Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

9 IN GOVERNMENT DATA MINING”
PRESENTATION OF HUGO TEUFEL, CHIEF PRIVACY
OFFICER, U.S. DEPARTMENT OF HOMELAND SECURITY
Section 804 of the 9/11 Commission Report Act, which
14 [APPLAUSE]
15 PRESENTATION OF JAY COHEN, UNDER SECRETARY OF
16 SCIENCE AND TECHNOLOGY DIRECTORATE, U.S. DEPARTMENT OF
17 HOMELAND SECURITY
8 Homeland Security? And so I thought I’d share with you
19 Department of Homeland Security. Today I would tell you I
17 weapons of mass destruction. Tom Friedman said IED’s are
12 you understand they live from ATM swipe to ATM swipe. And
Amherst. Professor Jensen currently serves on DARPA’s
1995. I give you Professor Jensen
PRESENTATION OF DAVID JENSEN, ASSOCIATE PROFESSOR
OF COMPUTER SCIENCE, UNIVERSITY OF MASSACHUSETTS
Association for Computing Machinery Special Interest Group
PANEL 1: HOW DOES GOVERNMENT DATA MINING IMPACT
Social Security Administration’s database and the IRS
AG Winds up on the Feds Terrorist Watch List. The Justice
8 Ms. Landesberg: Okay. Very good. And I’d now
18 want to say. What’s different maybe about IFF when you’re
20 Mr. Nojeim: May I just add one -- I think it’s
17 the Director of the NSA testified that the NSA at that time
13 useful? Say it’s not Fred’s example where the NSA is
16 Mr. Clifton: Yeah. Chris Clifton with Purdue
5 Ms. Schiller: My name is Jennifer Schiller; I
6 work for Under Secretary Cohen as his Privacy Liaison. So
15 medical -- I worked in HIPAA and the research parts of the
16 Katherine Hahn with SAS. I appreciate your comments. But
21 Mr. Schneiderman: I’m Ben Schneiderman from the
13 which is not part of the TSA’s current No Fly List. If
21 real problem.’ And I’ll just -- having -- I’ll just
20 PANEL 2: HOW CAN WE VALIDATE DATA MINING MODELS
21 AND RESULTS?
5 Mr. Hoyt: Okay. Thank you. I’m with the S&T --
10 the Chief Technology Officer for ID Analytics; Stephen
12 Security Advanced Research Projects Agency; and Professor
6 Mr. Jensen: So why don’t I start. One of the
21 Science and Technology Directorate. And Steve Coggeshall
14 Mr. Burns: Good afternoon. I’m Bob Burns. Like
1 Ms. Gregory: Hi. I’m Michelle Gregory from the
2 Pacific Northwest National Lab. And I’m a researcher in
21 HIPAA applications. It’s absolutely true that you can
PANEL 3: TECHNOLOGIES FOR PRIVACY-PROTECTIVE DATA
The fact that the DHS has a Privacy Office is really
Breichenruchardt with the U.S. Bill of Rights Foundation
(sic) Privacy When Big Brother is Watching.” And what it
CERTIFICATE OF TRANSCRIBER
0 of .
Results for:
No results containing your search query
P. 1
Privacy Data Mining July24 2008 Minutes

Privacy Data Mining July24 2008 Minutes

Ratings: (0)|Views: 44 |Likes:
Published by enki2

More info:

Published by: enki2 on Jun 21, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/28/2011

pdf

text

original

You're Reading a Free Preview
Pages 6 to 60 are not shown in this preview.
You're Reading a Free Preview
Pages 66 to 71 are not shown in this preview.
You're Reading a Free Preview
Pages 77 to 119 are not shown in this preview.
You're Reading a Free Preview
Pages 125 to 263 are not shown in this preview.
You're Reading a Free Preview
Pages 269 to 274 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Acharya liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->