Culegerea de informații de securitate națională în era digitală – dimensiunea etică
Claudia Lascateu - martie 1, 2020– Rezoluția Adunării Generale a Organizației Națiunilor Unite referitoare la Dreptul la viață privată în Era Digitală, nr. 68/167, 21.01.2014;
– Rezoluția Parlamentului European EU Strategic Communication to Counteract Anti-EU Propaganda by Third Parties, 2016/2030;
– Regulamentul (UE) 2016/679 publicat în Jurnalul Oficial al Uniunii din 04.05.2016 – Parlamentul European – GDPR;
– Directiva (UE) 2016/680 a Parlamentului European și a Consiliului din 27 aprilie 2016 privind protecția persoanelor fizice referitor la prelucrarea datelor cu caracter personal de către autoritățile competente în scopul prevenirii, depistării, investigării sau urmăririi penale a infracțiunilor sau al executării pedepselor și privind libera circulație a acestor date și de abrogare a Deciziei-cadru 2008/977/JAI a Consiliului;
– Ordinul Executiv al președintelui Trump „Creșterea siguranței publice în interiorul SUA” nr. 13768 din 25.01.2017;
– OSCE, OSCE shares experiences with Organization of American States on how to enhance interstate co-operation, transparency, predictability and stability in cyberspace, 2018;
– European Data Protection Supervisor, Online manipulation and personal data, 3, 2018;
– Camera Reprezentanților din Senatul Statelor Unite ale Americii, Raportul comunității de informații privind măsurile active rusești,03.2018;
– Opinia Consiliului Uniunii Europene privind îmbunătățirea reținerii datelor în scopul luptei împotriva criminalității nr. 7833/19 din 27.03.2019;
– Opinia Consiliului Uniunii Europene asupra aplicării GDPR pentru Comisia Europeană nr. 12991/19 din 15.10.2019;
– Comisia Europeană, A European strategy for data, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM(2020) 66, 19.02.2020.
Publicații (alfabetic):
– Ainuvee K., The Impact of Snowden’s Revelations on the Perception of the US, Tallinn, 2013;
– Asser M. Echelon: Big Brother without a cause? BBC, 06.06.2000;
– Arredy J.T. China Aims to Rewrite Rules of Global Web, Wall Street Journal, 2015;
– Baer D.B., The European Union as a Partner Against Russian Aggression: Sanctions, Security, Democratic Institutions and the Way Forward, Declarația depusă în fața Senatului SUA, Comitetul pentru Relații Externe, 04.04.2017;
– Bauman Z., Esteves P., Guild E., Jabri V., Lyon D., Walker R.B.J. After Snowden: Rethinking the Impact of Surveillance, International Political Sociology, nr. 8, 2014;
– Bamford J. The NSA Is Building the Country’s Biggest Spy Center. Watch What You Say, Wired, 15.03.2012;
– Bigo D., Raportul privind securitatea națională și probele secrete în legislație și în fața instanțelor: explorarea dificultăților Comisia Parlamentului European pentru libertăți civile, justiție și afaceri interne (LIBE), 2014;
– Bittman L., The KGB and Soviet Disinformation: An Insider’s View, Washington: Pergamon-Brassey’s, 1985;
– Botsman R. Big Data se întâlnește cu Big Brother pe măsură ce China se ocupa cu evaluarea cetățenilor, Wired UK, 2017;
– Brandeis L., Warren S., The Right to Privacy, The Harvard Law Review nr. 4/5, 1980;
– Brimmer S.E., The Role of Ethics in 21st Century Organizations Leadership Advance online, nr. XI, 2007;
– Burns J.H., Happiness and Utility: Jeremy Bentham’s Equation, Utilitas. 2005;
– Charluet C., It’s possible to monetize data while respecting consumer privacy — here’s how, Growth, 2019;
– Chen A., The Agency, The New York Times, 02.06.2015;
– Chivvis C.S., Understanding Russian ”Hybrid Warfare” and What Can Be Done About it, RAND Corporation, CT-468, Testimony presented before the House Armed Services Committee 22.03.2017;
– Cioclei V., Manual de criminologiec, Ed. C.H. Beck, 2019;
– Clarke R.A., Liberty And Security in a Changing World, US Review Group on Intelligence and Communications Technologies, 12.12.2013;
– Cohn C., Kayyali N. The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible. Electronic Frontier Foundation, 2014;
– Coleman S., Even dirtier Hands in War: Considering Walser’s Supreme Emergency Argument, Research in Ethical Issues in Organisations, 2015;
– Comisia de la Veneția The Report on the Democratic oversight of the Security Services adoptat la cea de-a 71-a sesiune Plenară, Veneția, 1-2.06.2007;
– Constantinescu M., Iorgovan A., Murau M., Tănăsescu E.S., Constituția României revizuită comentarii și explicații, Ed. All Beck, 2004;
– Deleuze G., Postscript on the Societies of Control, The MIT Press, vol.59, 1992;
– Departamentul de Stat al SUA, A Report on Active Measures and Propaganda, 1986-1987, Washington: Department of State Publication, 1987;
– Dicționarul explicativ al limbii române, ed. 2, Academia Română, Institutul de Lingvistică, Ed. Univers Enciclopedic Gold, 2009;
– Dicey A.V., Introduction to the study of the law of the constitution, Library of Congress Cataloging in Publication Data, ed. 8, Macmillan, Londra, 1915;
– Dipert R.R., The Essential Features for an Ontology for Cyberwarfare, Conflict and Cooperation in Cyberspace, CRC Press, 2013;
– Dorell O., Alleged Russian Political Meddling Documented in 27 Countries Since 2004, USA Today, 2017;
– Factbox: Who is Cambridge Analytica and what did it do?, Reuters, 23.03.2018;
– Fischer B., Okhrana: The Paris Operations of the Russian Imperial Police, Diane Publishing, 1999;
– Franklin B., Saprks J., Franklin W.T. The life of Benjamin Franklin: containing the Autobiography, with notes and a continuation, Whittemore, Niles and Hall, 31.12.1856;
– Freedom of the Net 2016: Russia Country Profile, Freedom House, 2016;
– Fried C., Privacy, Yale Law Journal, ed.3, vol. 77, 1968;
– Fuller L.L., The morality of Law, 2, Yale University Press 1969;
– Gallagher R., Extensive British Spying throughout Africa revealed in Le Monde, The Intercept, 2016;
– Galeotti M., Putin’s Hydra: Inside Russia’s Intelligence Services, European Council on Foreign Relations (ECFR), 2016;
– Galeotti M., Controlling Chaos: How Russia Manages its Political War in Europe, European Council on Foreign Relations (ECFR), 2017;
– Gowder P., The Rule of Law and Equality, Law and Philosophy, vol.32, nr. 5, Springer, 2013;
– Gellman B., US surveillance architecture includes collection of revealing internet, phone metadata. The Washington Post, 16.06.2013;
– Gellman B, DeLong M. How the NSAs MUSCULAR program collects too much data from Yahoo and Google, The Washington Post, 28.12.2013;
– Gellman B., Soltani A. NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say, Washington Post, 2013;
– Granick J. The Surveillance State’s Legalism Isn’t about Morals, It’s about Manipulating the Rules, Just Security, 13.11.2013;
– Gross H., Privacy and Autonomy în Pennock și Chapman (ed.) Nomos XIII, Atherton Press, 1971;
– Hafetz J. A Problem of Standards?: Another Perspective on Secret Law, Willian & Mary Law Review, vol.57, 2016;
– Harloe K., Neville M. Thucydides and the Modern World: Reception, Reinterpretation and Influence from Renaissance to the Present, Cambridge University Press, 2012;
– Harris S, Hudson J., Lynch C. Germany, Brazil Turn to UN to Restrain American Spies, Foreign Policy, 25.10.2013;
– Hersh S.M. Huge C.I.A. Operation Reported in U.S. Against Antiwar Forces, Other Dissidents in Nixon Years, New York TIMES, 22.12.1974;
– Ionescu D. Geolocation 101: How It Works, the Apps and Your Privacy, PCWorld, 29.03.2010;
– Internet Anonymity Will Soon Disappear, Russian Culture Minister Warns, The Moscow Times, 21.01.2019;
– Is More Gridlock Just a Hack Away? Washington Post, 09.08.2015;
– Johnson D.R., Post D.G. Law and Borders – The Rise of Law in Cyberspace, Stanford Law Review, vol. 48, 1996;
– Kant I., The Metaphysics of Ethics, 1785;
– Keane B. Open and shut: ASIS crime and the Labor Liberal cover-up, Crikey, 12.06.2015;
– Koskenniemi M., From Apology to Utopia: The Structure of International Legal Argument, Cambridge University Press, 2006;
– Kovalev A., Bodner M., The Secrets of Russia’s Propaganda War, Revealed, The Moscow Times, 2017;
– Khrennikov I., Russia Threatens to Shut Facebook Over Local Data Storage Laws, Bloomberg Technology, 26.09.2017;
– Kutz C., Secret Law and the Value of Publicity, Ratio Juris vol.22, nr. 2, 2009;
– Latimer J. A commodity-Form Critique of Mass Surveillance, Tallinn, 2017;
– Lascateu C., Medeșan A. YouTube și combaterea radicalizării, Revista Intelligence nr. 35, 2017;
– Lascateu C., Social media takes a toll on Democracy, Redefining Community in Intercultural Context, Henri Coandă Air Force Academy Publishing House, 2018;
– Lascateu C., Obiectivele Războiului hibrid rus, Geopolitica, anul XVI, nr. 74 2/2018;
– Lascateu C. The collision between public policy and technology raises the stakes for users, IKS 2018 Security and Freedom – Contemporary European Policies and Future Perspectives, RISR, no. 19-20/2018, 2019;
– Lascateu C. Date și state. Controlul teritoriului digital, Revista Intelligence nr. 39, 2019;
– Lauterpacht H. Sir, The Function of Law in the International Community, Oxford, 1933;
– Lloyd S.A., Sreedhar S. Hobbes s Moral and Political Phiosophy, Stanford Encyclopedia of Philosophy, 12.02.2012;
– Lowenthal C., Intelligence: From Secrets to Policy, ed. 7, CQ Press, 2017;
– Lynch C., Harris S., Hudson J. Germany, Brazil Turn to U.N. to Restrain American Spies, Foreign Policy, 14.10.2013;
– Lubin A. Espionage as a Sovereign Right under International Law and its Limits, ILSA, vol 24, nr. 3, 2016;
– Lucas G., Ethics and Cyber Warfare. The Quest for Reasonable Security in the Age of Digital Warfare, Oxford University Press, 2017;
– MacIntyre A. Intractable Disputes about the Natural Law: Alasdair MacIntyre and critics, University of Notre Dame, 2009;
– McChesney R., Foster J.B. Surveillance Capitalism: Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age. vol. 66 nr. 3 Monthly Review iulie -august 2015;
– Medine D., Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court. Privacy and Civil Liberties Oversight Board 2014;
– Michael M.G., Michael K., National Security: The Social Implications of the Politics of Transparency, University of Wollongong, 2006;
– Milanovic M., Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age, Harvard International Law Journal, vol.56, nr. 1, 2015;
– Mody S.S. National Cyberspace Regulation: Unbundling the concept of jurisdiction, Stanford Journal of International Law, vol. 37, 2001;
– Moglen E., Snowden and the Future: Part IV; Freedom’s Future, 2013;
– Moore J.N. Solving the War Puzzle: Beyond the Democratic Peace, Carolina Academic Press, 2017;
– Montefiore S., The Romanovs, Knopf A.A., 2016;
– Nash N. Holding Compuserve Responsible, New York Times, 1996;
– Nast C., Interference-Based Jurisdiction Over Violations of the Right to Privacy, EJIL: Talk!, 21.11.2013;
– Nellis S, Cadell C, Apple moves to store iCloud keys in China, raising human rights fears, Reuters, 2018;
– Northcott C., The Role, Organisation and Methods of MI5, International Journal of Intelligence and Counterintelligence nr. 20/3, 2007;
– Oboler A., Welsh K., Cruz L. The danger of big data: Social media as computational social science, First Monday, 2012;
– O’Brian D. China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, Electronic Frontier Foundation, 2019;
– Omand D. Sir, Mass Electronic Surveillance and Liberal Democracy, Research Centre in International Relations, Department of War studies, King s College London, 21.01.2014;
– Parent W.A., Privacy, Morality and the Law, Philosophy and Public Affairs vol.12/4, 1983;
– Pennock J.R., Chapman J.W., Privacy: Nomos XIII Atherton Press, 1971;
– A. Society s nervous system: building effective government, energy and public health systems, Pervasive and Mobile Computing, vol. 7, nr. 6, 2011;
– Piel S., Tilouine J. British spying: tentacles reach across Africa’s heads of states and business leaders, Le Monde, 2016;
– Putin’s Asymmetric Assault on Democracy in Russia and Europe: Implications for U.S. National Security, A Minority Staff Report Prepared for The Use of The Committee on Foreign Relations United States Senate, U.S. Government Publishing Office, 10.01.2018;
– Raine A., Yang Y. Neural foundations of moral reasoning and antisocial behavior. Social Cognitive and Affective Neuroscience, nr. 1, vol.3, 2006;
– Reed C. Internet Law: Text and Materials, 2, Cambridge University Press, 2004;
– Rödl și partenerii, Legea privind confidențialitatea datelor din India și GDPR al Uniunii Europene, 24.05.2018;
– Russia Censors Media by Blocking Websites and Popular Blog, The Guardian, 14.03.2014;
– Russia Passes Law to Force Websites onto Russian Servers, Reuters, 04.07.2014;
– Sánchez-Bordona C. The means and methods of combating terrorism must be compatible with the requirements of the rule of law, comunicat de presă nr. 4/20, CJUE,15.01.2020;
– Sanger D.E., O’Neil J. White House Begins New Effort to Defend Surveillance Program, The New York Times, 23.01.2006;
– Satter R. și alții, Russia Hackers Pursued Putin Foes, Not Just US Democrats, Associated Press, 02.11.2017;
– Schlanger M. Intelligence Legalism and the National Security Agency s Civil Liberties Gap, University of Michigan Law School Scholarship Repository, 2015;
– Schoen F., Lamb J. C., Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference, Strategic Perspectives, 2012;
– Sferle A. Limbajul juridic și limba comună, Universitatea Tibiscus Timișoara, Universite Paris III Sorbonne Nouvelle, 2005;
– Shils E., Privacy: Its Constitution and Vicissitudes, Law and Contemporary Problems 31/2, ed Universității Duke, 1966;
– Shklar J. Legalism: Law, Morals, and Political Trials 1, Harvard University Press 1964, reed.1986;
– Soldatov A., Borogan I., The Red Web: The Kremlin’s War on the Internet, PublicAffairs, 2015;
– Sprigman C. The NSA’s Culture of “Legal Compliance” Still Breaks the Law, Just Security, 2014;
– Stone G. R. Secrecy and Self-Governance, 56 New York Law School Law Review 81, 2011;
– Tallinn Manual on the International Law Applicable To Cyber Warfare, Prepared by the International Group of Experts at the Invitation of The NATO Cooperative Cyber Defence Centre of Excellence, Cambridge University Press 2013;
– Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. 2, Cambridge University Press, 2017;
– Taylor L., Floridi L., van der Sloot B. Group Privacy: new challenges of data technologies, Springer, 2017;
– Thompson K. Foucault – Surveillance and Control, Crime and Deviance, Revise Sociology, 2016;
– Wakefield J. Russia „Successfully tests” its unplugged internet, BBC, 24.12.2019;
– Watts R. William Hague: British public have ‘nothing to fear’ from US spies, The Telegraph, 09.06.2013;
– Weinstein M.A. The Uses of Privacy in the Good Life, Privacy: Nomos XIII, Atherton, 1971;
– Westin A.F., Privacy and Freedom, ed. Bodley Head, Londra, 1967;
– Whitehead T., New powers to record every phone call and email makes surveillance ‘60m times worse, Telegraph, 2012;
– Wilkinson M, Cronau P. Drawing the Line, ABC, 24.03.2014;
– Xia L, Leo Z., China’s Cybersecurity Law: An Introduction for Foreign Businesspeople, China Briefing, 2018;
– Yannakogeorgos P., The Prospects for Cyber Deterrence: American Sponsorship of Global Norms, Conflict and Cooperation in Cyberspace: The Challenge to National Security, US Air Force Research Institute, 2013;
– Zeng M. Metadata Types and functions NISO 07.10.2016;
– Zuboff S. Big other: surveillance capitalism and the prospects of an information civilization, Journal of Information Technology, 2015.
Arhive
- martie 2024
- februarie 2024
- ianuarie 2024
- decembrie 2023
- noiembrie 2023
- octombrie 2023
- septembrie 2023
- august 2023
- iulie 2023
- iunie 2023
- mai 2023
- aprilie 2023
- martie 2023
- februarie 2023
- ianuarie 2023
- decembrie 2022
- noiembrie 2022
- octombrie 2022
- septembrie 2022
- august 2022
- iulie 2022
- iunie 2022
- mai 2022
- aprilie 2022
- martie 2022
- februarie 2022
- ianuarie 2022
- decembrie 2021
- noiembrie 2021
- octombrie 2021
- septembrie 2021
- august 2021
- iulie 2021
- iunie 2021
- mai 2021
- aprilie 2021
- martie 2021
- februarie 2021
- ianuarie 2021
- decembrie 2020
- noiembrie 2020
- octombrie 2020
- septembrie 2020
- august 2020
- iulie 2020
- iunie 2020
- mai 2020
- aprilie 2020
- martie 2020
- februarie 2020
- ianuarie 2020
- decembrie 2019
- noiembrie 2019
- octombrie 2019
- septembrie 2019
- august 2019
- iulie 2019
- iunie 2019
- mai 2019
- aprilie 2019
- martie 2019
- februarie 2019
- ianuarie 2019
- decembrie 2018
- noiembrie 2018
- octombrie 2018
- septembrie 2018
- august 2018
- iulie 2018
- iunie 2018
- mai 2018
- aprilie 2018
- martie 2018
- februarie 2018
- ianuarie 2018
- decembrie 2017
- noiembrie 2017
- octombrie 2017
- septembrie 2017
- august 2017
- iulie 2017
- iunie 2017
- mai 2017
- aprilie 2017
- martie 2017
- februarie 2017
- ianuarie 2017
- decembrie 2016
- noiembrie 2016
- octombrie 2016
- septembrie 2016
- august 2016
- iulie 2016
- iunie 2016
- mai 2016
- aprilie 2016
- martie 2016
- februarie 2016
- ianuarie 2016
- decembrie 2015
- noiembrie 2015
- octombrie 2015
- septembrie 2015
- august 2015
- iulie 2015
- iunie 2015
- mai 2015
- aprilie 2015
- martie 2015
- februarie 2015
- ianuarie 2015
Calendar
L | Ma | Mi | J | V | S | D |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |
Lasă un răspuns
Trebuie să fii autentificat pentru a publica un comentariu.