[Politech] Technical and privacy dimensions of terrorism prevention -- NRC call for papers [priv]

From: Declan McCullagh (declan@private)
Date: Mon Oct 23 2006 - 22:51:04 PDT

The NRC's work in this area can be very influential and is worth paying 
attention to; the so-called CRISIS report on cryptography in 1996 
certainly was:


-------- Original Message --------
Subject: CALL FOR PAPERS - Technical and Privacy Dimensions of 
Information for Terrorism Prevention and Other National Goals
Date: Mon, 18 Sep 2006 17:54:16 -0400
From: Lin, Herb <HLin@private>
To: Declan McCullagh <declan@private>

Declan - if you'd post this to Politech, I'd be grateful.

Tnx herb

 > CALL FOR INPUT > ->  National Research Council Project on Technical 
and Privacy Dimensions of Information for Terrorism Prevention and Other 
National Goals
 > This project is intended to develop a conceptual and organizational 
framework with which policy makers and the public can consider the 
tradeoffs between individual and corporate privacy rights and collective 
and individual security. This framework will be applied to any data 
collected on individuals and organizations for the purpose of developing 
intelligence, research, or statistical information intended to be shared 
across federal agencies, among federal, state, and local agencies, and 
between the government and the private sector to help thwart terrorist 
acts in the United States.  It will pay specific attention to the 
purposes for which data are collected and the development of new 
approaches to safeguarding information essential to the nation's 
security interests. The project will particularly focus on both the 
privacy and security concerns that are likely to arise in the minds of 
the public and the privacy research and advocacy communities.
 > To facilitate its study, the NRC's Committee on Technical and Privacy 
Dimensions of Information for Terrorism Prevention and Other National 
Goals seeks white papers and other comments from interested parties on 
topics relevant to the use of data mining, information fusion, and 
deception detection technologies as they relate to terrorism prevention, 
law enforcement, and public health.   The papers received will serve to 
inform the committee, and will be posted on the project web site 
<http://terrorismandprivacy.org > for at least the duration of the project.
 > At the discretion of the NRC, selected authors may be invited to 
address the committee about their analysis, findings, and conclusions, 
and some papers may be included as appendixes to the Committee> '> s 
final report. The Committee may also reference the submitted materials, 
and include them or portions of them in its report.  Individuals not 
wishing to submit a paper are invited to send any comments they wish on 
this subject to PRIVTERR_INPUT@private Serious comments will be 
transmitted to the committee.
 > The NRC Committee on Technical and Privacy Dimensions of Information 
for Terrorism Prevention and Other National Goals seeks well-reasoned 
White Papers that identify and discuss issues relevant to the use of 
data mining, information fusion, and deception detection technologies as 
they relate to the twin goals of protecting privacy and pursuing 
terrorism prevention, law enforcement, and public health.  Some of the 
topics of interest to the committee include
 > *  Analytical criteria for making tradeoffs between privacy and 
national interests such as terrorism prevention, law enforcement, and 
public health.
 > *  The potential (or lack thereof) for technology to reduce or 
mitigate tradeoffs between privacy and security.
 > *  Technical limitations inherent in technologies for data mining, 
information fusion, and deception detection.
 > *  Legal and policy regimes that should govern the use of these 
 > *  Strategies for more effective focusing of law enforcement and/or 
counter-intelligence efforts directed against terrorism.
 > *  Privacy implications of deception detection technologies.
 > *  Recourse or redress mechanisms appropriate to invoke if and when 
individuals suffer from > "> false positives> ">  originating in 
technologies for data mining or deception detection.
 > *  Evaluating data mining technologies (e.g., the impact of data 
quality on effectiveness, the effectiveness of various algorithms, 
assessing false positive and false negative rates for algorithms). >
 > *  Differences and similarities in the analytical processes needed 
for law enforcement activities as compared to counter-terrorism activities.
 > *  Adequacy or inadequacy of laws governing surveillance policies and 
practices; governing analytical use of information derived from 
 > *  Utility (or lack thereof) of data collected by Federal statistical 
agencies for counter-terrorism, law enforcement, and public health 
 > *  Privacy and civil liberties implications of sharing information 
derived in or uncovered in law enforcement investigations with 
intelligence authorities.
 > *  Similarities and differences between information gathering and 
analysis for law enforcement activities against violent crime vs law 
enforcement activities against white-collar crime.
 > Committee interests are not limited to these topics, and prospective 
authors can choose topics not listed.
 > Papers must be:
 > 1. double-spaced, and no longer than approximately 6,250 words;
 > 2. submitted electronically via email to PRIVTERR_INPUT@private
 > 3. signed by a principal of the organization, group, or firm (if 
intended to represent the views of an organization, group, or firm), or 
signed by an individual (if intended to represent his or her views as an 
 > 4. accompanied by a physically signed National Research Council 
copyright agreement (available at 
http://cstb.org/terrorismandprivacy/copyright.pdf) faxed to 202-334-2318 
or scanned into an image and transmitted along with the paper. This 
copyright agreement must be signed by all authors of the paper.
 > 5. properly referenced (with reference citations included as endnotes 
rather than footnotes to facilitate posting).
 > 6. Received at the NRC in electronic form no later than the close of 
business on March 1, 2007.
 > Papers that do not conform to these requirements or received after 
March 1, 2007 may not be brought to the attention of the committee.
 > For more information, please visit the project web site 
<http://terrorismandprivacy.org> or contact Herb Lin at 202-334-3191 or 
 > ____________________________________________
 > Herb Lin, Senior Scientist
 > Computer Science and Telecommunications Board
 > The National Academies
 > (202) 334-3191 voice || (202) 334-2318 fax || hlin@private
 > www.cstb.org || Where the nation turns for independent and informed 
assessments of computing, communications, and public policy

Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)

This archive was generated by hypermail 2.1.3 : Mon Oct 23 2006 - 23:25:48 PDT