Information Technology Reference
In-Depth Information
[6]
“GINA: The Genetic Information Nondiscrimination Act of 2008: Information for Re-
searchers and Health Care Professionals.” Department of Health and Human Services,
USA, April 6, 2009. www.genome.gov.
[7]
Stephanie L. Hitt. “NCIC 2000.” FBI Law Enforcement Bulletin 69(7), July 2000.
[8]
Dan Eggen. “Justice Dept. Database Stirs Privacy Fears.” Washington Post ,December
26, 2006.
[9]
John T. Eberth. “Nation's First Surveillance Cameras Were Installed in Olean.” Olean
(
NY
)
Times Herald , October 5, 2008. www.oleantimesherald.com.
[10]
James Vlahos. “Surveillance Society: New High-Tech Cameras Are Watching You.”
Popular Mechanics , October 1, 2009.
[11]
Chris Dolmetsch. “Cameras to Catch Terrorists Triple in New York with Bomb Plots.”
Bloomberg, November 13, 2010. www.bloomberg.com .
[12]
Jamie Roth. “Bloomberg in London to Study Security System.” WABC Local News ,
May 11, 2010. abclocal.go.com/wabc/.
[13]
Jennifer Lee. “Study Questions Whether Cameras Cut Crime." New York Times ,March
3, 2009.
[14]
M. Angela Sasse. “Privacy and Security: Not Seeing the Crime for the Cameras?”
Communications of the ACM , pp. 22-25, February 2010.
[15]
Federal Aviation Administration. “Fact Sheet—Unmanned Aircraft Systems (UAS).”
Press release, February 19, 2013. www.faa.gov .
[16]
Maggie Clark. “States Seek Legal Limits on Domestic Drones.” Stateline , February 22,
2013. www.pewstates.org .
[17]
Monmouth University. “US Supports Some Domestic Drone Use.” Press release, June
12, 2012.
[18]
Maggie Clark. “Boston Bombings Show Future Use for Police Drones.” Stateline ,May
2, 2013. www.pewstates.org.
[19]
Whitfield Diffie and Susan Landau. Privacy on the Line: The Politics of Wiretapping and
Encryption . MIT Press, Cambridge, MA, 1998.
[20]
Priscilla M. Regan. Legislating Privacy . University of North Carolina Press, Chapel
Hill, NC, 1995.
[21]
Justice Brandeis, dissenting. Supreme Court of the United States. Olmstead v. United
States, 277 US 438 (1928).
[22]
Supreme Court of the United States. Katz v. United States , 389 US 347 (1967).
[23]
James Bamford. The Puzzle Palace: A Report on America's Most Secret Agency . Penguin
Books, New York, NY, 1983.
[24]
Heinz Tschabitscher. “How Carnivore Email Surveillance Worked.” About.com, Ac-
cessed October 15, 2013. email.about.com.
[25]
Holly E. Ventura, J. Mitchell Miller, and Mathieu Deflem. “Governmentality and
the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary Power.”
Critical Criminology 13(1): 55-70, January 2005.
[26]
US District Court, Central District of California, Western Division. “In the Matter
of the Application of the United States of America for an Order Authorizing the
Installation of a Pen Register and Trap and Trace Device.” Criminal No. 99-2713M,
February 4, 2000.
[27]
Kevin Poulsen. “FBI Retires Its Carnivore.” SecurityFocus , January 14, 2005. www
.securityfocus.com.
 
Search WWH ::




Custom Search