Session 3: Data Mining

Randy Ferryman, U.S. National Counter Terrorism Center

John Hollywood, Rand Corporation

David Jensen, Knowledge Discovery Laboratory, University of Massachusetts, Amherst

Jeff Jonas, Entity Analytic Systems, IBM Corporation David Scott, Rice University

Kim Taipale, Center for Advanced Studies in Science and Technology Policy


July 27-28, 2006


Session 1: Privacy Laws and Concepts; Law and Policy Revision Efforts


Lee Tien, Electronic Frontier Foundation


Session 2: Law Enforcement, Counter-Terrorism, and Privacy


Philip R. Reitinger, Trustworthy Computing, Microsoft Corporation


Session 3: Data Mining in the Commercial World


Scott Loftesness, Glenbrook Partners

Dan Schutzer, Financial Services Technology Consortium


October 26-27, 2006


Session 1: Providing a National Perspective


Adm. Scott Redd, National Counter Terrorism Center


Session 2: Law Enforcement Intelligence


Michael Fedarcyk, Bearingpoint and Federal Bureau of Investigation (retired)

Roy I. Apseloff, National Media Exploitation Center

Joe Connell, Counter-Terrorist Command, New Scotland Yard


Session 3: Status of Research on Deception Detection Technologies


Mark Frank, University at Buffalo

Rafi Ron, Ben Gurion Airport, Israel (retired) and Boston Logan Airport



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement