K. A. Taipale

K. A. Taipale
EducationNew York University
Columbia University
Occupation(s)Investor
Legal scholar
EmployerStilwell Holding (partner)
Websitetaipale.info

K. A. (Kim) Taipale is a Finnish-American investor and legal scholar specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, a director of the Stilwell Charitable Fund, and the former chairman of the executive committee of Kobra International Ltd.

Education

Taipale received a BA and JD from New York University and an MA, EdM, and LLM from Columbia University.

Career

Taipale is the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization focused on information and communication technology policy. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

Taipale serves on the advisory board of The Common Good,[1] and previously served on the Markle Foundation Task Force on National Security in the Information Age,[2] the advisory council at the World Policy Institute,[3] the Science and Engineering for National Security Advisory Board of The Heritage Foundation, the LexisNexis Information Policy Forum; and the Steering Committee of the American Law Institute's digital information privacy project. He was an adjunct professor of communications at Columbia University and of law at the New York Law School where he was awarded the Otto L. Walter Distinguished Writing Award for legal scholarship.[4] In addition, he has served on several corporate and non-profit boards.

Taipale is a frequent speaker and has written extensively on the intersection of information and technology policy with national and global security interests. He has advised senior policy makers in government and the private sector, and testified before Congressional and other national committees, including on issues relating to foreign intelligence surveillance,[5][6] data mining,[7][8] biometrics,[9] and information warfare.[10]

Selected publications

Book chapters

  • Introduction to Civil Liberties and Other Legal Issues, in The McGraw-Hill Homeland Security Handbook 2nd Edition (David Kamien, ed., McGraw-Hill, 2012) (ISBN 0071790845).
  • Cyber-Deterrence, in Law, Policy and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization (IGI Global 2011) (ISBN 1615208313).
  • Power to the Edge: New Threats, New Responses, in America's Security Role in a Changing World: A Global Strategic Assessment 2009 (National Defense University 2009) (ISBN 0160832128).
  • Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime and Digital Law Enforcement, Ex Machina: Law, Technology & Society Book Series, (Jack Balkin, et al., eds., NYU Press, 2007) (ISBN 0814799833).
  • Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties, in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, eds., Wiley-IEEE, 2006) (ISBN 0471776157).
  • Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Proceedings from Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle 2006).
  • Introduction to Domestic Security and Civil Liberties, in The McGraw-Hill Homeland Security Handbook (David Kamien, ed., McGraw-Hill, 2005) (ISBN 0071446656).

Journal articles and papers

  • Identity and Resilience, Paul Trevithick, William Coleman, John Clippinger, and Kim Taipale (White House Cyberspace Policy Review Document 2009).
  • Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, 16 Nat'l Strategy F. Rev. 14 (Summer 2007).
  • The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance, 9 Yale J. L. & Tech. 128 (Spring 2007).
  • Rethinking Foreign Intelligence Surveillance, World Policy Journal, Vol. XIII (Winter 2006-2007).
  • Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, N.Y.U. Rev. L. & Security, No. VII Supl. Bull. on L. & Sec.: The NSA and the War on Terror (Spring 2006).
  • The Trusted Systems Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence, IEEE Intelligent Systems, Vol. 20 No. 5, (Sept./Oct. 2005).
  • Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy, and the Lessons of King Ludd, 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004).
  • Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003).

Reports

  • Managing Digital Assets: The Challenge of Creating and Sustaining Intangible Value in a Data-Driven Economy, David Bollier, rapp. (Aspen Institute 2015) (ISBN 0898436168).
  • POWER-CURVE SOCIETY: The Future of Innovation, Opportunity and Social Equity in the Emerging Networked Economy, David Bollier, rapp. (Aspen Institute 2013) (ISBN 0-89843-582-X).
  • The Future of Work: What It Means for Individuals, Businesses, Markets and Governments, David Bollier, rapp. (Aspen Institute 2011) (ISBN 0898435439).
  • The Promise and Peril of Big Data, David Bollier, rapp. (Aspen Institute 2010) (ISBN 0898435161).
  • No More Secrets: National Security Strategies for a Transparent World, S. E. Spaulding, conv., A. Kochems, rapp. (ABA-SCLNS, Off. of the Nat'l Counterintelligence Exec., & Nat'l Strategy F. 2010).
  • Biometric Recognition: Challenges and Opportunities, J. N. Pato and L. I. Millett, eds. (National Academies Press 2010) (ISBN 0309142083).
  • Identity in the Age of Cloud Computing, J.D. Lasica, rapp. (Aspen Institute 2009) (ISBN 0898435056).
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W. A. Owens, K. W. Dam, and H. S. Lin, eds. (National Academies Press 2009) (ISBN 0309138507).
  • Protecting Individual Privacy in the Struggle Against Terrorist, Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals (National Academies Press 2008) (ISBN 0309124883).
  • Next Generation Inter-Organizational Emergency Communications, Clark Kent Ervin and David K. Aylward, (Aspen Institute 2006) (ISBN 0898434645).
  • Mobilizing Information to Prevent Terrorism, Third Report of the Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. (Jul. 2006).
  • Implementing a Trusted Information Sharing Environment, Markle Foundation Task Force on National Security in the Information Age, Zoe Baird & James Barksdale, chmn. ( Feb. 2006).

Opinion

  • Commentary, Security vs. Privacy: Security, The Huffington Post (Nov. 9, 2007).
  • Commentary (with James Jay Carafano), Free the Hostages: Continuing FISA Concerns, National Review Online (Oct. 24, 2007).
  • New Authority to Oversight Foreign Intelligence Needed, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (May 7, 2007).
  • FISA Should be Amended, Says Center for Advanced Studies, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Apr. 19, 2007).
  • Is Net Neutrality Bad for National Preparedness?, Program on Telecommunications and Cybersecurity Policy, World Policy Institute (Jun. 14, 2006).
  • Commentary (with James Jay Carafano), Fixing Foreign Intelligence Surveillance, The Washington Times (Jan. 24, 2006).
  • Not Issuing Driver's Licenses to Illegal Aliens is Bad for National Security, Program on Law Enforcement and National Security in the Information Age, World Policy Institute (Dec. 17, 2004).
  • Government Should Not Rush to Massive ID Surveillance System, Global Information Society Project, World Policy Institute (Oct. 29, 2004).

References

  1. ^ "Advisory Board". The Common Good. Retrieved 2024-08-09.
  2. ^ "Markle Task Force on National Security | Markle". www.markle.org. Retrieved 2024-08-09.
  3. ^ "Boards - World Policy". web.archive.org. 2018-03-01. Retrieved 2024-08-09.
  4. ^ "New York Law School Magazine, Vol. 28, No. 1 (Winter 2008) p. 55". digitalcommons.nyls.edu. 2008. Retrieved 2024-09-05.
  5. ^ Statement on Foreign Intelligence Surveillance Modernization Archived 2007-05-30 at the Wayback Machine, Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, U.S. Senate (May 1, 2007).
  6. ^ Testimony on Foreign Intelligence Surveillance Reform, House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).
  7. ^ Testimony of Kim A. Taipale, Senate Committee on the Judiciary, Hearing on Privacy Implications of Government Data Mining Programs, U.S. Senate (Jan. 10, 2007).
  8. ^ "Initiatives|Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals | The National Academies Press". www.nap.edu. Retrieved 2024-08-09.
  9. ^ Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems. Washington, D.C.: National Academies Press. 2006-02-06. ISBN 978-0-309-10125-7.
  10. ^ Committee on the Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006).
  • taipale.info - personal web page
  • Stilwell Center for Advanced Studies in Science and Technology Policy
  • Markle Task Force on National Security in the Information Age