Chemical Facility Anti-terrorism Act of 2008 PDF Download
Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Chemical Facility Anti-terrorism Act of 2008 PDF full book. Access full book title Chemical Facility Anti-terrorism Act of 2008 by United States. Congress. House. Committee on Homeland Security. Download full books in PDF and EPUB format.
Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity Publisher: ISBN: Category : Law Languages : en Pages : 56
Author: United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Environment and Hazardous Materials Publisher: ISBN: Category : Law Languages : en Pages : 172
Author: United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs Publisher: ISBN: Category : Chemical plants Languages : en Pages : 72
Author: Dana Shea Publisher: DIANE Publishing ISBN: 1437983278 Category : Reference Languages : en Pages : 28
Book Description
The Dept. of Homeland Security (DHS) regulates chemical facilities for security purposes. The 111th Congress extended this authority through March 4, 2011, and debated the scope and details of reauthorization. Some Members of Congress supported an extension of the existing authority. Other Members called for revision and more extensive codification of chemical facility security regulatory provisions. There are questions regarding the current law's effectiveness in reducing chemical facility risk and the sufficiency of federal funding for chemical facility security. Contents of this report: Introduction; Overview of Statute and Regulation; Implementation; Policy Issues; Policy Options; Congressional Action. Tables. This is a print on demand report.
Author: National Research Council Publisher: National Academies Press ISBN: 0309124883 Category : Computers Languages : en Pages : 377
Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.