AOH :: PT-1391.HTM

Technical and privacy dimensions of terrorism prevention -- NRC call for papers

Technical and privacy dimensions of terrorism prevention -- NRC call for papers
Technical and privacy dimensions of terrorism prevention -- NRC call for papers



The NRC's work in this area can be very influential and is worth paying 
attention to; the so-called CRISIS report on cryptography in 1996 
certainly was:
http://www.nap.edu/catalog/5131.html 

-Declan

-------- Original Message --------
Subject: CALL FOR PAPERS - Technical and Privacy Dimensions of 
Information for Terrorism Prevention and Other National Goals
Date: Mon, 18 Sep 2006 17:54:16 -0400
From: Lin, Herb  
To: Declan McCullagh  

Declan - if you'd post this to Politech, I'd be grateful.

Tnx herb
==
 > PLEASE POST WIDELY
 >
 > CALL FOR INPUT > ->  National Research Council Project on Technical 
and Privacy Dimensions of Information for Terrorism Prevention and Other 
National Goals
 >
 > This project is intended to develop a conceptual and organizational 
framework with which policy makers and the public can consider the 
tradeoffs between individual and corporate privacy rights and collective 
and individual security. This framework will be applied to any data 
collected on individuals and organizations for the purpose of developing 
intelligence, research, or statistical information intended to be shared 
across federal agencies, among federal, state, and local agencies, and 
between the government and the private sector to help thwart terrorist 
acts in the United States.  It will pay specific attention to the 
purposes for which data are collected and the development of new 
approaches to safeguarding information essential to the nation's 
security interests. The project will particularly focus on both the 
privacy and security concerns that are likely to arise in the minds of 
the public and the privacy research and advocacy communities.
 >
 > To facilitate its study, the NRC's Committee on Technical and Privacy 
Dimensions of Information for Terrorism Prevention and Other National 
Goals seeks white papers and other comments from interested parties on 
topics relevant to the use of data mining, information fusion, and 
deception detection technologies as they relate to terrorism prevention, 
law enforcement, and public health.   The papers received will serve to 
inform the committee, and will be posted on the project web site 
 > for at least the duration of the project. 
 >
 > At the discretion of the NRC, selected authors may be invited to 
address the committee about their analysis, findings, and conclusions, 
and some papers may be included as appendixes to the Committee> '> s 
final report. The Committee may also reference the submitted materials, 
and include them or portions of them in its report.  Individuals not 
wishing to submit a paper are invited to send any comments they wish on 
this subject to PRIVTERR_INPUT@LSW.NAS.EDU. Serious comments will be 
transmitted to the committee.
 >
 > CALL FOR WHITE PAPERS: CRITERIA
 >
 > SUBSTANTIVE REQUIREMENTS
 >
 > The NRC Committee on Technical and Privacy Dimensions of Information 
for Terrorism Prevention and Other National Goals seeks well-reasoned 
White Papers that identify and discuss issues relevant to the use of 
data mining, information fusion, and deception detection technologies as 
they relate to the twin goals of protecting privacy and pursuing 
terrorism prevention, law enforcement, and public health.  Some of the 
topics of interest to the committee include
 >
 > *  Analytical criteria for making tradeoffs between privacy and 
national interests such as terrorism prevention, law enforcement, and 
public health.
 > *  The potential (or lack thereof) for technology to reduce or 
mitigate tradeoffs between privacy and security.
 > *  Technical limitations inherent in technologies for data mining, 
information fusion, and deception detection.
 > *  Legal and policy regimes that should govern the use of these 
technologies.
 > *  Strategies for more effective focusing of law enforcement and/or 
counter-intelligence efforts directed against terrorism.
 > *  Privacy implications of deception detection technologies.
 > *  Recourse or redress mechanisms appropriate to invoke if and when 
individuals suffer from > "> false positives> ">  originating in 
technologies for data mining or deception detection.
 > *  Evaluating data mining technologies (e.g., the impact of data 
quality on effectiveness, the effectiveness of various algorithms, 
assessing false positive and false negative rates for algorithms). >
 > *  Differences and similarities in the analytical processes needed 
for law enforcement activities as compared to counter-terrorism activities.
 > *  Adequacy or inadequacy of laws governing surveillance policies and 
practices; governing analytical use of information derived from 
surveillance.
 > *  Utility (or lack thereof) of data collected by Federal statistical 
agencies for counter-terrorism, law enforcement, and public health 
purposes,
 > *  Privacy and civil liberties implications of sharing information 
derived in or uncovered in law enforcement investigations with 
intelligence authorities.
 > *  Similarities and differences between information gathering and 
analysis for law enforcement activities against violent crime vs law 
enforcement activities against white-collar crime.
 >
 > Committee interests are not limited to these topics, and prospective 
authors can choose topics not listed.
 >
 > PROCEDURAL REQUIREMENTS
 >
 > Papers must be:
 >
 > 1. double-spaced, and no longer than approximately 6,250 words;
 >
> 2. submitted electronically via email to PRIVTERR_INPUT@LSW.NAS.EDU. 
 >
 > 3. signed by a principal of the organization, group, or firm (if 
intended to represent the views of an organization, group, or firm), or 
signed by an individual (if intended to represent his or her views as an 
individual);
 >
 > 4. accompanied by a physically signed National Research Council 
copyright agreement (available at 
http://cstb.org/terrorismandprivacy/copyright.pdf) faxed to 202-334-2318 
or scanned into an image and transmitted along with the paper. This 
copyright agreement must be signed by all authors of the paper.
 >
 > 5. properly referenced (with reference citations included as endnotes 
rather than footnotes to facilitate posting).
 >
 > 6. Received at the NRC in electronic form no later than the close of 
business on March 1, 2007.
 >
 > Papers that do not conform to these requirements or received after 
March 1, 2007 may not be brought to the attention of the committee.
 >
 > For more information, please visit the project web site 
 or contact Herb Lin at 202-334-3191 or 
hlin@nas.edu. 
 >
 >
 > ____________________________________________
 > Herb Lin, Senior Scientist
 > Computer Science and Telecommunications Board
 > The National Academies
> (202) 334-3191 voice || (202) 334-2318 fax || hlin@nas.edu 
> www.cstb.org || Where the nation turns for independent and informed 
assessments of computing, communications, and public policy
 >
 >

_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/ 
Moderated by Declan McCullagh (http://www.mccullagh.org/) 


Make REAL money with your website!

The entire AOH site is optimized to look best in Firefox® 2.0 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.