K. A. Taipale

From Wikipedia, the free encyclopedia
Jump to: navigation, search

K. A. (Kim) Taipale is a lawyer, scholar, and social theorist specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization, and a director of the Stilwell Charitable Fund. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

Taipale is a senior fellow at the World Policy Institute and serves on the Markle Foundation Task Force on National Security in the Information Age, and previously served on the Science and Engineering for National Security Advisory Board of the Heritage Foundation, the LexisNexis Information Policy Forum; and the Steering Committee of the American Law Institute's digital information privacy project. In addition, he has served on several corporate and non-profit boards.

Taipale is a frequent speaker and has written extensively on the intersection of information and technology policy with national and global security interests. He has testified before Congressional and other national committees, including on issues relating to foreign intelligence surveillance,[1][2] data mining,[3][4] biometrics,[5] and information warfare.[6] Taipale is a nationally recognized expert on technology and security policy, and related issues, including privacy and civil liberties. He is regularly quoted in the media,[7] and has appeared frequently on PBS and NPR.[8]

Taipale received a BA and JD from New York University and an MA, EdM, and LLM from Columbia University.

Selected publications[edit]

Book chapters[edit]

  • Introduction to Civil Liberties and Other Legal Issues, in The McGraw-Hill Homeland Security Handbook 2nd Edition (David Kamien, ed., McGraw-Hill, 2012) (ISBN 0071790845).
  • Cyber-Deterrence, in Law, Policy and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization (IGI Global 2011) (ISBN 1615208313).
  • Power to the Edge: New Threats, New Responses, in America's Security Role in a Changing World: A Global Strategic Assessment 2009 (National Defense University 2009) (ISBN 0160832128).
  • Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime and Digital Law Enforcement, Ex Machina: Law, Technology & Society Book Series, (Jack Balkin, et al., eds., NYU Press, 2007) (ISBN 0814799833).
  • Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties, in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, eds., Wiley-IEEE, 2006) (ISBN 0471776157).
  • Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Proceedings from Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle 2006).
  • Introduction to Domestic Security and Civil Liberties, in The McGraw-Hill Homeland Security Handbook (David Kamien, ed., McGraw-Hill, 2005) (ISBN 0071446656).

Journal articles and papers[edit]




  1. ^ Statement on Foreign Intelligence Surveillance Modernization, Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, U.S. Senate (May 1, 2007).
  2. ^ Testimony on Foreign Intelligence Surveillance Reform, House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).
  3. ^ Testimony of Kim A. Taipale, Senate Committee on the Judiciary, Hearing on Privacy Implications of Government Data Mining Programs, U.S. Senate (Jan. 10, 2007).
  4. ^ Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Washington, DC (Apr. 27, 2006).
  5. ^ Committee on the Technology, Policy, and Cultural Dimensions of Biometric Systems, The National Academies, Washington, DC (Mar. 2005).
  6. ^ Committee on the Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006).
  7. ^ For example, see How Pentagon tech push could take shape in next administration, Washington Examiner (Aug. 4, 2016), Pentagon Funding Start-ups to Aid Security, San Jose Mercury News (May 13, 2015), The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text The Intercept (May 5, 2015), Technology disrupting the American Dream The Washington Post (Jan. 19, 2015), How the CIA Grows Tech: An inside look at In-Q-Tel DefenseNews (Jun. 17, 2013). How In-Q-Tel Helps CIA Scout for Innovative Technologies - A Model for Other Agencies?, AOL Government (Nov. 29, 2012), The Rise of Black Market Data, Newsweek (Dec. 6, 2008), Freedom and its Digital Discontents, The Economist (Feb. 8, 2008), Listening to the Enemy, Wall Street Journal (Jan. 28, 2008), In Cyberwar There Are No Rules, Sueddeutsche Zeitung (Sept. 20, 2007), NSA Spying Part of Broader Effort, Washington Post (Aug. 1, 2007), Daylight Sought For Data Mining, Washington Post (Jan. 11, 2007), Experts Differ About Surveillance and Privacy, N. Y. Times (July 20, 2006), Balancing Privacy and Security, The Wall Street Journal (May 16, 2006), The Total Information Awareness Project Lives On, MIT Technology Review (Apr. 26, 2006), Internet devices threaten NSA’s ability to gather intelligence legally, National Journal (Apr. 8, 2006), Surveillance Society: The Experts Speak, Business Week (Aug. 8, 2005), and Brave New Era for Privacy Fight, Wired News (Jan. 17, 2005).
  8. ^ For example, see Digital Age: Russian Cyber Attacks on Georgia (WNYE-PBS Sept. 28, 2008), On Point: Privacy in the Electronic Workplace (NPR Jul. 3, 2008), Fred Friendly: Nanotechnology: Privacy and Security (PBS April 2008), Justice Talking: The Tension Between Security and Liberty in the War on Terror (NPR Mar. 3, 2008), Digital Age: Encryption and Information Security (WNYE-PBS Jan. 16, 2008), "Security vs. Privacy", (MacNeil-Lehrer Productions, PBS Nov. 13, 2007) and Digital Age: Will the CIA Ever Learn to Blog? (WNYE-PBS, Jul. 1, 2007).

External links[edit]