Advertisement

Freedom and Security — Responses to the Threat of International Terrorism

  • Marie-Theres Tinnefeld

Abstract

The September 11 attacs have led to a number of changes in the legislative framework of the EU member states. Governments intended to react quickly, powerfully and with high public visibility reactions in public to justify the power of technology in the interests of national security. The new goal is to search terrorist activity in the ocean of telecommunications data retained by communications providers and accessed by intelligence authorities. EU member states have to put in place a national data retention law by March 2009. In Germany, the most recent problem is the question of the legality of the secret online-surveillance and search of IT-Sytems, especially concerning of individual’s PCs. The German Federal Constitutional Court has held, that the area of governmental authority for intervention must be limited by the constitutional protection of human dignity and fundamental rights like information privacy, telecommunications secrecy and respect for the home. In February 2008 the highest German Court created a new human right of confidentially and integrity of IT-Systems. The decision has to be understood as a reaction to the widespread use of invisible information technology by legal authorities and their secret and comprehensive surveillance of the citizens.

This article highlights the critical question, whether civilization, human rights and democracy can survive at a time, when, after the rise of terrorism the security principle seems to be the primary arbiter of information society. In particular the German Court decisions will serve as convincing evidence on the real strength of balance between freedom and security, both of which are claimed to defend the open information society.

Keywords

Human Dignity Information Society Communication Provider Legislative Framework Governmental Authority 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Albr03]
    Albrecht, Hans-Jörg et al.: Überwachung der Telekommunikation nach den §§ 100a, 100b StPO und anderer verdeckter Ermittlungsmaßnahmen (Legal Reality and Effiency of the Surveillance of Telecommunication under „“ 100a, 100b of the Criminal Procedure Code and other Concealed Measures for Investigations), Max-Planck Studie (MPI Study), Institutsverlag.Google Scholar
  2. [DeFl04]
    Dempsey, James and Flint, Lara: Commercial Data and National Security, 72 Geo Wash L. Rev., 1459–1467.Google Scholar
  3. [LeSc05]
    Lee, Ronald D., Schwartz, Paul M.: Heymann: Terrorism, Freedom. And Security: Winning Without War, Michigan L. Rev. Vol. 103, No. 6, 1446–1482Google Scholar
  4. [Petr08]
    Petri, B. Thomas, Das Urteil des Bundesverfassungsgerichts zur „Online-Durchsuchung“, 7 Datenschutz und Datensicherheit, is printingGoogle Scholar
  5. [Papi08]
    Papier, Hans-Jürgen: Der Zweck des Staates ist die Wahrung der Freiheit. Über das Spannungsverhältnis von Freiheit und Sicherheit aus verfassungsrechtlicher Sicht — Ein Vortrag auf der Tagung „Freiheit und Sicherheit — Verfassungspolitische Dimensionen der Akademie für Politische Bildung Tutzing am 30. Mai, available at http//www.welt.de/papierGoogle Scholar
  6. [Schn06]
    Schneier, Bruce, Why Data Mining Won’t Stop Terror, (Wired on March 9, 2006) avoided under: http://www.wired.com/politics/security/commentary/security matters/2006/03/70357Google Scholar
  7. [Tinn08]
    Tinnefeld, Marie-Theres: Freiheitsrechte vs. staatliche Trojaner. Anmerkungen zum „angstbasierten“ präventiv-autoritären Sicherheitsstaat, 1 Datenschutz und Datensicherheit, 7–12Google Scholar
  8. [WaBr90]
    Warren, Samuel D. Brandeis, Louis D.: The Right to Privacy; 4 Harv. L. Rev. 193–197 (1890)Google Scholar
  9. [Watn07]
    Watney, Murdoch: The Legal Konflict between Security and Privacy in Adressing Crime and Terrorism on the Internet, Pohlmann, Norbert, Reimer, Helmut, Schneider, Wolfgang (ED.), ISSE/SECURE 2007, 26–37Google Scholar
  10. [West67]
    Westin, Alan F., Privacy and Freedom, 1967Google Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden 2009

Authors and Affiliations

  • Marie-Theres Tinnefeld
    • 1
  1. 1.University of Applied Sciences MunichGermany

Personalised recommendations