Abstract
The September 11 attacs have led to a number of changes in the legislative framework of the EU member states. Governments intended to react quickly, powerfully and with high public visibility reactions in public to justify the power of technology in the interests of national security. The new goal is to search terrorist activity in the ocean of telecommunications data retained by communications providers and accessed by intelligence authorities. EU member states have to put in place a national data retention law by March 2009. In Germany, the most recent problem is the question of the legality of the secret online-surveillance and search of IT-Sytems, especially concerning of individual’s PCs. The German Federal Constitutional Court has held, that the area of governmental authority for intervention must be limited by the constitutional protection of human dignity and fundamental rights like information privacy, telecommunications secrecy and respect for the home. In February 2008 the highest German Court created a new human right of confidentially and integrity of IT-Systems. The decision has to be understood as a reaction to the widespread use of invisible information technology by legal authorities and their secret and comprehensive surveillance of the citizens.
This article highlights the critical question, whether civilization, human rights and democracy can survive at a time, when, after the rise of terrorism the security principle seems to be the primary arbiter of information society. In particular the German Court decisions will serve as convincing evidence on the real strength of balance between freedom and security, both of which are claimed to defend the open information society.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Albrecht, Hans-Jörg et al.: Überwachung der Telekommunikation nach den §§ 100a, 100b StPO und anderer verdeckter Ermittlungsmaßnahmen (Legal Reality and Effiency of the Surveillance of Telecommunication under „“ 100a, 100b of the Criminal Procedure Code and other Concealed Measures for Investigations), Max-Planck Studie (MPI Study), Institutsverlag.
Dempsey, James and Flint, Lara: Commercial Data and National Security, 72 Geo Wash L. Rev., 1459–1467.
Lee, Ronald D., Schwartz, Paul M.: Heymann: Terrorism, Freedom. And Security: Winning Without War, Michigan L. Rev. Vol. 103, No. 6, 1446–1482
Petri, B. Thomas, Das Urteil des Bundesverfassungsgerichts zur „Online-Durchsuchung“, 7 Datenschutz und Datensicherheit, is printing
Papier, Hans-Jürgen: Der Zweck des Staates ist die Wahrung der Freiheit. Über das Spannungsverhältnis von Freiheit und Sicherheit aus verfassungsrechtlicher Sicht — Ein Vortrag auf der Tagung „Freiheit und Sicherheit — Verfassungspolitische Dimensionen der Akademie für Politische Bildung Tutzing am 30. Mai, available at http//www.welt.de/papier
Schneier, Bruce, Why Data Mining Won’t Stop Terror, (Wired on March 9, 2006) avoided under: http://www.wired.com/politics/security/commentary/security matters/2006/03/70357
Tinnefeld, Marie-Theres: Freiheitsrechte vs. staatliche Trojaner. Anmerkungen zum „angstbasierten“ präventiv-autoritären Sicherheitsstaat, 1 Datenschutz und Datensicherheit, 7–12
Warren, Samuel D. Brandeis, Louis D.: The Right to Privacy; 4 Harv. L. Rev. 193–197 (1890)
Watney, Murdoch: The Legal Konflict between Security and Privacy in Adressing Crime and Terrorism on the Internet, Pohlmann, Norbert, Reimer, Helmut, Schneider, Wolfgang (ED.), ISSE/SECURE 2007, 26–37
Westin, Alan F., Privacy and Freedom, 1967
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Tinnefeld, MT. (2009). Freedom and Security — Responses to the Threat of International Terrorism. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_9
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)