References
- Alpaydin, Ethem. 2014. Introduction to Machine Learning. Cambridge: MIT.
- Amoore, Louise. 2014. “Security and the Claim to Privacy.” International Political Sociology 8 (1): 108–112. doi: 10.1111/ips.12044
- Anderson, David. 2015. A Question of Trust: Report of the Investigatory Powers Review Presented to the Prime Minister Pursuant to Section 7 of the Data Retention and Investigatory Powers Act 2014. https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Print-Version.pdf.
- Andrejevic, Mark. 2013. Infoglut: How Too Much Information Is Changing the Way We Think and Know. New York: Routledge.
- Arai-Takahashi, Yutaka. 2002. The Margin of Appreciation Doctrine and the Principle of Proportionality in the Jurisprudence of ECHR. Antwerp: Intersentia.
- Bosco, Francesca, Niklas Creemers, Valeria Ferraris, Daniel Guagnin, and Bert-Jaap Koops. 2015. “Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities.” In Reforming European Data Protection Law, edited by Serge Gutwirth, Ronald Leenes, and Paul de Hert, 3–33. Dordrecht: Springer.
- Cheney-Lippold, John. 2011. “A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control.” Theory, Culture & Society 28 (6): 164–181. doi: 10.1177/0263276411424420
- Christoffersen, Jonas. 2009. Fair Balance: Proportionality, Subsidiarity and Primarity in the European Convention on Human Rights. Leiden: Martinus Neijhoff.
- Citron, Danielle. 2007. “Technological Due Process.” Washington University Law Review 85: 1249–1313.
- Citron, Danielle, and Frank Pasquale. 2011. “Network Accountability for the Domestic Intelligence Apparatus.” Hastings Law Journal 62: 1441–1494.
- Citron, Danielle, and Frank Pasquale. 2014. “The Scored Society: Due Process for Automated Predictions.” Washington Law Review 89 (1): 1–33.
- Corera, Gordon. 2015. “UK Surveillance ‘Lacks Transparency’ ISC Report Says.” BBC, March 12. www.bbc.com/news/uk-31845338.
- Cormen, Thomas, Charles Leiserson, Ronald Rivest, and Clifford Stein. 2009. Introduction to Algorithms. Cambridge: Massachusetts Institute of Technology.
- Crampton, Jeremy. 2015. “Collect It All: National Security, Big Data and Governance.” GeoJournal 80 (4): 519–531. doi: 10.1007/s10708-014-9598-y
- Crawford, Kate, and Jason Schultz. 2014. “Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms.” Boston College Law Review 55 (1): 93–128.
- Danezis, George. 2016. “A Technical Reading of the ‘HIMR Data Mining Research Problem Book.’” Conspicuous Chatter, February 3. https://conspicuouschatter.wordpress.com/2016/02/03/a-technical-reading-of-the-himr-data-mining-research-problem-book/.
- De Hert, Paul, and Serge Gutwirth. 2009. “Data Protection in the Case Law of Strasbourg and Luxembourg: Constitutionalisation in Action.” In Reinventing Data Protection?, edited by Serge Gutwirth, Yves Poullet, Paul de Hert, Sjaak Nouwt, and Cécile de Terwangne, 3–44. Dordrecht: Springer.
- De Zwart, Melissa, Sal Humphreys, and Beatrix Van Dissel. 2014. “Surveillance, Big Data and Democracy: Lessons for Australia from the US and UK.” University of New South Wales Law Journal 37 (2): 713–747.
- Electronic Frontier Foundation. n.d. “The Government’s Word Games When Talking About NSA Domestic Spying.” EFF. https://www.eff.org/nsa-spying/wordgames.
- Eligon, John, and Timothy Williams. 2015. “Police Program Aims to Pinpoint Those Most Likely to Commit Crimes.” New York Times, September 24. http://www.nytimes.com/2015/09/25/us/police-program-aims-to-pinpoint-those-most-likely-to-commit-crimes.html?_r=0.
- European Commission for Democracy Through Law (Venice Commission). 2015. Update of the 2007 Report on the Democratic Oversight of the Security Services and Report on the Democratic Oversight of Signals Intelligence Agencies Study No. 719/2013 (CDL-AD(2015)006). Strasbourg: Council of Europe. http://www.venice.coe.int/webforms/documents/default.aspx?pdffile=CDL-AD(2015)006-e.
- Felten, Edward. 2013. “Declaration of Professor Edward W Felten.” Submission in American Civil Liberties Union v Office of the Director of National Intelligence, 13-cv-03994 (WHP), August 26. https://www.aclu.org/files/pdfs/natsec/clapper/2013.08.26%20ACLU%20PI%20Brief%20-%20Declaration%20-%20Felten.pdf.
- Flach, Peter. 2012. Machine Learning: The Art and Science of Algorithms That Make Sense of Data. Cambridge: Cambridge University Press.
- Gellman, Barton, and Ashkan Soltani. 2013a. “NSA Collects Millions of E-Mail Address Books Globally.” Washington Post, October 14. https://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html.
- Gellman, Barton, and Ashkan Soltani. 2013b. “NSA Tracking Cellphone Locations Worldwide, Snowden Documents Show.” The Washington Post, December 4. http://wapo.st/IIaYWp.
- Gerards, Janneke. 2012. “The Prism of Fundamental Rights.” European Constitutional Law Review 8 (2): 173–202. doi: 10.1017/S1574019612000144
- Gibbs, Samuel. 2014. “Gmail Does Scan All Emails, New Google Terms Clarify.” The Guardian, April 15. https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify.
- Gillespie, Tarleton. 2016. “Algorithm.” In Digital Keywords, edited by Ben Peters, 18–30. Princeton, NJ: Princeton University Press.
- Grothoff, Christian, and J. M. Porup. 2016. “The NSA’s SKYNET Program May Be Killing Thousands of Innocent People.” Ars Technica UK, February 16. http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/.
- Harcourt, Bernard. 2007. Against Prediction: Profiling, Policing, and Punishing in an Actuarial Age. Chicago, IL: University of Chicago Press.
- Heumann, Milton, and Lance Cassak. 2001. “Profiles Injustice? Police Discretion, Symbolic Assailants, and Stereotyping.” Rutgers Law Review 53: 918–978.
- Johns, Fleur. 2015. “Global Governance Through the Pairing of List and Algorithm.” Environment and Planning D: Society and Space 33 (1): 126–149.
- Korff, Douwe. 2010. “Technologies for the Use of Images: Automated Processes of Identification, Behavioural Analysis and Risk Detection Control at the Airports.” Seminar presentation at Spanish Data Protection Agency Seminar, Madrid, June 9–11.
- Korff, Douwe. 2012. “Comments on Selected Topics in the Draft EU Data Protection Regulation.” London Metropolitan University, September 18. http://ssrn.com/abstract=2150145.
- Korff, Douwe. 2015. Passenger Name Records, Data Mining and Data Protection: The Need for Strong Safeguards. Strasbourg: Council of Europe. https://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD(2015)11_PNR%20draft%20report%20Douwe%20Korff%20&%20Marie%20Georges_15%2006%202015.pdf.
- Maass, Peter. 2015. “Inside NSA, Officials Privately Criticize ‘Collect It All’ Surveillance.” The Intercept, May 28.
- MacCormick, John. 2012. Nine Algorithms That Changed the Future. Princeton, NJ: Princeton University Press.
- McIntyre, T. J. 2016. “Judicial Oversight of Surveillance: The Case of Ireland in Comparative Perspective.” In Judges as Guardians of Constitutionalism and Human Rights, edited by Martin Scheinin, Helle Krunke, and Marina Aksenova, 136–162. Cheltenham: Edward Elgar.
- Miller, Gabriel. 2013. “Activity-based Intelligence Uses Metadata to Map Adversary Networks.” Defense News, July 8.
- Moody, Glyn. 2016. “GCHQ’s Data-mining Techniques Revealed in New Snowden Leak.” Ars Technica UK, February 3. http://arstechnica.co.uk/tech-policy/2016/02/gchqs-data-mining-techniques-revealed-in-new-snowden-leak/.
- Moraes, Claude ( Committee on Civil Liberties, Justice and Home Affairs). 2014. Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs. Brussels: European Parliament. https://polcms.secure.europarl.europa.eu/cmsdata/upload/73108fba-bb11-4a0b-83b8-54cc99c683b5/att_20140306ATT80632-1522917198300865812.pdf.
- Mueller, John. 2006. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, And Why We Believe Them. New York: Free Press.
- Murphy, Maria Helen. 2016. “Algorithmic Surveillance: True Negatives.” Computers and Law 27 (3): 10–13.
- Nakashima, Ellen, and Joby Warrick. 2013. “For NSA Chief, Terrorist Threat Drives Passion To ‘Collect It All.’” Washington Post, July 14. https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html.
- Neyland, Daniel. 2016. “Bearing Account-able Witness to the Ethical Algorithmic System.” Science, Technology & Human Values 41 (1): 50–76. doi: 10.1177/0162243915598056
- O’Harrow, Robert, Dana Priest, and Marjorie Censer. 2013. “NSA Leaks Put Focus on Intelligence Apparatus’s Reliance on Outside Contractors.” Washington Post, June 10. https://www.washingtonpost.com/business/nsa-leaks-put-focus-on-intelligence-apparatuss-reliance-on-outside-contractors/2013/06/10/e940c4ba-d20e-11e2-9f1a-1a7cdee20287_story.html.
- Plouffe, Jim. 2016. “Privacy Is Dead, Tech Evangelist Tells Entrepreneurs.” InDaily, June 14. http://indaily.com.au/business/2016/06/14/privacy-is-dead-tech-evangelist-tells-entrepreneurs/.
- Rich, Michael. 2015–2016. “Machine Learning, Automated Suspicion Algorithms, and the Fourth Amendment.” University of Pennsylvania Law Review 164: 871–930.
- Richards, Neil, and Jonathan King. 2013. “Three Paradoxes of Big Data.” Stanford Law Review Online, September 3.
- Rowley, Coleen. 2014. “The Bigger the Haystack, the Harder the Terrorist Is to Find.” The Guardian, November 28. https://www.theguardian.com/commentisfree/2014/nov/28/bigger-haystack-harder-terrorist-communication-future-attacks.
- Schneier, Bruce. 2006. “Terrorists, Data Mining, and the Base Rate Fallacy.” Schneier on Security, July 10. https://www.schneier.com/blog/archives/2006/07/terrorists_data.html.
- Schneier, Bruce. 2008. “Security Vs. Privacy.” Schneier on Security, January 29. https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.
- Schneier, Bruce. 2015. Data and Goliath. New York: WW Norton & Company.
- “Secret Services Ramp Up Online Surveillance.” 2012. The Local, February 25. http://www.thelocal.de/sci-tech/20120225-40975.html.
- St Vincent, Sarah. 2016. “Did the European Court of Human Rights Just Outlaw ‘Massive Monitoring of Communications’ in Europe?” CDT, January 13. https://cdt.org/blog/did-the-european-court-of-human-rights-just-outlaw-massive-monitoring-of-communications-in-europe/.
- Thomson, Iain. 2016. “GCHQ Mass Spying Will ‘Cost Lives in Britain,’ Warns Ex-NSA Tech Chief.” The Register, January 6. http://www.theregister.co.uk/2016/01/06/gchq_mass_spying_will_cost_lives_in_britain/.
- Weil, Gordon. 1963. The European Convention on Human Rights: Background, Development and Prospects. Leiden: AW Styhoff.
- Wells, David. 2016. “Forget Needles and Haystacks – It’s more Complicated than that” Counter-terrorism Matters, March 3. https://counterterrorismmatters.wordpress.com/2016/03/03/forget-needles-and-haystacks-its-more-complicated-than-that/.
- Witten, Ian, Eibe Frank, and Mark Hall. 2011. Data Mining: Practical Machine Learning Tools and Techniques. Burlington, VT: Elsevier.
- Zarsky, Tal. 2013. “Transparent Predictions.” University of Illinois Law Review 4: 1503–1569.