Government Information

Earl Gregg Swem Library

The U.S. Intelligence Community: Selected Cross-Cutting Issues

Categories: Govt Finance,Govt Secrecy,Privacy,Spying/Intelligence

http://www.fas.org/sgp/crs/intel/R44455.pdf

Focuses on management issues that affect the Intelligence Community’s ability to counter pervasive and emerging threats.  Describes 8 issues of importance including a policy of continuous evaluation as a substitute for polygraph tests to monitor employee behavior and reliability.  From the Congressional Research Service, posted by the Federation of American Scientists

 

Micro Unmanned Aircraft Systems Aviation Rulemaking Committee Recommendations: Final Report

Categories: Headlines,Laws/Regulations,Privacy,Science/Technology,Transportation

http://www.faa.gov/uas/publications/media/Micro-UAS-ARC-FINAL-Report.pdf

Report from a federally-commissioned panel which recommends that commercial small drones be allowed to fly over populated areas.  Federal rules currently ban such flights, due to concerns about privacy and safety, especially near airports.  From the Federal Aviation Administration

 

Department of Homeland Security Privacy Office 2015 Freedom of Information Act Report

Categories: Govt Information,Homeland Security,Privacy

https://www.dhs.gov/sites/default/files/publications/dhs-foia-annual-report-fy-2015.pdf

Claims a 66% reduction in the backlog of FOIA requests over the past year and that DHS receives the largest number of FOIA requests of any federal agency. From the Department of Homeland Security

 

Chairman Wheeler’s Proposal to Give Broadband Consumers Increased Choice, Transparency and Security with Respect to their Data

Categories: Consumer Info/Protection,Laws/Regulations,Privacy,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2016/db0310/DOC-338159A1.pdf

A proposal that would apply the privacy requirements of the Communications Act to broadband Internet access services. Includes ISP’s duty to keep data secure, data breaches, and consumers’ right to know. From the Federal Communications Commission

 

2015 Data Mining Report to Congress

Categories: Laws/Regulations,Privacy,Science/Technology,Telecommunications/Internet

https://www.dhs.gov/sites/default/files/publications/2015%20Data%20Mining%20Report%20FINAL.pdf

Describes the activities, technology, and methods used by federal security officials, the sources of data used, the results of the activity, legal authorities supporting it, and the impact on citizen privacy. From the Department of Homeland Security

 

Encryption: Selected Legal Issues

http://www.fas.org/sgp/crs/misc/R44407.pdf

Provides background to the current encryption debate, including a primer on encryption basics, an overview of Apple, Google, and Facebook encryption policies, an overview of the Fifth Amendment right against self-incrimination, and a survey of case law at the Supreme Court and lower levels relating to compelled disclosure of encrypted information. From the Congressional Research Service, posted by the Federation of American Scientists

 

Cybersecurity National Action Plan Factsheet

Categories: Headlines,Homeland Security,Privacy,Science/Technology,Telecommunications/Internet

https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan

Establishes a long-term strategy to enhance U.S. cybersecurity awareness and protections, while protecting privacy. Creates a Commission on Enhancing National Cybersecurity to oversee U.S. efforts, a $3.1 billion Information Technology Modernization Fund to enable the modernizing of legacy IT equipment, and an emphasis on multi-factor authentication to protect online personal information. From the White House.

 

Transparency Report: The USA Freedom Act Business Records FISA Implementation

Categories: Civil/Human Rights,Govt Secrecy,Homeland Security,Laws/Regulations,Privacy

https://www.nsa.gov/civil_liberties/_files/UFA_Civil_Liberties_and_Privacy_Report.pdf

Announces steps taken to implement the USA Freedom Act and specific procedures adopted to protect privacy rights. From the National Security Agency

 

Next Page »