, um zu prüfen, ob Sie einen Vollzugriff auf diese Publikation haben.
Monographie Teilzugriff

The Abolishment of the Right to Privacy?

The USA, Mass Surveillance and the Spiral Model
Autor:innen:
Verlag:
 05.02.2018

Zusammenfassung

This book aims to explain the US violation of the human right to privacy unveiled by Edward Snowden with a newly developed comprehensive spiral model. After analyzing the social and juridical roots of the norm of privacy, it portrays the countering of privacy by the security norm in the US public debate and the US policy from the 1930s to 2013. On the basis of this case study the author refines the spiral model invented by Risse et al. Finally, the book explores the reaction of several actors following the Snowden disclosures and analyzes the tools these actors have used to influence the behavior of the USA. Thereby the author examines if the US reactions to the Snowden disclosures since 2013 follow the heuristic approach of the spiral model.


Publikation durchsuchen


Bibliographische Angaben

Copyrightjahr
2018
Erscheinungsdatum
05.02.2018
ISBN-Print
978-3-8288-4034-8
ISBN-Online
978-3-8288-6750-5
Verlag
Tectum, Baden-Baden
Reihe
Tectum - Masterarbeiten
Sprache
Deutsch
Seiten
162
Produkttyp
Monographie

Inhaltsverzeichnis

KapitelSeiten
  1. Titelei/Inhaltsverzeichnis Teilzugriff Seiten I - VIII Download Kapitel (PDF)
  2. 1. Introduction Kein Zugriff Seiten 1 - 6
  3. 2. The Spiral Model Kein Zugriff Seiten 7 - 12
    1. 3.1. Privacy as Social Norm Kein Zugriff
    2. 3.2. Privacy as Juridical Norm Kein Zugriff
    3. 3.3. Privacy as International Norm Kein Zugriff
    4. 3.4. Cultural Differences: the USA and the EU Kein Zugriff
    1. 4.1. Surveillance, Security and Privacy Kein Zugriff
    2. 4.2. From Roosevelt to the Church Committee Kein Zugriff
    3. 4.3. From Reagan to 9/11 Kein Zugriff
    4. 4.4. After 9/11 Kein Zugriff
    5. 4.5. Foreign Surveillance Kein Zugriff
    6. 4.6. The USA and a Comprehensive Spiral Model Kein Zugriff
    1. 5.1. Liberal states Kein Zugriff
      1. 5.2.1. United Nations Kein Zugriff
      2. 5.2.2. European Union Kein Zugriff
      3. 5.2.3. Council of Europe Kein Zugriff
    2. 5.3. (International) Non-Governmental Organizations: Amnesty International Kein Zugriff
  4. 6. The US Response: Does the Spiral Model Work? Kein Zugriff Seiten 129 - 136
  5. 7. Conclusion: Privacy – a Dead Norm? Kein Zugriff Seiten 137 - 142
  6. Bibliography Kein Zugriff Seiten 143 - 162

Literaturverzeichnis (249 Einträge)

  1. Bibliography Google Scholar öffnen
  2. Abu-Laban, Yasmeen (2014): The politics of surveillance. Civil liberties, human rights and ethics, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 420�427. Google Scholar öffnen
  3. Adler, David Gray (2008): George Bush, the unitary executive and the Constitution, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 99�119. Google Scholar öffnen
  4. Agamben, Giorgio (2015): Die Geburt des Sicherheitsstaats, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 7�9. Google Scholar öffnen
  5. Aid, Mattew (2009): The Secret Sentry. The Untold History of the National Security Agency, New York: Bloomsbury Press. Google Scholar öffnen
  6. Aiken, Katherine (2008): Senator Church and his constituents, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 76�95. Google Scholar öffnen
  7. Altmann, Irwin (1977): Privacy Regulation: Culturally Universal or Culturally Specific?, in: Journal of Social Issues, Vol. 33, No. 3, pp. 66�84. Google Scholar öffnen
  8. American Civil Liberties Union (2015): ACLU V. Clapper � Challenge to NSA Mass Call-Tracking Program, available at: https://www.aclu.org/cases/aclu-v-clapper-challenge-nsa-mass-call-tracking-program [accessed: 05/25/2016]. Google Scholar öffnen
  9. American Civil Liberties Union (2001): In Defence of Freedom in a Time of Crisis, available at: https://www.aclu.org/defense-freedom-time-crisis [accessed: 04/19/16]. Google Scholar öffnen
  10. American Civil Liberties Union (n.d.): Court battles, available at: https://www.aclu.org/defending-our-rights/court-battles?topics=132 [accessed: 05/25/2016]. Google Scholar öffnen
  11. Amnesty International (2016a): Amnesty International Report 2015/16. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Google Scholar öffnen
  12. Amnesty International (2016b): Amnesty International State of the World 2015�2016, available at: http://www.amnestyusa.org/research/reports/amnesty-international-state-of-the-world-2015-2016?page=show [accessed: 05/25/2016]. Google Scholar öffnen
  13. Amnesty International (2015a): Global opposition to USA big brother mass surveillance, 03/18/2015, available at: https://www.amnesty.org/en/latest/news/2015/03/global-opposition-to-usa-big-brother-mass-surveillance/ [accessed: 05/34/2016]. Google Scholar öffnen
  14. Amnesty International (2015b): Global Surveillance Operations and the Risk to Human Rights, 06/06/2015, available at: http://www.amnestyusa.org/pdfs/AIUSA_GlobalSurveillanceBoardLetter_20150606.pdf [accessed: 05/24/2016]. Google Scholar öffnen
  15. Amnesty International (2015c): Amnesty International Report 2014/15. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Google Scholar öffnen
  16. Amnesty International (2014): New tool for spy victims to detect government surveillance, 11/20/2014, available at: https://www.amnesty.org/en/latest/news/2014/11/new-tool-spy-victims-detect-government-surveillance/ [accessed: 05/24/2016]. Google Scholar öffnen
  17. Amnesty International (2013): The US NSA and the UK GCHQ want to listen in on all: Time for the Human Rights Council to discuss their activities: Amnesty International written statement to the 24th session of the UN Human RightsCouncil (9 to 27 September 2013), 08/29/2013, AI index: IOR 41/018/2013. Google Scholar öffnen
  18. Amnesty International (n.d.a): Stand Up For Our Rights Online!, available at: http://act.amnestyusa.org/ea-action/action?ea.client.id=1839&ea.campaign.id=36747 [accessed: 05/24/2016]. Google Scholar öffnen
  19. Amnesty International (n.d.b): Does your country share your data with the USA?, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/does-your-country-share-your-data-with-the-usa/ [accessed: 05/24/2016]. Google Scholar öffnen
  20. Amnesty International (n.d.c): Human Rights and National Security, available at: http://www.amnestyusa.org/our-work/issues/security-and-human-rights [accessed: 05/25/2016]. Google Scholar öffnen
  21. Amnesty International (n.d.d): Suchbegriffe, available at: http://www.amnesty.de/suche?words-advanced=Folter&search.x=0&search.y=0&search=Suchen&country=&topic=&node_type=ai_journal_story&from_month=6&from_year=2013&to_month=4&to_year=2016&sort_type=desc&page_limit=10&form_id=ai_search_form#resultlist [accessed: 05/25/2016]. Google Scholar öffnen
  22. Amnesty International (n.d.e): Brosch�ren, available at: https://www.amnesty.de/2010/9/26/broschueren?destination=node%2F16659 [accessed: 05/25/2016] Google Scholar öffnen
  23. Amnesty Internaional et al. (n.d.): Reset the net, available at: https://www.resetthenet.org [accessed: 05/24/2016]. Google Scholar öffnen
  24. Amnesty International/Privacy International (2015): Two years after Snowden, available at: https://www.amnesty.org/en/documents/act30/1795/2015/en/ [accessed: 05/25/2016]. Google Scholar öffnen
  25. Ashby, LeRoy (2008): The Church Committee�s history and relevance. Reflecting on Senator Church, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 57�75. Google Scholar öffnen
  26. Atkinson, L. Rush (2015): Regulating the Surveillance State, Upstream and Down: A Law & Economics Approach to the Intelligence Framework and Proposed Reforms, in: Stanford Journal of International Law, Vol. 51, No.1, pp. 1�18. Google Scholar öffnen
  27. Bamford, James (2009): The Shadow Factory. The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Anchor Books. Google Scholar öffnen
  28. Beaumont, Ben (2015a): Edward Snowden: �I should have come forward sooner,� 06/04/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/edward-snowden-i-should-have-come-forward-sooner/ [accessed: 05/24/2016]. Google Scholar öffnen
  29. Beaumont, Ben (2015b): 7 reasons why �I�ve got nothing to hide� is the wrong response to mass surveillance, 04/29/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [accessed: 05/24/2016]. Google Scholar öffnen
  30. Beck, Ulrich (1986): Risikogesellschaft. Auf dem Weg in eine andere Moderne, Frankfurt a.M.: Suhrkamp Google Scholar öffnen
  31. Bedan, Matt (2007): Echelon�s Effect: The Obsolescence of the US Foreign Intelligence Legal Regime, in: Federal Communications Law Journal, Vol. 59, No. 2, pp. 425�444. Google Scholar öffnen
  32. Bennett, Colin (2014): Privacy advocates, privacy advocacy and the surveillance society, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 412�419. Google Scholar öffnen
  33. Bennett, Colin (2011): Storming the Barricades so We Can All Be Private Together: Everyday Surveillance and the Politics of Privacy Advocacy, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: Springer VS Verlag, pp. 299�320. Google Scholar öffnen
  34. Bennett, Colin (1992): Regulating Privacy. Data Protection and Public Policy in Europe and the United States, Ithaca: Cornell University Press. Google Scholar öffnen
  35. Biermann, Kai (2017a): Was der NSA-Ausschuss erreicht hat und was nicht, in: Zeit online, 06/28/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/ueberwachungsaffaere-nsa-untersuchungsausschuss-abschlussbericht-faq/komplettansicht [accessed: 09/05/2017]. Google Scholar öffnen
  36. Biermann, Kai (2017b): Opposition wirft Regierung L�ge vor, in: Zeit online, 06/19/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/nsa-untersuchungsausschuss-bnd-abschlussbericht-opposition [accessed: 09/05/2017]. Google Scholar öffnen
  37. Biermann, Kai (2017c): Selbstherrliche �berwachung soll Gesetz werden, in: Zeit online, 06/07/2017, available at: http://www.zeit.de/politik/deutschland/2016-06/nsa-bnd-verfassungsschutz-ueberwachung-gesetz-entwurf/komplettansicht [accessed: 09/05/2017]. Google Scholar öffnen
  38. Blum, Stephanie Cooper (2009): What Really is at Stake with the FISA Amendments Act of 2008 and Ideas for Future Surveillance Reform, in: Boston University Public Interest Law Journal, Vol. 2, pp. 269�314. Google Scholar öffnen
  39. Bogart, William (2014): Simulation and post-panopticism, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 30�37. Google Scholar öffnen
  40. Boghosian, Heidi (2013): Spying on Democracy. Government Surveillance, Corporate Power, and Public Resistance, San Francisco: City Lights Books. Google Scholar öffnen
  41. Brivot, Marion/Yves Gendron (2011): Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting, in: Accounting, Organizations and Society, Vol. 36, No. 3, pp. 135�155. Google Scholar öffnen
  42. Brown, Ian/Morton Halperin/Ben Hayes et al. (2017): Toward Multilateral Standards for Foreign Surveillance Reform, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 461�491. Google Scholar öffnen
  43. Brown, Ian (2013): Anforderung an die Erm�chtigung zur rechtm��igen Abh�rung, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckedahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 206�213. Google Scholar öffnen
  44. Buckley, John (2014): Managing Intelligence. A Guide to Law Enforcement Professionals, Boca Raton: CRC Press. Google Scholar öffnen
  45. Bunz, Mercedes: Vom Speicher zum Verteiler. Die Geschichte des Internet, Berlin: Kadmos. Google Scholar öffnen
  46. Bygrave, Lee A. (2010): Privacy and Data Protection in an International Perspective, in: Scandinavian Studies in Law, Vol. 56, pp. 165�200. Google Scholar öffnen
  47. Cate, Fred H. (2015): Edward Snowden and the NSA: Law, Policy, and Politics, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 26�44. Google Scholar öffnen
  48. Ceyhan, Ayse (2014): Surveillance as biopower, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 38�45. Google Scholar öffnen
  49. Chaos Computer Club (n.d.): Chaos Computer Club, available at: https://www.ccc.de/en/home [accessed: 01/20/2016]. Google Scholar öffnen
  50. Chesterman, Simon (2011): One Nation Under Surveillance. A New Social Contract to Defend Freedom Without Sacrificing Liberty, Oxford: Oxford University Press. Google Scholar öffnen
  51. Chinese National Ministry of Defense (2014): Statement on U.S. Indictment of Chinese Military Officers, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, p. 165. Google Scholar öffnen
  52. Christie, George (1972): Government Surveillance and Individual Freedom: A Proposed Statutory Response to Laird vs. Tatum and the Broader Problem of Government Surveillance of the Individual, in: New York University Law Review, Vol. 47, pp. 871�902. Google Scholar öffnen
  53. Clarke, Roger (1988): Information Technology and Dataveillance, in: Communications of the Association for Computing Machinery, Vol. 31, No. 5, pp. 498�512. Google Scholar öffnen
  54. Cohn, Cindy/Rainey Reitman (2015): USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here, 06/02/2015, available at: https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here [accessed: 05/29/2016]. Google Scholar öffnen
  55. Cole, David (2003): The new McCathyism: Repeating History in the War on Terrorism, in: Harvard Civil Rights-Civil Liberties Law Journal, Vol. 38, No. 1, pp. 1�30. Google Scholar öffnen
  56. Commissioner of Human Rights (2016): Memorandum on surveillance and oversight mechanisms in the United Kingdom, 05/16/2016, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2919538&SecMode=1&DocId=2375752&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
  57. Commissioner of Human Rights (2015): Democratic and effective oversight of national security services, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2796355&SecMode=1&DocId=2286978&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
  58. Commissioner of Human Rights (2014): The rule of law on the Internet and in the wider digital world, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2734552&SecMode=1&DocId=2262340&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
  59. Commissioner of Human Rights (2008): Protecting the Right to Privacy in the Fight Against Terrorism, available at: https://wcd.coe.int/com.instranet.InstraServlet?Index=no&command=com.instranet.CmdBlobGet&InstranetImage=1416463&SecMode=1&DocId=1426260&Usage=2 [accessed: 05/23/2016]. Google Scholar öffnen
  60. Connolly, Kate (2015): German secret service BND reduces cooperation with NSA, in: The Guardian, 05/07/2015, available at: http://www.theguardian.com/world/2015/may/07/german-secret-service-bnd-restricts-cooperation-nsa-us-online-surveillance-spy [accessed: 05/14/2016]. Google Scholar öffnen
  61. Conyers, John (2009): Reining in the Imperial Presidency. Lessons and Recommendations Relating to the Presidency of George W. Bush. House Committee on the Judiciary Majority Staff Report to Chairman John C. Conyers, Jr., New York: Skyhorse Publishing. Google Scholar öffnen
  62. Cope, Sophia (2016): House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform, 04/27/2016, available at: https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-setting-stage-vital-privacy-reform [accessed: 05/29/2016]. Google Scholar öffnen
  63. Council of Europe (2016a): Recommendation CM/Rec(2016)5[1] of the Committee of Ministers to member States on Internet freedom, 04/13/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016806415fa [accessed: 05/23/2016]. Google Scholar öffnen
  64. Council of Europe (2016b): Internet Governance � Council of Europe Strategy 2016�2019. Democracy, human rights and the rule of law in the digital world, 03/30/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016805c1b60 [accessed: 05/23/2016]. Google Scholar öffnen
  65. Council of Europe (2015a): Mass surveillance, Resolution 2045, 04/21/2015, available at: http://assembly.coe.int/nw/xml/XRef/Xref-XML2HTML-en.asp?fileid=21692&lang=en [accessed: 05/23/2016]. Google Scholar öffnen
  66. Council of Europe (2015b): Improving the protection of whistleblowers, Resolution 2060, 06/23/2015, available at: http://semantic-pace.net/tools/pdf.aspx?doc=aHR0cDovL2Fzc2VtYmx5LmNvZS5pbnQvbncveG1sL1hSZWYvWDJILURXLWV4dHIuYXNwP2ZpbGVpZD0yMTkzMSZsYW5nPUVO&xsl=aHR0cDovL3NlbWFudGljcGFjZS5uZXQvWHNsdC9QZGYvWFJlZi1XRC1BVC1YTUwyUERGLnhzbA==&xsltparams=ZmlsZWlkPTIxOTMx [accessed: 05/23/2015] Google Scholar öffnen
  67. Council of Europe (2013a): Council of Europe alerts governments on risks of digital tracking and surveillance, 06/12/2013, available at: https://go.coe.int/phA5g [accessed: 05/23/2016]. Google Scholar öffnen
  68. Council of Europe (2013b): Council of Europe ministerial conference calls for effective safeguards against electronic mass surveillance, 11/08/2013, available at: https://go.coe.int/bjrvF [accessed: 05/23/2016]. Google Scholar öffnen
  69. Council of Europe (2001): Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680080626 [accessed: 01/20/2016]. Google Scholar öffnen
  70. Council of Europe (1981): Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680078b37 [accessed: 01/19/2016]. Google Scholar öffnen
  71. Council of Europe (n.d.a): European Convention on Human Rights, available at: http://www.echr.coe.int/Documents/Convention_ENG.pdf [accessed: 01/19/2016]. Google Scholar öffnen
  72. Council of Europe (n.d.b): Ad Hoc Committee on Data Protection (CAHDATA), available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/Cahdata_en.asp [accessed: 05/23/2016]. Google Scholar öffnen
  73. Council of Europe (n.d.c): United States � Observer, available at: http://www.coe.int/en/web/portal/united-states [accessed: 05/23/2016]. Google Scholar öffnen
  74. Cullather, Nick (2015): Security and Liberty: The Imaginary Balance, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 19�25. Google Scholar öffnen
  75. Daase, Christopher/Tim Nicholas R�hlig (2016): Der Wandel der Sicherheitskultur nach 9/11, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 13�34. Google Scholar öffnen
  76. Der Spiegel (1971): EDV im Odenwald, No. 20, p. 88, available at: http://www.spiegel.de/spiegel/print/d-43176393.html [accessed: 01/26/2016]. Google Scholar öffnen
  77. Deutscher Bundestag (2017): Beschlussfassung und Bericht des 1. Untersuchungsausschusses nach Artikel 44 des Grundgesetzes, Vorabfassung, 06/23/2017, Drucksache 18/12850, available at: http://dip21.bundestag.de/dip21/btd/18/128/1812850.pdf [accessed: 09/05/2017]. Google Scholar öffnen
  78. Diffie, Whitfield/Susan Landau (2007): Privacy on the Line. The Politics of Wiretapping and Encryption, Massachusetts: MIT Press. Google Scholar öffnen
  79. Doherty, Thomas (2003): Cold War, Cool Medium. Television, McCarthyism, and American Culture, New York: Columbia University Press. Google Scholar öffnen
  80. Dycus, Stephen (2008): Domestic military intelligence activities, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 163�183. Google Scholar öffnen
  81. Electronic Frontier Foundation (n.d.a): About EFF, available at: https://www.eff.org/about [accessed: 02/20/2015]. Google Scholar öffnen
  82. Electronic Frontier Foundation (n.d.b): Timeline of NSA Domestic Spying, available at: https://www.eff.org/nsa-spying/timeline [accessed: 05/04/2016]. Google Scholar öffnen
  83. Electronic Frontier Foundation (n.d.c): All EFF�s legal cases, available at: https://www.eff.org/cases [accessed: 05/25/2016]. Google Scholar öffnen
  84. Electronic Privacy Information Center (n.d.): About EPIC, available at: https://epic.org/epic/about.html [accessed: 02/20/2015]. Google Scholar öffnen
  85. Elliff, John (1984): Attorney General�s Guidelines for FBI Investigations, in: Cornell Law Review, Vol. 69, No. 4, pp. 785�815. Google Scholar öffnen
  86. Elmer, Greg (2014): Panopticon � discipline � control, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 21�29. Google Scholar öffnen
  87. Enn�ckl, Daniel (2014): Der Schutz der Privatsph�re in der elektronischen Datenverarbeitung, Wien: Verlag �sterreich. Google Scholar öffnen
  88. European Data Protection Supervisor (2016): EDPS starts work on a New Digital Ethics, 01/26/2016, Press Release No. EPDS/2016/05, available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2016/EDPS-2016-05-EDPS_Ethics_Advisory_Group_EN.pdf [accessed: 05/20/2016]. Google Scholar öffnen
  89. European Data Protection Supervisor (n.d.): Ethics Advisory Group, available at: https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Ethics [accessed: 05/20/2016]. Google Scholar öffnen
  90. European Parliament (2014): European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� fundamental rights and on transatlantic cooperation in Justice and Home Affairs, 03/12/2014, EU Doc. P7_TA(2014)0230, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2014-0230+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Google Scholar öffnen
  91. European Parliament (2013): European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� privacy, 07/04/2013, EU Doc. P7_TA(2013)0322, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2013-0322+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Google Scholar öffnen
  92. European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 07/11/2001, EU Doc. A5-0264/2001, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//EN#_part5_def3 [accessed: 04/29/2016]. Google Scholar öffnen
  93. European Union (2016): Directive 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA, in: Official Journal of the European Union, L 119, 05/04/2016, pp. 0089�0131, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&rid=2 [accessed: 05/19/2016]. Google Scholar öffnen
  94. European Union (2012): Charter of Fundamental Rights of the European Union, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT [accessed: 01/21/2016]. Google Scholar öffnen
  95. European Union (1995): Directive 95/46/EC of the European Parliament and of the Google Scholar öffnen
  96. Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, in: Official Journal of the European Union, L 281, 11/23/1995, pp. 0031�0050, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML [accessed: 01/19/2016]. Google Scholar öffnen
  97. Fidler, David (ed.) (2015a): The Snowden Reader, Bloomington: Indiana University Press. Google Scholar öffnen
  98. Fidler, David (2015b): U.S. Foreign Policy and the Snowden Leaks, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 52�69. Google Scholar öffnen
  99. Finnemore, Martha/Kathryn Sikkink (1998): International Norm Dynamics and Political Change, in: International Organization, Vol. 53, No. 4, pp. 887�917. Google Scholar öffnen
  100. Foerstel, Herbert (2008): The Patriot Act. A Documentary and Reference Guide, Westport: Greenwood Press. Google Scholar öffnen
  101. Forsythe, David (2002): The United States and International Criminal Justice, in: Human Rights Quarterly, Vol. 24, No. 4, pp. 974�991. Google Scholar öffnen
  102. Gamson, William/David Meyer (1996): Framing Political Opportunity, in: Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings, Dough McAdam et al. (eds.), Cambridge: Cambridge University Press, pp. 275�290. Google Scholar öffnen
  103. Garstka, Hansj�rgen (2003): Informationelle Selbstbestimmung und Datenschutz. Das Recht auf Privatsph�re, in: B�rgerrechte im Netz, Christiane Schulzki-Haddouti (ed.), pp. 48�70. Google Scholar öffnen
  104. Gathmann, Florian (2013): Eklat um Evo Morales: Pr�sidentenjet verl�sst Wien nach Zw�lf-Stunden-Stopp, in: Spiegel Online, 07/03/2013, available at: http://www.spiegel.de/politik/ausland/morales-flugzeug-in-wien-gestoppt-snowden-nicht-an-bord-a-909146.html [accessed: 05/28/2016]. Google Scholar öffnen
  105. Gebauer, Matthias et al. (2013): Berlin Leaves Biggest NSA Questions Unanswered, in: Spiegel Online, 07/29/2013, available at: http://www.spiegel.de/international/world/german-government-responds-to-nsa-spying-and-data-collection-leaks-a-913635.html [accessed: 05/16/2016]. Google Scholar öffnen
  106. Gellman, Barton (2013): U.S. surveillance architecture includes collection of revealing Internet, phone metadata, in: The Washington Post, 06/16/2013, available at: https://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html [accessed: 05/04/2016]. Google Scholar öffnen
  107. Gellman, Barton/Laura Poitras (2013): U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, in: The Washington Post, 06/07/2013, available at: https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1 [accessed: 04/28/2016]. Google Scholar öffnen
  108. Gibbs, Samuel (2016): Data regulators reject EU-US Privacy Shield safe harbour deal, in: The Guardian, 04/14/2016, available at: https://www.theguardian.com/technology/2016/apr/14/data-regulators-reject-eu-us-privacy-shield-safe-harbour-deal [accessed: 05/19/2016]. Google Scholar öffnen
  109. Gibbs, Samuel (2015): What is �safe harbour� and why did the EUCJ just declare it invalid?, in: The Guardian, 10/06/2015, available at: https://www.theguardian.com/technology/2015/oct/06/safe-harbour-european-court-declare-invalid-data-protection [accessed: 05/19/2016]. Google Scholar öffnen
  110. Gill, Peter (2015): World Society under Surveillance, in: Global Trends: Prospects for World Society, Stiftung Entwicklung und Frieden (ed.), pp. 71�86. Google Scholar öffnen
  111. Gilliom, John/Torin Monahan (2014): Everyday resistance, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 405�411. Google Scholar öffnen
  112. Giugni, Marco (2009): Political Opportunities: From Tilly to Tilly, in: Swiss Political Science Review, Vol. 15, No. 2, pp. 361�368. Google Scholar öffnen
  113. Glancy, Dorothy (1979): The Invention of the Right to Privacy, in: Arizona Law Review, Vol. 21, No. 1, pp. 1�39. Google Scholar öffnen
  114. Glendon, Mary Ann (2002): A World Made New. Eleanor Roosevelt and the Universal Declaration of Human Rights, New York: Random House. Google Scholar öffnen
  115. Global Privacy Enforcement Network (n.d.): Action Plan for the Global Privacy Enforcement Network (GPEN), available at: https://www.privacyenforcement.net/about_the_network#action_plan [accessed: 01/20/2016]. Google Scholar öffnen
  116. Goos, Kerstin et al. (2015): The co-evolution of surveillance technologies and surveillance practices, in: Surveillance in Europe, David Wright/Reinhard Kreissl (ed.), New York: Routledge, pp. 51�100. Google Scholar öffnen
  117. Gorman, Siobhan/Evan Perez/Janet Hook (2013): U.S. Collects Vast Data Trove, in: The Wall Street Journal, 06/07/2013, available at: http://www.wsj.com/articles/SB10001424127887324299104578529112289298922 [accessed: 04/27/2016]. Google Scholar öffnen
  118. Greenberg, Andy (2017): Passing the Email Privacy Act Has Never Been More Urgent, in: Wired, 02/06/2017, available at: https://www.wired.com/2017/02/trump-power-email-privacy-act-never-urgent/ [accessed: 09/06/2017]. Google Scholar öffnen
  119. Greenberg, Andy (2014): These Are the Emails Snowden Sent to First Introduce His Epic NSA Leaks, in: Wired, 10/13/2014, available at: https://www.wired.com/2014/10/snowdens-first-emails-to-poitras/ [accessed: 05/28/2016]. Google Scholar öffnen
  120. Greenberg, Andy (2013): Watch Top US Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year, in: Forbes, 06/06/2013, available at: http://www.forbes.com/sites/andygreenberg/2013/06/06/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos/#6c8b4e1021d3 [accessed: 04/27/2016]. Google Scholar öffnen
  121. Greenberg, Ivan (2010): The Dangers of Dissent. The FBI and Civil Liberties since 1965, New York: Lexington. Google Scholar öffnen
  122. Greenlee, Michael (2008): National security letters and intelligence oversight, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 184�204. Google Scholar öffnen
  123. Greenwald, Glenn (2013a): NSA collecting phone records of millions of Verizon customers daily, in: The Guardian, 06/06/2013, available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [accessed: 04/27/2016]. Google Scholar öffnen
  124. Greenwald, Glenn (2013b): NSA collected US email records in bulk for more than two years under Obama, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama [accessed: 04/28/2016]. Google Scholar öffnen
  125. Greenwald, Glenn/Spancer Ackerman (2013): Now the NSA is still harvesting your online data, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection [accessed: 05/04/2016]. Google Scholar öffnen
  126. Haas, Michael (2014): International Human Rights. A Comprehensive Introduction, New York: Routledge. Google Scholar öffnen
  127. Hager, Nicky (2015): Wie die NSA in die Welt kam, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 10�17. Google Scholar öffnen
  128. Haggerty, Kevin/Richard Ericson (2000): The surveillant assemblage, in: British Journal of Sociology, Vol. 51, No. 4, pp. 605�622. Google Scholar öffnen
  129. Harper, Nick (2014): FISA�s Fuzzy Line between Domestic and International Terrorism, in: The University of Chicago Law Review, Vol. 81, No. 3, pp. 1123-1164. Google Scholar öffnen
  130. Harris, Shane (2010): The Watchers. The Rise of America�s Surveillance State, New York: Penguin Press. Google Scholar öffnen
  131. Hart, Gary (2008): Liberty and security, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 13�21. Google Scholar öffnen
  132. Hegemann, Hendrik/Martin Kahl (2016): Konstruktionen und Vorstellungen von Wirksamkeit in der Antiterror-Politik: Eine kritische Betrachtung, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 189�207. Google Scholar öffnen
  133. Hei�ler, Julian (2017): Ein bisschen Aussp�hen unter Freunden, in: tagesschau.de, 10/21/2017, available at: https://www.tagesschau.de/inland/bnd-gesetz-reform-103.html [accessed: 09/05/2017]. Google Scholar öffnen
  134. Heller, Regina/Martin Kahl/Daniela Pisoiu (2012): The �dark� side of normative argumentation � The case of counterterrorism policy, in: Global Constitutionalism, Vol. 1, No. 2, pp. 278�312. Google Scholar öffnen
  135. Hempel, Leon/Susanne Krasmann/Ulrich B�ckling (2011): Sichtbarkeitsregime: Eine Einleitung, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 7�24. Google Scholar öffnen
  136. Holt, Jennifer/Steven Malcic (2015): The Privacy Ecosystem. Regulating Digital Identity in the United States and European Union, in: Journal of Information Policy, Vol. 5, pp. 155�178. Google Scholar öffnen
  137. Horowitz, Sarah (2017): Foucault�s Panopticon. A Model for NSA Surveillance?, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 39�62. Google Scholar öffnen
  138. Jansen, Jonas (2015): So k�nnen Sie nachpr�fen, ob Sie ausgesp�ht wurden, in: Frankfurter Allgemeine Zeitung, 02/19/2015, available at: http://www.faz.net/aktuell/feuilleton/debatten/privacy-international-zeigt-ueberwachung-durch-gchq-13437376.html [accessed: 02/20/2015]. Google Scholar öffnen
  139. Johnson, Brittany May (2016): Foreign National�s Privacy Interests Under U.S. Foreign Intelligence Law, in: Texas International Law Journal, Vol. 51, No. 2, pp. 229�257. Google Scholar öffnen
  140. Johnson, Loch (2008): Establishment of modern intelligence accountability, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 37�56. Google Scholar öffnen
  141. Kammerer, Dietmar (2015): Absolut unamerikanisch. Die schleichende Enteignung der Privatsph�re in den USA, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 28�32. Google Scholar öffnen
  142. Katzenstein, Peter (1996): The Culture of National Security. Norms and Identity in World Politics, New York: Columbia University Press. Google Scholar öffnen
  143. Keck, Margaret/Kathryn Sikkink (1998): Activists beyond Borders. Advocacy Networks in International Politics, Ithaca: Cornell University Press. Google Scholar öffnen
  144. Kerr, Orin (2001): The Fourth Amendment in Cyberspace: Can Encryption Create a �Reasonable Expectation to Privacy?�, in: Connecticut Law Review, Vol. 33, No. 503, pp. 503�533. Google Scholar öffnen
  145. Kietz, Daniela/Johannes Thimm (2013): Zwischen �berwachung und Aufkl�rung. Die amerikanische Debatte und die europ�ische Reaktion auf die Praxis der NSA, SWP-Aktuell, No. 51. Google Scholar öffnen
  146. Kittlitz, Alard von (2010): Der Traum von einem idealen Leben, in: Frankfurter Allgemeine Zeitung, 08/06/2010, available at: http://www.faz.net/aktuell/feuilleton/debatten/digitales-denken/ende-der-privatsphaere-der-traum-von-einem-idealen-leben-11026194.html [accessed: 06/09/2016]. Google Scholar öffnen
  147. Krasmann, Susanne (2011): Der Pr�ventionsstaat im Einvernehmen. Wie Sichtbarkeitsregime stillschweigend Akzeptanz produzieren, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 53�70. Google Scholar öffnen
  148. Krieger, Wolfgang (2014): Geschichte der Geheimdienste. Von den Pharaonen bis zur NSA, M�nchen: C.H. Beck. Google Scholar öffnen
  149. Kurz, Constanze (2016): Wir erkl�ren den Cyber War f�r er�ffnet, in: Frankfurter Allgemeine Zeitung, 03/07/16, available at: http://www.faz.net/aktuell/feuilleton/aus-dem-maschinenraum/amerika-erklaert-dem-is-den-ersten-cyberwar-14109024.html [accessed: 04/18/16]. Google Scholar öffnen
  150. Lee, Newton (2015): Counterterrorism and Cybersecurity. Total Information Awareness, Heidelberg: Springer. Google Scholar öffnen
  151. Liese, Andrea (2009): Exceptional Necessity. How Liberal Democracies Contest the Prohibition of Torture and Ill-Treatment when Countering Terrorism, in: Journal of International Law and International Relations, Vol. 5, No. 1, pp. 17�47. Google Scholar öffnen
  152. Liptak, Adam (2013): Justices Turn Back Challenge to Broader US Eavesdropping, in: The New York Times, 02/26/2013, available at: http://www.nytimes.com/2013/02/27/us/politics/supreme-court-rejects-challenge-to-fisa-surveillance-law.html?_r=0 [accessed: 05/24/2016]. Google Scholar öffnen
  153. Lynch, Andrew/Nicola McGarrity/George Williams (2010): The emergence of a �culture of control,� in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 3�9. Google Scholar öffnen
  154. Lyon, David (2015): Surveillance after Snowden, Cambridge: Polity. Lyon, David/Kevin Haggerty/Kristie Ball (2014): Introducing surveillance studies, Google Scholar öffnen
  155. in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 1�11. Google Scholar öffnen
  156. MacAskill, Ewen (2015): The NSA�s bulk metadata collection authority just expired. What now?, in: The Guardian, 11/28/2015, available at: http://www.theguardian.com/us-news/2015/nov/28/nsa-bulk-metadata-collection-expires-usa-freedom-act [accessed: 05/29/2016]. Google Scholar öffnen
  157. Mason, Alpheus Thomas (1946): Brandeis. A free man�s life, New York: Viking Press. Google Scholar öffnen
  158. McCullagh, Declan (2006): FBI taps cell phone mic as eavesdropping tool, available at: http://www.cnet.com/news/fbi-taps-cell-phone-mic-as-eavesdropping-tool/ [accessed: 04/16/16]. Google Scholar öffnen
  159. McCulloch, Jude/Sharon Pickering (2010): Counter-terrorism. The law and policing of pre-emption, in: in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 13�29. Google Scholar öffnen
  160. McGarrity, Nicola/George Williams (2010): When extraordinary measures become normal. Pre-emption in counter-terrorism and other laws, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 131�149. Google Scholar öffnen
  161. McKeown, Ryder (2009): Norm Regress: US Revisionism and the Slow Death of the Torture Norm, in: International Relations, Vol. 23, No. 1, pp. 5�25. Google Scholar öffnen
  162. Meister, Andre (2013): Vorratsdatenspeicherung: Warum Verbindungsdaten noch aussagekr�ftiger sind als Kommunikationsinhalte, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 229�233. Google Scholar öffnen
  163. Miller, Russel (2017): A Rose by any Other Name? The Comparative Law of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 63�94. Google Scholar öffnen
  164. Mills, Jon L. (2015): The Future of Privacy in the Surveillance Age, in: After Snowden. Privacy, Secrecy, and Security in the Information Age, Ronald Goldfarb (ed.), New York: St. Martin�s Press, pp. 191�260. Google Scholar öffnen
  165. Moechel, Erich (2013): Was Metadaten der NSA verraten, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 241�244. Google Scholar öffnen
  166. Montgomery, Bruce (2008): The Bush-Cheney Administration�s Assault on Open Government, Westport: Praeger. Google Scholar öffnen
  167. Mui�nieks, Nils (2015): Europe is spying on you, in: The New York Times, 10/27/2015, available at: http://www.nytimes.com/2015/10/28/opinion/europe-is-spying-on-you-mass-surveillance.html?_r=0 [accessed: 05/23/2015]. Google Scholar öffnen
  168. Mui�nieks, Nils (2013): Prism: secret surveillance could destroy democracy rather than defend it, in: The Guardian, 06/26/2013, available at: http://www.coe.int/en/web/commissioner/-/prism-secret-surveillance-could-destroy-democracy-rather-than-defend-it [accessed: 05/23/2016]. Google Scholar öffnen
  169. Nakashima, Ellen/Jobby Warrick (2013): For NSA chief, terrorist threat drives passion to �collect it all�, in: The Washington Post, 07/14/2013, available at: https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html [accessed: 06/08/2016]. Google Scholar öffnen
  170. Newell, Jim (2013): Thousands gather in Washington for anti-NSA �Stop Watching Us� rally, in: The Guardian, 10/26/2013, available at: http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden [accessed: 06/08/2016]. Google Scholar öffnen
  171. Nielsen, Richard/Beth Simmons (2015): Rewards for Ratification: Payoffs for Participating in the International Human Rights Regime?, in: International Studies Quarterly, Vol. 59, No. 2, pp. 197�208. Google Scholar öffnen
  172. Nissenbaum, Helen (2010): Privacy in Context. Technology, Policy, and the Integrity of Social Life, Stanford: Stanford University Press. Google Scholar öffnen
  173. Nyst, Carly/Tomaso Falchetta (2017): The Right to Privacy in the Digital Age, in: Journal of Human Rights Practice, Vol. 9, No. 1, pp. 104�118. Google Scholar öffnen
  174. Obama, Barack (2014): Remarks on Review of Signals Intelligence, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 318�330. Google Scholar öffnen
  175. O�Connel, Mary Ellen (2012): Cyber Security without Cyber War, in: Journal of Conflict and Security Law, Vol. 17, No. 2, pp. 187�209. Google Scholar öffnen
  176. On the Issue (n.d.): George W. Bush on Technology, available at: http://www.ontheissues.org/Celeb/George_W__Bush_Infrastructure.htm [accessed: 05/03/2016]. Google Scholar öffnen
  177. Opitz, Sven/Ute Tellmann (2011): Katastrophale Szenarien: Gegenw�rtige Zukunft in �konomie und Recht, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 27�52. Google Scholar öffnen
  178. Organization for Economic Co-Operation and Development (2013): The OECD Privacy Framework, available at: http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf [accessed: 01/20/2016]. Google Scholar öffnen
  179. Organization for Economic Co-Operation and Development (1997): Recommendation of the Council concerning guidelines for cryptography policy, available at: http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=C(97)62/FINAL&docLanguage=En [accessed: 01/20/2016]. Google Scholar öffnen
  180. Organization for Economic Co-Operation and Development (1980): OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at: http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm [accessed: 01/18/2016]. Google Scholar öffnen
  181. Panke, Diana/Ulrich Petersohn (2016): Norm challenges and norm death: The inexplicable?, in: Cooperation and Conflict, Vol. 51, No. 1, pp. 3�19. Google Scholar öffnen
  182. Peters, Anne (2017): Privacy, Rechtsstaatlichkeit, and the Legal Limits on Extraterritorial Surveillance, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 145�179. Google Scholar öffnen
  183. P�schl, Magdalena (2015): Sicherung grund- und menschenrechtlicher Standards gegen�ber neuen Gef�hrdungen durch private und ausl�ndische Akteure, in: �ffnung der �ffentlich-rechtlichen Methode durch Internationalit�t und Interdisziplinarit�t: Erscheinungsformen, Chancen, Grenzen ; Referate und Diskussionen auf der Tagung der Vereinigung der Deutschen Staatsrechtslehrer in D�sseldorf vom 1. bis 4. Oktober 2014, Hans Christian R�hl et al. (eds.), Berlin: de Gruyter, pp. 405�452. Google Scholar öffnen
  184. Prosser, William (1960): Privacy, in: California Law Review, Vol. 48, No. 3, pp. 383�423. Google Scholar öffnen
  185. Reagan, Priscilla M. (2014): Regulating surveillance technologies. Institutional arrangements, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 397-404. Google Scholar öffnen
  186. Rebinger, Simon (2017): Datensch�tzer r�tseln: Schafft Trump Datenschutz-Abkommen zwischen USA und EU ab?, 01/27/2017, available at: https://netzpolitik.org/2017/datenschuetzer-raetseln-schafft-trump-datenschutz-abkommen-zwischen-usa-und-eu-ab/ [accessed: 09/07/2017]. Google Scholar öffnen
  187. Reilly, Mollie (2013): Obama Defends NSA Surveillance Program, Says It�s �Transparent,� in: The Huffington Post, 06/18/2013, available at: http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html [accessed: 05/28/2016]. Google Scholar öffnen
  188. Restore the Fourth (2015): Who we are, 12/05/2015, available at: https://restorethe4th.com/who-we-are/ [accessed: 06/08/2016]. Google Scholar öffnen
  189. Risen, James (2013): Snowden Says He Took No Secret Files to Russia, in: The New York Times, 10/17/2013, available at: http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-to-russia.html?_r=0&mtrref=undefined&gwh=8BB37884F4339E8D704EFD583EF66B2E&gwt=pay [accessed: 05/28/2016]. Google Scholar öffnen
  190. Risen, James/Eric Lichtblau (2005): Bush Lets US Spy on Callers Without Courts, in: The New York Times, 12/16/2005, available at: http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html [accessed: 05/04/2016]. Google Scholar öffnen
  191. Risse, Thomas et al. (eds.) (2013): The Persistent Power of Human Rights. From Commitment to Compliance, New York: Cambridge University Press. Google Scholar öffnen
  192. Risse, Thomas et al. (eds.) (1999): The Power of Human Rights. International Norms and Domestic Change, New York: Cambridge University Press. Google Scholar öffnen
  193. R�ssler, Beate (2001): Der Wert des Privaten, Frankfurt a.M.: Suhrkamp. Google Scholar öffnen
  194. Roth, Anna-Lena/Florian Gathmann (2013): Merkel zur Handy-Aff�re: �Aussp�hen unter Freunden � das geht gar nicht�, in: Spiegel Online, 10/24/2013, available at: http://www.spiegel.de/politik/deutschland/handy-spaehaffaere-um-merkel-regierung-ueberprueft-alle-nsa-erklaerungen-a-929843.html [accessed: 05/20/2016]. Google Scholar öffnen
  195. Rouseff, Dilma (2013): Statement to United Nations General Assembly, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 158�159. Google Scholar öffnen
  196. Rudl, Thomas (2016): EU-US-Datenschutzschild: Irische Datensch�tzer reichen Nichtigkeitsklage ein, 10/27/2016, available at: https://netzpolitik.org/2016/eu-us-datenschutzschild-irische-datenschuetzer-reichen-nichtigkeitsklage-ein/ [accessed: 09/07/2017]. Google Scholar öffnen
  197. Rudl, Thomas (2015): Snowden-Dokumente best�tigen Echelon-Programm: R�ckschau auf 40 Jahre Aufdeckungsarbeit, 08/06/2015, available at: https://netzpolitik.org/2015/snowden-dokumente-bestaetigen-echelon-programm-rueckschau-auf-40-jahre-aufdeckungsarbeit/ [accessed: 04/29/2016]. Google Scholar öffnen
  198. Ruhmann, Ingo (2014): NSA, IT-Sicherheit und die Folgen, in: Datenschutz und Datensicherheit, No. 1/2014, pp. 40�46. Google Scholar öffnen
  199. Rule, James (2014): �Needs� for surveillance and the movement to privacy, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 64�71. Google Scholar öffnen
  200. Sales, Allice (2015): Brazil Shows How Not to Respond to Snowden Revelations, in: Panam Post, 02/24/2015, available at: https://panampost.com/alice-salles/2015/02/24/brazil-shows-how-not-to-respond-to-snowden-revelations/ [accessed: 05/15/2016]. Google Scholar öffnen
  201. Schaar, Peter (2013): Welche Konsequenzen haben PRISM und Tempora f�r den Datenschutz in Deutschland und Europa?, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 118�127. Google Scholar öffnen
  202. Schariatmadari, David (2015): Privacy is starting to seem like a very 20th-century anomaly, in: The Guardian, 11/07/2015, available at: http://www.theguardian.com/commentisfree/2015/nov/07/privacy-seems-20th-century-aberration-but-worth-mourning [accessed: 01/26/2016]. Google Scholar öffnen
  203. Scheer, Ursula (2015): Haben die Amerikaner den Deutschen gedroht?, in: Frankfurter Allgemeine Zeitung, 03/20/2015, available at: http://www.faz.net/aktuell/feuilleton/medien/geheimdienste-und-snowden-gabriel-verraet-greenwald-ein-geheimnis-13496416.html [accessed: 05/28/2016]. Google Scholar öffnen
  204. Schiedermair, Stephanie (2012): Der Schutz des Privaten als internationales Grundrecht, T�bingen: Mohr Siebeck. Google Scholar öffnen
  205. Schmale, Wolfgang/Marie-Theres Tinnefeld (2014): Privatheit im digitalen Zeitalter, Wien: B�hlau. Google Scholar öffnen
  206. Schneider, Jens-Peter (2017): Developments in European Data Protection Law in the Shadow of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 539�563. Google Scholar öffnen
  207. Schrecker, Ellen (2002): The Age of McCarthyism. A Brief History with Documents, New York: Bedford/St. Martin�s. Google Scholar öffnen
  208. Schrecker, Ellen (1998): Many are the Crimes. McCarthyism in America, Princeton: Princeton University Press. Google Scholar öffnen
  209. Schwartz, Paul (2013): The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, in: Harvard Law Review, Vol. 126, pp. 1967�2009. Google Scholar öffnen
  210. Schwarz, Frederick (2008): The Church Committee, then and now, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 22�36. Google Scholar öffnen
  211. Schweidler, Walter (2014): Der gute Staat. Politische Ethik von Platon bis zur Gegenwart, Wiesbaden: Springer VS. Google Scholar öffnen
  212. Scott, Mark (2016): U.S. and Europe in �Safe Harbor� Data Deal, but Legal Fight May Await, in: The New York Times, 02/02/2016, available at: http://www.nytimes.com/2016/02/03/technology/us-europe-safe-harbor-data-deal.html?_r=0 [accessed: 05/19/2016]. Google Scholar öffnen
  213. Shance, Scott (2013): No Morsel Too Minuscule for All-Consuming N.S.A., in: The New York Times, 11/02/2013, available at: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=1&_r=1 [accessed: 05/20/2016]. Google Scholar öffnen
  214. Shapiro, Ari (2013): How Obama's Response To NSA Spying Has Evolved, in: NPR, 11/13/2013, available at: http://www.npr.org/sections/itsallpolitics/2013/11/13/245037300/how-obamas-response-to-nsa-spying-has-evolved [accessed: 05/28/2016]. Google Scholar öffnen
  215. Sikkink, Kathryn (2013): The United States and torture: does the spiral model work?, in: The Persistent Power of Human Rights. From Commitment to Compliance, Thomas Risse et al. (eds.), New York: Cambridge University Press, pp. 145�163. Google Scholar öffnen
  216. Smale, Alison (2015): Germany, Too, Is Accused of Spying on Friends, in: The New York Times, 05/05/2015, available at: http://www.nytimes.com/2015/05/06/world/europe/scandal-over-spying-shakes-german-government.html?_r=0 [accessed: 05/16/2016]. Google Scholar öffnen
  217. Solove, Daniel/Paul Schwartz (2009): Privacy, Information and Technology, New York: Wolters Kluwer. Google Scholar öffnen
  218. Solove, Daniel (2008): Understanding privacy, Cambridge: Harvard University Press. Google Scholar öffnen
  219. Solove, Daniel (2002): Conceptualizing Privacy, in: California Law Review, Vol. 90, No.4, pp. 1087�1155. Google Scholar öffnen
  220. Sprenger, Florian (2015): Politik der Mikroentscheidungen: Edward Snowden, Netzneutralit�t und die Architektur des Internets, L�neburg: meson press. Google Scholar öffnen
  221. Stratford, Jean Slemmons/Juri Stratford (1998): Data Protection and Privacy in the United States and Europe, in: IASSIST Quarterly, Fall edition, pp. 17�20. Google Scholar öffnen
  222. Theoharis, Athan (2011): Abuse of Power. How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11, Philadelphia: Temple University Press. Google Scholar öffnen
  223. The White House (2014): Presidential Policy Directive � Signals Intelligence Activities. Presidential Policy Directive/PPD-28, available at: https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-intelligence-activities [accessed: 06/09/2016]. Google Scholar öffnen
  224. The White House (2002): President Bush Delivers Graduation Speech at West Point, available at: http://georgewbush-whitehouse.archives.gov/news/releases/2002/06/20020601-3.html [accessed: 04/28/2016]. Google Scholar öffnen
  225. Tilly, Charles (1978): From Mobilization to Revolution, Reading: Addison-Wesley Publishing. Google Scholar öffnen
  226. United Nations (n.d.): Charter of the United Nations, available at: http://www.un.org/en/sections/un-charter/chapter-i/index.html [accessed: 06/12/2016]. Google Scholar öffnen
  227. United Nations General Assembly (2016): Report of the Special Rapporteur on the right to privacy, UN Doc. A/71/368, distributed on 08/30/2016, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/71/368 [accessed: 09/05/2017]. Google Scholar öffnen
  228. United Nations General Assembly (2014): Promotion and protection of human rights and fundamental freedoms while countering terrorism. Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, UN Doc. A/69/397, distributed on 09/23/2014, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/69/397 [accessed: 05/17/2016]. Google Scholar öffnen
  229. United Nations General Assembly (2013): Resolution 68/167, The Right to Privacy in the Digital Age, 13/18/2013, UN Doc. A/RES/68/167, distributed on 01/21/2014, available at: http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/68/167 [accessed: 05/17/2016]. Google Scholar öffnen
  230. United Nations General Assembly (1998): Official Records, Fifty-third session, 7th plenary meeting, 11/211998, UN Doc. A/53/PV.7, available at: http://www.un.org/documents/a53pv7.pdf [accessed: 06/13/2016]. Google Scholar öffnen
  231. United Nations General Assembly (1968): Resolution 2450 (XXIII). Human rights and scientific and technological developments, available at: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/244/10/IMG/NR024410.pdf?OpenElement [accessed: 01/17/2016]. Google Scholar öffnen
  232. United Nations Human Rights Council (2016): Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, Advanced Unedited Version, UN Doc. A/HRC/31/64, distributed on 03/08/2016, available at: http://www.ohchr.org/EN/Issues/Privacy/SR/Pages/SRPrivacyIndex.aspx [accessed: 05/17/2016]. Google Scholar öffnen
  233. United Nations Human Rights Council (2014a): The right to privacy in the digital age. Report of the Office of the United Nations High Commissioner for Human Rights, UN Doc. A/HRC/27/37, distributed on 06/30/2014, available at: http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx [accessed: 05/17/2016]. Google Scholar öffnen
  234. United Nations Human Rights Council (2014b): Concluding observations on the fourth periodic report of the United States of America, 04/23/2014, UN Doc. CCPR/C/USA/CO/4, available at: http://www.refworld.org/docid/5374afcd4.html [accessed: 05/18/2016]. Google Scholar öffnen
  235. United States Government Publishing Office (2001): Uniting and strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, available at: https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf [accessed: 04/19/16]. Google Scholar öffnen
  236. Van Schaack, Beth (2014): The United States� Position on the Extraterritorial Application of Human Rights Obligations: Now is the Time for Change, in: International Law Studies, Vol. 90, pp. 20�65. Google Scholar öffnen
  237. V�eneky, Silja (2017): Espionage, Security Interests, and Human Rights in the Second Machine Age. NSA Mass Surveillance and the Framework of Public International Law, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 492�507. Google Scholar öffnen
  238. Walen, Alec (2017): Forth Amendment Rights for Nonresident Aliens, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 282�303. Google Scholar öffnen
  239. Warren, Samuel/Louis Brandeis (1890): The Right to Privacy, in: Harvard Law Review, Vol. 4, No. 5, pp. 193�220. Google Scholar öffnen
  240. Weadon, Patrick D. (2009): Sigsaly Story, available at: https://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/sigsaly_story.shtml [Accessed: 01/14/2016]. Google Scholar öffnen
  241. Weisselberg, Charles (2010): Constitutional criminal procedure and civil rights in the shadow of the �war on terror.� A look at recent United States decisions and the rhetoric of terrorism, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 71�87. Google Scholar öffnen
  242. Westin, Alan (1970): Privacy and Freedom, New York: Ahteneum. Google Scholar öffnen
  243. Wiener, Antje (2014): A Theory of Contestation, Heidelberg: Springer. Google Scholar öffnen
  244. Winterfeld, Steve/Jason Andress (2013): The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice, New York: Elsevier. Google Scholar öffnen
  245. Wheeler, Brian (2004): �This goes no further��, in: BBC news, 03/02/04, available at: http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm [accessed: 04/19/16]. Google Scholar öffnen
  246. Wright, David/Reinhard Kreissl (2015): European responses to the Snowden revelations, in: Surveillance in Europe, David Wright/Reinhard Kreissl (eds.), London: Routledge, pp. 6�50. Google Scholar öffnen
  247. Zedner, Lucia (2009): Security, New York: Routledge. Google Scholar öffnen
  248. Zengerle, Patricia (2013): U.S. lawmakers want sanctions on any country taking in Snowden, in: Reuters, 07/25/2013, available at: http://www.reuters.com/article/us-usa-security-congress-idUSBRE96O18220130725 [accessed: 05/28/2016]. Google Scholar öffnen
  249. Zurawski, Nils (2015): Technische Innovationen und deren gesellschaftliche Auswirkungen im Kontext von �berwachung, Schriftenreihe Sicherheit, Nr. 16, Jochen Schiller et al. (eds.), Berlin: Forschungsforum �ffentliche Sicherheit. Google Scholar öffnen

Ähnliche Veröffentlichungen

aus dem Schwerpunkt "Regierung & Regierungslehre & Verwaltung", "Vergleichende Politikforschung & Länderstudien", "Internationale Beziehungen"
Cover des Buchs: Die politische Rechte in Lateinamerika
Sammelband Vollzugriff
Nadja Ahmad, Hans-Jürgen Burchardt, Kristina Dietz, Hannes Warnecke-Berger, Jonas Wolff
Die politische Rechte in Lateinamerika
Cover des Buchs: Weltbilder und Weltordnung
Lehrbuch Kein Zugriff
Gert Krell, Peter Schlotter, Alexandra Homolar, Frank A. Stengel
Weltbilder und Weltordnung
Cover des Buchs: Arenen des Diskurses
Sammelband Kein Zugriff
Thomas Schölderle, Laura Martena
Arenen des Diskurses
Cover des Buchs: Europa
Monographie Kein Zugriff
Hans Jörg Schrötter
Europa