SHARE:  
FEATURED

THE POLICYMAKER'S GUIDE TO DEF CON
Next week, DEF CON, the world’s longest running underground hacking conference, boldly goes where it’s never gone before — online. Deeply ingrained in hacker culture, DEF CON has long embraced creativity, tinkering and acceptance. And that openness extends to policymakers who may be able to join for the first time since the conference will be free and held virtually this year.

“There's a history of both cooperation and friction between DEF CON and the U.S. government,” said Beau Woods, a leader of I Am The Cavalry and village organizer at DEF CON. “The organizers invited an FBI agent prosecuting cybercrime to the very first event. Not only did she show up, she gave a well-received talk wherein she promised she wasn't there to arrest anyone.”

While participants may still compete in “ Spot the Fed,” it’s increasingly clear to the technology community and policymakers that the two need to find ways to work together. “In the absence of technically literate voices of reason connecting with the public policy community, a vacuum exists that is filled with those with lesser expertise, lesser motives and lesser experience in confronting the challenges that await us in the 21st century,” said Woods.

The conference can still be jarring to many new to hacker culture, which is why Woods, a DEF CON policy goon (volunteer organizer), started the “ Lost Policymakers Guide” with others at the crossroads of the cyber and policy worlds to help those new to hacker conferences.

To track policy talks at DEF CON, the Policy group offers an agenda capturing recommended talks from across the conference for policymakers.

This year, the in-person conference was “canceled” ( again), but will still operate in “safe mode” with plenty of D.C. policymaker involvement in the virtual villages. Department of Homeland Security Cybersecurity Infrastructure Security Agency Director Chris Krebs, FDA Principal Deputy Commissioner Amy P. Abernethy and officials from the Department of Defense and Department of Transportation will participate in the Biohacking, ICS and Aerospace Villages.
IN CASE YOU MISSED IT
Aspen Tech Policy Hub fellows presented projects during the organization’s third virtual Demo Day event, “ Seeding Success: Equity, Technology & Policy.” Nidhi Hebbar and Madison Jacobs introduced their project, “ EdTech Equity,” aimed at tackling the amplification of existing biases by AI and machine learning in edtech products. Mariah Lichtenstern presented “ Closing the Tech Funding Gap,” a project focused on addressing systemic issues in investor criteria for funding technology startups. 

Carnegie Endowment Technology and International Affairs Director Mike Nelson moderated an Internet Governance Forum-USA panel on how artificial intelligence is changing the internet and hosted the conversation, “ Internet Governance: How to Advance Digital Cooperation and Leadership,” in partnership with the United Nations Foundation.

I Am The Cavalry Co-Founder Joshua Corman joined the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) as a senior advisor and visiting researcher focusing on COVID-19 response efforts. The move was covered by a number of news outlets including CyberScoop, FCW and Dark Reading. He also recently delivered a keynote on “Advice I wish I had gotten” at GRIMMCon.

Technology for Global Security and the Center for a New American Security published “ Pay Attention” by Alexa Wehsener, the latest installment in the Future Digital Threats to Democracy series. The new piece discusses the “monetization of attention” in the digital world. Wehsener also recently led the Girl Security Geolocation Workshop on open source intelligence tools. 

UC Berkeley Center for Long-Term Cybersecurity and the Daylight Security Research Lab held a discussion showcasing “Virtual Caring,” a one-week interactive performance that confronted the prospect of using artificial intelligence as a virtual caregiver for aging populations.
ASK AN EXPERT:
TIKTOK'S DANGEROUS DANCE
“The big question is whether the data TikTok is collecting on users is being mined for intelligence by China, and if so, what that means for the long-term national security of the United States. Traditional cybersecurity tools — designed to keep outsiders from penetrating systems — are ill equipped to accommodate this sort of sophisticated threat.”



Betsy Cooper
Founding Director, Aspen Tech Policy Hub
The Aspen Institute
IN THE NEWS

The Aspen Tech Policy Hub project “ Protecting Older Users Online” was featured in the Yahoo! Finance article “ Scammers are targeting senior citizens from all angles— here's what you need to know.” 

Carnegie Cyber Policy Initiative Fellow Jon Bateman authored The Hill op-ed “ American voters deserve facts on outside influence on this election.”  

Aspen Tech Policy Hub Director Betsy Cooper discussed concerns about TikTok’s access to U.S. user data and proposed bans in a CNET article

I Am The Cavalry Co-Founder Joshua Corman was featured by CSO in the “ 11 top DEF CON and Black Hat talks of all time” for “ The Cavalry Isn’t Coming,” which launched the grassroots I Am The Cavalry movement. 
 
R Street Institute National Security & Cybersecurity Resident Senior Fellow Paul Rosenzweig’s virtual cyber law lecture series earned a spot on CNET’s featured online classes to become a cybersecurity pro. Rosenzweig also spoke to several news outlets about the Trump Administration’s expansion of the Department of Homeland Security’s powers in response to unrest in several American cities. His comments were featured by CBS News, CNN International, the Los Angeles Times, MSNBC, The Washington Post and more.

UC Berkeley Center for Long-Term Cybersecurity Director Steven Weber provided expertise for a Yahoo! Finance article on possible security threats posed by TikTok.  

I Am The Cavalry Co-Founder Beau Woods discussed the security vulnerabilities of medical devices on the a16z Podcast episode “ Taking the Pulse on Medical Device Security.” Woods also provided expertise in the National Journal article, “ After hack, Twitter locked out Democratic congressional candidates.”
UPCOMING EVENTS

August 4 | 10:30 a.m. PT / 1:30 p.m. ET

Aspen Tech Policy Hub
August 5 | 9 a.m. PT / 12 p.m. ET

Aspen Tech Policy Hub
August 19 | 9 a.m. PT / 12 p.m. ET

 News and Events from Hewlett Foundation Cyber Initiative Grantees