Past Events

ICTS Seminar: Combating Terrorism and the Role of Law Enforcement
ICTS Seminar: Combating Terrorism and the Role of Law Enforcement
The International Center for Terrorism Studies at the Potomac Institute for Policy Studies hosted a seminar on “Combating Terrorism: The Role of Law Enforcement” on June 11, 2015. The latest aborted plot to attack police officers in Boston underscores once again the critical role of law enforcem...
The Days After: Are Iran’s Deadlines Endless?
The Days After: Are Iran’s Deadlines Endless?
On Thursday July 9, the Potomac Institute's International Center for Terrorism Studies hosted a panel to discuss the ongoing nucelar negotiations with Iran. The Islamic Republic of Iran and the six major powers are continuing to negotiate beyond the July 7th deadline. Can a historic diplomatic endg...
ICTS Seminar: From Terrorism to War Crimes:  Past Lessons and Future Outlook
ICTS Seminar: From Terrorism to War Crimes: Past Lessons and Future Outlook
Potomac Institute for Policy Studies April 29, 2015 at The International Law Institute This seminar focused on the interface between terrorism and the rule of law. Special attention was placed on legal practices related to detention, prosecution and punishment of terrorists. Topics covered includ...
ICTS:17th Annual Event
ICTS:17th Annual Event "International Cooperation in Combating Terrorism : Review of 2014"
Potomac Institute for Policy Studies International Center for Terrorism Studies March 30, 2015 National Press Club Opening Remarks: Michael S. Swetnam CEO and Chairman, Potomac Institute for Policy Studies Moderator: Professor Yonah Alexander Director, Inter-University Center for Terrorism Studie...
ICTS Seminar: Terrorism Victimization of Women and Children - January 30, 2015
ICTS Seminar: Terrorism Victimization of Women and Children - January 30, 2015
- Captured Live on Ustream at http://www.ustream.tv/channel/the-potomac-institute-for-policy-studies
ICTS Seminar: America, Still the Indispensable Nation
ICTS Seminar: America, Still the Indispensable Nation
The Potomac Institute for Policy Studies International Center for Terrorism Studies January 15, 2015 - Captured Live on Ustream at http://www.ustream.tv/channel/the-potomac-institute-for-policy-studies

Employing X-Ray Tomography for Security: A Hardware Security Symposium with Michael Sutherland

On Thursday October 18th, 2018, the Potomac Institute's VITAL Center hosted Mr. Mike Sutherland of Defense Microelectronics Activity (DMEA), who discussed the current state of X-Ray tomography, and its current use cases for imaging the internal structure of integrated circuits in 3 dimensions using a transmission X-Ray microscope. Mr. Sutherland presented data from both lab and synchrotron-based system approaches to demonstrate many of the benefits and limitations of using X-Ray tomography. Mr. Sutherland also discussed the emerging research and development efforts in the field.

Mr. Mike Sutherland has worked as a computer scientist at DMEA since 2014. He is currently the lead researcher there working on X-Ray microscope hardware and software to image the internal nature of integrated circuits. In addition to his work on X-Ray tomography, Mr. Sutherland also works on image analysis and machine learning efforts to analyze integrated circuits for reverse engineering purposes

About the Hardware Security Symposium Speaker Series

Microelectronics are key components in our defense systems, and assuring that they are both readily available and secure is critical for US national security. Hardware-based threats can have serious impacts on military or critical infrastructure, and hardware vulnerabilities include malicious insertions, Trojan horses, counterfeit parts, and rapid obsolescence. While the USG has made large investments in software-focused cybersecurity, hardware-based approaches have not received as much attention. The Hardware Security Symposium Speaker Series brings together leading experts in Trusted microelectronics from academia, government, and Industry, to discuss hardware security threats, and ways to mitigate them.