Page URL: <data-mining-program.info>
Kim Taipale to present Predictive Analytics and Perception Shaping at EU-ITA, Jun. 8-9, 2011.
Kim Taipale to present Behavioral Tracking and Social Control at GISP Forum, November 28, 2011.
Kim Taipale participated in Addressing Complex Problems, Highlands Forum XLIII (OSD), Phoenix, Arizona (Nov. 7-9, 2010).
Kim Taipale participated in No More Secrets: National Security Strategies for a Transparent World sponsored by the ABA Standing Committee on Law and National Security, the Office of the National Counterintelligence Executive, and the National Strategy Forum, Wash., DC (June 29, 2010).
Kim Taipale discussed Cyber Security, Cyber Warfare, and National Security at "National Security Challenges and the Obama Administration", Duke University School of Law, Durham, NC (Apr. 15-16, 2010).
Kim Taipale discussed Cyberspace and the Fourth Amendment at the U.S. Court of Appeals for the Armed Forces 2010 Annual Judicial Conference, Washington, DC (Mar. 10-11, 2010).
Kim Taipale discussed "The Rise of America’s Surveillance State" with author Shane Harris at The Brookings Institution, Wash. DC (Mar. 11, 2010).
Kim Taipale participated in Extreme Inference: Implications of Data Intensive Advanced Correlation Techniques, Eighteenth Annual Aspen Institute Roundtable on Information Technology (Aug. 4-7, 2009).
Kim Taipale, CAS Executive Director, From Data Mining to Computational Social Science for Counterterrorism presented to the Committee on the Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Wash., DC (Apr. 27, 2006). [download presentation slides]
Data Mining: Background Materials Prepared for the Committee on the Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, The National Academies, Selected Writings of K. A. Taipale, Center for Advanced Studies in Sci. & Tech. Pol’y (Apr. 2006). Download Version 1.6 (3.2 MB PDF).
K. A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Columbia Sci. & Tech. L. Rev. 2 (Dec. 2003).
K. A. Taipale, Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd, 7 Yale J. L. & Tech. 123-201; 9 Intl. J. Comm. L. & Pol'y 8 (Mar. 2004) (See section on "TECHNOLOGIES OF DATA AGGREGATION AND ANALYSIS" p. 162-172)
K. A. Taipale, The Trusted System Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence, Homeland Security, IEEE Intelligent Systems, V.20 No.5, pp 80-83 (Sep./Oct. 2005).
K. A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, NYU Rev. L. & Security, No. VII Supl. (Spring 2006) (See section on "Automated analysis: data mining and traffic analysis").
K. A. Taipale, Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime and Digital Law Enforcement, Yale Information Society Project series, (Jack Balkin, et al., eds., NYU Press, 2007).
K. A. Taipale, The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance, 9 Yale J. L. & Tech. 128-161 (Spring 2007) (See section on "AUTOMATED ANALYSIS: CONTENT FILTERING, TRAFFIC ANALYSIS, AND LINK OR PATTERN ANALYSIS" p. 150-156).
ISAT 2002 Study, Security with Privacy (Dec. 2002). (PDF)
Paul Rosenzweig, Proposals for Implementing the Terrorism Information Awareness System, Legal Memorandum No. 8, Heritage Foundation (Aug. 2003) 2 Geo. J. L. & Pub. Pol’y 169 (2004).
Department of Defense (DOD) Technology and Privacy Advisory Committee (TAPAC), Safeguarding Privacy in the Fight Against Terror, Final Report (Mar. 2004). (PDF from CDT)
Mary DeRosa, Data Mining and Data Analysis for Counterterrorism, CSIS Press (Mar. 2004).
Charles Weiss, The Coming Technology of Knowledge Discovery: A Final Blow to Privacy Protection? 2004 U. Ill. J. L. Tech. & Pol’y 253 (2004).
ABA SCL&NS, Cantigny Principles on Technology, Terrorism, and Privacy, Nat. Sec. Law Report (Feb. 2005).
Daniel J. Steinbock, Data Matching, Data Mining, and Due Process, 40 Georgia L. Rev. (2005). (SSRN)
Fred H. Cate, Legal Standards for Data Mining, in Emergent Information Technologies and Enabling Policies for Counter-Terrorism (Robert Popp and John Yen, eds., IEEE-Wiley Press, Jun. 2006).
K. A. Taipale, Data Mining and Counterterrorism: Methodology and Policy, at "Advancing Analytic Techniques in Counterterrorism Analysis," in Arlington, VA, Aug. 19, 2005.
K. A. Taipale, Emerging Technologies in Security Evaluations, National Science Foundation, Arlington, VA, Jul. 13-14, 2005.
K. A. Taipale, Counterterrorism Technology and Privacy at the ABA Standing Committee on Law and National Security conference "National Security Law in a Changed World: The Fourteenth Annual Review of the Field," Arlington, VA on Nov. 18-19, 2004.
K. A. Taipale, Technology as a Tool to Protect Civil Liberties: Data Mining, Enterprise Architecture, and Civil Liberties, at the Counterterrorism Technology and Privacy Conference, McCormick Tribune Foundation Cantigny Conference Series, ABA Standing Committee on Law and National Security, Jun. 24-25, 2004.
K. A. Taipale, New Tools: Design, Technology, Control, Data Mining and Surveillance at "Digital Cops in Virtual Environment - CyberCrime and Digital Law Enforcement," Yale Law School, Mar. 26-28, 2004.
K. A. Taipale, Foreign Intelligence Surveillance Act Reform, Testimony before the House Permanent Select Committee on Intelligence, U.S. House of Representatives, July 19, 2006. [Written Testimony] (see section on automated analysis)
Testimony of Kim Taipale, executive director of the Center for Advanced Studies, Foreign Intelligence Surveillance Modernization: Reconciling Signals Intelligence Activity with Targeted Wiretapping, U.S. Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, May 1, 2007.
The Center for Advanced Studies in Science and Technology Policy is a private, non-partisan research and advisory organization focused on information, technology and national security policy and related issues.
The Center seeks to inform and influence national and international policy- and decision-makers in both the public and private sectors by providing sound, objective analysis and advice, in particular by identifying and articulating issues that lie at the intersection of technologically enabled change and existing practice in policy, law and industry.
The Center has research programs in:
among others [see research programs].
Areas of Focus:
Information Policy: National and domestic security and civil liberties (including privacy), cybersecurity and computer crime, telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture and business process engineering.
Enabling Technologies: Data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, decision support, distributed networks, enterprise architecture, distributed computing, wireless communication, remote sensing, identification, authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.
Security Applications: Foreign intelligence, defense intelligence, counter intelligence, counter insurgency, domestic intelligence, law enforcement, counterterrorism, electronic surveillance, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance, information warfare, information operations, netcentric strategy, environmental monitoring, international relations and global security.