In this Book

summary

Can we safeguard our nation's security without weakening cherished liberties? And how does technology affect the potential conflict between these fundamental goals? These questions acquired renewed urgency in the wake of the 9/11 attacks. They also spurred heated debates over such controversial measures as Total Information Awareness and the USA PATRIOT Act. In this volume, leading figures from the worlds of government, public policy, and business analyze the critical issues underlying these debates. The first set of essays examines the relationship between liberty and security and explores where the public stands on how best to balance the two. In the second section, the authors focus on information technology's role in combating terrorism, as well as tools, policies, and procedures that can strengthen both security and liberty at the same time. Finally, the third part of the book takes on a series of key legal issues concerning the restrictions that should be placed on the government's power to exploit these powerful new technologies. Contributors include Zoë Baird (Markle Foundation), James Barksdale (Barksdale Group), Bruce Berkowitz (Hoover Institution), Jerry Berman (Center for Democracy and Technology), Beryl A. Howell (Stroz Friedberg), Jon Kyl (U.S. Senate), Gilman Louie (In-Q-Tel), David Luban (Georgetown University), Richard A. Posner (U.S. Court of Appeals for the Seventh Circuit), Marc Rotenberg (Electronic Privacy Information Center), James Steinberg (Brookings), Larry Thompson (Brookings), Gayle von Eckartsberg (In-Q-Tel), and Alan F. Westin (Columbia University).

Table of Contents

restricted access Download Full Book
  1. Title Page, Copyright
  2. pp. i-iv
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Foreword
  2. Ramon Barquin and Jane Fishkin
  3. pp. vii-x
  4. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. xi-xii
  3. restricted access
    • Download PDF Download
  1. I. Introduction: Security and Liberty in the Twenty-first Century
  1. 1. Providing Security and Protecting Liberty
  2. Clayton Northouse
  3. pp. 3-18
  4. restricted access
    • Download PDF Download
  1. 2. How the Public Sees the Security-versus-Liberty Debate
  2. Alan F. Westin
  3. pp. 19-36
  4. restricted access
    • Download PDF Download
  1. II. Protecting Security and Liberty: Information Technology's Role
  1. 3. Information Technology and the New Security Challenges
  2. James Steinberg
  3. pp. 37-50
  4. restricted access
    • Download PDF Download
  1. 4. Building a Trusted Information-Sharing Environment
  2. Zoƫ Baird and James Barksdale
  3. pp. 51-62
  4. restricted access
    • Download PDF Download
  1. 5. Security and Liberty: How Technology Can Bridge the Divide
  2. Gilman Louie and Gayle von Eckartsberg
  3. pp. 63-73
  4. restricted access
    • Download PDF Download
  1. 6. Policies and Procedures for Protecting Security and Liberty
  2. Bruce Berkowitz
  3. pp. 74-88
  4. restricted access
    • Download PDF Download
  1. III. Technology, Security, and Liberty: The Legal Framework
  1. 7. Communications Assistance for Law Enforcement Act: Facing the Challenge of New Technologies
  2. Larry Thompson
  3. pp. 91-99
  4. restricted access
    • Download PDF Download
  1. 8. Security, Privacy, and Government Access to Commercial Data
  2. Jerry Berman
  3. pp. 100-117
  4. restricted access
    • Download PDF Download
  1. 9. Foreign Intelligence Surveillance Act: Has the Solution Become a Problem?
  2. Beryl A. Howell
  3. pp. 118-137
  4. restricted access
    • Download PDF Download
  1. 10. Why You Should Like the PATRIOT Act
  2. Jon Kyl
  3. pp. 138-159
  4. restricted access
    • Download PDF Download
  1. 11. Why I Oppose the PATRIOT Act
  2. Russ Feingold
  3. pp. 160-180
  4. restricted access
    • Download PDF Download
  1. Liberty and Security Timeline
  2. pp. 181-188
  3. restricted access
    • Download PDF Download
  1. Further Resources
  2. pp. 189-200
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. 201-204
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 205-218
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.