Publication
Jun 2008
This report compiled by different US boards and committees examines the role of data mining and behavioral surveillance technologies in counterterrorism programs. It provides a framework for making decisions about deploying and evaluating those and other information-based programs on the basis of their effectiveness and associated risks to personal privacy. The report concludes by offering policy recommendations.
Download |
English (PDF, 377 pages, 6.0 MB) |
---|---|
Series | CISAC Reports |
Publisher | Center for International Security and Cooperation (CISAC) |
Copyright | © 2008 Center for International Security and Cooperation (CISAC) |