Conference Report: “National Security Law in a Changed World:The Fourteenth Annual Review of the Field," American Bar Association National Security Law Report, Vol. 27, No. 2 (Mar. 2005).
Related Research: Trusted Systems Project
K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123; 9 Int'l J. Comm. L. & Pol'y 8 (Dec. 2004)
K. A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," 5 Colum. Sci. & Tech. L. Rev. 2 (Dec. 2003) [executive summary PDF]
K. A. Taipale, "Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties," Chapter 9.4 [9.4-introduction] in "Emergent Information Technologies and Enabling Policies for Counter Terrorism" (Robert Popp and John Yen, eds., IEEE Press, forthcoming 2005).
"Government Should Not Rush to Massive ID Surveillance System," CAS Executive Director said in a statement released at a conference in New York as part of the Global Information Society Project's Program on Law Enforcement and National Security in the Information Age, October 29, 2004. [more]
Center for National Security Law at the University of Virginia School of Law
Center on Law, Ethics, and National Security at Duke University School of Law