TABLE OF CONTENTS Foreword Acknowledgments Introduction Chapter One. The Balance between Security and Civil Rights 1.1 Mapping the Threats: Preventing Physical and Virtual Terrorist Attacks 1.2 Designing Policies to Address New Security Threats 1.2.1 Information warfare. 1.2.2 Data security. 1.2.3 Gathering information and surveillance. 1.2.4 Regulation of encryption products 1.2.5 Terror propaganda 1.3 Preserving Civil Liberties 1.3.1 The right to...