Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists
Author :
Publisher : National Academies Press
Total Pages : 377
Release :
ISBN-10 : 9780309124881
ISBN-13 : 0309124883
Rating : 4/5 (883 Downloads)

Book Synopsis Protecting Individual Privacy in the Struggle Against Terrorists by : National Research Council

Download or read book Protecting Individual Privacy in the Struggle Against Terrorists written by National Research Council and published by National Academies Press. This book was released on 2008-10-26 with total page 377 pages. Available in PDF, EPUB and Kindle. Book excerpt: All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

Protecting Individual Privacy in the Struggle Against Terrorists Related Books

Making the Nation Safer
Language: en
Pages: 440
Authors: National Research Council
Categories: Political Science
Type: BOOK - Published: 2002-10-05 - Publisher: National Academies Press

GET EBOOK

Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures â€" transportation, information and telecommunications systems
Counterterrorism Technology Sharing
Language: en
Pages: 96
Authors: United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities
Categories: History
Type: BOOK - Published: 2006 - Publisher:

GET EBOOK

Emergent Information Technologies and Enabling Policies for Counter-Terrorism
Language: en
Pages: 486
Authors: Robert L. Popp
Categories: Computers
Type: BOOK - Published: 2006-04-28 - Publisher: John Wiley & Sons

GET EBOOK

Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "conn
Network Technologies for Networked Terrorists
Language: en
Pages: 112
Authors: Bruce W. Don
Categories: Political Science
Type: BOOK - Published: 2007 - Publisher: Rand Corporation

GET EBOOK

Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer
Technology and Terrorism
Language: en
Pages: 38
Authors: Stephen R. Bowers
Categories: Technology
Type: BOOK - Published: 1998 - Publisher:

GET EBOOK