K. A. Taipale

Summary

K. A. (Kim) Taipale is an American investor, legal scholar, and social theorist specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, and the former chairman of the executive committee of Kobra International Ltd. He is also the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization, and a director of the Stilwell Charitable Fund. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

Taipale currently also serves on the advisory board of The Common Good,[1] and previously served on the Markle Foundation Task Force on National Security in the Information Age,[2] the advisory council at the World Policy Institute,[3] the Science and Engineering for National Security Advisory Board of The Heritage Foundation, the LexisNexis Information Policy Forum; and the Steering Committee of the American Law Institute's digital information privacy project. In addition, he has served on several corporate and non-profit boards.

Taipale is a frequent speaker and has written extensively on the intersection of information and technology policy with national and global security interests. He has advised senior policy makers in government and the private sector, and testified before Congressional and other national committees, including on issues relating to foreign intelligence surveillance,[4][5] data mining,[6][7] biometrics,[8] and information warfare.[9] Taipale is a nationally recognized expert on technology and security policy, and related issues, including privacy and civil liberties. He is regularly quoted in the media,[10] and has appeared frequently on PBS and NPR.[11]

Taipale received a BA and JD from New York University and an MA, EdM, and LLM from Columbia University.

Selected publications edit

Book chapters edit

  • Introduction to Civil Liberties and Other Legal Issues, in The McGraw-Hill Homeland Security Handbook 2nd Edition (David Kamien, ed., McGraw-Hill, 2012) (ISBN 0071790845).
  • Cyber-Deterrence, in Law, Policy and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization (IGI Global 2011) (ISBN 1615208313).
  • Power to the Edge: New Threats, New Responses, in America's Security Role in a Changing World: A Global Strategic Assessment 2009 (National Defense University 2009) (ISBN 0160832128).
  • Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime and Digital Law Enforcement, Ex Machina: Law, Technology & Society Book Series, (Jack Balkin, et al., eds., NYU Press, 2007) (ISBN 0814799833).
  • Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties, in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, eds., Wiley-IEEE, 2006) (ISBN 0471776157).
  • Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Proceedings from Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle 2006).
  • Introduction to Domestic Security and Civil Liberties, in The McGraw-Hill Homeland Security Handbook (David Kamien, ed., McGraw-Hill, 2005) (ISBN 0071446656).

Journal articles and papers edit

  • Identity and Resilience, Paul Trevithick, William Coleman, John Clippinger, and Kim Taipale (White House Cyberspace Policy Review Document 2009).
  • Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, 16 Nat'l Strategy F. Rev. 14 (Summer 2007).
  • The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance, 9 Yale J. L. & Tech. 128 (Spring 2007).
  • Rethinking Foreign Intelligence Surveillance, World Policy Journal, Vol. XIII (Winter 2006-2007).
  • Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, N.Y.U. Rev. L. & Security, No. VII Supl. Bull. on L. & Sec.: The NSA and the War on Terror (Spring 2006).
  • The Trusted Systems Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence, IEEE Intelligent Systems, Vol. 20 No. 5, (Sept./Oct. 2005).
  • Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy, and the Lessons of King Ludd, 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004).
  • Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003).

Reports edit

  • Managing Digital Assets: The Challenge of Creating and Sustaining Intangible Value in a Data-Driven Economy, David Bollier, rapp. (Aspen Institute 2015) (ISBN 0898436168).
  • POWER-CURVE SOCIETY: The Future of Innovation, Opportunity and Social Equity in the Emerging Networked Economy, David Bollier, rapp. (Aspen Institute 2013) (ISBN 0-89843-582-X).
  • The Future of Work: What It Means for Individuals, Businesses, Markets and Governments, David Bollier, rapp. (Aspen Institute 2011) (ISBN 0898435439).
  • The Promise and Peril of Big Data, David Bollier, rapp. (Aspen Institute 2010) (ISBN 0898435161).
  • No More Secrets: National Security Strategies for a Transparent World, S. E. Spaulding, conv., A. Kochems, rapp. (ABA-SCLNS, Off. of the Nat'l Counterintelligence Exec., & Nat'l Strategy F. 2010).
  • Biometric Recognition: Challenges and Opportunities, J. N. Pato and L. I. Millett, eds. (National Academies Press 2010) (ISBN 0309142083).
  • Identity in the Age of Cloud Computing, J.D. Lasica, rapp. (Aspen Institute 2009) (ISBN 0898435056).
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W. A. Owens, K. W. Dam, and H. S. Lin, eds. (National Academies Press 2009) (ISBN 0309138507).
  • Protecting Individual Privacy in the Struggle Against Terrorist, Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals (National Academies Press 2008) (ISBN 0309124883).
  • Next Generation Inter-Organizational Emergency Communications, Clark Kent Ervin and David K. Aylward, (Aspen Institute 2006) (ISBN 0898434645).
  • Mobilizing Information to Prevent Terrorism, Third Report of the Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Jul. 2006).
  • Implementing a Trusted Information Sharing Environment, Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. ( Feb. 2006).

Opinion edit

  • Commentary, Security vs. Privacy: Security, The Huffington Post (Nov. 9, 2007).
  • Commentary (with James Jay Carafano), Free the Hostages: Continuing FISA Concerns, National Review Online (Oct. 24, 2007).
  • New Authority to Oversight Foreign Intelligence Needed, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (May 7, 2007).
  • FISA Should be Amended, Says Center for Advanced Studies, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Apr. 19, 2007).
  • Is Net Neutrality Bad for National Preparedness?, Program on Telecommunications and Cybersecurity Policy, World Policy Institute (Jun. 14, 2006).
  • Commentary (with James Jay Carafano), Fixing Foreign Intelligence Surveillance, The Washington Times (Jan. 24, 2006).
  • Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Dec. 17, 2004).
  • Government Should Not Rush to Massive ID Surveillance System, Global Information Society Project, World Policy Institute (Oct. 29, 2004).

References edit

  1. ^ The Common Good NY - Advisory Board Members
  2. ^ Markle Task Force on National Security in the Information Age - Members
  3. ^ World Policy Institute - Advisory Council Members
  4. ^ Statement on Foreign Intelligence Surveillance Modernization Archived 2007-05-30 at the Wayback Machine, Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, U.S. Senate (May 1, 2007).
  5. ^ Testimony on Foreign Intelligence Surveillance Reform, House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).
  6. ^ Testimony of Kim A. Taipale, Senate Committee on the Judiciary, Hearing on Privacy Implications of Government Data Mining Programs, U.S. Senate (Jan. 10, 2007).
  7. ^ Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Washington, DC (Apr. 27, 2006).
  8. ^ Committee on the Technology, Policy, and Cultural Dimensions of Biometric Systems, The National Academies, Washington, DC (Mar. 2005).
  9. ^ Committee on the Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006).
  10. ^ For example, see Artificial Intelligence and the Future of Work, TechTrends NPR (Oct. 18, 2017), How Pentagon tech push could take shape in next administration, Washington Examiner (Aug. 4, 2016), Pentagon Funding Start-ups to Aid Security, San Jose Mercury News (May 13, 2015), The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text The Intercept (May 5, 2015), Technology disrupting the American Dream The Washington Post (Jan. 19, 2015), How the CIA Grows Tech: An inside look at In-Q-Tel DefenseNews (Jun. 17, 2013). How In-Q-Tel Helps CIA Scout for Innovative Technologies - A Model for Other Agencies?, AOL Government (Nov. 29, 2012), The Rise of Black Market Data, Newsweek (Dec. 6, 2008), Freedom and its Digital Discontents, The Economist (Feb. 8, 2008), Listening to the Enemy, Wall Street Journal (Jan. 28, 2008), In Cyberwar There Are No Rules, Sueddeutsche Zeitung (Sept. 20, 2007), NSA Spying Part of Broader Effort, Washington Post (Aug. 1, 2007), Daylight Sought For Data Mining, Washington Post (Jan. 11, 2007), Experts Differ About Surveillance and Privacy, N. Y. Times (July 20, 2006), Balancing Privacy and Security, The Wall Street Journal (May 16, 2006), The Total Information Awareness Project Lives On, MIT Technology Review (Apr. 26, 2006), Internet devices threaten NSA’s ability to gather intelligence legally, National Journal (Apr. 8, 2006), Surveillance Society: The Experts Speak, Business Week (Aug. 8, 2005), and Brave New Era for Privacy Fight, Wired News (Jan. 17, 2005).
  11. ^ For example, see AI and the Future of Work, NPR (Oct. 18, 2017), Digital Age: Russian Cyber Attacks on Georgia (WNYE-PBS Sept. 28, 2008), On Point: Privacy in the Electronic Workplace (NPR Jul. 3, 2008), Fred Friendly: Nanotechnology: Privacy and Security (PBS April 2008), Justice Talking: The Tension Between Security and Liberty in the War on Terror (NPR Mar. 3, 2008), Digital Age: Encryption and Information Security (WNYE-PBS Jan. 16, 2008), "Security vs. Privacy", (MacNeil-Lehrer Productions, PBS Nov. 13, 2007) and Digital Age: Will the CIA Ever Learn to Blog? (WNYE-PBS, Jul. 1, 2007).

External links edit

  • taipale.info - personal web page
  • Stilwell Center for Advanced Studies in Science and Technology Policy
  • Markle Task Force on National Security in the Information Age