<div dir="ltr">Kyra<div><br></div><div>I would check out ISTE.  Check out @istelib on Twitter.  </div><div><br></div><div>Kyle </div></div><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Jul 18, 2016 at 4:00 AM,  <span dir="ltr"><<a href="mailto:discuss-request@lists.hackerspaces.org" target="_blank">discuss-request@lists.hackerspaces.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Send Discuss mailing list submissions to<br>
        <a href="mailto:discuss@lists.hackerspaces.org">discuss@lists.hackerspaces.org</a><br>
<br>
To subscribe or unsubscribe via the World Wide Web, visit<br>
        <a href="http://lists.hackerspaces.org/mailman/listinfo/discuss" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/mailman/listinfo/discuss</a><br>
or, via email, send a message with subject or body 'help' to<br>
        <a href="mailto:discuss-request@lists.hackerspaces.org">discuss-request@lists.hackerspaces.org</a><br>
<br>
You can reach the person managing the list at<br>
        <a href="mailto:discuss-owner@lists.hackerspaces.org">discuss-owner@lists.hackerspaces.org</a><br>
<br>
When replying, please edit your Subject line so it is more specific<br>
than "Re: Contents of Discuss digest..."<br>
<br>
<br>
Today's Topics:<br>
<br>
   1. Collaboration with public libraries to host/incubate      new<br>
      hackerspaces? (Kẏra ​)<br>
   2. Re: Collaboration with public libraries to host/incubate new<br>
      hackerspaces? (Joshua Pritt)<br>
   3. Fwd: Call for input to President's Commission on Enhancing<br>
      Cybersecurity - bridging the trust gap between the IT community<br>
      and the US government (Cecilia Tanaka)<br>
   4. Re: Fwd: Call for input to President's Commission on<br>
      Enhancing Cybersecurity - bridging the trust gap between the IT<br>
      community and the US government (Walter van Holst)<br>
<br>
<br>
----------------------------------------------------------------------<br>
<br>
Message: 1<br>
Date: Sun, 17 Jul 2016 18:22:16 -0400<br>
From: Kẏra ​ <<a href="mailto:kxra@riseup.net">kxra@riseup.net</a>><br>
To: <a href="mailto:discuss@lists.hackerspaces.org">discuss@lists.hackerspaces.org</a><br>
Subject: [hackerspaces] Collaboration with public libraries to<br>
        host/incubate   new hackerspaces?<br>
Message-ID:<br>
        <CAD27wQ7XfoZE381OJSmkm=<a href="mailto:YiNvdLx%2B7i7m2qXg0Yko3i6SyvvA@riseup.net">YiNvdLx+7i7m2qXg0Yko3i6SyvvA@riseup.net</a>><br>
Content-Type: text/plain; charset="utf-8"<br>
<br>
<a href="https://twitter.com/Empowermentors/status/651004032597684224" rel="noreferrer" target="_blank">https://twitter.com/Empowermentors/status/651004032597684224</a><br>
<br>
Is there any documentation on working with local public libraries to use<br>
those existing ideologically similar spaces to start a hackerspace? These<br>
types of partnerships seem like they would be naturally symbiotic and<br>
mutually beneficial. I'd like to do this in my city, but I don't really<br>
know what the best practices are. Some successful examples might be<br>
helpful, if nothing else.<br>
-------------- next part --------------<br>
An HTML attachment was scrubbed...<br>
URL: <<a href="http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/2e9e6fb1/attachment-0001.html" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/2e9e6fb1/attachment-0001.html</a>><br>
<br>
------------------------------<br>
<br>
Message: 2<br>
Date: Sun, 17 Jul 2016 20:33:02 -0400<br>
From: Joshua Pritt <<a href="mailto:ramgarden@gmail.com">ramgarden@gmail.com</a>><br>
To: Hackerspaces General Discussion List<br>
        <<a href="mailto:discuss@lists.hackerspaces.org">discuss@lists.hackerspaces.org</a>><br>
Subject: Re: [hackerspaces] Collaboration with public libraries to<br>
        host/incubate new hackerspaces?<br>
Message-ID:<br>
        <CAH2WahuQdLZPoWC+2102HKQtGFiATZm15EEvMfoj=<a href="mailto:9HVgO-HcQ@mail.gmail.com">9HVgO-HcQ@mail.gmail.com</a>><br>
Content-Type: text/plain; charset="utf-8"<br>
<br>
I would just look online for all the libraries that currently have a<br>
makerspace or started one until it grew large enough to get their own<br>
space.<br>
Then show those to your library and city council.<br>
I would also find a lot of good examples of what makerspaces do by printing<br>
off a few blog posts from various makerspace websites. Check out the<br>
classes and events from ours to get started:<br>
<a href="http://www.melbournemakerspace.org" rel="noreferrer" target="_blank">www.melbournemakerspace.org</a><br>
<br>
On Jul 17, 2016 6:23 PM, "Kẏra ​" <<a href="mailto:kxra@riseup.net">kxra@riseup.net</a>> wrote:<br>
<br>
<a href="https://twitter.com/Empowermentors/status/651004032597684224" rel="noreferrer" target="_blank">https://twitter.com/Empowermentors/status/651004032597684224</a><br>
<br>
Is there any documentation on working with local public libraries to use<br>
those existing ideologically similar spaces to start a hackerspace? These<br>
types of partnerships seem like they would be naturally symbiotic and<br>
mutually beneficial. I'd like to do this in my city, but I don't really<br>
know what the best practices are. Some successful examples might be<br>
helpful, if nothing else.<br>
<br>
_______________________________________________<br>
Discuss mailing list<br>
<a href="mailto:Discuss@lists.hackerspaces.org">Discuss@lists.hackerspaces.org</a><br>
<a href="http://lists.hackerspaces.org/mailman/listinfo/discuss" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/mailman/listinfo/discuss</a><br>
-------------- next part --------------<br>
An HTML attachment was scrubbed...<br>
URL: <<a href="http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/7d5d14eb/attachment-0001.html" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/7d5d14eb/attachment-0001.html</a>><br>
<br>
------------------------------<br>
<br>
Message: 3<br>
Date: Sun, 17 Jul 2016 21:56:39 -0300<br>
From: Cecilia Tanaka <<a href="mailto:cecilia.tanaka@gmail.com">cecilia.tanaka@gmail.com</a>><br>
To: <a href="mailto:liberationtech@lists.stanford.edu">liberationtech@lists.stanford.edu</a><br>
Cc: Hackerspaces General Discussion List<br>
        <<a href="mailto:discuss@lists.hackerspaces.org">discuss@lists.hackerspaces.org</a>><br>
Subject: [hackerspaces] Fwd: Call for input to President's Commission<br>
        on Enhancing Cybersecurity - bridging the trust gap between the IT<br>
        community and the US government<br>
Message-ID:<br>
        <<a href="mailto:CAG2tMp7Rfb6_P6qLEiJs6qfRWJsJ_uLvuzD0wPZRJYn6fSen%2BQ@mail.gmail.com">CAG2tMp7Rfb6_P6qLEiJs6qfRWJsJ_uLvuzD0wPZRJYn6fSen+Q@mail.gmail.com</a>><br>
Content-Type: text/plain; charset="utf-8"<br>
<br>
- - - Begin forwarded message - - -<br>
<br>
Date: July 15, 2016 at 3:21:32 PM EDT<br>
From: Herb Lin <<a href="mailto:herblin@stanford.edu">herblin@stanford.edu</a>><br>
To: "'David Farber (<a href="mailto:dave@farber.net">dave@farber.net</a>)'" <<a href="mailto:dave@farber.net">dave@farber.net</a>>, ip <<a href="mailto:ip@listbox.com">ip@listbox.com</a><br>
><br>
Subject: Call for input to President's Commission on Enhancing<br>
   Cybersecurity - bridging the trust gap between the IT community<br>
   and the US government<br>
<br>
Dear IPers -<br>
<br>
You may know that President Obama has established a commission to<br>
consider how to strengthen cybersecurity in both the public and<br>
private sectors while protecting privacy, ensuring public safety and<br>
economic and national security, fostering discovery and development<br>
of new technical solutions, and bolstering partnerships between<br>
Federal, State, and local government and the private sector in the<br>
development, promotion, and use of cybersecurity technologies,<br>
policies, and best practices.  (See<br>
<a href="https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity" rel="noreferrer" target="_blank">https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity</a><br>
.)<br>
I am one of the 12 designated commissioners.<br>
<br>
Recognizing that trust is hard to build and easy to destroy (and a<br>
variety of things have happened over the last 20 years have occurred<br>
to do the latter), one issue that has come up is the enormous gap of<br>
trust between the U.S. government and the information technology<br>
(IT) community, from which many IPers are drawn.  This rift is not<br>
helpful to either side, and I'd like to solicit input from the IP<br>
community about what you think the government can do or refrain from<br>
doing to help bridge that gap.<br>
<br>
It would be most helpful if you could three things in your response:<br>
<br>
1 - Your best examples of things the government (and what part of the<br>
US government) has done to alienate the IT community specifically.<br>
(Or, at the very least, show how the examples you provide connect to<br>
the interests of the IT community.)<br>
<br>
2 - Things that the U.S. government could realistically do in the<br>
short and medium term (i.e., 0-10 year time frame) that would help<br>
bridge the trust gap.  If your answer is "Don't do dumb things!", it<br>
would be better and more useful to provide *examples* of what not to<br>
do.<br>
<br>
3 - Things that the U.S. government could realistically do in the<br>
longer term to do the same.<br>
<br>
Please send your responses to <a href="mailto:CENCinput1@gmail.com">CENCinput1@gmail.com</a>.  (I set up this<br>
email address, but I'd like to keep the traffic separate from my<br>
non-Commission work email.)  I promise to read as many as I can<br>
individually and share what I learn with the commission membership.<br>
<br>
Also, feel free to circulate this call for input to anyone else you<br>
feel would want to comment.<br>
<br>
Thanks much<br>
<br>
Herb<br>
<br>
=======================================================================<br>
Herb Lin<br>
Senior Research Scholar, Center for International Security and Cooperation<br>
Research Fellow, Hoover Institution<br>
Stanford University<br>
Stanford, CA  94305  USA<br>
<a href="mailto:herblin@stanford.edu">herblin@stanford.edu</a><br>
<a href="tel:650-497-8600" value="+16504978600">650-497-8600</a> office || <a href="tel:202-841-0525" value="+12028410525">202-841-0525</a> cell || <a href="tel:202-540-9878" value="+12025409878">202-540-9878</a> fax<br>
AIM herblin (any time you see me)<br>
Skype herbert_lin (usually by appointment)<br>
Twitter @HerbLinCyber<br>
This message was sent to the list address and trashed, but can be found<br>
online.<br>
<br>
- - - End forwarded message - - -<br>
-------------- next part --------------<br>
An HTML attachment was scrubbed...<br>
URL: <<a href="http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/d2614bab/attachment-0001.html" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/pipermail/discuss/attachments/20160717/d2614bab/attachment-0001.html</a>><br>
<br>
------------------------------<br>
<br>
Message: 4<br>
Date: Mon, 18 Jul 2016 09:00:41 +0200<br>
From: Walter van Holst <<a href="mailto:walter@revspace.nl">walter@revspace.nl</a>><br>
To: <a href="mailto:discuss@lists.hackerspaces.org">discuss@lists.hackerspaces.org</a><br>
Cc: <a href="mailto:CENCinput1@gmail.com">CENCinput1@gmail.com</a><br>
Subject: Re: [hackerspaces] Fwd: Call for input to President's<br>
        Commission on Enhancing Cybersecurity - bridging the trust gap between<br>
        the IT community and the US government<br>
Message-ID: <<a href="mailto:9200cf27f2169d99ac7897ec96934bcb@xs4all.nl">9200cf27f2169d99ac7897ec96934bcb@xs4all.nl</a>><br>
Content-Type: text/plain; charset=US-ASCII; format=flowed<br>
<br>
On 2016-07-18 02:56, Cecilia Tanaka wrote:<br>
> - - - Begin forwarded message - - -<br>
><br>
> Date: July 15, 2016 at 3:21:32 PM EDT<br>
> From: Herb Lin <<a href="mailto:herblin@stanford.edu">herblin@stanford.edu</a>><br>
> To: "'David Farber (<a href="mailto:dave@farber.net">dave@farber.net</a>)'" <<a href="mailto:dave@farber.net">dave@farber.net</a>>, ip<br>
> <<a href="mailto:ip@listbox.com">ip@listbox.com</a>><br>
> Subject: Call for input to President's Commission on Enhancing<br>
>    Cybersecurity - bridging the trust gap between the IT community<br>
>    and the US government<br>
><br>
> Dear IPers -<br>
><br>
> You may know that President Obama has established a commission to<br>
> consider how to strengthen cybersecurity in both the public and<br>
> private sectors while protecting privacy, ensuring public safety and<br>
> economic and national security, fostering discovery and development<br>
> of new technical solutions, and bolstering partnerships between<br>
> Federal, State, and local government and the private sector in the<br>
> development, promotion, and use of cybersecurity technologies,<br>
> policies, and best practices.  (See<br>
> <a href="https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity" rel="noreferrer" target="_blank">https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity</a>.)<br>
> I am one of the 12 designated commissioners.<br>
><br>
> Recognizing that trust is hard to build and easy to destroy (and a<br>
> variety of things have happened over the last 20 years have occurred<br>
> to do the latter), one issue that has come up is the enormous gap of<br>
> trust between the U.S. government and the information technology<br>
> (IT) community, from which many IPers are drawn.  This rift is not<br>
> helpful to either side, and I'd like to solicit input from the IP<br>
> community about what you think the government can do or refrain from<br>
> doing to help bridge that gap.<br>
<br>
A few things:<br>
<br>
- Stop using "cyberwar" or "cyberattacks" etc. as the framing for<br>
infosec issues. A much more useful frame is infosec as an analog to<br>
public health. Infosec breaches can be potentially be as disruptive as<br>
outbreaks of infectious diseases and every node in the network can be a<br>
part of the problem, just like every citizen can be a carrier of a<br>
disease.<br>
<br>
- Start focusing on incentives for *positive* infosec practices instead<br>
of repressing security research  (e.g. CFAA, recent trade secrets<br>
legislation, lack of reverse engineering exceptions in US copyright<br>
law), for example by thinking about strict liability for vendors that do<br>
not have a form of source code disclosure and for service providers that<br>
do not respond to vulnerability disclosures. Again, from a "disease<br>
control" perspective, the public interest in having a (even remote)<br>
possibility of noticing and fixing security issues overrides any<br>
interests in keeping code proprietary.<br>
<br>
- In that vein, mandatory breach notifications under (near future) EU<br>
Data Protection rules are already shifting the landscape in the EU, it<br>
might be worth looking into that example.<br>
<br>
Regards,<br>
<br>
  Walter<br>
<br>
<br>
------------------------------<br>
<br>
Subject: Digest Footer<br>
<br>
_______________________________________________<br>
Discuss mailing list<br>
<a href="mailto:Discuss@lists.hackerspaces.org">Discuss@lists.hackerspaces.org</a><br>
<a href="http://lists.hackerspaces.org/mailman/listinfo/discuss" rel="noreferrer" target="_blank">http://lists.hackerspaces.org/mailman/listinfo/discuss</a><br>
<br>
<br>
------------------------------<br>
<br>
End of Discuss Digest, Vol 95, Issue 19<br>
***************************************<br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-family:arial;font-size:small"><ul style="margin:0px;padding:0px 0px 8px;border:0px;outline:0px;font-size:12px;font-family:Helvetica,Arial,sans-serif;vertical-align:baseline;list-style:none;line-height:17px;display:table-cell;width:504px;color:rgb(51,51,51)"><li style="margin:0px;padding:8px 12px 2px 0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-size:11px;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:1.2em"><dl style="margin:0px;padding:0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:inherit;word-wrap:break-word"><dd style="margin:0px;padding:2px 9px 1px 0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;font-variant:inherit;line-height:inherit;display:inline-block;zoom:1"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-family:arial;font-size:small"></div><div style="font-family:arial;font-size:small"><ul style="margin:0px;padding:0px 0px 8px;border:0px;outline:0px;font-size:12px;font-family:Helvetica,Arial,sans-serif;vertical-align:baseline;list-style:none;line-height:17px;display:table-cell;width:504px"><li style="margin:0px;padding:8px 12px 2px 0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-size:11px;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:1.2em"><dl style="margin:0px;padding:0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:inherit;word-wrap:break-word"><dd style="font-family:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;line-height:inherit;margin:0px;padding:2px 9px 1px 0px;border:0px;outline:0px;vertical-align:top;display:inline-block;zoom:1"><div><div style="line-height:13.2px;font-family:arial;font-size:small">Kyle </div><div style="line-height:13.2px;font-family:arial;font-size:small"><br></div><div style="line-height:13.2px;font-family:arial;font-size:small">775.848.1006</div><div style="line-height:13.2px;font-family:arial;font-size:small"><ul style="margin:0px;padding:0px 0px 8px;border:0px;outline:0px;font-size:12px;font-family:Helvetica,Arial,sans-serif;vertical-align:baseline;list-style:none;line-height:17px;display:table-cell;width:504px"><li style="margin:0px;padding:8px 12px 2px 0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-size:11px;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:1.2em"><dl style="margin:0px;padding:0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:inherit;word-wrap:break-word"><dd style="font-family:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;line-height:inherit;margin:0px;padding:2px 9px 1px 0px;border:0px;outline:0px;vertical-align:top;display:inline-block;zoom:1"><a href="http://www.linkedin.com/in/kylegmuir/" title="View public profile" name="UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_UNIQUE_ID_SafeHtmlFilter_webProfileURL" style="color:rgb(0,115,178);margin:0px 10px 0px 0px;padding:0px 0px 0px 19px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:middle;text-decoration:none;font-variant:inherit;line-height:inherit;display:inline-block;zoom:1;background:url("https://static.licdn.com/scds/common/u/images/apps/profile/sprite/sprite_profile_top_card_v8.png") 0px -299px no-repeat" target="_blank">www.linkedin.com/in/kylegmuir/</a></dd><dd style="font-family:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;line-height:inherit;margin:0px;padding:2px 9px 1px 0px;border:0px;outline:0px;vertical-align:top;display:inline-block;zoom:1"></dd><dd style="font-family:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;line-height:inherit;margin:0px;padding:2px 9px 1px 0px;border:0px;outline:0px;vertical-align:top;display:inline-block;zoom:1"><dl style="margin:0px;padding:0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:inherit;word-wrap:break-word"><b style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:x-small;line-height:normal"><dl style="margin:0px;padding:0px;border:0px;outline:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;font-variant:inherit;line-height:inherit;word-wrap:break-word"><b><span style="font-family:Arial,sans-serif"><br></span></b></dl></b><b style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:x-small;line-height:normal"><span style="font-family:Arial,sans-serif">CONFIDENTIALITY ---</span></b><span style="color:rgb(34,34,34);font-size:x-small;line-height:normal;font-family:Arial,sans-serif"> This email is directed only to the person or entity to whom it is addressed, and the contents hereof and any attachments hereto are intended to be strictly confidential and may otherwise be subject to the attorney-client privilege and/or the work-product doctrine, and should not, therefore, be in any way copied, distributed, or disclosed to other parties. If you have received this message by error, please reply by email to inform us and delete any copies from your hard drive. Thank you.</span></dl></dd></dl></li></ul></div></div></dd></dl></li></ul></div></div></div></div></dd></dl></li></ul></div></div></div></div></div></div></div></div></div></div></div></div>
</div>