Becky, will this be transmitted or recorded? <span></span><br><br>On Tuesday, January 12, 2016, Becky Lentz <<a href="mailto:roberta.lentz@mcgill.ca">roberta.lentz@mcgill.ca</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;color:rgb(0,0,0);font-size:14px;font-family:Calibri,sans-serif"><span><div class="gmail_extra"><div class="gmail_quote"><div style="word-wrap:break-word;color:rgb(0,0,0);font-size:14px;font-family:Calibri,sans-serif"><div><div><div><br></div></div></div><span><blockquote style="BORDER-LEFT:#b5c4df 5 solid;PADDING:0 0 0 5;MARGIN:0 0 0 5"><div dir="ltr"><h1 style="margin:0px 0px 15px;padding:0px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;font-size:12px;line-height:18px;text-align:center;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-size:18px"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">The Frontiers of Cybersecurity Policy and Law</span></span></span></h1><h1 style="text-align:center;margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial"><p style="margin:0px 0px 15px;padding:0px;line-height:12px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><span style="color:rgb(0,0,0)">Over the course of two days in February 2016, as part of its <a href="https://www.strausscenter.org/strauss-articles/integrated-cybersecurity-studies-2.html" style="color:rgb(43,170,223)" target="_blank">Integrated Cybersecurity Studies</a> program, the Robert Strauss Center at the University of Texas-Austin will host a unique and timely conference focused on the legal and policy dimensions of cybersecurity. We are proud to partner with Christian Science Monitor's <a href="http://www.csmonitor.com/World/Passcode" style="color:rgb(43,170,223)" target="_blank">Passcode</a> as our media partner for this event, and with the <a href="http://www.americanbar.org/groups/public_services/law_national_security.html" style="color:rgb(43,170,223)" target="_blank">American Bar Association Standing Committee on Law and National Security</a> as our partner for the teacher-training workshop component on February 6th.</span></span></p><p style="margin:0px 0px 15px;padding:0px;line-height:12px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">The conference will begin on February 5th with a symposium bringing together technologists, government officials, privacy advocates, and scholars to discuss four cutting-edge topics: the aftermath of the “going dark” debate; the evolving regulatory environment for the rapidly-growing security-research sector--including but not limited to export controls; the prospects for private entities to engage in “active defense” of their networks--including but not limited to “hackback”; and botnet takedowns.</span></span></p><p style="margin:0px 0px 15px;padding:0px;line-height:12px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><span style="color:rgb(0,0,0)">The conference then continues on February 6th with a unique faculty-training workshop co-sponsored by the American Bar Association. Each year the </span><a href="http://www.americanbar.org/groups/public_services/law_national_security.html" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">ABA’s Standing Committee on Law and National Security</span></a><span style="color:rgb(0,0,0)">sponsors a training workshop focused on a particular topic relating to national security. This year’s event focuses on cybersecurity law and policy, with sessions addressing, among other things, relevant aspects of federal criminal law, investigative and intelligence law, regulatory law, and international law.</span></span></p><p style="margin:0px 0px 15px;padding:0px;line-height:12px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><span style="color:rgb(0,0,0)"><span style="background-color:rgb(255,255,0)">This event is free and open to the public, but registration is required</span>. Click </span><a href="https://www.eventbrite.com/e/the-frontiers-of-cybersecurity-policy-and-law-tickets-20705821670" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">here</span></a><span style="color:rgb(0,0,0)"> to register. Registration does not guarantee admission, so please arrive early to secure your seat!<br><br>This event will take place in the Sheffield-Massey Room, TNH 2.111 (UT School of Law) and in the KUT Studio 1A, School of Communications.</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><strong style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent">AGENDA</strong></span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><strong style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent">FRIDAY, FEBRUARY 5, 2016</strong></span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><em style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent"><span style="color:rgb(0,0,0)">Location: </span><a href="https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">Sheffield-Massey Room</span></a><span style="color:rgb(0,0,0)"> (Townes Hall 2.111), UT School of Law</span></em></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">8:00am - 8:30am         Welcome and breakfast</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">8:30am - 9:45am         SESSION 1: The "Going Dark" Encryption Debate</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                 <br>                                    Paul Ohm (Georgetown)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Benjamin Wittes (Brookings)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Riana Pfefferkorn (Stanford)</span><br>                                    Christopher Soghoian (ACLU)<br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Moderator: Richard Downing (DOJ)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">10:00am - 11:15am     SESSION 2: Regulating Security Research: Wassenaar, DMCA, and More</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"> <br>                                    Jennifer Granick (Stanford)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Elaine Korzak (Stanford)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Katie Moussouris (HackerOne)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                    Allan Friedman (Na</span><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">tional Telecommunications & Information Admin.)</span></span></p><hr style="font-weight:normal;font-family:Helvetica,Arial,sans-serif;font-size:11px"><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><em style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent"><span style="color:rgb(0,0,0)">Location: </span><a href="http://kutx.org/musicarchive/studio-1a-calendar" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">KUT Studio 1A</span></a><span style="color:rgb(0,0,0)">, UT School of Communications</span></em></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">11:30am - 1:30pm        SPECIAL SESSION </span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   <br>                                     "Big Data, Privacy, and Security: Comparing US and German Perspectives" </span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                     Recording of transatlantic dialogue with counterparts in Berlin for an episode of the                                                      America Abroad Media radio documentary series.</span></span></p><hr style="font-weight:normal;font-family:Helvetica,Arial,sans-serif;font-size:11px"><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><em style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent"><span style="color:rgb(0,0,0)">Location: </span><a href="https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">Sheffield-Massey Room</span></a><span style="color:rgb(0,0,0)"> (Townes Hall 2.111), UT School of Law</span></em></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">1:30pm - 2:15pm        LUNCH</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">2:15pm - 3:30pm        SESSION 3: Hacking Back and Other Active Defense Measures: Technical, Legal, and                                                                   Policy Issues</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Richard Downing (Department of Justice)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Richard Puckett (GE)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Christian Beckner (George Washington)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Andrew Woods (Kentucky)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">3:45pm - 5:00pm        SESSION 4: Botnet Takedowns: The Technical, Legal, and Policy Issues</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">             <br>                                   Sean Farrell (FBI)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Kristen Eichensehr (UCLA)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Richard Boscovich (Microsoft)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Greg Nojeim (CDT)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><strong style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent">SATURDAY, FEBRUARY 6, 2016<br><br>This teacher-training workshop is co-sponsored by the <a href="http://www.americanbar.org/groups/public_services/law_national_security.html" style="color:rgb(43,170,223);font-weight:normal" target="_blank">American Bar Association Standing Commitee on Law and National Security</a>.</strong></span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif"><em style="border:0px;margin:0px;outline:0px;padding:0px;background:transparent"><span style="color:rgb(0,0,0)">Location: </span><a href="https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf" style="color:rgb(43,170,223)" target="_blank"><span style="color:rgb(0,0,0)">Sheffield-Massey Room</span></a><span style="color:rgb(0,0,0)"> (Townes Hall 2.111), UT School of Law</span></em></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">9:00am - 9:30am         Welcome and breakfast: Introduction by Judge James Baker</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">9:30am - 10:30am      SESSION 1: Cyber in the Intelligence/Surveillance Context</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Bill Banks (Syracuse)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Jen Daskal (American)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">10:45am - 11:45am    SESSION 2: Cyber in the Criminal Law Context</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Paul Ohm (Georgetown)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Jennifer Granick (Stanford)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Rich</span><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">ard Downing (Justice Department)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Sean Farrell (FBI)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">11:45am - 12:45pm   SESSION 3: Cyber in the Business and Regulatory Contexts</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Derek Bambauer (Arizona State)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Andrew Woods (Kentucky)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Kristen Eichensehr (UCLA)<br>                                   Moderator: Harvey Rishikof (ABA)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">12:45pm - 1:45pm      KEYNOTE LUNCHEON featuring Daniel Placek, co-founder of Darkode</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">1:45pm - 2:45pm        SESSION 4: Cyber and International Law</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Ashley Deeks (UVA)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Eric Jensen (BYU)</span></span></p><p style="margin:0px 0px 15px;padding:0px;font-family:Helvetica,Arial,sans-serif;font-size:11px;line-height:11px;text-align:left;font-weight:normal;border:0px;outline:0px;background-image:initial;background-repeat:initial"><span style="color:rgb(0,0,0)"><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">3:00pm - 4:00pm        SESSION 5: Cyber and the Laws of War</span><br><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Derek Jinks (Texas)</span><br><span style="font-family:arial,'helvetica neue',helvetica,sans-serif">                                   Sean Watts (Creighton)</span></span></p></h1></div></blockquote></span></div></div><br></div></span></div>
</blockquote><br><br>-- <br><div dir="ltr"><div><div dir="ltr"><div><div style="font-family:arial,sans-serif;font-size:12.666666984558105px;background-color:rgb(255,255,255)"><br style="font-family:arial;font-size:small"><div dir="ltr" style="font-family:arial;font-size:small"><div style="font-family:arial,sans-serif;font-size:12.666666984558105px"><i>Carolina Rossini </i></div><div style="font-family:arial,sans-serif;font-size:12.666666984558105px"><font color="#666666"><i>Vice President, International Policy</i></font></div><div style="font-family:arial,sans-serif;font-size:12.666666984558105px"><b><font color="#666666">Public Knowledge</font></b></div><div><font face="arial, sans-serif" color="#0000ff"><span style="font-size:12.666666984558105px"><u><a href="http://www.publicknowledge.org/" target="_blank">http://www.publicknowledge.org/</a></u></span></font><br></div><div style="font-family:arial,sans-serif;font-size:12.666666984558105px"><a value="+16176979389" style="color:rgb(102,102,102)">+ 1 6176979389 | </a><font color="#666666">skype: carolrossini | </font><font color="#0000ff">@carolinarossini</font></div></div></div></div><div><br></div></div></div></div><br>