<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="other">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Polit. Sci.</journal-id>
<journal-title>Frontiers in Political Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Polit. Sci.</abbrev-journal-title>
<issn pub-type="epub">2673-3145</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpos.2024.1383026</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Political Science</subject>
<subj-group>
<subject>Policy and Practice Reviews</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Accountability and oversight in the Dutch intelligence and security domains in the digital age</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Constantino</surname> <given-names>Jorge</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/2710339/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Wagner</surname> <given-names>Ben</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c002"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/716876/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Technology, Policy and Management, Delft University of Technology</institution>, <addr-line>Delft</addr-line>, <country>Netherlands</country></aff>
<aff id="aff2"><sup>2</sup><institution>Media, Technology &#x00026; Society, Inholland University of Applied Sciences</institution>, <addr-line>Hoofddorp</addr-line>, <country>Netherlands</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Alberto Asquer, SOAS University of London, United Kingdom</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Yasmin Khodary, British University in Egypt, Egypt</p>
<p>Syeda Naushin, University of Malaya, Malaysia</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Jorge Constantino <email>j.e.constantinotorres&#x00040;tudelft.nl</email></corresp>
<corresp id="c002">Ben Wagner <email>ben&#x00040;benwagner.org</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>04</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>6</volume>
<elocation-id>1383026</elocation-id>
<history>
<date date-type="received">
<day>06</day>
<month>02</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>05</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2024 Constantino and Wagner.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Constantino and Wagner</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>Accountability is considered a cornerstone of public administration and good governance. This study characterizes the relationship between the Dutch Intelligence and Secret Service (&#x0201C;AIVD&#x0201D;) and citizens (represented by parliament, courts, and oversight boards) as a complex actor-forum relationship. We utilize different accountability principles of public administration found in international and Dutch instruments and academic literature to propose workable principles of accountability for the AIVD. These proposed principles of accountability can be summarized as acting within duty, explainability, necessity, proportionality, reporting and record keeping, redress, and continuous independent oversight. Similarly, there are some conditions to support the workability of accountability principles. These conditions may be characterized as productive actor-forum relationships, cooperation, flexibility, value alignment, and learning and improving opportunities.</p></abstract>
<kwd-group>
<kwd>accountability</kwd>
<kwd>oversight</kwd>
<kwd>privacy</kwd>
<kwd>intelligence</kwd>
<kwd>security</kwd>
</kwd-group>
<counts>
<fig-count count="1"/>
<table-count count="4"/>
<equation-count count="0"/>
<ref-count count="94"/>
<page-count count="21"/>
<word-count count="18291"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Politics of Technology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Driven by broad debates on the appropriate governance of intelligence and security operations in democratic societies, accountability mechanisms, such as oversight, in many democratic countries have changed considerably in the past decades, affecting in some way privacy and data protection regulations as well as intelligence and security operations (Rekenkamer, <xref ref-type="bibr" rid="B77">2021</xref>).</p>
<p>Accountability in public administration is an essential element for good governance (Aucoin and Heintzman, <xref ref-type="bibr" rid="B3">2000</xref>). For example, the Australian Government has its own Public Governance and Accountability Act, which declares that the government and all its organizations need to meet high standards of accountability, which includes providing meaningful information to the public they serve (Newberry, <xref ref-type="bibr" rid="B72">2015</xref>). Accountability promotes trust and legitimacy of intelligence and security operations (Dommering et al., <xref ref-type="bibr" rid="B27">2017</xref>). Similarly, oversight as an accountability mechanism can contribute to ensuring that all actors are accounted for their actions (MacAskill, <xref ref-type="bibr" rid="B58">2018</xref>).<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref></p>
<p>The deployment of intelligence and security operations are necessary to protect a country from threats (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 2). However, in recent years, the use of technological tools in security and intelligence domains has given attention to concerns regarding privacy safeguards and the need for adequate oversight measures in the intelligence and security domains (Cayford et al., <xref ref-type="bibr" rid="B18">2018</xref>). For instance, in the wake of the Snowden revelations, the European Parliament called Member States, such as the Netherlands, to look closely at the Rule of Law, Fundamental Rights, and European Union Values when assessing the use of technologies for government surveillance, data processing, and sharing with other counterparts (European Parliament, <xref ref-type="bibr" rid="B33">2014</xref>).</p>
<p>Intelligence and security work cannot be treated in isolation because they concern society. In one way or another, citizens may be affected or caught in the sphere of intelligence and security work (Braat et al., <xref ref-type="bibr" rid="B14">2017</xref>; Jaffel and Larsson, <xref ref-type="bibr" rid="B48">2023</xref>, p. 234). Thus, the study of the operations of intelligence and security domains can assist society in providing an understanding of how and why intelligence and security domains operate. Similarly, the study of these domains can assist in promoting accountability principles that can balance the interest of national security and the protection of fundamental rights (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B70">2018</xref>; Commissie van Toezicht op de Inlichtingen-en Veiligheidsdiensten, 2021). To guide our study, we have formulated the following research questions:</p>
<list list-type="bullet">
<list-item><p><bold>RQ1:</bold> What common principles of accountability exist in democratic societies?</p></list-item>
<list-item><p><bold>RQ2</bold>: Why is accountability relevant for national intelligence and secret services?</p></list-item>
<list-item><p><bold>RQ3:</bold> Which common principles of accountability can be applied to the AIVD?</p></list-item>
<list-item><p><bold>RQ4:</bold> What are the tensions between different accountability principles when applied to the AIVD?</p></list-item>
</list>
<p>This study provides two main contributions: it characterizes the relationship between the Dutch Intelligence and Secret Service (&#x0201C;AIVD&#x0201D;) and citizens (represented by parliament, courts, and oversight boards) as an actor-forum relationship. Second, it proposes workable principles of accountability to be implemented among intelligence and security domains.</p>
<p>We have structured this paper into four sections to answer our research questions. Section 3 describes accountability and argues for an actor-forum relationship between the AIVD and citizens represented through parliament, courts, and independent oversight boards. Similarly, this section outlines the benefits of accountability and oversight to society and intelligence and security domains. Section 4 adopts common public service accountability principles to develop workable principles of accountability that can be applied to intelligence and security domains. This section outlines seven principles: acting within duty, explainability, necessity, proportionality, reporting and record keeping, redress, and continuous independent oversight. Similarly, there are some conditions to support the workability of accountability principles. These conditions may be characterized as productive actor-forum relationships, cooperation, flexibility, value alignment, and opportunities for learning and improving. Section 5 discusses our proposed workable principles of accountability in intelligence and security domains as an alternative to deal with AIVD&#x00027;s current struggles regarding satisfying accountability principles. Lastly, Section 6 provides conclusions and possibilities for future empirical research.</p></sec>
<sec id="s2">
<title>2 Methodology</title>
<p>To answer our research questions and elaborate on the proposed principles of accountability in intelligence and security domains, we have combined literature regarding general studies on accountability in public administration and more targeted studies on accountability in intelligence and security domains applied to democratic societies such as the Netherlands. The proposed principles were built considering the added value to national interests and futureproofing with upcoming international frameworks, such as Convention 108&#x0002B;.</p>
<p>The Intelligence and Security Services Act 2017, or in Dutch <italic>de Wet van inlichtingen en veiligheidsdiensten</italic> 2017 (<italic>Wiv</italic> 2017), served as a point of reference to focus on two key aspects directly concerning intelligence practitioners: national security and privacy in the digital ecosystem. The selection of sources to develop our workable principles of accountability in the intelligence and security domains was structured into three tiers:</p>
<list list-type="bullet">
<list-item><p><bold>International instruments</bold>, analysis regarding accountability in the intelligence sector.</p></list-item>
<list-item><p><bold>Dutch instruments</bold>, analysis regarding accountability in the intelligence sector.</p></list-item>
<list-item><p><bold>Literature review</bold> of accountability principles widely accepted among democratic states.</p></list-item>
</list>
<p>The proposed workable principles of accountability in intelligence and security domains will be utilized in future empirical research through case studies and semi-structured interviews with Dutch intelligence practitioners to study how they deal with these accountability principles in practice. We have made initial contact with the Dutch AIVD to engage in subsequent research, and they have expressed willingness to collaborate. Thus, focusing on accountability practices in intelligence and security domains, such as the Dutch AIVD, is the most logical course of this research.</p></sec>
<sec id="s3">
<title>3 Section 1. Accountability and oversight in Dutch intelligence and security domains</title>
<sec>
<title>3.1 Defining accountability</title>
<p>According to Docksey and Propp (<xref ref-type="bibr" rid="B26">2023</xref>), accountability can sometimes be understood as responsibility, answerability, controllability, liability, transparency, and a synonym for good governance. The notion of accountability varies in different senses and can be seen by scholars in a narrow and broad approach (van Puyvelde, <xref ref-type="bibr" rid="B87">2013</xref>). For instance, Bovens (<xref ref-type="bibr" rid="B11">2010</xref>) describes that there is no consensus regarding accountability and that accountability perceptions or interpretations will vary according to the era, societal roles, organizations&#x00027; agendas, and political views.</p>
<p>Fest et al. (<xref ref-type="bibr" rid="B35">2022</xref>) state that accountability can be regarded as having responsibility. However, they add that accountability also means the implementation of transparency. Equally, Flyverbom (<xref ref-type="bibr" rid="B36">2016</xref>) portrays accountability as a process that may be implemented through transparency requirements.</p>
<p>Hood (<xref ref-type="bibr" rid="B47">2010</xref>) describes accountability as the duty of an individual or organization to be answerable for their actions. Similarly, van Buuren (<xref ref-type="bibr" rid="B85">2009</xref>, p. 3) indicates that accountability may be described as a liability that involves a dynamic of actor-explanation-giving.</p>
<p>The Venice Commission 2007<xref ref-type="fn" rid="fn0002"><sup>2</sup></xref> addresses accountability as taking responsibility for errors and putting matters right. Unlike this understanding, van de Poel et al. links accountability, responsibility, and liability. van de Poel et al. (<xref ref-type="bibr" rid="B86">2012</xref>) suggests that accountability may be understood as the moral obligation to account for one&#x00027;s actions; in this sense, the notion of accountability as responsibility or liability is not mutually exclusive.</p>
<p>Furthermore, Cobbe et al. (<xref ref-type="bibr" rid="B20">2023</xref>, p. 1187), argue that accountability can be understood as a mechanism. These mechanisms can be institutionalized through oversight boards (Bovens, <xref ref-type="bibr" rid="B11">2010</xref>). Likewise, Korff et al. (<xref ref-type="bibr" rid="B54">2017</xref>) and Fox (<xref ref-type="bibr" rid="B37">2007</xref>), state that accountability can be materialized by setting up oversight institutions that, in turn, will adopt other accountability mechanisms, such as transparency, to complete the performance of supervisory duties in the light of accountability.</p>
<p>Accountability is applied in different fields, such as climate change, medicine, technology, law, and public administration. For instance, accountability in the medical field is applied as a social responsibility concept where all actors involved have a high degree of responsibility and accountability due to the significant impact of their work on society (Mohammadi et al., <xref ref-type="bibr" rid="B66">2020</xref>). Bagave et al. (<xref ref-type="bibr" rid="B4">2022</xref>) argue that accountability applied in human-technology studies requires professionals to explain their decisions when using data or technological tools to support their tasks. This requirement can enable legal consequences on actors to justify their conduct or behavior (Bagave et al., <xref ref-type="bibr" rid="B4">2022</xref>). Docksey and Propp (<xref ref-type="bibr" rid="B26">2023</xref>) have established that accountability is also used in the legal field; for example, the <italic>European General Data Protection Regulation</italic> (GDPR) recognizes accountability as the legal responsibility of data controllers to ensure data quality. Hood (<xref ref-type="bibr" rid="B47">2010</xref>) explains that accountability is a central point in public administration. It can be said that accountability in democratic societies supports the Rule of Law, subjecting all government organizations to the same scrutiny standards as the ones applied to citizens, preventing government arbitrariness against citizens (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B68">2019</xref>, <xref ref-type="bibr" rid="B69">2023</xref>, p. 48; Cobbe et al., <xref ref-type="bibr" rid="B19">2020</xref>).</p>
<sec>
<title>3.1.1 Actor-forum relationship</title>
<p>In accountability theory, historically, the actor was understood as the &#x0201C;accounter&#x0201D; and the forum as the &#x0201C;account holder&#x0201D; (Pollitt, <xref ref-type="bibr" rid="B76">2003</xref>). Thus, it can be said that the actor-forum relationship requires at least two parties involved.</p>
<p>Bovens and Wille (<xref ref-type="bibr" rid="B12">2021</xref>) understand that in this actor-forum relationship, the actor must justify their conduct. Then, the forum may formulate questions and pass judgment on the actor, leading to potential consequences (Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>). It may be explained as follows: Party &#x0201C;A&#x0201D; (one or more actors) should account (explain and or justify) for a particular task entrusted by party &#x0201C;B&#x0201D; (the forum or forums). Party &#x0201C;B&#x0201D; is considered the &#x0201C;recipient of accountability,&#x0201D; where party &#x0201C;B&#x0201D; has the right to ask questions and demands and can ultimately pass sanctions where appropriate (Dur&#x000E1;n, <xref ref-type="bibr" rid="B30">2016</xref>).</p>
<p>Similarly, Grant and Keohane identify the actor-forum relationship as a principal-agent relationship,<xref ref-type="fn" rid="fn0003"><sup>3</sup></xref> stating that this relationship implies a particular obligation on the part of the actor or agent to behave in a certain way (Grant and Keohane, <xref ref-type="bibr" rid="B42">2005</xref>). This type of figure is commonly used or known in Anglo countries where the &#x0201C;principal-agent&#x0201D; relationship arises from a trusted assignment (Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref>; Dur&#x000E1;n, <xref ref-type="bibr" rid="B30">2016</xref>). Either connotation would result in the same outcome: requiring the actor or agent to provide an account or to be responsible before their forum or principals.</p>
<p>It is worth noting that it is not feasible for citizens to govern directly. Instead, in democratic societies, citizens elect their representatives and executive government to govern their nation (Aucoin and Heintzman, <xref ref-type="bibr" rid="B3">2000</xref>). Hence, the end recipient to demand accountability is the people -the forum. However, people entrust forum powers to their parliamentarians and executive government to control, question, examine, or pass judgment on other actors entrusted with a particular task or power (Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref>). The accountability relationship may be illustrated through a recent scandal concerning the Dutch government. The outgoing Dutch prime minister, Mark Rutte, was caught in one of the major scandals in recent Dutch history: the <italic>toeslagenaffaire</italic> (see text footnote 3). Rutte&#x00027;s government was held accountable for targeting vulnerable families and falsely accusing them of tax fraud. Rutte and his ministers -the actors- were called by the parliament -the forum- to render an account of the events. The Rutte administration was forced to resign, and the government was obligated to compensate the victims of the <italic>toeslagenaffaire</italic>.</p>
<p>In light of the above finding, we define accountability as the actor&#x00027;s duty to provide meaningful answers about their actions, which includes explaining and justifying decisions, to the forum. Depending on the context, this duty to account for actions may raise posterior consequences such as political responsibility and or legal liability. We also note that accountability as a big umbrella can include different mechanisms or principles, such as oversight or transparency, to assure good governance in public and private organizations.</p></sec></sec>
<sec>
<title>3.2 Intelligence and security work</title>
<p>Security work is characterized as defensive, meaning that it is designed to protect national security (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 3). The main feature of intelligence work is offensive, characterized by investigations made abroad in the interest of national security. Security work requires intelligence to collect small pieces of information to prevent possible unwanted events threatening national security (Cayford and Pieters, <xref ref-type="bibr" rid="B17">2018</xref>).</p>
<p>Traditionally, national security was seen as a necessity to protect from war. However, in recent years, protecting national security is also concerned with protecting the legal order. The Court of Justice of the European Union (CJEU) has established that the legal order may be understood as upholding the values of the rule of law, which the European Union has adopted.<xref ref-type="fn" rid="fn0004"><sup>4</sup></xref> The Dutch government has broadly defined national security as the protection against threats that may jeopardize one or more critical interests of the Dutch state and the legal order that could result in social disruption (Ministerie van Justitie en Veiligheid, <xref ref-type="bibr" rid="B65">2019</xref>).</p>
<p>Protecting the legal order may also be understood as fighting terrorism (Korff et al., <xref ref-type="bibr" rid="B54">2017</xref>; Neumann, <xref ref-type="bibr" rid="B71">2023</xref>, p. 18), which translates to international cooperation among intelligence and security organizations by processing and sharing data to combat common &#x0201C;enemies&#x0201D; (e.g., terrorism, extremism, cybercrime) that threaten European Values and Human Rights (van Puyvelde, <xref ref-type="bibr" rid="B88">2020</xref>). For example, the Dutch government supports data sharing and international cooperation with other intelligence and secret services to combat jihadist terrorism (Belgian Standing Intelligence Agencies Review Committee, <xref ref-type="bibr" rid="B5">2018</xref>, p. 3). These dynamics enable different actors, beyond traditional intelligence and security work, to cooperate and share information -including personal data- internationally (Bigo, <xref ref-type="bibr" rid="B6">2019</xref>). Thus, it may argued that the work of intelligence and secret services has changed from the traditional view of national security and intelligence to protect the nation from war. With new threats, including cyber-attacks on the nations&#x00027; infrastructures, intelligence and security operations have expanded to international cooperation with other partners. This cooperation includes deploying digital surveillance and sharing processed data to protect the legal order and prevent crime or terrorism (Arnold, <xref ref-type="bibr" rid="B2">1952</xref>; Braat et al., <xref ref-type="bibr" rid="B14">2017</xref>; Bigo, <xref ref-type="bibr" rid="B6">2019</xref>; Jaffel and Larsson, <xref ref-type="bibr" rid="B48">2023</xref>, p. 221).</p>
<p>In the Netherlands, the tasks of the Dutch Intelligence and Secret Service (&#x0201C;AIVD&#x0201D;) include conducting investigations and intelligence analyses against persons or organizations that may represent a threat to the democratic legal order, safety, or other vital interests of the Dutch nation.<xref ref-type="fn" rid="fn0005"><sup>5</sup></xref> Similarly, they are tasked with security screenings.<xref ref-type="fn" rid="fn0006"><sup>6</sup></xref> The scope and powers to conduct these investigations and intelligence analysis are governed under their legal framework, the Intelligence and Security Services Act 2017, or in Dutch <italic>de Wet van inlichtingen en veiligheidsdiensten</italic> 2017 (&#x0201C;<italic>Wiv</italic> 2017&#x0201D;). The AIVD is legally allowed to process data -including personal data- to protect national security, the legal order, and any other interests of the Dutch nation.<xref ref-type="fn" rid="fn0007"><sup>7</sup></xref> For example, suppose the AIVD is granted permission to investigate a target suspected of terrorism. In that case, they may request airline passengers&#x00027; data from Dutch customs to analyze data streams regarding the assigned task. However, the power or scope to conduct these investigations is limited to this specific target. It means that the AIVD cannot -or should not- use these powers to pursue other investigations, such as security clearance assessments regarding other individuals. In essence, the AIVD must not misuse their power to request information for purposes outside their assigned task. Otherwise, the misuse of power can lead to risks such as unlawfully breaching fundamental rights&#x02014;e.g., the right to privacy.<xref ref-type="fn" rid="fn0008"><sup>8</sup></xref></p>
<p>Intelligence and security work is a challenging task. Intelligence and security domains face different levels of complexity; every day, they deal with threats that may determine the stability or instability of a nation (Menkveld, <xref ref-type="bibr" rid="B60">2021</xref>). Cayford and Pieters describe intelligence and security work as a difficult puzzle because apparent insignificant pieces of data or information may become significant. In contrast, apparent significant pieces of data or information may become insignificant. For instance, certain protestors may represent a more significant deal than others, leading to tipping points and major events. However, one of the problems that intelligence and security work face in identifying these risks is knowing where the &#x0201C;edge of chaos&#x0201D; lies.<xref ref-type="fn" rid="fn0009"><sup>9</sup></xref> This point of uncertainty has led intelligence and secret services to favor gathering bulk datasets to fight potential threats.<xref ref-type="fn" rid="fn0010"><sup>10</sup></xref> At this stage, it must be acknowledged that intelligence and security domains&#x00027; role -or duty- is to save lives by preventing threats against national security and society (Cayford and Pieters, <xref ref-type="bibr" rid="B17">2018</xref>). Thus, their work is essential because they assist decision-makers in becoming aware of threats and act against them (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 5).</p></sec>
<sec>
<title>3.3 Privacy and data protection caveats</title>
<p>The previous section will inevitably lead us to consider privacy and data protection caveats in the work of intelligence and security domains. In principle, the term privacy can be vague and ambiguous (Solove, <xref ref-type="bibr" rid="B80">2007</xref>, p. 754, 755). For example, the <italic>Wiv</italic> 2017 only provides us with the meaning of data, personal data, and data processing. However, the <italic>Wiv</italic> 2017 is unclear and does not define the meaning of privacy.<xref ref-type="fn" rid="fn0011"><sup>11</sup></xref></p>
<p>Pierucci and Walter, members of the Committee of Convention 108&#x0002B;, have declared that privacy and data protection are fundamental rights that must concern a democratic society living in the digital age. They have stated that these rights need adequate protection and cannot be compromised (Pierucci and Walter, <xref ref-type="bibr" rid="B75">2020</xref>). Pierucci and Walter have stressed that this condition of a fundamental right is also recognized by the United Nations (Resolution 68/167), outlining that privacy and data should not be subject to unlawful or arbitrary surveillance because it violates the right to privacy and undermines a democratic society (Pierucci and Walter, <xref ref-type="bibr" rid="B75">2020</xref>).</p>
<p>Naarttij&#x000E4;rvi notes that under Articles 7 and 8 of the European Charter of Fundamental Rights (&#x0201C;the Charter&#x0201D;) and Article 8 of the European Convention on Human Rights (&#x0201C;ECHR&#x0201D; &#x0201C;the Convention&#x0201D;) (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B70">2018</xref>), privacy is a concrete recognized fundamental right as well as data protection.<xref ref-type="fn" rid="fn0012"><sup>12</sup></xref> Zuboff (<xref ref-type="bibr" rid="B94">2019</xref>) reflects on the right to privacy, outlining that it entails protecting one&#x00027;s information because privacy belongs to the most intimate sphere of a person. Although privacy, or the right to private life, has been settled by different national and international courts as a fundamental right protected against government intrusion, such as surveillance, the right to privacy is not absolute and is to be measured against other necessities, such as national security (Taylor, <xref ref-type="bibr" rid="B82">2011</xref>).</p>
<p>In the previous section, we acknowledged that the work of security and intelligence domains can be difficult because sometimes they work under information uncertainty, making the case for justifying data processing. However, while acknowledging the necessity to protect the country from national threats, it is appropriate to highlight that collecting bulk datasets by intelligence and security domains is an intrusive method against the right to privacy. Thus, the collection of bulk datasets not only targets criminals or suspects of a crime but also targets innocent civilians who do not threaten national security. In this regard, intelligence and security work needs to be considered from both angles: the one that protects national security from threats and the one that requires due observance of fundamental rights, such as the right to privacy and data protection.</p>
<p>In summary, national security and privacy protection matter. Intelligence practitioners deal with threats to national security daily; they are bound to encounter uncertainties that must be untangled before they start putting puzzles together to protect national security. This challenge creates room for a gray area where intelligence practitioners face tradeoffs and decision-making that must be measured against a dynamic society governed by the rule of law. For instance, times of peace may not require the deployment of special powers that intrude into the right to privacy, while unsettling times may require the exercise of special powers. Not an easy task indeed. However, in democratic societies, these dilemmas warrant addressing accountability and oversight of intelligence and security domains (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B68">2019</xref>, p. 40; Hans&#x000E9;n, <xref ref-type="bibr" rid="B45">2023</xref>).</p></sec>
<sec>
<title>3.4 Types of intelligence oversight</title>
<p>Grant and Keohane (<xref ref-type="bibr" rid="B42">2005</xref>) identify different accountability mechanisms, such as accountability within organizations, the state, courts, and peer accountability. Accountability may be materialized by introducing oversight to scrutinize the individual&#x00027;s or organization&#x00027;s use of public resources and supervising the use of legal powers or mandates (Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref>).</p>
<p>According to van Puyvelde, intelligence oversight in democratic nations has adopted different forms, such as implementing institutionalized mechanisms to supervise intelligence and security operations. These institutionalized mechanisms are predominately the legislative, the parliament, and the judiciary (van Puyvelde, <xref ref-type="bibr" rid="B87">2013</xref>). Similarly, independent and objective media, interest groups, and civil society play a role as overseers (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 6). However, their role is restricted due to intrinsic facts surrounding intelligence, such as access and release of classified information (van Puyvelde, <xref ref-type="bibr" rid="B87">2013</xref>).</p>
<p>Oversight mechanisms, such as parliament, judiciary, and independent boards, are also present in European intelligence and security work (European Union Agency for Fundamental Rights, <xref ref-type="bibr" rid="B34">2023</xref>, p. 10). For instance, in the Netherlands, the General Intelligence and Security Services (<italic>Algemene Inlichtingen- en Veiligheidsdienst</italic>) (AIVD) is governed under different types of oversight: judicial, parliamentary, independent boards, and internal organizational control (Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, <xref ref-type="bibr" rid="B63">2023a</xref>).</p>
<sec>
<title>3.4.1 Judicial oversight</title>
<p>The Vienna Commission 2007 has established the authority of courts of law in intelligence oversight to be the key holder of safeguards when intelligence and securities services exercise special powers such as electronic surveillance against individuals or organizations. Similarly, this oversight control by the courts includes the powers to hear complaints and provide sanctions for wrongdoing (see text footnote 2). For instance, in the Netherlands, the courts can hear matters related to national security and deal with disputes between citizens and the AIVD.<xref ref-type="fn" rid="fn0013"><sup>13</sup></xref></p>
<p>Born and Wills state that intelligence and security services fall under the oversight jurisdiction of courts. The reason is that courts have a duty to administer justice and make the rule of law prevail. Thus, judges have to scrutinize the activities of intelligence and security services (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 13). However, the work of courts has sometimes been restricted by the executive and -parliament- through laws that allow immunity and secrecy in matters related to national security (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 4).</p></sec>
<sec>
<title>3.4.2 Parliamentary oversight</title>
<p>Bochel and Defty (<xref ref-type="bibr" rid="B8">2017</xref>, p. 103) state that parliament oversight in intelligence and security domains is significant because it provides public trust and enables legitimacy to intelligence and security services. The oversight duties of parliament toward intelligence and secret services may include conducting budgetary audits, legal and policy compliance audits, providing education programs, investigating complaints, and facilitating information to society (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 11).</p>
<p>Despite having parliament oversight with committees focussing on security and intelligence operations. Parliament oversight has received criticism on the basis that it lacks specialized knowledge and appropriate time to conduct oversight of intelligence and secret services (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 4; Hijzen, <xref ref-type="bibr" rid="B46">2014</xref>). For instance, in the Netherlands, traditionally, the parliament had exercised oversight of intelligence and security work (Frissen, <xref ref-type="bibr" rid="B38">2016</xref>). However, Dutch parliamentary oversight has captured criticism among scholars because of being too secretive about intelligence work (de Graaff and Hijzen, <xref ref-type="bibr" rid="B24">2018</xref>). Dutch parliament in the 1970s was characterized as a ritual dance between parliamentarians -the forum- and the secret service -the actors. It was said that parliament was unwilling to supervise the work of intelligence and security operations truly (Hijzen, <xref ref-type="bibr" rid="B46">2014</xref>; Braat, <xref ref-type="bibr" rid="B13">2016</xref>; Gill, <xref ref-type="bibr" rid="B41">2020</xref>). To amend these shortcomings, in recent years, the Dutch government has implemented independent oversight boards besides parliament oversight. In practice, the parliament has broader powers to oversee the functionality of Dutch intelligence and secret services and the legality, effectiveness, and efficiency. Independent oversight boards are only tasked with legality assessments regarding the work of intelligence and secret services (AIVD/MIVD) (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 12).</p></sec>
<sec>
<title>3.4.3 Independent oversight boards</title>
<p>Different stakeholders have widely accepted independent oversight boards as an accountability mechanism (Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>, p. 856; Docksey and Propp, <xref ref-type="bibr" rid="B26">2023</xref>). For instance, in 1997, the Dutch Parliament acknowledged the need for independent oversight boards parallel to parliamentary oversight. During the Parliamentary sittings 1997&#x02013;1998, the legislators mentioned the desirability of having a specific board to supervise the legality in which the Dutch intelligence and security services operate (Kamer, <xref ref-type="bibr" rid="B52">1998</xref>). The Parliament considered the importance of balancing the exercise of special powers given to intelligence and security services and protecting fundamental rights. They considered that the use of special powers by the Dutch secret services warranted independent oversight to ensure the legality of intelligence and security operations (Kamer, <xref ref-type="bibr" rid="B52">1998</xref>). The legislator justified the need for independent oversight based on the principle of accountability (Kamer, <xref ref-type="bibr" rid="B52">1998</xref>). Moreover, the reason for introducing independent oversight boards is based on the necessity to protect civilians&#x00027; fundamental rights from the unwarranted interference of intelligence and security domains (Jansen, <xref ref-type="bibr" rid="B49">2021</xref>).</p>
<p>The <italic>Wiv</italic> 2017 enables independent oversight boards to supervise the legality of the Dutch AIVD and MIVD operations (Gill, <xref ref-type="bibr" rid="B41">2020</xref>). For instance, Articles 32 and 97 of the <italic>Wiv</italic> 2017 implement two oversight boards: <italic>Toetsingscommissie Inzet Bevoegdheden</italic> (TIB) and the <italic>Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten</italic> (CTIVD), both tasked to conduct legality assessments regarding the operations of the AIVD. The TIB oversees prior intelligence operations, while the CTIVD supervises ongoing and concluded operations of the (AIVD). The mandate of the TIB is to review the lawfulness of operations of the Dutch AIVD. The TIB carries out legality assessments to provide written prior permissions for the AIVD to exercise special powers. The decisions of the TIB are binding on the AIVD.<xref ref-type="fn" rid="fn0014"><sup>14</sup></xref> The CTIVD assesses whether the measures adopted by the AIVD are proportional and necessary to safeguard national security.<xref ref-type="fn" rid="fn0015"><sup>15</sup></xref> The CTIVD can access all places and request information held by the AIVD.<xref ref-type="fn" rid="fn0016"><sup>16</sup></xref> The CTIVD has binding powers to conduct investigations regarding the (mis)conduct or operations of the AIVD.<xref ref-type="fn" rid="fn0017"><sup>17</sup></xref></p>
<p>In summary, we have outlined that judicial oversight, parliament oversight, and independent oversight boards act as primary accountability mechanisms regarding the work of intelligence and security domains. Arguably, in the Netherlands, the primary accountability mechanism regarding the legality of intelligence and secret services operations is conducted through independent oversight boards, with a lesser degree of parliamentary oversight. Similarly, in the case of the Netherlands, court oversight is visible in exceptional matters.</p></sec></sec>
<sec>
<title>3.5 Intelligence and security in a complex actor-forum relationship</title>
<p>The Vienna Commission 2007 said intelligence services are accountable -or scrutable- under the same principles of accountability governing all public servants (see text footnote 2). Stottlemyre outlines that intelligence officials do not serve the ruling regime in office. Instead, they serve the people; intelligence practitioners provide security for the people. Therefore, their assignment is &#x0201C;protecting individuals from fear -regardless of the political context&#x0201D; (Stottlemyre, <xref ref-type="bibr" rid="B81">2023</xref>).</p>
<p>In the Dutch context, Wills and Vermeulen (<xref ref-type="bibr" rid="B93">2011</xref>, p. 41) are of the view that the Dutch intelligence and security services, as well as its ministers, ought to comply with the law and be subject to accountability. Similarly, Wills and Vermeulen (<xref ref-type="bibr" rid="B93">2011</xref>, p. 41) agreed that intelligence and security domains should account for their actions. This accountability process may be carried out through parliament oversight or independent oversight boards appointed by the parliament (Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref>, p. 41).</p>
<p>In intelligence and security domains, the actor-forum relationship can be complex due to a multi-layer of actors and forums, on occasion, playing hybrid roles. The complex actor-forum relationship involving citizens, their representatives, and other actors can be explained in <xref ref-type="fig" rid="F1">Figure 1</xref>: citizens sit at the top of the pyramid, leading to different scenarios. Firstly, citizens entrust parliament to exercise control over the executive in national security administration. In this case, the distinction between actor and forum is straightforward: Citizens, as primary recipients of accountability, are considered the forum, while the parliament entrusted with scrutiny duties are the actors. The forum can punish the actors for their shortcomings by voting them out of parliament. A second scenario may arise; parliamentarians can become a forum to the executive or a particular minister -the actor- entrusted or assigned with national security and protection of fundamental rights. In this scenario, the executive or the concerned minister acts as accountable figures for their national intelligence and secret services and the scrutiny of the parliament. These political figures are responsible for providing an account to the public through the work of the parliament (Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref>, p. 41). There is a third scenario, and feasibly more, arguably more complex because one or more actors become a forum and vice versa. For instance, intelligence and security practitioners may be answerable to several forums. An intelligence practitioner -the actor- may be accountable to their director or leading minister -the forum. Simultaneously, intelligence practitioners and their organizations -as actors- may be required to provide account to independent oversight boards -the forum.<xref ref-type="fn" rid="fn0018"><sup>18</sup></xref> Thus, intelligence practitioners are accountable actors caught in a complex actor-forum relationship. The complexity of the relationship between the actor and the forum may also lead to different challenges or frictions.<xref ref-type="fn" rid="fn0019"><sup>19</sup></xref></p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Complex actor-forum relationship in Dutch Intelligence and security domains.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpos-06-1383026-g0001.tif"/>
</fig>


<p>Lastly, it is relevant to acknowledge that in holding an organization, such as intelligence and security domains, accountable, some literature may present a valid caveat: the problem of many hands (Cobbe et al., <xref ref-type="bibr" rid="B20">2023</xref>, p. 1194). This problem argues that it is challenging to ascertain the responsibility of individuals who work as a collective (Bovens, <xref ref-type="bibr" rid="B10">1998</xref>). Although, in legal or administrative terms, it may be challenging to ascertain individual responsibility -and liability, the literature supports that in this type of scenario, individuals are expected to act with a moral duty to act or behave positively (van de Poel et al., <xref ref-type="bibr" rid="B86">2012</xref>). Thus, addressing and acknowledging that intelligence and security services are also bound under the same accountability principles of public service, being characterized as accountable intelligence actors, may provide an initial step toward solving the problem of many hands. Additionally, even in cases where legal or administrative individual responsibility is a challenge, the organization, the minister, and the government carry legal and political burdens to be accounted for (van de Poel et al., <xref ref-type="bibr" rid="B86">2012</xref>, p. 14, 15; Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>).<xref ref-type="fn" rid="fn0020"><sup>20</sup></xref></p>
<p>To summarize this section, we highlight the following: first, intelligence and security domains are to be treated under the same rules of public service accountability. Intelligence and secret services are accountable to the people they serve. The people are the forum, which delegates forum powers to the parliament to conduct oversight of intelligence and secret services. Similarly, the people have legitimized the parliament to extend forum powers to courts of law and oversight boards to supervise the lawfulness in which intelligence and security domains operate (van Puyvelde, <xref ref-type="bibr" rid="B87">2013</xref>).</p></sec>
<sec>
<title>3.6 Benefits of accountability and oversight in intelligence and security domains</title>
<p>In broad terms, there are several reasons why democratic societies are or should be interested in accountability principles in public service organizations such as intelligence and secret services (van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>, p. 4). It is argued that accountability can motivate public servants, including intelligence and secret services, to uphold positive practices (Bagave et al., <xref ref-type="bibr" rid="B4">2022</xref>). Newberry<xref ref-type="fn" rid="fn0021"><sup>21</sup></xref> considers that accountability in public service serves at its heart as a tool to protect citizens from potential abuse of powers from both the government in office and the parliament itself. Similarly, the Vienna Commission 2007, about the work of intelligence and secret services, urges the implementation of accountability safeguards to prevent misuse of power and to provide learning opportunities (see text footnote 2).</p>
<sec>
<title>3.6.1 Benefits of accountability</title>
<p>This study has found different benefits that accountability brings to intelligence and security domains. For instance, in <xref ref-type="table" rid="T1">Table 1</xref>, we observe an agreement between Bovens (<xref ref-type="bibr" rid="B11">2010</xref>) and Cobbe et al. (<xref ref-type="bibr" rid="B20">2023</xref>), to establish that accountability is vital in a democratic society because it enables the supervision of different actors to prevent and detect corrupt practices and abuse of power in government services. Similarly, van Buuren (<xref ref-type="bibr" rid="B85">2009</xref>, p. 3&#x02013;4)<xref ref-type="fn" rid="fn0022"><sup>22</sup></xref> states that intelligence and security services&#x00027; accountability prevents abuse of powers and infringement of civil liberties and promotes good governance. Furthermore, according to Ryngaert and van Eijk (<xref ref-type="bibr" rid="B78">2019</xref>), accountability provides benefits such as ascertaining responsibilities and potentially mitigating the problem of many hands.</p>


<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Benefits of accountability in intelligence and security domains.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919498;color:#ffffff">
<th valign="top" align="left"><bold>Benefits</bold></th>
<th valign="top" align="left"><bold>Source</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Prevent, detect corrupt practices, abuse of power</td>
<td valign="top" align="left">Bovens, <xref ref-type="bibr" rid="B10">1998</xref>, <xref ref-type="bibr" rid="B11">2010</xref>; van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>; Cobbe et al., <xref ref-type="bibr" rid="B19">2020</xref> (see text footnote 2)</td>
</tr> <tr>
<td valign="top" align="left">Mitigates the problem of many hands</td>
<td valign="top" align="left">Ryngaert and van Eijk, <xref ref-type="bibr" rid="B78">2019</xref></td>
</tr> <tr>
<td valign="top" align="left">Improves actor and organizational performance</td>
<td valign="top" align="left">Aucoin and Heintzman, <xref ref-type="bibr" rid="B3">2000</xref>; Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref></td>
</tr> <tr>
<td valign="top" align="left">Enables public trust or confidence</td>
<td valign="top" align="left">Aucoin and Heintzman, <xref ref-type="bibr" rid="B3">2000</xref>; Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref></td>
</tr> <tr>
<td valign="top" align="left">Good governance</td>
<td valign="top" align="left">Wieringa, <xref ref-type="bibr" rid="B92">2020</xref>; Docksey and Propp, <xref ref-type="bibr" rid="B26">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Legitimacy and resilience of intelligence and security services</td>
<td valign="top" align="left">AIVD/MIVD Report (2018&#x02013;2023)</td>
</tr></tbody>
</table>
</table-wrap>


<p>Aucoin and Heintzman recognize that accountability mechanisms or safeguards provide public trust and encourage and promote continuous organizational learning in government services. Similarly, Wills and Vermeulen (<xref ref-type="bibr" rid="B93">2011</xref>, p. 41) have established that accountability is vital because it improves the organization&#x00027;s performance and provides public confidence.</p>
<p>Wieringa (<xref ref-type="bibr" rid="B92">2020</xref>) establishes that accountability is a mechanism that facilitates better behavior of actors, allowing good governance. Similarly, in the words of Docksey and Propp (<xref ref-type="bibr" rid="B26">2023</xref>), accountability is the proactive commitment of actors to uphold ethical and legal frameworks for good governance in a democratic society.</p>
<p>The AIVD/MIVD 2018-2023 Report addressing the functioning of the Dutch intelligence and secret services (<italic>Verslag van het functioneren van de diensten</italic>) reveals that accountability contributes to the legitimacy and resilience of the intelligence and security services. This benefit of accountability was established by former director-general of the Dutch Intelligence and Security Services, Arthur Docters van Leeuwen (Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, <xref ref-type="bibr" rid="B64">2023b</xref>).</p></sec>
<sec>
<title>3.6.2 Benefits of independent oversight</title>
<p>In <xref ref-type="table" rid="T2">Table 2</xref>, we observe that according to Schillemans (<xref ref-type="bibr" rid="B79">2015</xref>), independent oversight is an opportunity for an organization to show its willingness to be accounted for, displaying good governance practices. Furthermore, Born and Wills (<xref ref-type="bibr" rid="B9">2012</xref>, p. 17) sustain that intelligence oversight is essential because it can work as a tool to enhance democratic control. This view aligns with Wetzling and Dietrich, who stated that intelligence oversight is important because it can prevent misuse of power and protect fundamental rights (see text footnote 1). This line of thought appears to have consensus among scholars and political actors. For instance, Kundnani and Hayes (<xref ref-type="bibr" rid="B55">2018</xref>, p. 18) believe that independent oversight assures intelligence practitioners are accountable in cases of excess abuse of powers. For example, independent oversight can call out unlawful or oppressive policies that harm fundamental rights, cases where human rights defenders or journalists may be exposed to unlawful surveillance practices that affect fundamental rights (Kundnani and Hayes, <xref ref-type="bibr" rid="B55">2018</xref>, p. 17). Similarly, the Dutch Parliament 1997 established that independent oversight prevents abuse of power in the intelligence and security services. Thus, to counterbalance the work of intelligence and security operations, independent oversight is required to allow adequate and effective safeguards against potential breaches of fundamental rights, such as the right to privacy and data protection (Kamer der Staten-Generaal, <xref ref-type="bibr" rid="B51">1998</xref>).</p>


<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Benefits of oversight in intelligence and security domains.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919498;color:#ffffff">
<th valign="top" align="left"><bold>Benefits</bold></th>
<th valign="top" align="left"><bold>Source</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Good governance</td>
<td valign="top" align="left">Schillemans, <xref ref-type="bibr" rid="B79">2015</xref></td>
</tr> <tr>
<td valign="top" align="left">Democratic control protecting fundamental rights</td>
<td valign="top" align="left">Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>; Kundnani and Hayes, <xref ref-type="bibr" rid="B55">2018</xref>; Vieth-Ditlmann and Wetzling, <xref ref-type="bibr" rid="B89">2021</xref>; Dutch Parliament 1997</td>
</tr> <tr>
<td valign="top" align="left">Learning and improving in intelligence and security domains</td>
<td valign="top" align="left">Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>; Gill, <xref ref-type="bibr" rid="B41">2020</xref></td>
</tr> <tr>
<td valign="top" align="left">Enables public trust</td>
<td valign="top" align="left">Braat et al., <xref ref-type="bibr" rid="B14">2017</xref>; Defty, <xref ref-type="bibr" rid="B25">2019</xref>; Gill, <xref ref-type="bibr" rid="B41">2020</xref>; Vaage and Stenslie, <xref ref-type="bibr" rid="B84">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Prevents &#x0201C;secrecy&#x0201D; shield against accountability</td>
<td valign="top" align="left">Wills and Vermeulen, <xref ref-type="bibr" rid="B93">2011</xref></td>
</tr> <tr>
<td valign="top" align="left">Legitimacy of intelligence and security domains</td>
<td valign="top" align="left">Bochel and Defty, <xref ref-type="bibr" rid="B8">2017</xref>; Braat et al., <xref ref-type="bibr" rid="B14">2017</xref>; Hans&#x000E9;n, <xref ref-type="bibr" rid="B45">2023</xref>; Vaage and Stenslie, <xref ref-type="bibr" rid="B84">2023</xref></td>
</tr></tbody>
</table>
</table-wrap>


<p>Additionally, Born and Wills (<xref ref-type="bibr" rid="B9">2012</xref>, p. 17) have established that intelligence oversight can enable the effectiveness and efficiency of intelligence and secret services. Similarly, Gill (<xref ref-type="bibr" rid="B41">2020</xref>) states that intelligence oversight allows intelligence and security domains to learn and improve from past actions to ensure that the powers of intelligence and security domains are correctly used.</p>
<p>In the same line of thought, Wills and Vermeulen (<xref ref-type="bibr" rid="B93">2011</xref>, p. 85, 86) combine the benefits of independent oversight of intelligence and security domains, establishing that oversight can prevent using secrecy, inherent to intelligence and security work, as a shield to cover up malpractices. Thus, intelligence oversight helps intelligence and security domains to stay focused on their tasks and purposes.</p>
<p>Furthermore, according to Hans&#x000E9;n (<xref ref-type="bibr" rid="B45">2023</xref>), the importance or benefit of independent oversight in intelligence and security domains is that it provides legitimacy to the work of these agencies because oversight can encourage intelligence practitioners to uphold the rule of law. Bochel and Defty (<xref ref-type="bibr" rid="B8">2017</xref>, p. 109), Braat et al. (<xref ref-type="bibr" rid="B14">2017</xref>, p. 223), and Vaage and Stenslie (<xref ref-type="bibr" rid="B84">2023</xref>), concur with this view of the benefit of accountability, establishing that intelligence oversight provides greater accountability of intelligence and security domains, strengthening their legitimacy.</p>
<p>In addressing the accountability of government services for using algorithmic methods, Meijer and Grimmelikhuijsen (<xref ref-type="bibr" rid="B59">2020</xref>, p. 54) have stressed the importance of citizens&#x00027; trust in legitimizing the government. Likewise, Gill (<xref ref-type="bibr" rid="B41">2020</xref>), when referring to intelligence and secret services, states that intelligence oversight allows trust in the operations of intelligence and security domains. Similarly, other scholars such as Braat et al. (<xref ref-type="bibr" rid="B14">2017</xref>, p. 223), Defty (<xref ref-type="bibr" rid="B25">2019</xref>), and Vaage and Stenslie (<xref ref-type="bibr" rid="B84">2023</xref>), also consider that intelligence oversight enables public trust for the work performed by intelligence and secret services.</p>
<p>To summarize this section, intelligence and security domains, using data and technologies in their everyday tasks, need to be subject to democratic control (Gill, <xref ref-type="bibr" rid="B41">2020</xref>). Independent oversight boards enable democratic control, supporting fundamental rights and providing means for resilient and trustworthy intelligence and security domains. The dismissal of accountability and oversight mechanisms in intelligence and security domains harms the institution&#x00027;s legitimacy and harms a democratic society (Solove, <xref ref-type="bibr" rid="B80">2007</xref>, p. 766).</p>
<p>In answering question one, some of the common principles of accountability in democratic societies are taking responsibility, being answerable, explaining and justifying decisions, and fostering oversight (the actor-forum relationship). In answering question two, following <xref ref-type="table" rid="T1">Tables 1</xref>, <xref ref-type="table" rid="T2">2</xref>, we have identified some common agreement regarding the benefits of accountability and oversight to society and intelligence and security communities: preventing or detecting corrupt practices and abuse of power, protecting fundamental rights, mitigating the problem of many hands, improving individual and organization performance, enables public trust, provides legitimacy and resilience of intelligence and security domains.</p></sec></sec></sec>
<sec id="s4">
<title>4 Section 2: workable principles of accountability for intelligence and security domains</title>
<p>In Section 3, &#x0201C;Accountability and oversight in dutch intelligence and security domains&#x0201D;, we have provided an inventory of the different definitions or conceptualizations of accountability in public service that can be useful to intelligence and security domains. We have also highlighted the importance of accountability in the actor-forum relationships between the AIVD and citizens, represented by supervisors such as the CTIVD, TIB, parliament, and judicial oversight.</p>
<p>In Section 4, we conduct desk research analysis, including a literature review and national and international legal and policy instruments, to gather some fundamental accountability principles commonly applied to public service, including intelligence and security domains, to develop <xref ref-type="table" rid="T3">Table 3</xref>, &#x0201C;Key accountability principles applicable to intelligence and security domains&#x0201D;. These proposed principles can be summarized as acting within duty, explainability, necessity, proportionality, reporting and record keeping, redress, and continuous independent oversight. These intertwined principles aim to provide a starting point to address the challenges in intelligence and security domains regarding protecting national security and fundamental rights. Similarly, in our study, we found that different scholars have suggested that the viability of applying accountability principles across organizations would depend on the conditions supporting the good intentions of accountability. This factor is summarized in <xref ref-type="table" rid="T4">Table 4</xref>, &#x0201C;Conditions supporting workable accountability&#x0201D;: productive actor-forum relationships, cooperation, flexibility, value alignment, and learning and improving opportunities.</p>


















































<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Key accountability principles applicable to intelligence and security domains.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919498;color:#ffffff">
<th valign="top" align="left"><bold>Principle</bold></th>
<th valign="top" align="left"><bold>International instruments</bold></th>
<th valign="top" align="left"><bold>Dutch instruments</bold></th>
<th valign="top" align="left"><bold>Literature review</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Acting within duty</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13); CJEU<italic>: La Quadrature du Net and Others</italic> (ECLI:EU:C:2020:791)</td>
<td valign="top" align="left">Articles 8 and 24 <italic>Wiv 2017</italic></td>
<td valign="top" align="left">van Buuren, <xref ref-type="bibr" rid="B85">2009</xref>; Vaage and Stenslie, <xref ref-type="bibr" rid="B84">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Explainability</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13)</td>
<td valign="top" align="left">Article 60(3) <italic>Wiv</italic> 2017</td>
<td valign="top" align="left">Doshi-Velez et al., Forthcoming; Molander et al., <xref ref-type="bibr" rid="B67">2012</xref>; Meijer and Grimmelikhuijsen, <xref ref-type="bibr" rid="B59">2020</xref>; de Bruijn et al., <xref ref-type="bibr" rid="B23">2022</xref>; Fest et al., <xref ref-type="bibr" rid="B35">2022</xref></td>
</tr> <tr>
<td valign="top" align="left">Necessity</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13); CJEU<italic>: La Quadrature du Net and Others</italic> (ECLI:EU:C:2020:791)</td>
<td valign="top" align="left">Court of the Hague: ECLI:NL:RBDHA:2014:8966</td>
<td valign="top" align="left">Bigo et al., <xref ref-type="bibr" rid="B7">2015</xref>; Milaj, <xref ref-type="bibr" rid="B61">2016</xref>; Joel, <xref ref-type="bibr" rid="B50">2023</xref> (see text footnote 33)</td>
</tr> <tr>
<td valign="top" align="left">Proportionality</td>
<td valign="top" align="left">CJEU<italic>: La Quadrature du Net and Others</italic> (ECLI:EU:C:2020:791)</td>
<td valign="top" align="left">Article 26 <italic>Wiv</italic> 2017</td>
<td valign="top" align="left">Milaj-Weishaar, <xref ref-type="bibr" rid="B62">2020</xref>; Enqvist and Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B32">2023</xref>; Joel, <xref ref-type="bibr" rid="B50">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Reporting and record keeping</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13)</td>
<td valign="top" align="left">Articles 27 and 12 <italic>Wiv</italic> 2017</td>
<td valign="top" align="left">Taylor, <xref ref-type="bibr" rid="B82">2011</xref>; Wetzling, <xref ref-type="bibr" rid="B91">2019</xref>; Gill, <xref ref-type="bibr" rid="B40">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Redress</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13)</td>
<td valign="top" align="left">Articles 20 and 124 <italic>Wiv</italic> 2017</td>
<td valign="top" align="left">Braithwaite, <xref ref-type="bibr" rid="B15">2006</xref>; Fox, <xref ref-type="bibr" rid="B37">2007</xref>; Doshi-Velez et al., <xref ref-type="bibr" rid="B28">2017</xref>; Korff et al., <xref ref-type="bibr" rid="B54">2017</xref>; Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>; Docksey and Propp, <xref ref-type="bibr" rid="B26">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Continuous independent oversight</td>
<td valign="top" align="left">ECtHR: <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13); Vienna Commission 2007; European Parliament 2014</td>
<td valign="top" align="left">Dutch Parliament 1997; Articles 32 and 97 <italic>Wiv</italic> 2017</td>
<td valign="top" align="left">Ossege, <xref ref-type="bibr" rid="B74">2012</xref>; van de Poel et al., <xref ref-type="bibr" rid="B86">2012</xref>; Ryngaert and van Eijk, <xref ref-type="bibr" rid="B78">2019</xref>; Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>; Vieth-Ditlmann and Wetzling, <xref ref-type="bibr" rid="B89">2021</xref></td>
</tr></tbody>
</table>
</table-wrap>

















<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Conditions supporting workable accountability.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919498;color:#ffffff">
<th valign="top" align="left"><bold>Conditions</bold></th>
<th valign="top" align="left"><bold>Source</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Productive relationships</td>
<td valign="top" align="left">de Bruijn et al., <xref ref-type="bibr" rid="B22">2007</xref>; Schillemans, <xref ref-type="bibr" rid="B79">2015</xref>; Gill, <xref ref-type="bibr" rid="B40">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Cooperation</td>
<td valign="top" align="left">van Puyvelde, <xref ref-type="bibr" rid="B87">2013</xref>; Belgian Standing Intelligence Agencies Review Committee, <xref ref-type="bibr" rid="B5">2018</xref>; Wagner et al., <xref ref-type="bibr" rid="B90">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Flexibility</td>
<td valign="top" align="left">Molander et al., <xref ref-type="bibr" rid="B67">2012</xref>; Cayford et al., <xref ref-type="bibr" rid="B18">2018</xref>; Aleksovska, <xref ref-type="bibr" rid="B1">2021</xref>; Oerlemans, <xref ref-type="bibr" rid="B73">2021</xref></td>
</tr> <tr>
<td valign="top" align="left">Value alignment</td>
<td valign="top" align="left">Lipsky, <xref ref-type="bibr" rid="B56">1980</xref>; Kelley, <xref ref-type="bibr" rid="B53">2003</xref>; Hood, <xref ref-type="bibr" rid="B47">2010</xref>; Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>; Macaskill, <xref ref-type="bibr" rid="B57">2014</xref>; Schillemans, <xref ref-type="bibr" rid="B79">2015</xref>; Gill, <xref ref-type="bibr" rid="B40">2023</xref></td>
</tr> <tr>
<td valign="top" align="left">Learning and improving</td>
<td valign="top" align="left">Aucoin and Heintzman, <xref ref-type="bibr" rid="B3">2000</xref>; de Bruijn et al., <xref ref-type="bibr" rid="B22">2007</xref>; Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>; Greiling and Halachmi, <xref ref-type="bibr" rid="B43">2013</xref></td>
</tr></tbody>
</table>
</table-wrap>



<sec>
<title>4.1 Acting within duty</title>
<p>When studying accountability applied to intelligence and security domains, it may be helpful to refer to international frameworks such as the European Court of Human Rights (ECtHR) in the <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13) case. The ECtHR has established that the work of intelligence and security domains needs to be confined to strictly acting within their legal duty, in other words, to act under the scope of their legal duty and power (see <xref ref-type="table" rid="T3">Table 3</xref>). This same principle was also confirmed by the Court of Justice of the European Union (CJEU) in <italic>La Quadrature du Net and Others</italic> (ECLI:EU: C:2020:791). Acting with the duty may be understood as applying what is prescribed or written by the law. The CJEU, in the matter of <italic>La Quadrature du Net and Others</italic> (ECLI:EU:C: 2020:79) (para 132), established that in cases of government surveillance and collection of bulk data, clear rules needed to be established by the law to enable intelligence practitioners to follow these rules. For instance, clear rules must be established to indicate how intelligence and security practitioners must handle personal data. These rules include the scope of their mandate and the safeguards implemented to minimize harm to fundamental rights when executing intelligence operations such as bulk interception of personal data.<xref ref-type="fn" rid="fn0023"><sup>23</sup></xref></p>
<p>In <xref ref-type="table" rid="T3">Table 3</xref>, we also find consensus within Dutch legal instruments regarding intelligence practitioners acting under their legal duty. For instance, Article 8 of the <italic>Wiv</italic> 2017 imposes a general duty of care on Dutch intelligence and security practitioners in the Netherlands. This duty of care may be understood as protecting national security, the legal order, or other national interests. Furthermore, Article 24 of the <italic>Wiv 2017</italic> directly imposes a duty of care on the services regarding technologies and data processing.<xref ref-type="fn" rid="fn0024"><sup>24</sup></xref> It requires the AIVD to process data with due observance, meaning that the processing must have a specific purpose and be necessary to fulfill the tasks given to the AIVD.<xref ref-type="fn" rid="fn0025"><sup>25</sup></xref> This duty means implementing measures to ensure the quality of data processing, which, for example, requires the accuracy and completeness of data being processed, including algorithms.<xref ref-type="fn" rid="fn0026"><sup>26</sup></xref></p>
<p>Furthermore, in <xref ref-type="table" rid="T3">Table 3</xref>, we also find agreement among academic scholarship. Academics have found that, in practical terms, intelligence and security domains need to act within their duty. For instance, Vaage and Stenslie (<xref ref-type="bibr" rid="B84">2023</xref>) frame that an essential element of accountability in intelligence and security domains demands intelligence practitioners to follow the duty to speak the truth to decision-makers, meaning that intelligence and security practitioners must avoid contaminating the truth by the desires of political actors. van Buuren (<xref ref-type="bibr" rid="B85">2009</xref>, p. 5) supports this framing and endorses that the duty of speaking truth -or providing information- to decision-makers (e.g., political decision-makers or police enforcement) is within the context of acting in the best interest of national security and protecting the nation from threats.</p>
<p>The previous findings allow us to infer that a first step forward in finding workable accountability principles is to determine the scope of the duty of intelligence and secret services so they can have clear boundaries to act upon and to be accountable for. We denominate this first principle applicable to intelligence and security domains as the &#x0201C;acting within duty&#x0201D; principle.</p></sec>
<sec>
<title>4.2 Explainability</title>
<p>Previously, we stated that in the context of intelligence and security domains, establishing a duty and acting within the duty is necessary to enable the accountability process within these organizations. Similarly, the accountability process is supported by explaining or justifying actors&#x00027; actions.</p>
<p>Explainability is required for small and complex decision-making, such as human-technology interactions or assessing international data exchanges with other counterparts. For instance, <xref ref-type="table" rid="T3">Table 3</xref> shows that the ECtHR in <italic>Big Brother Watch and Others v. the UK</italic> (paras 382, 383, 417) set explainability as a key principle of accountability. The ECtHR found that British intelligence and secret services needed to explain or justify the bulk retention, processing, and analysis of personal data.<xref ref-type="fn" rid="fn0027"><sup>27</sup></xref></p>
<p>In the Dutch intelligence and security domains, we have noted that their legal frameworks allow them to use data and technologies. For instance, Dutch practitioners can utilize automated data analysis to analyze the bulk interception of cable communications.<xref ref-type="fn" rid="fn0028"><sup>28</sup></xref> However, as shown in <xref ref-type="table" rid="T3">Table 3</xref>, Dutch practitioners are prohibited from making decisions solely based on the outcome of automated technological tools. We infer that under Article 60(3) <italic>Wiv 2017</italic>, the accountability principle conditioning the use of data and technologies is subjected to the accountability of the human in the loop to explain their decisions.</p>
<p>The literature provides essential clues regarding studying key accountability principles applied to public service organizations. In <xref ref-type="table" rid="T3">Table 3</xref>, we find that Doshi-Velez et al. (<xref ref-type="bibr" rid="B28">2017</xref>), de Bruijn et al. (<xref ref-type="bibr" rid="B23">2022</xref>), and Fest et al. (<xref ref-type="bibr" rid="B35">2022</xref>) have stressed that accountability in public service requires government bureaucrats to justify and explain their decisions, mainly when using technological development. This justification or explainability of decision-making when employing technologies in public organizations supports accountability and promotes public trust in government services (Doshi-Velez et al., <xref ref-type="bibr" rid="B28">2017</xref>). For instance, Fest et al. (<xref ref-type="bibr" rid="B35">2022</xref>) explain that this need for explanation or justification is presented among police officers; they translate this obligation to explain or justify the use of algorithms as part of being accountable actors in public service. Following the actor-forum relationship doctrine,<xref ref-type="fn" rid="fn0029"><sup>29</sup></xref> we note that the explainability element includes justifying decision-making, as Molander et al. (<xref ref-type="bibr" rid="B67">2012</xref>) pointed out. Similarly, the effect of explaining decisions when, for instance, dealing with data or technological tools is that it can enable citizens&#x00027; trust in their governments providing services (de Bruijn et al., <xref ref-type="bibr" rid="B23">2022</xref>). Meijer and Grimmelikhuijsen (<xref ref-type="bibr" rid="B59">2020</xref>, p. 60&#x02013;62) agree with these scholars and endorse that the explainability element allows citizens to trust the government&#x00027;s services. Thus, humans in the loop working in public service&#x02014;e.g., intelligence practitioners- are accountable to citizens for explaining how they use data and technologies (Constantino, <xref ref-type="bibr" rid="B21">2022</xref>). This obligation, or burden of proof, on the part of the decision-maker to explain their decisions creates an incentive for the decision-maker to question technology outputs (de Bruijn et al., <xref ref-type="bibr" rid="B23">2022</xref>). The obligation of intelligence and security domains to explain and produce justifications when utilizing personal data and technological tools supports accountability (Kamer, <xref ref-type="bibr" rid="B52">1998</xref>).<xref ref-type="fn" rid="fn0030"><sup>30</sup></xref></p></sec>
<sec>
<title>4.3 Necessity</title>
<p>Demonstrating necessity as part of being accountable is another element in which we found agreement across different frameworks. Necessity applied to the work of intelligence and security operations may be explained as meeting the threshold to show a reasonable, clear, and legal purpose for the use of data (Belgian Standing Intelligence Agencies Review Committee, <xref ref-type="bibr" rid="B5">2018</xref>, p. 5). In <xref ref-type="table" rid="T3">Table 3</xref>, we find an agreement between the ECtHR and CJEU regarding the principle of necessity in intelligence and security operations when interfering with the right to privacy. For instance, the ECtHR in the matter of <italic>Big Brother Watch and Others v. the UK</italic> (paras 311, 334, 355, 365) established that the collection of bulk data, although it breaches the right to privacy protected under Article 8 of the ECHR, might be only allowed in certain circumstances such as protecting national security (Hages and Oerlemans, <xref ref-type="bibr" rid="B44">2021</xref>). Therefore, interference with fundamental rights, such as privacy, must be reasonably justified by demonstrating genuine necessity. Contrarily, if humans in the loop working in intelligence and security domains cannot demonstrate necessity, their actions may be regarded as unlawful, breaching Article 8 of the ECHR (see: <italic>Big Brother Watch and Others v. the UK</italic>, paras 424- 426). The same reasoning was displayed by the CJEU <italic>in La Quadrature du Net (ECLI:EU:C: 2020:79)</italic> (paras 121, 129), establishing that bulk data collection or government surveillance needed to demonstrate to be necessary to protect overall the rights and freedoms of citizens fostered by the rule of law and the European Union principles.</p>
<p>Dutch legal frameworks have also confirmed the principle of necessity when accounting for interference with the right to privacy in intelligence and security operations. <xref ref-type="table" rid="T3">Table 3</xref> illustrates that the Dutch Court of the Hague established that Dutch intelligence practitioners had acted lawfully in their operations, having shown the necessity to protect national security.<xref ref-type="fn" rid="fn0031"><sup>31</sup></xref> The Court heard the question of whether the Dutch government was allowed to use data intercepted by the United States intelligence and secret services without knowing whether such data collection infringed fundamental rights and Dutch law. The Dutch court submitted that the AIVD was authorized to engage in international cooperation in cases where it was demonstrated to be necessary. In this matter, the ground of necessity was focused on the importance of Dutch national security. The Dutch Court established that the interests of individuals or particular groups, such as the right to privacy and data protection, were subjected to the protection of national interests.<xref ref-type="fn" rid="fn0032"><sup>32</sup></xref></p>
<p>The requirement of necessity works to protect citizens against unwanted government intrusion. The purpose of introducing necessity as an accountability principle in intelligence and security operations is to protect citizens from disproportional government surveillance, as subscribed by Milaj (<xref ref-type="bibr" rid="B61">2016</xref>) in <xref ref-type="table" rid="T3">Table 3</xref>. Cooper, in <xref ref-type="table" rid="T3">Table 3</xref>, also stresses the need to introduce the necessity principle in intelligence and security operations to require the decision-maker, humans in the loop, to demonstrate that their actions warrant necessity.<xref ref-type="fn" rid="fn0033"><sup>33</sup></xref> Similarly, Bigo et al. (<xref ref-type="bibr" rid="B7">2015</xref>) have argued that national security should not prevent the necessity principle from being overlooked in intelligence and security operations.</p></sec>
<sec>
<title>4.4 Proportionality</title>
<p>Accountability in intelligence and security operations is complex and requires more than demonstrating a legal ground or power to act. It also requires other elements, such as showing that the actions of intelligence actors were proportional. In <xref ref-type="table" rid="T3">Table 3</xref>, the CJEU <italic>in La Quadrature du Net (ECLI:EU:C: 2020:79)</italic> (paras 113, 121, 129, 130, 131) found that any measures, such as collecting citizen&#x00027;s data infringing the right to privacy need to have regard to the principle of proportionality. Proportionality allows a holistic assessment, weighing different values in the face of the necessity presented at a given moment.</p>
<p>Proportionality is also addressed in Dutch intelligence and security domains, see <xref ref-type="table" rid="T3">Table 3</xref>. For instance, Article 26 of the <italic>Wiv 2017</italic> requires the AIVD to collect (personal) data having regard to the circumstances of the case. In other words, accountable intelligence actors, in the course of their duties, must consider the seriousness of the threat against the protected interest, including national security and privacy as fundamental rights. AIVD practitioners are called to account to assess whether the use of special powers is proportional to the threat.<xref ref-type="fn" rid="fn0034"><sup>34</sup></xref></p>
<p>Following international and national frameworks, academics also agreed that proportionality is a key factor in balancing the powers given to intelligence and security domains. For instance, in <xref ref-type="table" rid="T3">Table 3</xref>, Enqvist and Naarttij&#x000E4;rvi (<xref ref-type="bibr" rid="B32">2023</xref>) sustained that the proportionality requirement is essential because it balances the purpose for which the data is being used; this balance is measured against the protection of fundamental rights, such as limiting the right to privacy protection against an overwhelming threat to national security. Lastly, as hinted previously, these key accountability principles are intertwined in a way that it is plausible that the proportionality assessment may change according to the necessity (Belgian Standing Intelligence Agencies Review Committee, <xref ref-type="bibr" rid="B5">2018</xref>, p. 5). Thus, as stated by Joel (162), it is plausible to ascertain an overlap between the necessity and proportionality principles, both heavily applied by European frameworks to call to account intelligence and security domains. Lastly, following the view of Milaj-Weishaar in <xref ref-type="table" rid="T3">Table 3</xref>, the fact that a legal mandate may allow the breach of privacy rights on the grounds of national security does not mean that necessity or proportionality assessments can be avoided. Instead, intelligence and security domains must take into account in their decision-making the necessity of the interference followed by its proportionality regarding the specific case (Milaj-Weishaar, <xref ref-type="bibr" rid="B62">2020</xref>).</p></sec>
<sec>
<title>4.5 Reporting and record keeping</title>
<p>In addition to the previous accountability principles presented. <xref ref-type="table" rid="T3">Table 3</xref> shows that record keeping and reporting are essential accountability features supported by international instruments. This principle is relevant in the work of intelligence and security domains. The record keeping requirement in intelligence and security domains is addressed by the European Court of Human Rights (ECtHR) in the <italic>Big Brother Watch and Others v. the UK</italic> (para 356), establishing that intelligence and security domains must record in detail each step of the process for bulk interception of data. This recording requirement in accountability is necessary because it enables the possibility to scrutinize the work of intelligence and security domains, opening up opportunities for organizational improvement.<xref ref-type="fn" rid="fn0035"><sup>35</sup></xref></p>
<p>The Dutch intelligence and security domains also acknowledge reporting as an enabler of accountability. In <xref ref-type="table" rid="T3">Table 3</xref>, we describe that under Article 27 of the <italic>Wiv</italic> 2017, the AIVD is compelled to draw up a report regarding the destruction of unnecessary data collected by them. In the Dutch intelligence and security frameworks, under Article 12 of the <italic>Wiv</italic> 2017 they are also required to produce annual reports.</p>
<p>In the literature, we also find agreement regarding the record keeping and reporting requirement to allow greater accountability of intelligence and security domains. For instance, in <xref ref-type="table" rid="T3">Table 3</xref>, Wetzling established that accountability safeguards are tangible when implementing record keeping and reporting obligations in intelligence and security domains (Wetzling, <xref ref-type="bibr" rid="B91">2019</xref>; Bagave et al., <xref ref-type="bibr" rid="B4">2022</xref>, p. 23). Gill (<xref ref-type="bibr" rid="B40">2023</xref>) also suggests that adequate record keeping can help oversight boards identify the shortcomings of intelligence and security domains, particularly in fundamental rights breaches. Taylor (<xref ref-type="bibr" rid="B82">2011</xref>) identifies the failure or poor record keeping in intelligence and security operations as possibly undermining adequate oversight of intelligence and security domains. Thus, we submit that record keeping and reporting are essential features for the workability of accountability in intelligence and security domains because they enable scrutiny of intelligence and security domains, providing means to improve professional practices.</p></sec>
<sec>
<title>4.6 Redress</title>
<p>Accountability principles also foster redress because they allow the identification and address of injustices made to citizens who have suffered wrongdoing by the government (Braithwaite, <xref ref-type="bibr" rid="B15">2006</xref>, p. 35). In <xref ref-type="table" rid="T3">Table 3</xref>, we observe that international frameworks such as the ECtHR in <italic>Big Brother Watch and Others v. the UK</italic> (no.58170/13) (paras 359, 413, 425) stressed the need for redress as part of accountability in intelligence and security domains. In the case of unjustified or unlawful data processing in the context of national security, redress may be operationalized by providing binding powers to independent boards to require the destruction of data unlawfully obtained by intelligence and security domains (Bovens and Wille, <xref ref-type="bibr" rid="B12">2021</xref>). Similarly, the European Union Agency for Fundamental Rights supports that redress can be used to require intelligence and security domains to destroy personal data unlawfully obtained (European Union Agency for Fundamental Rights, <xref ref-type="bibr" rid="B34">2023</xref>, p. 27).</p>
<p><xref ref-type="table" rid="T3">Table 3</xref> shows that Dutch intelligence and security domains are subjected to redress principles. For instance, the AIVD can amend or prevent unnecessary infringement of privacy rights by destroying personal data that have lost purpose or are unnecessary in fulfilling intelligence and security duties.<xref ref-type="fn" rid="fn0036"><sup>36</sup></xref> Similarly, Article 124 of the <italic>Wiv</italic> 2017 provides redress measures by imposing administrative sanctions on the AIVD. These administrative sanctions may be materialized in orders to terminate intelligence and security operations or orders against the AIVD to delete or destroy data they process.<xref ref-type="fn" rid="fn0037"><sup>37</sup></xref></p>
<p>There is an overwhelming agreement across scholars regarding redress. For instance, in <xref ref-type="table" rid="T3">Table 3</xref>, we observe that Braithwaite (2006, p. 35), Fox (<xref ref-type="bibr" rid="B37">2007</xref>), Doshi-Velez et al. (<xref ref-type="bibr" rid="B28">2017</xref>), Korff et al. (2017, p. 12), Bovens and Wille (<xref ref-type="bibr" rid="B12">2021</xref>), and Docksey and Propp (<xref ref-type="bibr" rid="B26">2023</xref>), agree that a tangible characteristic of accountability in intelligence and security domains is the implementation of redress measures. In summary, we have learned that redress in intelligence and security services is materialized through binding orders to require accountable intelligence actors to stop or destroy unlawful or unneeded data processing.<xref ref-type="fn" rid="fn0038"><sup>38</sup></xref></p></sec>
<sec>
<title>4.7 Continuous independent oversight</title>
<p>Another key principle of accountability in intelligence and security domains is the operationalization of independent oversight. This section observes the agreement across different authorities regarding the implantation of oversight in intelligence and security domains.</p>
<p>In <xref ref-type="table" rid="T3">Table 3</xref>, we observe that the ECtHR established the requirement of oversight in intelligence and security domains. For instance, in the case of Big Brother Watch and Others v. the UK (no.58170/13) (paras 350, 361, 381), the ECtHR said that in matters of government surveillance, it is necessary to have continuous appropriate oversight to supervise the use of special powers&#x02014;such as surveillance and bulk data processing&#x02014;of intelligence and security actors. The ECtHR established that continuous oversight is the counterbalance to safeguard fundamental rights against the powers given to intelligence and security domains (paras 349&#x02013;350, 354). Similarly, the ECtHR highlighted that independent oversight boards&#x00027; powers must be robust to limit the effects of the infringement on fundamental rights (para 356).</p>
<p>Furthermore, <xref ref-type="table" rid="T3">Table 3</xref> shows this trend in accepting independent oversight to protect fundamental rights against the powers given to intelligence and security domains. For instance, the Vienna Commission 2007 has stated that to foster accountability in intelligence and security domains, independent oversight needs to be done end-to-end (prior, during, and after) (see text footnote 2). Similarly, in 2014, the European Parliament called on the Netherlands to put independent intelligence oversight boards in place to satisfy the European Convention on Human Rights (European Parliament, <xref ref-type="bibr" rid="B33">2014</xref>).</p>
<p>In <xref ref-type="table" rid="T3">Table 3</xref>, we observe that, in 1997, the Dutch Parliament agreed that intelligence and security domains must welcome the opportunity to be subjected to end-to-end independent oversight to protect fundamental rights, such as the right to privacy (Kamer, <xref ref-type="bibr" rid="B52">1998</xref>). This desire from the Dutch parliament to implement end-to-end independent oversight was materialized through Article 36(2)(3) of the <italic>Wiv</italic> 2017, introducing the TIB, which conducts prior legality assessments regarding the AIVD&#x00027;s operations. Similarly, under Article 97(3)(a) <italic>Wiv</italic> 2017, a second oversight board, the CTIVD is tasked with assessing the lawfulness of the AIVD&#x00027;s operations.<xref ref-type="fn" rid="fn0039"><sup>39</sup></xref> The CTIVD supervises the AIVD&#x00027;s ongoing and completed operations.</p>
<p>International and national instruments and scholars agree upon the need for continuous independent oversight. In <xref ref-type="table" rid="T3">Table 3</xref>, Vieth-Ditlmann and Wetzling (<xref ref-type="bibr" rid="B89">2021</xref>) agreed that independent oversight in intelligence and security operations is necessary to safeguard citizens&#x00027; rights against unlawful intrusive measures exercised by intelligence and security domains. Similarly, Aucoin and Heintzman (<xref ref-type="bibr" rid="B3">2000</xref>), van de Poel et al. (<xref ref-type="bibr" rid="B86">2012</xref>), and Bovens and Wille (<xref ref-type="bibr" rid="B12">2021</xref>) conceive the idea of continuous independent oversight as a tool to mitigate human or organizational errors that may harm citizens. While Ryngaert and van Eijk (<xref ref-type="bibr" rid="B78">2019</xref>) suggest that independent oversight of intelligence and security domains contributes to privacy and data protection safeguards.</p>
<p>Lastly, Ossege (<xref ref-type="bibr" rid="B74">2012</xref>) addresses independent oversight of intelligence and security domains, outlining the complexities this mechanism may bring to the actor-forum relationship. The caveat regarding oversight is that, in some cases, it may be treated as a power game rather than a tool to safeguard citizens&#x00027; rights and provide a means for organizational improvement. Making independent oversight work in the actor-forum relationship will require productive relationships between the parties to achieve workable accountability principles in intelligence and secret services. For instance, it may be necessary for the actor to be more cooperative while the forum to be more flexible. This last caveat regarding oversight will be addressed in the following paragraphs.</p></sec>
<sec>
<title>4.8 Conditions supporting workable accountability</title>
<p>Previously, we have addressed some key principles of accountability that can be implemented in intelligence and security domains to safeguard fundamental rights. In this section, we will detail some conditions that support the workability of these accountability principles in a way that provides room for intelligence and security operations while safeguarding other fundamental rights. These conditions supporting workable accountability are summarized in <xref ref-type="table" rid="T4">Table 4</xref>.</p>
<sec>
<title>4.8.1 Productive actor-forum relationships</title>
<p>Gill (<xref ref-type="bibr" rid="B40">2023</xref>) describes that, on occasions, accountability and oversight in intelligence domains have been regarded as a constant contest for control. Thus, the most sensible option is to foster productive relationships to achieve workability of accountability principles in intelligence and security domains (see <xref ref-type="table" rid="T4">Table 4</xref>).</p>
<p>In Schillemans&#x00027; work, he conducts research among public service managers to investigate how they see, feel, and cope with accountability. Schillemans (<xref ref-type="bibr" rid="B79">2015</xref>) found that accountability can be an &#x0201C;intrusive and annoying process [that] may on the balance be helpful to public managers and organizations [to achieve] organizational changes&#x0201D;. Schillemans (<xref ref-type="bibr" rid="B79">2015</xref>) emphasizes that approaching accountability from a productive relationship perspective is focused on being constructive instead of oppressive (see <xref ref-type="table" rid="T4">Table 4</xref>).</p>
<p>Accountability is positive when it allows space for actors to explain their actions rather than imposing an oppressive approach. In <xref ref-type="table" rid="T4">Table 4</xref>, de Bruijn et al. (<xref ref-type="bibr" rid="B22">2007</xref>, p. 18) also subscribe that accountability in the actor-forum relationship requires a productive relationship to achieve workable arrangements to allow both actors and forums to conduct their duties. The opposite of a productive relationship approach to accountability may be reduced to a sanctioning or oppressive style of accountability. This approach to accountability undermines the opportunities to learn and improve de Bruijn et al. (<xref ref-type="bibr" rid="B22">2007</xref>, p. 20). Accountability may be intrusive to actors&#x00027; actions. Still, it can lead to improving organizational practices if productive relationships are developed.</p></sec>
<sec>
<title>4.8.2 Cooperation</title>
<p>Accountability and oversight require a collective effort of all parties involved in the actor-forum relationship. Cooperation among the different parties is necessary to support and foster accountability principles. In <xref ref-type="table" rid="T4">Table 4</xref>, we observe Wagner et al. (<xref ref-type="bibr" rid="B90">2023</xref>), pointing out that the cooperation of actor and forum is indispensable to make accountability work (Schillemans, <xref ref-type="bibr" rid="B79">2015</xref>). Similarly, van Puyvelde (<xref ref-type="bibr" rid="B87">2013</xref>) states that cooperation includes welcoming a plurality of oversight groups immersed in the accountability process, facilitating accountability in the intelligence and security domains, and supporting intelligence organizations to embrace best practices in a democratic society (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 7). For instance, Cooperation means facilitating cooperation among oversight boards from different jurisdictions to compare investigative methods, interpret legal frameworks, and discuss practical and legal problems concerning intelligence communities.<xref ref-type="fn" rid="fn0040"><sup>40</sup></xref></p>
<p>The Belgian Standing Intelligence Agencies Review Committee agrees with cooperation as an enabler of accountability and has stated that cooperation can help to alleviate oversight gaps where different boundaries limit oversight bodies (see text footnote 2). In summary, accountability requires the cooperation of all parties: actors and forums.</p></sec>
<sec>
<title>4.8.3 Flexibility</title>
<p>In <xref ref-type="table" rid="T4">Table 4</xref>, we observe that Oerlemans and Cayford et al. hint at applying flexibility in the accountability process of intelligence and security domains. For instance, Oerlemans mentions that the law must be flexible for national security purposes to allow security and intelligence practitioners to perform their jobs.<xref ref-type="fn" rid="fn0041"><sup>41</sup></xref> Similarly, Molander et al. (<xref ref-type="bibr" rid="B67">2012</xref>) argue that public decision-makers need to be judged with flexibility regarding their decision-making so these public servants can work in an environment where they can apply discretion in fulfilling their duties. Aleksovska (<xref ref-type="bibr" rid="B1">2021</xref>) reveals that the Dutch government is exploring ways to create more flexible accountability mechanisms to avoid public servants&#x00027; decision-making being restricted to stringent accountability mechanisms. For instance, inflexible -or unworkable- accountability can lead to public servants spending too much time on irrelevant -even unnecessary- compliance procedures, making public service organizations less efficient (Aleksovska, <xref ref-type="bibr" rid="B1">2021</xref>). Thus, there is a need for flexibility and a less stringent application of accountability (Geneva Centre for the Democratic Control of Armed Force, <xref ref-type="bibr" rid="B39">2017</xref>, p. 4). Of course, this flexibility should be conducted in light of all the above principles of accountability asserted (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B68">2019</xref>, p. 46).</p></sec>
<sec>
<title>4.8.4 Value alignment</title>
<p>Professional values of the individual and the organization should embrace accountability mechanisms, such as independent oversight, which play an essential role in having workable accountability. In <xref ref-type="table" rid="T4">Table 4</xref>, we observe that Schillemans (<xref ref-type="bibr" rid="B79">2015</xref>) agrees that professional values can play a role in the success of accountability principles; values can be a course or a blessing because of the different internal and external relationships and values concerning the organization that are at stake. Macaskill (<xref ref-type="bibr" rid="B57">2014</xref>) states that the Snowden case has revealed the challenges that professional values and the internal culture in intelligence and security domains can pose to upholding democratic values regarding safeguarding data and privacy.<xref ref-type="fn" rid="fn0042"><sup>42</sup></xref> Similarly, Gill speaks about the accountability culture within British security and intelligence agencies, finding that double standards have tainted accountability principles regarding reporting obligations. Gill (<xref ref-type="bibr" rid="B40">2023</xref>) found that British intelligence agencies failed to apply reporting obligations policies into practice. And Born and Wills (<xref ref-type="bibr" rid="B9">2012</xref>, p. 8) hint at the importance of value alignment in intelligence and security domains when fostering independent oversight to promote the protection of fundamental rights. Similarly, Kelley states that one of the problems &#x00131;n American intelligence communities is the need for adequate human capital to respond to value alignment to satisfy legal duties, such as protecting national security and fundamental rights.<xref ref-type="fn" rid="fn0043"><sup>43</sup></xref> In the work of Lipsky (<xref ref-type="bibr" rid="B56">1980</xref>), comparable dilemmas across street-level bureaucrats are revealed. Lipsky points out the difficulty of delivering the good intentions of public policy to the people they serve when other individual and organizational values are not aligned with policy reforms to improve government services.</p>
<p>In <xref ref-type="table" rid="T4">Table 4</xref>, reflecting on the value alignment of the actor-forum relationship, Hood illustrates that accountability can sometimes be like an awkward couple where some of their interests or values from actors and forums may be in tension with one another. In this complex relationship, both parties must compromise to make accountability work (Hood, <xref ref-type="bibr" rid="B47">2010</xref>). For example, in the pursuit of protecting the country from national threats or protecting citizens&#x00027; rights from privacy violations, frictions or conflicting interests may arise, which may require certain compromises. Thus, the interaction of parties involved, actor and forum, AIVD and TIB or CTIVD, requires a combination of different approaches to accountability, such as productive relationships, flexibility, cooperation, and finding common ground on value alignment between the parties.</p>
<p>In short, value alignment refers to the effort from the actor and forum to uphold accountability principles. The efforts are expected from the entire organization, from management to staff at the bottom of the chain, to adhere to and promote a workable accountability culture (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 9).</p></sec>
<sec>
<title>4.8.5 Learning and improving</title>
<p>In <xref ref-type="table" rid="T4">Table 4</xref>, Aucoin and Heintzman (<xref ref-type="bibr" rid="B3">2000</xref>) agreed that accountability must be embedded as a continuous human and organizational learning and improvement process. Similarly, continuous learning may be possible by implementing continuous independent oversight that embraces productive relationships. Thus, as Born and Wills (<xref ref-type="bibr" rid="B9">2012</xref>, p. 6) stressed, it is preferable to have ongoing independent oversight of intelligence and security domains to allow continuous improvement and learning of individuals and organizations.<xref ref-type="fn" rid="fn0044"><sup>44</sup></xref> Lastly, de Bruijn et al. (<xref ref-type="bibr" rid="B22">2007</xref>, p. 18) provide a valuable approach to accountability, framing it as the opportunity for supervisors or oversight boards to take a pedagogical approach to allow room for learning and improvement. For instance, a pedagogical approach to foster awareness regarding the adequate protection of fundamental rights in intelligence and security operations. Greiling and Halachmi (<xref ref-type="bibr" rid="B43">2013</xref>) agree with this approach and establish that accountability as the opportunity for learning and improvement is more promising than implementing accountability as the chance to blame people.</p>
<p>In answering question three, which common principles of accountability are appropriate for the AIVD? We can conclude that acting within duty, explainability, necessity, proportionality, reporting and record keeping, redress, and continuous independent oversight can be applied to the work of intelligence and security domains such as the AIVD. Similarly, in making the above principles workable, we submit that the actor and forum -for instance, AIVD, TIB, and CTIVD- may engage in productive actor-forum relationships, cooperation, flexibility, value alignment, and learning and improving opportunities. Accountability principles do not need to be seen as a negative trait (Tian, <xref ref-type="bibr" rid="B83">2017</xref>). Rather, accountability should be seen as a festivity and accepted as part of holding a public service position (Schillemans, <xref ref-type="bibr" rid="B79">2015</xref>). Accountability can contribute to long-term learning opportunities in the organization (Greiling and Halachmi, <xref ref-type="bibr" rid="B43">2013</xref>).</p></sec></sec></sec>
<sec id="s5">
<title>5 Section 3: discussion</title>
<p>In Section 3, &#x0201C;Accountability and oversight in Dutch intelligence and security domains&#x0201D;, we have provided an inventory of the different definitions or conceptualizations of accountability in public service that can be useful to intelligence and security domains. We have also highlighted the importance of accountability in the actor-forum relationships between the AIVD and citizens, represented by supervisors such as the CTIVD, TIB, parliament, and judicial oversight. Similarly, in Section 4, &#x0201C;Workable principles of accountability for intelligence and security domains&#x0201D;, we have established that to support the workability of these accountability principles, actors and forums are encouraged to engage in productive relationships, which include cooperation, flexibility, value alignment, and learning and improving opportunities.</p>
<p>Section 5 discusses how the proposed workable principles of accountability may come together to provide some coping mechanisms for the tensions between the Dutch AIVD -the actors- and oversight boards, the CTIVD or TIB -the forum. We discuss how our proposed workable principles of accountability might work in practice to allow productive actor-forum relationships between actor and forum in a way that the actors (AIVD) can have room for maneuvering when it comes to protecting national security while allowing adequate empowerment to the forum (TIB, CTIVD, citizens) to comply with its tasks of safeguarding the protection of fundamental rights.</p>
<sec>
<title>5.1 Defining tensions</title>
<p>The Netherlands Court of Audit (Rekenkamer, <xref ref-type="bibr" rid="B77">2021</xref>), in its 2021 Report, highlights some of the tensions -or struggles- in the AIVD and the implementation of accountability principles imposed by the Dutch Intelligence and Security Services Act 2017 (<italic>Wet op de inlichtingen- en veiligheidsdiensten 2017, &#x0201C;Wiv</italic> 2017&#x0201D;). The legislation brought forward two oversight boards to supervise the AIVD to safeguard fundamental rights against the prerogative given to the AIVD to deploy special powers on the grounds of national security. These supervisory boards are the TIB and CTIVD (see 3.4.3 Independent oversight boards). These boards have been tasked to enforce principles of accountability, such as conducting legality assessments primarily focusing on necessity and proportionality in the operations of the AIVD (TIB Annual Report 2021).</p>
<p>The Report has established that the accountability principles brought by the <italic>Wiv</italic> 2017 have been underestimated and challenging, stating no fault of the AIVD, the TIB, or the CTIVD in implementing accountability. Instead, the Report considers that the parliament and executive needed to evaluate the practical consequences more in-depth regarding the implementation and capabilities for compliance with these new accountability principles in the AIVD. For instance, there is a need to invest resources in more specialized staff to ensure compliance with principles of accountability.</p>
<p>Similarly, the Report stresses the need for the workability of accountability principles in the AIVD to support the AIVD&#x00027;s operational capacity and future-proofing power. At first glance, we can ascertain that this workability may refer to the professional practices that facilitate the fulfillment of accountability principles. As such, we see it appropriate to discuss these issues in light of our proposed workable principles of accountability in intelligence and secret services.</p>
<sec>
<title>5.1.1 The workability of accountability principles</title>
<p>The Report states that there is tension with accountability principles limiting the use of special powers, such as hacking networks or cable interception, in the AIVD. For instance, the Report outlines that accountability principles such as continuous independent oversight increase administrative work at the AIVD. The current independent oversight arrangements might negatively affect the investigations of the AIVD into hidden threats. For example, when requiring the AIVD to submit requests for approval of hacking powers to the TIB, the AIVD must justify the necessity and whether it is proportional to use the requested special power. The aim is to protect citizens&#x00027; fundamental rights so they are not unnecessarily or illegally breached. Thus, the law has given authority to the TIB to deny the exercise of special powers to the AIVD. It is claimed that this back-and-forward interaction between the actor (the AIVD) and forum (the TIB) relationship may limit the operational power of the AIVD against national threats.</p>
<p>The <italic>Wiv</italic> 2017 has allowed more room for discussions into legality assessments between the AIVD, the TIB, and the CTIVD, allowing some complexities in the actor-forum relationship. In some circumstances, it leads to bottleneck dilemmas between who is right and wrong, what is necessary and what is not, or what duty would take priority over the other. Similarly, a report by politician Jones-Bos has also concluded that implementing these accountability principles has created bottlenecks and, hence, the need to review the legislation to consider workable accountability principles in the AVID (Dommering et al., <xref ref-type="bibr" rid="B27">2017</xref>, p. 115&#x02013;147). These accountability principles need to be considered from a fundamental rights point of view and a strategic national security point of view.</p></sec></sec>
<sec>
<title>5.2 Engaging with accountability principles in intelligence and security domains</title>
<p>We have established the need for intelligence and security work to protect the nation from threats. We have mentioned the difficulty of their job in gathering small and big puzzles. Intelligence and security domains are constantly evolving and catching up with technological development, which means that inevitably, the work of intelligence and security practitioners will affect citizens&#x00027; lives; there may be instances where interference with citizens&#x00027; privacy and personal data is necessary and justified (Jaffel and Larsson, <xref ref-type="bibr" rid="B48">2023</xref>; Cayford and Pieter, 2018). At this point, it may be appropriate also to acknowledge that not all data collected may be helpful for intelligence and security practitioners without having contextual knowledge of the data or information at hand (Flyverbom, <xref ref-type="bibr" rid="B36">2016</xref>). Similarly, unwarranted surveillance can lead to chilling effects and distort social behavior in the digital ecosystem.<xref ref-type="fn" rid="fn0045"><sup>45</sup></xref></p>
<p>The power to interfere with the right to privacy, for instance, by collecting and sharing personal data, does not mean a free pass for intelligence and security domains. Instead, the balance between security and privacy, including personal data, requires a closer look at the boundaries of the rule of law in the context of national and international legislation governing a democratic society (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B70">2018</xref>; Docksey and Propp, <xref ref-type="bibr" rid="B26">2023</xref>). A society without privacy protection would be a suffocating society (Solove, <xref ref-type="bibr" rid="B80">2007</xref>, p. 768).</p>
<p>Accountability in intelligence and secret services means the opportunity for checks and balances in a democratic society to protect citizens&#x00027; fundamental rights when deploying government surveillance tools and practices (see text footnote 10). For instance, the accountability dialogue in intelligence and secret service can start by acknowledging that any action infringing fundamental rights needs to be well-established or outlined under a legal mandate -prescribed by the law- to set clear boundaries in a democratic society.<xref ref-type="fn" rid="fn0046"><sup>46</sup></xref> This measure can allow intelligence and secret services to be bound to act within the scope of their duty and clearly understand what they will be accounted for. It creates fairness and certainty for intelligence secret services practitioners and civil society. It can result in further advantages, such as providing more substantial legitimacy and resilience to the work of intelligence and secret services.</p></sec>
<sec>
<title>5.3 Balancing acts</title>
<p>Applying accountability principles and making them work in intelligence and security domains is a balancing act. Section 4 has taught us that accountability principles are intertwined; one cannot be applied in isolation. Thus, one or more principles must be applied in conjunction to achieve the desired outcomes of accountability, as previously studied in Section 3. Moreover, as seen in Section 4, applying accountability does not need to be inflexible or oppressive. Instead, the success of accountability may be supported by productive relationships that allow room for cooperation or flexibility in the complex actor-forum relationship.</p>
<p>The powers given to intelligence and security domains must be balanced against necessity and proportionality principles. For instance, necessity and proportionality are established by the CJEU <italic>in La Quadrature du Net (ECLI:EU:C: 2020:79)</italic> (paras 201, 215, 218), stating that actions of intelligence and security services needed to be justified by a genuine and severe threat. The decisions of the AIVD may be easily justified if the organization approaches necessity and proportionality principles as part of its routine. Adhering to these principles can minimize situations where the forum -supervisors such as the TIB or CTIVD- may object to executing special powers. For example, suppose the main task of the supervisors is to oversee the compliance of necessity and proportionality principles. In that case, the AIVD may take a proactive role to convey to the supervisors to accept that the AIVD has already satisfied these principles.</p>
<p>Furthermore, Dutch intelligence and security services have a duty of care concerning processing personal data and using technological tools.<xref ref-type="fn" rid="fn0047"><sup>47</sup></xref> This duty of care embraces principles of accountability to justify decision-making as to how and why intelligence practitioners decide to take or adopt specific routes in their investigations -including using or not using intrusive means to obtain and share personal data. This duty leads us to the principle of reporting and record keeping (Born and Wills, <xref ref-type="bibr" rid="B9">2012</xref>, p. 10). &#x0201C;Streamlining&#x0201D; the accountability processes may be possible by embedding routine short tasks to report and keep records of key procedures while deploying technological tools or collecting personal data. In police practice, officers have a diary to write down key elements of significant things they have encountered daily. For example, when conducting an arrest, they will take note of the circumstances and how they proceeded. This same approach to proactively reporting and keeping records, by default, in the AIVD allows the AIVD to comply with reporting and record-keeping and provides a platform to justify their decision-making during their operations. These &#x0201C;by default&#x0201D; actions may be uploaded or recorded on a system where supervisors and the AIVD can easily access the information. These measures can save time in the AIVD and support productive relationships between the actor and the forum. Similarly, supervisors such as the TIB and CTIVD can show a willingness to cooperate by accepting these notes or records as part of the AIVD justification obligations to keep records and justify decisions. Lastly, it is worth noting that reporting should not only focus on the efficiency or effectiveness of the AIVD. Instead, reporting can also provide significant attention to legality procedures and assessments (Cayford et al., <xref ref-type="bibr" rid="B18">2018</xref>).</p>
<p>Another strategy for workable accountability requires the actor and forum to have a degree of flexibility and cooperation and, to some degree, value alignment. We have learned that actor-forum relationships, in this case, the relationship between the AIVD -the actor- and the TIB and CTIVD -the forum- are bound to be awkward and, sometimes, uncomfortable. This can be explained by the fact that each party has different mandates. For example, the AIVD protects national security. On the other hand, the TIB and CTIVD are tasked with supervising the work of the AIVD through legal assessments regarding the AIVD&#x00027;s actions. Both parties have conflicting world views -at least of their mission. However, both are committed to principles of accountability, such as acting within their duty or providing justifications. One is committed to protecting the nation against threats; that is their duty, and they are accountable for that. The other one is committed to protecting fundamental rights; that&#x00027;s their duty, and they are also accountable for that. Both are accountable and have in common serving their nation and protecting people. Thus, accountability can be seen as an awkward couple because there will be common agendas, but they may also have different mandates to fulfill. Hence, their relationship can be complex. To alleviate these tensions, both parties can add some flexibility and cooperation so both can get on with their tasks.</p>
<p>It is argued that inflexible accountability mechanisms, such as inflexible oversight boards, can reduce the ability of public servants to adapt their decision-making to the particular needs of the task -such as acting rapidly when the nation is at risk. Dutch intelligence agencies claim that the existing legal accountability mechanisms placed by legislation passed in the Dutch parliament create an undue burden on them that is so great that they increasingly struggle to fulfill their mission of protecting the country&#x00027;s security (Rekenkamer, <xref ref-type="bibr" rid="B77">2021</xref>).</p>
<sec>
<title>5.3.1 Flexibility and cooperation without compromising core principles</title>
<p>In legal practice, lawyers have a duty to their clients. Prosecutors have a duty to prosecute crimes, and courts have a duty to administer justice. All these duties point toward one core principle that cannot be negotiated: delivery of justice. However, outside this core element, lawyers, prosecutors, and courts are encouraged to engage in productive relationships, including mutual cooperation and flexibility. For instance, lawyers must not obstruct courts&#x00027; work, prosecutors must disclose documents to defense lawyers in due course. Judges must uphold due processes by applying discretion and fairness to extend deadlines in submitting briefs and court appearances. While each actor and forum may have their agenda and duties to fulfill, the common principle that &#x0201C;unites&#x0201D; them is the delivery of justice.</p>
<p>The same analogy may be drawn into the work of the AIVD, the TIB, and the CTIVD. For example, a common ground between these parties may ultimately be the protection of citizens. The AIVD protects citizens from physical harm, while the TIB and AIVD protect citizens from legal harm. Flexibility may be reflected in situations where the AIVD, on its face, acts within the boundaries of the rule of law. They genuinely suspect certain threats to national security and require an extension of time to conduct their investigations. The TIB may choose to be flexible and grant extensions of time without needing extensive paperwork or by just accepting a copy of the notes or reports made by an AIVD practitioner. This cooperative approach strengthens their business relationships but, more importantly, supports the workability of accountability principles.</p>
<p>On the other hand, accountability principles in a democratic society need to bring redress. The <italic>Wiv</italic> 2017 has adopted this principle and provides a means for redress, such as requesting the destruction of personal data unlawfully held.<xref ref-type="fn" rid="fn0048"><sup>48</sup></xref> For instance, in this type of case, where complaints are made against the malpractice of the AIVD, the law itself encourages the CTIVD to be reasonably flexible with the AIVD. It is required from the CTIVD to allow the AIVD the opportunity for explanations regarding the alleged complaint. Here, accountability principles can be best achieved if they are utilized to provide justifications or explanations supporting redress. This opportunity to explain or justify does not have to be rigid; it can be flexible. For example, when necessary, granting extensions of time to allow meaningful answers or justifications.</p>
<p>Similarly, productive actor-forum relationships can arise when the actor allows the forum to do their job. For example, British and North American parliaments complain that their intelligence and secret service can be obstructive during senate inquiries. This obstructive behavior is not conducive to productive or cooperative relationships. The AIVD can learn from these examples to compromise with the TIB and the CTIVD to cooperate with end-to-end supervision to support the AIVD with compliance with accountability principles. For instance, the AIVD can cooperate with its oversight boards by providing them with all the necessary information to perform adequate oversight.<xref ref-type="fn" rid="fn0049"><sup>49</sup></xref> Ideally, this &#x0201C;give and take&#x0201D; interaction conducts productive relationships between the actor and the forum.</p>
<p>We must mention that accountability being awkward or uncomfortable is not necessarily negative. The friction between the actor and the forum can also be a positive sign that the accountability process is not just a ritual dance. Accountability can change the image of public organizations, showing the world that they are willing or interested in being accountable for their job (Schillemans, <xref ref-type="bibr" rid="B79">2015</xref>). However, this tension must be healthy, utilizing flexibility and cooperation to improve accountability relationships in intelligence and security domains. Independent oversight boards need to be reminded that their role is to cooperate to safeguard fundamental rights by allowing the process of individual and organizational learning among accountable intelligence actors. Thus, as noted above, accountability and oversight powers should not be used to blame someone. Instead, it should serve as an opportunity to educate; it can be an opportunity for individual and organizational learning on best practices that support fundamental rights. The adequate role of continuous independent oversight is vital for society and intelligence communities, without independent oversight boards, we may miss important learning and improvement opportunities because independent oversight can prevent blind spots that intelligence communities cannot see.</p>
<p>The value alignment of the AIVD, the TIB, and the CTIVD regarding cooperation for safeguarding fundamental rights is also important in this discussion. The friction between the supervisor and supervisee is a two-way road. Thus, concurring with Lipsky&#x00027;s view, if the organization and the individual are not on board with common principles of accountability, then the workability of accountability principles is deemed to fail. Hence, it is important to provide support to find adequate staff -starting with managers- committed to supporting accountability mechanisms and principles brought by the legislator (Greiling and Halachmi, <xref ref-type="bibr" rid="B43">2013</xref>).</p>
<p>To summarize, we may say that workable accountability principles are an act of commitment for continuous productive relationships to accommodate accountability and support democratic practices in a society grounded by the rule of law. The actor is encouraged to cooperate while the forum is encouraged to avoid bureaucratic behavior, avoid suffocating the actor, and instead facilitate productive relationships between them to best achieve accountability principles.</p></sec></sec></sec>
<sec id="s6">
<title>6 Section 4: conclusions</title>
<p>In Section 3, we have established that accountability and oversight of intelligence and secret services are essential aspects of a democratic society because they ensure responsible, answerable practices concerning the services they are tasked with (see text footnote 10). Accountability in the public sector can provide legitimacy and public trust in government organizations and their officials (Bovens, <xref ref-type="bibr" rid="B11">2010</xref>). Overall, accountability, applied in intelligence and secret services, can help safeguard fundamental rights, help learn and improve practices, and support the resilience of intelligence and secret services.</p>
<p>In Section 4, we have learned that accountability principles applicable to intelligence and security domains include acting within duty, explainability, necessity, proportionality, reporting and record keeping, redress, and continuous independent oversight. Similarly, there are some conditions to support the workability of accountability principles. These conditions may be characterized as productive actor-forum relationships, cooperation, flexibility, value alignment, and learning and improving opportunities. In our discussion, we stressed that the complex actor-forum relationship between the AIVD and the TIB, CTIVD, requires balancing acts to achieve the workability of accountability principles. For instance, continuous oversight requires productive relationships between the actor and forum that support the adequate protection of fundamental rights and provide learning opportunities for further improvement of the AIVD.</p>
<p>Our proposed workable accountability principles in intelligence and secret services are limited to implementing some fundamental rights, such as the right to privacy and data protection, in the work of national intelligence and security services. Nonetheless, the proposed conceptual framework may be extended into other areas that require the protection of fundamental rights in public and non-public organizations.</p>
<p>Similarly, the present study analyses principles of accountability in intelligence and security services from a conceptual point of view. Further empirical research is appropriate in this field to ascertain which principles are more prominent and externalized by the actor and forum.</p>
<p>Furthermore, in future work, we may apply the results from this paper to conduct empirical work in evaluating the quality of accountability in intelligence and security services. For example, this empirical work may include comparing the current Dutch Intelligence and Security Services Act 2017 (<italic>Wet op de inlichtingen- en veiligheidsdiensten 2017</italic>) against the upcoming prosed amendment Temporary law investigating AIVD and MIVD to countries with an offensive cyber program, bulk data sets and other specific facilitie (<italic>Tijdelijke wet onderzoeken AIVD en MIVD naar landen met een offensief cyberprogramma, bulkdatasets en overige specifieke voorzieningen</italic> (2023&#x02013;2024), to measure how accountable is the AIVD before and after the new legislation. Equally, future empirical research in accountability in intelligence and security services can include the study of accountability from a justification or explainability perspective, looking into the interactions between accountable intelligence actors and automated data analysis tools.</p></sec>
<sec sec-type="author-contributions" id="s7">
<title>Author contributions</title>
<p>JC: Writing &#x02013; original draft, Writing &#x02013; review &#x00026; editing. BW: Conceptualization, Funding acquisition, Investigation, Methodology, Writing &#x02013; review &#x00026; editing.</p></sec>
</body>
<back>
<sec sec-type="funding-information" id="s8">
<title>Funding</title>
<p>The author(s) declare financial support was received for the research, authorship, and/or publication of this article. This work was supported by NWO project number: KICH1.VE01.20.004.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s9">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<fn-group>
<fn id="fn0001"><p><sup>1</sup>Thorsten Wetzling and Charlotte Dietrich. CONSULTATIVE COMMITTEE OF THE CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA Report on the Need for a Guidance Note on Article 11 of the Modernised Convention 108. June 11, 2021, 3&#x02013;4.</p></fn>
<fn id="fn0002"><p><sup>2</sup>Venice Commission. Report on the Democratic Oversight of the Security Services, Adopted by the Venice Commission at Its 71st Plenary Meeting, Venice, 1&#x02013;2 June 2007 16. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.venice.coe.int/webforms/documents/CDL-AD(2007)016.aspx">https://www.venice.coe.int/webforms/documents/CDL-AD(2007)016.aspx</ext-link>.</p></fn>
<fn id="fn0003"><p><sup>3</sup>&#x0201C;Kabinet hield informatie toeslagenaffaire doelbewust achter voor Tweede Kamer&#x0201D;. <italic>RTL Nieuws</italic>, April 21, 2021. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.rtlnieuws.nl/nieuws/nederland/artikel/5226474/toeslagenaffaire-mark-rutte-tweede-kamer-pieter-omtzigt">https://www.rtlnieuws.nl/nieuws/nederland/artikel/5226474/toeslagenaffaire-mark-rutte-tweede-kamer-pieter-omtzigt</ext-link>.</p></fn>
<fn id="fn0004"><p><sup>4</sup>Hungary v European Parliament and Council of the European Union, No. ECLI:EU:C:2022:97 (paras 156, 157, 163, 208, 232, 257) (February 16, 2022).</p></fn>
<fn id="fn0005"><p><sup>5</sup>Article 8(1)(2)(a) of the Security Services Act 2017.</p></fn>
<fn id="fn0006"><p><sup>6</sup>See <ext-link ext-link-type="uri" xlink:href="https://english.aivd.nl/about-aivd/tasks-and-areas-of-interest&#x00023;:&#x0007E;:text=promoting%20the%20security%20of%20vital,on%20designated%20persons%20or%20bodies">https://english.aivd.nl/about-aivd/tasks-and-areas-of-interest&#x00023;:&#x0007E;:text=promoting%20the%20security%20of%20vital,on%20designated%20persons%20or%20bodies</ext-link>.</p></fn>
<fn id="fn0007"><p><sup>7</sup>Article 17 of the <italic>Wiv 2017</italic>.</p></fn>
<fn id="fn0008"><p><sup>8</sup>Commissie van Toezicht op de Inlichtingen-en Veiligheidsdiensten (CTIVD) (2002). Toezichtsrapport nr. 71 over het verzamelen en verder verwerken van passagiersgegevens van luchtvaartmaatschappijen door de AIVD en de MIVD - Rapport - CTIVD. rapport (Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten), <ext-link ext-link-type="uri" xlink:href="https://www.ctivd.nl/documenten/rapporten/2020/09/22/rapport-71">https://www.ctivd.nl/documenten/rapporten/2020/09/22/rapport-71</ext-link>.</p></fn>
<fn id="fn0009"><p><sup>9</sup>Menkveld (<xref ref-type="bibr" rid="B60">2021</xref>). See also: Cayford and Pieters (<xref ref-type="bibr" rid="B17">2018</xref>).</p></fn>
<fn id="fn0010"><p><sup>10</sup>Veiligheidsdiensten, Commissie van Toezicht op de Inlichtingen-en (2021). &#x0201C;Waarborgen voor effectief toezicht zijn noodzaak - Nieuwsbericht - CTIVD.&#x0201D; Nieuwsbericht. Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten. <ext-link ext-link-type="uri" xlink:href="https://www.ctivd.nl/actueel/nieuws/2021/01/20/index">https://www.ctivd.nl/actueel/nieuws/2021/01/20/index</ext-link>.</p></fn>
<fn id="fn0011"><p><sup>11</sup>Article 1 <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0012"><p><sup>12</sup>Naarttij&#x000E4;rvi (<xref ref-type="bibr" rid="B70">2018</xref>). See also: See also: ECLI:NL:RBDHA:2020:1878, Rechtbank Den Haag, C-09-550982-HA ZA 18-388 (English), accessed January 8, 2024.</p></fn>
<fn id="fn0013"><p><sup>13</sup>ECLI:NL:RBDHA:2014:8966, No. C/09/455237 / HA ZA 13-1325 (July 23, 2014).</p></fn>
<fn id="fn0014"><p><sup>14</sup>Article 36(2)(3) <italic>Wiv 2017</italic>.</p></fn>
<fn id="fn0015"><p><sup>15</sup>For instance, see Report from the CTIVD: Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten (CTIVD). Toezichtsrapport 29 over de door de AIVD uitgebrachte ambtsberichten in de periode van oktober 2005 tot en met mei 2010 - Rapport - CTIVD. rapport (Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten, November 9, 2011), 4. Availabe online at: <ext-link ext-link-type="uri" xlink:href="https://www.ctivd.nl/documenten/rapporten/2011/11/09/index">https://www.ctivd.nl/documenten/rapporten/2011/11/09/index</ext-link>.</p></fn>
<fn id="fn0016"><p><sup>16</sup>Articles 107, 111 <italic>Wiv 2017</italic>.</p></fn>
<fn id="fn0017"><p><sup>17</sup>Article 97(3)(b)(4) Wiv 2017.</p></fn>
<fn id="fn0018"><p><sup>18</sup>See also at 1.4. &#x0201C;Types of Intelligence Oversight&#x0201D;.</p></fn>
<fn id="fn0019"><p><sup>19</sup>For instance, see Section 3.1 &#x0201C;Defining Tensions&#x0201D;.</p></fn>
<fn id="fn0020"><p><sup>20</sup>See also at 1.1. &#x0201C;Defining Accountability&#x0201D;.</p></fn>
<fn id="fn0021"><p><sup>21</sup>Newberry. Public Sector Accounting. 375.</p></fn>
<fn id="fn0022"><p><sup>22</sup>See also: Geneva Centre for the Democratic Control of Armed Force (<xref ref-type="bibr" rid="B39">2017</xref>, p. 2).</p></fn>
<fn id="fn0023"><p><sup>23</sup>La Quadrature du Net and Others (ECLI:EU:C:2020:79), accessed January 16, 2024.</p></fn>
<fn id="fn0024"><p><sup>24</sup>Article 24 of the <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0025"><p><sup>25</sup>Article 18 of the <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0026"><p><sup>26</sup>Article 24 of the <italic>Wiv</italic> 2017. See also: Eddie and Walz (<xref ref-type="bibr" rid="B31">2017</xref>) (see text footnote 1).</p></fn>
<fn id="fn0027"><p><sup>27</sup>Big Brother Watch and Others v. the United Kingdom, No. 58170/13, 62322/14, 24960/15 (ECtHR [GC] May 25, 2021).</p></fn>
<fn id="fn0028"><p><sup>28</sup>Article 50 of the <italic>Wiv 2017</italic>.</p></fn>
<fn id="fn0029"><p><sup>29</sup>See 1.1. &#x0201C;Defining accountability&#x0201D; and 1.5. &#x0201C;Intelligence and Security in a Complex Actor-Forum Relationship&#x0201D;.</p></fn>
<fn id="fn0030"><p><sup>30</sup>Memorie van toelichting; Memorie van toelichting. Pub. L. No. 34588, No.3, 283 (2016), 133, <ext-link ext-link-type="uri" xlink:href="https://zoek.officielebekendmakingen.nl/kst-34588-3.html?idp=https%3A%2F%2Fengine.surfconext.nl%2Fauthentication%2Fidp%2Fmetadata">https://zoek.officielebekendmakingen.nl/kst-34588-3.html?idp=https%3A%2F%2Fengine.surfconext.nl%2Fauthentication%2Fidp%2Fmetadata</ext-link> (Naarttij&#x000E4;rvi, <xref ref-type="bibr" rid="B69">2023</xref>, p. 19).</p></fn>
<fn id="fn0031"><p><sup>31</sup>ECLI:NL:RBDHA:2014:8966,.</p></fn>
<fn id="fn0032"><p><sup>32</sup>ECLI:NL:RBDHA:2014:8966, at 5.43, 5.48.</p></fn>
<fn id="fn0033"><p><sup>33</sup>Cooper, S. An Analysis of New Zealand Intelligence and Security Agency Powers to Intercept Private Communications: Necessary and Proportionate? [2018] AukULawRw 6; (2018) 24 Auckland U L Rev 92. 109. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.nzlii.org/nz/journals/AukULawRw/2018/6.html">http://www.nzlii.org/nz/journals/AukULawRw/2018/6.html</ext-link> (accessed April 16, 2024).</p></fn>
<fn id="fn0034"><p><sup>34</sup>Article 26 <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0035"><p><sup>35</sup>Big Brother Watch and Others v. the United Kingdom at 356.</p></fn>
<fn id="fn0036"><p><sup>36</sup>Article 20 <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0037"><p><sup>37</sup>See for example a recent order against the AIVD to destroy data regarding Bits of Freedom: Commissie van Toezicht op de Inlichtingen-en Commissie van Toezicht op de Inlichtingen-en Veiligheidsdiensten (CTIVD). Beslissing klacht Bits of Freedom over het handelen van de AIVD en de MIVD - 15 juni 2022 - Publicatie - CTIVD. publicatie (Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten, June 15, 2022), <ext-link ext-link-type="uri" xlink:href="https://www.ctivd.nl/documenten/publicaties/2022/06/15/klachtbeslissing">https://www.ctivd.nl/documenten/publicaties/2022/06/15/klachtbeslissing</ext-link>. See also: Belgian Standing Intelligence Agencies Review Committee (<xref ref-type="bibr" rid="B5">2018</xref>, p. 6).</p></fn>
<fn id="fn0038"><p><sup>38</sup>Redress can provide an answer to the problem of many hands discussed by van de Poel et al. (<xref ref-type="bibr" rid="B86">2012</xref>, p. 14).</p></fn>
<fn id="fn0039"><p><sup>39</sup>Article 97(3)(a) Wiv 2017.</p></fn>
<fn id="fn0040"><p><sup>40</sup>See Belgian Standing Intelligence Agencies Review Committee (<xref ref-type="bibr" rid="B5">2018</xref>); See also: Vieth-Ditlmann and Wetzling (<xref ref-type="bibr" rid="B89">2021</xref>, p. 45.</p></fn>
<fn id="fn0041"><p><sup>41</sup>Oerlemans (<xref ref-type="bibr" rid="B73">2021</xref>); See also: Cayford et al. (<xref ref-type="bibr" rid="B18">2018</xref>).</p></fn>
<fn id="fn0042"><p><sup>42</sup>See also: Gill (<xref ref-type="bibr" rid="B41">2020</xref>) and Vieth-Ditlmann and Wetzling (<xref ref-type="bibr" rid="B89">2021</xref>).</p></fn>
<fn id="fn0043"><p><sup>43</sup>Kelley (<xref ref-type="bibr" rid="B53">2003</xref>). See also: Schillemans (<xref ref-type="bibr" rid="B79">2015</xref>).</p></fn>
<fn id="fn0044"><p><sup>44</sup>Born and Wills (<xref ref-type="bibr" rid="B9">2012</xref>, p. 6). See also: Naarttij&#x000E4;rvi (2019, p. 46, 47).</p></fn>
<fn id="fn0045"><p><sup>45</sup>ECLI:NL:RBDHA:2020:1878, Rechtbank Den Haag, C-09-550982-HA ZA 18-388 (English) at 6.5. See also: B&#x000FC;chi et al. (<xref ref-type="bibr" rid="B16">2022</xref>).</p></fn>
<fn id="fn0046"><p><sup>46</sup>La Quadrature du Net and Others (ECLI:EU:C:2020:79) at (para 121).</p></fn>
<fn id="fn0047"><p><sup>47</sup>Article 24 <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0048"><p><sup>48</sup>Sees Articles 114, 117, 124 <italic>Wiv</italic> 2017.</p></fn>
<fn id="fn0049"><p><sup>49</sup>See Article 36(1); <italic>Big Brother Watch and Others v. the United Kingdom</italic> (58170/13).</p></fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aleksovska</surname> <given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>Accountable for what? The effect of accountability standard specification on decision-making behavior in the public sector</article-title>. <source>Public Perform. Manag. Rev.</source> <volume>44</volume>, <fpage>707</fpage>&#x02013;<lpage>734</lpage>. <pub-id pub-id-type="doi">10.1080/15309576.2021.1900880</pub-id></citation>
</ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arnold</surname> <given-names>W.</given-names></name></person-group> (<year>1952</year>). <article-title>National security&#x00027; as an ambiguous symbol</article-title>. <source>Polit. Sci. Q.</source> <volume>67</volume>, <fpage>481</fpage>&#x02013;<lpage>502</lpage>.<pub-id pub-id-type="pmid">2422763</pub-id></citation></ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aucoin</surname> <given-names>P.</given-names></name> <name><surname>Heintzman</surname> <given-names>R.</given-names></name></person-group> (<year>2000</year>). <article-title>The dialectics of accountability for performance in public management reform</article-title>. <source>Int. Rev. Administ. Sci.</source> <volume>66</volume>, <fpage>45</fpage>&#x02013;<lpage>55</lpage>. <pub-id pub-id-type="doi">10.1177/0020852300661005</pub-id></citation>
</ref>
<ref id="B4">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bagave</surname> <given-names>P.</given-names></name> <name><surname>Westberg</surname> <given-names>M.</given-names></name> <name><surname>Dobbe</surname> <given-names>R.</given-names></name> <name><surname>Janssen</surname> <given-names>M.</given-names></name> <name><surname>Yi Ding</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>&#x0201C;Accountable AI for healthcare IoT systems,&#x0201D;</article-title> in <source>Proceedings - 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022</source> (<publisher-loc>New Jersey</publisher-loc>), <fpage>20</fpage>&#x02013;<lpage>28</lpage>.</citation>
</ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><collab>Belgian Standing Intelligence Agencies Review Committee Danish Intelligence Oversight Board, Review Committee on the Intelligence and Security-The Netherlands and The Norwegian Parliamentary Intelligence Oversight Committee.</collab></person-group> (<year>2018</year>). <source>Strengthening Oversight of International Data Exchange between Intelligence and Security Services</source>. Bern.</citation>
</ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bigo</surname> <given-names>D.</given-names></name></person-group> (<year>2019</year>). <article-title>&#x0201C;Beyond National Security, the Emergence of a Digital Reason of State(s) led by transnational guilds of sensitive information: the case of the Five Eyes Plus Network,&#x0201D;</article-title> in <source>Research Handbook on Human Rights and Digital Technology</source>, eds. Wagner, B., Kettemann, M., and K. Vieth (<publisher-loc>Cheltenham</publisher-loc>: <publisher-name>Edward Elgar Publishing</publisher-name>), <fpage>33</fpage>&#x02013;<lpage>52</lpage>.</citation>
</ref>
<ref id="B7">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bigo</surname> <given-names>D.</given-names></name> <name><surname>Carrera</surname> <given-names>S.</given-names></name> <name><surname>Hernanz</surname> <given-names>N.</given-names></name> <name><surname>Scherrer</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <source>National Security and Secret Evidence in Legislation and before the Courts: Exploring the Challenges.</source> CEPS Centre for European Policy Studies. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.ceeol.com/search/book-detail?id=833961">https://www.ceeol.com/search/book-detail?id=833961</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B8">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bochel</surname> <given-names>H.</given-names></name> <name><surname>Defty</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;Parliamentary oversight of intelligence agencies: lessons from Westminster,&#x0201D;</article-title> in <source>Security in a Small Nation : Scotland, Democracy, Politics, Open Reports Series</source>, ed. A. W. Neal (Cambridge: Open Book Publishers), <fpage>103</fpage>&#x02013;<lpage>123</lpage>. <ext-link ext-link-type="uri" xlink:href="http://books.openedition.org/obp/4014">http://books.openedition.org/obp/4014</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="editor"><name><surname>Born</surname> <given-names>H.</given-names></name> <name><surname>Wills</surname> <given-names>A.</given-names></name></person-group> (eds.). (<year>2012</year>). <source>Overseeing Intelligence Services: A Toolkit.</source> <publisher-loc>Geneva</publisher-loc>: <publisher-name>DCAF</publisher-name>.</citation>
</ref>
<ref id="B10">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bovens</surname> <given-names>M.</given-names></name></person-group> (<year>1998</year>). <source>The Quest for Responsibility | Political Theory.</source> Cambridge University Press, 49. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.cambridge.org/nl/academic/subjects/politics-international-relations/political-theory/quest-responsibility-accountability-and-citizenship-complex-organisations">https://www.cambridge.org/nl/academic/subjects/politics-international-relations/political-theory/quest-responsibility-accountability-and-citizenship-complex-organisations</ext-link>; <ext-link ext-link-type="uri" xlink:href="https://www.cambridge.org/nl/academic/subjects/politics-international-relations/political-theory">https://www.cambridge.org/nl/academic/subjects/politics-international-relations/political-theory</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bovens</surname> <given-names>M.</given-names></name></person-group> (<year>2010</year>). <article-title>Two concepts of accountability: accountability as a virtue and as a mechanism</article-title>. <source>West Eur. Polit.</source> <volume>33</volume>, <fpage>946</fpage>&#x02013;<lpage>947</lpage>. <pub-id pub-id-type="doi">10.1080/01402382.2010.486119</pub-id></citation>
</ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bovens</surname> <given-names>M.</given-names></name> <name><surname>Wille</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Indexing watchdog accountability powers a framework for assessing the accountability capacity of independent oversight institutions</article-title>. <source>Regul. Govern.</source> <volume>15</volume>, <fpage>856</fpage>&#x02013;<lpage>876</lpage>. <pub-id pub-id-type="doi">10.1111/rego.12316</pub-id></citation>
</ref>
<ref id="B13">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Braat</surname> <given-names>E.</given-names></name></person-group> (<year>2016</year>). <source>Dutch Intelligence and Security Services. AFIO&#x00027;s Guide to the Study of Intelligence</source>, 661&#x02013;670. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.afio.com/40_guide.htm">https://www.afio.com/40_guide.htm</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B14">
<citation citation-type="book"><person-group person-group-type="editor"><name><surname>Braat</surname> <given-names>E.</given-names></name> <name><surname>Baudet</surname> <given-names>F.</given-names></name> <name><surname>van Woensel</surname> <given-names>J.</given-names></name> <name><surname>Wever</surname> <given-names>A.</given-names></name><etal/></person-group> (eds.). (<year>2017</year>). <source>Intelligence Accountability in a Globalizing World. Towards an Instrument of Measuring Effectiveness</source> (<publisher-loc>The Hague</publisher-loc>: <publisher-name>T.M.C. Asser Press</publisher-name>). <fpage>221</fpage>&#x02013;<lpage>242</lpage>.</citation>
</ref>
<ref id="B15">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Braithwaite</surname> <given-names>J.</given-names></name></person-group> (<year>2006</year>). <source>Accountability and Responsibility Through Restorative Justice</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>), <fpage>33</fpage>&#x02013;<lpage>51</lpage>.</citation>
</ref>
<ref id="B16">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>B&#x000FC;chi</surname> <given-names>M.</given-names></name> <name><surname>Festic</surname> <given-names>N.</given-names></name> <name><surname>Latzer</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>The chilling effects of digital dataveillance: a theoretical model and an empirical research agenda</article-title>. <source>Big Data Soc.</source> <volume>9</volume>, <fpage>20539517211065368</fpage>. <pub-id pub-id-type="doi">10.1177/20539517211065368</pub-id></citation>
</ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cayford</surname> <given-names>M.</given-names></name> <name><surname>Pieters</surname> <given-names>W.</given-names></name></person-group> (<year>2018</year>). <article-title>The effectiveness of surveillance technology: what intelligence officials are saying</article-title>. <source>Inf. Soc.</source> <volume>34</volume>, <fpage>88</fpage>&#x02013;<lpage>103</lpage>. <pub-id pub-id-type="doi">10.1080/01972243.2017.1414721</pub-id></citation>
</ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cayford</surname> <given-names>M.</given-names></name> <name><surname>Pieters</surname> <given-names>W.</given-names></name> <name><surname>Hijzen</surname> <given-names>C. W.</given-names></name></person-group> (<year>2018</year>). <article-title>Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology</article-title>. <source>Intell. Natl. Sec.</source> <volume>33</volume>, <fpage>999</fpage>&#x02013;<lpage>1021</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2018.1487159</pub-id></citation>
</ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cobbe</surname> <given-names>J.</given-names></name> <name><surname>Seng Ah Lee</surname> <given-names>M.</given-names></name> <name><surname>Janssen</surname> <given-names>H.</given-names></name> <name><surname>Singh</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Centering the law in the digital state</article-title>. <source>Computer</source> <volume>53</volume>, <fpage>47</fpage>&#x02013;<lpage>58</lpage>. <pub-id pub-id-type="doi">10.2139/ssrn.3673843</pub-id></citation>
</ref>
<ref id="B20">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Cobbe</surname> <given-names>J.</given-names></name> <name><surname>Veale</surname> <given-names>M.</given-names></name> <name><surname>Singh</surname> <given-names>J.</given-names></name></person-group> (<year>2023</year>). <article-title>&#x0201C;Understanding accountability in algorithmic supply chains,&#x0201D;</article-title> in <source>2023 ACM Conference on Fairness, Accountability, and Transparency (FAccT&#x00027;23)</source> (<publisher-loc>Chicago, IL; New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>1186</fpage>&#x02013;<lpage>1197</lpage>. <pub-id pub-id-type="doi">10.1145/3593013.3594073</pub-id></citation>
</ref>
<ref id="B21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Constantino</surname> <given-names>J.</given-names></name></person-group> (<year>2022</year>). <article-title>Exploring Article 14 of the EU AI Proposal: human in the loop challenges when overseeing high-risk AI Systems in Public Service Organisations</article-title>. <source>Amsterdam Law Forum</source> <volume>14</volume>:<fpage>1</fpage>.</citation>
</ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>de Bruijn</surname> <given-names>H. D.</given-names></name> <name><surname>Heuvelhof</surname> <given-names>E. T.</given-names></name> <name><surname>Koopmans</surname> <given-names>M.</given-names></name></person-group> (<year>2007</year>). <source>Law Enforcement: The Game Between Inspectors and Inspectees.</source> Boca Raton, L: Universal Publishers</citation>
</ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>de Bruijn</surname> <given-names>H. D.</given-names></name> <name><surname>Warnier</surname> <given-names>M.</given-names></name> <name><surname>Janssen</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>The perils and pitfalls of explainable AI: strategies for explaining algorithmic decision-making</article-title>. <source>Gov. Inf. Q.</source> <volume>39</volume>:<fpage>101666</fpage>.</citation>
</ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>de Graaff</surname> <given-names>B. G. J.</given-names></name> <name><surname>Hijzen</surname> <given-names>C. W.</given-names></name></person-group> (<year>2018</year>). <article-title>Zwijgen Is Zilver En Spreken Is Goud</article-title>. <source>Justiti&#x000EB;le Verkenningen</source> <volume>18</volume>, <fpage>148</fpage>&#x02013;<lpage>157</lpage>.</citation>
</ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Defty</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Coming in from the cold: bringing the intelligence and security committee into parliament</article-title>. <source>Intell. Natl. Sec.</source> <volume>34</volume>, <fpage>22</fpage>&#x02013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2018.1513441</pub-id></citation>
</ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Docksey</surname> <given-names>C.</given-names></name> <name><surname>Propp</surname> <given-names>K.</given-names></name></person-group> (<year>2023</year>). <article-title>Government access to personal data and transnational interoperability: an accountability perspective</article-title>. <source>Oslo Law Rev.</source> <volume>10</volume>, <fpage>1</fpage>&#x02013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.18261/olr.10.1.2</pub-id></citation>
</ref>
<ref id="B27">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Dommering</surname> <given-names>D. J.</given-names></name> <name><surname>Jones-Bos</surname> <given-names>R.V.M.</given-names></name> <name><surname>Bot</surname> <given-names>T.P.L.</given-names></name> <name><surname>van den Herik</surname> <given-names>L.J.</given-names></name> <name><surname>Jacobs</surname> <given-names>B.P.F.</given-names></name> <name><surname>Nagtegaal</surname> <given-names>W.</given-names></name> <etal/></person-group>. (<year>2017</year>). <source>Evaluatie 2020 - Wet op de inlichtingen- en veiligheidsdiensten 2017. rapport</source>. Ministerie van Algemene Zaken. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.rijksoverheid.nl/documenten/rapporten/2021/01/20/rapport-evaluatie-2020-wet-op-de-inlichtingen-en-veiligheidsdiensten-2017">https://www.rijksoverheid.nl/documenten/rapporten/2021/01/20/rapport-evaluatie-2020-wet-op-de-inlichtingen-en-veiligheidsdiensten-2017</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Doshi-Velez</surname> <given-names>F.</given-names></name> <name><surname>Kortz</surname> <given-names>M.</given-names></name> <name><surname>Budish</surname> <given-names>R.</given-names></name> <name><surname>Bavitz</surname> <given-names>C.</given-names></name> <name><surname>Gershman</surname> <given-names>S. J.</given-names></name> <name><surname>O&#x00027;Brien</surname> <given-names>D.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Accountability of AI under the law: the role of explanation</article-title>. <source>SSRN Electron. J.</source> <volume>2017</volume>, <fpage>2</fpage>&#x02013;<lpage>3</lpage>. <pub-id pub-id-type="doi">10.1016/j.giq.2021.101666</pub-id></citation>
</ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><collab>Doshi-Velez F. Kortz M. Budish R. Bavitz C. Gershman S. J. O&#x00027;Brien D. (Forthcoming). Accountability of AI Under the Law: The Role of Explanation. Berkman Center Research Publication. 10.2139/ssrn.3064761 </collab></person-group>.</citation>
</ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dur&#x000E1;n</surname> <given-names>I. P.</given-names></name></person-group> (<year>2016</year>). <article-title>Accountability from the perspective of the forum: citizens&#x00027; attitudes towards accountability in europe</article-title>. <source>West Eur. Polit.</source> <volume>39</volume>, <fpage>835</fpage>&#x02013;<lpage>858</lpage>. <pub-id pub-id-type="doi">10.1080/01402382.2015.1105597</pub-id></citation>
</ref>
<ref id="B31">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Eddie</surname> <given-names>N.</given-names></name> <name><surname>Walz</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <source>Monthly Data Collection on the Current Reform of Intelligence Legislation</source>. European Union Agency for Fundamental Rights. Available online at: <ext-link ext-link-type="uri" xlink:href="https://fra.europa.eu/sites/default/files/fra_uploads/netherlands-study-data-surveillance-ii-monthly-data-collection-nl.pdf">https://fra.europa.eu/sites/default/files/fra_uploads/netherlands-study-data-surveillance-ii-monthly-data-collection-nl.pdf</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Enqvist</surname> <given-names>L.</given-names></name> <name><surname>Naarttij&#x000E4;rvi</surname> <given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>&#x0201C;iscretion, automation, and proportionality,&#x0201D;</article-title> in <source>The Rule of Law and Automated Decision-Making: Exploring Fundamentals of Algorithmic Governance</source>, ed. M. Suksi (Cham: Springer International Publishing), 171.</citation>
</ref>
<ref id="B33">
<citation citation-type="web"><person-group person-group-type="author"><collab>European Parliament</collab></person-group> (<year>2014</year>). <source>European Parliament Resolution of 12 March 2014 on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens&#x00027; Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs (2013/2188(INI))</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/?toc=OJ%3AC%3A2017%3A378%3AFULL&#x00026;uri=uriserv%3AOJ.C_.2017.378.01.0104.01.ENG">https://eur-lex.europa.eu/legal-content/EN/TXT/?toc=OJ%3AC%3A2017%3A378%3AFULL&#x00026;uri=uriserv%3AOJ.C_.2017.378.01.0104.01.ENG</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B34">
<citation citation-type="web"><person-group person-group-type="author"><collab>European Union Agency for Fundamental Rights</collab></person-group> (<year>2023</year>). <source>Surveillance by Intelligence Services: Fundamental Rights Safeguards and Remedies in the EU - 2023 Update</source>, 10. Available online at: <ext-link ext-link-type="uri" xlink:href="http://fra.europa.eu/en/publication/2023/surveillance-update">http://fra.europa.eu/en/publication/2023/surveillance-update</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B35">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fest</surname> <given-names>I.</given-names></name> <name><surname>Wieringa</surname> <given-names>M.</given-names></name> <name><surname>Wagner</surname> <given-names>B.</given-names></name></person-group> (<year>2022</year>). <article-title>Paper vs. practice: how legal and ethical frameworks influence public sector data professionals in the Netherlands</article-title>. <source>Patterns</source> <volume>3</volume>:<fpage>100604</fpage>. <pub-id pub-id-type="doi">10.1016/j.patter.2022.100604</pub-id><pub-id pub-id-type="pmid">36277814</pub-id></citation></ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Flyverbom</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>Transparency: mediation and the management of visibilities</article-title>. <source>Int. J. Commun.</source> <volume>10</volume>, <fpage>110</fpage>&#x02013;<lpage>122</lpage>.</citation>
</ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fox</surname> <given-names>J.</given-names></name></person-group> (<year>2007</year>). <article-title>The Uncertain Relationship between Transparency and Accountability</article-title>. <source>Dev. Pract.</source> <volume>17</volume>, <fpage>663</fpage>&#x02013;<lpage>671</lpage>. <pub-id pub-id-type="doi">10.1080/09614520701469955</pub-id></citation>
</ref>
<ref id="B38">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Frissen</surname> <given-names>P.</given-names></name></person-group> (<year>2016</year>). <source>Het Geheim van de Laatste Staat</source>, 220. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.boomfilosofie.nl/product/100-703_Het-geheim-van-de-laatste-staat">https://www.boomfilosofie.nl/product/100-703_Het-geheim-van-de-laatste-staat</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B39">
<citation citation-type="web"><person-group person-group-type="author"><collab>Geneva Centre for the Democratic Control of Armed Force</collab></person-group> (<year>2017</year>). <source>Intelligence Oversight: Ensuring Accountable Intelligence within a Framework of Democratic Governance.</source> DCAF &#x02013; Geneva Centre for Security Sector Governance. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.dcaf.ch/intelligence-oversight-ensuring-accountable-intelligence-within-framework-democratic-governance">https://www.dcaf.ch/intelligence-oversight-ensuring-accountable-intelligence-within-framework-democratic-governance</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gill</surname> <given-names>P.</given-names></name></person-group> (<year>2012</year>). Twenty years on: intelligence and security committee and investigating torture in the &#x02018;war on terror.&#x00027; <italic>Intell. Natl. Sec</italic>. (2023) <volume>38</volume>, <fpage>799</fpage>&#x02013;<lpage>815</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2023.2178606</pub-id></citation>
</ref>
<ref id="B41">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gill</surname> <given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Of intelligence oversight and the challenge of surveillance corporatism</article-title>. <source>Intell. Natl. Sec.</source> <volume>35</volume>, <fpage>970</fpage>&#x02013;<lpage>989</lpage>.</citation>
</ref>
<ref id="B42">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Grant</surname> <given-names>R. W.</given-names></name> <name><surname>Keohane</surname> <given-names>T. O.</given-names></name></person-group> (<year>2005</year>). <article-title>Accountability and abuses of power in world politics</article-title>. <source>Am. Polit. Sci. Rev.</source> <volume>99</volume>, <fpage>29</fpage>&#x02013;<lpage>43</lpage>.</citation>
</ref>
<ref id="B43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greiling</surname> <given-names>D.</given-names></name> <name><surname>Halachmi</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>Accountability and organizational learning in the public sector</article-title>. <source>Public Perform. Manag. Rev.</source> <volume>36</volume>, <fpage>380</fpage>&#x02013;<lpage>406</lpage>. <pub-id pub-id-type="doi">10.2753/PMR1530-9576360301</pub-id></citation>
</ref>
<ref id="B44">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Hages</surname> <given-names>M.</given-names></name> <name><surname>Oerlemans</surname> <given-names>J-J.</given-names></name></person-group> (<year>2021</year>). <source>Big Brother Watch e.a. t. VK (EHRM, 58170/13 e.a.) En Centrum F&#x000F6;r R&#x000E4;ttvisa t. Zweden (EHRM, 35252/08) &#x02013; Legitimering Bulkinterceptie</source>. available online at: <ext-link ext-link-type="uri" xlink:href="https://www.ehrc-updates.nl/commentaar/211671?skip_boomportal_auth=1">https://www.ehrc-updates.nl/commentaar/211671?skip_boomportal_auth=1</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hans&#x000E9;n</surname> <given-names>D.</given-names></name></person-group> (<year>2023</year>). <article-title>Assessing intelligence oversight: the case of Sweden</article-title>. <source>Intellig. Natl. Sec.</source> <volume>38</volume>, <fpage>939</fpage>&#x02013;<lpage>955</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2023.2222534</pub-id></citation>
</ref>
<ref id="B46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hijzen</surname> <given-names>C.</given-names></name></person-group> (<year>2014</year>). <article-title>More than a ritual dance. The Dutch practice of parliamentary oversight and control of the intelligence community</article-title>. <source>Sec. Hum. Rights</source> <volume>24</volume>, <fpage>227</fpage>&#x02013;<lpage>238</lpage>. <pub-id pub-id-type="doi">10.1163/18750230-02404002</pub-id></citation>
</ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hood</surname> <given-names>C.</given-names></name></person-group> (<year>2010</year>). <article-title>Accountability and transparency: siamese twins, matching parts, awkward couple?</article-title> <source>West Eur. Polit.</source> <volume>33</volume>, <fpage>989</fpage>&#x02013;<lpage>1009</lpage>. <pub-id pub-id-type="doi">10.1080/01402382.2010.486122</pub-id></citation>
</ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jaffel</surname> <given-names>H. B.</given-names></name> <name><surname>Larsson</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>Why do we need a new research agenda for the study of intelligence?</article-title> <source>Int. J. Intell. CounterIntelligence</source> <volume>0</volume>, <fpage>1</fpage>&#x02013;<lpage>24</lpage>.</citation>
</ref>
<ref id="B49">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Jansen</surname> <given-names>R.</given-names></name></person-group> (<year>2021</year>). <source>Toezicht onder de Wet op de inlichtingen- en veiligheidsdiensten 2017</source>. Een tour de force, 443. Available online at: <ext-link ext-link-type="uri" xlink:href="https://repository.ubn.ru.nl/handle/2066/237916">https://repository.ubn.ru.nl/handle/2066/237916</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B50">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Joel</surname> <given-names>A.</given-names></name></person-group> (<year>2023</year>). <source>Necessity, Proportionality, and Executive Order 1408</source>6. <italic>Joint PIJIP/TLS Research Paper Series</italic>, 6. Available online at: <ext-link ext-link-type="uri" xlink:href="https://digitalcommons.wcl.american.edu/research/99">https://digitalcommons.wcl.american.edu/research/99</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B51">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Kamer der Staten-Generaal</surname> <given-names>T.</given-names></name></person-group> (<year>1998</year>). <source>Regels met betrekking tot de inlichtingen- en veiligheidsdiensten alsmede wijziging van enkele wetten.</source> Wet op de inlichtingen- en veiligheidsdiensten, 76. Available online at: <ext-link ext-link-type="uri" xlink:href="https://zoek.officielebekendmakingen.nl/kst-25877-3.html">https://zoek.officielebekendmakingen.nl/kst-25877-3.html</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B52">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Kamer</surname> <given-names>T.</given-names></name></person-group> (<year>1998</year>). <source>Regels met betrekking tot de inlichtingen- en veiligheidsdiensten alsmede wijziging van enkele wetten</source>. Wet op de inlichtingen- en veiligheidsdiensten, 76. Available online at: <ext-link ext-link-type="uri" xlink:href="https://zoek.officielebekendmakingen.nl/kst-25877-3.html?idp=https%3A%2F%2Fengine.surfconext.nl%2Fauthentication%2Fidp%2Fmetadata">https://zoek.officielebekendmakingen.nl/kst-25877-3.html?idp=https%3A%2F%2Fengine.surfconext.nl%2Fauthentication%2Fidp%2Fmetadata</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kelley</surname> <given-names>J.</given-names></name></person-group> (<year>2003</year>). <article-title>Overcoming information sharing obstacles and complexity</article-title>. <source>J. Police Chief.</source> <volume>70</volume>, <fpage>24</fpage>&#x02013;<lpage>28</lpage>.</citation>
</ref>
<ref id="B54">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Korff</surname> <given-names>D.</given-names></name> <name><surname>Wagner</surname> <given-names>B.</given-names></name> <name><surname>Powles</surname> <given-names>J.</given-names></name> <name><surname>Avila</surname> <given-names>R.</given-names></name> <name><surname>Buermeyer</surname> <given-names>U.</given-names></name></person-group> (<year>2017</year>). <source>Boundaries of Law: Exploring Transparency, Accountability, and Oversight of Government Surveillance Regimes</source>. SSRN Scholarly Paper. Rochester, NY, 66. Available online at: <ext-link ext-link-type="uri" xlink:href="https://papers.ssrn.com/abstract=2894490">https://papers.ssrn.com/abstract=2894490</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B55">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kundnani</surname> <given-names>A.</given-names></name> <name><surname>Hayes</surname> <given-names>B.</given-names></name></person-group> (<year>2018</year>). <source>The Globalisation of Countering Violent Extremism Policies</source>. <publisher-loc>Amsterdam</publisher-loc>: <publisher-name>The Transnational Institute (TNI)</publisher-name>.</citation>
</ref>
<ref id="B56">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Lipsky</surname> <given-names>M.</given-names></name></person-group> (<year>1980</year>). <source>Street Level Bureaucracy: Dilemmas of the Individual in Public Services.</source> Russell Sage Foundation. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/10.7758/9781610447713">https://www.jstor.org/stable/10.7758/9781610447713</ext-link> (accessed April 19, 2024).<pub-id pub-id-type="pmid">23829555</pub-id></citation></ref>
<ref id="B57">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Macaskill</surname> <given-names>E.</given-names></name></person-group> (<year>2014</year>). <source>Snowden and the Debate on Surveillance versus Privacy.</source> Reuters Institute for the Study of Journalism. Available online at: <ext-link ext-link-type="uri" xlink:href="https://podcasts.ox.ac.uk/snowden-and-debate-surveillance-versus-privacy">https://podcasts.ox.ac.uk/snowden-and-debate-surveillance-versus-privacy</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B58">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>MacAskill</surname> <given-names>E.</given-names></name></person-group> (<year>2018</year>). <source>Special Forces Need to Face Scrutiny from Parliament, Say MPs</source>. The Guardian. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.theguardian.com/uk-news/2018/apr/24/special-forces-need-to-face-scrutiny-from-parliament-say-mps">https://www.theguardian.com/uk-news/2018/apr/24/special-forces-need-to-face-scrutiny-from-parliament-say-mps</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B59">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Meijer</surname> <given-names>A.</given-names></name> <name><surname>Grimmelikhuijsen</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <source>Responsible and Accountable Algorithmization: How to Generate Citizen Trust in Governmental Usage of Algorithms</source>. <publisher-loc>Milton Park, Abingdon</publisher-loc>: <publisher-name>Routledge; The Algorithmic Society</publisher-name>.</citation>
</ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Menkveld</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>Understanding the complexity of intelligence problems</article-title>. <source>Intell. Natl. Sec.</source> <volume>36</volume>, <fpage>621</fpage>&#x02013;<lpage>641</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2021.1881865</pub-id></citation>
</ref>
<ref id="B61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Milaj</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>Privacy, surveillance, and the proportionality principle: the need for a method of assessing privacy implications of technologies used for surveillance</article-title>. <source>Int. Rev. Law Comp. Technol.</source> <volume>30</volume>, <fpage>115</fpage>&#x02013;<lpage>130</lpage>. <pub-id pub-id-type="doi">10.1080/13600869.2015.1076993</pub-id></citation>
</ref>
<ref id="B62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Milaj-Weishaar</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). Safeguarding privacy by regulating the processing of personal data &#x02013; an EU illusion? <italic>Eur. J. Law Technol</italic>. <volume>11</volume>:<fpage>13</fpage>.</citation>
</ref>
<ref id="B63">
<citation citation-type="web"><person-group person-group-type="author"><collab>Ministerie van Binnenlandse Zaken en Koninkrijksrelaties</collab></person-group> (<year>2023a</year>). <source>Toetsing, toezicht en controle - AIVD. onderwerp</source>. Ministerie van Binnenlandse Zaken en Koninkrijksrelaties. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.aivd.nl/onderwerpen/toetsing-toezicht-en-controle-aivd">https://www.aivd.nl/onderwerpen/toetsing-toezicht-en-controle-aivd</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B64">
<citation citation-type="web"><person-group person-group-type="author"><collab>Ministerie van Binnenlandse Zaken en Koninkrijksrelaties</collab></person-group> (<year>2023b</year>). <source>AIVD/MIVD 2018-2023 - Verslag van het functioneren van de diensten - Rapport - Rijksoverheid.nl. rapport</source>. The Hague: Ministerie van Algemene Zaken, 10. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.rijksoverheid.nl/documenten/rapporten/2023/09/01/verslag-van-het-functioneren-van-de-diensten-aivd-mivd-2018-2023">https://www.rijksoverheid.nl/documenten/rapporten/2023/09/01/verslag-van-het-functioneren-van-de-diensten-aivd-mivd-2018-2023</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B65">
<citation citation-type="web"><person-group person-group-type="author"><collab>Ministerie van Justitie en Veiligheid</collab></person-group> (<year>2019</year>). <source>National Security Strategy - Publication - National Coordinator for Security and Counterterrorism.</source> Ministerie van Justitie en Veiligheid, 12. Available online at: <ext-link ext-link-type="uri" xlink:href="https://english.nctv.nl/documents/publications/2019/09/19/national-security-strategy">https://english.nctv.nl/documents/publications/2019/09/19/national-security-strategy</ext-link> (accessed April 19, 2024).<pub-id pub-id-type="pmid">22106250</pub-id></citation></ref>
<ref id="B66">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mohammadi</surname> <given-names>N. K.</given-names></name> <name><surname>Fereshteh Taheri</surname> <given-names>N.</given-names></name> <name><surname>Motallebi</surname> <given-names>M.</given-names></name> <name><surname>Yazdanpanah</surname> <given-names>A.</given-names></name> <name><surname>Khosravi</surname> <given-names>Y.</given-names></name> <name><surname>Jebeli</surname> <given-names>M. B.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Development of a National Conceptual Framework and Measuring Tool for Organisational Social Responsibility and Accountability for Health (OSRAH)</article-title>. <source>Glob. Health Promot.</source> <volume>27</volume>, <fpage>17</fpage>&#x02013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1177/1757975918789346</pub-id><pub-id pub-id-type="pmid">30942661</pub-id></citation></ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Molander</surname> <given-names>A.</given-names></name> <name><surname>Grimen</surname> <given-names>H.</given-names></name> <name><surname>Eriksen</surname> <given-names>E. O.</given-names></name></person-group> (<year>2012</year>). <article-title>Professional discretion and accountability in the welfare state</article-title>. <source>J. Appl. Philos.</source> <volume>29</volume>, <fpage>214</fpage>&#x02013;<lpage>230</lpage>. <pub-id pub-id-type="doi">10.1111/j.1468-5930.2012.00564.x</pub-id></citation>
</ref>
<ref id="B68">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Naarttij&#x000E4;rvi</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <source>Legality and Democratic Deliberation in Black Box Policing</source>. <publisher-loc>Tilburg</publisher-loc>: <publisher-name>Technology and Regulation</publisher-name>, <fpage>35</fpage>&#x02013;<lpage>48</lpage>.</citation>
</ref>
<ref id="B69">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Naarttij&#x000E4;rvi</surname> <given-names>M. M.</given-names></name></person-group> (<year>2023</year>). <source>Situating the Rule of Law in the Context of Automated Decision-Making</source>, 16&#x02013;18. available online at: <ext-link ext-link-type="uri" xlink:href="https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1784482&#x00026;dswid=-1163">https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1784482&#x00026;dswid=-1163</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B70">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Naarttij&#x000E4;rvi</surname> <given-names>N.</given-names></name></person-group> (<year>2018</year>). <article-title>Balancing data protection and privacy &#x02013; the case of information security sensor systems</article-title>. <source>Comp. Law Sec. Rev.</source> <volume>34</volume>, <fpage>1019</fpage>&#x02013;<lpage>1381</lpage>.</citation>
</ref>
<ref id="B71">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Neumann</surname> <given-names>P.</given-names></name></person-group> (<year>2023</year>). <source>The New World Disorder: How the West Is Destroying Itself.</source> Scribe UK. Available online at: <ext-link ext-link-type="uri" xlink:href="https://scribepublications.co.uk/books-authors/books/the-new-world-disorder-9781915590145">https://scribepublications.co.uk/books-authors/books/the-new-world-disorder-9781915590145</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Newberry</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>Public sector accounting: shifting concepts of accountability</article-title>. <source>Public Money Manag.</source> <volume>35</volume>, <fpage>371</fpage>&#x02013;<lpage>376</lpage>. <pub-id pub-id-type="doi">10.1080/09540962.2015.1061180</pub-id></citation>
</ref>
<ref id="B73">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Oerlemans</surname> <given-names>J.-J.</given-names></name></person-group> (<year>2021</year>). <source>Rapport evaluatiecommissie Jones-Bos: the good, the bad and the ugly</source>. jjoerlemans.com (blog). Available online at: <ext-link ext-link-type="uri" xlink:href="https://jjoerlemans.com/2021/01/26/rapport-evaluatiecommissie-jones-bos-the-good-the-bad-and-the-ugly/">https://jjoerlemans.com/2021/01/26/rapport-evaluatiecommissie-jones-bos-the-good-the-bad-and-the-ugly/</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ossege</surname> <given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Accountability &#x02013; are we better off without it?</article-title> <source>Public Manag. Rev.</source> <volume>14</volume>, <fpage>585</fpage>&#x02013;<lpage>607</lpage>. <pub-id pub-id-type="doi">10.1080/14719037.2011.642567</pub-id></citation>
</ref>
<ref id="B75">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Pierucci</surname> <given-names>A.</given-names></name> <name><surname>Walter</surname> <given-names>J-P.</given-names></name></person-group> (<year>2020</year>). <source>Controlling the Use of Personal Data by Intelligence Agencies.</source> Council of Europe Officials Call for Action. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.statewatch.org/news/2020/september/controlling-the-use-of-personal-data-by-intelligence-agencies-council-of-europe-officials-call-for-action/">https://www.statewatch.org/news/2020/september/controlling-the-use-of-personal-data-by-intelligence-agencies-council-of-europe-officials-call-for-action/</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B76">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Pollitt</surname> <given-names>C.</given-names></name></person-group> (<year>2003</year>). <source>The Essential Public Manager</source> (<publisher-loc>McGraw-Hill.wagner</publisher-loc>), <fpage>89</fpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.mheducation.co.uk/the-essential-public-manager-9780335212323-emea">https://www.mheducation.co.uk/the-essential-public-manager-9780335212323-emea</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B77">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Rekenkamer</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <source>Slagkracht AIVD en MIVD - Rapport - Algemene Rekenkamer. rappor</source>t. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.rekenkamer.nl/publicaties/rapporten/2021/04/22/slagkracht-aivd-en-mivd">https://www.rekenkamer.nl/publicaties/rapporten/2021/04/22/slagkracht-aivd-en-mivd</ext-link> (accessed April 22, 2021).</citation>
</ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ryngaert</surname> <given-names>C. M. J.</given-names></name> <name><surname>van Eijk</surname> <given-names>N. A.</given-names></name></person-group> (<year>2019</year>). <article-title>International Cooperation by (European) Security and Intelligence Services: reviewing the creation of a joint database in light of data protection guarantees</article-title>. <source>Int. Data Privacy Law</source> <volume>9</volume>, <fpage>61</fpage>&#x02013;<lpage>73</lpage>. <pub-id pub-id-type="doi">10.1093/idpl/ipz001</pub-id></citation>
</ref>
<ref id="B79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schillemans</surname> <given-names>T.</given-names></name></person-group> (<year>2015</year>). <article-title>Managing public accountability: how public managers manage public accountability</article-title>. <source>Int. J. Public Administ.</source> <volume>38</volume>, <fpage>433</fpage>&#x02013;<lpage>441</lpage>. <pub-id pub-id-type="doi">10.1080/01900692.2014.949738</pub-id></citation>
</ref>
<ref id="B80">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Solove</surname> <given-names>J. D.</given-names></name></person-group> (<year>2007</year>). &#x02018;<italic>I&#x00027;ve Got Nothing to Hide&#x00027; and Other Misunderstandings of Privacy</italic>. SSRN Scholarly Paper. Rochester, NY. Available online at: <ext-link ext-link-type="uri" xlink:href="https://papers.ssrn.com/abstract=998565">https://papers.ssrn.com/abstract=998565</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stottlemyre</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>Intelligence for human security: measuring outcomes quantitatively</article-title>. <source>Intell. Natl. Sec.</source> <volume>0</volume>, <fpage>1</fpage>&#x02013;<lpage>26</lpage>.</citation>
</ref>
<ref id="B82">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Taylor</surname> <given-names>N.</given-names></name></person-group> (<year>2011</year>). <article-title>A conceptual legal framework for privacy, accountability and transparency in visual surveillance systems</article-title>. <source>Surveill. Soc.</source> <volume>8</volume>, <fpage>455</fpage>&#x02013;<lpage>470</lpage>. <pub-id pub-id-type="doi">10.24908/ss.v8i4.4182</pub-id></citation>
</ref>
<ref id="B83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tian</surname> <given-names>X.</given-names></name></person-group> (<year>2017</year>). <article-title>Accountability without democracy: evidence from confucian accountability</article-title>. <source>Aust. J. Polit. Sci.</source> <volume>52</volume>, <fpage>126</fpage>&#x02013;<lpage>142</lpage>. <pub-id pub-id-type="doi">10.1080/10361146.2016.1245276</pub-id></citation>
</ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vaage</surname> <given-names>B. H.</given-names></name> <name><surname>Stenslie</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>How good is Norwegian intelligence?</article-title> <source>Int. J. Intell. CounterIntell.</source> <volume>36</volume>, <fpage>968</fpage>&#x02013;<lpage>979</lpage>. <pub-id pub-id-type="doi">10.1080/08850607.2021.1986792</pub-id></citation>
</ref>
<ref id="B85">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>van Buuren</surname> <given-names>V.</given-names></name></person-group> (<year>2009</year>). <source>Secret Truth</source>. Amsterdam: The EU Joint Situation Centre, Eurowatch. 2. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.statewatch.org/media/documents/news/2009/aug/SitCen2009.pdf">https://www.statewatch.org/media/documents/news/2009/aug/SitCen2009.pdf</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B86">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>van de Poel</surname> <given-names>I. R.</given-names></name> <name><surname>Fahlquist</surname> <given-names>J.N.</given-names></name> <name><surname>Doorn</surname> <given-names>N.S.D</given-names></name> <name><surname>Royakkers</surname> <given-names>L.M.M.</given-names></name></person-group> (<year>2012</year>). <article-title>The problem of many hands : climate change as an example</article-title>. <source>Sci. Eng. Ethics</source> <volume>18</volume>, <fpage>49</fpage>&#x02013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1007/s11948-011-9276-0</pub-id><pub-id pub-id-type="pmid">21533835</pub-id></citation></ref>
<ref id="B87">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>van Puyvelde</surname> <given-names>D. V.</given-names></name></person-group> (<year>2013</year>). <article-title>Intelligence accountability and the role of public interest groups in the United States</article-title>. <source>Intell. Natl. Sec.</source> <volume>28</volume>, <fpage>139</fpage>&#x02013;<lpage>158</lpage>. <pub-id pub-id-type="doi">10.1080/02684527.2012.735078</pub-id></citation>
</ref>
<ref id="B88">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>van Puyvelde</surname> <given-names>D. V.</given-names></name></person-group> (<year>2020</year>). <article-title>European intelligence agendas and the way forward</article-title>. <source>Int. J. Intell. CounterIntell.</source> <volume>33</volume>, <fpage>596</fpage>&#x02013;<lpage>513</lpage>. <pub-id pub-id-type="doi">10.1080/08850607.2020.1754666</pub-id><pub-id pub-id-type="pmid">29028232</pub-id></citation></ref>
<ref id="B89">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Vieth-Ditlmann</surname> <given-names>K.</given-names></name> <name><surname>Wetzling</surname> <given-names>T.</given-names></name></person-group> (<year>2021</year>). <source>Caught in the Act? An Analysis of Germany&#x00027;s New SIGINT Reform</source>. United Kingdom: Human Rights Centre, University of Essex, 43. Avaailable online at: <ext-link ext-link-type="uri" xlink:href="https://www.stiftung-nv.de/de/publikation/caught-act-analysis-germanys-new-sigint-reform">https://www.stiftung-nv.de/de/publikation/caught-act-analysis-germanys-new-sigint-reform</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B90">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wagner</surname> <given-names>B.</given-names></name> <name><surname>de Gooyert</surname> <given-names>V.</given-names></name> <name><surname>Veeneman</surname> <given-names>W.</given-names></name></person-group> (<year>2023</year>). <article-title>Sustainable development goals as accountability mechanism? A case study of Dutch infrastructure agencies</article-title>. <source>J. Respons. Technol.</source> <volume>14</volume>:<fpage>100058</fpage>. <pub-id pub-id-type="doi">10.1016/j.jrt.2023.100058</pub-id></citation>
</ref>
<ref id="B91">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wetzling</surname> <given-names>T.</given-names></name></person-group> (<year>2019</year>). <article-title>&#x0201C;Germany&#x00027;s recent intelligence reform revisited: a wolf in sheep&#x00027;s clothing?,&#x0201D;</article-title> in <source>Research Handbook on Human Rights and Digital Technology</source>, eds. Wagner, B., Kettemann, M., and Vieth, K. (Cheltenham: Edward Elgar Publishing), 228.</citation>
</ref>
<ref id="B92">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wieringa</surname> <given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>&#x0201C;What to account for when accounting for algorithms: a systematic literature review on algorithmic accountability,&#x0201D;</article-title> in <source>Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency</source>, FAT<sup>&#x0002A;</sup> &#x00027;20 (New York, NY: Association for Computing Machinery), 2.<pub-id pub-id-type="pmid">35297371</pub-id></citation></ref>
<ref id="B93">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Wills</surname> <given-names>A.</given-names></name> <name><surname>Vermeulen</surname> <given-names>M.</given-names></name></person-group> (<year>2011</year>). <source>Parliamentary Oversight of Security and Intelligence Agencies in The European Union</source>. CAF &#x02013; Geneva Centre for Security Sector Governance, 41. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.dcaf.ch/parliamentary-oversight-security-and-intelligence-agencies-european-union">https://www.dcaf.ch/parliamentary-oversight-security-and-intelligence-agencies-european-union</ext-link> (accessed April 19, 2024).</citation>
</ref>
<ref id="B94">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zuboff</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <source>The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, 1st Edn</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>PublicAffairs</publisher-name>), <fpage>4</fpage>&#x02013;<lpage>8</lpage>.</citation>
</ref>
</ref-list>
</back>
</article>