NSA Surveillance Controversy: Liberty and Security in a Changing World - Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies

Nonfiction, Social & Cultural Studies, Political Science, Politics, Law Enforcement
Cover of the book NSA Surveillance Controversy: Liberty and Security in a Changing World - Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310763304
Publisher: Progressive Management Publication: December 20, 2013
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310763304
Publisher: Progressive Management
Publication: December 20, 2013
Imprint: Smashwords Edition
Language: English

Released in mid-December 2013 by the Obama White House, this important report discloses the findings and recommendations of the panel investigating the National Security Agency's surveillance programs revealed by Edward Snowden. The report includes forty-six recommendations for reforming intelligence collection activities. The report states: In many areas of public policy, officials are increasingly insistent on the need for careful analysis of the consequences of their decisions, and on the importance of relying not on intuitions and anecdotes, but on evidence and data. Before they are undertaken, surveillance decisions should depend (to the extent feasible) on a careful assessment of the anticipated consequences, including the full range of relevant risks. Such decisions should also be subject to continuing scrutiny, including retrospective analysis, to ensure that any errors are corrected. With respect to surveillance of US Persons, we recommend a series of significant reforms. Under section 215 of the Foreign Intelligence Surveillance Act (FISA), the government now stores bulk telephony metadata, understood as information that includes the telephone numbers that both originate and receive calls, time of call, and date of call. (Meta-data does not include the content of calls.). We recommend that Congress should end such storage and transition to a system in which such metadata is held privately for the government to query when necessary for national security purposes. In our view, the current storage by the government of bulk meta-data creates potential risks to public trust, personal privacy, and civil liberty. We recognize that the government might need access to such meta-data, which should be held instead either by private providers or by a private third party.

Contents: Preface * Executive Summary * Recommendations * Chapter I: Principles * Chapter II: Lessons of History * A. The Continuing Challenge * B. The Legal Framework as of September 11, 2001 * C. September 11 and its Aftermath * D. The Intelligence Community * Chapter III: Reforming Foreign Intelligence Surveillance Directed at United States Persons * A. Introduction * B. Section 215: Background * C. Section 215 and "Ordinary" Business Records * D. National Security Letters * E. Section 215 and the Bulk Collection of Telephony Meta-data * 1. The Program * 2. The Mass Collection of Personal Information * 3. Is Meta-data Different? * F. Secrecy and Transparency * Chapter IV: Reforming Foreign Intelligence Surveillance Directed at Non-United States Persons * A. Introduction * B. Foreign Intelligence Surveillance and Section 702 * C. Privacy Protections for United States Persons Whose Communications are Intercepted Under Section 702 * D. Privacy Protections for Non-United States Persons * Chapter V: Determining What Intelligence Should Be Collected and How * A. Priorities and Appropriateness * B. Monitoring Sensitive Collection * C. Leadership Intentions * D. Cooperation with Our Allies * Chapter VI: Organizational Reform in Light of Changing Communications Technology * A. Introduction * B. The National Security Agency * 1. "Dual-Use" Technologies: The Convergence of Civilian Communications and Intelligence Collection * 2. Specific Organizational Reforms * C. Reforming Organizations Dedicated to the Protection of Privacy and Civil Liberties * D. Reforming the FISA Court * Chapter VII: Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World * A. Introduction * B. Background: Trade, Internet Freedom, and Other Goals * 1. International Trade and Economic Growth * 2. Internet Freedom * 3. Internet Governance and Localization Requirements * C. Technical Measures to Increase Security and User Confidence * D. Institutional Measures for Cyberspace * E. Addressing Future Technological Challenges * Chapter VIII. Protecting What We Do Collect

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Released in mid-December 2013 by the Obama White House, this important report discloses the findings and recommendations of the panel investigating the National Security Agency's surveillance programs revealed by Edward Snowden. The report includes forty-six recommendations for reforming intelligence collection activities. The report states: In many areas of public policy, officials are increasingly insistent on the need for careful analysis of the consequences of their decisions, and on the importance of relying not on intuitions and anecdotes, but on evidence and data. Before they are undertaken, surveillance decisions should depend (to the extent feasible) on a careful assessment of the anticipated consequences, including the full range of relevant risks. Such decisions should also be subject to continuing scrutiny, including retrospective analysis, to ensure that any errors are corrected. With respect to surveillance of US Persons, we recommend a series of significant reforms. Under section 215 of the Foreign Intelligence Surveillance Act (FISA), the government now stores bulk telephony metadata, understood as information that includes the telephone numbers that both originate and receive calls, time of call, and date of call. (Meta-data does not include the content of calls.). We recommend that Congress should end such storage and transition to a system in which such metadata is held privately for the government to query when necessary for national security purposes. In our view, the current storage by the government of bulk meta-data creates potential risks to public trust, personal privacy, and civil liberty. We recognize that the government might need access to such meta-data, which should be held instead either by private providers or by a private third party.

Contents: Preface * Executive Summary * Recommendations * Chapter I: Principles * Chapter II: Lessons of History * A. The Continuing Challenge * B. The Legal Framework as of September 11, 2001 * C. September 11 and its Aftermath * D. The Intelligence Community * Chapter III: Reforming Foreign Intelligence Surveillance Directed at United States Persons * A. Introduction * B. Section 215: Background * C. Section 215 and "Ordinary" Business Records * D. National Security Letters * E. Section 215 and the Bulk Collection of Telephony Meta-data * 1. The Program * 2. The Mass Collection of Personal Information * 3. Is Meta-data Different? * F. Secrecy and Transparency * Chapter IV: Reforming Foreign Intelligence Surveillance Directed at Non-United States Persons * A. Introduction * B. Foreign Intelligence Surveillance and Section 702 * C. Privacy Protections for United States Persons Whose Communications are Intercepted Under Section 702 * D. Privacy Protections for Non-United States Persons * Chapter V: Determining What Intelligence Should Be Collected and How * A. Priorities and Appropriateness * B. Monitoring Sensitive Collection * C. Leadership Intentions * D. Cooperation with Our Allies * Chapter VI: Organizational Reform in Light of Changing Communications Technology * A. Introduction * B. The National Security Agency * 1. "Dual-Use" Technologies: The Convergence of Civilian Communications and Intelligence Collection * 2. Specific Organizational Reforms * C. Reforming Organizations Dedicated to the Protection of Privacy and Civil Liberties * D. Reforming the FISA Court * Chapter VII: Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World * A. Introduction * B. Background: Trade, Internet Freedom, and Other Goals * 1. International Trade and Economic Growth * 2. Internet Freedom * 3. Internet Governance and Localization Requirements * C. Technical Measures to Increase Security and User Confidence * D. Institutional Measures for Cyberspace * E. Addressing Future Technological Challenges * Chapter VIII. Protecting What We Do Collect

More books from Progressive Management

Cover of the book The U.S. Counterterrorism Strategy: Addressing Radical Ideologies - Study Focusing on Al-Qaeda and ISIS Islamism and Violent Extremism, Evaluation of Preemptive and Preventive Approaches by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 3 - Ground Systems - Reconnaissance, including Russian, Chinese, U.S., Sensors, Radar, UAV, Night Vision by Progressive Management
Cover of the book U.S. Marine Corps Civic Action Effort in Vietnam, March 1965: March 1966 - Fascinating Historic Document About Civilian Aid and Support Programs Early in the Vietnam War, III Marine Amphibious Force by Progressive Management
Cover of the book Crisis Fleeting: Original Reports on Military Medicine in India and Burma in the Second World War - Chinese Liaison Detail, With Wingate's Chindits, Record of Heedless Valor, Marauders and Microbes by Progressive Management
Cover of the book 2017 U.S. Navy Force Structure Assessment (FSA) and the Request for a 355 Ship Navy, Shipbuilding Plans, Aircraft Carriers, Submarines, Nuclear Missiles, Surface Combatants, Destroyers, Trump Goals by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: The Apollo Spacecraft - A Chronology - Four Volumes (SP-4009) - Complete Official History of the Apollo Program from Inception Through 1974 by Progressive Management
Cover of the book Trolling New Media: Violent Extremist Groups Recruiting Through Social Media - Propaganda, Websites, Blogs, Mobile Phones, Online Gaming, al-Qaeda, ISIS, Muslim Terrorism, Counterterrorism by Progressive Management
Cover of the book Britain's Nuclear Deterrent Force and the U.S. - U.K. Special Relationship: History of Atomic Weapons with Manhattan Project, Trident Submarine-launched Ballistic Missiles (SLBM) Replacement Decision by Progressive Management
Cover of the book Operation Sealords: A Study in the Effectiveness of the Allied Naval Campaign of Interdiction - Vietnam War Barrier to Support Riverine Operations, Zumwalt, Market Time, Game Warden, Viet Cong by Progressive Management
Cover of the book The Effective Use of Labels in Strategic Communication: Case Studies of Jewish Threat Propaganda in Nazi Germany, Countering Boko Haram and ISIS, and Use of Labels in U.S. Government Communication by Progressive Management
Cover of the book Risk Unbound: Threat, Catastrophe, and the End of Homeland Security - Risk Management, Lac-Megantic Quebec Oil Train Derailment Accident, 2015 Germanwings 9525 Airplane Crash, Hermeneutic Method by Progressive Management
Cover of the book Strategic Genius: What Traits Make a Great Military Leader? Gerhard Scharnhorst and William Slim as Examples, Elements of Courageous and Compelling Leaders, Ecology of Ideas for Cooperative Leadership by Progressive Management
Cover of the book U.S. Fire Administration and National Fire Academy Field Operations Guide (FOG) - ICS 420-1 - Guidance for the Application of the Incident Command System (ICS), Command, Planning, Multi-Casualty by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Personnel Readiness and Mobilization (Air Force Handbook 10-416 22) - ANGUS, USAFR, Callup by Progressive Management
Cover of the book Art of War Paper: Operations at the Border - Efforts to Disrupt Insurgent Safe-Havens, Dhofar, Oman, Insurgency, Counterinsurgency by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy