Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop (2016)
In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.
A Threat to America's Global Vigilance, Reach, and Power–High-Speed, Maneuvering Weapons: Unclassified Summary (2016)
The National Academies of Sciences, Engineering, and Medicine was asked by the Assistant Secretary of the Air Force for Science, Technology and Engineering to assess the threat of high-speed weapons and recommendations to counter the threat. This report reviews the current and evolving threats, and the current and planned U.S. efforts and capabilities to counter these threats, identifies current gaps and future opportunities where the United States Air Force (USAF) could provide significant contribution to the U.S. effort to counter high-speed threats, and recommends actions the USAF could take in terms of materiel, non-materiel, and technology development to address the identified opportunities and gaps in U.S. efforts to address these threats.
National Security Space Defense and Protection: Public Report (2016)
National Security Space Defense and Protection reviews the range of options available to address threats to space systems, in terms of deterring hostile actions, defeating hostile actions, and surviving hostile actions, and assesses potential strategies and plans to counter such threats. This report recommends architectures, capabilities, and courses of action to address such threats and actions to address affordability, technology risk, and other potential barriers or limiting factors in implementing such courses of action.