Politech mailing list archives

Technical and privacy dimensions of terrorism prevention -- NRC call for papers [priv]


From: Declan McCullagh <declan () well com>
Date: Mon, 23 Oct 2006 22:51:04 -0700

The NRC's work in this area can be very influential and is worth paying attention to; the so-called CRISIS report on cryptography in 1996 certainly was:
http://www.nap.edu/catalog/5131.html

-Declan

-------- Original Message --------
Subject: CALL FOR PAPERS - Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals
Date: Mon, 18 Sep 2006 17:54:16 -0400
From: Lin, Herb <HLin () nas edu>
To: Declan McCullagh <declan () well com>

Declan - if you'd post this to Politech, I'd be grateful.

Tnx herb
===

> PLEASE POST WIDELY
>
> CALL FOR INPUT > -> National Research Council Project on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals
>
> This project is intended to develop a conceptual and organizational framework with which policy makers and the public can consider the tradeoffs between individual and corporate privacy rights and collective and individual security. This framework will be applied to any data collected on individuals and organizations for the purpose of developing intelligence, research, or statistical information intended to be shared across federal agencies, among federal, state, and local agencies, and between the government and the private sector to help thwart terrorist acts in the United States. It will pay specific attention to the purposes for which data are collected and the development of new approaches to safeguarding information essential to the nation's security interests. The project will particularly focus on both the privacy and security concerns that are likely to arise in the minds of the public and the privacy research and advocacy communities.
>
> To facilitate its study, the NRC's Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals seeks white papers and other comments from interested parties on topics relevant to the use of data mining, information fusion, and deception detection technologies as they relate to terrorism prevention, law enforcement, and public health. The papers received will serve to inform the committee, and will be posted on the project web site <http://terrorismandprivacy.org > for at least the duration of the project.
>
> At the discretion of the NRC, selected authors may be invited to address the committee about their analysis, findings, and conclusions, and some papers may be included as appendixes to the Committee> '> s final report. The Committee may also reference the submitted materials, and include them or portions of them in its report. Individuals not wishing to submit a paper are invited to send any comments they wish on this subject to PRIVTERR_INPUT () LSW NAS EDU. Serious comments will be transmitted to the committee.
>
> CALL FOR WHITE PAPERS: CRITERIA
>
> SUBSTANTIVE REQUIREMENTS
>
> The NRC Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals seeks well-reasoned White Papers that identify and discuss issues relevant to the use of data mining, information fusion, and deception detection technologies as they relate to the twin goals of protecting privacy and pursuing terrorism prevention, law enforcement, and public health. Some of the topics of interest to the committee include
>
> * Analytical criteria for making tradeoffs between privacy and national interests such as terrorism prevention, law enforcement, and public health. > * The potential (or lack thereof) for technology to reduce or mitigate tradeoffs between privacy and security. > * Technical limitations inherent in technologies for data mining, information fusion, and deception detection. > * Legal and policy regimes that should govern the use of these technologies. > * Strategies for more effective focusing of law enforcement and/or counter-intelligence efforts directed against terrorism.
> *  Privacy implications of deception detection technologies.
> * Recourse or redress mechanisms appropriate to invoke if and when individuals suffer from > "> false positives> "> originating in technologies for data mining or deception detection. > * Evaluating data mining technologies (e.g., the impact of data quality on effectiveness, the effectiveness of various algorithms, assessing false positive and false negative rates for algorithms). > > * Differences and similarities in the analytical processes needed for law enforcement activities as compared to counter-terrorism activities. > * Adequacy or inadequacy of laws governing surveillance policies and practices; governing analytical use of information derived from surveillance. > * Utility (or lack thereof) of data collected by Federal statistical agencies for counter-terrorism, law enforcement, and public health purposes, > * Privacy and civil liberties implications of sharing information derived in or uncovered in law enforcement investigations with intelligence authorities. > * Similarities and differences between information gathering and analysis for law enforcement activities against violent crime vs law enforcement activities against white-collar crime.
>
> Committee interests are not limited to these topics, and prospective authors can choose topics not listed.
>
> PROCEDURAL REQUIREMENTS
>
> Papers must be:
>
> 1. double-spaced, and no longer than approximately 6,250 words;
>
> 2. submitted electronically via email to PRIVTERR_INPUT () LSW NAS EDU.
>
> 3. signed by a principal of the organization, group, or firm (if intended to represent the views of an organization, group, or firm), or signed by an individual (if intended to represent his or her views as an individual);
>
> 4. accompanied by a physically signed National Research Council copyright agreement (available at http://cstb.org/terrorismandprivacy/copyright.pdf) faxed to 202-334-2318 or scanned into an image and transmitted along with the paper. This copyright agreement must be signed by all authors of the paper.
>
> 5. properly referenced (with reference citations included as endnotes rather than footnotes to facilitate posting).
>
> 6. Received at the NRC in electronic form no later than the close of business on March 1, 2007.
>
> Papers that do not conform to these requirements or received after March 1, 2007 may not be brought to the attention of the committee.
>
> For more information, please visit the project web site <http://terrorismandprivacy.org> or contact Herb Lin at 202-334-3191 or hlin () nas edu.
>
>
> ____________________________________________
> Herb Lin, Senior Scientist
> Computer Science and Telecommunications Board
> The National Academies
> (202) 334-3191 voice || (202) 334-2318 fax || hlin () nas edu
> www.cstb.org || Where the nation turns for independent and informed assessments of computing, communications, and public policy
>
>

_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)


Current thread: