Download Free Appendix C To The Draftee And Internal Security Book in PDF and EPUB Free Download. You can read online Appendix C To The Draftee And Internal Security and write the review.

In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them into even more lethal forms. Policymakers and the scientific community at large must put forth a vigorous and immediate response to this challenge. This new book by the National Research Council recommends that the government expand existing regulations and rely on self-governance by scientists rather than adopt intrusive new policies. One key recommendation of the report is that the government should not attempt to regulate scientific publishing but should trust scientists and journals to screen their papers for security risks, a task some journals have already taken up. With biological information and tools widely distributed, regulating only U.S. researchers would have little effect. A new International Forum on Biosecurity should encourage the adoption of similar measures around the world. Seven types of risky studies would require approval by the Institutional Biosafety Committees that already oversee recombinant DNA research at some 400 U.S. institutions. These "experiments of concern" include making an infectious agent more lethal and rendering vaccines powerless.
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
This work builds on earlier publications in this series, particularly Occasional Paper Number Nine, The Creation of the National Imagery and Mapping Agency: Congress's Role as Overseer, by Anne Daugherty Miles. The author of the present paper has examined how the Coast Guard became a member of the Intelligence Community, how Congress was involved, and how Congress will likely be increasingly involved in the organization of the Community. Although the United States Coast Guard has utilized intelligence capabilities since the service's inception in 1790, the Coast Guard was not included as a formal member of the Intelligence Community until December 2002. Mr. Wirth describes the story behind the short but significant amendment to the National Security Act of 1947 which resulted in the Coast Guard's formal entry into the Intelligence Community. Researched within eighteen months of passage, this case study exhaustively documents extensive congressional and Coast Guard staff work. Interviews at the action officer level clearly reveal the view from the bureaucratic trenches, and additional attention to talking points, meeting minutes, and email summaries add immediacy as they further clarify positions from within departments, staffs and agencies. A brief examination of the surrounding political and geopolitical events, such as the bombing of the USS Cole, political changes in Congress, internal Coast Guard actions, and the tragic attacks of September 11th, provide context to the passage of this provision. Derived from a thesis completed in 2003, this paper illustrates the importance of gathering electronic data immediately, since much of the reference material on which this study is based existed only as informal e-mail or documents stored on computers. Much of it likely would have been erased had the research started even a year later.