Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.
OCR for page 349
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment O Meeting Participants and Other Contributors MEETING PARTICIPANTS The Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals held five meetings starting in 2006. These meetings included information-gathering sessions open to the public, as well as closed segments for committee deliberation. The committee heard from numerous presenters at these meetings. They include the following by meeting date and session. April 27-28, 2006 Session 1: Deception Detection and Reducing Errors Paul Ekman, University of California, San Francisco Henry Greely, Stanford University School of Law Barry Steinhardt, Technology and Liberty Program, American Civil Liberties Union John Woodward, Intelligence Policy Center, Rand Corporation Tom Zeffiro, Center for Functional and Molecular Imaging, Georgetown University Session 2: Communications Clint C. Brooks, National Security Agency (retired) Whitfield Diffie, Sun Microsystems John Pike, Director, GlobalSecurity.Org Jody Westby, Global Cyber Risk, University of California
OCR for page 350
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment Session 3: Data Mining Randy Ferryman, U.S. National Counter Terrorism Center John Hollywood, Rand Corporation David Jensen, Knowledge Discovery Laboratory, University of Massachusetts, Amherst Jeff Jonas, Entity Analytic Systems, IBM Corporation David Scott, Rice University Kim Taipale, Center for Advanced Studies in Science and Technology Policy July 27-28, 2006 Session 1: Privacy Laws and Concepts; Law and Policy Revision Efforts Lee Tien, Electronic Frontier Foundation Session 2: Law Enforcement, Counter-Terrorism, and Privacy Philip R. Reitinger, Trustworthy Computing, Microsoft Corporation Session 3: Data Mining in the Commercial World Scott Loftesness, Glenbrook Partners Dan Schutzer, Financial Services Technology Consortium October 26-27, 2006 Session 1: Providing a National Perspective Adm. Scott Redd, National Counter Terrorism Center Session 2: Law Enforcement Intelligence Michael Fedarcyk, Bearingpoint and Federal Bureau of Investigation (retired) Roy I. Apseloff, National Media Exploitation Center Joe Connell, Counter-Terrorist Command, New Scotland Yard Session 3: Status of Research on Deception Detection Technologies Mark Frank, University at Buffalo Rafi Ron, Ben Gurion Airport, Israel (retired) and Boston Logan Airport
OCR for page 351
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment Session 4: Bio-Surveillance Technology and Privacy Issues James V. Lawler, Homeland Security Council, White House Lynn Steele, Emergency Preparedness and Response, Centers for Disease Control and Prevention (CDC) Barry Rhodes, Emergency Preparedness and Response, CDC Farzad Mostashari, New York City Public Health Department Patricia Quinlisk, State of Iowa Session 5: Data Linkages William E. Winkler, U.S. Census Bureau Session 6: Presentation on DHS Data System Activities Lisa J. Walby, Transportation Security Administration, Department of Homeland Security (DHS) Sandy Landsberg, Science and Technology Directorate, DHS January 18-19, 2007 Closed Meeting March 29-30, 2007 Closed Meeting OTHER CONTRIBUTIONS From January 1 to March 1, 2007, the committee solicited well-reasoned white papers that identified and discussed issues relevant to the use of data mining, information fusion, and deception detection technologies as they relate to the twin goals of protecting privacy and pursuing terrorism prevention, law enforcement, and public health. The following papers were submitted for the committee’s review: Michael D. Larsen. 2007. “Record Linkage, Nondisclosure, Counterterrorism, and Statistics.” Department of Statistics and Center for Survey Statistics and Methodology, Iowa State University. Peter Swire. 2006. “Privacy and information sharing in the war on terrorism.” Villanova Law Review 51, available at http://ssrn.com/abstract=899626.
OCR for page 352
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment In response to the call for papers, the DHS Data Privacy and Integrity Advisory Committee1 transmitted the following five reports: Data Privacy and Integrity Advisory Committee. 2006. The Use of RFID for Human Identity Verification. Report No. 2006-02. Adopted December 6, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. The Use of Commercial Data. Report No. 2006-03. Adopted December 6, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. Framework for Privacy Analysis of Programs, Technologies, and Applications. Report No. 2006-01. Adopted March 7, 2006. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2006. Recommendations on the Secure Flight Program. Report No. 2005-02. Adopted December 6, 2005. DHS, Washington, D.C. Data Privacy and Integrity Advisory Committee. 2005. The Use of Commercial Data to Reduce False Positives in Screening Programs. Report No. 2005-01. Adopted September 28, 2005. DHS, Washington, D.C. 1 See http://www.dhs.gov/xinfoshare/committees/editorial_0512.shtm for more information on the DHS Data Privacy and Integrity Advisory Committee.