The NSA Report : : Liberty and Security in a Changing World / / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2014] ©2014 |
Year of Publication: | 2014 |
Edition: | Course Book |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (288 p.) :; 4 line illus. 2 tables. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781400851270 |
---|---|
ctrlnum |
(DE-B1597)447365 (OCoLC)979686368 |
collection |
bib_alma |
record_format |
marc |
spelling |
President's Review Group on Intelligence and Communications Technologies, The, author. aut http://id.loc.gov/vocabulary/relators/aut The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke. Course Book Princeton, NJ : Princeton University Press, [2014] ©2014 1 online resource (288 p.) : 4 line illus. 2 tables. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Transmittal Letter -- Acknowledgments -- Contents -- Preface -- Executive Summary -- Recommendations -- Chapter One. Principles -- Chapter Two. Lessons of History -- Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- Chapter Five. Determining What Intelligence Should Be Collected and How -- Chapter Six. Organizational Reform in Light of Changing Communications Technology -- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- Chapter Eight. Protecting What We Do Collect -- Conclusion -- Appendix A: The Legal Standards for Government Access to Communications -- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- Appendix E: US Government Role in Current Encryption Standards -- Appendix F: Review Group Briefings and Meetings -- Appendix G: Glossary -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) POLITICAL SCIENCE / Intelligence & Espionage. bisacsh Clarke, Richard A., author. aut http://id.loc.gov/vocabulary/relators/aut Morell, Michael J., author. aut http://id.loc.gov/vocabulary/relators/aut Sunstein, Cass R., author. aut http://id.loc.gov/vocabulary/relators/aut Swire, Peter, author. aut http://id.loc.gov/vocabulary/relators/aut Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015 9783110665925 print 9780691163208 https://doi.org/10.1515/9781400851270 https://www.degruyter.com/isbn/9781400851270 Cover https://www.degruyter.com/cover/covers/9781400851270.jpg |
language |
English |
format |
eBook |
author |
President's Review Group on Intelligence and Communications Technologies, The, President's Review Group on Intelligence and Communications Technologies, The, Clarke, Richard A., Morell, Michael J., Sunstein, Cass R., Swire, Peter, |
spellingShingle |
President's Review Group on Intelligence and Communications Technologies, The, President's Review Group on Intelligence and Communications Technologies, The, Clarke, Richard A., Morell, Michael J., Sunstein, Cass R., Swire, Peter, The NSA Report : Liberty and Security in a Changing World / Frontmatter -- Transmittal Letter -- Acknowledgments -- Contents -- Preface -- Executive Summary -- Recommendations -- Chapter One. Principles -- Chapter Two. Lessons of History -- Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- Chapter Five. Determining What Intelligence Should Be Collected and How -- Chapter Six. Organizational Reform in Light of Changing Communications Technology -- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- Chapter Eight. Protecting What We Do Collect -- Conclusion -- Appendix A: The Legal Standards for Government Access to Communications -- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- Appendix E: US Government Role in Current Encryption Standards -- Appendix F: Review Group Briefings and Meetings -- Appendix G: Glossary -- Index |
author_facet |
President's Review Group on Intelligence and Communications Technologies, The, President's Review Group on Intelligence and Communications Technologies, The, Clarke, Richard A., Morell, Michael J., Sunstein, Cass R., Swire, Peter, Clarke, Richard A., Clarke, Richard A., Morell, Michael J., Morell, Michael J., Sunstein, Cass R., Sunstein, Cass R., Swire, Peter, Swire, Peter, |
author_variant |
r g o i a c t t p rgoiactt rgoiacttp r g o i a c t t p rgoiactt rgoiacttp r a c ra rac m j m mj mjm c r s cr crs p s ps |
author_role |
VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn |
author2 |
Clarke, Richard A., Clarke, Richard A., Morell, Michael J., Morell, Michael J., Sunstein, Cass R., Sunstein, Cass R., Swire, Peter, Swire, Peter, |
author2_variant |
r a c ra rac m j m mj mjm c r s cr crs p s ps |
author2_role |
VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn VerfasserIn |
author_sort |
President's Review Group on Intelligence and Communications Technologies, The, |
title |
The NSA Report : Liberty and Security in a Changing World / |
title_sub |
Liberty and Security in a Changing World / |
title_full |
The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke. |
title_fullStr |
The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke. |
title_full_unstemmed |
The NSA Report : Liberty and Security in a Changing World / Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke. |
title_auth |
The NSA Report : Liberty and Security in a Changing World / |
title_alt |
Frontmatter -- Transmittal Letter -- Acknowledgments -- Contents -- Preface -- Executive Summary -- Recommendations -- Chapter One. Principles -- Chapter Two. Lessons of History -- Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- Chapter Five. Determining What Intelligence Should Be Collected and How -- Chapter Six. Organizational Reform in Light of Changing Communications Technology -- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- Chapter Eight. Protecting What We Do Collect -- Conclusion -- Appendix A: The Legal Standards for Government Access to Communications -- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- Appendix E: US Government Role in Current Encryption Standards -- Appendix F: Review Group Briefings and Meetings -- Appendix G: Glossary -- Index |
title_new |
The NSA Report : |
title_sort |
the nsa report : liberty and security in a changing world / |
publisher |
Princeton University Press, |
publishDate |
2014 |
physical |
1 online resource (288 p.) : 4 line illus. 2 tables. Issued also in print. |
edition |
Course Book |
contents |
Frontmatter -- Transmittal Letter -- Acknowledgments -- Contents -- Preface -- Executive Summary -- Recommendations -- Chapter One. Principles -- Chapter Two. Lessons of History -- Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- Chapter Five. Determining What Intelligence Should Be Collected and How -- Chapter Six. Organizational Reform in Light of Changing Communications Technology -- Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- Chapter Eight. Protecting What We Do Collect -- Conclusion -- Appendix A: The Legal Standards for Government Access to Communications -- Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- Appendix E: US Government Role in Current Encryption Standards -- Appendix F: Review Group Briefings and Meetings -- Appendix G: Glossary -- Index |
isbn |
9781400851270 9783110665925 9780691163208 |
url |
https://doi.org/10.1515/9781400851270 https://www.degruyter.com/isbn/9781400851270 https://www.degruyter.com/cover/covers/9781400851270.jpg |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
353 - Specific fields of public administration |
dewey-full |
353.1/70973 |
dewey-sort |
3353.1 570973 |
dewey-raw |
353.1/70973 |
dewey-search |
353.1/70973 |
doi_str_mv |
10.1515/9781400851270 |
oclc_num |
979686368 |
work_keys_str_mv |
AT presidentsreviewgrouponintelligenceandcommunicationstechnologiesthe thensareportlibertyandsecurityinachangingworld AT clarkericharda thensareportlibertyandsecurityinachangingworld AT morellmichaelj thensareportlibertyandsecurityinachangingworld AT sunsteincassr thensareportlibertyandsecurityinachangingworld AT swirepeter thensareportlibertyandsecurityinachangingworld AT presidentsreviewgrouponintelligenceandcommunicationstechnologiesthe nsareportlibertyandsecurityinachangingworld AT clarkericharda nsareportlibertyandsecurityinachangingworld AT morellmichaelj nsareportlibertyandsecurityinachangingworld AT sunsteincassr nsareportlibertyandsecurityinachangingworld AT swirepeter nsareportlibertyandsecurityinachangingworld |
status_str |
n |
ids_txt_mv |
(DE-B1597)447365 (OCoLC)979686368 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015 |
is_hierarchy_title |
The NSA Report : Liberty and Security in a Changing World / |
container_title |
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2014-2015 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1806143582978965504 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05189nam a22007335i 4500</leader><controlfield tag="001">9781400851270</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20142014nju fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400851270</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400851270</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)447365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)979686368</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL036000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">353.1/70973</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">President's Review Group on Intelligence and Communications Technologies, The, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The NSA Report :</subfield><subfield code="b">Liberty and Security in a Changing World /</subfield><subfield code="c">Michael J. Morell, President's Review Group on Intelligence and Communications Technologies, The, Peter Swire, Geoffrey R. Stone, Cass R. Sunstein, Richard A. Clarke.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Course Book</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (288 p.) :</subfield><subfield code="b">4 line illus. 2 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Transmittal Letter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Executive Summary -- </subfield><subfield code="t">Recommendations -- </subfield><subfield code="t">Chapter One. Principles -- </subfield><subfield code="t">Chapter Two. Lessons of History -- </subfield><subfield code="t">Chapter Three. Reforming Foreign Intelligence Surveillance Directed at United States Persons -- </subfield><subfield code="t">Chapter Four. Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons -- </subfield><subfield code="t">Chapter Five. Determining What Intelligence Should Be Collected and How -- </subfield><subfield code="t">Chapter Six. Organizational Reform in Light of Changing Communications Technology -- </subfield><subfield code="t">Chapter Seven. Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World -- </subfield><subfield code="t">Chapter Eight. Protecting What We Do Collect -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Appendix A: The Legal Standards for Government Access to Communications -- </subfield><subfield code="t">Appendix B: Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 -- </subfield><subfield code="t">Appendix C: US Intelligence: Multiple Layers of Rules and Oversight -- </subfield><subfield code="t">Appendix D: Avenues for Whistle-blowers in the Intelligence Community -- </subfield><subfield code="t">Appendix E: US Government Role in Current Encryption Standards -- </subfield><subfield code="t">Appendix F: Review Group Briefings and Meetings -- </subfield><subfield code="t">Appendix G: Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Intelligence & Espionage.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clarke, Richard A., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morell, Michael J., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sunstein, Cass R., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Swire, Peter, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2014-2015</subfield><subfield code="z">9783110665925</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691163208</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400851270</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400851270</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400851270.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-066592-5 Princeton University Press Complete eBook-Package 2014-2015</subfield><subfield code="c">2014</subfield><subfield code="d">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |