K. A. Taipale, "Categorization of Information for Domestic Security: Some Questions and Issues," Potomac Institute for Policy Studies Roundtable (March 20, 2004) [download presentation slides PDF]
K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech.; 9 Int'l J. Comm. L. & Pol'y 8 (Dec. 2004).
K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]
K. A. Taipale, CAS Executive Director, "Identification Systems and Domestic Security: Who's Who in Whoville" [download presentation slides PDF]
K. A. Taipale, Who's Who in Whoville? "Congress should not rush to legislate a massive government identity surveillance system under the press of a politically expedient deadline without considering alternatives that can meet legitimate law enforcement and national security needs while still protecting privacy," PLENSIA conference in New York on October 29, 2005. [Full Statement]
K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 [9.4-introduction] in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005). See also Policy Alliance Reference Model.
More CAS publications
EO 13356 (Terrorism Information Sharing)
EO 13353 (Civil Liberties Board)
EO 13354 (National Couterterrorism Center)
EO 13355 (Management of the IC)
EO 13311 (HS Information Sharing)
Homeland Security Act of 2002 (Pub. L. 107-296; 6 U.S.C. 1 et seq.) H.5005
Homeland Security Presidential Directive 6 (HSPD-6)
9/11 Recommendations Implementation Act (Engrossed Amendment as Agreed to by House) S.2845
Senate National Intelligence Reform Act of 2004 S.2845
House 9/11 Recommendations Implementation Act H.10
Document: "Metadata and XML: Defining a New Intelligence Paradigm" (Technical Series) Intelligence Community Metadata Working Group (IC MWG) 08 April 2003
Potomac Institute Project Guardian
Discussion Proposal, "Better Information Sharing and More Privacy in the War on Terrorism - A New Category of Information is Needed" 29 July 2003 [more]
WayPoint Issue Paper: The New Presidential Directive on “Screening” Terrorist Information, 10 October 2003 [PDF]
The Center for Advanced Studies in Science and Technology Policy is a private, non-partisan research and advisory organization focused on information, technology and national security policy and related issues.
The Center seeks to inform and influence national and international policy- and decision-makers in both the public and private sectors by providing sound, objective analysis and advice, in particular by identifying and articulating issues that lie at the intersection of technologically enabled change and existing practice in policy, law and industry.
In addition to its independent research activities and public engagements [see news and publications], the Center provides select advisory services to policy-makers in government and decision-makers in the private sector [see advisory services].
The Center is also a partner in the Global Information Society Project, a joint research effort of the Center and the World Policy Institute. The Global Information Society Project has research programs in Law Enforcement and National Security in the Information Age; Telecommunications and Cybersecurity Policy; Information Operations, Assurance, and State/Enterprise Resilience; Environment and Energy Policy; and Intellectual Property and Trade; among others [see research programs].
Areas of Focus:
Information Policy: National and domestic security and civil liberties (including privacy), cybersecurity and computer crime, telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture and business process engineering.
Enabling Technologies: Data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, decision support, distributed networks, enterprise architecture, distributed computing, wireless communication, remote sensing, identification, authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.
Security Applications: Foreign intelligence, defense intelligence, counter intelligence, domestic intelligence, law enforcement, counter terrorism, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance, information warfare, information operations, netcentric strategy, environmental monitoring, international relations and global security.