Session 3: Data Mining

Randy Ferryman, U.S. National Counter Terrorism Center

John Hollywood, Rand Corporation

David Jensen, Knowledge Discovery Laboratory, University of Massachusetts, Amherst

Jeff Jonas, Entity Analytic Systems, IBM Corporation David Scott, Rice University

Kim Taipale, Center for Advanced Studies in Science and Technology Policy

July 27-28, 2006

Session 1: Privacy Laws and Concepts; Law and Policy Revision Efforts

Lee Tien, Electronic Frontier Foundation

Session 2: Law Enforcement, Counter-Terrorism, and Privacy

Philip R. Reitinger, Trustworthy Computing, Microsoft Corporation

Session 3: Data Mining in the Commercial World

Scott Loftesness, Glenbrook Partners

Dan Schutzer, Financial Services Technology Consortium

October 26-27, 2006

Session 1: Providing a National Perspective

Adm. Scott Redd, National Counter Terrorism Center

Session 2: Law Enforcement Intelligence

Michael Fedarcyk, Bearingpoint and Federal Bureau of Investigation (retired)

Roy I. Apseloff, National Media Exploitation Center

Joe Connell, Counter-Terrorist Command, New Scotland Yard

Session 3: Status of Research on Deception Detection Technologies

Mark Frank, University at Buffalo

Rafi Ron, Ben Gurion Airport, Israel (retired) and Boston Logan Airport

The National Academies of Sciences, Engineering, and Medicine
500 Fifth St. N.W. | Washington, D.C. 20001

Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement