K. A. Taipale

Last updated

K. A. (Kim) Taipale is an investor, legal scholar, and social theorist specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, and the former chairman of the executive committee of Kobra International Ltd. He is also the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization, and a director of the Stilwell Charitable Fund. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

Contents

Taipale currently also serves on the advisory board of The Common Good, [1] and previously served on the Markle Foundation Task Force on National Security in the Information Age, [2] the advisory council at the World Policy Institute, [3] the Science and Engineering for National Security Advisory Board of The Heritage Foundation, the LexisNexis Information Policy Forum; and the Steering Committee of the American Law Institute's digital information privacy project. In addition, he has served on several corporate and non-profit boards.

Taipale is a frequent speaker and has written extensively on the intersection of information and technology policy with national and global security interests. He has advised senior policy makers in government and the private sector, and testified before Congressional and other national committees, including on issues relating to foreign intelligence surveillance, [4] [5] data mining, [6] [7] biometrics, [8] and information warfare. [9] Taipale is a nationally recognized expert on technology and security policy, and related issues, including privacy and civil liberties. He is regularly quoted in the media, [10] and has appeared frequently on PBS and NPR. [11]

Taipale received a BA and JD from New York University and an MA, EdM, and LLM from Columbia University.

Selected publications

Book chapters

Journal articles and papers

Reports

Opinion

Related Research Articles

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is. Information warfare may involve the collection of tactical information, assurance(s) that one's information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of the opposing force's information, and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.

<span class="mw-page-title-main">Information Awareness Office</span> DARPA division overseeing the "Total Information Awareness" program

The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

<span class="mw-page-title-main">Total Information Awareness</span> US mass detection program

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.

Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. EPIC is based in Washington, D.C. EPIC's mission is to secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Philip D. Zelikow</span> American diplomat, academic, and author (born 1954)

Philip David Zelikow is an American diplomat, academic and author. He has worked as the executive director of the 9/11 Commission, director of the Miller Center of Public Affairs at the University of Virginia, and counselor of the United States Department of State. He is the White Burkett Miller Professor of History at the University of Virginia and was American Academy in Berlin Axel Springer Fellow, in the fall of 2009.

<span class="mw-page-title-main">Foreign Intelligence Surveillance Act</span> 1978 United States federal law

The Foreign Intelligence Surveillance Act of 1978 is a United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

<span class="mw-page-title-main">Zoë Baird</span> American lawyer

Zoë Eliot Baird is an American lawyer and president of the Markle Foundation. She is known for her role in the Nannygate matter of 1993, which arose when she was nominated by President Bill Clinton as the first woman to be Attorney General of the United States, but she withdrew her nomination when it was discovered she had hired illegal aliens and failed to pay Social Security taxes for them. Since 1998, she has led the Markle Foundation.

<span class="mw-page-title-main">NSA warrantless surveillance (2001–2007)</span> Part of Terrorist Surveillance Program

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — refers to the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, phone calls, Internet activities, text messages and other forms of communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lays within the U.S.

<span class="mw-page-title-main">James A. Baker (government attorney)</span> American lawyer

James Andrew Baker is a former American government official at the Department of Justice who served as general counsel for the Federal Bureau of Investigation (FBI) and later served as deputy general counsel at Twitter, Inc. before being fired by Elon Musk in December 2022.

The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent agency within the executive branch of the United States government, established by Congress in 2004 to advise the President and other senior executive branch officials to ensure that concerns with respect to privacy and civil liberties in the United States are appropriately considered in the development and implementation of all laws, regulations, and executive branch policies related to terrorism.

<span class="mw-page-title-main">Marc Rotenberg</span>

Marc Rotenberg is president and founder of the Center for AI and Digital Policy, an independent non-profit organization, incorporated in Washington, D.C. Rotenberg is the editor of The AI Policy Sourcebook, a member of the OECD Expert Group on AI, and helped draft the Universal Guidelines for AI. He teaches the GDPR and privacy law at Georgetown Law and is coauthor of Privacy Law and Society and The Privacy Law Sourcebook (2020). Rotenberg is a founding board member and former chair of the Public Interest Registry, which manages the .ORG domain.

Tara L. Lemméy is an American entrepreneur, inventor, designer, technology expert, and innovation strategist. She is CEO and founder of LENS Ventures, an innovation and investment firm based in San Francisco. Lemméy was named one of the 100 Most Creative People in Business in 2013 by Fast Company (magazine) and one of the MCP 1000: The Most Creative People in Business. She is an inventor with over seventy US and international utility and design patents.

<span class="mw-page-title-main">Peter Swire</span>

Peter P. Swire is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium (W3C), to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

Fred Harrison Cate is the vice president for research at Indiana University and distinguished professor and the C. Ben Dutton Professor of Law at Indiana University Maurer School of Law. He is a senior fellow of the Center for Applied Cybersecurity Research. Cate specializes in information privacy and security law issues. He has testified before numerous congressional committees and speaks frequently before professional, industry, and government groups.

References

  1. The Common Good NY - Advisory Board Members
  2. Markle Task Force on National Security in the Information Age - Members
  3. World Policy Institute - Advisory Council Members
  4. Statement on Foreign Intelligence Surveillance Modernization Archived 2007-05-30 at the Wayback Machine , Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, U.S. Senate (May 1, 2007).
  5. Testimony on Foreign Intelligence Surveillance Reform, House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).
  6. Testimony of Kim A. Taipale, Senate Committee on the Judiciary, Hearing on Privacy Implications of Government Data Mining Programs, U.S. Senate (Jan. 10, 2007).
  7. Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Washington, DC (Apr. 27, 2006).
  8. Committee on the Technology, Policy, and Cultural Dimensions of Biometric Systems, The National Academies, Washington, DC (Mar. 2005).
  9. Committee on the Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006).
  10. For example, see Artificial Intelligence and the Future of Work, TechTrends NPR (Oct. 18, 2017), How Pentagon tech push could take shape in next administration, Washington Examiner (Aug. 4, 2016), Pentagon Funding Start-ups to Aid Security, San Jose Mercury News (May 13, 2015), The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text The Intercept (May 5, 2015), Technology disrupting the American Dream The Washington Post (Jan. 19, 2015), How the CIA Grows Tech: An inside look at In-Q-Tel DefenseNews (Jun. 17, 2013). How In-Q-Tel Helps CIA Scout for Innovative Technologies - A Model for Other Agencies?, AOL Government (Nov. 29, 2012), The Rise of Black Market Data, Newsweek (Dec. 6, 2008), Freedom and its Digital Discontents, The Economist (Feb. 8, 2008), Listening to the Enemy, Wall Street Journal (Jan. 28, 2008), In Cyberwar There Are No Rules, Sueddeutsche Zeitung (Sept. 20, 2007), NSA Spying Part of Broader Effort, Washington Post (Aug. 1, 2007), Daylight Sought For Data Mining, Washington Post (Jan. 11, 2007), Experts Differ About Surveillance and Privacy, N. Y. Times (July 20, 2006), Balancing Privacy and Security, The Wall Street Journal (May 16, 2006), The Total Information Awareness Project Lives On, MIT Technology Review (Apr. 26, 2006), Internet devices threaten NSA’s ability to gather intelligence legally, National Journal (Apr. 8, 2006), Surveillance Society: The Experts Speak, Business Week (Aug. 8, 2005), and Brave New Era for Privacy Fight, Wired News (Jan. 17, 2005).
  11. For example, see AI and the Future of Work, NPR (Oct. 18, 2017), Digital Age: Russian Cyber Attacks on Georgia (WNYE-PBS Sept. 28, 2008), On Point: Privacy in the Electronic Workplace (NPR Jul. 3, 2008), Fred Friendly: Nanotechnology: Privacy and Security (PBS April 2008), Justice Talking: The Tension Between Security and Liberty in the War on Terror (NPR Mar. 3, 2008), Digital Age: Encryption and Information Security (WNYE-PBS Jan. 16, 2008), "Security vs. Privacy", (MacNeil-Lehrer Productions, PBS Nov. 13, 2007) and Digital Age: Will the CIA Ever Learn to Blog? (WNYE-PBS, Jul. 1, 2007).