. "Appendix K: Behavioral-Surveillance Techniques and Technologies." Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press, 2008.
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
the collection of physiological and biological data, whereas data-mining is a technique for analyzing already-collected data.
Degree of intrusiveness. Traditional jurisprudence and ethics generally regard a person’s body as worthy of a higher degree of protection than his or her information, residences, or possessions. Thus, techniques that require the collection of physiological and biological data (especially data relevant to one’s thoughts) are arguably more intrusive than collection schemes directed at different kinds of personal data.