K._A._Taipale

K. A. Taipale

K. A. (Kim) Taipale is an American investor, legal scholar, and social theorist specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, and the former chairman of the executive committee of Kobra International Ltd. He is also the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization, and a director of the Stilwell Charitable Fund. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

Taipale currently also serves on the advisory board of The Common Good,[1] and previously served on the Markle Foundation Task Force on National Security in the Information Age,[2] the advisory council at the World Policy Institute,[3] the Science and Engineering for National Security Advisory Board of The Heritage Foundation, the LexisNexis Information Policy Forum; and the Steering Committee of the American Law Institute's digital information privacy project. In addition, he has served on several corporate and non-profit boards.

Taipale is a frequent speaker and has written extensively on the intersection of information and technology policy with national and global security interests. He has advised senior policy makers in government and the private sector, and testified before Congressional and other national committees, including on issues relating to foreign intelligence surveillance,[4][5] data mining,[6][7] biometrics,[8] and information warfare.[9] Taipale is a nationally recognized expert on technology and security policy, and related issues, including privacy and civil liberties. He is regularly quoted in the media,[10] and has appeared frequently on PBS and NPR.[11]

Taipale received a BA and JD from New York University and an MA, EdM, and LLM from Columbia University.

Selected publications

Book chapters

  • Introduction to Civil Liberties and Other Legal Issues, in The McGraw-Hill Homeland Security Handbook 2nd Edition (David Kamien, ed., McGraw-Hill, 2012) (ISBN 0071790845).
  • Cyber-Deterrence, in Law, Policy and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization (IGI Global 2011) (ISBN 1615208313).
  • Power to the Edge: New Threats, New Responses, in America's Security Role in a Changing World: A Global Strategic Assessment 2009 (National Defense University 2009) (ISBN 0160832128).
  • Why Can't We All Get Along? How Technology, Security and Privacy Can Co-exist in a Digital World, in Cybercrime and Digital Law Enforcement, Ex Machina: Law, Technology & Society Book Series, (Jack Balkin, et al., eds., NYU Press, 2007) (ISBN 0814799833).
  • Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties, in Emergent Information Technologies and Enabling Policies for Counter Terrorism (Robert Popp and John Yen, eds., Wiley-IEEE, 2006) (ISBN 0471776157).
  • Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Proceedings from Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle 2006).
  • Introduction to Domestic Security and Civil Liberties, in The McGraw-Hill Homeland Security Handbook (David Kamien, ed., McGraw-Hill, 2005) (ISBN 0071446656).

Journal articles and papers

Reports

Opinion


References

  1. Statement on Foreign Intelligence Surveillance Modernization Archived 2007-05-30 at the Wayback Machine, Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007, U.S. Senate (May 1, 2007).
  2. Testimony on Foreign Intelligence Surveillance Reform, House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives (Jul. 19, 2006).
  3. Testimony of Kim A. Taipale, Senate Committee on the Judiciary, Hearing on Privacy Implications of Government Data Mining Programs, U.S. Senate (Jan. 10, 2007).
  4. For example, see Artificial Intelligence and the Future of Work, TechTrends NPR (Oct. 18, 2017), How Pentagon tech push could take shape in next administration, Washington Examiner (Aug. 4, 2016), Pentagon Funding Start-ups to Aid Security, San Jose Mercury News (May 13, 2015), The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text The Intercept (May 5, 2015), Technology disrupting the American Dream The Washington Post (Jan. 19, 2015), How the CIA Grows Tech: An inside look at In-Q-Tel DefenseNews (Jun. 17, 2013). How In-Q-Tel Helps CIA Scout for Innovative Technologies - A Model for Other Agencies?, AOL Government (Nov. 29, 2012), The Rise of Black Market Data, Newsweek (Dec. 6, 2008), Freedom and its Digital Discontents, The Economist (Feb. 8, 2008), Listening to the Enemy, Wall Street Journal (Jan. 28, 2008), In Cyberwar There Are No Rules, Sueddeutsche Zeitung (Sept. 20, 2007), NSA Spying Part of Broader Effort, Washington Post (Aug. 1, 2007), Daylight Sought For Data Mining, Washington Post (Jan. 11, 2007), Experts Differ About Surveillance and Privacy, N. Y. Times (July 20, 2006), Balancing Privacy and Security, The Wall Street Journal (May 16, 2006), The Total Information Awareness Project Lives On, MIT Technology Review (Apr. 26, 2006), Internet devices threaten NSA’s ability to gather intelligence legally, National Journal (Apr. 8, 2006), Surveillance Society: The Experts Speak, Business Week (Aug. 8, 2005), and Brave New Era for Privacy Fight, Wired News (Jan. 17, 2005).

Share this article:

This article uses material from the Wikipedia article K._A._Taipale, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.