The Abolishment of the Right to Privacy?
The USA, Mass Surveillance and the Spiral Model- Autor:innen:
- Reihe:
- Tectum - Masterarbeiten
- Verlag:
- 05.02.2018
Zusammenfassung
This book aims to explain the US violation of the human right to privacy unveiled by Edward Snowden with a newly developed comprehensive spiral model. After analyzing the social and juridical roots of the norm of privacy, it portrays the countering of privacy by the security norm in the US public debate and the US policy from the 1930s to 2013. On the basis of this case study the author refines the spiral model invented by Risse et al. Finally, the book explores the reaction of several actors following the Snowden disclosures and analyzes the tools these actors have used to influence the behavior of the USA. Thereby the author examines if the US reactions to the Snowden disclosures since 2013 follow the heuristic approach of the spiral model.
Publikation durchsuchen
Bibliographische Angaben
- Copyrightjahr
- 2018
- Erscheinungsdatum
- 05.02.2018
- ISBN-Print
- 978-3-8288-4034-8
- ISBN-Online
- 978-3-8288-6750-5
- Verlag
- Tectum, Baden-Baden
- Reihe
- Tectum - Masterarbeiten
- Sprache
- Deutsch
- Seiten
- 162
- Produkttyp
- Monographie
Inhaltsverzeichnis
- Titelei/Inhaltsverzeichnis Teilzugriff Seiten I - VIII Download Kapitel (PDF)
- 1. Introduction Kein Zugriff Seiten 1 - 6
- 2. The Spiral Model Kein Zugriff Seiten 7 - 12
- 3.1. Privacy as Social Norm Kein Zugriff
- 3.2. Privacy as Juridical Norm Kein Zugriff
- 3.3. Privacy as International Norm Kein Zugriff
- 3.4. Cultural Differences: the USA and the EU Kein Zugriff
- 4.1. Surveillance, Security and Privacy Kein Zugriff
- 4.2. From Roosevelt to the Church Committee Kein Zugriff
- 4.3. From Reagan to 9/11 Kein Zugriff
- 4.4. After 9/11 Kein Zugriff
- 4.5. Foreign Surveillance Kein Zugriff
- 4.6. The USA and a Comprehensive Spiral Model Kein Zugriff
- 5.1. Liberal states Kein Zugriff
- 5.2.1. United Nations Kein Zugriff
- 5.2.2. European Union Kein Zugriff
- 5.2.3. Council of Europe Kein Zugriff
- 5.3. (International) Non-Governmental Organizations: Amnesty International Kein Zugriff
- 6. The US Response: Does the Spiral Model Work? Kein Zugriff Seiten 129 - 136
- 7. Conclusion: Privacy – a Dead Norm? Kein Zugriff Seiten 137 - 142
- Bibliography Kein Zugriff Seiten 143 - 162
Literaturverzeichnis (249 Einträge)
Es wurden keine Treffer gefunden. Versuchen Sie einen anderen Begriff.
- Bibliography Google Scholar öffnen
- Abu-Laban, Yasmeen (2014): The politics of surveillance. Civil liberties, human rights and ethics, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 420�427. Google Scholar öffnen
- Adler, David Gray (2008): George Bush, the unitary executive and the Constitution, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 99�119. Google Scholar öffnen
- Agamben, Giorgio (2015): Die Geburt des Sicherheitsstaats, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 7�9. Google Scholar öffnen
- Aid, Mattew (2009): The Secret Sentry. The Untold History of the National Security Agency, New York: Bloomsbury Press. Google Scholar öffnen
- Aiken, Katherine (2008): Senator Church and his constituents, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 76�95. Google Scholar öffnen
- Altmann, Irwin (1977): Privacy Regulation: Culturally Universal or Culturally Specific?, in: Journal of Social Issues, Vol. 33, No. 3, pp. 66�84. Google Scholar öffnen
- American Civil Liberties Union (2015): ACLU V. Clapper � Challenge to NSA Mass Call-Tracking Program, available at: https://www.aclu.org/cases/aclu-v-clapper-challenge-nsa-mass-call-tracking-program [accessed: 05/25/2016]. Google Scholar öffnen
- American Civil Liberties Union (2001): In Defence of Freedom in a Time of Crisis, available at: https://www.aclu.org/defense-freedom-time-crisis [accessed: 04/19/16]. Google Scholar öffnen
- American Civil Liberties Union (n.d.): Court battles, available at: https://www.aclu.org/defending-our-rights/court-battles?topics=132 [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (2016a): Amnesty International Report 2015/16. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (2016b): Amnesty International State of the World 2015�2016, available at: http://www.amnestyusa.org/research/reports/amnesty-international-state-of-the-world-2015-2016?page=show [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (2015a): Global opposition to USA big brother mass surveillance, 03/18/2015, available at: https://www.amnesty.org/en/latest/news/2015/03/global-opposition-to-usa-big-brother-mass-surveillance/ [accessed: 05/34/2016]. Google Scholar öffnen
- Amnesty International (2015b): Global Surveillance Operations and the Risk to Human Rights, 06/06/2015, available at: http://www.amnestyusa.org/pdfs/AIUSA_GlobalSurveillanceBoardLetter_20150606.pdf [accessed: 05/24/2016]. Google Scholar öffnen
- Amnesty International (2015c): Amnesty International Report 2014/15. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (2014): New tool for spy victims to detect government surveillance, 11/20/2014, available at: https://www.amnesty.org/en/latest/news/2014/11/new-tool-spy-victims-detect-government-surveillance/ [accessed: 05/24/2016]. Google Scholar öffnen
- Amnesty International (2013): The US NSA and the UK GCHQ want to listen in on all: Time for the Human Rights Council to discuss their activities: Amnesty International written statement to the 24th session of the UN Human RightsCouncil (9 to 27 September 2013), 08/29/2013, AI index: IOR 41/018/2013. Google Scholar öffnen
- Amnesty International (n.d.a): Stand Up For Our Rights Online!, available at: http://act.amnestyusa.org/ea-action/action?ea.client.id=1839&ea.campaign.id=36747 [accessed: 05/24/2016]. Google Scholar öffnen
- Amnesty International (n.d.b): Does your country share your data with the USA?, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/does-your-country-share-your-data-with-the-usa/ [accessed: 05/24/2016]. Google Scholar öffnen
- Amnesty International (n.d.c): Human Rights and National Security, available at: http://www.amnestyusa.org/our-work/issues/security-and-human-rights [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (n.d.d): Suchbegriffe, available at: http://www.amnesty.de/suche?words-advanced=Folter&search.x=0&search.y=0&search=Suchen&country=&topic=&node_type=ai_journal_story&from_month=6&from_year=2013&to_month=4&to_year=2016&sort_type=desc&page_limit=10&form_id=ai_search_form#resultlist [accessed: 05/25/2016]. Google Scholar öffnen
- Amnesty International (n.d.e): Brosch�ren, available at: https://www.amnesty.de/2010/9/26/broschueren?destination=node%2F16659 [accessed: 05/25/2016] Google Scholar öffnen
- Amnesty Internaional et al. (n.d.): Reset the net, available at: https://www.resetthenet.org [accessed: 05/24/2016]. Google Scholar öffnen
- Amnesty International/Privacy International (2015): Two years after Snowden, available at: https://www.amnesty.org/en/documents/act30/1795/2015/en/ [accessed: 05/25/2016]. Google Scholar öffnen
- Ashby, LeRoy (2008): The Church Committee�s history and relevance. Reflecting on Senator Church, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 57�75. Google Scholar öffnen
- Atkinson, L. Rush (2015): Regulating the Surveillance State, Upstream and Down: A Law & Economics Approach to the Intelligence Framework and Proposed Reforms, in: Stanford Journal of International Law, Vol. 51, No.1, pp. 1�18. Google Scholar öffnen
- Bamford, James (2009): The Shadow Factory. The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Anchor Books. Google Scholar öffnen
- Beaumont, Ben (2015a): Edward Snowden: �I should have come forward sooner,� 06/04/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/edward-snowden-i-should-have-come-forward-sooner/ [accessed: 05/24/2016]. Google Scholar öffnen
- Beaumont, Ben (2015b): 7 reasons why �I�ve got nothing to hide� is the wrong response to mass surveillance, 04/29/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [accessed: 05/24/2016]. Google Scholar öffnen
- Beck, Ulrich (1986): Risikogesellschaft. Auf dem Weg in eine andere Moderne, Frankfurt a.M.: Suhrkamp Google Scholar öffnen
- Bedan, Matt (2007): Echelon�s Effect: The Obsolescence of the US Foreign Intelligence Legal Regime, in: Federal Communications Law Journal, Vol. 59, No. 2, pp. 425�444. Google Scholar öffnen
- Bennett, Colin (2014): Privacy advocates, privacy advocacy and the surveillance society, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 412�419. Google Scholar öffnen
- Bennett, Colin (2011): Storming the Barricades so We Can All Be Private Together: Everyday Surveillance and the Politics of Privacy Advocacy, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: Springer VS Verlag, pp. 299�320. Google Scholar öffnen
- Bennett, Colin (1992): Regulating Privacy. Data Protection and Public Policy in Europe and the United States, Ithaca: Cornell University Press. Google Scholar öffnen
- Biermann, Kai (2017a): Was der NSA-Ausschuss erreicht hat und was nicht, in: Zeit online, 06/28/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/ueberwachungsaffaere-nsa-untersuchungsausschuss-abschlussbericht-faq/komplettansicht [accessed: 09/05/2017]. Google Scholar öffnen
- Biermann, Kai (2017b): Opposition wirft Regierung L�ge vor, in: Zeit online, 06/19/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/nsa-untersuchungsausschuss-bnd-abschlussbericht-opposition [accessed: 09/05/2017]. Google Scholar öffnen
- Biermann, Kai (2017c): Selbstherrliche �berwachung soll Gesetz werden, in: Zeit online, 06/07/2017, available at: http://www.zeit.de/politik/deutschland/2016-06/nsa-bnd-verfassungsschutz-ueberwachung-gesetz-entwurf/komplettansicht [accessed: 09/05/2017]. Google Scholar öffnen
- Blum, Stephanie Cooper (2009): What Really is at Stake with the FISA Amendments Act of 2008 and Ideas for Future Surveillance Reform, in: Boston University Public Interest Law Journal, Vol. 2, pp. 269�314. Google Scholar öffnen
- Bogart, William (2014): Simulation and post-panopticism, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 30�37. Google Scholar öffnen
- Boghosian, Heidi (2013): Spying on Democracy. Government Surveillance, Corporate Power, and Public Resistance, San Francisco: City Lights Books. Google Scholar öffnen
- Brivot, Marion/Yves Gendron (2011): Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting, in: Accounting, Organizations and Society, Vol. 36, No. 3, pp. 135�155. Google Scholar öffnen
- Brown, Ian/Morton Halperin/Ben Hayes et al. (2017): Toward Multilateral Standards for Foreign Surveillance Reform, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 461�491. Google Scholar öffnen
- Brown, Ian (2013): Anforderung an die Erm�chtigung zur rechtm��igen Abh�rung, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckedahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 206�213. Google Scholar öffnen
- Buckley, John (2014): Managing Intelligence. A Guide to Law Enforcement Professionals, Boca Raton: CRC Press. Google Scholar öffnen
- Bunz, Mercedes: Vom Speicher zum Verteiler. Die Geschichte des Internet, Berlin: Kadmos. Google Scholar öffnen
- Bygrave, Lee A. (2010): Privacy and Data Protection in an International Perspective, in: Scandinavian Studies in Law, Vol. 56, pp. 165�200. Google Scholar öffnen
- Cate, Fred H. (2015): Edward Snowden and the NSA: Law, Policy, and Politics, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 26�44. Google Scholar öffnen
- Ceyhan, Ayse (2014): Surveillance as biopower, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 38�45. Google Scholar öffnen
- Chaos Computer Club (n.d.): Chaos Computer Club, available at: https://www.ccc.de/en/home [accessed: 01/20/2016]. Google Scholar öffnen
- Chesterman, Simon (2011): One Nation Under Surveillance. A New Social Contract to Defend Freedom Without Sacrificing Liberty, Oxford: Oxford University Press. Google Scholar öffnen
- Chinese National Ministry of Defense (2014): Statement on U.S. Indictment of Chinese Military Officers, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, p. 165. Google Scholar öffnen
- Christie, George (1972): Government Surveillance and Individual Freedom: A Proposed Statutory Response to Laird vs. Tatum and the Broader Problem of Government Surveillance of the Individual, in: New York University Law Review, Vol. 47, pp. 871�902. Google Scholar öffnen
- Clarke, Roger (1988): Information Technology and Dataveillance, in: Communications of the Association for Computing Machinery, Vol. 31, No. 5, pp. 498�512. Google Scholar öffnen
- Cohn, Cindy/Rainey Reitman (2015): USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here, 06/02/2015, available at: https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here [accessed: 05/29/2016]. Google Scholar öffnen
- Cole, David (2003): The new McCathyism: Repeating History in the War on Terrorism, in: Harvard Civil Rights-Civil Liberties Law Journal, Vol. 38, No. 1, pp. 1�30. Google Scholar öffnen
- Commissioner of Human Rights (2016): Memorandum on surveillance and oversight mechanisms in the United Kingdom, 05/16/2016, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2919538&SecMode=1&DocId=2375752&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
- Commissioner of Human Rights (2015): Democratic and effective oversight of national security services, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2796355&SecMode=1&DocId=2286978&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
- Commissioner of Human Rights (2014): The rule of law on the Internet and in the wider digital world, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2734552&SecMode=1&DocId=2262340&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
- Commissioner of Human Rights (2008): Protecting the Right to Privacy in the Fight Against Terrorism, available at: https://wcd.coe.int/com.instranet.InstraServlet?Index=no&command=com.instranet.CmdBlobGet&InstranetImage=1416463&SecMode=1&DocId=1426260&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
- Connolly, Kate (2015): German secret service BND reduces cooperation with NSA, in: The Guardian, 05/07/2015, available at: http://www.theguardian.com/world/2015/may/07/german-secret-service-bnd-restricts-cooperation-nsa-us-online-surveillance-spy [accessed: 05/14/2016]. Google Scholar öffnen
- Conyers, John (2009): Reining in the Imperial Presidency. Lessons and Recommendations Relating to the Presidency of George W. Bush. House Committee on the Judiciary Majority Staff Report to Chairman John C. Conyers, Jr., New York: Skyhorse Publishing. Google Scholar öffnen
- Cope, Sophia (2016): House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform, 04/27/2016, available at: https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-setting-stage-vital-privacy-reform [accessed: 05/29/2016]. Google Scholar öffnen
- Council of Europe (2016a): Recommendation CM/Rec(2016)5[1] of the Committee of Ministers to member States on Internet freedom, 04/13/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016806415fa [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (2016b): Internet Governance � Council of Europe Strategy 2016�2019. Democracy, human rights and the rule of law in the digital world, 03/30/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016805c1b60 [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (2015a): Mass surveillance, Resolution 2045, 04/21/2015, available at: http://assembly.coe.int/nw/xml/XRef/Xref-XML2HTML-en.asp?fileid=21692&lang=en [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (2015b): Improving the protection of whistleblowers, Resolution 2060, 06/23/2015, available at: http://semantic-pace.net/tools/pdf.aspx?doc=aHR0cDovL2Fzc2VtYmx5LmNvZS5pbnQvbncveG1sL1hSZWYvWDJILURXLWV4dHIuYXNwP2ZpbGVpZD0yMTkzMSZsYW5nPUVO&xsl=aHR0cDovL3NlbWFudGljcGFjZS5uZXQvWHNsdC9QZGYvWFJlZi1XRC1BVC1YTUwyUERGLnhzbA==&xsltparams=ZmlsZWlkPTIxOTMx [accessed: 05/23/2015] Google Scholar öffnen
- Council of Europe (2013a): Council of Europe alerts governments on risks of digital tracking and surveillance, 06/12/2013, available at: https://go.coe.int/phA5g [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (2013b): Council of Europe ministerial conference calls for effective safeguards against electronic mass surveillance, 11/08/2013, available at: https://go.coe.int/bjrvF [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (2001): Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680080626 [accessed: 01/20/2016]. Google Scholar öffnen
- Council of Europe (1981): Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680078b37 [accessed: 01/19/2016]. Google Scholar öffnen
- Council of Europe (n.d.a): European Convention on Human Rights, available at: http://www.echr.coe.int/Documents/Convention_ENG.pdf [accessed: 01/19/2016]. Google Scholar öffnen
- Council of Europe (n.d.b): Ad Hoc Committee on Data Protection (CAHDATA), available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/Cahdata_en.asp [accessed: 05/23/2016]. Google Scholar öffnen
- Council of Europe (n.d.c): United States � Observer, available at: http://www.coe.int/en/web/portal/united-states [accessed: 05/23/2016]. Google Scholar öffnen
- Cullather, Nick (2015): Security and Liberty: The Imaginary Balance, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 19�25. Google Scholar öffnen
- Daase, Christopher/Tim Nicholas R�hlig (2016): Der Wandel der Sicherheitskultur nach 9/11, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 13�34. Google Scholar öffnen
- Der Spiegel (1971): EDV im Odenwald, No. 20, p. 88, available at: http://www.spiegel.de/spiegel/print/d-43176393.html [accessed: 01/26/2016]. Google Scholar öffnen
- Deutscher Bundestag (2017): Beschlussfassung und Bericht des 1. Untersuchungsausschusses nach Artikel 44 des Grundgesetzes, Vorabfassung, 06/23/2017, Drucksache 18/12850, available at: http://dip21.bundestag.de/dip21/btd/18/128/1812850.pdf [accessed: 09/05/2017]. Google Scholar öffnen
- Diffie, Whitfield/Susan Landau (2007): Privacy on the Line. The Politics of Wiretapping and Encryption, Massachusetts: MIT Press. Google Scholar öffnen
- Doherty, Thomas (2003): Cold War, Cool Medium. Television, McCarthyism, and American Culture, New York: Columbia University Press. Google Scholar öffnen
- Dycus, Stephen (2008): Domestic military intelligence activities, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 163�183. Google Scholar öffnen
- Electronic Frontier Foundation (n.d.a): About EFF, available at: https://www.eff.org/about [accessed: 02/20/2015]. Google Scholar öffnen
- Electronic Frontier Foundation (n.d.b): Timeline of NSA Domestic Spying, available at: https://www.eff.org/nsa-spying/timeline [accessed: 05/04/2016]. Google Scholar öffnen
- Electronic Frontier Foundation (n.d.c): All EFF�s legal cases, available at: https://www.eff.org/cases [accessed: 05/25/2016]. Google Scholar öffnen
- Electronic Privacy Information Center (n.d.): About EPIC, available at: https://epic.org/epic/about.html [accessed: 02/20/2015]. Google Scholar öffnen
- Elliff, John (1984): Attorney General�s Guidelines for FBI Investigations, in: Cornell Law Review, Vol. 69, No. 4, pp. 785�815. Google Scholar öffnen
- Elmer, Greg (2014): Panopticon � discipline � control, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 21�29. Google Scholar öffnen
- Enn�ckl, Daniel (2014): Der Schutz der Privatsph�re in der elektronischen Datenverarbeitung, Wien: Verlag �sterreich. Google Scholar öffnen
- European Data Protection Supervisor (2016): EDPS starts work on a New Digital Ethics, 01/26/2016, Press Release No. EPDS/2016/05, available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2016/EDPS-2016-05-EDPS_Ethics_Advisory_Group_EN.pdf [accessed: 05/20/2016]. Google Scholar öffnen
- European Data Protection Supervisor (n.d.): Ethics Advisory Group, available at: https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Ethics [accessed: 05/20/2016]. Google Scholar öffnen
- European Parliament (2014): European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� fundamental rights and on transatlantic cooperation in Justice and Home Affairs, 03/12/2014, EU Doc. P7_TA(2014)0230, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2014-0230+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Google Scholar öffnen
- European Parliament (2013): European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� privacy, 07/04/2013, EU Doc. P7_TA(2013)0322, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2013-0322+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Google Scholar öffnen
- European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 07/11/2001, EU Doc. A5-0264/2001, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//EN#_part5_def3 [accessed: 04/29/2016]. Google Scholar öffnen
- European Union (2016): Directive 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA, in: Official Journal of the European Union, L 119, 05/04/2016, pp. 0089�0131, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&rid=2 [accessed: 05/19/2016]. Google Scholar öffnen
- European Union (2012): Charter of Fundamental Rights of the European Union, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT [accessed: 01/21/2016]. Google Scholar öffnen
- European Union (1995): Directive 95/46/EC of the European Parliament and of the Google Scholar öffnen
- Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, in: Official Journal of the European Union, L 281, 11/23/1995, pp. 0031�0050, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML [accessed: 01/19/2016]. Google Scholar öffnen
- Fidler, David (ed.) (2015a): The Snowden Reader, Bloomington: Indiana University Press. Google Scholar öffnen
- Fidler, David (2015b): U.S. Foreign Policy and the Snowden Leaks, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 52�69. Google Scholar öffnen
- Finnemore, Martha/Kathryn Sikkink (1998): International Norm Dynamics and Political Change, in: International Organization, Vol. 53, No. 4, pp. 887�917. Google Scholar öffnen
- Foerstel, Herbert (2008): The Patriot Act. A Documentary and Reference Guide, Westport: Greenwood Press. Google Scholar öffnen
- Forsythe, David (2002): The United States and International Criminal Justice, in: Human Rights Quarterly, Vol. 24, No. 4, pp. 974�991. Google Scholar öffnen
- Gamson, William/David Meyer (1996): Framing Political Opportunity, in: Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings, Dough McAdam et al. (eds.), Cambridge: Cambridge University Press, pp. 275�290. Google Scholar öffnen
- Garstka, Hansj�rgen (2003): Informationelle Selbstbestimmung und Datenschutz. Das Recht auf Privatsph�re, in: B�rgerrechte im Netz, Christiane Schulzki-Haddouti (ed.), pp. 48�70. Google Scholar öffnen
- Gathmann, Florian (2013): Eklat um Evo Morales: Pr�sidentenjet verl�sst Wien nach Zw�lf-Stunden-Stopp, in: Spiegel Online, 07/03/2013, available at: http://www.spiegel.de/politik/ausland/morales-flugzeug-in-wien-gestoppt-snowden-nicht-an-bord-a-909146.html [accessed: 05/28/2016]. Google Scholar öffnen
- Gebauer, Matthias et al. (2013): Berlin Leaves Biggest NSA Questions Unanswered, in: Spiegel Online, 07/29/2013, available at: http://www.spiegel.de/international/world/german-government-responds-to-nsa-spying-and-data-collection-leaks-a-913635.html [accessed: 05/16/2016]. Google Scholar öffnen
- Gellman, Barton (2013): U.S. surveillance architecture includes collection of revealing Internet, phone metadata, in: The Washington Post, 06/16/2013, available at: https://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html [accessed: 05/04/2016]. Google Scholar öffnen
- Gellman, Barton/Laura Poitras (2013): U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, in: The Washington Post, 06/07/2013, available at: https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1 [accessed: 04/28/2016]. Google Scholar öffnen
- Gibbs, Samuel (2016): Data regulators reject EU-US Privacy Shield safe harbour deal, in: The Guardian, 04/14/2016, available at: https://www.theguardian.com/technology/2016/apr/14/data-regulators-reject-eu-us-privacy-shield-safe-harbour-deal [accessed: 05/19/2016]. Google Scholar öffnen
- Gibbs, Samuel (2015): What is �safe harbour� and why did the EUCJ just declare it invalid?, in: The Guardian, 10/06/2015, available at: https://www.theguardian.com/technology/2015/oct/06/safe-harbour-european-court-declare-invalid-data-protection [accessed: 05/19/2016]. Google Scholar öffnen
- Gill, Peter (2015): World Society under Surveillance, in: Global Trends: Prospects for World Society, Stiftung Entwicklung und Frieden (ed.), pp. 71�86. Google Scholar öffnen
- Gilliom, John/Torin Monahan (2014): Everyday resistance, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 405�411. Google Scholar öffnen
- Giugni, Marco (2009): Political Opportunities: From Tilly to Tilly, in: Swiss Political Science Review, Vol. 15, No. 2, pp. 361�368. Google Scholar öffnen
- Glancy, Dorothy (1979): The Invention of the Right to Privacy, in: Arizona Law Review, Vol. 21, No. 1, pp. 1�39. Google Scholar öffnen
- Glendon, Mary Ann (2002): A World Made New. Eleanor Roosevelt and the Universal Declaration of Human Rights, New York: Random House. Google Scholar öffnen
- Global Privacy Enforcement Network (n.d.): Action Plan for the Global Privacy Enforcement Network (GPEN), available at: https://www.privacyenforcement.net/about_the_network#action_plan [accessed: 01/20/2016]. Google Scholar öffnen
- Goos, Kerstin et al. (2015): The co-evolution of surveillance technologies and surveillance practices, in: Surveillance in Europe, David Wright/Reinhard Kreissl (ed.), New York: Routledge, pp. 51�100. Google Scholar öffnen
- Gorman, Siobhan/Evan Perez/Janet Hook (2013): U.S. Collects Vast Data Trove, in: The Wall Street Journal, 06/07/2013, available at: http://www.wsj.com/articles/SB10001424127887324299104578529112289298922 [accessed: 04/27/2016]. Google Scholar öffnen
- Greenberg, Andy (2017): Passing the Email Privacy Act Has Never Been More Urgent, in: Wired, 02/06/2017, available at: https://www.wired.com/2017/02/trump-power-email-privacy-act-never-urgent/ [accessed: 09/06/2017]. Google Scholar öffnen
- Greenberg, Andy (2014): These Are the Emails Snowden Sent to First Introduce His Epic NSA Leaks, in: Wired, 10/13/2014, available at: https://www.wired.com/2014/10/snowdens-first-emails-to-poitras/ [accessed: 05/28/2016]. Google Scholar öffnen
- Greenberg, Andy (2013): Watch Top US Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year, in: Forbes, 06/06/2013, available at: http://www.forbes.com/sites/andygreenberg/2013/06/06/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos/#6c8b4e1021d3 [accessed: 04/27/2016]. Google Scholar öffnen
- Greenberg, Ivan (2010): The Dangers of Dissent. The FBI and Civil Liberties since 1965, New York: Lexington. Google Scholar öffnen
- Greenlee, Michael (2008): National security letters and intelligence oversight, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 184�204. Google Scholar öffnen
- Greenwald, Glenn (2013a): NSA collecting phone records of millions of Verizon customers daily, in: The Guardian, 06/06/2013, available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [accessed: 04/27/2016]. Google Scholar öffnen
- Greenwald, Glenn (2013b): NSA collected US email records in bulk for more than two years under Obama, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama [accessed: 04/28/2016]. Google Scholar öffnen
- Greenwald, Glenn/Spancer Ackerman (2013): Now the NSA is still harvesting your online data, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection [accessed: 05/04/2016]. Google Scholar öffnen
- Haas, Michael (2014): International Human Rights. A Comprehensive Introduction, New York: Routledge. Google Scholar öffnen
- Hager, Nicky (2015): Wie die NSA in die Welt kam, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 10�17. Google Scholar öffnen
- Haggerty, Kevin/Richard Ericson (2000): The surveillant assemblage, in: British Journal of Sociology, Vol. 51, No. 4, pp. 605�622. Google Scholar öffnen
- Harper, Nick (2014): FISA�s Fuzzy Line between Domestic and International Terrorism, in: The University of Chicago Law Review, Vol. 81, No. 3, pp. 1123-1164. Google Scholar öffnen
- Harris, Shane (2010): The Watchers. The Rise of America�s Surveillance State, New York: Penguin Press. Google Scholar öffnen
- Hart, Gary (2008): Liberty and security, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 13�21. Google Scholar öffnen
- Hegemann, Hendrik/Martin Kahl (2016): Konstruktionen und Vorstellungen von Wirksamkeit in der Antiterror-Politik: Eine kritische Betrachtung, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 189�207. Google Scholar öffnen
- Hei�ler, Julian (2017): Ein bisschen Aussp�hen unter Freunden, in: tagesschau.de, 10/21/2017, available at: https://www.tagesschau.de/inland/bnd-gesetz-reform-103.html [accessed: 09/05/2017]. Google Scholar öffnen
- Heller, Regina/Martin Kahl/Daniela Pisoiu (2012): The �dark� side of normative argumentation � The case of counterterrorism policy, in: Global Constitutionalism, Vol. 1, No. 2, pp. 278�312. Google Scholar öffnen
- Hempel, Leon/Susanne Krasmann/Ulrich B�ckling (2011): Sichtbarkeitsregime: Eine Einleitung, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 7�24. Google Scholar öffnen
- Holt, Jennifer/Steven Malcic (2015): The Privacy Ecosystem. Regulating Digital Identity in the United States and European Union, in: Journal of Information Policy, Vol. 5, pp. 155�178. Google Scholar öffnen
- Horowitz, Sarah (2017): Foucault�s Panopticon. A Model for NSA Surveillance?, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 39�62. Google Scholar öffnen
- Jansen, Jonas (2015): So k�nnen Sie nachpr�fen, ob Sie ausgesp�ht wurden, in: Frankfurter Allgemeine Zeitung, 02/19/2015, available at: http://www.faz.net/aktuell/feuilleton/debatten/privacy-international-zeigt-ueberwachung-durch-gchq-13437376.html [accessed: 02/20/2015]. Google Scholar öffnen
- Johnson, Brittany May (2016): Foreign National�s Privacy Interests Under U.S. Foreign Intelligence Law, in: Texas International Law Journal, Vol. 51, No. 2, pp. 229�257. Google Scholar öffnen
- Johnson, Loch (2008): Establishment of modern intelligence accountability, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 37�56. Google Scholar öffnen
- Kammerer, Dietmar (2015): Absolut unamerikanisch. Die schleichende Enteignung der Privatsph�re in den USA, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 28�32. Google Scholar öffnen
- Katzenstein, Peter (1996): The Culture of National Security. Norms and Identity in World Politics, New York: Columbia University Press. Google Scholar öffnen
- Keck, Margaret/Kathryn Sikkink (1998): Activists beyond Borders. Advocacy Networks in International Politics, Ithaca: Cornell University Press. Google Scholar öffnen
- Kerr, Orin (2001): The Fourth Amendment in Cyberspace: Can Encryption Create a �Reasonable Expectation to Privacy?�, in: Connecticut Law Review, Vol. 33, No. 503, pp. 503�533. Google Scholar öffnen
- Kietz, Daniela/Johannes Thimm (2013): Zwischen �berwachung und Aufkl�rung. Die amerikanische Debatte und die europ�ische Reaktion auf die Praxis der NSA, SWP-Aktuell, No. 51. Google Scholar öffnen
- Kittlitz, Alard von (2010): Der Traum von einem idealen Leben, in: Frankfurter Allgemeine Zeitung, 08/06/2010, available at: http://www.faz.net/aktuell/feuilleton/debatten/digitales-denken/ende-der-privatsphaere-der-traum-von-einem-idealen-leben-11026194.html [accessed: 06/09/2016]. Google Scholar öffnen
- Krasmann, Susanne (2011): Der Pr�ventionsstaat im Einvernehmen. Wie Sichtbarkeitsregime stillschweigend Akzeptanz produzieren, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 53�70. Google Scholar öffnen
- Krieger, Wolfgang (2014): Geschichte der Geheimdienste. Von den Pharaonen bis zur NSA, M�nchen: C.H. Beck. Google Scholar öffnen
- Kurz, Constanze (2016): Wir erkl�ren den Cyber War f�r er�ffnet, in: Frankfurter Allgemeine Zeitung, 03/07/16, available at: http://www.faz.net/aktuell/feuilleton/aus-dem-maschinenraum/amerika-erklaert-dem-is-den-ersten-cyberwar-14109024.html [accessed: 04/18/16]. Google Scholar öffnen
- Lee, Newton (2015): Counterterrorism and Cybersecurity. Total Information Awareness, Heidelberg: Springer. Google Scholar öffnen
- Liese, Andrea (2009): Exceptional Necessity. How Liberal Democracies Contest the Prohibition of Torture and Ill-Treatment when Countering Terrorism, in: Journal of International Law and International Relations, Vol. 5, No. 1, pp. 17�47. Google Scholar öffnen
- Liptak, Adam (2013): Justices Turn Back Challenge to Broader US Eavesdropping, in: The New York Times, 02/26/2013, available at: http://www.nytimes.com/2013/02/27/us/politics/supreme-court-rejects-challenge-to-fisa-surveillance-law.html?_r=0 [accessed: 05/24/2016]. Google Scholar öffnen
- Lynch, Andrew/Nicola McGarrity/George Williams (2010): The emergence of a �culture of control,� in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 3�9. Google Scholar öffnen
- Lyon, David (2015): Surveillance after Snowden, Cambridge: Polity. Lyon, David/Kevin Haggerty/Kristie Ball (2014): Introducing surveillance studies, Google Scholar öffnen
- in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 1�11. Google Scholar öffnen
- MacAskill, Ewen (2015): The NSA�s bulk metadata collection authority just expired. What now?, in: The Guardian, 11/28/2015, available at: http://www.theguardian.com/us-news/2015/nov/28/nsa-bulk-metadata-collection-expires-usa-freedom-act [accessed: 05/29/2016]. Google Scholar öffnen
- Mason, Alpheus Thomas (1946): Brandeis. A free man�s life, New York: Viking Press. Google Scholar öffnen
- McCullagh, Declan (2006): FBI taps cell phone mic as eavesdropping tool, available at: http://www.cnet.com/news/fbi-taps-cell-phone-mic-as-eavesdropping-tool/ [accessed: 04/16/16]. Google Scholar öffnen
- McCulloch, Jude/Sharon Pickering (2010): Counter-terrorism. The law and policing of pre-emption, in: in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 13�29. Google Scholar öffnen
- McGarrity, Nicola/George Williams (2010): When extraordinary measures become normal. Pre-emption in counter-terrorism and other laws, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 131�149. Google Scholar öffnen
- McKeown, Ryder (2009): Norm Regress: US Revisionism and the Slow Death of the Torture Norm, in: International Relations, Vol. 23, No. 1, pp. 5�25. Google Scholar öffnen
- Meister, Andre (2013): Vorratsdatenspeicherung: Warum Verbindungsdaten noch aussagekr�ftiger sind als Kommunikationsinhalte, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 229�233. Google Scholar öffnen
- Miller, Russel (2017): A Rose by any Other Name? The Comparative Law of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 63�94. Google Scholar öffnen
- Mills, Jon L. (2015): The Future of Privacy in the Surveillance Age, in: After Snowden. Privacy, Secrecy, and Security in the Information Age, Ronald Goldfarb (ed.), New York: St. Martin�s Press, pp. 191�260. Google Scholar öffnen
- Moechel, Erich (2013): Was Metadaten der NSA verraten, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 241�244. Google Scholar öffnen
- Montgomery, Bruce (2008): The Bush-Cheney Administration�s Assault on Open Government, Westport: Praeger. Google Scholar öffnen
- Mui�nieks, Nils (2015): Europe is spying on you, in: The New York Times, 10/27/2015, available at: http://www.nytimes.com/2015/10/28/opinion/europe-is-spying-on-you-mass-surveillance.html?_r=0 [accessed: 05/23/2015]. Google Scholar öffnen
- Mui�nieks, Nils (2013): Prism: secret surveillance could destroy democracy rather than defend it, in: The Guardian, 06/26/2013, available at: http://www.coe.int/en/web/commissioner/-/prism-secret-surveillance-could-destroy-democracy-rather-than-defend-it [accessed: 05/23/2016]. Google Scholar öffnen
- Nakashima, Ellen/Jobby Warrick (2013): For NSA chief, terrorist threat drives passion to �collect it all�, in: The Washington Post, 07/14/2013, available at: https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html [accessed: 06/08/2016]. Google Scholar öffnen
- Newell, Jim (2013): Thousands gather in Washington for anti-NSA �Stop Watching Us� rally, in: The Guardian, 10/26/2013, available at: http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden [accessed: 06/08/2016]. Google Scholar öffnen
- Nielsen, Richard/Beth Simmons (2015): Rewards for Ratification: Payoffs for Participating in the International Human Rights Regime?, in: International Studies Quarterly, Vol. 59, No. 2, pp. 197�208. Google Scholar öffnen
- Nissenbaum, Helen (2010): Privacy in Context. Technology, Policy, and the Integrity of Social Life, Stanford: Stanford University Press. Google Scholar öffnen
- Nyst, Carly/Tomaso Falchetta (2017): The Right to Privacy in the Digital Age, in: Journal of Human Rights Practice, Vol. 9, No. 1, pp. 104�118. Google Scholar öffnen
- Obama, Barack (2014): Remarks on Review of Signals Intelligence, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 318�330. Google Scholar öffnen
- O�Connel, Mary Ellen (2012): Cyber Security without Cyber War, in: Journal of Conflict and Security Law, Vol. 17, No. 2, pp. 187�209. Google Scholar öffnen
- On the Issue (n.d.): George W. Bush on Technology, available at: http://www.ontheissues.org/Celeb/George_W__Bush_Infrastructure.htm [accessed: 05/03/2016]. Google Scholar öffnen
- Opitz, Sven/Ute Tellmann (2011): Katastrophale Szenarien: Gegenw�rtige Zukunft in �konomie und Recht, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 27�52. Google Scholar öffnen
- Organization for Economic Co-Operation and Development (2013): The OECD Privacy Framework, available at: http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf [accessed: 01/20/2016]. Google Scholar öffnen
- Organization for Economic Co-Operation and Development (1997): Recommendation of the Council concerning guidelines for cryptography policy, available at: http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=C(97)62/FINAL&docLanguage=En [accessed: 01/20/2016]. Google Scholar öffnen
- Organization for Economic Co-Operation and Development (1980): OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at: http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm [accessed: 01/18/2016]. Google Scholar öffnen
- Panke, Diana/Ulrich Petersohn (2016): Norm challenges and norm death: The inexplicable?, in: Cooperation and Conflict, Vol. 51, No. 1, pp. 3�19. Google Scholar öffnen
- Peters, Anne (2017): Privacy, Rechtsstaatlichkeit, and the Legal Limits on Extraterritorial Surveillance, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 145�179. Google Scholar öffnen
- P�schl, Magdalena (2015): Sicherung grund- und menschenrechtlicher Standards gegen�ber neuen Gef�hrdungen durch private und ausl�ndische Akteure, in: �ffnung der �ffentlich-rechtlichen Methode durch Internationalit�t und Interdisziplinarit�t: Erscheinungsformen, Chancen, Grenzen ; Referate und Diskussionen auf der Tagung der Vereinigung der Deutschen Staatsrechtslehrer in D�sseldorf vom 1. bis 4. Oktober 2014, Hans Christian R�hl et al. (eds.), Berlin: de Gruyter, pp. 405�452. Google Scholar öffnen
- Prosser, William (1960): Privacy, in: California Law Review, Vol. 48, No. 3, pp. 383�423. Google Scholar öffnen
- Reagan, Priscilla M. (2014): Regulating surveillance technologies. Institutional arrangements, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 397-404. Google Scholar öffnen
- Rebinger, Simon (2017): Datensch�tzer r�tseln: Schafft Trump Datenschutz-Abkommen zwischen USA und EU ab?, 01/27/2017, available at: https://netzpolitik.org/2017/datenschuetzer-raetseln-schafft-trump-datenschutz-abkommen-zwischen-usa-und-eu-ab/ [accessed: 09/07/2017]. Google Scholar öffnen
- Reilly, Mollie (2013): Obama Defends NSA Surveillance Program, Says It�s �Transparent,� in: The Huffington Post, 06/18/2013, available at: http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html [accessed: 05/28/2016]. Google Scholar öffnen
- Restore the Fourth (2015): Who we are, 12/05/2015, available at: https://restorethe4th.com/who-we-are/ [accessed: 06/08/2016]. Google Scholar öffnen
- Risen, James (2013): Snowden Says He Took No Secret Files to Russia, in: The New York Times, 10/17/2013, available at: http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-to-russia.html?_r=0&mtrref=undefined&gwh=8BB37884F4339E8D704EFD583EF66B2E&gwt=pay [accessed: 05/28/2016]. Google Scholar öffnen
- Risen, James/Eric Lichtblau (2005): Bush Lets US Spy on Callers Without Courts, in: The New York Times, 12/16/2005, available at: http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html [accessed: 05/04/2016]. Google Scholar öffnen
- Risse, Thomas et al. (eds.) (2013): The Persistent Power of Human Rights. From Commitment to Compliance, New York: Cambridge University Press. Google Scholar öffnen
- Risse, Thomas et al. (eds.) (1999): The Power of Human Rights. International Norms and Domestic Change, New York: Cambridge University Press. Google Scholar öffnen
- R�ssler, Beate (2001): Der Wert des Privaten, Frankfurt a.M.: Suhrkamp. Google Scholar öffnen
- Roth, Anna-Lena/Florian Gathmann (2013): Merkel zur Handy-Aff�re: �Aussp�hen unter Freunden � das geht gar nicht�, in: Spiegel Online, 10/24/2013, available at: http://www.spiegel.de/politik/deutschland/handy-spaehaffaere-um-merkel-regierung-ueberprueft-alle-nsa-erklaerungen-a-929843.html [accessed: 05/20/2016]. Google Scholar öffnen
- Rouseff, Dilma (2013): Statement to United Nations General Assembly, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 158�159. Google Scholar öffnen
- Rudl, Thomas (2016): EU-US-Datenschutzschild: Irische Datensch�tzer reichen Nichtigkeitsklage ein, 10/27/2016, available at: https://netzpolitik.org/2016/eu-us-datenschutzschild-irische-datenschuetzer-reichen-nichtigkeitsklage-ein/ [accessed: 09/07/2017]. Google Scholar öffnen
- Rudl, Thomas (2015): Snowden-Dokumente best�tigen Echelon-Programm: R�ckschau auf 40 Jahre Aufdeckungsarbeit, 08/06/2015, available at: https://netzpolitik.org/2015/snowden-dokumente-bestaetigen-echelon-programm-rueckschau-auf-40-jahre-aufdeckungsarbeit/ [accessed: 04/29/2016]. Google Scholar öffnen
- Ruhmann, Ingo (2014): NSA, IT-Sicherheit und die Folgen, in: Datenschutz und Datensicherheit, No. 1/2014, pp. 40�46. Google Scholar öffnen
- Rule, James (2014): �Needs� for surveillance and the movement to privacy, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 64�71. Google Scholar öffnen
- Sales, Allice (2015): Brazil Shows How Not to Respond to Snowden Revelations, in: Panam Post, 02/24/2015, available at: https://panampost.com/alice-salles/2015/02/24/brazil-shows-how-not-to-respond-to-snowden-revelations/ [accessed: 05/15/2016]. Google Scholar öffnen
- Schaar, Peter (2013): Welche Konsequenzen haben PRISM und Tempora f�r den Datenschutz in Deutschland und Europa?, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 118�127. Google Scholar öffnen
- Schariatmadari, David (2015): Privacy is starting to seem like a very 20th-century anomaly, in: The Guardian, 11/07/2015, available at: http://www.theguardian.com/commentisfree/2015/nov/07/privacy-seems-20th-century-aberration-but-worth-mourning [accessed: 01/26/2016]. Google Scholar öffnen
- Scheer, Ursula (2015): Haben die Amerikaner den Deutschen gedroht?, in: Frankfurter Allgemeine Zeitung, 03/20/2015, available at: http://www.faz.net/aktuell/feuilleton/medien/geheimdienste-und-snowden-gabriel-verraet-greenwald-ein-geheimnis-13496416.html [accessed: 05/28/2016]. Google Scholar öffnen
- Schiedermair, Stephanie (2012): Der Schutz des Privaten als internationales Grundrecht, T�bingen: Mohr Siebeck. Google Scholar öffnen
- Schmale, Wolfgang/Marie-Theres Tinnefeld (2014): Privatheit im digitalen Zeitalter, Wien: B�hlau. Google Scholar öffnen
- Schneider, Jens-Peter (2017): Developments in European Data Protection Law in the Shadow of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 539�563. Google Scholar öffnen
- Schrecker, Ellen (2002): The Age of McCarthyism. A Brief History with Documents, New York: Bedford/St. Martin�s. Google Scholar öffnen
- Schrecker, Ellen (1998): Many are the Crimes. McCarthyism in America, Princeton: Princeton University Press. Google Scholar öffnen
- Schwartz, Paul (2013): The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, in: Harvard Law Review, Vol. 126, pp. 1967�2009. Google Scholar öffnen
- Schwarz, Frederick (2008): The Church Committee, then and now, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 22�36. Google Scholar öffnen
- Schweidler, Walter (2014): Der gute Staat. Politische Ethik von Platon bis zur Gegenwart, Wiesbaden: Springer VS. Google Scholar öffnen
- Scott, Mark (2016): U.S. and Europe in �Safe Harbor� Data Deal, but Legal Fight May Await, in: The New York Times, 02/02/2016, available at: http://www.nytimes.com/2016/02/03/technology/us-europe-safe-harbor-data-deal.html?_r=0 [accessed: 05/19/2016]. Google Scholar öffnen
- Shance, Scott (2013): No Morsel Too Minuscule for All-Consuming N.S.A., in: The New York Times, 11/02/2013, available at: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=1&_r=1 [accessed: 05/20/2016]. Google Scholar öffnen
- Shapiro, Ari (2013): How Obama's Response To NSA Spying Has Evolved, in: NPR, 11/13/2013, available at: http://www.npr.org/sections/itsallpolitics/2013/11/13/245037300/how-obamas-response-to-nsa-spying-has-evolved [accessed: 05/28/2016]. Google Scholar öffnen
- Sikkink, Kathryn (2013): The United States and torture: does the spiral model work?, in: The Persistent Power of Human Rights. From Commitment to Compliance, Thomas Risse et al. (eds.), New York: Cambridge University Press, pp. 145�163. Google Scholar öffnen
- Smale, Alison (2015): Germany, Too, Is Accused of Spying on Friends, in: The New York Times, 05/05/2015, available at: http://www.nytimes.com/2015/05/06/world/europe/scandal-over-spying-shakes-german-government.html?_r=0 [accessed: 05/16/2016]. Google Scholar öffnen
- Solove, Daniel/Paul Schwartz (2009): Privacy, Information and Technology, New York: Wolters Kluwer. Google Scholar öffnen
- Solove, Daniel (2008): Understanding privacy, Cambridge: Harvard University Press. Google Scholar öffnen
- Solove, Daniel (2002): Conceptualizing Privacy, in: California Law Review, Vol. 90, No.4, pp. 1087�1155. Google Scholar öffnen
- Sprenger, Florian (2015): Politik der Mikroentscheidungen: Edward Snowden, Netzneutralit�t und die Architektur des Internets, L�neburg: meson press. Google Scholar öffnen
- Stratford, Jean Slemmons/Juri Stratford (1998): Data Protection and Privacy in the United States and Europe, in: IASSIST Quarterly, Fall edition, pp. 17�20. Google Scholar öffnen
- Theoharis, Athan (2011): Abuse of Power. How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11, Philadelphia: Temple University Press. Google Scholar öffnen
- The White House (2014): Presidential Policy Directive � Signals Intelligence Activities. Presidential Policy Directive/PPD-28, available at: https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-intelligence-activities [accessed: 06/09/2016]. Google Scholar öffnen
- The White House (2002): President Bush Delivers Graduation Speech at West Point, available at: http://georgewbush-whitehouse.archives.gov/news/releases/2002/06/20020601-3.html [accessed: 04/28/2016]. Google Scholar öffnen
- Tilly, Charles (1978): From Mobilization to Revolution, Reading: Addison-Wesley Publishing. Google Scholar öffnen
- United Nations (n.d.): Charter of the United Nations, available at: http://www.un.org/en/sections/un-charter/chapter-i/index.html [accessed: 06/12/2016]. Google Scholar öffnen
- United Nations General Assembly (2016): Report of the Special Rapporteur on the right to privacy, UN Doc. A/71/368, distributed on 08/30/2016, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/71/368 [accessed: 09/05/2017]. Google Scholar öffnen
- United Nations General Assembly (2014): Promotion and protection of human rights and fundamental freedoms while countering terrorism. Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, UN Doc. A/69/397, distributed on 09/23/2014, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/69/397 [accessed: 05/17/2016]. Google Scholar öffnen
- United Nations General Assembly (2013): Resolution 68/167, The Right to Privacy in the Digital Age, 13/18/2013, UN Doc. A/RES/68/167, distributed on 01/21/2014, available at: http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/68/167 [accessed: 05/17/2016]. Google Scholar öffnen
- United Nations General Assembly (1998): Official Records, Fifty-third session, 7th plenary meeting, 11/211998, UN Doc. A/53/PV.7, available at: http://www.un.org/documents/a53pv7.pdf [accessed: 06/13/2016]. Google Scholar öffnen
- United Nations General Assembly (1968): Resolution 2450 (XXIII). Human rights and scientific and technological developments, available at: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/244/10/IMG/NR024410.pdf?OpenElement [accessed: 01/17/2016]. Google Scholar öffnen
- United Nations Human Rights Council (2016): Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, Advanced Unedited Version, UN Doc. A/HRC/31/64, distributed on 03/08/2016, available at: http://www.ohchr.org/EN/Issues/Privacy/SR/Pages/SRPrivacyIndex.aspx [accessed: 05/17/2016]. Google Scholar öffnen
- United Nations Human Rights Council (2014a): The right to privacy in the digital age. Report of the Office of the United Nations High Commissioner for Human Rights, UN Doc. A/HRC/27/37, distributed on 06/30/2014, available at: http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx [accessed: 05/17/2016]. Google Scholar öffnen
- United Nations Human Rights Council (2014b): Concluding observations on the fourth periodic report of the United States of America, 04/23/2014, UN Doc. CCPR/C/USA/CO/4, available at: http://www.refworld.org/docid/5374afcd4.html [accessed: 05/18/2016]. Google Scholar öffnen
- United States Government Publishing Office (2001): Uniting and strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, available at: https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf [accessed: 04/19/16]. Google Scholar öffnen
- Van Schaack, Beth (2014): The United States� Position on the Extraterritorial Application of Human Rights Obligations: Now is the Time for Change, in: International Law Studies, Vol. 90, pp. 20�65. Google Scholar öffnen
- V�eneky, Silja (2017): Espionage, Security Interests, and Human Rights in the Second Machine Age. NSA Mass Surveillance and the Framework of Public International Law, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 492�507. Google Scholar öffnen
- Walen, Alec (2017): Forth Amendment Rights for Nonresident Aliens, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 282�303. Google Scholar öffnen
- Warren, Samuel/Louis Brandeis (1890): The Right to Privacy, in: Harvard Law Review, Vol. 4, No. 5, pp. 193�220. Google Scholar öffnen
- Weadon, Patrick D. (2009): Sigsaly Story, available at: https://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/sigsaly_story.shtml [Accessed: 01/14/2016]. Google Scholar öffnen
- Weisselberg, Charles (2010): Constitutional criminal procedure and civil rights in the shadow of the �war on terror.� A look at recent United States decisions and the rhetoric of terrorism, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 71�87. Google Scholar öffnen
- Westin, Alan (1970): Privacy and Freedom, New York: Ahteneum. Google Scholar öffnen
- Wiener, Antje (2014): A Theory of Contestation, Heidelberg: Springer. Google Scholar öffnen
- Winterfeld, Steve/Jason Andress (2013): The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice, New York: Elsevier. Google Scholar öffnen
- Wheeler, Brian (2004): �This goes no further��, in: BBC news, 03/02/04, available at: http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm [accessed: 04/19/16]. Google Scholar öffnen
- Wright, David/Reinhard Kreissl (2015): European responses to the Snowden revelations, in: Surveillance in Europe, David Wright/Reinhard Kreissl (eds.), London: Routledge, pp. 6�50. Google Scholar öffnen
- Zedner, Lucia (2009): Security, New York: Routledge. Google Scholar öffnen
- Zengerle, Patricia (2013): U.S. lawmakers want sanctions on any country taking in Snowden, in: Reuters, 07/25/2013, available at: http://www.reuters.com/article/us-usa-security-congress-idUSBRE96O18220130725 [accessed: 05/28/2016]. Google Scholar öffnen
- Zurawski, Nils (2015): Technische Innovationen und deren gesellschaftliche Auswirkungen im Kontext von �berwachung, Schriftenreihe Sicherheit, Nr. 16, Jochen Schiller et al. (eds.), Berlin: Forschungsforum �ffentliche Sicherheit. Google Scholar öffnen





