Journal of Transportation Security

, Volume 6, Issue 1, pp 27–42 | Cite as

The ePassport — new technology to counter security threats



The ePassport is the culmination of a sustained process of development of technical specifications for machine readable travel documents (MRTD). It introduces a new dimension to aviation security in that, within the conventional machine readable passport with its machine readable zone, an additional layer of verification of information contained in an electronic chip is placed, which verifies the information in the passport’s machine readable zone by the use of a special reader. Much research has gone into the areas of the technology and verification in the development of the ePassport. At a Symposium held at the International Civil Aviation Organization in early October 2012, the ePassport was subjected to much discussion by the various experts gathered from across the globe. This article discusses these deliberations and places them against the backdrop of the privacy of the individual and aviation security law.


Biometric indentification Public key infrastructure Cryptographic technology Privacy State responsibility MRTD Symposium ICAO ePassport 


  1. Abeyratne RIR (2001) The exchange of airline passenger information — issues of privacy. Comm Law 6(5):153–162Google Scholar
  2. Abeyratne RIR (2002a) Intellectual property rights and privacy issues: the aviation experience in API and biometric identification. J World Intellect Property 5(4):631–650CrossRefGoogle Scholar
  3. Abeyratne RIR (2002b) Transport Law J 30(1):53–80Google Scholar
  4. Abeyratne RIR (2004) Privatization of Hong Kong International Airport: some legal and economic issues. Asia Pac Law Rev 12(1):31–51Google Scholar
  5. Abeyratne RIR (2007) The safe carriage of dangerous pathogens by air: legal and regulatory issues. Eur Transport Law XLII(6):689–704Google Scholar
  6. Abeyratne R (2009) Principles of responsibility for private acts of terrorism. Bar Association Law Journal XV:55–64Google Scholar
  7. Becker T (2006) Terrorism and the State, Hart Monographs in Transnational and International Law. Hart Publishing, p 155Google Scholar
  8. Burnham D (1983) The rise of the computer state. Random House, New York, p 20Google Scholar
  9. Caron DD (1998) The basis of responsibility: attribution and other trans-substantive rules. In: Lillich RB, Magraw DB (eds) The Iran-United States claims tribunal: its conclusions to state responsibility, vol 109. Transnational Publishers, Irvington -on –Hudson, pp 153–154Google Scholar
  10. Cate FH (1997) Privacy in the information age. Brookings Institution Press, Washington, DC, p 49Google Scholar
  11. Cooley TM (1888) A treatise on the law of torts, 2nd edn. Callaghan, ChicagoGoogle Scholar
  12. DOJ v. Reporters Comm. for Freedom of the Press, 489 U.S. 749 AT 763 (1988)Google Scholar
  13. Foschio LG (1990) Motor vehicle records: balancing individual privacy and the public’s legitimate need to know. In: Kuferman TR (ed) Privacy and publicity. Meckler, London, p 35Google Scholar
  14. Freund PA (1971) Privacy: one concept or many. In: Pennnock JR, Chapman JW (eds) Privacy. Atherton, New York, p 182Google Scholar
  15. Fried C (1978) Privacy: economics and ethics a comment on posner. Ga L Rev 12:423–425Google Scholar
  16. Gavison R (1980) Privacy and the limit s of the law. Yale L J 89:421CrossRefGoogle Scholar
  17. Halpin A (1997) Rights & law analysis & theory. Hart Publishing, Oxford, p 111Google Scholar
  18. Hoffer S (2000) World cyberspace law. Juris Publishing, p 8.1Google Scholar
  19. Hoffman LJ (ed) (1980) Computers and privacy in the next decade. Academic, New York, p 142Google Scholar
  20. International Court of Justice (2000) News Release 99/36, “Questions of Interpretation and Application of the 1971 Montreal Convention arising from the Aerial Incident at Lockerbie” (1 July 1999), online: (date accessed: 14 July 2000)
  21. Jones RV (1973) Some threats of technology to privacy, privacy and human rights, A. H. Robertson ed. (Presented at the Third Colloquy about the European Convention on Human Rights, Brussels, 30 Sept-3 Oct 1970), Manchester University PressGoogle Scholar
  22. Miller AR (1971) The assault on privacy. The University of Michigan Press, Ann Arbor, p 42Google Scholar
  23. J. Montgomery Curtis Memorial Seminar (1992) The Public, Privacy and the Press: Have the Media Gone Too Far? American Press Institute, p 2Google Scholar
  24. Nock SL (1993) The costs of privacy. Aldine De Gryter, New York, p 43Google Scholar
  25. Ogus A (1994) Regulation, Legal Form and Economic Theory. Oxford University Press, CharterGoogle Scholar
  26. Orwell G (1984) Nineteen eighty-four. Clarendon, OxfordGoogle Scholar
  27. Pember DR (1972) Privacy and the press. University of Washington Press, Seattle, p 227Google Scholar
  28. Posner R (1978) The right of privacy. Ga L Rev 12(3):393–409Google Scholar
  29. Prowda JB (1995) A Layer’s ramble down the information superhighway: privacy and security of data. Fordham L Rev 64:738–769Google Scholar
  30. Regan PM (1995) Legislating privacy. The University of North Caroline Press, Chapel Hill, p 33Google Scholar
  31. Reidenberg (1995) Data Protection Law and the European Union’s directive: the challenge for the United States: setting standards for fair information practice in the U.S. private sector. Iowa L Rev 80:497–498Google Scholar
  32. Scott GG (1995) Mind your own business – the battle for personal privacy. Insight Books, New York, p 307Google Scholar
  33. Simitis S (1995) From the market to the Polis: the EC Directive on the protection for Personal Data. Iowa L Rev 80(445):447–448Google Scholar
  34. Simmel A (1971) Privacy is not an isolated freedom. In: Pennnock JR, Chapman JW (eds) Privacy. Atherton, New York, p 71Google Scholar
  35. The Department of State (1944) Proceedings of the International Civil Aviation Conference, Chicago, Illinois, November 1-December 7 1944 Vol. 1 p. 43Google Scholar
  36. Warren SD, Brandeis LD (1980) The right of privacy. Harv L Rev 4(5):193–195CrossRefGoogle Scholar
  37. Warren SD and Brandies LD (1890–91) The right to privacy. Harv Law Rev 4: 193Google Scholar
  38. Westin A (1967) Privacy and freedom. Atheneum, New York, p 368Google Scholar
  39. Westin AF (1970) Privacy and Freedom. Bodley Head, p 124Google Scholar
  40. Young JB (ed) (1978) Privacy. Willey and Sons, New York, p 1Google Scholar
  41. Zelermyer W (1959) Invasion of privacy. Syracuse University Press, Syracuse, p 16Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.International Civil Aviation OrganizationMontrealCanada

Personalised recommendations