All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate
Terrorism, Crime, and Public Policy describes the problem of terrorism; compares it to other forms of aggression, particularly crime and war; and discusses poli
This book examines the UK’s response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully