Skip to main content

Freedom and Security — Responses to the Threat of International Terrorism

  • Chapter
  • 448 Accesses

Abstract

The September 11 attacs have led to a number of changes in the legislative framework of the EU member states. Governments intended to react quickly, powerfully and with high public visibility reactions in public to justify the power of technology in the interests of national security. The new goal is to search terrorist activity in the ocean of telecommunications data retained by communications providers and accessed by intelligence authorities. EU member states have to put in place a national data retention law by March 2009. In Germany, the most recent problem is the question of the legality of the secret online-surveillance and search of IT-Sytems, especially concerning of individual’s PCs. The German Federal Constitutional Court has held, that the area of governmental authority for intervention must be limited by the constitutional protection of human dignity and fundamental rights like information privacy, telecommunications secrecy and respect for the home. In February 2008 the highest German Court created a new human right of confidentially and integrity of IT-Systems. The decision has to be understood as a reaction to the widespread use of invisible information technology by legal authorities and their secret and comprehensive surveillance of the citizens.

This article highlights the critical question, whether civilization, human rights and democracy can survive at a time, when, after the rise of terrorism the security principle seems to be the primary arbiter of information society. In particular the German Court decisions will serve as convincing evidence on the real strength of balance between freedom and security, both of which are claimed to defend the open information society.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, Hans-Jörg et al.: Überwachung der Telekommunikation nach den §§ 100a, 100b StPO und anderer verdeckter Ermittlungsmaßnahmen (Legal Reality and Effiency of the Surveillance of Telecommunication under „“ 100a, 100b of the Criminal Procedure Code and other Concealed Measures for Investigations), Max-Planck Studie (MPI Study), Institutsverlag.

    Google Scholar 

  2. Dempsey, James and Flint, Lara: Commercial Data and National Security, 72 Geo Wash L. Rev., 1459–1467.

    Google Scholar 

  3. Lee, Ronald D., Schwartz, Paul M.: Heymann: Terrorism, Freedom. And Security: Winning Without War, Michigan L. Rev. Vol. 103, No. 6, 1446–1482

    Google Scholar 

  4. Petri, B. Thomas, Das Urteil des Bundesverfassungsgerichts zur „Online-Durchsuchung“, 7 Datenschutz und Datensicherheit, is printing

    Google Scholar 

  5. Papier, Hans-Jürgen: Der Zweck des Staates ist die Wahrung der Freiheit. Über das Spannungsverhältnis von Freiheit und Sicherheit aus verfassungsrechtlicher Sicht — Ein Vortrag auf der Tagung „Freiheit und Sicherheit — Verfassungspolitische Dimensionen der Akademie für Politische Bildung Tutzing am 30. Mai, available at http//www.welt.de/papier

    Google Scholar 

  6. Schneier, Bruce, Why Data Mining Won’t Stop Terror, (Wired on March 9, 2006) avoided under: http://www.wired.com/politics/security/commentary/security matters/2006/03/70357

    Google Scholar 

  7. Tinnefeld, Marie-Theres: Freiheitsrechte vs. staatliche Trojaner. Anmerkungen zum „angstbasierten“ präventiv-autoritären Sicherheitsstaat, 1 Datenschutz und Datensicherheit, 7–12

    Google Scholar 

  8. Warren, Samuel D. Brandeis, Louis D.: The Right to Privacy; 4 Harv. L. Rev. 193–197 (1890)

    Google Scholar 

  9. Watney, Murdoch: The Legal Konflict between Security and Privacy in Adressing Crime and Terrorism on the Internet, Pohlmann, Norbert, Reimer, Helmut, Schneider, Wolfgang (ED.), ISSE/SECURE 2007, 26–37

    Google Scholar 

  10. Westin, Alan F., Privacy and Freedom, 1967

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Tinnefeld, MT. (2009). Freedom and Security — Responses to the Threat of International Terrorism. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_9

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics