Freedom and security - Responses to the threat of international terrorism

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The September 11 attacs have led to a number of changes in the legislative framework of the EU member states. Governments intended to react quickly, powerfully and with high public visibility reactions in public to justify the power of technology in the interests of national security. The new goal is to search terrorist activity in the ocean of telecommunications data retained by communications providers and accessed by intelligence authorities. EU member states have to put in place a national data retention law by March 2009. In Germany, the most recent problem is the question of the legality of the secret online-surveillance and search of IT-Systems, especially concerning of individual's PCs. The German Federal Constitutional Court has held, that the area of governmental authority for intervention must be limited by the constitutional protection of human dignity and fundamental rights like information privacy, telecommunications secrecy and respect for the home. In February 2008 the highest German Court created a new human right of confidentially and integrity of IT-Systems. The decision has to be understood as a reaction to the widespread use of invisible information technology by legal authorities and their secret and comprehensive surveillance of the citizens. This article highlights the critical question, whether civilization, human rights and democracy can survive at a time, when, after the rise of terrorism the security principle seems to be the primary arbiter of information society. In particular the German Court decisions will serve as convincing evidence on the real strength of balance between freedom and security, both of which are claimed to defend the open information society. © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Tinnefield, M. T. (2009). Freedom and security - Responses to the threat of international terrorism. In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 93–98). https://doi.org/10.1007/978-3-8348-9283-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free