|
|
|||
|
||||
Awards
OverviewAn excellent resource for high school and college students, this book surveys the size, scope, and nature of government surveillance in 21st-century America, with a particular focus on technology-enabled surveillance and its impact on privacy and other civil liberties. The advent of online, cellular, and other digital networks has enabled today's government surveillance operations to become more extensive and far more thorough than any other programs before them. Where does the line between taking actions to help ensure the safety of the general population against terrorism and other threats and the privacy of individual citizens lie? Is there any such clearly defined line anymore? This two-volume set examines the key issues surrounding government surveillance and privacy in 21st-century America, covering topics ranging from the surveillance conducted during colonial days, which inspired the Fourth Amendment, to the new high-tech developments that pose unprecedented potential challenges to the privacy of millions of Americans. Readers will gain insight into the complex challenge of interpreting the Fourth Amendment protections against warrantless, unreasonable government searches and understand how changes in the methods by which the U.S. government carries out counterterrorism and law enforcement activities influence its relationship with American citizens and businesses. Provides up-to-date perspectives on the current-day challenges regarding surveillance in America and recent events such as government response to Edward Snowden that tie these modern topics to the historic roots of surveillance issues in the United States Presents information that is accessible and useful both to those with little understanding of technology and those who are tech-savvy Impartially explains the full range of perspectives on relationship/tradeoffs between national security and crime-fighting benefits of surveillance and the erosion of personal liberties and privacy Includes primary source documents such as essential laws, court rulings, Justice Department statements, presidential statements, and Congressional testimony from national security experts and civil liberties advocates Full Product DetailsAuthor: Pam Dixon, Executive DirectorPublisher: Bloomsbury Publishing Plc Imprint: Greenwood Press Dimensions: Width: 18.30cm , Height: 6.10cm , Length: 26.20cm Weight: 2.132kg ISBN: 9781440840548ISBN 10: 1440840547 Pages: 744 Publication Date: 12 February 2016 Recommended Age: From 7 to 17 years Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents"VOLUME ONE Reader's Guide to Related Topics and Primary Documents, Preface, pam dixon Introduction, Chronology, A–Z Entries, Administrative Searches, Alexander, Keith B. (1951–), Alien Registration Act, American Civil Liberties Union (ACLU), American Civil Liberties Union v. Clapper (2015), American Civil Liberties Union v. National Security Agency (2007), Anonymization and De-identification, Antiwiretapping Statutes, Arizona v. Evans (1995), Ashcroft, John (1942–), Automobile Stops and Searches, Background Checks (Employment and Volunteerism), Bamford, James (1946–), Banking and Financial Records, Bartnicki v. Vopper (2001), Biometrics, Boyd v. United States (1886), Brandeis, Louis (1856–1941), Cable Communications Policy Act of 1984, California v. Ciraolo (1986), California v. Greenwood (1988), Carnivore, Cellular Phones, Central Intelligence Agency (CIA), Church Committee, Civil Rights and Liberties during Wartime, Clapper, James R. (1941–), Clapper v. Amnesty International USA (2013), Clipper and Capstone Chips, Cloud Computing, Communications Assistance for Law Enforcement Act (CALEA), Consent Searches, Constitutional Protections, Crypto Wars, Data Brokers, Data Collection, Online, Data Mining, Davis v. Mississippi (1969), Deep Packet Inspection (DPI), Delaware v. Prouse (1979), Douglas, William O. (1898–1980), Drones, Due Process Clause, Echelon, Electronic Communications Privacy Act (ECPA), Electronic Mail, Electronic Surveillance, Encryption, Espionage Act of 1917, E-Verify, Exclusionary Rule, Executive Order 9066, Executive Order 12333, Fair Information Practices, Federal Bureau of Investigation (FBI), Firearms Registration, Firewalls, Five Eyes, Foreign Intelligence Surveillance Act (FISA), Foreign Intelligence Surveillance Court (FISC), Fourth Amendment, Freedom of Information Act (FOIA), Fusion Centers, ""Good-Faith"" Exception, Greenwald, Glenn (1967–), Griswold v. Connecticut (1965), Hayden, Michael (1945–), Health Information Privacy, Hemisphere Project, Hepting v. AT&T (2009), Hoover, J. Edgar (1895–1972), House Un-American Activities Committee (HUAC), Illinois v. Krull et al. (1987), Illinois v. Lidster (2004), Inevitable Discovery, Internal Security Act of 1950, Jewel v. National Security Agency (2015), Klayman v. Obama (2013), Klein, Mark, Leahy, Patrick (1940–), McCarthyism, Michigan Department of State Police v. Sitz (1990), National Identity Cards, National Security Letters (NSLs), National Security Agency (NSA), Next Generation Identification (NGI), 9/11 Commission, Orwell, George (1903–1950), Persistent Online Tracking, Plain View Doctrine, Police Militarization, President's Surveillance Program (PSP), PRISM, Privacy Act of 1974, Privacy Advocacy Organizations, Privacy, Informational, Profiling, Reasonable Expectation of Privacy, Right to Financial Privacy Act (RFPA), Search Warrants, Sex Offender Registries, Snowden, Edward (1983–), Stingray Tracking Technology, Stop and Frisk, Surveillance, Surveillance Cameras, Surveillance–Industrial Complex, Terrorism, War on, Third-Party Doctrine, Transportation Security Administration (TSA), United States v. Davis (2015), United States v. U.S. District Court (1972), USA PATRIOT Act, Vernonia School District v. Acton (1995), Warrantless Searches, Warrantless Wiretapping, Zero Days, VOLUME TWO Contents, Reader's Guide to Related Topics and Primary Documents, Primary Documents, 1761 James Otis Composes ""Against the Writs of Assistance,"" 1791 The Bill of Rights, 1798 The Sedition Act, 1890 ""The Right to Privacy in America,"" 1914 The Supreme Court Establishes the Exclusionary Rule in Weeks v. United States, 1918 The Sedition Act, 1919 The Supreme Court Establishes ""Clear and Present Danger"" Doctrine in Schenck v. United States, 1928 Justice Brandeis's Dissent in Olmstead v. United States, 1940 The Alien Registration Act, 1942 President Roosevelt Orders the Internment of Japanese Americans, 1944 Ex Parte Endo Ruling Paves the Way for Closing of Internment Camps, 1947 President Truman's ""Loyalty Program"" Executive Order, 1950 President Truman Vetoes the Proposed Internal Security Act, 1950 Congress Passes the Internal Security Act over Truman's Veto, 1958 Miller v. United States Decision Limits Police ""Knock and Announce"" Powers, 1961 The Supreme Court Expands the Exclusionary Rule in Mapp v. Ohio, 1965 Albertson Supreme Court Decision Weakens the Subversive Activities Control Board, 1965 The Supreme Court Finds a Constitutional Right to Privacy in Griswold v. Connecticut, 1967 The Supreme Court Expands Privacy Rights in Katz v. United States, 1968 President Johnson Criticizes Eavesdropping Provisions in Crime Control Act, 1976 The Church Committee Releases Shocking Revelations of Government Surveillance, 1978 President Carter Signs the Foreign Intelligence Surveillance Act (FISA), 1979 The Supreme Court Upholds the Use of Pen Registers in Smith v. Maryland, 1984 The Supreme Court Bolsters the Exclusionary Rule in United States v. Leon, 1986 The Electronic Communications Privacy Act, 1988 The FBI Defends Its Library Awareness Program, 1994 The Clinton White House Endorses Clipper and Capstone, 1994 Congressman Hyde Praises the Communications Assistance for Law Enforcement Act, 2000 The Supreme Court Rules on Checkpoints in City of Indianapolis v. Edmond, 2001 The Supreme Court Rules on Thermal-Imaging Surveillance in Kyllo v. United States, 2001 President Bush Addresses Congress after the September 11 Attacks, 2001 Senator Feingold Speaks Out against the USA PATRIOT Act, 2001 President Bush Signs the USA PATRIOT Act, 2001 Section 213 and Section 215 of the USA PATRIOT Act, 2002 Secret FISA Court Rejects a Justice Department Surveillance Request, 2002 The Supreme Court Sanctions School Drug Testing, 2002 President Bush Signs the Homeland Security Act, 2003 The American Library Association Issues a Resolution on Privacy and Civil Liberties, 2003 Representative Sanders Introduces the Freedom to Read Protection Act, 2003 Attorney General Ashcroft Defends the PATRIOT Act on Capitol Hill, 2003 Congress Shuts Down ""Total Information Awareness"" Program, 2004 A Report on Law Enforcement's ""Little Helpers""—Data Aggregators, 2005 A Bush Administration Official Urges Reauthorization of the PATRIOT Act, 2005 The Supreme Court Rules on Searches during Traffic Stops in Illinois v. Caballes, 2006 President Bush Defends the NSA and the PATRIOT Act, 2006 Senator Leahy Lambasts Republican Opposition to PATRIOT Act Reforms, 2006 President Bush Signs a Reauthorization of the PATRIOT Act, 2006 Roving Wiretaps and ""Sneak and Peek"" Warrants, 2006 District Court Rules NSL Gag Orders Unconstitutional, 2007 Inspector General's Report Reveals FBI Abuse of National Security Letters, 2008 Secret DOJ Inspector General Report on FBI Use of Section 215 Orders, 2008 President Bush Signs the FISA Amendments Act (FAA), 2010 Supreme Court Ruling in Berghuis v. Thompkins Narrows Miranda Rights, 2012 Two Democratic Senators Debate Reauthorization of FISA, 2013 An American Librarian Recalls Receiving a National Security Letter, 2013 The Secret FISA Verizon Order, 2013 Presidential Task Force Report on Liberty and Security in a Changing World, 2013 A Privacy Rights Group Examines Governmental Use of Commercial Data Brokers, 2014 President Obama Responds to the Task Force Review of NSA Operations, 2014 Privacy and Civil Liberties Oversight Board Condemns the NSA's Section 215 Program, 2014 Senator Feinstein Reacts to Revelations of CIA Spying on the Senate, 2014 World Privacy Forum Urges Stronger Privacy Protections for Medical Records, 2014 FBI Director Comey Discusses the Dangers of ""Going Dark,"" 2014 Three Senators Speak Out in Support of the USA Freedom Act, 2014 Three Senators Speak Out against the USA Freedom Act, 2015 Revelations of SIM Card Spying by the NSA and GCHQ, Bibliography, About the Contributors, Index,"ReviewsThis is a solid first stop for general research on surveillance. - Library Journal This is a solid first stop for general research on surveillance. - Library Journal This two-volume set represents essential reading for public libraries. Acquisition decision makers in high schools, community colleges, and universities should consider adopting this important work. In addition, this excellent resource would benefit lawyers, law enforcement officers, and government agencies on the local, state, and federal level. - ARBA This two-volume set represents essential reading for public libraries. Acquisition decision makers in high schools, community colleges, and universities should consider adopting this important work. In addition, this excellent resource would benefit lawyers, law enforcement officers, and government agencies on the local, state, and federal level. - ARBA This is a solid first stop for general research on surveillance. - Library Journal """This is a solid first stop for general research on surveillance."" - Library Journal ""This two-volume set represents essential reading for public libraries. Acquisition decision makers in high schools, community colleges, and universities should consider adopting this important work. In addition, this excellent resource would benefit lawyers, law enforcement officers, and government agencies on the local, state, and federal level."" - ARBA" Author InformationPam Dixon is a researcher on the topics of medical privacy, data brokers, and other contemporary privacy topics. She is the founder and executive director of the World Privacy Forum, a nonprofit public interest research group. Tab Content 6Author Website:Countries AvailableAll regions |