Recent developments in U.S. privacy and security policy are traced, including coverage of the renewal of the PATRIOT Act, the domestic spying affair of 2005 to 2006, passage of the Real ID Act, and other developments associated with the Department of Homeland Security. Threats to democratic values are assessed.
ACLU. (2002). How the USA Patriot Act redefines “Domestic Terrorism.” Retrieved, March 8, 2006, from http://www.aclu.org/natsec/emergpowers/14444leg20021206.html
2.
Chabrow, E. (2005). Who's in charge around here?Government Enterprise/Information Week. Retrieved March 19, 2006, from http://www.governmententerprise.com/showArticle.jhtml>articleID=60401377
3.
Congress extends Patriot Act 5 weeks. (2006). CNN.com. Retrieved February 6, 2006, from http://www.cnn.com/2006/POLITICS/02/02/patriot.act.ap/
4.
Department of Homeland Security. (2006). Press release: Remarks by the Secretary of Homeland Security Michael Chertoff 2006 Bureau of Justice Assistance, U.S. Department of Justice and SEARCH Symposium on Justice and Public Safety Information Sharing. Retrieved March 29, 2006, from http://www.dhs.gov/dhspublic/display?content=5485
5.
Dizard, W. P., III. (2006a). DHS moves quickly to redirect Emerge2. Government Computer News, 25-25(2). Retrieved February 14, 2006, from http://www.gcn.com/25_2/news/380431.html
6.
Dizard, W. P.III, (2006b). OMB sees improvement in agencies' IT security. Government Computer News. Retrieved March 2, 2006, from http://www.gcn.com/vol1_no1/daily-updates/383491.html
7.
Fisher, W. (2005). Congress to probe domestic spying. Inter Press Service News Agency. Retrieved January 2, 2006, from http://www.ipsnews.net/news.asp?idnews=31530
8.
Government Technology News Staff. (2005). Belgium's e-government electronic identity card program. Government Technology. Retrieved February 17, 2006, from http://www.govtech.net/magazine/channel_story.php/97003
9.
Jho, W. (2005). Challenges for e-governance: Protests from civil society on the protection of privacy in e-government in Korea. International Review of Administrative Sciences, 71(1), 151-166.
10.
Lichtblau, E. (2006). Bush defends spy program and denies misleading public. New York Times. Retrieved January 2, 2006, from http://www.nytimes.com/2006/01/02/politics/02spy.html
11.
Lipowicz, A. (2005a). DHS chief privacy officer Kelly steps down. Government Computer News. Retrieved September 30, 2005, from http://www.gcn.com/vol1_no1/daily-updates/37145-1.html
12.
Lipowicz, A. (2005b). DHS plans to beef up cybersecurity. Government Computer News. Retrieved September 30, 2005, from http://www.gcn.com/vol1_no1/daily-updates/37146-1.html
13.
Lipowicz, A. (2005c). JRIES homeland security network falls victim to policy dispute. Government Computer News. Retrieved October 8, 2005, from http://www.gcn.com/vol1_no1/daily-updates/37223-1.html
14.
McKay, J. (2005, November). The security shuffle. Government Technology, pp. 32-40.
15.
Miller, J. (2005). IT security requirements now part of the FAR. Government Computer News. Retrieved October 4, 2005, from http://www.gcn.com/vol1_no1/daily-updates/37162-1.html
16.
Mosquera, M. (2005). GAO: Many agencies'financial management systems inadequate. Government Computer News. Retrieved September 26, 2005, from http://www.gcn.com/vol1_no1/daily-updates/37080-1.html
17.
Office of Management and Budget. (1998). Privacy and personal information in federal records (Memorandum C99-05). Retrieved November 30, 2005, from http://www.whitehouse.gov/omb/memoranda/m99-05-a.html
18.
Office of Management and Budget. (2005). Designation of senior agency officials for privacy(Memorandum CM-05-08). Retrieved November 30, 2005, from http://www.whitehouse.gov/omb/memoranda/fy2005/m05-08.pdf
19.
Temin, T. R. (2006). When to fold 'em. Government Computer News25-25(3). Retrieved December 14, 2005, from http://www.gcn.com/25_3/commentary/38138-1.html
20.
Vijayan, J. (2005, October 10). Feds make security a priority in IT purchases. Computer World, p. 7-7.