- K. A. Taipale
K. A. (Kim) Taipale is a lawyer, scholar, and social theorist specializing in information, science and technology, and national and global security policy and related issues. He is the founder and executive director of the [http://advancedstudies.org Center for Advanced Studies in Science and Technology Policy] , a private, nonpartisan research organization located in New York. He is also a senior fellow at the
World Policy Institute , director of the [http://global-info-society.org Global Information Society Project] and an adjunct professor of law atNew York Law School where he teaches a course on [http://cybercrime.advancedstudies.org Cybercrime] .Taipale is a member of the [http://markletaskforce.org/ Markle Task Force on National Security in the Information Age] , the Science and Engineering for National Security Advisory Board of the [http://heritage.org Heritage Foundation] , the [http://www.reed-elsevier.com/index.cfm?articleid=1298 LexisNexis Information Policy Forum] ; and the Steering Committee of the
American Law Institute 's digital information privacy project. He has also served on several corporate and non-profit boards and is a partner in Stilwell Capital, a private investment firm.Taipale is a frequent speaker and has written extensively on the intersection of information law and policy with national and global security interests. He has testified before Congressional and other national committees, most recently on issues relating to foreign intelligence surveillance, [ [http://intelligence.senate.gov/070501/taipale.pdf Statement on Foreign Intelligence Surveillance Modernization] , Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007 (May 1, 2007).] [ [http://intelligence.house.gov/Media/PDFS/Taipale071906.pdf Testimony on Foreign Intelligence Surveillance Reform] , House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).] data mining, [ [http://data-mining-testimony.info/ Testimony of Kim A. Taipale] , Senate Committee on the Judiciary, [http://judiciary.senate.gov/hearing.cfm?id=2438 Hearing on Privacy Implications of Government Data Mining Programs] , U.S. Senate (Jan. 10, 2007).] [ [http://www8.nationalacademies.org/cp/projectview.aspx?key=157 Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals] , The National Academies, Washington, DC (Apr. 27, 2006).] biometrics, [ [http://www7.nationalacademies.org/cstb/project_biometrics.html Committee on the Technology, Policy, and Cultural Dimensions of Biometric Systems] , The National Academies, Washington, DC (Mar. 2005).] and information warfare [ [http://www7.nationalacademies.org/cstb/project_oio.html Committee on the Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare] , The National Academies, Washington, DC (Oct. 30, 2006).] . Taipale is a nationally recognized expert on technology, security, and privacy issues and is regularly quoted in the media. [For example, see [http://www.washingtonpost.com/wp-dyn/content/article/2007/01/10/AR2007011002396.html Daylight Sought For Data Mining] , Washington Post (Jan. 11, 2007), [http://online.wsj.com/public/article/SB114770347659052946-r55Jg7SFeKsLXThBxp6GoNZrhGQ_20060614.html Balancing Privacy and Security] , The Wall Street Journal (May 16, 2006), [http://www.businessweek.com/magazine/content/05_32/b3946008_mz001.htm Surveillance Society: The Experts Speak] , Business Week (Aug. 8, 2005), and [http://www.wired.com/news/privacy/1,66242-0.html Brave New Era for Privacy Fight] , Wired News (Jan. 17, 2005).]
Taipale received a BA and JD from
New York University and an MA, EdM, and LLM fromColumbia University .elected Publications
Journal Articles
* [http://ssrn.com/abstract=987040 "Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet"] , 16 Nat'l Strategy F. Rev. 14 (Summer 2007).
* [http://ssrn.com/abstract=959927 "The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance"] , 9 Yale J. L. & Tech. 128 (Spring 2007).
* [http://www.mitpressjournals.org/doi/abs/10.1162/wopj.2007.23.4.77 "Rethinking Foreign Intelligence Surveillance"] , World Policy Journal, Vol. XIII (Winter 2006-2007).
* [http://whisperingwires.info/ "Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance"] , N.Y.U. Rev. L. & Security, No. VII Supl. Bull. on L. & Sec.: The NSA and the War on Terror (Spring 2006).
* [http://doi.ieeecomputersociety.org/10.1109/MIS.2005.89 "The Trusted Systems Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence"] , IEEE Intelligent Systems, Vol. 20 No. 5, (Sept./Oct. 2005).
* [http://ssrn.com/abstract=601421 "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy, and the Lessons of King Ludd"] , 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004).
* [http://ssrn.com/abstract=546782 "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data"] , 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003).
Book chapters
*"Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World", in Cybercrime and Digital Law Enforcement, Ex Machina: Law, Technology & Society Book Series, (Jack Balkin, "et al., eds.", NYU Press, 2007) ( [http://www.amazon.com/dp/0814799833/ ISBN:0814799833] ).
*"Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties", in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, "eds.", Wiley-IEEE, 2006) ( [http://www.amazon.com/dp/0471776157/ ISBN: 0471776157] ).
*"Introduction to Domestic Security and Civil Liberties", in The McGraw-Hill Homeland Security Handbook (David Kamien, "ed.", McGraw-Hill, 2005) ( [http://www.amazon.com/dp/0071446656/ ISBN: 0071446656] ).
Opinion
* [http://fisa-oversight.info/ "New Authority to Oversight Foreign Intelligence Needed"] , Program on Law Enforcement and National Security in the Information Age, World Policy Institute (May 7, 2007).
* [http://fisa-modernization.info/ "FISA Should be Amended, Says Center for Advanced Studies"] , Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Apr. 19, 2007).
* [http://www.information-retrieval.info/PTP/net-neutrality/ "Is Net Neutrality Bad for National Preparedness?"] , Program on Telecommunications and Cybersecurity Policy, World Policy Institute (Jun. 14, 2006).
*Commentary (with James Jay Carafano), [http://www.washingtontimes.com/commentary/20060124-104527-1255r.htm "Fixing Foreign Intelligence Surveillance"] , The Washington Times (Jan. 24, 2006).
* [http://alien-id.info "Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security"] , Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Dec. 17, 2004).
* [http://plensia.org/id-system/ "Government Should Not Rush to Massive ID Surveillance System,"] Global Information Society Project, World Policy Institute (Oct. 29, 2004).
References
External links
* [http://taipale.info taipale.info] - personal web page
Wikimedia Foundation. 2010.