The NSA Report : : Liberty and Security in a Changing World / / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.

"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2014]
©2014
Year of Publication:2014
Edition:Course Book
Language:English
Online Access:
Physical Description:1 online resource (288 p.) :; 4 line illus. 2 tables.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781400851270
ctrlnum (DE-B1597)447365
(OCoLC)979686368
collection bib_alma
record_format marc
spelling President's Review Group on Intelligence and Communications Technologies, The, author. aut http://id.loc.gov/vocabulary/relators/aut
The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.
Course Book
Princeton, NJ : Princeton University Press, [2014]
©2014
1 online resource (288 p.) : 4 line illus. 2 tables.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Transmittal Letter -- Acknowledgments -- Contents -- Preface -- Executive Summary -- Recommendations -- Chapter One. Principles -- Chapter Two. Lessons of History -- Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- Chapter Five. Determining What Intelligence Should Be Collected and How -- Chapter Six. Organizational Reform in Light of Changing Communications Technology -- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- Chapter Eight. Protecting What We Do Collect -- Conclusion -- Appendix A: The Legal Standards for Government Access to Communications -- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- Appendix E: US Government Role in Current Encryption Standards -- Appendix F: Review Group Briefings and Meetings -- Appendix G: Glossary -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
POLITICAL SCIENCE / Intelligence & Espionage. bisacsh
Clarke, Richard A., author. aut http://id.loc.gov/vocabulary/relators/aut
Morell, Michael J., author. aut http://id.loc.gov/vocabulary/relators/aut
Sunstein, Cass R., author. aut http://id.loc.gov/vocabulary/relators/aut
Swire, Peter, author. aut http://id.loc.gov/vocabulary/relators/aut
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015 9783110665925
print 9780691163208
https://doi.org/10.1515/9781400851270
https://www.degruyter.com/isbn/9781400851270
Cover https://www.degruyter.com/cover/covers/9781400851270.jpg
language English
format eBook
author President's Review Group on Intelligence and Communications Technologies, The,
President's Review Group on Intelligence and Communications Technologies, The,
Clarke, Richard A.,
Morell, Michael J.,
Sunstein, Cass R.,
Swire, Peter,
spellingShingle President's Review Group on Intelligence and Communications Technologies, The,
President's Review Group on Intelligence and Communications Technologies, The,
Clarke, Richard A.,
Morell, Michael J.,
Sunstein, Cass R.,
Swire, Peter,
The NSA Report : Liberty and Security in a Changing World /
Frontmatter --
Transmittal Letter --
Acknowledgments --
Contents --
Preface --
Executive Summary --
Recommendations --
Chapter One. Principles --
Chapter Two. Lessons of History --
Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons --
Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons --
Chapter Five. Determining What Intelligence Should Be Collected and How --
Chapter Six. Organizational Reform in Light of Changing Communications Technology --
Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World --
Chapter Eight. Protecting What We Do Collect --
Conclusion --
Appendix A: The Legal Standards for Government Access to Communications --
Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 --
Appendix C: US Intelligence: Multiple Layers of Rules and Oversight --
Appendix D: Avenues for Whistle-blowers in the Intelligence Community --
Appendix E: US Government Role in Current Encryption Standards --
Appendix F: Review Group Briefings and Meetings --
Appendix G: Glossary --
Index
author_facet President's Review Group on Intelligence and Communications Technologies, The,
President's Review Group on Intelligence and Communications Technologies, The,
Clarke, Richard A.,
Morell, Michael J.,
Sunstein, Cass R.,
Swire, Peter,
Clarke, Richard A.,
Clarke, Richard A.,
Morell, Michael J.,
Morell, Michael J.,
Sunstein, Cass R.,
Sunstein, Cass R.,
Swire, Peter,
Swire, Peter,
author_variant r g o i a c t t p rgoiactt rgoiacttp
r g o i a c t t p rgoiactt rgoiacttp
r a c ra rac
m j m mj mjm
c r s cr crs
p s ps
author_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author2 Clarke, Richard A.,
Clarke, Richard A.,
Morell, Michael J.,
Morell, Michael J.,
Sunstein, Cass R.,
Sunstein, Cass R.,
Swire, Peter,
Swire, Peter,
author2_variant r a c ra rac
m j m mj mjm
c r s cr crs
p s ps
author2_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author_sort President's Review Group on Intelligence and Communications Technologies, The,
title The NSA Report : Liberty and Security in a Changing World /
title_sub Liberty and Security in a Changing World /
title_full The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.
title_fullStr The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.
title_full_unstemmed The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.
title_auth The NSA Report : Liberty and Security in a Changing World /
title_alt Frontmatter --
Transmittal Letter --
Acknowledgments --
Contents --
Preface --
Executive Summary --
Recommendations --
Chapter One. Principles --
Chapter Two. Lessons of History --
Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons --
Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons --
Chapter Five. Determining What Intelligence Should Be Collected and How --
Chapter Six. Organizational Reform in Light of Changing Communications Technology --
Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World --
Chapter Eight. Protecting What We Do Collect --
Conclusion --
Appendix A: The Legal Standards for Government Access to Communications --
Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 --
Appendix C: US Intelligence: Multiple Layers of Rules and Oversight --
Appendix D: Avenues for Whistle-blowers in the Intelligence Community --
Appendix E: US Government Role in Current Encryption Standards --
Appendix F: Review Group Briefings and Meetings --
Appendix G: Glossary --
Index
title_new The NSA Report :
title_sort the nsa report : liberty and security in a changing world /
publisher Princeton University Press,
publishDate 2014
physical 1 online resource (288 p.) : 4 line illus. 2 tables.
Issued also in print.
edition Course Book
contents Frontmatter --
Transmittal Letter --
Acknowledgments --
Contents --
Preface --
Executive Summary --
Recommendations --
Chapter One. Principles --
Chapter Two. Lessons of History --
Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons --
Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons --
Chapter Five. Determining What Intelligence Should Be Collected and How --
Chapter Six. Organizational Reform in Light of Changing Communications Technology --
Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World --
Chapter Eight. Protecting What We Do Collect --
Conclusion --
Appendix A: The Legal Standards for Government Access to Communications --
Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 --
Appendix C: US Intelligence: Multiple Layers of Rules and Oversight --
Appendix D: Avenues for Whistle-blowers in the Intelligence Community --
Appendix E: US Government Role in Current Encryption Standards --
Appendix F: Review Group Briefings and Meetings --
Appendix G: Glossary --
Index
isbn 9781400851270
9783110665925
9780691163208
url https://doi.org/10.1515/9781400851270
https://www.degruyter.com/isbn/9781400851270
https://www.degruyter.com/cover/covers/9781400851270.jpg
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 353 - Specific fields of public administration
dewey-full 353.1/70973
dewey-sort 3353.1 570973
dewey-raw 353.1/70973
dewey-search 353.1/70973
doi_str_mv 10.1515/9781400851270
oclc_num 979686368
work_keys_str_mv AT presidentsreviewgrouponintelligenceandcommunicationstechnologiesthe thensareportlibertyandsecurityinachangingworld
AT clarkericharda thensareportlibertyandsecurityinachangingworld
AT morellmichaelj thensareportlibertyandsecurityinachangingworld
AT sunsteincassr thensareportlibertyandsecurityinachangingworld
AT swirepeter thensareportlibertyandsecurityinachangingworld
AT presidentsreviewgrouponintelligenceandcommunicationstechnologiesthe nsareportlibertyandsecurityinachangingworld
AT clarkericharda nsareportlibertyandsecurityinachangingworld
AT morellmichaelj nsareportlibertyandsecurityinachangingworld
AT sunsteincassr nsareportlibertyandsecurityinachangingworld
AT swirepeter nsareportlibertyandsecurityinachangingworld
status_str n
ids_txt_mv (DE-B1597)447365
(OCoLC)979686368
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015
is_hierarchy_title The NSA Report : Liberty and Security in a Changing World /
container_title Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1806143582978965504
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05189nam a22007335i 4500</leader><controlfield tag="001">9781400851270</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20142014nju fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400851270</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400851270</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)447365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)979686368</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL036000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">353.1/70973</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">President's Review Group on Intelligence and Communications Technologies, The, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The NSA Report :</subfield><subfield code="b">Liberty and Security in a Changing World /</subfield><subfield code="c">Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Course Book</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (288 p.) :</subfield><subfield code="b">4 line illus. 2 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Transmittal Letter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Executive Summary -- </subfield><subfield code="t">Recommendations -- </subfield><subfield code="t">Chapter One. Principles -- </subfield><subfield code="t">Chapter Two. Lessons of History -- </subfield><subfield code="t">Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- </subfield><subfield code="t">Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- </subfield><subfield code="t">Chapter Five. Determining What Intelligence Should Be Collected and How -- </subfield><subfield code="t">Chapter Six. Organizational Reform in Light of Changing Communications Technology -- </subfield><subfield code="t">Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- </subfield><subfield code="t">Chapter Eight. Protecting What We Do Collect -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Appendix A: The Legal Standards for Government Access to Communications -- </subfield><subfield code="t">Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- </subfield><subfield code="t">Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- </subfield><subfield code="t">Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- </subfield><subfield code="t">Appendix E: US Government Role in Current Encryption Standards -- </subfield><subfield code="t">Appendix F: Review Group Briefings and Meetings -- </subfield><subfield code="t">Appendix G: Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Intelligence &amp; Espionage.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clarke, Richard A., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morell, Michael J., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sunstein, Cass R., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Swire, Peter, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2014-2015</subfield><subfield code="z">9783110665925</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691163208</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400851270</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400851270</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400851270.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-066592-5 Princeton University Press Complete eBook-Package 2014-2015</subfield><subfield code="c">2014</subfield><subfield code="d">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>