National Academies Press: OpenBook

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment (2008)

Chapter: Appendix O: Meeting Participants and Other Contributors

« Previous: Appendix N: Committee and Staff Biographical Information
Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

O
Meeting Participants and Other Contributors

MEETING PARTICIPANTS

The Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals held five meetings starting in 2006. These meetings included information-gathering sessions open to the public, as well as closed segments for committee deliberation. The committee heard from numerous presenters at these meetings. They include the following by meeting date and session.


April 27-28, 2006


Session 1: Deception Detection and Reducing Errors


Paul Ekman, University of California, San Francisco

Henry Greely, Stanford University School of Law

Barry Steinhardt, Technology and Liberty Program, American Civil Liberties Union

John Woodward, Intelligence Policy Center, Rand Corporation

Tom Zeffiro, Center for Functional and Molecular Imaging, Georgetown University


Session 2: Communications


Clint C. Brooks, National Security Agency (retired)

Whitfield Diffie, Sun Microsystems

John Pike, Director, GlobalSecurity.Org

Jody Westby, Global Cyber Risk, University of California

Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

Session 3: Data Mining

Randy Ferryman, U.S. National Counter Terrorism Center

John Hollywood, Rand Corporation

David Jensen, Knowledge Discovery Laboratory, University of Massachusetts, Amherst

Jeff Jonas, Entity Analytic Systems, IBM Corporation David Scott, Rice University

Kim Taipale, Center for Advanced Studies in Science and Technology Policy


July 27-28, 2006


Session 1: Privacy Laws and Concepts; Law and Policy Revision Efforts


Lee Tien, Electronic Frontier Foundation


Session 2: Law Enforcement, Counter-Terrorism, and Privacy


Philip R. Reitinger, Trustworthy Computing, Microsoft Corporation


Session 3: Data Mining in the Commercial World


Scott Loftesness, Glenbrook Partners

Dan Schutzer, Financial Services Technology Consortium


October 26-27, 2006


Session 1: Providing a National Perspective


Adm. Scott Redd, National Counter Terrorism Center


Session 2: Law Enforcement Intelligence


Michael Fedarcyk, Bearingpoint and Federal Bureau of Investigation (retired)

Roy I. Apseloff, National Media Exploitation Center

Joe Connell, Counter-Terrorist Command, New Scotland Yard


Session 3: Status of Research on Deception Detection Technologies


Mark Frank, University at Buffalo

Rafi Ron, Ben Gurion Airport, Israel (retired) and Boston Logan Airport

Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

Session 4: Bio-Surveillance Technology and Privacy Issues


James V. Lawler, Homeland Security Council, White House

Lynn Steele, Emergency Preparedness and Response, Centers for Disease Control and Prevention (CDC)

Barry Rhodes, Emergency Preparedness and Response, CDC

Farzad Mostashari, New York City Public Health Department

Patricia Quinlisk, State of Iowa


Session 5: Data Linkages


William E. Winkler, U.S. Census Bureau


Session 6: Presentation on DHS Data System Activities


Lisa J. Walby, Transportation Security Administration, Department of Homeland Security (DHS)

Sandy Landsberg, Science and Technology Directorate, DHS


January 18-19, 2007


Closed Meeting


March 29-30, 2007


Closed Meeting

OTHER CONTRIBUTIONS

From January 1 to March 1, 2007, the committee solicited well-reasoned white papers that identified and discussed issues relevant to the use of data mining, information fusion, and deception detection technologies as they relate to the twin goals of protecting privacy and pursuing terrorism prevention, law enforcement, and public health. The following papers were submitted for the committee’s review:

Michael D. Larsen. 2007. “Record Linkage, Nondisclosure, Counterterrorism, and Statistics.” Department of Statistics and Center for Survey Statistics and Methodology, Iowa State University.

Peter Swire. 2006. “Privacy and information sharing in the war on terrorism.” Villanova Law Review 51, available at http://ssrn.com/abstract=899626.

Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×

In response to the call for papers, the DHS Data Privacy and Integrity Advisory Committee1 transmitted the following five reports:

Data Privacy and Integrity Advisory Committee. 2006. The Use of RFID for Human Identity Verification. Report No. 2006-02. Adopted December 6, 2006. DHS, Washington, D.C.

Data Privacy and Integrity Advisory Committee. 2006. The Use of Commercial Data. Report No. 2006-03. Adopted December 6, 2006. DHS, Washington, D.C.

Data Privacy and Integrity Advisory Committee. 2006. Framework for Privacy Analysis of Programs, Technologies, and Applications. Report No. 2006-01. Adopted March 7, 2006. DHS, Washington, D.C.

Data Privacy and Integrity Advisory Committee. 2006. Recommendations on the Secure Flight Program. Report No. 2005-02. Adopted December 6, 2005. DHS, Washington, D.C.

Data Privacy and Integrity Advisory Committee. 2005. The Use of Commercial Data to Reduce False Positives in Screening Programs. Report No. 2005-01. Adopted September 28, 2005. DHS, Washington, D.C.

1

See http://www.dhs.gov/xinfoshare/committees/editorial_0512.shtm for more information on the DHS Data Privacy and Integrity Advisory Committee.

Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 349
Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 350
Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 351
Suggested Citation:"Appendix O: Meeting Participants and Other Contributors." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
×
Page 352
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment Get This Book
×
Buy Paperback | $67.00 Buy Ebook | $54.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress.

Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!