O
Meeting Participants and Other Contributors

MEETING PARTICIPANTS

The Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals held five meetings starting in 2006. These meetings included information-gathering sessions open to the public, as well as closed segments for committee deliberation. The committee heard from numerous presenters at these meetings. They include the following by meeting date and session.


April 27-28, 2006


Session 1: Deception Detection and Reducing Errors


Paul Ekman, University of California, San Francisco

Henry Greely, Stanford University School of Law

Barry Steinhardt, Technology and Liberty Program, American Civil Liberties Union

John Woodward, Intelligence Policy Center, Rand Corporation

Tom Zeffiro, Center for Functional and Molecular Imaging, Georgetown University


Session 2: Communications


Clint C. Brooks, National Security Agency (retired)

Whitfield Diffie, Sun Microsystems

John Pike, Director, GlobalSecurity.Org

Jody Westby, Global Cyber Risk, University of California



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 349
O Meeting Participants and Other Contributors MEETING PARTICIPANTS The Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals held five meetings starting in 2006. These meetings included information-gathering sessions open to the public, as well as closed segments for committee deliberation. The committee heard from numerous presenters at these meetings. They include the following by meeting date and session. April 27-28, 2006 Session 1: Deception Detection and Reducing Errors Paul Ekman, University of California, San Francisco Henry Greely, Stanford University School of Law Barry Steinhardt, Technology and Liberty Program, American Civil Liberties Union John Woodward, Intelligence Policy Center, Rand Corporation Tom Zeffiro, Center for Functional and Molecular Imaging, Georgetown University Session 2: Communications Clint C. Brooks, National Security Agency (retired) Whitfield Diffie, Sun Microsystems John Pike, Director, GlobalSecurity.Org Jody Westby, Global Cyber Risk, University of California 

OCR for page 349
0 PROTECTING INDIVIDUAL PRIVACY IN THE STRUGGLE AGAINST TERRORISTS Session 3: Data Mining Randy Ferryman, U.S. National Counter Terrorism Center John Hollywood, Rand Corporation David Jensen, Knowledge Discovery Laboratory, University of Massachusetts, Amherst Jeff Jonas, Entity Analytic Systems, IBM Corporation David Scott, Rice University Kim Taipale, Center for Advanced Studies in Science and Technology Policy July 27-28, 2006 Session 1: Privacy Laws and Concepts; Law and Policy Revision Efforts Lee Tien, Electronic Frontier Foundation Session 2: Law Enforcement, Counter-Terrorism, and Privacy Philip R. Reitinger, Trustworthy Computing, Microsoft Corporation Session 3: Data Mining in the Commercial World Scott Loftesness, Glenbrook Partners Dan Schutzer, Financial Services Technology Consortium October 26-27, 2006 Session 1: Providing a National Perspective Adm. Scott Redd, National Counter Terrorism Center Session 2: Law Enforcement Intelligence Michael Fedarcyk, Bearingpoint and Federal Bureau of Investigation (retired) Roy I. Apseloff, National Media Exploitation Center Joe Connell, Counter-Terrorist Command, New Scotland Yard Session 3: Status of Research on Deception Detection Technologies Mark Frank, University at Buffalo Rafi Ron, Ben Gurion Airport, Israel (retired) and Boston Logan Airport

OCR for page 349
 APPENDIX O Session 4: Bio-Surveillance Technology and Privacy Issues James V. Lawler, Homeland Security Council, White House Lynn Steele, Emergency Preparedness and Response, Centers for Disease Control and Prevention (CDC) Barry Rhodes, Emergency Preparedness and Response, CDC Farzad Mostashari, New York City Public Health Department Patricia Quinlisk, State of Iowa Session 5: Data Linkages William E. Winkler, U.S. Census Bureau Session 6: Presentation on DHS Data System Activities Lisa J. Walby, Transportation Security Administration, Department of Homeland Security (DHS) Sandy Landsberg, Science and Technology Directorate, DHS January 18-19, 2007 Closed Meeting March 29-30, 2007 Closed Meeting OTHER CONTRIBUTIONS From January 1 to March 1, 2007, the committee solicited well-reasoned white papers that identified and discussed issues relevant to the use of data mining, information fusion, and deception detection technologies as they relate to the twin goals of protecting privacy and pursuing terrorism prevention, law enforcement, and public health. The following papers were submitted for the committee’s review: Michael D. Larsen. 2007. “Record Linkage, Nondisclosure, Counterterrorism, and Statistics.” Department of Statistics and Center for Survey Statistics and Methodology, Iowa State University. Peter Swire. 2006. “Privacy and information sharing in the war on terrorism.” Villanoa Law Reiew 51, available at http://ssrn. com/abstract=899626.

OCR for page 349
 PROTECTING INDIVIDUAL PRIVACY IN THE STRUGGLE AGAINST TERRORISTS In response to the call for papers, the DHS Data Privacy and Integrity Advisory Committee1 transmitted the following five reports: Data Privacy and Integrity Advisory Committee. 2006. The Use of RFID for Human Identity Verification. Report No. 2006-02. Adopted December 6, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. The Use of Commercial Data. Report No. 2006-03. Adopted December 6, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. Framework for Priacy Analysis of Programs, Technologies, and Applications. Report No. 2006-01. Adopted March 7, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. Recommendations on the Secure Flight Program. Report No. 2005-02. Adopted December 6, 2005. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2005. The Use of Commercial Data to Reduce False Posities in Screening Programs. Report No. 2005-01. Adopted September 28, 2005. DHS, Washington, D.C. 1 See http://www.dhs.gov/xinfoshare/committees/editorial_0512.shtm for more infor- mation on the DHS Data Privacy and Integrity Advisory Committee.