Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




The Cambridge Handbook of Surveillance Law


Book Description

Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting privacy and individual liberty. From police officers to corporations to intelligence agencies, surveillance law is tasked with striking this difficult and delicate balance. That challenge is compounded by ever-changing technologies and evolving social norms. Following the revelations of Edward Snowden and a host of private-sector controversies, there is intense interest among policymakers, business leaders, attorneys, academics, students, and the public regarding legal, technological, and policy issues relating to surveillance. This handbook documents and organizes these conversations, bringing together some of the most thoughtful and impactful contributors to contemporary surveillance debates, policies, and practices. Its pages explore surveillance techniques and technologies; their value for law enforcement, national security, and private enterprise; their impacts on citizens and communities; and the many ways societies do-and should-regulate surveillance.




National Strategy for Combating Terrorism


Book Description

Since the September 11 attacks, America is safer, but we are not yet safe. We have done much to degrade al-Qaida and its affiliates and to undercut the perceived legitimacy of terrorism. Our Muslim partners are speaking out against those who seek to use their religion to justify violence and a totalitarian vision of the world. We have significantly expanded our counter terrorism coalition, transforming old adversaries into new and vital partners in the War on Terror. We have liberated more than 50 million Afghans and Iraqis from despotism, terrorism, and oppression, permitting the first free elections in recorded history for either nation. In addition, we have transformed our governmental institutions and framework to wage a generational struggle. There will continue to be challenges ahead, but along with our partners, we will attack terrorism and its ideology, and bring hope and freedom to the people of the world. This is how we will win the War on Terror.




Report on the Telephone Records Program Conducted Under Section 215 of the USA Patriot Act and on the Operations of the Foreign Intelligence Surveillance Court


Book Description

The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent bipartisan agency within the executive branch established by the Implementing Recommendations of the 9/11 Commission Act of 2007. The Board is comprised of four part-time members and a full-time chairman, all appointed by the President and confirmed by the Senate. On June 5, 2013, the British newspaper The Guardian published the first of a series of articles based on unauthorized disclosures of classified documents by Edward Snowden, a contractor for the National Security Agency ("NSA"). The article described an NSA program to collect millions of telephone records, including records about purely domestic calls. Over the course of the next several days, there were additional articles regarding this program as well as another NSA program referred to in leaked documents as "PRISM." These disclosures caused a great deal of concern both over the extent to which they damaged national security and over the nature and scope of the surveillance programs they purported to reveal. In response to the congressional and presidential requests, the Board immediately initiated a study of the 215 and 702 programs and the operation of the FISA court. This Report contains the results of the Board's 215 program study as well as our analysis and recommendations regarding the FISC's operation.




Deception


Book Description

The shocking, three-decade story of A. Q. Khan and Pakistan's nuclear program, and the complicity of the United States in the spread of nuclear weaponry. On December 15, 1975, A. Q. Khan-a young Pakistani scientist working in Holland-stole top-secret blueprints for a revolutionary new process to arm a nuclear bomb. His original intention, and that of his government, was purely patriotic-to provide Pakistan a counter to India's recently unveiled nuclear device. However, as Adrian Levy and Catherine Scott-Clark chillingly relate in their masterful investigation of Khan's career over the past thirty years, over time that limited ambition mushroomed into the world's largest clandestine network engaged in selling nuclear secrets-a mercenary and illicit program managed by the Pakistani military and made possible, in large part, by aid money from the United States, Saudi Arabia, and Libya, and by indiscriminate assistance from China. Based on hundreds of interviews in the United States, Pakistan, India, Israel, Europe, and Southeast Asia, Deception is a masterwork of reportage and dramatic storytelling by two of the world's most resourceful investigative journalists. Urgently important, it should stimulate debate and command a reexamination of our national priorities.




Cyber War and Peace


Book Description

The frontiers are the future of humanity. Peacefully and sustainably managing them is critical to both security and prosperity in the twenty-first century.




The Chosen People


Book Description

"Einstein... Shylock... Rothschild... Trotsky... Jesus. The scientist and philosopher... the greedy money-lender and middle man... the impoverished immigrant... the elite of politics and high finance... the prophet... the revolutionary. All of these have been faces of the Jewish people over the centuries. They have inspired admiration, envy, suspicion, and hatred and overflowed with world-changing personages. The historian Yuri Slezkine claimed that the 20th century was nothing less than the 'Jewish century,' so indispensable were they in the creation of the modern world"--Cover, p. [4].




Who Rules America Now?


Book Description

The author is convinced that there is a ruling class in America today. He examines the American power structure as it has developed in the 1980s. He presents systematic, empirical evidence that a fixed group of privileged people dominates the American economy and government. The book demonstrates that an upper class comprising only one-half of one percent of the population occupies key positions within the corporate community. It shows how leaders within this "power elite" reach government and dominate it through processes of special-interest lobbying, policy planning and candidate selection. It is written not to promote any political ideology, but to analyze our society with accuracy.