{ "id": "RL31730", "type": "CRS Report", "typeId": "REPORTS", "number": "RL31730", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 101503, "date": "2003-03-21", "retrieved": "2016-04-08T14:50:15.920544", "title": "Privacy: Total Information Awareness Programs and Related Information Access, Collection, and Protection Laws", "summary": "This report describes the Total Information Awareness (TIA) programs in the Defense Advanced\nResearch Projects Agency (DARPA) of the Department of Defense, and related information access,\ncollection, and protection laws. TIA is a new technology under development that plans to use data\nmining technologies to sift through personal transactions in electronic data to find patterns and\nassociations connected to terrorist threats and activities. Data mining technologies are currently used\nby federal agencies for various purposes. DARPA has underway a five year research project to\ndevelop and integrate information technologies into prototype systems to identify foreign terrorists\nfor use by the intelligence, counterintelligence, law enforcement, and homeland security\ncommunities. Recent increased awareness about the existence of the TIA project provoked\nexpressions of concern about the potential for the invasion of privacy of law-abiding citizens by the\nGovernment, and about the direction of the project by John Poindexter, a central figure in the\nIran-Contra affair. While the law enforcement and intelligence communities argue that more\nsophisticated information gathering techniques are essential to combat today's sophisticated\nterrorists, civil libertarians worry that the Government's increased capability to assemble information\nwill result in increased and unchecked government power, and the erosion of individual privacy. A\ncoalition of public interest groups has asked Congress to intervene.\n Significant policy and legal issues are raised by the government's TIA plans. Chief among\nthem are privacy issues involving questions of access to, and use and disclosure of personal\ninformation by the federal government. This report describes current laws and safeguards to protect\nthe privacy of personal information, the required legal process for officials who seek access to\ninformation, and the provisions currently in place that permit access and dissemination of\ninformation for law enforcement, intelligence, and terrorism purposes. Federal laws currently protect\ngovernment, credit, communications, education, bank, cable, video, motor vehicle, health,\ntelecommunications, children's, and financial information; generally carve out exceptions for\ndisclosure of personal information; and authorize use of warrants, subpoenas, and court orders to\nobtain information. \n Some Members of Congress seek additional Congressional oversight of TIA programs. \nLegislation has been introduced in the 108th Congress regulating TIA programs. On January 23,\n2003, the Senate passed amendment S.Amdt. 59 to H.J.Res. 2 , the\nOmnibus Appropriations Act for Fiscal Year 2003, imposing limitations on the unfolding Total\nInformation Awareness programs, and requiring a detailed report to Congress. On February 13,\n2003, both the House and Senate approved the Fiscal Year 2003 omnibus spending bill ( P.L. 108-7 )\nincluding, with slight modifications, the language from S.Amdt. 59 . For more\ninformation, see CRS Report RL31786 , Total Information Awareness Programs: Funding, Oversight\nand Composition Issues by Amy Belasco; and CRS Report RL31798 , Data Mining: An\nOverview, \nby Jeffrey Seifert. This report will be updated as warranted.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL31730", "sha1": "b235cd61aa96d169ec7265c23bb5cf903b851587", "filename": "files/20030321_RL31730_b235cd61aa96d169ec7265c23bb5cf903b851587.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL31730", "sha1": "df3e8bb6048b2c3a3a76e2b279a30d5c26c8027c", "filename": "files/20030321_RL31730_df3e8bb6048b2c3a3a76e2b279a30d5c26c8027c.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs3918/", "id": "RL31730 2003-02-14", "date": "2003-02-14", "retrieved": "2005-06-10T22:09:45", "title": "Privacy: Total Information Awareness Programs and Related Information Access, Collection, and Protection Laws", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030214_RL31730_0689320f0ff3c3fd64b89774334996ed91d7ddec.pdf" }, { "format": "HTML", "filename": "files/20030214_RL31730_0689320f0ff3c3fd64b89774334996ed91d7ddec.html" } ], "topics": [ { "source": "LIV", "id": "Civil liberties", "name": "Civil liberties" }, { "source": "LIV", "id": "Right of privacy - Law and legislation - U.S.", "name": "Right of privacy - Law and legislation - U.S." } ] } ], "topics": [ "American Law", "Appropriations", "Intelligence and National Security" ] }