CAS Publications

 

ARCHIVED PAGE - NO LONGER MAINTAINED

JUMP TO: | Book Chapters | Testimony | Commentary | Journal Articles | Reports | Projects | Working Papers |

Selected Book Chapters

K. A. Taipale, Introduction to Civil Liberties and Other Legal Issues, in The McGraw-Hill Homeland Security Handbook, 2nd Ed. (David Kamien, ed., McGraw-Hill, ISBN:0071790845, Nov. 2012).

K. A. Taipale, Cyber-Deterrence SSRN (2009 2010).

K. A. Taipale, Power to the Edge: New Threats, New Responses in A Global Strategic Assessment 2009: America's Security Role in a Changing World (National Defense University Press 2009, ISBN:0160832128).

K. A. Taipale, Warrantless Wiretaps and Foreign Intelligence Surveillance in Wiretapping: Regulatory Perspectives ( Amicus Books 2009).

K. A. Taipale, The FISA is Not Adequate to Meet the Current Threat in Domestic Wiretapping (GH Press 2008).

K. A. Taipale, Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime: Digital Cops in a Networked World, Yale Information Society Project series, (Jack Balkin, et al., eds., NYU Press, ISBN:0814799701, Mar. 2007).

K. A. Taipale, Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Proceedings of Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle 2006).

K. A. Taipale, Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties, in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, eds., Wiley-IEEE Press, ISBN:0471776157, May 2006).

K. A. Taipale, Introduction to Domestic Security and Civil Liberties, in The McGraw-Hill Homeland Security Handbook (David Kamien, ed., McGraw-Hill, ISBN:0071446656, Sep. 2005).

Selected Testimony

United States Senate:

Testimony of K. A. Taipale, "Foreign Intelligence Surveillance Modernization: Reconciling Signals Intelligence Activity with Targeted Wiretapping," U.S. Senate Select Committee on Intelligence (SSCI) Hearing on The Foreign Intelligence Modernization Act of 2007, May 1, 2007.

Testimony of Kim Taipale, "The Privacy Implications of Government Data Mining Program," U.S. Senate Committee on the Judiciary, Washington, DC (Jan. 10, 2007). [HTLM][PDF]

U.S. House of Representatives:

Testimony of Kim Taipale, "Foreign Intelligence Surveillance Act Reform," U.S. House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives, July 19, 2006.

Related:

Kim Taipale, "Law Enforcement and National Security in the Information Age: Technology, Security, and Privacy in the War on Terror", Dirksen Senate Office Building, Capital Hill, Wash., DC (Oct. 14, 2004).

White House Cyber Policy Review:

Paul Trevithick, William Coleman, John Clippinger, and Kim Taipale, "Identity and Resilience" (2009). Available at the White House Cyber Policy Review web site.

U.S. Department of Defense:

K. A. Taipale, "Technology, Security and Privacy: Confidential Memorandum for the Department of Defense Technology and Privacy Advisory Committee (TAPAC)" (Dec. 5, 2003). Available in the National Archives.

National Academies:

K. A. Taipale, "Deconstructing Information Warfare" presentation to the Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC, Oct. 30, 2006.

K. A. Taipale, "From Data Mining to Computational Social Science for Counterterrorism" presentation to the Committee on the Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Washington, DC, Apr. 27, 2006.

K. A. Taipale, "Technology, Policy, and Cultural Dimensions of Biometric Systems," presentation to the Computer Science and Telecommunications Board, The National Academies, Washington, DC, Mar. 15-16, 2005.

White House Cyber Policy Review Document

Paul Trevithickl, William Coleman, John Clippinger, and Kim Taipale, Identity and Resilience (2009). Available for download from the White House Cyber Policy Review web site.

Selected Opinion/Commentary

K. A. Taipale, Commentary, "Security vs. Privacy: Security," The Huffington Post (Nov. 9, 2007).

K. A. Taipale, Commentary (with James Jay Carafano, Heritage Foundation), "Free the Hostages: Continuing FISA Concerns," National Review Online (Oct. 24, 2007).

FISA Should be Amended, Says Center for Advanced Studies, (Spring 2007).

Kim Taipale discusses the role of technology in government surveillance efforts in The Wall Street Journal (May 16, 2006).

K. A. Taipale (with James Jay Carafano, Heritage Foundation), Commentary: Fixing Foreign Intelligence Surveillance, The Washington Times (Jan. 24, 2006).

Is Net Neutrality Bad for National Preparedness?" US Newswire (May 3, 2006.) (HTML)

Congress Should Address the Substantive Failings in FISA, says Center for Advanced Studies, US Newswire (May 12, 2006).

FISA [Foreign Intelligence Surveillance Act] is not adequate to address recent technology developments, NYU Review of Law and Security (Mar. 10, 2006).

"Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security," US Newswire (Dec. 17, 2004).

"Government Should Not Rush to Massive ID Surveillance System," US Newswire (Oct. 29, 2004).

Selected Journal Articles

K. A. Taipale, Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, 16 Nat'l Strategy F. Rev. 14 (Sumer 2007).

K. A. Taipale, The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance, 9 Yale J. L. & Tech. (Spring 2007).

K. A. Taipale, Rethinking Foreign Intelligence Surveillance, World Policy Journal, Vol. XXIII No.4 (Winter 2006/07).

K. A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, N.Y.U. Rev. L. & Security, No. VII Supl. (Spring 2006).

K. A. Taipale, The Trusted Systems Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence, IEEE Intelligent Systems, Vol. 20 No. 5, pp. 80-83 (Sep./Oct. 2005).

K. A. Taipale, Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd, 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004)

K. A. Taipale, Identity Resolution and Domestic Security: Who's Who in Whoville, Center for Advanced Studies (Dec. 2003). [related presentation materials]

K. A. Taipale, Technology, Security and Privacy: Confidential Memorandum for the Department of Defense Technology and Privacy Advisory Committee (TAPAC), Center for Advanced Studies (Dec. 5, 2003), National Archives, restricted access. [related presentation materials]

K. A. Taipale, Remote Sensing and Domestic Security: Extending the Edge of the Network, Center for Advanced Studies (Nov. 2003).

K. A. Taipale, Netcentric Strategies for Domestic Security and Law Enforcement, Center for Advanced Studies (Oct. 2003). [related presentation materials]

K. A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003).

K. A. Taipale, Information Technology as Agent of Change in Environmental Policy, Center for Advanced Studies Working Paper (Jan. 2003, rev'd Jun. 2003).

K. A. Taipale, Secondary Liability on the Internet: Towards a Performative Standard for Constitutive Responsibility, Center for Advanced Studies Working Paper (Feb. 2003).

K. A. Taipale, Internet and Computer Crime: System Architecture as Crime Control, Center for Advanced Studies Working Paper (Feb. 2003).

K. A. Taipale, Free Speech, Semiosis and Cyberspace, Center for Advanced Studies Working Paper (Jan. 2003).

K. A. Taipale, Preliminary Research Overview 2003-2004, Center for Advanced Studies, (Jan. 2003, rev'd Oct. 2003).

K. A. Taipale, Advanced Media in Education: Columbia University: Reflections on a Digital Future: A Preliminary Report, v.1.1, Office of the Vice Provost, Columbia University (1995).

Robbie McClintock and K. A. Taipale, Advanced Media in Education Project, Institute for Learning Technologies, Columbia University (1995).

Robert McClintock and K. A. Taipale, Educating America for the 21st Century, Institute for Learning Technologies, Columbia University (Version 2.1, 1994)

Selected Reports

The Future of Work: What It Means for Individuals, Businesses, Markets, and Governments, David Bollier, rapp. (Aspen Institute 2011).

The Promise and Peril of Big Data, David Bollier, rapp. (Aspen Institute 2010).

No More Secrets: National Security Strategies for a Transparent World, S. E. Spaulding, conv., A. Kochems, rapp. (ABA-SCLNS, Off. of the Nat'l Counterintelligence Exec., & Nat'l Strategy F. 2010).

Biometric Recognition: Challenges and Opportunities, J. N. Pato and L. I. Millett, eds. (National Academies Press 2010) (ISBN 0309142083).

Identity in the Age of Cloud Computing, J.D. Lasica, rapp. (Aspen Institute 2009).

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W. A. Owens, K. W. Dam, and H. S. Lin, eds. (National Academies Press 2009) (ISBN 0309138507).

Protecting Individual Privacy in the Struggle Against Terrorist, Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals (National Academies Press 2008) (ISBN 0309124883).

Mobilizing Information to Prevent Terrorism, Third Report of the Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Jul. 2006).

Implementing a Trusted Information Sharing Environment, Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Feb. 2006).

Selected Powerpoint Presentations

K. A. Taipale, "Power Curve Economy," (slides) at Navigating the Emerging Economy, Twenty-first Annual Aspen Institute Roundtable on Information Technology (Jul 31-Aug. 3, 2012).

K. A. Taipale, "Governance in an Interconnected World" (slides) at the Atlantic Council (ACUS), Wash., DC (Nov. 14, 2011).

K. A. Taipale, "Social Implications," at The Future of Work, Nineteenth Annual Aspen Institute Roundtable on Information Technology (Aug. 4-6, 2010).

K. A. Taipale, "Electronic Surveillance in Extremistan," Texas Law Review Symposium 2010, Univ. of Texas Law School, Austin, TX (Feb 4-6, 2010).

Kim Taipale, Policy Issues for Science and Technology in a Surveillance Society at the 32nd Annual AAAS Forum on Science and Technology Policy, Washington, DC, May 3-4, 2007. [presentation materials available]

K. A. Taipale, "Deconstructing Information Warfare," Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC, Oct. 30, 2006. [presentation material available]

K. A. Taipale, "Seeking Symmetry in Fourth Generation Warfare: Information Operations and the War of Ideas," Bantle-Institute for National Security and Counterterrorism (INSCT) Symposium: "Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas" at Syracuse University, Mar. 30, 2006. [presentation material available]

K. A. Taipale, "Science and Technology: Identity Theft: Policy Implications," The Heritage Foundation, Washington, DC (Nov. 2, 2005) [presentation materials avaialble]

K. A. Taipale, "Technical and Policy Challenges: Implications for Evolving Business Models," 16th Annual Economic Crimes Institute Conference, Tysons Corner, VA, Oct. 24, 2005. [presentation materials avaialble]

K. A. Taipale, "Information Policy and the Intelligence Enterprise," McLean, VA, Apr. 12, 2005. [presentation materials]

K. A. Taipale, "Information as Warfare: Disrupting Terrorist Networks" at the Yale Information Society Project, "Global Flow of Information" Conference, Yale Law School (Apr. 1-3, 2005). [abstract]

K. A. Taipale, "Biometrics and Information Sharing" presented at the Computer Science and Telecommunications Board conference on Technology, Policy, and Cultural Dimensions of Biometric Systems, The National Academies, Washington, DC, Mar. 15-16, 2005. [presentation materials]

K. A. Taipale, "Public Safety vs. Personal Privacy: The Case For and Against Secure Flight" presented at the InfoSecurity 2004 conference in New York on Dec. 8, 2004. [presentation materials]

K. A. Taipale, "Counterterrorism technology and privacy," presented at the American Bar Association Standing Committee on Law and National Security conference on "National Security Law in a Changed World: The Fourteenth Annual Review of the Field," in Arlington, VA on Nov. 18-19, 2004. [presentation materials]

K. A. Taipale, "Implementing EO 13356: Standardizing Terror Data, " presented at the Potomac Institute for Policy Studies Roundtable, "How Should the U.S. Implement Information Sharing? A Discussion on the Executive Order Strengthening the Sharing of Terrorism Information," Arlington, VA (Nov. 9, 2004) [presentation materials]

K. A. Taipale, "Technology as a Tool to Protect Civil Liberties: Enterprise Architecture and Civil Liberties," presented at the ABA Standing Committee on Law and National Security Counterterrorism Technology and Privacy Conference at Cantigny, IL, Jun. 25, 2005 [presentation materials]

K. A. Taipale, "Technology, Security, and Anonymity: Redefining the Problem Statement," presented at the WWICS/AAAS/ABA Roundtable "Can Anonymity Survive in Post-9/11 Society," Woodrow Wilson Center, Washington, DC (May 4, 2004) [presentation materials]

K. A. Taipale, "Technology, Security, and Privacy: Designing Technical Features to Support Policy," presented at the NSF Science and Technology Center for Discrete & Theoretical Computer Science (DIMACS), Rutgers University, New Brunswick, NJ, (Apr. 15, 2004) [presentation materials]

K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd," presented at the Yale Law School CyberCrime and Digital Law Enforcement Conference (Mar. 2004) [presentation materials]

K. A. Taipale, "Identification Systems and Domestic Security: Who's Who in Whoville" presented at "The Politics and Law of Identity and Identification in the Context of the War on Terror," The Potomac Institute for Policy Studies and The Heritage Foundation, Arlington, VA (Jan. 28, 2004) [presentation materials]

K. A. Taipale, "Reflections on the Second Markle Foundation Report: Creating a Trusted Information Network for Homeland Security," presented at "A Critique of the Markle Report on Trusted Information Networks for Homeland Security," The Heritage Foundation and The Potomac Institute for Policy Studies, Washington, DC (Dec. 11, 2003)  [presentation materials]

K. A. Taipale, "Technology, Security and Privacy," Washington DC: presented at "Enabling New Information Technologies in the War on Terrorism," The Potomac Institute for Policy Studies Roundtable Discussion, Dirksen Senate Office Building, Capital Hill, Washington, DC (Dec. 2, 2003)  [presentation materials]

Selected Project Descriptions:

Overview, "The Global Information Society"

Overview, "Law Enforcement and National Security in the Information Age"

Overview, "Telecommunications and Cybersecurity Policy"

Overview, "The Program on Information Warfare"

Overview, "Data Mining, Automated Data Analysis, and Computational Social Science"

Overview, "Foreign Intelligence Surveillance"

Overview, "The Surveillance Society"

Overview, "Cybercrime, Cyberterrorism, and Digital Law Enforcement"

Links

ABA Standing Committee on Law and National Security [link]

American Civil Liberties Union [link]

American Law Institute [link]

Bantle-Institute for National Security and Counterterrorism [link]

The Berkman Center for Internet and Society at Harvard Law School [link]

The Brookings Insitution [link]

Center for Democracy and Technology [link]

Center for Law and Security at NYU Law School [link]

Center for Strategic and International Studies (CSIS) [link]

Columbia Institute for Tele-Information [link]

Combating Terrorism Center at West Point [link]

Computer Science and Telecommunications Board (NAS) [link]

Electronic Freedom Foundation (EFF) [link]

Electronic Privacy Information Center (EPIC [link]

Federation of American Scientists [link]

The Heritage Foundation [link]

IEEE [link]

Information Society Project at Yale Law School [link]

Manhattan Institute [link]

Marconi Foundation at Columbia University [link]

The Markle Foundation [link]

The National Strategy Forum [link]

The Potomac Institute for Policy Studies [link]

RAND Corporation [link]

Rocky Mountain Institute [link]

Shell Center for Sustainability of Rice University [link]

Woodrow Wilson International Center for Scholars [link]

World Policy Institute [link]

 

Featured
Forthcoming
Home | About | Research | Services | Publications | News | Contact | Privacy · Copyright