Past Events

ILI Hosts
ILI Hosts "Combating Global Coronavirus: Assessment of Past Lessons & Future Outlook"
Date: Tuesday, April 14th, 2020 2:00 PM-4:00 PM Host: International Law Institute Opening Remarks: Prof. Don Wallace, Chairman at the International Law Institute Moderator: Prof. Yonah Alexander, Director of the Inter-University Center for Terrorism Studies, Senior Fellow at th...
ILI Hosts “Combating Global Coronavirus: From Isolation to Int'l Cooperation” Conference
ILI Hosts “Combating Global Coronavirus: From Isolation to Int'l Cooperation” Conference
On March 26, 2020, the International Law Institute was proud to support and co-host with the Inter-University Center for Terrorism Studies [IUCTS] its conference on “Combating Global Coronavirus: From Isolation to International Cooperation” held as part of Special Ambassador’s Forum series. T...
IUCTS Feb 6 2020 Middle East Security Challenges: Past Lessons and Future Outlook
IUCTS Feb 6 2020 Middle East Security Challenges: Past Lessons and Future Outlook
Speaker: Ambassador Stuart Eizenstat Opening remarks: Professor Don Wallace Jr. International Law Institute and Inter University Center for Terrorism Studies
2019 Global Terrorism Index
2019 Global Terrorism Index
Featuring Col. Serge Stroobants, Director of Operations for Europe and MENA at the Institute for Economics and Peace (Brussels). December 16, 2019 (2:00-3:30 PM) Co-Sponsors: Inter-University Center for Terrorism Studies Inter-University Center for Legal Studies, at the International Law Institut...
Application of Blockchains to DoD Microelectronics Supply Chain
Application of Blockchains to DoD Microelectronics Supply Chain
In this presentation Nikhil Shenoy will review Colvin Run's microelectronics blockchain product and review the application of blockchains to the DoD microelectronic supply chain. This talk will focus on the importance of the U.S. semiconductor industry and review problems and facing the current micr...
ICTS Event, Technology and Security, November 18, 2019
ICTS Event, Technology and Security, November 18, 2019
“Understanding how technology evolves is essential for the United States to continue to maintain global leadership, as well as to ensure economic prosperity and national security. Dr. Daniel Gerstein, a leading technology expert, discuss his new book “The Story of Technology: How We Got Here and...

Employing X-Ray Tomography for Security: A Hardware Security Symposium with Michael Sutherland

On Thursday October 18th, 2018, the Potomac Institute's VITAL Center hosted Mr. Mike Sutherland of Defense Microelectronics Activity (DMEA), who discussed the current state of X-Ray tomography, and its current use cases for imaging the internal structure of integrated circuits in 3 dimensions using a transmission X-Ray microscope. Mr. Sutherland presented data from both lab and synchrotron-based system approaches to demonstrate many of the benefits and limitations of using X-Ray tomography. Mr. Sutherland also discussed the emerging research and development efforts in the field.

Mr. Mike Sutherland has worked as a computer scientist at DMEA since 2014. He is currently the lead researcher there working on X-Ray microscope hardware and software to image the internal nature of integrated circuits. In addition to his work on X-Ray tomography, Mr. Sutherland also works on image analysis and machine learning efforts to analyze integrated circuits for reverse engineering purposes

About the Hardware Security Symposium Speaker Series

Microelectronics are key components in our defense systems, and assuring that they are both readily available and secure is critical for US national security. Hardware-based threats can have serious impacts on military or critical infrastructure, and hardware vulnerabilities include malicious insertions, Trojan horses, counterfeit parts, and rapid obsolescence. While the USG has made large investments in software-focused cybersecurity, hardware-based approaches have not received as much attention. The Hardware Security Symposium Speaker Series brings together leading experts in Trusted microelectronics from academia, government, and Industry, to discuss hardware security threats, and ways to mitigate them.