<div dir="ltr">Hello all,<div><br></div><div>Following up on Chris' email, I'll note that Quinn Dupont and I are holding a SHOT panel, "Security Technologies and Policy in Cyberspace." Please apply if you are interested and forward our call at will!</div><div><br></div><div>The call is here: <a href="http://www.historyoftechnology.org/media/2016_open_panels/sec_tech_pol_cyberspace.pdf">http://www.historyoftechnology.org/media/2016_open_panels/sec_tech_pol_cyberspace.pdf</a></div><div><br></div><div>I've pasted the text of the call below.</div><div><br></div><div>All best,</div><div>Brad</div><div><br></div><div><span id="docs-internal-guid-918bba8a-080b-0508-5d3c-92a5363a8c82"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt;text-align:center"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Open Session - Call for Contributions</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt;text-align:center"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Society for the History of Technology (SHOT) Annual Meeting - Singapore, 22-26 July 2016</span></p><br><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt;text-align:center"><span style="font-size:18.6667px;font-family:Arial;color:rgb(0,0,0);font-weight:700;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Security Technologies and Policy in Cyberspace</span></p><br><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt;text-align:center"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Organizers: </span><a href="http://www.iqdupont.com/" style="text-decoration:none"><span style="font-size:14.6667px;font-family:Arial;font-style:italic;text-decoration:underline;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Quinn Dupont</span></a><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent"> (University of Toronto, </span><a href="mailto:quinn.dupont@utoronto.ca" style="text-decoration:none"><span style="font-size:14.6667px;font-family:Arial;font-style:italic;text-decoration:underline;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">quinn.dupont@utoronto.ca</span></a><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">) and </span><a href="http://brfidler.com/" style="text-decoration:none"><span style="font-size:14.6667px;font-family:Arial;font-style:italic;text-decoration:underline;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Bradley Fidler</span></a><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent"> (University of California, Los Angeles, </span><a href="mailto:fidler@ucla.edu" style="text-decoration:none"><span style="font-size:14.6667px;font-family:Arial;font-style:italic;text-decoration:underline;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">fidler@ucla.edu</span></a><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);font-style:italic;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">)</span></p><br><br><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;white-space:pre-wrap;background-color:transparent">This panel is for new ways to talk about security in the online world.</span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Discussions of security today are polarized, with very little common ground between privacy advocates, on the one hand, and national security on the other. Moreover, security technologies and infrastructures reflect this polarization, wherein information security is configured as all-or-nothing, seemingly unable to simultaneously permit individual privacy and access to large-scale datasets for and about society. To date, privacy discourses have not suffered any lack of academic and social attention, as have technological solutions to national security, but there is a dearth of scholarly investigation in between these approaches. Yet, at the traditional points of contact academic researchers have been unaffiliated with security technology and policy production. And, as Ceruzzi asked in 2014, “Are historians of computing failing by not incorporating the work of agencies like the NSA?” Indeed, it is a symptom and a cause of this problem that historians traditionally ignore the intelligence community even on topics where they made contributions, such as in the civilian development of computer networks and the ongoing use and promotion of TOR.</span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;white-space:pre-wrap;background-color:transparent">In this panel we seek to generate new and productive frameworks for security and policy discussions that break the present stalemate. By attending to the origins and development of security, networking, and other digital technologies, we believe historically situated analyses can provide fresh insights into technical, political, and social developments. This panel seeks to bring together usually unconnected strands, including historical work on cryptography (from Kahn, 1967 to Blanchette, 2012), trustworthy computing (Misa and Yost, 2011-15), national security infrastructures (Edwards, 1996), early network security (DuPont and Fidler, n.d.), early codebreaking machines (Haigh, 2014), interconnections between Shannon’s mathematical theory of secrecy and information (Thomsen, 2008), institutions and governance (DeNardis, 2015), commercialization of software security (Yost, 2015), Korean public key infrastructure (Park, 2015), and US computer security policy (Warner, 2015).</span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;white-space:pre-wrap;background-color:transparent">We invite papers and other interventions in areas that include but are not limited to:</span></p><br><ul style="margin-top:0pt;margin-bottom:0pt"><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Intersectional perspectives on security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Non-US/UK security contexts, histories, and practices</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Crypto Wars 1.0 (1991-96) and 2.0 (2013-)</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Future Internet Architectures</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Cyber espionage and intellectual property</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Software and data obfuscation (such as homomorphic encryption)</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Open-source and competitive intelligence</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Big data security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Intelligence and security communities</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Commercialization of security technologies</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:14.6667px;font-family:Arial;color:rgb(0,0,0);vertical-align:baseline;background-color:transparent"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14.6667px;vertical-align:baseline;white-space:pre-wrap;background-color:transparent">Standards and standardization</span></p></li></ul></span></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><div style="font-size:small;font-family:arial"><div dir="ltr"><div style="font-family:arial,sans-serif;font-size:13px"><div>---</div><div>Bradley Fidler | Postdoc, UCLA Computer Science</div><div>323.963.4357 | <a href="http://brfidler.com" target="_blank">brfidler.com</a> | @brfidler</div></div></div></div></div>
</div></div></div></div></div>
</div>
</div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On 13 November 2015 at 20:56, Christopher Leslie <span dir="ltr"><<a href="mailto:chris.leslie@nyu.edu" target="_blank">chris.leslie@nyu.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Dear Colleagues, </div><div><br></div><div>The next SHOT conference will be held 22-26 June 2016 in Singapore. This is an earlier date than is typical. As usual, SIGCIS will have a themed workshop after the conference proper, but we also like to bring our work on computers, information and society to the main SHOT program. </div><div><br></div><div>With this in mind, the SIGCIS executive committee notes that any conference-goer may organize an “Open Session.” I am writing to you today because we thought it would be a good idea to forward this information to the membership and encourage any effort to participate in regular panels as well as the SIGCIS workshop. </div><div><br></div><div>As noted on SHOT’s website, anyone interested in organizing a panel should notify the Secretary’s office by email (<a href="mailto:shotsec@auburn.edu" target="_blank">shotsec@auburn.edu</a>) before December 1. The email should include the session title, a 500-word description, and a contact email. This information will then be publicized on the SHOT website, and the organizer could/should seek other panelists (using this email list, H-NET, etc.). The ultimate composition of the panel will be up to the organizer.</div><div><br></div><div>Organizers have until Dec. 15 to submit their finished panel as a traditional session for consideration by the program committee. The criteria for inclusion in the SHOT program are “quality and adherence to SHOT standards of gender, geographic, and institutional diversity.” The guidelines for a traditional panel require a short proposal and brief CVs from each participant. More information is available on the SHOT website (<a href="http://www.historyoftechnology.org/call_for_papers/" target="_blank">http://www.historyoftechnology.org/call_for_papers/</a>). </div><div><br></div><div>The CFP for the SIGCIS workshop will be coming in due course. </div><div><br></div><div>Sincerely, </div><div><br></div><div>Chris Leslie </div><span class="HOEnZb"><font color="#888888"><div><br></div>-- <br><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><span style="text-align:-webkit-auto"><span style="border-collapse:separate;border-spacing:0px"><div style="word-wrap:break-word"><span style="border-collapse:separate;border-spacing:0px"><font color="#000000" face="Helvetica"><div><font size="2">Christopher S. Leslie, Ph.D.</font></div><div style="font-size:11px">Co-Director and Lecturer, Science and Technology Studies</div><div style="font-size:11px">Faculty Fellow in Residence for Othmer Hall and Clark Street</div><div style="font-size:11px">Vice Chair, IFIP <span style="text-align:-webkit-auto">History of Computing </span><span style="text-align:-webkit-auto">Working Group 9.7</span></div></font><font color="#000000" face="Helvetica"><div style="font-size:11px"><br></div><div style="font-size:11px">NYU Tandon School of Engineering </div><div style="font-size:11px">5 MetroTech Center, LC 131</div><div style="font-size:11px">Brooklyn, NY 11201</div></font></span></div></span></span><span style="font-family:Helvetica;font-size:medium;text-align:-webkit-auto;border-collapse:separate;border-spacing:0px"><div style="word-wrap:break-word"><span style="border-collapse:separate;border-spacing:0px;font-size:11px"><div><font color="#000000"><a href="tel:%28646%29%20997-3130" value="+16469973130" target="_blank">(646) 997-3130</a></font></div></span></div></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</font></span></div>
<br>_______________________________________________<br>
This email is relayed from members at <a href="http://sigcis.org" rel="noreferrer" target="_blank">sigcis.org</a>, the email discussion list of SHOT SIGCIS. Opinions expressed here are those of the member posting and are not reviewed, edited, or endorsed by SIGCIS. The list archives are at <a href="http://lists.sigcis.org/pipermail/members-sigcis.org/" rel="noreferrer" target="_blank">http://lists.sigcis.org/pipermail/members-sigcis.org/</a> and you can change your subscription options at <a href="http://lists.sigcis.org/listinfo.cgi/members-sigcis.org" rel="noreferrer" target="_blank">http://lists.sigcis.org/listinfo.cgi/members-sigcis.org</a><br></blockquote></div><br></div></div>