This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy
January/February 2009 (vol. 7 no. 1)
pp. 58-62
Susan Landau, Sun Microsystems
The US National Research Council has tackled a big set of issues: preserving privacy in the face of data mining and behavioral surveillance programs that are being used in the US government's fight against terrorists. It has come up with commonsense solutions: evaluate the programs for effectiveness, lawfulness, and consistency with US values, and start simultaneously examining US laws, regulations, and policies protecting privacy about whether these suffice in the face of new technologies. The report has valuable and important recommendations and should be read, paid attention to, and followed.

1. N. King Jr. and T. Bridis, "FBI's Wiretaps to Scan E-Mail Spark Concern," The Wall Street Journal,11 July 2000, p. A3.
2. S.P. Smith et al., Independent Technical Review of the Carnivore System, IIT Research Inst., 8 Dec. 2001.
3. US Nat'l Research Council, Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, Nat'l Academies Press, 2008.
4. K. Dam and H. Lin, Cryptography's Role in Securing the Information Society, Nat'l Academies Press, 1996.
5. J. Waldo, H. Lin, and L. Millet, Engaging Privacy and Information Technology in a Digital Age, Nat'l Academies Press, 2007.
6. Olmstead v. United States, 277 U.S. 438 (1928), Brandeis, Louis, dissenting, p. 473.
7. US Nat'l Research Council, The Polygraph and Lie Detection, Nat'l Academies Press, 2003.
8. Data Mining: Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks, GAO-07-293, US Government Accountability Office, Feb. 2007, p. 3.

Index Terms:
data mining, behavioral surveillance, privacy, National Research Council, NRC
Citation:
Susan Landau, "The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy," IEEE Security & Privacy, vol. 7, no. 1, pp. 58-62, Jan.-Feb. 2009, doi:10.1109/MSP.2009.25
Usage of this product signifies your acceptance of the Terms of Use.