Power District (NPPD), to operate the
Cooper Nuclear Station (CNS), at 2419
megawatts thermal. The renewed
license would authorize the applicant to
operate the Cooper Nuclear Station for
an additional 20 years beyond the
period specified in the current license.
CNS is located near Brownville, NE, and
its current operating license expires on
January 18, 2014.
CNS submitted the application dated
September 24, 2008, pursuant to Title
10, Part 54, of the Code of Federal
Regulations (10 CFR Part 54), to renew
operating license DPR–46 for CNS. A
notice of receipt and availability of the
license renewal application (LRA) was
published in the Federal Register on
November 17, 2008 (73 FR 67896).
The Commission’s staff has
determined that Nebraska Public Power
District has submitted sufficient
information in accordance with 10 CFR
sections 54.19, 54.21, 54.22, 54.23,
51.45, and 51.53(c), to enable the staff
to undertake a review of the application,
and the application is therefore
acceptable for docketing. The current
Docket No. 50–298, for operating license
DPR–46, will be retained. The
determination to accept the license
renewal application for docketing does
not constitute a determination that a
renewed license should be issued, and
does not preclude the NRC staff from
requesting additional information as the
review proceeds.
Before issuance of the requested
renewed license, the NRC will have
made the findings required by the
Atomic Energy Act of 1954 (the Act), as
amended, and the Commission’s rules
and regulations. In accordance with 10
CFR 54.29, the NRC may issue a
renewed license if it finds that actions
have been identified and have been, or
will be, taken with respect to: (1)
Managing the effects of aging during the
period of extended operation on the
functionality of structures and
components that have been identified as
requiring aging management review;
PO 00000
Frm 00133
Fmt 4703
Sfmt 4703
79921
and (2) time-limited aging analyses that
have been identified as requiring
review, such that there is reasonable
assurance that the activities authorized
by the renewed license will continue to
be conducted in accordance with the
current licensing basis (CLB), and that
any changes made to the plant’s CLB
will comply with the Act and the
Commission’s regulations.
Additionally, in accordance with 10
CFR 51.95(c), the NRC will prepare an
environmental impact statement that is
a supplement to the Commission’s
NUREG–1437, ‘‘Generic Environmental
Impact Statement for License Renewal
of Nuclear Power Plants,’’ dated May
1996. In considering the LRA, the
Commission must find that the
applicable requirements of Subpart A of
10 CFR Part 51 have been satisfied, and
that matters raised under 10 CFR 2.335
have been addressed. Pursuant to 10
CFR 51.26, and as part of the
environmental scoping process, the staff
intends to hold a public scoping
meeting. Detailed information regarding
the environmental scoping meeting will
be the subject of a separate Federal
Register notice.
Within 60 days of this notice, any
person(s) whose interest may be affected
may file a request for hearing/petition to
intervene. As required by 10 CFR 2.309,
a petition for leave to intervene shall set
forth with particularity the interest of
the petitioner/requestor in the
proceeding, and how that interest may
be affected by the results of the
proceeding. The petition should
specifically explain the reasons why
intervention should be permitted with
particular reference to the following
general requirements: (1) The name,
address, and telephone number of the
requestor or petitioner; (2) the nature of
the requestor’s/petitioner’s right under
the Act to be made a party to the
proceeding; (3) the nature and extent of
the requestor’s/petitioner’s property,
financial, or other interest in the
proceeding; and (4) the possible effect of
any decision or order which may be
entered in the proceeding on the
requestor’s/petitioner’s interest. The
petition must also identify the specific
contentions which the petitioner/
requestor seeks to have litigated at the
proceeding.
Each contention must consist of a
specific statement of the issue of law or
fact to be raised or controverted. In
addition, the petitioner/requestor shall
provide a brief explanation of the bases
for the contention and a concise
statement of the alleged facts or expert
opinion which support the contention
and on which the petitioner intends to
rely in proving the contention at the
E:\FR\FM\30DEN1.SGM
30DEN1
Agencies
[Federal Register Volume 73, Number 250 (Tuesday, December 30, 2008)]
[Notices]
[Pages 79919-79921]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-30979]
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Request for Input No. 2 (RFI-2)--National Cyber Leap Year
AGENCY: The National Coordination Office (NCO) for Networking
Information Technology Research and Development (NITRD).
ACTION: Request for Input 2 (RFI-2).
-----------------------------------------------------------------------
FOR FURTHER INFORMATION, CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292-4873. Individuals who use a telecommunications device for the
deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1-
800-877-8339 between 8 a.m. and 8 p.m., Eastern time, Monday through
Friday.
DATES: To be considered, submissions must be received by February 20,
2009.
SUMMARY: This request is being issued as the second for the National
Cyber Leap Year under the Comprehensive National Cybersecurity
Initiative (CNCI). The goal of the National Cyber Leap Year is to
identify the most promising game-changing ideas with the potential to
reduce vulnerabilities to cyber exploitations by altering the
cybersecurity landscape. The first RFI prompted over 160 responses;
indicating a strong interest from the technical community to
participate. This RFI-2 expands the opportunities for participation by
permitting submitters to designate parts of submissions as proprietary.
Continued multidisciplinary contributions from organizations with
cybersecurity interests are strongly encouraged.
Overview: This Request for Information No. 2 (RFI-2) is the second
issued under the Comprehensive National Cybersecurity Initiative
(CNCI), established within Homeland Security Presidential Directive
(HSPD)-23. RFI-2 was developed by the Networking and Information
Technology Research and Development (NITRD) Program Senior Steering
Group (SSG) for Cybersecurity to invite participation in a National
Cyber Leap Year whose goal is an integrated national approach to make
cyberspace safe for the American way of life. Over 160 responses were
submitted to the first RFI issued by the NITRD SSG (October 14, 2008),
indicating a strong desire by the technical community to participate.
RFI-2 expands the opportunities for participation by permitting
submitters to designate parts of submissions as proprietary.
Background: We are a cyber nation. The U.S. information
infrastructure--including telecommunications and computer networks and
systems and the data that reside on them--is critical to virtually
every aspect of modern life. This information infrastructure is
increasingly vulnerable to exploitation, disruption, and destruction by
a growing array of adversaries. The President's CNCI plan calls for
leap-ahead research and technology to reduce vulnerabilities to
asymmetric attack in cyberspace. Unlike many research agenda that aim
for steady progress in the advancement of science, the leap-ahead
effort seeks just a few revolutionary ideas with the potential to
reshape the landscape. These game-changing technologies (or non-
technical mechanisms that are made possible through technology),
developed and deployed over the next decade, will fundamentally change
the cyber game into one where the good guys have an advantage. Leap-
ahead technologies are so-called because they enable us to leap over
the obstacles preventing us from being where we want to be. These
advances may require years of concerted research and development to be
fully realized; good ideas often do. However, the intent is to start
now and gain momentum as intermediate results emerge.
Objective: The National Cyber Leap Year has two main goals: (1)
Constructing a national research and technology agenda that both
identifies the most promising ideas and describes the strategy that
brings those ideas to fruition; and (2) jumpstarting game-changing,
multi-disciplinary development efforts. The Leap Year will run during
fiscal year 2009, and will comprise two stages: prospecting and
focusing.
Stage One canvasses the cybersecurity community for ideas. Our aim
is to hear
[[Page 79920]]
from all those who wish to help. The heart of Stage Two, which begins
February 1, 2009, is a series of workshops to explore the best ideas
from Stage One.
As the year progresses, we will publish four types of findings: (1)
Game-changers--descriptions of the paradigm-busters that technology
will make possible; (2) Technical Strategy--as specifically as
possible, the invention and/or research that needs to be done; (3)
Productization/Implementation--how the capability will be packaged,
delivered, and used, and by whom; and (4) Recommendations--
prescriptions for success, to include funding, policies, authorities,
tasking--whatever would smooth the way to realization of the game-
changing capability.
Deadline for Submission under this RFI-2: The second round of the
Stage One cycle is covered by this RFI-2 and will close February 20,
2009. Subsequent cycles will be announced by separate RFIs. All Stage
One cycles are expected to be complete by April 15, 2009.
Stage One Description
What we are looking for?
Contributors may submit up to 3 leap-ahead technology concepts.
Multidisciplinary contributions from organizations with cybersecurity
interests are especially encouraged. Cognizant of the limits of
conventional studies and reports, we have given substantial thought to
what framework and methodology might render the community's best ideas
understandable, compelling, and actionable to those who need to support
them, fund them, and adopt them. Since our search is for game-changing
concepts, we ask that submitters explain their ideas in terms of a
game. Many ideas will fall into the following three categories. Ideas
that:
Morph the gameboard (change the defensive terrain [permanently or
adaptively] to make it harder for the attacker to maneuver and achieve
his goals).
Example: Non-persistent virtual machines--every time the enemy
takes a hill, the hill goes away.
Change the rules (lay the foundation for cyber civilization by
changing network protocols and norms to favor our society's values).
Example: The no-call list--direct marketers have to ``attack'' on
customer terms now.
Raise the stakes (make the cost to play less advantageous to the
attacker by raising risk, lowering value, etc.)
Example: Charging for e-mail--making the SPAMmer ante up means a
lot more fish have to bite for SPAM to pay.
Ideas that change the game in some other dimension are also
welcome; just be sure to explain how. The rationale for why the idea is
game-changing should be the central focus of each submission.
Who can participate?
This RFI-2 is open to all and we especially encourage public- and
private-sector groups (e.g., universities, government laboratories,
companies, non-profit groups, user groups) with cybersecurity interests
to participate. Collaborative, multidisciplinary efforts are also
highly encouraged. Participants in Stage One must be willing to
participate in Stage Two should one of their ideas be selected.
Excluding proprietary information, participants must also be willing to
have their ideas posted for discussion on a public Website and/or
included in our final report.
How we will use it?
The best ideas from Stage One will go on to Stage Two. Non-
proprietary elements of Stage One submissions may be posted on our
Website for elaboration and improvement, as a key goal of the Leap Year
is to engage diverse sectors (e.g., government, academia, commercial,
international) in identifying multidimensional strategies and, where it
makes sense, in rolling up their sleeves and starting to work.
Submissions crafted with that larger community in mind will be the most
compelling and influential.
Leap Year interim results and emerging guidance will be posted at:
https://www.nitrd.gov/leapyear/.
Questions and submissions should be addressed to:
leapyear@nitrd.gov.
In accordance with FAR 15.202(3), responses to this notice are not
offers and cannot be accepted by the Government to form a binding
contract. Responders are solely responsible for all expenses associated
with responding to this RFI-2, including any subsequent requests for
proposals.
All responses must be no more than two pages long (12 pt font,
1 margins) and in this form:
RFI Name: RFI-2--National Cyber Leap Year
Title of Concept.
RFI Focus Area (Morph the gameboard, Change the rules, Raise the
stakes).
Submitter's Contact Information--Name, Organization, Address,
Telephone number, E-mail address.
Summary of who you are--credentials, group membership.
Concept--What is the idea? Explain why it would change the game.
Introducing a good idea alone is not sufficient; you must explain how
it changes the game.
Vision--Make us believe in your idea (What would the world look
like if this were in place? How would people get it, use it? What makes
you think this is possible? What needs to happen for this to become
real? Which parts already exist; which parts need to be invented?).
Method--What process did you use to formulate and refine your
concept? What assumptions or dependencies underlie your analysis?
Dream team--Who are the people you'd need to have on your team to
make this real? If you just know disciplines that's okay. If you have
names, explain what those people do. If your idea is selected for
further consideration, we will do our best to bring these people
together for a Stage Two workshop.
Labeling of Proprietary Information--Clearly label any part of the
submission designated as proprietary. The proprietary information will
be restricted to government use only. If the submission is selected for
Stage Two, we will work with the submitter to determine exactly what
information warrants proprietary protection and to establish
appropriate controls for managing, protecting, and negotiating as
appropriate the relevant intellectual property rights.
Responses must be submitted via https://www.nitrd.gov/leapyear/ or
e-mailed to leapyear@nitrd.gov, and must be received by February 20,
2009. Additional Stage One cycles, if any, will be announced by
separate RFI with all Stage One activities expected to be complete by
April 15, 2009.
Appendix A contains a sample submission and review considerations.
Appendix A_Sample submission
Who you are_quieteveningathome.org--We are a 501c3 group with
50,000 members dedicated to the preservation of the dinner hour as the
core of American civilization.
Game-changing dimension--Change the rules.
Concept--Telemarketers are using our resources and time to market
their products. They can call and interrupt our dinners and use our own
telephones to reach us. What if we changed the rules to ``don't call
us, we'll call you?'' Changing this rule changes the game to one where
we decide which marketers to contact and when, returning control of the
dinner hour to us.
Vision--The vision is a national do-not-call register. People
should be able to go to donotcall.gov and register their
[[Page 79921]]
phone number. It would be illegal for telemarketers who have not been
given permission to call someone. If a telemarketer makes an illegal
call, the recipient should be able to report them to a government
agency and they should be fined. The technology to do this is easy, we
are not sure about the laws and policies. Courts have ruled differently
on this issue at different times. We think the political climate is
friendly today for Federal legislation.
Method--We announced our search for ideas on our website and
submissions were made there. We also publicized through restaurant and
catering associations with whom we often partner, who offered
interruption-free free meals for brainstorming sessions. Participation
was not limited to members, but could not be anonymous, since it was
our intention to follow up with submitters. The Board of Directors of
QEAH enlisted the aid of Prandia University to work with the submitters
of the best ideas to develop them into even better ideas. The Board
ensured all the aspects described in the Leap Year RFI were addressed
in our final submissions.
Dream team--Federal Trade Commission, Federal Communications
Commission, constitutional lawyer, Telemarketers' Association,
Consumers Union, Oracle or other database company.
Review considerations
Submissions will be reviewed by the NITRD Senior Steering Group for
Cybersecurity using the following considerations:
Would it change the game?
How clear is the way forward?
What heights are the hurdles that may be found in the way forward?
Submitted by the National Science Foundation for the National
Coordination Office (NCO) for Networking and Information Technology
Research and Development (NITRD) on December 23, 2008.
Suzanne H. Plimpton,
Management Analyst, National Science Foundation.
[FR Doc. E8-30979 Filed 12-29-08; 8:45 am]
BILLING CODE 7555-01-P