Book Chapters:
K. A. Taipale, Introduction to Civil Liberties and Other Legal Issues (McGraw-Hill 2012)
----, Cyber-Deterrence (SSRN 2009/2010).
----, Power to the Edge: New Threats, New Responses (NDU Press 2009).
----, Warrantless Wiretaps and Foreign Intelligence Surveillance (Amicus 2009).
----, The FISA is Not Adequate to Meet the Current Threat (GH Press 2008).
----, Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World (NYU Press 2007).
----, Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas (INSCT-Bantle 2006).
----, Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil
Liberties (Wiley-IEEE Press, 2006).
----, Introduction to Domestic Security and Civil Liberties (McGraw-Hill 2005).
Academic Journal Articles:
K. A. Taipale, Seeking Symmetry on the Information Front, 16 Nat'l Strategy F. Rev. 14 (2007).
----, The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance, 9 Yale J. L. & Tech. (2007).
----, Rethinking Foreign Intelligence Surveillance, World Policy Journal, Vol. XXIII No.4 (2006/07).
----, Whispering Wires and Warrantless Wiretaps, N.Y.U. Rev. L. & Security, No. VII Supl. (2006).
----, The Trusted Systems Problem, IEEE Intelligent Systems, Vol. 20 No. 5, pp. 80-83 (2005).
----, The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd, 7 Yale J. L. & Tech. 123; 9 Intl. J.
Comm. L. & Pol'y 8 (2004)
----, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Colum. Sci. & Tech. L. Rev. 2
(2003).
National Reports:
Aspen Institute:
Managing Digital Assets: The Challenge of Creating and Sustaining Intangible Value in a Data-Driven Economy, David Bollier, rapp. (Aspen Institute 2015) (ISBN 0898436168).
POWER-CURVE SOCIETY: The Future of Innovation,
Opportunity and Social Equity in the Emerging Networked Economy, David Bollier, rapp. (Aspen Institute 2013).
The Future of Work, David Bollier, rapp. (Aspen Institute 2011).
The Promise and Peril of Big Data, David Bollier, rapp. (Aspen Institute 2010).
Identity in the Age of Cloud Computing, J.D. Lasica, rapp. (Aspen Institute 2009)
The National Academies:
Biometric Recognition: Challenges and Opportunities, J. N. Pato and L. I. Millett, eds. (National Academies 2010).
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W. A. Owens, K. W. Dam, and H. S. Lin,
eds. (National Academies 2009).
Protecting Individual Privacy in the Struggle Against Terrorists (National Academies Press 2008).
K. A. Taipale, "Deconstructing Information Warfare," Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies (2006).
----, "From Data Mining to Computational Social Science for Counterterrorism," Committee on the Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The
National Academies (2006).
----, "Technology, Policy, and Cultural Dimensions of Biometric Systems," Computer Science and Telecommunications Board, The National Academies (2005).
U.S. Department of Defense:
K. A. Taipale, "Technology, Security and Privacy: Confidential Memorandum for the Department of Defense Technology and Privacy Advisory Committee (TAPAC)" (2003).
American Bar Association (Standing Committee on Law and National Security):
National Security Strategies for a Transparent World, S. E. Spaulding, conv., A. Kochems, rapp. (ABA-SCLNS 2010).
Markle Foundation Task Force on National Security in the Information Age:
Mobilizing Information to Prevent Terrorism, Third Report of the Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Jul. 2006).
Implementing a Trusted Information Sharing Environment, Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Feb. 2006).
Testimony:
U. S. Senate:
Testimony of Kim Taipale, "Reconciling Signals Intelligence Activity with Targeted Wiretapping,"
U.S. Senate Select Committee on Intelligence (SSCI) Hearing on The Foreign Intelligence Modernization Act of 2007, May 1, 2007.
----, "The Privacy Implications of Government Data Mining Programs," U.S. Senate Committee on the Judiciary, Washington, DC (Jan. 10, 2007).
U.S. House of Representatives:
----, "Foreign Intelligence Surveillance Act Reform," U.S. House Permanent Select Committee on Intelligence
(HPSCI), U.S. House of Representatives, July 19, 2006.
White House Cyber Policy Review:
Paul Trevithick, William Coleman, John Clippinger, and Kim Taipale, "Identity and Resilience" (2009).
Selected Presentations:
K. A. Taipale, "Policy Implication and Interventions," at Digital Assets and Liabilities: Valuing the Intangible Economy, 23rd Annual Aspen Institute Rountable on Information Technology (Jul 7-10, 2014).
----, "The Future of War: Armed Conflict in the Information Age," at the 6th Annual Int'l
Studies Program Conference "The Causes and Costs of War" Fordham University (2013).
----, "Power Curve Economy," at Navigating the Emerging Economy, 21st Annual Aspen Institute Roundtable on
Information Technology (2012).
----, "Governance in an Interconnected World," at the Atlantic Council (ACUS), Wash., DC (2011).
----, "Social Implications," at The Future of Work, 19th Annual Aspen Institute Roundtable on Information Technology
(2010).
----, "Electronic Surveillance in Extremistan," Univ. of Texas Law Review Symposium 2010, Austin, TX (2010).
----, "Policy Issues for Science and Technology in a Surveillance Society," at the 32nd Annual AAAS Forum on Science
and Technology Policy (2007).
----, "Deconstructing Information Warfare," The National Academies, Wash., DC (2006).
Opinion:
K. A. Taipale, "Security vs. Privacy: Security," Huffington Post (2007).
----, (with James Jay Carafano), "Free the Hostages: Continuing FISA Concerns," National Review
(2007).
----, FISA Should be Amended (2007).
----, The role of technology in government surveillance efforts WSJ (2006).
----, (with James Jay Carafano), Fixing Foreign Intelligence Surveillance, Wash. Times (2006).
----, "Is Net Neutrality Bad for National Preparedness?" CAS (2006)
----, FISA is not adequate to address recent technology developments, NYU Rev. L. & Sec. (Mar. 10, 2006).
-----, Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security (2004).
Government Should Not Rush to Massive ID Surveillance System," PLENSIA (2004).
Project Overviews:
Overview: The Global Information Society.
Overview: Law Enforcement and National Security in the Information Age.
Overview: Telecommunications and Cybersecurity Policy.
Overview: The Program on Information Warfare.
Overview: Data Mining, Automated Data Analysis, and Computational Social Science.
Overview: Foreign Intelligence Surveillance.
Overview: The Surveillance Society
Overview: Cybercrime, Cyberterrorism, and Digital Law Enforcement.