Related Research: Trusted Systems Project
K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004)
K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]
K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005). [introduction available online] See also the Policy Appliance Reference Model.
K. A. Taipale, CAS Executive Director, "Identification Systems and Domestic Security: Who's Who in Whoville" [download presentation slides PDF]
More CAS publications.
The Markle Foundation, Task Force on National Security in the Information Age Second Report: "Creating a Trusted Information Network for Homeland Security," December 2003 [www.markletaskforce.org]
Homeland Security Presidential Directive 6 (HSPD-6)
Potomac Institute Project Guardian
Discussion Proposal, "Better Information Sharing and More Privacy in the War on Terrorism - A New Category of Information is Needed" 29 July 2003 [more]
WayPoint Issue Paper: The New Presidential Directive on “Screening” Terrorist Information, 10 October 2003 [PDF]