Published in July 2018.
This module is a resource for lecturers
This section recommends advanced readings for students interested in exploring the topic(s) of this Module in more detail, and for lecturers teaching the Module.
International/regional legal framework
- International Commission of Jurists (2009). Assessing Damage, Urging Action: Report of the Eminent Jurists Panel on Terrorism, Counter-terrorism and Human Rights. Geneva. Pp. 69-74.
- United Nations, General Assembly, Human Rights Council (2014). Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Ben Emmerson . 11 March, A/HRC/25/59, pp. 6-10 and 18-20.
- United Nations, General Assembly, Human Rights Council (2009). Report of the United Nations Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Martin Scheinin . 28 December. A/HRC/13/37.
- United Nations, General Assembly, Human Rights Council (2013). Report of the United Nations Special Rapporteur on Freedom of Expression, Frank La Rue . 17 April. A/HRC/23/40/.
- United Nations, General Assembly, Human Rights Council (2016). Negative effects of terrorism on the enjoyment of all human rights and fundamental freedoms: Report of the United Nations High Commissioner for Human Rights . 30 December. A/HRC/34/30.
- United Nations, General Assembly (2015). Annex to the letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General: International code of conduct for information security . 13 January. A/69/723.
- National Research Council (2008). Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment . Washington, DC: The National Academies Press. See especially Appendices H and K.
- Inter-American Commission on Human Rights (2009). Annual Report of the Office of the Special Rapporteur for Freedom of Expression . 30 December. OEA/Ser.L/V/II. Doc. 51.
- The African Declaration on Internet Rights and Freedoms .
- International Federation for Human Rights (2007). Human Rights Violations in Sub-Saharan African Countries in the Name of Counter-Terrorism: A High Risks Situation . November 2007 - N°483/2.
- European General Data Protection Regulation 2018 . European Union, European Parliament and Council (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons regarding the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). » For a summary of the provisions.
- Luna, Jorge R., Maricarmen S. Buzarquis, Katiza Rodriguez, and David Bogado (2016). " State Communications Surveillance and the Protection of Fundamental Rights in Paraguay." Electronic Frontier Foundation.
- Xynou, Maria (2017). Policy Recommendations for Surveillance Law in India and an Analysis of Legal Provisions on Surveillance in India and the Necessary & Proportionate Principles .
- Wagner, Daniel (2017). " Artificial Intelligence and Virtual Terrorism." HuffPost, 17 August.
- Lyon, David (2016). " 'Liquid' Surveillance, Digital Citizenship and New Ways of Living Online." Council of Europe Videos, 21 June.
- Inter-American Commission of Human Rights (2013). Freedom of Expression and the Internet . OEA/Ser.L/V/II. CIDH/RELE/INF. 11/13. Washington, D.C., General Secretariat Organization of American States. Pp. 53-79.
- United Nations, OHCHR (2017). Letter of the Special Rapporteur on the right to privacy Joseph Cannataci to Japan . 18 May. OL JPN 3/2017.
- Segal, Aaron, Bryan Ford, and Joan Feigenbaum (2014). " Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance." 45h USENIX Workshop on Free and Open Communications on the Internet, San Diego, CA, 18 August.
- Popp, Robert, and John Pindexter (2006). " Countering Terrorism through Information and Privacy Protection Technologies." IEEE Security & Privacy, vol. 4, issue 6.
- Xynou, Maria, and Elonnai Hickok (2015). " Security, Surveillance and Data Sharing Schemes and Bodies in India." The Centre for Internet & Society.
- Taylor, Nick (2014). " To find the needle do you need the whole haystack? Global surveillance and principled regulation." The International Journal of Human Rights, vol. 18, issue 1, pp. 45-67.
- Friedland, Steven I. (2014). " The difference between invisible and visible surveillance in a mass surveillance world." Elon University Law Legal Studies Research Paper No. 2014-02.
- Saptharishi , Mahesh (2017). " The New Eyes of Surveillance: Artificial Intelligence and Humanizing Technology." Wired.
- Johns, Fleur (2016). " Global Governance Through the Pairing of List and Algorithm." Environment and Planning D: Society and Space, vol. 34, issue 1, pp. 126-149.
- Watt, Eliza (2017). " The right to privacy and the future of mass surveillance." The International Journal of Human Rights, vol. 21, issue 7, pp. 773-799.
- Bernal, Paul (2016). " Data gathering, surveillance and human rights: recasting the debate." Journal of Cyber Policy, vol. 1, issue 2, pp. 243-264.
- Georgieva, Ilina (2015). " The Right to Privacy under Fire - Foreign Surveillance under the NSA and the GCHQ and Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR." Utrecht Journal of International and European Law, vol. 31, issue 80, pp. 104-130.
- Conley, Chris (2014). Metadata: piecing together a privacy solution: A report by the ACLU of California February 2014 . ACLU of Northern California.
- Milanovic, Marko (2015). " Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age." Harvard International Law Journal, vol. 56, no. 1, pp. 81-146.
- Hankey, Stephanie, and Daniel Ó. Clunaigh (2013). " Rethinking Risk and Security of Human Rights Defenders in the Digital Age." Journal of Human Rights Practice, vol. 5, issue 3, pp. 535-547.
- Kampmark, Binoy (2014). " Restraining the Surveillance State: A Global Right to Privacy." Journal of Global Faultlines, vol. 2, no. 1, pp. 1-16.
- Siserman, Cristina (2013). " A Global Perspective on the Protection of Privacy and Related Human Rights in Countering the Use of Internet for Terrorist Purposes." Masaryk University journal of law and technology, vol. 7, no. 2, pp. 401- 422.
- Rosenzweig, Paul (2010). " Privacy and Counter-Terrorism: The Pervasiveness of Data." Case Western Reserve Journal of International Law, vol. 42, issue 3, pp. 625-646.
- Ozcan, Mehmet, and Fatma Yilmaz (2007). " Pendulum Swings in between Civil Rights and Security: EU Policies against Terrorism in the Light of the PNR Case." Review of International Law and Politics , vol. 3, issue 12, pp. 97-116.
- Eijkman, Quirine, and Bibi van Ginkel (2011). " Compatible or Incompatible - Intelligence and Human Rights in Terrorist Trials." Amsterdam Law Forum, vol. 3, no. 4, pp. 3-16.
- Reuters (2017). " Most unwilling to give up privacy to thwart attacks new poll finds." Newsweek, 4 April.
- Altshuler, Yaniv, Nadav Aharony, Micky Fire, Yuval Elovici, and Alex Pentland (2012). " Incremental learning with accuracy prediction of social and individual properties from mobile-phone data." IEEXplore: Digital Library, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 969-974.
- Lapowsky, Issie (2017). " Banks deploy AI to cut off terrorists' funding." Wired, 7 September.
- Moskowitz , Peter (2015)." The Future of Policing Is Here, and It's Terrifying ." GQ, 9November.
- Geiss, Robin (2006). " Asymmetric conflict structures." International Review of the Red Cross, vol. 88, no. 864, pp. 757-777.
- International Committee of the Red Cross (2012). " New technologies and warfare." International Review of the Red Cross, vol. 94, no. 886.
- Rawnsley, Adam, and Noah Shahtman (2011). " Crazy military tracking tech, from super scents to quantum dots." Wired, 18 May.
- Fielding-Smith, Abigail, and Crofton Black (2015). " When You Mess Up, People Die: Civilians Who are Drone Pilots' Extra Eyes." The Guardian,30 July.
- Ward, Olivia (2013). " Earthlings, there is no place to hide - drone strikes blur the laws of war." Toronto Star, 3 February.
Accountability and oversight
- International Commission of Jurists (2009). Assessing Damage, Urging Action: Report of the Eminent Jurists Panel on Terrorism, Counter-terrorism and Human Rights. Geneva. Ch. 4: "The role of intelligence: intelligent counterterrorism?"