652
Views
4
CrossRef citations to date
0
Altmetric
Secrecy in Europe

Second order secrecy and Europe’s legality mosaics

References

  • Abazi, Vigjilenca (2015). ‘Secrecy and Oversight in the European Union. the Law and Practice of Classified Information’, unpublished PhD thesis, University of Amsterdam.
  • Albrecht, Jan Philipp (2016). ‘How the GDPR Will Change the World’, European Data Protection Law Review, 2:3, 287–289.10.21552/EDPL/2016/3/4
  • Aldrich, Richard, and Daniela Richterova (2018). ‘Ambient Accountability: Intelligence Services in Europe and the Decline of State Secrecy’, West European Politics, doi: 10.1080/01402382.2017.1415780.
  • Amoore, Louise (2011). ‘Data Derivatives. on the Emergence of a Security Risk Calculus for Our times’, Theory, Culture and Society, 28:6, 24–43.
  • Amoore, Louise (2013). The Politics of Possibility. Durham and London: Duke University Press.10.1215/9780822377269
  • Anderson, David (2015). A Question of Trust: Report of the Investigatory Powers Review. London: The Independent Reviewer of Terrorism Legislation, available at https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review (accessed 20 February 2017).
  • Argomaniz, Javier (2009). ‘When the EU is the ‘Norm-Taker’: The Passenger Name Records Agreement and the EU’s Internalization of US Border Security Norms’, Journal of European Integration, 31:1, 119–136.10.1080/07036330802503981
  • Ballaschk, Julia (2015). 'Interoperability of Intelligence Networks in the European Union: An Analysis of the Policy of Interoperability in the EU's Area of Freedom, Security and Justice and Its Compatibility with the Right to Data Protection’, unpublished PhD thesis, University of Copenhagen.
  • Birchall, Clare (2011). ‘“There’s Been Too Much Secrecy in This City”: the False Choice between Secrecy and Transparency in US Politics’, Cultural Politics, 7:1, 133–156.10.2752/175174311X12861940861905
  • Boehm, Franziska (2012). Information Sharing and Data Protection in the Area of Freedom, Security and Justice, towards Harmonized Data Protection Principles for Information Exchange at EU-Level. Heidelberg: Springer.
  • Bok, Sissela (1989). Secrets: On the Ethics of Concealment and Revelation. New York, NY: Vintage Books.
  • Bovens, Mark, and Stavros Zouridis (2002). ‘From Street-Level to System-Level Bureaucracies: How Information and Communication Technology is Transforming Administrative Discretion and Constitutional Control’, Public Administrative Review, 62:2, 174–184.10.1111/puar.2002.62.issue-2
  • Brito Bastos, Filipe (2018). ‘Beyond Executive Federalism. The Judicial Crafting of the Law of Composite Administrative Decision-Making’, unpublished Ph.D. thesis, European University Institute.
  • Broeders, Dennis (2016). ‘The Secret in the Information Society’, Philos. Technol., 29:3, 293–305.10.1007/s13347-016-0217-3
  • Brouwer, Evelien (2011). ‘Legality and Data Protection Law: The Forgotten Purpose of Purpose Limitation’, in Leonard Besselink, Frans Pennings and Sacha Prechal (eds.), The Eclipse of the Legality Principle in the European Union. Kluwer: Alphen aan den Rijn, 273–294.
  • Busch, Andreas (2013). ‘The Regulation of Transborder Data Traffic: Disputes across the Atlantic’, Security and Human Rights, 23:4, 313–330.10.1163/18750230-99900035
  • Busch, Heiner, and Matthias Monroy. (2017), Counter-Terrorism and the Inflation of Databases, http://statewatch.org/analyses/no-316-ct-and-inflation-eu-databases.pdf
  • Colonna, Liane (2016). Legal Implications of Data Mining: Assessing the European Union’s Data Protection Principles in Light of the United States Government’s National Intelligence Data Mining Practices. Visby: Ragulka förlag.
  • Curtin, Deirdre (2014). ‘Overseeing Secrets in the EU: A Democratic Perspective’, JCMS: Journal of Common Market Studies, 52:3, 684–700.10.1111/jcms.2014.52.issue-3
  • Curtin, Deirdre (2016). ‘Executive Power’, in D. Patterson and A. Södersten (eds.), A Companion to European Law and International Law. Oxford: Blackwell, 109–118.
  • Curtin, Deirdre, and Christina Eckes (2017). Secrecy inside and outside: EU External Relations in Focus. Swedish Institute for European Policy Studies, available at http://www.sieps.se/sites/default/files/Sieps%202016_13%20web.pdf (accessed 21 February 2017).
  • De Witte, Bruno (2016). ‘Member State Competences – Is There Such a Thing?’ European Legal Studies Conference, College of Europe.
  • Eckes, Christina (2009). EU Counter-Terrorist Policies and Fundamental Rights: The Case of Individual Sanctions. Oxford: Oxford University Press.10.1093/acprof:oso/9780199573769.001.0001
  • Eckes, Christina (2014). ‘EU Restrictive Measures against Natural and Legal Persons: From Counterterrorist to Third Country Sanctions’, Common Market Law Review, 51:4, 869–905.
  • European Commission (2016). ‘High Level Expert Group on Information Systems and Interoperability: Scoping Paper’, Activity Report ( 20 June 2016), available at http://ec.europa.eu/transparency/regexpert/index.cfm?do=groupDetail.groupDetail&groupID=3435 (accessed 20 February 2017), 6.
  • European Parliament and Council (2001). Regulation (EC) No 1049/2001 of 30 May 2001 regarding Public Access to European Parliament, Council and Commission Documents. OJ 2001 L 145/43.
  • European Parliament and Council (2004). Directive (EC) No 2004/38 of 29 April 2004 on the right of citizens of the Union and their family members to move and reside freely within the territory of the Member States amending Regulation (EEC) No 1612/68 and repealing Directives 64/221/EEC, 68/360/EEC, 72/194/EEC, 73/148/EEC, 75/34/EEC, 75/35/EEC, 90/364/EEC, 90/365/EEC and 93/96/EEC.
  • European Parliament and Council (2006). Directive 2006/24/EC of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. OJ L 105/54.
  • European Parliament and Council (2016a). Regulation 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). OJ 2016 L 119/1.
  • European Parliament and Council (2016b). Directive 2016/681 of 27 April 2016 on the use of passenger name record (PNR) data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime. OJ 2016 L 119/132.
  • European Parliament and Council (2016c). Regulation 2016/794 of 11 May 2016 on the European Union Agency for Law Enforcement Cooperation (Europol) and replacing and repealing Council Decisions 2009/371/JHA, 2009/934/JHA, 2009/935/JHA, 2009/936/JHA and 2009/968/JHA. OJ 2016 L 135/53.
  • European Union (2012). Agreement between the European Union and the United States of America on the processing and transfer of passenger name records to the United States Department of Homeland Security. OJ L 204/16.
  • Fenster, Mark (2017). The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information. Stanford: Stanford University Press.
  • Fundamental Rights Agency (2017). ‘Fundamental Rights Interoperability’, available at http://fra.europa.eu/en/publication/2017/fundamental-rights-interoperability.
  • Galli, Francesca (2016). ‘Digital Rights Ireland as an Opportunity to Foster a Desirable Approximation of Data Retention Provisions’, Maastricht Journal of European and Comparative Law, 23:3, 460–477.
  • General Court (2015). ‘Rules of Procedure’, Rules of Procedure of the General Court. OJ L 105/1.
  • de Goede, Marieke (2012). Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis, MN: University of Minnesota Press.10.5749/minnesota/9780816675890.001.0001
  • de Goede, Marieke, and Gavin Sullivan (2016). ‘The Politics of Security Lists’, Environment and Planning D: Society and Space, 34:1, 67–88.10.1177/0263775815599309
  • de Goede, Marieke, Anna Leander, and Gavin Sullivan (2016). ‘Introduction: The Politics of the List’, Environment and Planning D: Society and Space, 34:1, 3–13.10.1177/0263775815624561
  • High-Level Expert Group on Information Systems and Interoperability (2017). Final Report, Ref.Ares(2017)2412067 – 11/05/17, available at http://ec.europa.eu/transparency/regexpert/index.cfm?do=groupDetail.groupDetailDoc&id=32600&no=1 (accessed 9 November 2017).
  • Horn, Eva (2011). ‘Logics of Political Secrecy’, Theory, Culture & Society, 28:7-8, 103–122.10.1177/0263276411424583
  • Jasanoff, Sheila (2016). The Ethics of Invention: Technology and the Human Future. New York, NY: W.W. Norton & Company.
  • King, Julian (2017). ‘Commissioner King’s Remarks on Interoperability’, Presentation of the final HLEG report for the LIBE Committee at the European Parliament, Brussels, 29 May 2017, available at https://ec.europa.eu/commission/commissioners/2014-2019/king/announcements/commissioner-kings-remarks-interoperability-presentation-final-hleg-report-libe-committee-european_en (accessed 20 June 2017).
  • Koivisto, Ida (2016). ‘The Anatomy of Transparency: The Concept and Its Multifarious Implications’, EUI Working Paper MWP 2016/09.
  • Kuner, Christopher (2017). ‘Data Protection, Data Transfers and International Agreements: The CJEU’s Opinion 1/15’, available at http://verfassungsblog.de/data-protection-data-transfers-and-international-agreements-the-cjeus-opinion-115/.
  • Lynskey, Orla (2016). The Foundations of EU Data Protection Law. Oxford: Oxford University Press.
  • Lyon, David (2015). Surveillance after Snowden. Cambridge: Polity Press, 10.
  • Meijer, Albert (2015). ‘Transparency’, in M. Bovens, R. E. Goodin, and Th. Schillemans (eds.), The Oxford Handbook of Public Accountability. Oxford: Oxford University Press, 508–521.
  • Mitsilegas, Valsamis (2009). ‘The Borders Paradox: The Surveillance of Movement in a Union without Internal Frontiers’, in Hans Lindahl (ed.), A Right to Inclusion and Exclusion? Normative Fault Lines of the EU's Area of Freedom, Security and Justice. Portland, ME: Hart Publishing, 33–64.
  • Mitsilegas, Valsamis (2015). ‘The Transformation of Privacy in an Era of Pre-Emptive Surveillance’, Tilburg Law Review, 20:1, 35–57.10.1163/22112596-02001006
  • Mitsilegas, Valsamis (2016). ‘Surveillance and Digital Privacy in the Transatlantic “War on Terror”: The Case for a Global Privacy Regime’, Columbia Human Rights Law Review, 47:3, 1–77.
  • Mitsilegas, Valsamis, and N. Vavoula (2017). ‘The Normalisation of Surveillance of Movement in an Era of Reinforcing Privacy Standards’, in P. Bourbeau (ed.), Handbook on Migration and Security. London: Edward Elgar, 232–252.
  • Pasquale, Frank (2015). The Black Box Society. The Secret Algorithms That Control Money and Information. Cambridge: Harvard University Press.10.4159/harvard.9780674736061
  • Peters, Anne (2013). ‘Towards Transparency as a Global Norm’, in A. Peters and A. Bianchi (eds), Transparency in International Law. Cambridge: Cambridge University Press, 534.10.1017/CBO9781139108843
  • Pozen, David (2005). ‘The Mosaics Theory, National Security, and the Freedom of Information Act’, Yale Law Journal, 115:3, 628–679.
  • Pozen, David (2010). ‘Deep Secrecy’, Stanford Law Review, 62:2, 257–339.
  • Prins, C., D. Broeders, H. Griffioen, A.-G. Keizer, and E. Keymolen (2011). iGovernment. Amsterdam: Amsterdam University Press.
  • Scheingold, Stuart A. (1974). The Politics of Rights: Lawyers, Public Policy, and Political Change. New Haven: Yale University Press.
  • Scheppele, Kim Lane (2011). ‘Global Security Law and the Challenge to Constitutionalism after 9/11’, Public Law, 2011:2, 353–377.
  • Scheppele, Kim Lane (2012). ‘Judges as Architects’, Yale Journal of Law & the Humanities, 24:1, 345–396.
  • Scheppele, Kim Lane (2013). From a War on Terrorism to Global Security Law. Institute for Advanced Study, available at https://www.ias.edu/ideas/2013/scheppele-terrorism (accessed 21 February 2017).
  • Schoenfeld, Gabriel (2010). Necessary Secrets: National Security, the Media, and the Rule of Law. New York, NY: W.W. Norton & Company.
  • Schrijvers, Erik, Bart Van der Sloot, and Dennis Broeders (eds.) (2016). Exploring the Boundaries of Big Data. Amsterdam: Amsterdam University Press.
  • Setty, Sudha (2017). National Security Secrecy: Comparative Effects on Democracy and the Rule of Law. Cambride: Cambridge University Press.
  • Staeheli, Urs (2012). ‘Listing the Global: Dis/Connectivity beyond Representation?’, Distinktion: Scandanvian Scandinavian Journal of Social Theory, 13:3, 233–246.10.1080/1600910X.2012.724646
  • Sullivan, Gavin (2014). ‘Transnational Legal Assemblages and Global Security Law: Topologies and Temporalities of the List’, Transnational Legal Theory, 5:1, 81–127.10.5235/20414005.5.1.81
  • Sullivan, Gavin (2017). ‘The Law of the List: UN Counterterrorism Sanctions and the Politics of Global Security Law’, unpublished Ph.D. manuscript.
  • Thompson, Dennis (1999). ‘Democratic Secrecy’, Political Science Quarterly, 114:2, 181–193.10.2307/2657736
  • Tuori, Kaarlo (2015). European Constitutionalism. Cambridge: Cambridge University Press.10.1017/CBO9781316091883
  • Vavoula, Niovi (2016). ‘Immigration and Privacy in the Law of the EU: The Case of Databases’, PhD thesis (unpublished), Queen Mary University of London.
  • Vervaele, John (2013). ‘Surveillance and Criminal Investigation : Blurring of Thresholds and Boundaries in the Criminal Justice System ?’, in S. Gutwirth and P. De Hert (eds.), Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges. Heidelberg: Springer, 115–128.
  • Vismann, Cornelia (2008). Files: Law and Media Technology. Stanford: Stanford University Press.
  • Von Bogdandy, Armin, and Philipp Dann (2008). ‘International Composite Administration: Conceptualizing Multi-Level and Network Aspects in the Exercise of International Public Authority’, German Law Journal, 9:11, 2013–2039.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.