TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS
|
|
- Lindsay Brown
- 8 years ago
- Views:
Transcription
1 TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the Republic. The aftermath of September 11th exposed severe deficiencies in our nation s national security. Almost instinctively, attention shifted toward various branches of government as citizens sought answers and reassurance that their country would continue to be free from terrorist threats. In one response, the Department of Defense (DoD) established new programs in the Defense Advanced Research Projects Agency (DARPA). 1 The Terrorism Information Awareness Program (TIA) was one of several research and development programs in DARPA s Information Awareness Office (IAO), which was established in January In the aftermath of the September 11 terrorist attacks, DARPA formed the IAO in part to bring together, under the leadership of one technical office director, several existing DARPA programs focused on applying information technology to combat terrorist threats. TERRORISM INFORMATION AWARENESS PROGRAM (TIA) TIA is a prototype system developed to provide policy-makers and analysts with highly-sophisticated intelligence information about ter- 1
2 rorist threats. 2 The program was designed to increase the probability that authorized agencies within the United States could preempt terrorist attacks. 3 TIA operates through a complex computer network that allows convenient data sharing across agency boundaries. 4 Consequently, various agents of the executive branch would be entitled to both classified and unclassified information, in a more systematic fashion. 5 The TIA program would work in close collaboration with one or more United States intelligence agencies that would provide operational guidance and technology evaluation, and act as TIA system transition partners. 6 Data mining is the search for significant patterns and trends in large databases using sophisticated statistical techniques and software. The widespread use of computers, and the large amount of information maintained in databases means that there is an abundance of information useful for antiterrorism purposes. TIA and data mining programs extract and compile information into a database from a wide variety of open and closed sources. Open source materials include news wires, the web, and periodicals. Closed sources include government classified documents, flight records, money transfers, and police and prison records. Searches are conducted using Natural Language Processing (NLP), a highly sophisticated system that recognizes a user s query in its natural state and assigns a category to each word. The system is then able to evaluate the context of the query and group it accordingly. After the categorization process, analysts and technicians develop models of common behavior patterns of persons of interest. For example, analysts recognize that terrorists typically travel to the same places, obtain funding from the same sources, and receive training in certain locations. Consequently, a behavior pattern has been recognized and a model of this pattern is developed as a guideline for all future searches. The final result of a query is a complex visual presentation interpreted by analysts who predict possible outcomes and consult executive branch officials on these findings. If implemented, the incorporation of TIA into United States national security efforts would enable groups to form quickly within and across agency boundaries to bring data, expertise, and experience to deal with the problem of terrorism. 7 Moreover, TIA would enable the user to discover preparation and planning for a future terrorist attack 2 against the United States by examining transactions that are being made to aid terrorism. 8 Large quantities of open source and classified materials could be examined to discover planning and preparation of a terrorist organization. 9 Next, TIA would enable a user to discover links between people, places, and events related to suspect terrorist activities. 10 Furthermore, TIA would make information more understandable by portraying it in a visual format making it easier to analyze and detect patterns of activities. 11 Finally, TIA would give the decision-maker an understanding of past events as well as a complete understanding of the possible outcomes of the current situation. 12 With this knowledge, decision-makers would become aware of the risks associated with actionable counter-terrorism options. 13 MULTISTATE ANTI-TERRORISM INFORMATION EXCHANGE (MATRIX) MATRIX is functionally similar to TIA and other counter-terrorism initiatives started since the 2001 attacks. The MATRIX pilot project was initiated in response to the increased need for timely information sharing and exchange of terrorism-related information among members of the law enforcement community. 14 MATRIX was originally funded by Seisint Inc., a private company based in Boca Raton, Florida. 15 Seisint has since been awarded $4 million by the Office of Justice Programs, Bureau of Justice Assistance, and the United States Department of Justice. 16 There are currently seven states participating in the MATIX project. 17 Participating states include Florida, New York, Connecticut, Ohio, Michigan, and Pennsylvania. 18 Most recently, Utah withdrew from the pilot program citing privacy concerns. Governor Olene S. Walker cut ties with the program and appointed an eight-member committee to investigate and oversee the state s involvement. Republican Governor Sonny Perdue also ordered the state of Georgia to cut ties to the federally sponsored antiterrorism database citing privacy concerns. According to its sponsors, MATRIX would significantly lower the number of hours needed for investigations and would improve the chances of law enforcement to make an arrest. 19 To accomplish this, 3
3 MATRIX would integrate and exchange a person s criminal history, driver s license data, vehicle registration records, and corrections records. 20 Moreover; MATRIX would encourage the exchange of information via secure state websites thereby increasing the ability of the appropriate entities to acquire the crucial information to deter terrorist acts. 21 This information would be made available over a network to authorized users and would serve as a means for users to post and acquire anti-terrorism and alert information. 22 Finally, MATRIX would ensure that state and local law enforcement personnel acquire the necessary data to prevent a terrorist attack since they are the ones on the front lines. 23 DISCUSSION Despite the many benefits data-mining programs such as TIA and MATRIX offer to our country s national security effort, these programs pose several risks. Whether operated by governmental or commercial organizations, the databases present substantial security threats. The use of such databases could provide new targets for attack by malicious computer users and terrorists. 24 Moreover, the databases proposed by TIA could increase the risk of identity theft by providing a wealth of personal information to anyone accessing the database. 25 The success of electronic commerce in the United States may be threatened by TIA because of consumers lack of confidence in privacy preservation. 26 Most non-americans would oppose allowing the United States government to access private information about them. 27 As a result, the development of future e-commerce systems could exclude the United States, thus depriving American companies of significant export opportunities. 28 Additionally, the cost of identity theft is increasing and the potential for more significant theft via this database system could greatly magnify the total costs to citizens, businesses, and government. 29 Because TIA would combine some types of automated data-mining with statistical analysis, there could be a significant personal cost for many Americans. The existence of TIA could impact the behavior of both real terrorists and law-abiding citizens. 30 For example, terrorists may go to great lengths to insure that their behavior is statistically normal. 31 Consequently, ordinary citizens may avoid lawful behavior for fear of being labeled un-american or a terrorist. 32 Law-abiding American citizens may refrain from making charitable donations to Islamic foundations and organizations. Moreover, citizens may avoid travel to countries suspected of harboring terrorists. Out of grave concern for the risks posed by TIA, Congress restricted governmental funding for TIA in the Department of Defense Appropriations Act, (a) of the Act states in part that: Notwithstanding any other provision of law, no funds appropriated or otherwise made available to the Department of Defense, whether to an element of the Defense Advanced Research Projects Agency or any element, or to any other department, agency, or element of the Federal Government, may be obligated or expended on research and development on the Terrorism Information Awareness program. Pub. L , September 30, 2003, 117 Stat The Center for Democracy and Technology (CDT) has concluded that even if TIA funding were zeroed out, the development of data mining would go on commercially or at other agencies. 33 Furthermore, CDT argued that government implementation of this uniquely intrusive technology should not go forward without explicit congressional authorization based on a finding of effectiveness, guidance for implementation, and oversight. 34 In addition to this restriction on funding, laws governing the federal government s access to information could serve as potential barriers to data-mining programs. The Privacy Act of 1974, 35 protects the privacy of individuals identified in information systems maintained by federal executive branch agencies and controls the collection, use, and sharing of information. 36 However, general exemptions in the Privacy Act allow the CIA and federal law enforcement agencies to 4 5
4 exempt certain systems of records from some of the Act s requirements. 37 Unless a statutory exemption applies, no federal executive branch agency may disclose any record which is contained in a system of records to any person or agency except pursuant to written request or consent of the individual to whom the record pertains. 38 These statutory exemptions could potentially authorize the disclosure of personal information, thus providing a potential loophole for data-mining programs like TIA. In addition to existing statutory barriers to TIA, there are proposed bills that could further frustrate the goals of TIA and its successors. H.R. 3 38, The Defense of Privacy Act, would require agencies to conduct privacy impact analysis for both new and existing agency rules and regulations. 39 A key element of the Defense of Privacy Act is that it would require policy makers to identify and address privacy issues at the initial stages of a new project or policy at the conceptual or design stage, before regulations are promulgated. 40 A privacy impact analysis reduces the likelihood that any given regulatory scheme will have a negative impact on privacy after it has been implemented, when it may be difficult to mitigate the impact without substantial expense, delay in the program, or litigation. 41 Because DARPA anticipated that TIA would be used for domestic law enforcement, a privacy impact assessment should have been performed. 42 In addition, DARPA should have performed a privacy impact assessment because TIA s development occurred simultaneously with the transition of TIA into the operational environment. In the future, DARPA should ensure that privacy is considered at the beginning of the development cycle and should implement controls that protect privacy during development. 43 Identify any personally identifiable information associated with business processes. Document any collection, use, disclosure, or destruction of personally identifiable information. Assess the potential privacy risks and options available for mitigating that risk. Ensure that accountability for privacy issues is incorporated into the program. Create a consistent format and structured process for analyzing both technical and legal compliance with relevant regulations. 44 Finally, the Data Mining Reporting Act of 2003 is another piece of proposed legislation that could create a potential barrier to TIA and other such programs. If enacted, this bill would provide Congress with information about the nature and capabilities of data mining technology and the data that would be used to identify potential threats to national security. 45 Moreover, the bill would require all government agencies to assess the efficacy of data mining technology and determine whether the technology can deliver on the promises of each program. 46 This would ensure that federal agencies using datamining technology have considered and developed policies to protect the privacy and due process rights of individuals and ensure that only accurate information is collected and used. 47 The Office of the Inspector General of the Department of Defense recommends that the Under Secretary of Defense for Acquisition, Technology, and Logistics USD (AT&L) in coordination with the Director, DARPA Perform a Privacy Impact Assessment before TIA type technology research continues. Specifically, the privacy impact assessment should: 6 7
5 ENDNOTES 1 Report to Congress regarding the Terrorism Information Awareness Program, available at report.pdf > (last visited November 7, 2003). 2 Id. 3 Department of Defense Office of the Inspector General: Information Technology Management, TIA, available at dod/igtia1203.pdf> (last visited February 6, 2004). 4 Report to Congress regarding the Terrorism Information Awareness Program, available at report.pdf> (last visited November 7, 2003). 5 Id. 6 Id. 7 Id. 8 Id. 9 Id. 10 Id. 11 Id. 12 Id. 13 Id. 14 IIR Website, available at (last visited October 26, 2003). 15 Steve Gilliard, Welcome to the Matrix, available at dailykos.com/archives/ html> (last visited September 20, 2003). 16 IIR Website 17 Id. 18 Id. 19 Id. 20 Id. 21 Id. 22 Id. 23 Id. 24 Association for Computing Machinery Website, available at (last visited October 29, 2003). 25 Id. 26 Id. 27 Id. 28 Id. 29 Id. 30 Id. 31 Id. 32 Id. 33 Statement of James X. Dempsey, Executive Director Center for Democracy and Technology, Impact of Government Regulations on Individual Privacy, July 22, Id. 35 The Privacy Act of 1974, U.S.C. 552(a). 36 Report for Congress, Privacy: Total Information Awareness Programs and Related Information Access, Collection, and Protection Laws, available at (last visited November 10, 2003). 37 Id. 38 Id. 39 Statement of James X. Dempsey, Executive Director Center for Democracy and Technology, Impact of Government Regulations on Individual Privacy, July 22, Id. 41 Id. 42 Department of Defense Office of the Inspector General: Information Technology Management, TIA, available at dod/igtia1203.pdf> (last visited February 6, 2004). 43 Id. 44 Id. 45 Senator Feingold, Statements on Introduced Bill and Joint Resolutions, available at (last visited 11/10/03). 46 Id. 47 Id. 8 9
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationS. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
More informationCRS Report for Congress
Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,
More informationPublic Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationTITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
More informationPrivacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
More informationG.S. 143B-426.38A Page 1
143B-426.38A. Government Data Analytics Center; State data-sharing requirements. (a) State Government Data Analytics. The State shall initiate across State agencies, departments, and institutions a data
More informationOne Hundred Twelfth Congress of the United States of America
S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act
More informationCorporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey
More information28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint
More informationThe Department of the Treasury established the Financial Crimes
Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish
More informationPublic Law 108 330 108th Congress An Act
PUBLIC LAW 108 330 OCT. 16, 2004 118 STAT. 1275 Public Law 108 330 108th Congress An Act To amend title 31, United States Code, to improve the financial accountability requirements applicable to the Department
More informationSeptember 18, 1998 FIRST QUESTION PRESENTED ANSWER GIVEN SECOND QUESTION PRESENTED ANSWER GIVEN THIRD QUESTION PRESENTED ANSWER GIVEN DISCUSSION
September 18, 1998 No. 8261 This opinion is issued in response to questions from Jan Curry, Manager of the Driver and Motor Vehicle Services Branch of the Oregon Department of Transportation (ODOT), about
More informationGAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony
GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency
More informationHow To Protect Your Privacy From Data Mining And Aggregation
Sept. 2004 Think Before You Dig: Privacy Implications of Data Mining & Aggregation Background Data mining is generally part of a larger business intelligence or knowledge management initiative. Since state
More informationPublic Law 96-226 96th Congress An Act
PUBLIC LAW 96-226 APR. 3, 1980 94 STAT. 311 Public Law 96-226 96th Congress An Act To improve budget management and expenditure control by revising certain provisions relating to the Comptroller General
More informationIdentity Theft. The Identity Theft Conundrum
Identity Theft The Identity Theft Conundrum Identity theft presents an inherent conundrum: The very attributes of modern commerce that consumers value and expect rapid, easy, 24-hour access to a wide variety
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationStatement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
More informationFederal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
More informationDEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
More informationU.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
More informationPreservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
More informationCybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com
More informationNATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
More informationUNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
More informationTITLE I GENERAL PROVISIONS
Public Law 101-576 November 15, 1990 Chief Financial Officers Act of 1990 One Hundred First Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday,
More informationJanuary 2007. An Overview of U.S. Security Breach Statutes
January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed
More informationPrivacy Act of 1974; Department of Homeland Security <Component Name> - <SORN. AGENCY: Department of Homeland Security, Privacy Office.
DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2014-] Privacy Act of 1974; Department of Homeland Security -
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Screening Tax-Exempt Organizations Filing Information Provides Minimal Assurance That Potential Terrorist-Related Activities Are Identified May 21, 2007
More informationIdentity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
More informationTo improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
More informationDIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release June 24, 2015 EXECUTIVE ORDER - - - - - - - HOSTAGE RECOVERY ACTIVITIES
THE WHITE HOUSE Office of the Press Secretary For Immediate Release June 24, 2015 EXECUTIVE ORDER - - - - - - - HOSTAGE RECOVERY ACTIVITIES By the authority vested in me as President by the Constitution
More informationPrivacy Impact Assessment of Automated Loan Examination Review Tool
Privacy Impact Assessment of Automated Loan Examination Review Tool Program or application name: Automated Loan Examination Review Tool (ALERT) System Owner: Board of Governors of the Federal Reserve System
More informationReport on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan
The Electronic Frontier Foundation Defending Freedom in the Digital World Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan Introduction The primary concern of the
More informationS. 2519 AN ACT. To codify an existing operations center for cybersecurity.
TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,
More informationTHE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
More informationADMINISTRATIVE ASSESSMENT OF CIVIL PENALTIES AGAINST FEDERAL AGENCIES UNDER THE CLEAN AIR ACT
ADMINISTRATIVE ASSESSMENT OF CIVIL PENALTIES AGAINST FEDERAL AGENCIES UNDER THE CLEAN AIR ACT The Clean Air Act authorizes the Environmental Protection Agency administratively to assess civil penalties
More informationCybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
More informationIN THE WAR ON TERRORISM
THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationCYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
More informationJOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE
JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE
More informationOctober 27, 2010. The Honorable John Berry Director Office of Personnel Management 1900 E Street, NW Washington, DC 20415. Dear Director Berry:
October 27, 2010 The Honorable John Berry Director Office of Personnel Management 1900 E Street, NW Washington, DC 20415 Dear Director Berry: We are writing to express our concerns about the Health Claims
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationGAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
More informationCOLORADO INDEPENDENT ETHICS COMMISSION S TRIAL BRIEF
DISTRICT COURT, CITY AND COUNTY OF DENVER, COLORADO 1437 Bannock Street Denver, CO 80202 IN THE MATTER OF THE APPLICATION OF COLORADO INDEPENDENT ETHICS COMMISSION AND COLORADO ETHICS WATCH Plaintiff v.
More informationSecurities Whistleblower Incentives and Protection
Securities Whistleblower Incentives and Protection 15 USC 78u-6 (As added by P.L. 111-203.) 15 USC 78u-6 78u-6. Securities whistleblower incentives and protection (a) Definitions. In this section the following
More informationAnti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
More informationSECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
More information2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT
114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT MAY 13, 2016. Committed to the Committee of the Whole House
More informationLegislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
More informationSTATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE
STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE SENATE FINANCE COMMITTEE SUBCOMMITTEE ON FISCAL RESPONSIBILITY
More informationCYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR
CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked
More informationCFIUS and Network Security Agreements 1
CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and
More informationPOTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
More informationPrivacy Impact Assessment of the Supervisory Enforcement Actions and Special Examinations Tracking System
Privacy Impact Assessment of the Supervisory Enforcement Actions and Special Examinations Tracking System Program or application name. Supervisory Enforcement Actions and Special Examinations Tracking
More informationFebruary 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580
February 17, 2011 Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 Re: A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework
More informationComputer Linked Application Information Management System
for the Computer Linked Application Information Management System DHS/USCIS/PIA-015(a) August 31, 2011 Contact Point Donald Hawkins Privacy Officer United States Citizenship and Immigration Services (202)
More information2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D
0 -- S 01 SUBSTITUTE B LC000/SUB B/ S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL OFFENSES - IDENTITY THEFT PROTECTION Introduced By: Senators
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationU.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
More informationOne Hundred Thirteenth Congress of the United States of America
S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify
More informationS. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
More informationIdentity Theft and Tax Administration
PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011
More informationINTERIOR FRANCHISE FUND PERMANENT AUTHORITY TO OPERATE
INTERIOR FRANCHISE FUND PERMANENT AUTHORITY TO OPERATE The authority of the Secretary of the Interior to perform centralized administrative services (including interagency acquisitions), and the establishment
More informationAIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
More informationDepartment of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
More informationBilling Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee
This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The
More informationDEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION
DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION TITLE I: AUTHORIZATION OF APPROPRIATIONS Sec. 101. Authorization of Appropriations. This section authorizes
More informationDIVISION N CYBERSECURITY ACT OF 2015
U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.
More informationINFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE
INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under
More informationPREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Before the. OHIO PRIVACY and PUBLIC RECORDS ACCESS STUDY COMMITTEE. of the
PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION Before the OHIO PRIVACY and PUBLIC RECORDS ACCESS STUDY COMMITTEE of the OHIO SENATE and HOUSE OF REPRESENTATIVES on Public Entities, Personal Information,
More informationS. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG0 Discussion Draft S.L.C. TH CONGRESS D SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
More informationDBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
More informationCrime Pattern Analysis
Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01
More informationSUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
More informationPrivacy Act of 1974; Department of Homeland Security, U.S. Customs and Border
BILLING CODE: 4410-10 DEPARTMENT OF HOMELAND SECURITY Office of the Secretary DHS-2008-0052 Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection Electronic System for
More informationS. 754 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,
TH CONGRESS 1ST SESSION S. AN ACT To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. 1 Be it enacted by the Senate
More informationTitle V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions
Title V Preventing Fraud and Abuse Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Sec. 501. Health and Human Services Senior Advisor There
More informationTHE FCA INSPECTOR GENERAL: A COMMITMENT TO PUBLIC SERVICE
THE FCA INSPECTOR GENERAL: A COMMITMENT TO PUBLIC SERVICE FORWARD I am pleased to introduce the mission and authorities of the Office of Inspector General for the Farm Credit Administration. I hope this
More informationHow To Set Up A National Biological Laboratory Safety And Security Monitoring Program
Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science Volume 10, Number 4, 2012 ª Mary Ann Liebert, Inc. DOI: 10.1089/bsp.2012.0054 Establishing a National Biological Laboratory Safety
More informationPrivacy Impact Assessment for the Volunteer/Contractor Information System
Federal Bureau of Prisons Privacy Impact Assessment for the Volunteer/Contractor Information System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Vance E. Hitch,
More informationStandards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
More informationVulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists
Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental
More informationHalloween Costume Ideas for the Wii Game
Effective 7/1/2015 63G-2-305 Protected records. The following records are protected if properly classified by a governmental entity: (1) trade secrets as defined in Section 13-24-2 if the person submitting
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
More information(unofficial English translation)
REGULATION ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM FOR MONEY TRANSFER BUSINESSES AND MONEY CHANGING BUSINESSES (unofficial English translation) REGULATION ON PREVENTION OF MONEY LAUNDERING
More informationSummary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
More informationPOLICY FRAMEWORK AND STANDARDS INFORMATION SHARING BETWEEN GOVERNMENT AGENCIES
POLICY FRAMEWORK AND STANDARDS INFORMATION SHARING BETWEEN GOVERNMENT AGENCIES January 2003 CONTENTS Page 1. POLICY FRAMEWORK 1.1 Introduction 1 1.2 Policy Statement 1 1.3 Aims of the Policy 1 1.4 Principles
More informationUnited States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
More information2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security
2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009
More informationHow To Implement International Terrorism Agreements
STATEMENT OF BRAD WIEGMANN DEPUTY ASSISTANT ATTORNEY GENERAL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY UNITED STATES HOUSE OF REPRESENTATIVES
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More information