{"id":2709,"date":"2015-08-26T12:06:47","date_gmt":"2015-08-26T16:06:47","guid":{"rendered":"https:\/\/web.uri.edu\/hc\/?page_id=2709"},"modified":"2025-12-03T16:35:39","modified_gmt":"2025-12-03T21:35:39","slug":"2014hc","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/hc\/hcarchives\/2014hc\/","title":{"rendered":"2014: Cybersecurity and Privacy"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2372 size-full\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/935\/webBanner.jpg\" alt=\"2014Banner\" width=\"960\" height=\"195\" srcset=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/webBanner.jpg 960w, https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/webBanner-300x61.jpg 300w, https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/webBanner-768x156.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p>September \u2013 December 2014<br \/>\nEdwards Auditorium, URI Kingston Campus<\/p>\n<p><strong>Our dependence<\/strong> on modern technology is not without its downsides. Cyber threats pose serious economic and national security challenges. Moreover, corporations and government agencies track our online activities, purchases, and even our location.<\/p>\n<p><strong>Coordinators:<\/strong> Lisa DiPippo, Vic Fay-Wolfe, Ed Lamagna, Yan (Lindsay) Sun<\/p>\n<h2>Speakers<\/h2>\n<ul class=\"display-posts-listing\"><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/harry-lewis\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/20141109_Lewis1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Harry Lewis\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/harry-lewis\/\">Harry Lewis<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Too Much Information?<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/james-bamford\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/bamford-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"James Bamford\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/james-bamford\/\">James Bamford<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Everyone's a Target: How America Lost Control of the National Security Agency, and Can It Be Reined In?<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/kim-zetter\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/COUNTDOWN_TO_ZERO_DAY-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/kim-zetter\/\">Kim Zetter<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Stuxnet and the Launch of the World's First Digital Weapon<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/heidi-boghosian\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/boghosian-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/heidi-boghosian\/\">Heidi Boghosian<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Surveillance or Self Determination: Can Democracy and Diversity Co-Exist in the Age of Google, Comcast, and the NSA?<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/gregory-conti\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/conti-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/conti-150x150.jpg 150w, https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/conti.jpg 200w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/gregory-conti\/\">Gregory Conti<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Slippery Slope of Doom: What Could Possibly Go Wrong with Our Instrumented World?<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/roberta-stempfley\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/stempfley-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/roberta-stempfley\/\">Roberta Stempfley<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Cybersecurity and Critical Infrastructure<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/cybercrime-panel\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/langevin-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/cybercrime-panel\/\">Cybercrime Panel<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Moderated by Congressman James Langevin<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/timothy-edgar\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/edgar-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/timothy-edgar\/\">Timothy Edgar<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Achieving Security, Privacy and Internet Freedom in the Golden Age of Hacking, Cyberwar and Surveillance<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/gary-warner\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/warner-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/gary-warner\/\">Gary Warner<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Malware Threat Intelligence<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/julie-brill\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/brill1-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/julie-brill\/\">Julie Brill<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Big Data, Data Brokers and the Business of Tracking<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/julia-angwin\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/angwin-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/julia-angwin\/\">Julia Angwin<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Is Privacy Becoming a Luxury Good?<\/em><\/span><\/li><li class=\"listing-item\"><a class=\"image\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/bruce-schneier\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/web.uri.edu\/hc\/wp-content\/uploads\/sites\/935\/schneier-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/a> <a class=\"title\" href=\"https:\/\/web.uri.edu\/hc\/2014-event\/bruce-schneier\/\">Bruce Schneier<\/a> <span class=\"excerpt-dash\">-<\/span> <span class=\"excerpt\"><em>Surveillance and Power<\/em><\/span><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>September \u2013 December 2014 Edwards Auditorium, URI Kingston Campus Our dependence on modern technology is not without its downsides. Cyber threats pose serious economic and national security challenges. Moreover, corporations and government agencies track our online activities, purchases, and even our location. Coordinators: Lisa DiPippo, Vic Fay-Wolfe, Ed Lamagna, Yan (Lindsay) Sun Speakers<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2561,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-2709","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/pages\/2709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/comments?post=2709"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/pages\/2709\/revisions"}],"predecessor-version":[{"id":7915,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/pages\/2709\/revisions\/7915"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/pages\/2561"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/media?parent=2709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}