Counterterrorism and Privacy

URL: <>

Conference Report:

Conference Report: “National Security Law in a Changed World:The Fourteenth Annual Review of the Field," American Bar Association National Security Law Report, Vol. 27, No. 2 (Mar. 2005).

Presentation by:

Kim Taipale, CAS Executive Director, "Counterterrorism technology and privacy," [download presentation slides PDF]

Related Research: Trusted Systems Project

Background material:

K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123; 9 Int'l J. Comm. L. & Pol'y 8 (Dec. 2004)

K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]

K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 [9.4-introduction] in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005).

"Government Should Not Rush to Massive ID Surveillance System," CAS Executive Director said in a statement released at a conference in New York as part of the Global Information Society Project's Program on Law Enforcement and National Security in the Information Age, October 29, 2004. [more]


American Bar Association (ABA) Standing Committee on Law and National Security

Center for National Security Law at the University of Virginia School of Law

Center on Law, Ethics, and National Security at Duke University School of Law