All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
The primary function of the intelligence analyst is to make sense of information about the world, but the way analysts do that work will look profoundly different a decade from now. Technological changes will bring both new advances in conducting analysis and new risks related to technologically based activities and communications around the world. Because these changes are virtually inevitable, the Intelligence Community will need to make sustained collaboration with researchers in the social and behavioral sciences (SBS) a key priority if it is to adapt to these changes in the most productive ways. A Decadal Survey Of The Social and Behavioral Sciences provides guidance for a 10-year research agenda. This report identifies key opportunities in SBS research for strengthening intelligence analysis and offers ideas for integrating the knowledge and perspectives of researchers from these fields into the planning and design of efforts to support intelligence analysis.
Increasingly, the core mission of the Centers for Medicare and Medicaid Services (CMS), an agency of the Department of Health and Human Services, is expanding from one of focusing on prompt claims payment to one of becoming more broadly involved in improving health care quality and efficiency. The requirements for the information technology (IT) systems of CMS are changing as its mission changes, and the efforts to evolve its systems from those designed to support the agency's historical mission come in the midst of a push to modernize the nation's health care IT more broadly. These new challenges arise even as CMS must meet challenging day-to-day operational requirements and make frequent adjustments to its business processes, code, databases, and systems in response to changing statutory, regulatory, and policy requirements. In light of these and other emerging challenges, CMS asked the National Research Council to conduct a study that would lay out a forward-looking vision for the Centers for Medicare and Medicaid Services, taking account of CMS's mission, business processes, and information technology requirements. The study is being conducted in two phases. The first, resulting in the present volume, draws on a series of teleconferences, briefings, and an information-gathering workshop held in Washington, D.C., on September 27-28, 2010. The second phase, drawing on that workshop and on additional briefings, site visits, and committee deliberations, will result in a final report with recommendations, to be issued at the end of the project in 2011.
The Centers for Medicare and Medicaid Services (CMS) is the agency in the Department of Health and Human Services responsible for providing health coverage for seniors and people with disabilities, for limited-income individuals and families, and for children-totaling almost 100 million beneficiaries. The agency's core mission was established more than four decades ago with a mandate to focus on the prompt payment of claims, which now total more than 1.2 billion annually. With CMS's mission expanding from its original focus on prompt claims payment come new requirements for the agency's information technology (IT) systems. Strategies and Priorities for Information Technology at the Centers for Medicare and Medicaid Services reviews CMS plans for its IT capabilities in light of these challenges and to make recommendations to CMS on how its business processes, practices, and information systems can best be developed to meet today's and tomorrow's demands. The report's recommendations and conclusions offered cluster around the following themes: (1) the need for a comprehensive strategic technology plan; (2) the application of an appropriate metamethodology to guide an iterative, incremental, and phased transition of business and information systems; (3) the criticality of IT to high-level strategic planning and its implications for CMS's internal organization and culture; and (4) the increasing importance of data and analytical efforts to stakeholders inside and outside CMS. Given the complexity of CMS's IT systems, there will be no simple solution. Although external contractors and advisory organizations will play important roles, CMS needs to assert well-informed technical and strategic leadership. The report argues that the only way for CMS to succeed in these efforts is for the agency, with its stakeholders and Congress, to recognize resolutely that action must be taken, to begin the needed cultural and organizational transformations, and to develop the appropriate internal expertise to lead the initiative with a comprehensive, incremental, iterative, and integrated approach that effectively and strategically integrates business requirements and IT capabilities.
Publicly available statistics from government agencies that are credible, relevant, accurate, and timely are essential for policy makers, individuals, households, businesses, academic institutions, and other organizations to make informed decisions. Even more, the effective operation of a democratic system of government depends on the unhindered flow of statistical information to its citizens. In the United States, federal statistical agencies in cabinet departments and independent agencies are the governmental units whose principal function is to compile, analyze, and disseminate information for such statistical purposes as describing population characteristics and trends, planning and monitoring programs, and conducting research and evaluation. The work of these agencies is coordinated by the U.S. Office of Management and Budget. Statistical agencies may acquire information not only from surveys or censuses of people and organizations, but also from such sources as government administrative records, private-sector datasets, and Internet sources that are judged of suitable quality and relevance for statistical use. They may conduct analyses, but they do not advocate policies or take partisan positions. Statistical purposes for which they provide information relate to descriptions of groups and exclude any interest in or identification of an individual person, institution, or economic unit. Four principles are fundamental for a federal statistical agency: relevance to policy issues, credibility among data users, trust among data providers, and independence from political and other undue external influence. Principles and Practices for a Federal Statistical Agency: Fifth Edition explains these four principles in detail.
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.