Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists
Author :
Publisher : National Academies Press
Total Pages : 377
Release :
ISBN-10 : 9780309124881
ISBN-13 : 0309124883
Rating : 4/5 (883 Downloads)

Book Synopsis Protecting Individual Privacy in the Struggle Against Terrorists by : National Research Council

Download or read book Protecting Individual Privacy in the Struggle Against Terrorists written by National Research Council and published by National Academies Press. This book was released on 2008-10-26 with total page 377 pages. Available in PDF, EPUB and Kindle. Book excerpt: All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.


Protecting Individual Privacy in the Struggle Against Terrorists Related Books

Protecting Individual Privacy in the Struggle Against Terrorists
Language: en
Pages: 377
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 2008-10-26 - Publisher: National Academies Press

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate
Science and Technology to Counter Terrorism
Language: en
Pages: 180
Authors: International Strategic and Security Studies Programme of the National Institute of Advanced Studies
Categories: Political Science
Type: BOOK - Published: 2007-03-27 - Publisher: National Academies Press

DOWNLOAD EBOOK

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of
Counterterrorism Technology Sharing
Language: en
Pages: 96
Authors: United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities
Categories: History
Type: BOOK - Published: 2006 - Publisher:

DOWNLOAD EBOOK

Emergent Information Technologies and Enabling Policies for Counter-Terrorism
Language: en
Pages: 486
Authors: Robert L. Popp
Categories: Computers
Type: BOOK - Published: 2006-04-28 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "conn
Making the Nation Safer
Language: en
Pages: 440
Authors: National Research Council
Categories: Political Science
Type: BOOK - Published: 2002-10-05 - Publisher: National Academies Press

DOWNLOAD EBOOK

Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures â€" transportation, information and telecommunications systems