National Academies Press: OpenBook
« Previous: Appendixes
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

A
Acronyms

9-11 reference to the terrorist attacks on the U.S. that occurred September 11, 2001

ACE Automated Commercial Environment

ACS Automated Commercial System

ADVISE Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement

All-WME all weapons of mass effect

ANFO ammonium nitrate/fuel oil

ANNM ammonium nitrate nitromethane

ANS autonomic nervous system

APS Advance Passenger Information System

AQ Al Qaeda

ARCOS Automation of Reports of Consolidated Orders System

ARPA Advanced Research Projects Agency

ATF Bureau of Alcohol, Tobacco, and Firearms

ATM automated teller machine

ATS Automated Targeting System

BATS Bomb Arson Tracking System

BKC Biodefense Knowledge Center

BSA Bank Secrecy Act

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

CAAIOPEE (KDD application)

CAGR Compound Annual Growth Rate

CALEA Communications Assistance for Law Enforcement Act of 1994

CAPPS-II Computer-Assisted Passenger Prescreening System II

CART Computer Analysis and Response Team

CBP Customs and Border Protection

CCTV closed circuit television

CDC Centers for Disease Control and Prevention

CDR call data record

CDT Center for Democracy and Technology

CIA Central Intelligence Agency

CIPSEA Confidential Information Protection and Statistical Efficiency Act

CMIR International Transportation of Currency or Monetary Instruments Report

CMS Centers for Medicare and Medicaid Services

COBIT Control Objectives for Information and Related Technologies

CONUS continental United States

COTS commercial off-the-shelf

CPNI Customer Proprietary Network Information

CRS Congressional Research Service

CTR Currency Transaction Report

CTRC Currency Transaction Report by Casinos

CVS Crew Vetting System

DARPA Defense Advanced Research Projects Agency

DARTTS Data Analysis and Research for Trade Transparency System

DEA Drug Enforcement Administration

DEP Designation of Exempt Person

DHS Department of Homeland Security

DME durable medical equipment

DMV Department of Motor Vehicles

DNA deoxyribonucleic acid

DOD Department of Defense

DOD-IG Department of Defense Inspector General

DOJ Department of Justice

DOT Department of Transportation

DT&E developmental test and evaluation

DTL Drug Theft Loss

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

DTO Disruptive Technology Office

ECPA Electronic Communications Privacy Act

ED emergency department

EDW Enterprise Data Warehouse

EEG electroencephlalograph

EFF Electronic Frontier Foundation

EMG electromyelogram

ETA Euskadi Ta Askatasuna (terrorist organization)

FAA Federal Aviation Administration

FACTS Factual Analysis Criminal Threat Solution

FBAR Foreign Bank and Financial Accounts Report

FBI Federal Bureau of Investigation

FCC Federal Communications Commission

FDA Food and Drug Administration

FDLE Florida Department of Law Enforcement

FDNS-DS Fraud Detection and National Security Data System

FinCEN Financial Crimes Enforcement Network

FISA Foreign Intelligence Surveillance Act

fMRI functional magnetic resonance imaging

FOIA Freedom of Information Act

FTC Federal Trade Commission

FTTTF Foreign Terrorist Tracking Task Force

GAO Government Accountability Office

HHS Department of Health and Human Services

HIPPA Health Insurance Portability and Accountability Act

HTF High Terrorist Factor

I2F Intelligence and Information Fusion

IAO Information Awareness Office

IC3 Internet Crime Complaint Center

ICE Immigration and Customs Enforcement

ICEPIC ICE Pattern Analysis and Information Collection System

ICHAST Interagency Center for Applied Homeland Security

ICU Intensive Care Unit

ID identification

IDW Investigative Data Warehouse

IIR Institute for Intergovernmental Research

IP Internet Protocol

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

IRA Irish Republican Army

IRS Internal Revenue Service

IRSS Institute for Research in Social Science

ISO International Organization for Standards

ISP Internet service provider

IT information technology

ITIL IT Infrastructure Library

IV&V independent verification and validation

KDD knowledge, discovery in databases

LEA law enforcement agencies

LI lawful intercepts

LLNL Lawrence Livermore National Laboratory

LTTE Liberation Tigers of Tamil Eelam (terrorist organization)

MATRIX Multi-State Anti-Terrorism Information Exchange

MEG magneto-encephalography

MERGE-PURGE (KDD application)

MSB Money Service Business

NASA National Aeronautics and Space Administration

NCTC National Counterterrorism Center

NETLEADS Law Enforcement Analytic Data System

NIISO National Immigration Information Sharing Office

NIMD Novel Intelligence from Massive Data

NIPS Numerical Integrated Processing System

NIST National Institute of Standards and Technology

NORA Non-Obvious Relationships Awareness

NRC National Research Council

NSA National Security Administration

NW3C National White Collar Crime Center

NYC New York City

NYCDOH New York City Department of Health

OCDETF Organized Crime and Drug Enforcement Task Force

OECD Organization for Economic Cooperation and Development

OIP Online Investigative Project

OMB Office of Management and Budget

OTA Office of Technology Assessment

OTC over-the-counter

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

OT&E operational test and evaluation

PARC Palo Alto Research Center

PDA personal digital assistant

PET Positron Emission Tomography

PII personally identifiable information

PKK Kurdistan Workers Party (terrorist organization)

PNR Passenger Name Record

PUMS Public Use Microdata Sample

QID Questioned Identification Documents

R&D research and development

RAF Red Army Faction (terrorist organization)

RDD random-digit-dialed

RFID radio-frequency identification

RR3 response rate (category 3)1

RR4 response rate (category 4)2

RTAS Remote Threat Alerting System

S&T science and technology

SAR Suspicious Activity Report

SEC Securities and Exchange Commission

SKYCAT (KDD application)

SQL Structured Query Language

SSN Social Security number

STAR System-To-Assess Risk

SWIFT Society for Worldwide Interbank Financial Telecommunication

TAPAC DOD Technology and Privacy Advisory Committee

TASA Telecommunications Alarm-Sequence Analyzer (KDD application)

TB terabyte

TECS Treasury Enforcement Communications System

TIA Total/Terrorist Information Awareness program

TISS Tactical Information Sharing System

TSA Transportation Security Administration

TVIS Threat Vulnerability Integration System

1

See more information at http://www.pol.niu.edu/response.html.

2

See more information at http://www.pol.niu.edu/response.html.

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

URL uniform resource locator

USA PATRIOT Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

USSOCOM United States Special Operations Command

VoIP Voice over Internet Protocol

WMD weapons of mass destruction

WME weapons of mass effect

Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 105
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 106
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 107
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 108
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 109
Suggested Citation:"Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 110
Next: Appendix B: Terrorism and Terrorists »
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment Get This Book
×
Buy Paperback | $67.00 Buy Ebook | $54.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress.

Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!