Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists
Author :
Publisher : National Academies Press
Total Pages : 376
Release :
ISBN-10 : 9780309134446
ISBN-13 : 0309134447
Rating : 4/5 (447 Downloads)

Book Synopsis Protecting Individual Privacy in the Struggle Against Terrorists by : National Research Council

Download or read book Protecting Individual Privacy in the Struggle Against Terrorists written by National Research Council and published by National Academies Press. This book was released on 2008-09-26 with total page 376 pages. Available in PDF, EPUB and Kindle. Book excerpt: All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.


Protecting Individual Privacy in the Struggle Against Terrorists Related Books

Protecting Individual Privacy in the Struggle Against Terrorists
Language: en
Pages: 376
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 2008-09-26 - Publisher: National Academies Press

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate
Responsible Research
Language: en
Pages: 313
Authors: Institute of Medicine
Categories: Medical
Type: BOOK - Published: 2003-02-06 - Publisher: National Academies Press

DOWNLOAD EBOOK

When 18-year-old Jesse Gelsinger died in a gene transfer study at the University of Pennsylvania, the national spotlight focused on the procedures used to ensur
Activity Report of the Committee on Energy and Commerce of the U.S. House of Representatives ... Together with Dissenting Views
Language: en
Pages: 72
Authors: United States. Congress. House. Committee on Energy and Commerce
Categories: Energy policy
Type: BOOK - Published: 2011 - Publisher:

DOWNLOAD EBOOK

Report on the Activities of the Committee on the Judiciary of the United States Senate During the ... Congress
Language: en
Pages: 96
Authors: United States. Congress. Senate. Committee on Appropriations
Categories: Administrative agencies
Type: BOOK - Published: 1996 - Publisher:

DOWNLOAD EBOOK

Federal government information technology : management, security, and congressional oversight.
Language: en
Pages: 195
Authors:
Categories:
Type: BOOK - Published: - Publisher: DIANE Publishing

DOWNLOAD EBOOK