This report builds on a series of roundtable discussions held by CSIS. It provides a basic description of how data-mining techniques work, how they can be used for counterterrorism, and their privacy implications. It also identifies where informed policy development is necessary to address privacy and other issues.