Previous Chapter: Appendixes
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

A
Acronyms

9-11 reference to the terrorist attacks on the U.S. that occurred September 11, 2001

ACE Automated Commercial Environment

ACS Automated Commercial System

ADVISE Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement

All-WME all weapons of mass effect

ANFO ammonium nitrate/fuel oil

ANNM ammonium nitrate nitromethane

ANS autonomic nervous system

APS Advance Passenger Information System

AQ Al Qaeda

ARCOS Automation of Reports of Consolidated Orders System

ARPA Advanced Research Projects Agency

ATF Bureau of Alcohol, Tobacco, and Firearms

ATM automated teller machine

ATS Automated Targeting System

BATS Bomb Arson Tracking System

BKC Biodefense Knowledge Center

BSA Bank Secrecy Act

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

CAAIOPEE (KDD application)

CAGR Compound Annual Growth Rate

CALEA Communications Assistance for Law Enforcement Act of 1994

CAPPS-II Computer-Assisted Passenger Prescreening System II

CART Computer Analysis and Response Team

CBP Customs and Border Protection

CCTV closed circuit television

CDC Centers for Disease Control and Prevention

CDR call data record

CDT Center for Democracy and Technology

CIA Central Intelligence Agency

CIPSEA Confidential Information Protection and Statistical Efficiency Act

CMIR International Transportation of Currency or Monetary Instruments Report

CMS Centers for Medicare and Medicaid Services

COBIT Control Objectives for Information and Related Technologies

CONUS continental United States

COTS commercial off-the-shelf

CPNI Customer Proprietary Network Information

CRS Congressional Research Service

CTR Currency Transaction Report

CTRC Currency Transaction Report by Casinos

CVS Crew Vetting System

DARPA Defense Advanced Research Projects Agency

DARTTS Data Analysis and Research for Trade Transparency System

DEA Drug Enforcement Administration

DEP Designation of Exempt Person

DHS Department of Homeland Security

DME durable medical equipment

DMV Department of Motor Vehicles

DNA deoxyribonucleic acid

DOD Department of Defense

DOD-IG Department of Defense Inspector General

DOJ Department of Justice

DOT Department of Transportation

DT&E developmental test and evaluation

DTL Drug Theft Loss

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

DTO Disruptive Technology Office

ECPA Electronic Communications Privacy Act

ED emergency department

EDW Enterprise Data Warehouse

EEG electroencephlalograph

EFF Electronic Frontier Foundation

EMG electromyelogram

ETA Euskadi Ta Askatasuna (terrorist organization)

FAA Federal Aviation Administration

FACTS Factual Analysis Criminal Threat Solution

FBAR Foreign Bank and Financial Accounts Report

FBI Federal Bureau of Investigation

FCC Federal Communications Commission

FDA Food and Drug Administration

FDLE Florida Department of Law Enforcement

FDNS-DS Fraud Detection and National Security Data System

FinCEN Financial Crimes Enforcement Network

FISA Foreign Intelligence Surveillance Act

fMRI functional magnetic resonance imaging

FOIA Freedom of Information Act

FTC Federal Trade Commission

FTTTF Foreign Terrorist Tracking Task Force

GAO Government Accountability Office

HHS Department of Health and Human Services

HIPPA Health Insurance Portability and Accountability Act

HTF High Terrorist Factor

I2F Intelligence and Information Fusion

IAO Information Awareness Office

IC3 Internet Crime Complaint Center

ICE Immigration and Customs Enforcement

ICEPIC ICE Pattern Analysis and Information Collection System

ICHAST Interagency Center for Applied Homeland Security

ICU Intensive Care Unit

ID identification

IDW Investigative Data Warehouse

IIR Institute for Intergovernmental Research

IP Internet Protocol

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

IRA Irish Republican Army

IRS Internal Revenue Service

IRSS Institute for Research in Social Science

ISO International Organization for Standards

ISP Internet service provider

IT information technology

ITIL IT Infrastructure Library

IV&V independent verification and validation

KDD knowledge, discovery in databases

LEA law enforcement agencies

LI lawful intercepts

LLNL Lawrence Livermore National Laboratory

LTTE Liberation Tigers of Tamil Eelam (terrorist organization)

MATRIX Multi-State Anti-Terrorism Information Exchange

MEG magneto-encephalography

MERGE-PURGE (KDD application)

MSB Money Service Business

NASA National Aeronautics and Space Administration

NCTC National Counterterrorism Center

NETLEADS Law Enforcement Analytic Data System

NIISO National Immigration Information Sharing Office

NIMD Novel Intelligence from Massive Data

NIPS Numerical Integrated Processing System

NIST National Institute of Standards and Technology

NORA Non-Obvious Relationships Awareness

NRC National Research Council

NSA National Security Administration

NW3C National White Collar Crime Center

NYC New York City

NYCDOH New York City Department of Health

OCDETF Organized Crime and Drug Enforcement Task Force

OECD Organization for Economic Cooperation and Development

OIP Online Investigative Project

OMB Office of Management and Budget

OTA Office of Technology Assessment

OTC over-the-counter

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

OT&E operational test and evaluation

PARC Palo Alto Research Center

PDA personal digital assistant

PET Positron Emission Tomography

PII personally identifiable information

PKK Kurdistan Workers Party (terrorist organization)

PNR Passenger Name Record

PUMS Public Use Microdata Sample

QID Questioned Identification Documents

R&D research and development

RAF Red Army Faction (terrorist organization)

RDD random-digit-dialed

RFID radio-frequency identification

RR3 response rate (category 3)1

RR4 response rate (category 4)2

RTAS Remote Threat Alerting System

S&T science and technology

SAR Suspicious Activity Report

SEC Securities and Exchange Commission

SKYCAT (KDD application)

SQL Structured Query Language

SSN Social Security number

STAR System-To-Assess Risk

SWIFT Society for Worldwide Interbank Financial Telecommunication

TAPAC DOD Technology and Privacy Advisory Committee

TASA Telecommunications Alarm-Sequence Analyzer (KDD application)

TB terabyte

TECS Treasury Enforcement Communications System

TIA Total/Terrorist Information Awareness program

TISS Tactical Information Sharing System

TSA Transportation Security Administration

TVIS Threat Vulnerability Integration System

1

See more information at http://www.pol.niu.edu/response.html.

2

See more information at http://www.pol.niu.edu/response.html.

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.

URL uniform resource locator

USA PATRIOT Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

USSOCOM United States Special Operations Command

VoIP Voice over Internet Protocol

WMD weapons of mass destruction

WME weapons of mass effect

Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 105
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 106
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 107
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 108
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 109
Suggested Citation: "Appendix A: Acronyms." National Research Council. 2008. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press. doi: 10.17226/12452.
Page 110
Next Chapter: Appendix B: Terrorism and Terrorists
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.