Date post: | 05-Feb-2023 |
Category: |
Documents |
Upload: | independent |
View: | 0 times |
Download: | 0 times |
1 PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & Carnegie Endowment for
International Peace
PRIVACY POLICIES OF GLOBAL THINK TANKS: Brookings Institution,
The Center for Strategic & International Studies (CSIS) &
Carnegie Endowment
Le Renard Etoile
UMUC:
For the record, this is my work and you are free
to use it as a reference however if turnitin flags
you, then that is your fault for trying to
plagiarize my work. If you get a lower grade,
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 3 Carnegie Endowment for International Peace
Table of Contents
Introduction P.3Privacy Policies & Foreign Policy Research Institutes P.5Privacy Policy: The Brookings Institution P.5Privacy Policy: Center for Strategic & International Studies P.7Privacy Policy: The Carnegie Endowment for International Peace P.8Suggested Confidentiality Variations to Shield Patrons & Advance Structural Constancy P.10Conclusion P.12References P.14
Suggested Confidentiality Variations to Shield
Patrons & Advance Structural Constancy
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 4 Carnegie Endowment for International Peace
Introduction
Liberty is one of the primary facets that comprise American
values lucidly defined in the U.S. Constitution. Distinguished
liberties inside the Constitution incorporate the entitlement to
express uncensored opinions, choice of religious practice, “the
due of unrestricted affiliation, liberty from needless pursuit
then capture, as well as liberty from self-implication” (Everett-
Church, 2011, pp. 124-125). Moreover, the Supreme Court
arbitrated on a myriad of litigations and lucidly established
liberties as well as their limits for the American public via
clarification of constitutional rights. However, these freedoms
have limits such as “liberty of discourse has boundaries as one
cannot scream “bomb in a cinema… initiating an alarm” (Schenck,
1919). One liberty, although not noticeably highlighted
constitutionally, is the right to privacy. Supreme Court
arbitrations have advanced and still clarified privacy with
regard to federal limits. Cases like “Griswold v. Connecticut (1965),
Eisenstadt v. Baird (1972), and Roe v. Wade were all momentous litigations
that concluded that the right to privacy was shielded
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 5 Carnegie Endowment for International Peace
constitutionally, despite no clear indication in the
Constitution” (McBride, 2006). Moreover, this due to
confidentiality has expounded by lawmaking gradually and
developed to comprise privacy prerogatives with regard to groups
and persons. Finally, in 1973, the Department of Health,
Education and Welfare (HEW) issued a Congressional report that
houses four fundamental confidentiality values that need
observation: notice, choice, access, and security. “Disclosure
in actions plus defense for clandestine data must be disclosed to
every invested customer; an individual should have the option to
furnish sensitive compartmentalized information and supervise the
fashion in which information is employed; the user should have
access to this data; and, lastly, the answerable group caching
the client’s sensitive data must impart a sound tier of defense
to protect this information” (The Privacy Act of 1974). Albeit
legislation has advanced since individuals began to utilize the
World Wide Web in the early 1990s, yielding acts such as COPPA
for children’s protection online and required information
security for corporations like the Sarbanes-Oxley Act, no
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 6 Carnegie Endowment for International Peace
monopoly for power on matters of privacy and law enforcement, as
the Attorney General, Federal Trade Commission (FTC), and
additional federal establishments generally have some monitoring
in the sector.
Privacy Policies & Foreign Policy Research Institutes
Through progress of information apparatuses and universality
with personal data entry worldwide, the difficulties in securing
sensitive data have increased. As a result of federal and client
demands, establishments are required to enact privacy statements
for how user data will be utilized. As a result of, information
procurement online via sheets, customer profiles, cookies, web
assessments, and user activities, organizations have had to make
available privacy policies to site visitors on the basis of the
HEW 1973 document.
While businesses and corporations are mandated to have
privacy policies to appease users, government ‘think-tanks’ share
just as an important role for having privacy policies. This is
key because ‘think-tanks’ have enough clout to influence the
political decision making process. According to Thomas Dye, an
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 7 Carnegie Endowment for International Peace
advocate of “Elite Theory”, think tanks are significant since the
notion postulates:
… Abundant control is established – and stems from positionsin public institutions and people holding topmost official roles harness clout whether they do openly to sway specific rulings or not (Dye, 2002, p. 7).
Therefore, the clout of a foreign policy institute to sway
the political choice deciding methodology ought to be brought
under audit not just for conventional toils offline, but also
online and especially concerning the way privacy issues are dealt
with. The Foreign Policy Research Institute harbors “an almanac
of defense and intercontinental dealings institutes numbering
“more than 4,500 groups from 126 countries worldwide” (Director
of security, n.d.) plus delivers an annual directory titled ‘The
Global ‘Go-To Think Tanks’” (Think Tanks and Foreign Policy
Program, n.d.). The 2011 version of “Go-To Think Tanks” contains
“allusions to 5,329 institutes deemed foremost from groups
worldwide and also lists the top institutes within the United
States for security and international affairs” (McGann, 2012, p.
17). The index comprises the Carnegie Endowment for
International Peace (#3), the Center for Strategic &
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 8 Carnegie Endowment for International Peace
International Studies (CSIS) (# 4), and the Brookings Institute
(#1) (McGann, 2012, p. 43). These three ‘think-tanks’ merit
scrutiny because each one of them stand out as the most prominent
in their industry but have privacy policies that need improvement
in several areas including: data storage, third party
involvement, and information security.
Privacy Policy:
Brookings Institute
The Brookings Institute which is one of the oldest “American
liberal think tank based in Washington, D.C tasked with
conducting research and education in the social sciences,
primarily in economics, metropolitan policy, and global economy
and development”(Tikannen, 2012.; Brookings Institute-About,
n.d.). Ranked as the top global think tank, “As a nonprofit
public policy organization, Brookings’ mission is to conduct
high-quality, independent research and, based on that research,
to provide innovative, practical recommendations that advance
three broad goals: strengthen the American democracy, foster the
economic and social welfare, security and opportunity of all
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 9 Carnegie Endowment for International Peace
Americans; and secure a more open, safe, prosperous and
cooperative international system” (Brookings-About, n.d.).
Honorary Mayor Michael Bloomberg of New York mentioned in a
speech on August 28, 2007, “Brookings has risen above
partisanship…and that is not an easy thing to do in this town
which is sort of built on partisanship” (Brookings Institution-
Reputation, n.d.).
The Brookings Institute has a published privacy policy
covering: data collection, online orders, surveys, customer
service and profile, aggregate information, personally
identifiable information, agents, legal disclaimers, log files,
cookies, transparent images, security and changes in policy for
site usage”(Brookings Privacy Policy, 2008). One item within
Brookings’ privacy policy is that, “We provide you the
opportunity to opt out of having your personally identifiable
information used for any purpose as well as…correct, update or
deactivate your personally identifiable information via email at
[email protected] or postal mail” (Privacy Policy,
2008) which indicates compliance with the ‘access’ component for
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 10 Carnegie Endowment for International Peace
users making it easy to reach. However, in a following statement,
the wording could be manipulated to imply information exchange
with third parties since “we use third parties to provide
fulfillment and processing functions on our site…we may share
information as necessary for the third party to provide those
services.” It is possible that third-parties are not bound by
Brookings’ Privacy Statement so this would act as a ‘loophole’
and market services to the users with unwanted mail and like. The
‘think-tank’ is also compliant with regards to ‘notice since “…if
we make material changes to this policy, we will notify you here,
by email, or by means of a notice on our home page” (Privacy
Policy, 2008). The institute’s policy also states that the
security used to “encrypt sensitive personal information is using
Secure Sockets Layer technology (SSL)” (About Us, n.d.). This
raises two issues. The first, while abstract, is that any data
that has been encrypted on the web no matter how deeply and
securely stored, can always be compromised by a skilled
‘cracker.’ The second issue is that SSL technology is considered
outdated in favor of Transport Layer Security (TLS) protocol for
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 11 Carnegie Endowment for International Peace
a few reasons. First, the “SSL cipher suites have a weaker key
derivation process; half of the master key that is established is
fully dependent on the MD5 hash function, which is not resistant
to collisions and there is not considered secure”(NIST, 2012, p.
160). Second, “matching cryptographic keys are utilized for
dispatch validation and encryption so if one is decoded, all the
rest become compromised” (NIST, 2012, p. 160).Third, SSL’s design
makes it vulnerable to man-in the middle and length extension
attacks”(Rescorla, 2009). For this rationale, “any SSL
implementation is not able to be validated by FIPS 140-2” (NIST,
2012, p. 33). In comparing The Brookings Institution to the HEW
1973, the ‘think tank’s privacy policy strong in access, choice
and fair in notice but it needs improvement in the security
as well as with wording since there are areas that can easily be
misinterpreted as their information is accessible by others.
Privacy Policy: The Center for Strategic & International
Studies (CSIS)
Another prominent foreign policy think tank, the Center for
Strategic & International Studies (CSIS), is a “bipartisan,
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 12 Carnegie Endowment for International Peace
nonprofit group” (CSIS, 2012) whose mission is to “cultivate
answers to issues facing the world, mainly concentrating on means
to promote American greatness in directing the world toward a
bright future” (CSIS, 2012). CSIS’ privacy policy entails:
information procurement, third party information sharing and
usage, along with IP tracing for website maximization” (CSIS
Privacy Policy, n.d.). Their confidentiality statement is rather
compressed when correlated to the Brooking Institute’s
procedures. In addition, there is no reference to any ‘notice’
for changes as well as for ‘security’ and has questionable
wording with regards to ‘choice’ and ‘access’. Additionally,
several facets in this statement appear conflicting. The first
sentence inside CSIS’ statement is that, “…We do not procure any
separately classifiable data concerning users throughout the
website” (CSIS, n.d.). The following sentence then acts to
refute the statement and observes data is collected if “… you
consent to share with us either directly, by email … or by
filling out digital sheets” (CSIS, n.d.). Such ‘language’ would
seemingly perplex guests of the website throughout the privacy
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 13 Carnegie Endowment for International Peace
policy. Furthermore, the statement proceeds to ambiguously
proclaim that third parties don’t purchase or obtain sensitive
data from CSIS users, unless these groups are sent data “… to
execute delegated duties …” (CSIS, n.d.); this wording makes it
difficult to understand all the terms of CSIS’ privacy statement.
While CSIS does seem to suggest a chance for individuals to
withdraw, it doesn’t offer guidelines on how to achieve this.
Lastly, CSIS makes no mention of the ‘security’ that would be
deployed to guard any personal identifiable information. Thus,
CSIS has a very bare minimalistic privacy policy and needs
considerable improvement in ‘security’, ‘notice, ‘access’ and
choice since it is not as substantive and reassuring as criteria
illustrated by HEW 1973, the foundation for today’s privacy
policies, would entail.
Privacy Policy: The Carnegie Endowment For International Peace
The Carnegie Endowment for International Peace is a
“private, nonpartisan, nonprofit organization dedicated to
advancing cooperation between nations and promoting active
international engagement by the United States ”(Carnegie-About
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 14 Carnegie Endowment for International Peace
Us, 2012). The mission of the Carnegie ‘think-tank’ is “to
contribute to global security, stability, and prosperity
requiring a permanent international presence and a multinational
outlook at the core of its operations” (Carnegie-About Us, 2012).
The Carnegie Endowment for International Peace has a
published privacy policy that covers: data collection, emails,
surveys, article referrals, children usage, usage tracking, third
party services, security, opt out policy and consent, third party
information distribution and usage, along with user session
tracing for site maximization (Carnegie Endowment Privacy Policy,
2012). What makes Carnegie’s privacy policy stand apart from
both CSIS and Brookings is that it fulfills coincides with all
facets of the HEW 1973 components: ‘access’, ‘notice’, ‘choice’
and ‘security’. Furthermore, all the facets of the privacy policy
are more lucidly explained so that no misconception or confusion
can be inferred. For example, the privacy policy begins with the
statement“…we collect specific kinds of data about users; we feel
you must fully comprehend our policy and the terms and conditions
surrounding the capture and use of that data. This privacy
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 15 Carnegie Endowment for International Peace
statement reveals what data we gather and how it is utilized”
(Carnegie Privacy Policy, 2012). This is the most thorough
disclaimer because it lays out all the condition on the table and
there is no questionable wording or chances of ‘fooling’ the user
by indirectly suggesting that information is collected. The think
tank shows its compliance with ‘access’ in the statement, “…
under no circumstances is any information about an individual
user divulged to a third party“(Carnegie Privacy Policy, 2012).
For ‘notice’, the think tank states “…if we decide to change our
privacy policy, we will post those changes on this page so that
you are always aware of what information we collect, how we use
it, and under what circumstances we disclose it” (Carnegie
Privacy Policy, 2012).To add an additional guarantee, the think
tank offers a point of contact should any complications emerge:
“If you believe you have received unwanted, unsolicited email
sent via this system or purporting to be sent via this system,
please forward a copy of that email with your comments for
review”(Carnegie Privacy Policy, 2012). Also, the policy “…
aligned with the Federal Children's Online Privacy Protection Act
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 16 Carnegie Endowment for International Peace
of 1998 (COPPA), we will never knowingly request personally
identifiable information from anyone under the age of 13 without
requesting parental consent” (Carnegie Privacy Policy, 2012).
They have access to personal information needed to perform their
functions, but may not use it for other purposes” (Carnegie
Private Policy, 2012). With regards to information sharing, “…we
will not share data about individual customers with any third
party, save to conform with applicable ruling or legitimate
lawful procedure or to shield the personal welfare of our
customers or others” (Carnegie Privacy Policy, 2012). For
security, the think tank“…operates secure data networks protected
by industry standard firewall and password protection systems.
Our security and privacy policies are periodically reviewed and
enhanced as necessary and only authorized individuals have access
to the information provided by our customers” (Carnegie Privacy
Policy, 2012). Lastly, it mentions if there are any questions
please contact them and offers abundant methods to contact them.
In essence, Carnegie Endowment shows that it cares for its users
and the like foremost and goes into detail to thoroughly explain
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 17 Carnegie Endowment for International Peace
the responsibilities of each section. In juxtaposition to the
Brookings Institution and CSIS, the Carnegie Endowment for
International Peace stands out as an example of an organization
that meets the standards set by HEW 1973 for ‘choice’, ‘access’,
‘security’ and ‘notice’.
Suggested Confidentiality Variations to Shield Patrons & Advance
Structural Constancy
On preliminary inspection of the foreign policy think tanks
– all three address some, if not all facets, of the HEW 1973
guidelines and endow customers with security and bring elasticity
in information usage to all groups. CSIS has the feeblest,
shadowed by an adequate Brookings Institute, and finally the
Carnegie Endowment’s is near perfect. The following
recommendations are for each organization to guard customers more
effectively, offer groups with elasticity in utilizing procured
private data and develop structural constancy.
As a result of the tragic absence of lucidity and inadequate
privacy notes, CSIS should revise their whole policy, utilizing
HEW 1973 for reference along with points from the 1998 Federal
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 18 Carnegie Endowment for International Peace
Trade Commission Report to Congress, which augments HEW 1973’s
assistance and magnifies on the machinery behind the Web, which
was nonexistent during that time” (Fair Information Practice
Principles, 1998). Aspects in CSIS’s redrafted privacy statement
must contain notice “limits of how data is procured, the
applications of such data, those beneficiaries who can utilize
the information, the type of information procured, and actions
used thru CSIS for upholding defense for information procured”
(Fair Information Practice Principles, 1998).
Moreover, a customer ought to be bestowed an accompanying
option and approval for portioning information, be accommodated
with clearance and be granted the means to alter information, the
assurance of veracity and protection has to be guaranteed to the
customer and a requirement of how these statues will be applied
via self-administration, confidential ways or via federal
oversight (Fair Information Practice Principles, 1998).
Attentions related to COPPA, the Children’s Online Privacy
Protection Act need be attended to in the privacy policy. COPPA
is the ruling that took into account online procurement of data
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 19 Carnegie Endowment for International Peace
for individuals younger than 13 (COPPA, 1998). Furthermore, CSIS
needs to consider, once devising this novel plan, that they do
not seal potential possibilities of information utilization and
permit flexibility in data procurement and information usage,
while observing any pertinent rules. In crafting too many
constraints, CSIS may discover there is comparatively slight
worth for procurement and hence later use. Also, it could assist
individuals tasked with rewriting CSIS’s privacy policy to
additionally utilize Brookings Institute and especially Carnegie
Endowment’s guidelines for allusion.
Modifications to the Brooking Institution’s privacy
policy would be nominal as they already are compliant with HEW
1973. Direction is provided on procurement, usage notices,
access, and security. However, it would benefit the Brookings
Institute to expand on their Privacy Policy, similar to the
Carnegie Endowment’s, to elucidate any questionable statements.
It could befit Brookings Institute to recognize in the Privacy
Policy section potential defense vulnerabilities and tactical
measures they have undertook to lower threats in impending
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 20 Carnegie Endowment for International Peace
defense upgrades to defend the consumer’s card digits and private
data. Brookings should change their SSL to TCL to ensure less
potential ‘man in the middle or extension attacks’ by crackers
who seek sensitive compartmentalized information of users. This
would soothe any concerns that customers may have about their
information being compromised and enhance privacy protection for
customers. Furthermore, a clause should be incorporated to
indicate adherence to COPPA’s guidelines. Lastly, Brookings
should lucidly explain their policies in the same fashion as the
Carnegie Endowment because there are sections that are vague and
seem almost contradictory such as information sharing with third
parties. These changes would also give the Brookings Institute
more flexibility to use consumer information if their guidelines
are clearly stated
Finally, as stated earlier, the Carnegie Endowment’s
confidentiality statement is virtually faultless and would be an
excellent example for other think tanks to utilize. It covers all
HEW 1973 standards, adheres to COPPA, explains thoroughly how
information is collected and is well rounded. It allows the think
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 21 Carnegie Endowment for International Peace
tank enough flexibility to use personal information because how
the privacy policy is explained should be soothing enough to
instill comfort in consumers. Therefore, think tanks with loosely
explained privacy statements would benefit exponentially if their
privacy statements mirror the Carnegie Endowment’s Privacy
Policy.
Conclusion
In the end, the customer has personal confidentiality
defended via judicial elucidation of the Constitution, or via
national rulings. The policing of these privileges are tasked to
a myriad of different tiered authorities; nonetheless, the FTC
has occupied a further eminent part of enforcement recently. The
managing values on defending individual confidentiality are
established in the 1973 HEW columns of ‘notice’, ‘choice’,
‘access’, and ‘security’. It is up to any federal or private
establishment, to certify that they cultivate comprehensive
privacy guidelines that harmonize with industry standards as well
as government rules to ensure patrons are sufficiently guarded.
Now is the time to audit industry-wide rules, suggest placement
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 22 Carnegie Endowment for International Peace
on policies that defend citizens from privacy abuses, update
lawmaking and elucidate the federal role, and warrant that
sufficient security is present. If institutions in the foreign
policy think tank industry adapt privacy policies like that of
the Carnegie Endowment, more organizations can enjoy increased
flexibility to use personal information and consumers
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 23 Carnegie Endowment for International Peace
References
1. Carroll v. United States, 267 U.S. 132. (1925). Retrievedfrom http://supreme.justia.com/cases/federal/us/267/132/case.html
2. Center for Strategic and International Studies (2012).About Us. Center for Strategic & International Studies. Retrieved from http://csis.org/about-us
3. Center for Strategic Studies Privacy Policy. (n.d.). Center for Strategic & International Studies. Retrieved from http://csis.org/privacy-policy
4. COPPA (1998) Children’s Online Privacy Protection Act. COPPA. Retrieved from http://www.coppa.org/coppa.htm
5. Director of security and international affairs think tanks. (n.d.). Foreign Policy Research Institute. Retrieved from http://fpri.org/research/thinktanks/directory/about.html
6. Dunning, J. (2009, June 18). FTC raps Sears for unleashing spyware on consumers. The Examiner. Retrieved from http://www.examiner.com/article/ftc-raps-sears-for-unleashing-spyware-on-consumers
7. Dye, T. R. (2002). Who’s Running America? The Bush Restoration, (7th ed.). Upper Saddle River, NJ: Prentice-Hall, Inc.
8. Everett-Church, R. (2011). Privacy Law and the Internet. Custom Textbook for CSEC 620. Hoboken, NJ: John Wiley & Sons, Inc.
9. Fair Information Practice Principles. (1998, June). (Section III of the Privacy Online: Report to Congress).
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 24 Carnegie Endowment for International Peace
Federal Trade Commission. Retrieved from http://www.ftc.gov/reports/privacy3/fairinfo.shtm#Fair%20Information%20Practice%20Principles
10. Greene, S. (2006). Security Policies and Procedures Principles and Practices. Upper Saddle River: Pearson Education.
11. McBride, A. (2006). Griswold v. Connecticut (1965). PBS. Retrieved from http://www.pbs.org/wnet/supremecourt/rights/landmark_griswold.html
12. McGann, J. G., Ph.D. (2012, January 18). The Global Go To Think Tanks Report. Foreign Policy Research Institute. Retrieved from http://fpri.org/research/thinktanks/GlobalGoToThinkTanks2011.pdf
13. McMillan, R. (2008, January 8). Sears sued over privacy breach. InfoWorld. Retrieved from http://www.infoworld.com/d/security-central/sears-sued-over-privacy-breach-363
14. Mello, J. P., Jr. (2011, December 26). Confidential client list safe from anonymous, says hacker target. PC World. Retrieved from http://www.pcworld.com/article/247028/confidential_client_list_safe_from_anonymous_says_hacker_target.html
15. Miranda v. Arizona, 384 U.S. 436. Brandeis Dissenting.(1966). Retrieved from http://www.law.cornell.edu/supct/html/historics/USSC_CR_0384_0436_ZS.html
16. National Institute of Standards and Technology. (2012, June 29). Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program. National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 25 Carnegie Endowment for International Peace
17. Olmstead v. United States 277 U.S. 438. (1928). Retrieved from http://www.law.cornell.edu/supct/html/historics/USSC_CR_0277_0438_ZS.html
18. Privacy Online: A Report to Congress. (1998, June). Federal Trade Commission. Retrieved from http://www.ftc.gov/reports/privacy3/toc.shtm
19. Rescorla, E. (2009, November 5). Understanding the TLS Renegotiation Attack. Educated Guesswork. Retrieved from http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
20. Schenck v. United States 249 U.S. 47. (1919). Retrievedfrom http://www.law.cornell.edu/supct/html/historics/USSC_CR_0249_0047_ZO.html
21. Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. (pp. 43-46). IGI Global. Retrieved from http://proquestcombo.safaribooksonline.com.ezproxy.umuc.edu
22. The Brookings Institution (2008, October 15). Privacy Policy. Retrieved from www.brookings.edu/about/privacy-policy
23. The Brookings Institution (2012). Brooking’s Reputation. The Brookings Institution. Retrieved from http://www.brookings.edu/about/reputation.
24. The Carnegie Endowment for International Peace. (2012).About Us. The Carnegie Endowment for International Peace. Retrievedfrom http://www.carnegieendowment.org/about/
25. The Carnegie Endowment for International Peace. (n.d.).Privacy Policy for the Carnegie Endowment For International Peace. Retrieved from
PRIVACY POLICIES OF GLOBAL THINK TANKS: The BrookingsInstitution, CSIS & 26 Carnegie Endowment for International Peace
http://www.carnegieendowment.org/about/index.cfm?fa=privacy
26. The Privacy Act of 1974. (n.d.) Electronic Privacy Information Center. Retrieved from http://epic.org/privacy/1974act/
27. Think Tanks and Foreign Policy Program. (n.d.). Foreign Policy Research Institute. Retrieved from http://fpri.org/research/thinktanks
28. Tikannen, A. (2012). Brookings Institution. Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/81236/Brookings-Institution