|Protecting Individual Privacy in the Struggle Against TerroristsA Framework for Program Assessment
All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness,...
Ballistic Imaging assesses the state of computer-based imaging technology in forensic firearms identification. The book evaluates the current law enforcement database of images of crime-related...
|Surveying VictimsOptions for Conducting the National Crime Victimization Survey
It is easy to underestimate how little was known about crimes and victims before the findings of the National Crime Victimization Survey (NCVS) became common wisdom. In the late 1960s, knowledge of...