Biometrics and Info Sharing

URL: <>


Kim Taipale, CAS Executive Director, "Technology, Policy, and Cultural Dimensions of Biometric Systems: Information Sharing," [download presentation]


Related background material:


K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123; 9 Int'l J. Comm. L. & Pol'y 8 (Dec. 2004).

K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]

Book chapter:

K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 [9.4-introduction] in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005). See also Policy Alliance Reference Model.

PPT Presentations:

"Public Safety vs. Personal Privacy: The Case For and Against Secure Flight" presented at the InfoSecurity 2004 conference, New York, Dec. 8, 2004 [download presentation]

"Technology, Security, and Anonymity: Redefining the Problem Statement," presented at the WWICS/AAAS/ABA Roundtable "Can Anonymity Survive in Post-9/11 Society," Woodrow Wilson Center, Washington, DC (May 4, 2004) [download presentation]

"Identification Systems and Domestic Security: Who's Who in Whoville" Potomac Institute for Policy Studies, Arlington, VA, "The Politics and Law of Identity and Identification in the Context of the War on Terror," Jan. 28, 2004 [download presentation]

Written Statements:

"Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security," PLENSIA 12/2004. [Full statement]

"Who's Who in Whoville? Congress should not rush to legislate a massive government identity surveillance system under the press of a politically expedient deadline without considering alternatives that can meet legitimate law enforcement and national security needs while still protecting privacy," PLENSIA conference October 29, 2005. [Full Statement]

More CAS publications

About the Center for Advanced Studies:

The Center for Advanced Studies in Science and Technology Policy is a private, non-partisan research and advisory organization focused on information, technology and national security policy and related issues.

The Center seeks to inform and influence national and international policy- and decision-makers in both the public and private sectors by providing sound, objective analysis and advice, in particular by identifying and articulating issues that lie at the intersection of technologically enabled change and existing practice in policy, law and industry.

In addition to its independent research activities and public engagements [see news and publications], the Center provides select advisory services to policy-makers in government and decision-makers in the private sector [see advisory services].

The Center is also a partner in the Global Information Society Project, a joint research effort of the Center and the World Policy Institute. The Global Information Society Project has research programs in Law Enforcement and National Security in the Information Age, Telecommunications and Spectrum Policy, Information Operations, Information Assurance and Operational Resilience, Environment and Energy Policy, and Intellectual Property and Trade, among others [see research programs].

Areas of Focus:

Information Policy: National and domestic security and civil liberties (including privacy), cybersecurity and computer crime, telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture and business process engineering.

Enabling Technologies: Data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, decision support, distributed networks, enterprise architecture, distributed computing, wireless communication, remote sensing, identification, authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.

Security Applications: Foreign intelligence, defense intelligence, counter intelligence, domestic intelligence, law enforcement, counter terrorism, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance, information warfare, information operations, netcentric strategy, environmental monitoring, international relations and global security.


The National Academies

Computer Science and Telecommunications Board

CSTB "Wither Biometrics?" Project