Politech is the oldest Internet resource devoted to politics and technology. Launched in 1994 by Declan McCullagh, the mailing list has chronicled the growing intersection of law, culture, technology, and politics. Since 2000, so has the Politech web site.
Technical and privacy dimensions of terrorism prevention -- NRC call for papers
The NRC's work in this area can be very influential and is worth paying
attention to; the so-called CRISIS report on cryptography in 1996
-------- Original Message --------
Subject: CALL FOR PAPERS - Technical and Privacy Dimensions of
Information for Terrorism Prevention and Other National Goals
Date: Mon, 18 Sep 2006 17:54:16 -0400
From: Lin, Herb <HLin@nas.edu>
To: Declan McCullagh <firstname.lastname@example.org>
Declan - if you'd post this to Politech, I'd be grateful.
> PLEASE POST WIDELY
> CALL FOR INPUT > -> National Research Council Project on Technical
and Privacy Dimensions of Information for Terrorism Prevention and Other
> This project is intended to develop a conceptual and organizational
framework with which policy makers and the public can consider the
tradeoffs between individual and corporate privacy rights and collective
and individual security. This framework will be applied to any data
collected on individuals and organizations for the purpose of developing
intelligence, research, or statistical information intended to be shared
across federal agencies, among federal, state, and local agencies, and
between the government and the private sector to help thwart terrorist
acts in the United States. It will pay specific attention to the
purposes for which data are collected and the development of new
approaches to safeguarding information essential to the nation's
security interests. The project will particularly focus on both the
privacy and security concerns that are likely to arise in the minds of
the public and the privacy research and advocacy communities.
> To facilitate its study, the NRC's Committee on Technical and Privacy
Dimensions of Information for Terrorism Prevention and Other National
Goals seeks white papers and other comments from interested parties on
topics relevant to the use of data mining, information fusion, and
deception detection technologies as they relate to terrorism prevention,
law enforcement, and public health. The papers received will serve to
inform the committee, and will be posted on the project web site
<http://terrorismandprivacy.org > for at least the duration of the project.
> At the discretion of the NRC, selected authors may be invited to
address the committee about their analysis, findings, and conclusions,
and some papers may be included as appendixes to the Committee> '> s
final report. The Committee may also reference the submitted materials,
and include them or portions of them in its report. Individuals not
wishing to submit a paper are invited to send any comments they wish on
this subject to PRIVTERR_INPUT@LSW.NAS.EDU. Serious comments will be
transmitted to the committee.
> CALL FOR WHITE PAPERS: CRITERIA
> SUBSTANTIVE REQUIREMENTS
> The NRC Committee on Technical and Privacy Dimensions of Information
for Terrorism Prevention and Other National Goals seeks well-reasoned
White Papers that identify and discuss issues relevant to the use of
data mining, information fusion, and deception detection technologies as
they relate to the twin goals of protecting privacy and pursuing
terrorism prevention, law enforcement, and public health. Some of the
topics of interest to the committee include
> * Analytical criteria for making tradeoffs between privacy and
national interests such as terrorism prevention, law enforcement, and
> * The potential (or lack thereof) for technology to reduce or
mitigate tradeoffs between privacy and security.
> * Technical limitations inherent in technologies for data mining,
information fusion, and deception detection.
> * Legal and policy regimes that should govern the use of these
> * Strategies for more effective focusing of law enforcement and/or
counter-intelligence efforts directed against terrorism.
> * Privacy implications of deception detection technologies.
> * Recourse or redress mechanisms appropriate to invoke if and when
individuals suffer from > "> false positives> "> originating in
technologies for data mining or deception detection.
> * Evaluating data mining technologies (e.g., the impact of data
quality on effectiveness, the effectiveness of various algorithms,
assessing false positive and false negative rates for algorithms). >
> * Differences and similarities in the analytical processes needed
for law enforcement activities as compared to counter-terrorism activities.
> * Adequacy or inadequacy of laws governing surveillance policies and
practices; governing analytical use of information derived from
> * Utility (or lack thereof) of data collected by Federal statistical
agencies for counter-terrorism, law enforcement, and public health
> * Privacy and civil liberties implications of sharing information
derived in or uncovered in law enforcement investigations with
> * Similarities and differences between information gathering and
analysis for law enforcement activities against violent crime vs law
enforcement activities against white-collar crime.
> Committee interests are not limited to these topics, and prospective
authors can choose topics not listed.
> PROCEDURAL REQUIREMENTS
> Papers must be:
> 1. double-spaced, and no longer than approximately 6,250 words;
> 2. submitted electronically via email to PRIVTERR_INPUT@LSW.NAS.EDU.
> 3. signed by a principal of the organization, group, or firm (if
intended to represent the views of an organization, group, or firm), or
signed by an individual (if intended to represent his or her views as an
> 4. accompanied by a physically signed National Research Council
copyright agreement (available at
http://cstb.org/terrorismandprivacy/copyright.pdf) faxed to 202-334-2318
or scanned into an image and transmitted along with the paper. This
copyright agreement must be signed by all authors of the paper.
> 5. properly referenced (with reference citations included as endnotes
rather than footnotes to facilitate posting).
> 6. Received at the NRC in electronic form no later than the close of
business on March 1, 2007.
> Papers that do not conform to these requirements or received after
March 1, 2007 may not be brought to the attention of the committee.
> For more information, please visit the project web site
<http://terrorismandprivacy.org> or contact Herb Lin at 202-334-3191 or
> Herb Lin, Senior Scientist
> Computer Science and Telecommunications Board
> The National Academies
> (202) 334-3191 voice || (202) 334-2318 fax || email@example.com
> www.cstb.org || Where the nation turns for independent and informed
assessments of computing, communications, and public policy
Posted by Declan McCullagh on Oct 23, 2006
in category privacy
Get a Politech feed through RSS or Atom
The Politech general information pages and
photographs are copyrighted by Declan
McCullagh. Original posts distributed to the mailing list are licensed under a Creative