Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists
Author :
Publisher : National Academies Press
Total Pages : 377
Release :
ISBN-10 : 9780309124881
ISBN-13 : 0309124883
Rating : 4/5 (883 Downloads)

Book Synopsis Protecting Individual Privacy in the Struggle Against Terrorists by : National Research Council

Download or read book Protecting Individual Privacy in the Struggle Against Terrorists written by National Research Council and published by National Academies Press. This book was released on 2008-10-26 with total page 377 pages. Available in PDF, EPUB and Kindle. Book excerpt: All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.


Protecting Individual Privacy in the Struggle Against Terrorists Related Books

Protecting Individual Privacy in the Struggle Against Terrorists
Language: en
Pages: 377
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 2008-10-26 - Publisher: National Academies Press

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate
Responsible Research
Language: en
Pages: 312
Authors: Institute of Medicine
Categories: Medical
Type: BOOK - Published: 2003-01-06 - Publisher: National Academies Press

DOWNLOAD EBOOK

When 18-year-old Jesse Gelsinger died in a gene transfer study at the University of Pennsylvania, the national spotlight focused on the procedures used to ensur
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
Language: en
Pages: 284
Authors: Orin S. Kerr
Categories: Computer crimes
Type: BOOK - Published: 2001 - Publisher:

DOWNLOAD EBOOK

Activity Report of the Committee on Energy and Commerce of the U.S. House of Representatives ... Together with Dissenting Views
Language: en
Pages: 72
Authors: United States. Congress. House. Committee on Energy and Commerce
Categories: Energy policy
Type: BOOK - Published: 2011 - Publisher:

DOWNLOAD EBOOK

Report on the Activities of the Committee on the Judiciary of the United States Senate During the ... Congress
Language: en
Pages: 96
Authors: United States. Congress. Senate. Committee on Appropriations
Categories: Administrative agencies
Type: BOOK - Published: 1996 - Publisher:

DOWNLOAD EBOOK