Past Events

ICTS Seminar - The Refugee Crisis: Humanitarian and Security Implications March 9, 2016
ICTS Seminar - The Refugee Crisis: Humanitarian and Security Implications March 9, 2016
Potomac Institute for Policy Studies March 9, 2016 The latest expansion of terrorism, civil wars, and regional conflicts has resulted in internal displacements and forced migrations of millions of refugees around the world. Despite the grave humanitarian and strategic implications of the continuing...
ICTS Seminar - Combating Terrorism: The Role of Sharing Intelligence - April 14, 2016
ICTS Seminar - Combating Terrorism: The Role of Sharing Intelligence - April 14, 2016
International Center for Terrorism Studies, at the Potomac Institute for Policy Studies. In the wake of the escalated terrorist plots and attacks worldwide as well as the April 2016 Nuclear Security Summit’s warning that “the threat of nuclear and radiological terrorism remains one of the gre...
Combating Terrorism: Lessons from the Middle East, North Africa, the Sahel, and Beyond
Combating Terrorism: Lessons from the Middle East, North Africa, the Sahel, and Beyond
Since 9/11, security challenges with grave global implications have emerged in the Middle East, Africa, and other regions. Terrorists networks, particularly al-Qa’ida and the newly-formed Daesh, are expanding their deadly operations across an arc of instability that exists without borders. In the...
"International Cooperation in Combating Terrorism: Review of 2015 and Outlook for 2016"
Date: Monday, February 8, 2016 2:00 PM to 4:00 PM Place: The National Press Club 529 14th Street NW, 13th Floor, Holeman Lounge Washington, D.C. 20045 Opening Remarks: Michael S. Swetnam CEO and Chairman, Potomac Institute for Policy Studies ...
Cyber Readiness Index 2.0 Launch (Part 2 of 2)
Cyber Readiness Index 2.0 Launch (Part 2 of 2)
The Launch of: "The Cyber Readiness Index 2.0: A Baseline and an Index" Today, no country is cyber ready. The Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, information communications technologies and the Internet and then applie...
Cyber Readiness Index 2.0 Launch (Part 1 of 2)
Cyber Readiness Index 2.0 Launch (Part 1 of 2)
The Launch of: "The Cyber Readiness Index 2.0: A Baseline and an Index" Today, no country is cyber ready. The Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, information communications technologies and the Internet and then applie...

Employing X-Ray Tomography for Security: A Hardware Security Symposium with Michael Sutherland

On Thursday October 18th, 2018, the Potomac Institute's VITAL Center hosted Mr. Mike Sutherland of Defense Microelectronics Activity (DMEA), who discussed the current state of X-Ray tomography, and its current use cases for imaging the internal structure of integrated circuits in 3 dimensions using a transmission X-Ray microscope. Mr. Sutherland presented data from both lab and synchrotron-based system approaches to demonstrate many of the benefits and limitations of using X-Ray tomography. Mr. Sutherland also discussed the emerging research and development efforts in the field.

Mr. Mike Sutherland has worked as a computer scientist at DMEA since 2014. He is currently the lead researcher there working on X-Ray microscope hardware and software to image the internal nature of integrated circuits. In addition to his work on X-Ray tomography, Mr. Sutherland also works on image analysis and machine learning efforts to analyze integrated circuits for reverse engineering purposes

About the Hardware Security Symposium Speaker Series

Microelectronics are key components in our defense systems, and assuring that they are both readily available and secure is critical for US national security. Hardware-based threats can have serious impacts on military or critical infrastructure, and hardware vulnerabilities include malicious insertions, Trojan horses, counterfeit parts, and rapid obsolescence. While the USG has made large investments in software-focused cybersecurity, hardware-based approaches have not received as much attention. The Hardware Security Symposium Speaker Series brings together leading experts in Trusted microelectronics from academia, government, and Industry, to discuss hardware security threats, and ways to mitigate them.