BREAKING :) abstract and download of my Ph.D. thesis ‘Securing Private Communications’ [open access]

The academic version of my thesis — titled ‘Securing Private Communications’ — is available online. I already committed it to the web in my previous blogpost on my public Ph.D. defense on 25 November 2015 (open to the public). But a friend of mine told me to once again post my abstract and download link for my thesis separately and make that clear in the title of the post. And make it BREAKING news. Ha! Here goes. 

The full title of my thesis is Securing private communications – Protecting private communications security in EU law: fundamental rights, functional value chains and market incentives. The academic version is available open access, here. Below there’s a short summary of the book.

The print edition will be published by Kluwer Law International in a few months. It includes rigorous editing and a few substantial updates to include recent developments such as the CJEU safe harbor judgement. I wasn’t allowed to change my academic version since sending it to my Committee in the start of September 2015. By the way, it’s the first time Kluwer ever publishes a work in their legal series under a Creative Commons license.

Abstract

Communications security has become a major concern for law- and policymakers around the world. The continuing string of Snowden disclosures, breached iCloud accounts of megastars and successful hacks of cars cruising the highway are just some of the countless prominent examples of severe incidents, that illustrate our dependence on private communications security and make us realize that our private communications are systematically insecure. In response, the EU lawmaker has launched several sweeping reforms of EU communications security legislation in the last two years. Against this background, the study chose as its central research question: how should the EU lawmaker protect private communications security?

The study contains the first in-depth historical analysis in the legal literature of over three decades of EU communications security law (Part I). Subsequently, the study researched concepts and tools for the EU lawmaker in fundamental rights law, computer science and the political sciences (Part II). The study then developed a procedural model for EU communications security legislation, which was tested in two case studies on communications protocol HTTPS and ‘cloud’ communications through the lens of the Snowden disclosures, operation MUSCULAR in particular (Part III).

The study concludes (Part IV) that the EU lawmaker can and must augment private communications security, but fails to integrate several crucial fundamental rights, socio-technical and market developments outlined in this study. The study therefore recommends a fundamental reconceptualization of EU communications security law and offers five suggestions on how to reorganize its very foundations:

  1. Afford basic and comprehensive protection to meet new positive obligations from EU fundamental rights law;
  2. Make explicit the implicit and covert capture of the EU policy agenda by national security interests of the Member States and align these with fundamental rights;
  3. Afford protection along the entire functional value chain of networked communications, rather than merely to ‘personal data’ or a narrow set of market actors.
  4. Correct deep and persistent market failures in networked communications;
  5. Use the analytical model of Part III as a new departing point for protecting private communications.

If the EU lawmaker fails to integrate the first four recommendations, EU law is at serious risk of repeating the conceptual shortcomings of the past, of reinforcing existing systemic vulnerabilities and market failures, as well as leaving the fundamental rights of 500 million citizens insufficiently protected.

The study adopted a multi-disciplinary approach, combining legal research methods with insights and original research from computer science, security economics and the political sciences. It is the first academic study of its kind on the thorny conundrum of securing private communications through EU law.

1,414 thoughts on “BREAKING :) abstract and download of my Ph.D. thesis ‘Securing Private Communications’ [open access]”

  1. I beloved as much as you will obtain carried out proper here. The cartoon is tasteful, your authored subject matter stylish. nevertheless, you command get got an impatience over that you would like be handing over the following. ill no doubt come more before once more since precisely the similar just about a lot steadily inside case you defend this hike.

  2. What i don’t realize is in reality how you are no longer actually a lot more neatly-liked than you may be now. You’re so intelligent. You understand thus considerably when it comes to this topic, produced me for my part consider it from numerous various angles. Its like women and men are not involved until it¡¦s something to accomplish with Girl gaga! Your individual stuffs excellent. All the time handle it up!

  3. I’m really impressed with your writing skills as well as with the layout on your blog. Is this a paid theme or did you customize it yourself? Either way keep up the excellent quality writing, it is rare to see a great blog like this one today..

  4. I just could not depart your website before suggesting that I extremely enjoyed the standard information a person provide for your visitors? Is gonna be back often to check up on new posts

  5. Good blog post. What I would like to bring up is that laptop memory is required to be purchased when your computer still can’t cope with what you do along with it. One can mount two RAM boards having 1GB each, as an illustration, but not one of 1GB and one of 2GB. One should make sure the manufacturer’s documentation for the PC to be sure what type of storage it can take.