Following the terrorist attacks of September 11, 2001, there was heightened attention in the United States on the use of multiple government and private databases for the identification of possible perpetrators of future attacks, part of an unprecedented expansion of federal gov-ernment datamining activities, many involving databases containing personal information This article reviews some proposals that have surfaced for the search of multiple databases without compromising possible pledges of confidentiality to the individuals whose data are included and their link to the related literature on privacy-preserving datamining. In particular, we focus on the concept of selective revelation and its confidentiality implications. HOMELAND SECUR...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
CHDS State/LocalThis thesis examines FBI terrorism and homeland security information sharing with st...
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nu...
The 9/11 terrorists, before their deadly attacks, sought invisibility through integration into the s...
Data mining has become one of the key features of many homeland security initiatives. Often used as ...
Data mining is emerging as one of the key features of many homeland security initiatives. Often used...
To the extent that we permit data mining programs to proceed, they must provide adequate due process...
centerpiece of U.S. domestic and foreign policies. The number of terrorists is a tiny fraction of al...
A letter report issued by the Government Accountability Office with an abstract that begins "The gov...
CHDS State/LocalHuman intelligence from informants, criminals, good-Samaritans and cooperative indiv...
Under the USA PATRIOT Act, the government has a wide range of options to use in what has been labele...
In 2004, the Congress voted to end funding for a Defense Advanced Research Projects Agency (DARPA) ...
The terrorist attacks against the United States on the morning of September 11, 2001 created an envi...
A continuing need in the contexts of homeland security, national defense and counterterrorism is for...
A letter report issued by the Government Accountability Office with an abstract that begins "Data mi...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
CHDS State/LocalThis thesis examines FBI terrorism and homeland security information sharing with st...
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nu...
The 9/11 terrorists, before their deadly attacks, sought invisibility through integration into the s...
Data mining has become one of the key features of many homeland security initiatives. Often used as ...
Data mining is emerging as one of the key features of many homeland security initiatives. Often used...
To the extent that we permit data mining programs to proceed, they must provide adequate due process...
centerpiece of U.S. domestic and foreign policies. The number of terrorists is a tiny fraction of al...
A letter report issued by the Government Accountability Office with an abstract that begins "The gov...
CHDS State/LocalHuman intelligence from informants, criminals, good-Samaritans and cooperative indiv...
Under the USA PATRIOT Act, the government has a wide range of options to use in what has been labele...
In 2004, the Congress voted to end funding for a Defense Advanced Research Projects Agency (DARPA) ...
The terrorist attacks against the United States on the morning of September 11, 2001 created an envi...
A continuing need in the contexts of homeland security, national defense and counterterrorism is for...
A letter report issued by the Government Accountability Office with an abstract that begins "Data mi...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
CHDS State/LocalThis thesis examines FBI terrorism and homeland security information sharing with st...
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nu...