Counterterrorism and Privacy

Presentation by:

Kim Taipale, CAS Executive Director, "Technology as a Tool to Protect Civil Liberties: Enterprise Architecture and Civil Liberties," [download presentation slides PDF]

Final Conference Report:

McCormick Tribune Foundation, "Counterterrorism Technology and Privacy," Cantigny Conference Series Report (2005).

Other material:

K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004)

K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]

K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005). [introduction available online] See also the Policy Appliance Reference Model.

Related Research: Trusted Systems Project

Links:

American Bar Association (ABA) Standing Committee on Law and National Security

The National Strategy Forum

Program on Law Enforcement and National Security in the Information Age (www.PLENSIA.org)