CAS News, Events, and Announcements

 

This page is no longer being updated.
For up-to-date news and announcements, go to the new Stilwell Center News page.

ARCHIVE: Selected Items 2003-2010:

Selected media:

Aliya Sternstein, "White House says data mining to focus only on government files," NextGov (Feb. 25, 2010) (White House responds to Feb 24 article, below) (also at Goverment Executive).

Aliya Sternstein, "Security expert: Obama order resembles controversial Bush-era data-mining tool," NextGov (Feb. 24, 2010) (please note Comment disputing article import).

Marc Ambinder, "How The U.S. Lost Its Home Field Surveillance Advantage," The Atlantic (Feb. 6, 2010).

Victoria Baranetsk, What is cyberterrorism? Even experts can't agree, The Harvard Law Record (Nov. 5, 2009).

Benjamin Sutherland, "The Rise of Black Market Data," Newsweek (Dec. 15, 2008).

Cyber Insecurity, interview with Kim Taipale, Avenue Magazine pp. 82-87 (Nov. 2008) ("Defense is always going to lag offense. You may not even know about all your vulnerabilities, and you're never going to know about all the people who may try to attack you. ... You have to assume that there is an open back door somewhere. You try to minimize the consequences of an attack, and you try to be resilient so that you can recover.")

Digital Age with James Goodale, Russian Cyber Attacks on Georgia (WNYE-PBS, Sept. 28, 2008) (Play Video).

On Point: Privacy in the Electronic Workplace, National Public Radio (NPR) (Jul. 3, 2008) (Windows Media) (RealAudio)

Fred Friendly Series, Nanotechnology: Privacy and Security (PBS April 2008).

Margot Adler, "Justice Talking: The Tension Between Security and Liberty in the War on Terror," National Public Radio (NPR) (Mar. 3, 2008).

Tim Starks, "Consequences Mostly Unclear for Expiration of Temporary Surveillance Law," Congressional Quarterly (CQ Politics) (Feb. 12, 2008).

Neil C. Livingstone, The Economist Debate Series: Freedom and its Digital Discontents, "The Proposition's Opening Statement" (Feb. 5, 2008) and "The Proposition's Rebutal" (Feb. 8, 2008).

Roger Pilon, "Listening to the Enemy," Wall Street Journal A:15 (Jan. 28, 2008).

Digital Age with James Goodale Encryption and Information Security (WNYE-PBS, Jan. 16, 2008) (View video - 28 min.).

Commentary, "Security vs. Privacy: Security," The Huffington Post (Nov. 9, 2007).

Commentary (with James Jay Carafano), "Free the Hostages: Continuing FISA Concerns," National Review Online (Oct. 24, 2007).

Johannis Kuhn, "In Cyberwar There Are No Rules," interview with Kim Taipale in Sueddeutsche Zeitung (Sept. 20, 2007) (See also "Virtual Attack").

Dan Eggen, "NSA Spying Part of Broader Effort; Intelligence Chief Says Bush Authorized Secret Activities Under One Order," Washington Post A:01 (Aug. 1, 2007).

Kevin Coughlin, "Tragedy Renews Interest In Using Internet To Spot Killers," Newark Star-Ledger (Newhouse News Service) (Apr. 23, 2007).

Digital Age with James Goodale: Will the CIA Ever Learn to Blog? (WNYE-PBS, Mar. 18, 2007) (also Jul. 1, 2007) (View video - 28 min.).

Wilson P. Dizard III, "Privacy, efficiency on the agenda," Government Computer News (Jan. 22, 2007).

Ellen Nakashima and Alec Klein, "Daylight Sought For Data Mining," Washington Post D:03 (Jan. 11, 2007).

Ryan Singel and Kevin Poulsen, "Privacy To Be Tone for New Senate Judiciary Committee," 27B Stroke 6 (WIRED News) (Jan. 10, 2007).

Alan Joch, "Terrorists Brandish Tech Sword, Too," Federal Computer Week (Aug. 28, 2006).

Barry Levine, "What Does the NSA Know About You?" Newsfactor Magazine (July 24, 2006).

Scott Shane, "Experts Differ About Surveillance and Privacy," N. Y. Times A:16 (July 20, 2006).

James W. Brosnan, "Rep. Wilson promotes warrantless spying bill," Scripps Howard News Service (July 20, 2006).

Sarah Lai Stirland, "Experts Paint Different Pictures Of Surveillance Law," National Journal's Technology Daily (July 19, 2006).

"Is Net Neutrality Bad for National Preparedness?" Infozine.com (Jun. 13, 2006).

Roger Pilon, "Surveillance in Perspective: Executive Checks on the Imperial Congress," The Politic.org (Jun. 5, 2006).

NSA Surveillance, WHHY Radio Times, National Public Radio (May 16, 2006).

Balancing Privacy and Security, The Wall Street Journal (May 16, 2006) [more].

Mark Williams, "The Total Information Awareness Project Lives On," MIT Technology Review (Apr. 26, 2006).

United Press International (UPI), "NSA concerned over computer phone service," (Apr. 11, 2006).

Shane Harris, "Internet devices threaten NSA's ability to gather intelligence legally," GovExec.com (Apr. 10, 2006).

Shane Harris, "FISA's Failures," Issues and Ideas, National Journal (Apr. 8, 2006) quotes extensively from Whispering Wires.

Commentary (with James Jay Carafano), "Fixing Foreign Intelligence Surveillance," The Washington Times (Jan. 24, 2006):

Catherine Yang, "The State of Surveillance," BusinessWeek, Cover Story (August 8, 2005).

BusinessWeek Online, Cover Story Online Extra: "Surveillance Society: The Experts Speak," (August 8, 2005).

Markle Weekly Digest, New Reports and Papers, "Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd," Vol. 4 No. 15 (Apr. 8, 2005).

Justin Rood, "‘All-Star’ Privacy Panel Assembled by LexisNexis," Congressionl Quarterly, Homeland Security - Technology (March 30, 2005). [related press release]

ACM TechNews, "Center for Advanced Studies Releases Policy Appliance Reference Model," Volume 7, Issue 748 (Jan. 31, 2005).

Markle Weekly Digest, New Reports and Papers—2, Policy Appliance Reference Model: An Overview, Vol. 4 No. 5 (Jan. 28, 2005). See also U. S. Newswire (Jan. 27, 2005).

Bruce Schneier, CRYPTO-GRAM (Jan. 15, 2005).

Joe Feuerherd, "Republicans line up on both sides of illegal immigrant drivers debate," NCReporter (Jan. 14, 2005).

Kim Zetter, "Brave New Era for Privacy Fight," Wired News (Jan. 13, 2005).

News Story, "Not Issuing Drivers' Licenses to Illegal Aliens May Be Bad for National Security," Government Technology (Dec. 21, 2005) (See related).

Sarah Lai Stirland, "Panel Raises Questions About Government Information Sharing," GovExec.com National Journal's Technology Daily (Nov. 9, 2004).

KDnuggets News 04:21 (Nov. 09, 2004).

Justin Rood, "Experts Disagree on Balance Between Intelligence, Privacy Protections," Congressional Quarterly (2004).

E-Brief, "Civil Liberties," National Journal (2004).

Shelley Widhalm, "Where everybody knows your name," The Washington Times (May 13, 2004).

Don Clark, “Entrepreneur Offers Solution For Security-Privacy Clash,”  The Wall Street Journal B:1 (Mar. 11, 2004).

Drew Clark, "Array Of Observers Critique Call For Data-Sharing Network," National Journal (Dec. 11, 2003).

Chloe Albanesius, "Official Defends Idea Of Data Mining; Experts Weigh Options," National Journal (Dec. 2, 2003).

KDnuggets News 03:18 (Oct. 1, 2003).

Hiawatha Bay, "Mining Data to Fight Terror Stirs Privacy Fears," The Boston Globe, Business C:2 (Apr. 4, 2003).

Selected Announcements

Apr. 19, 2007. FISA Should be Amended, Says Center for Advanced Studies, in announcing publication of The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance in the Yale J.L. & Tech. (Spring 2007). [news alert]

June 14, 2007. Is Net Neutrality Bad for National Preparedness? Program on Telecommunications and Cybersecurity Policy (Telecom Program) Research Brief.

May 12, 2006. Congress Should Address the Substantive Failings in FISA, says Center for Advanced Studies. In response to the introduction yesterday of legislation -- the "Lawful Intelligence and Surveillance of Terrorists in an Emergency by NSA [National Security Agency] Act" (the LISTEN Act) -- by Reps. Jane Harman (D- Calif.) and John Conyers (D-Mich.) purporting to address inadequacies in the Foreign Intelligence Surveillance Act (FISA), Kim Taipale, executive director of the Center for Advanced Studies in Science and Technology Policy, cautioned that "it appears that Congress is again tinkering with procedural reforms, when it is the substance of FISA that needs rethinking." [more].

March 10, 2006. FISA is not adequate to address recent technology developments, "One thing is clear in the current debate over whether the President has the inherent power to authorize the National Security Agency to monitor international communications with suspected terrorists -- even the most strident opponents concede the need to identify and monitor the communications of terrorists and stop them before they can act," said Kim Taipale at a Global Information Society Project forum in New York, "unfortunately, FISA [the Foreign Intelligence Surveillance Act] currently makes it impossible to use advanced information technologies to help do just that. By all means let us debate who should have the authority to authorize and oversight such intelligence gathering programs, but let us not forget that someone must, and the existing mechanisms -- including FISA -- are inadequate." GISP/PLENSIA forum, New York, NY. [more]

December 17, 2004. Not Issuing Driver's licenses to Illegal Aliens is Bad for National Security. "As part of the legislative compromise to pass the intelligence reform bill signed into law by the President today, the administration and Congressional leaders have promised to attach to the first 'must pass' legislation of the new year a controversial provision that was rightly dropped from the intelligence reform bill -- this provision would effectively prevent the states from issuing driver's licenses to illegal aliens by requiring 'legal presence' status for holders of licenses to be used as 'national ID.' Although this provision is being touted by its supporters as a security measure, its implementation in practice will be to undermine national security because it ignores three widely- recognized principles of counter-terrorism security: the shrinking perimeter of defense; the need to allocate resources to more likely targets; and the economics of fraud. [Full Statement]

October 29, 2004. Who's Who in Whoville? "Congress should not rush to legislate a massive government identity surveillance system under the press of a politically expedient deadline without considering alternatives that can meet legitimate law enforcement and national security needs while still protecting privacy," said Kim Taipale, executive director of the Center for Advanced Studies and director of the Global Information Society Project, in a statement released at a conference in New York as part of the Program on Law Enforcement and National Security in the Information Age. [Full Statement]

October 14, 2004. A Panel of National Policy Experts Debated the Security and Privacy Impacts of New Information Technologies in the ‘War On Terror’ at the inaugural event of the Global Information Society Project’s Program on Law Enforcement and National Security in the Information Age (PLENSIA).

September 31, 2004. The World Policy Institute and the Center for Advanced Studies announce Law Enforcement and National Security in the Information Age: Technology, Security, and Privacy in the War on Terror, a panel discussion to be held October 14, 2004, as part of the Global Information Society Project.

September 15, 2004. The Center for Advanced Studies announces the launch of the Program on Law Enforcement and National Security in the Information Age, as part of the Global Information Society Project, a collaborative research project of the World Policy Insitute and the Center.

August 31, 2004. Center for Advanced Studies releases draft of Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd, Version 2.0, 7 Yale J. L. & Tech. (Dec. 2004).

May 1, 2004. Center for Advanced Studies announces participation in the WPI Global Information Society Project, a joint research project between the Center and the World Policy Insititute.

March 1, 2004. Center for Advanced Studies releases Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd, Version 1.0.

December 15, 2003. Columbia Science and Technology Law Review publishes Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, Version 3.0.

October 31, 2003. Center for Advanced Studies releases Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, Version 2.6.

September 15, 2003. Center for Advanced Studies releases Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, Version 2.5.

May 1, 2003. Center for Advanced Studies releases Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, Version 1.0.

Search Google

Search Google for "Center for Advanced Studies in Science and Technology Policy":

Search Google for "K. A. Taipale":

 

Home | About | Research | Services | Publications | News | Contact | Privacy · Copyright