Advertisement

Privacy versus national security: The impact of privacy law on the use of location technology for national security purposes

  • Bastiaan van Loenen
  • Danielle Groetelaers
  • Jaap Zevenbergen
  • Jitske de Jong
Part of the Lecture Notes in Geoinformation and Cartography book series (LNGC)

Abstract

Location technology allows for the continuous tracking of individuals. Knowledge about the person’s whereabouts also allows for the development of location based services at a very detailed levels. However, there is a potential danger that the further development of the appealing technologies will be blocked by privacy regulations. This paper assesses the legal framework on balancing privacy and national security at the European level. Although the privacy restrictions may limit the use within the consumer market, for purposes of national security they appear to be almost non-existent. The European Court of Human Rights’ judgments confirm that privacy invading technologies can be used to increase national security. A discussion on the need for far-reaching surveillance mandates for national intelligence services concludes this paper.

Keywords

Location privacy national security location technology Europe 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. 1.
    Walters G.J.: Privacy and security. ACM SIGCAS Computers andSociety Vol. 31.(2001)8–23CrossRefGoogle Scholar
  2. 2.
    Haggerty K.D., Ericson R.V.: The surveillant assemblage. BritishJournal of Sociology Vol. 51. (2000) 605–622CrossRefGoogle Scholar
  3. 3.
    Levi M., Wall D.S.: Technologies, security, and privacy in the post9/11European information society. Journal of Law and Society Vol.31.(2004) 194–220CrossRefGoogle Scholar
  4. 4.
    Cooley T.: Cooley on Torts 2d ed., p. 29. (1880)Google Scholar
  5. 5.
    Margulis S.T.: On the status and contributions of Westin’s andAltman’s theories of privacy. Journal of Social Issues Vol. 59. (2003)411–429CrossRefGoogle Scholar
  6. 6.
    Westin A.F.: Privacy and Freedom. New York, Atheneum (1967)Google Scholar
  7. 7.
    Altman I.: The Environment and Social Behavior. Monterey,California, Brooks/ Cole Publishing Company (1975)Google Scholar
  8. 8.
    Westin A.F.: Social and political dimensions of privacy. Journal ofSocial Issues Vol. 59. (2003) 431–453CrossRefGoogle Scholar
  9. 9.
    IPTS (Institute for Prospective Technological Studies): Security andprivacy for the citizen in the post-September 11 digital age: Aprospective overview. Report to the European Parliament Committeeon Citizens Freedoms and Rights, Justice and Home affairs (LIBE),(2003)Google Scholar
  10. 10.
    Raab CD., Bennett C.J.: The Distribution of Privacy Risks: WhoNeeds Protection? The Information Society Vol. (1998) 263–274Google Scholar
  11. 11.
    Loof J.P.: Mensenrechten en staatsveiligheid: verenigbaregrootheden? Wolf Legal Publishers (2005)Google Scholar
  12. 12.
    Blok P.: Het recht op privacy. Boom juridische uitgevers (2002)Google Scholar
  13. 13.
    Longley P.A., Goodchild M.F., Maguire D.J., Rhind D.W.:Geographic information Systems and Science. Chicester, England, John Wiley and Sons Ltd(2001)Google Scholar
  14. 14.
    Gruteser M., Grunwald D.: A methodological assessment of locationprivacy risks in wireless hotspot networks. Lecture notes in computerscience Vol. 2802. (2004) 10–24CrossRefGoogle Scholar
  15. 15.
    Korff D.: EC Study On Implementation of Data Protection DirectiveComparative Summary of National Laws. Cambridge (UK), (2002)Google Scholar
  16. 16.
    Europe: Recommendation 1426 (1999) European democracies facingup to terrorism. Parliamentary Assembly of the Council of Europe.Text adopted by the Assembly on 23 September 1999 (30th Sitting)(ed), (1999)Google Scholar
  17. 17.
    Marx G.T.: What’s new about the “new surveillance”? Classifying forchange and continuity. Surveillance and Society Vol. 1. (2002) 9–29Google Scholar
  18. 18.
    Peissl W.: Surveillance and security: a dodgy relationship. Vienna/Den Haag, Institute of Technology Assessment/ Rathenau Instituut,(2002): 12Google Scholar
  19. 19.
    O’Harrow Jr. R.: No place to hide; Behind the scenes of our emergingsurveillance society. The Free Press (2005)Google Scholar
  20. 20.
    Danezis G., Stephen Lewis, Anderson R.: How much is your privacyworth? Fourth Workshop on the Economics of Information SecurityVol. (2005)Google Scholar

European Court of Human Rights judgments

  1. Dudgeon: Dudgeon v. the United Kingdom, (application no. 7525/76)Google Scholar
  2. Halford: Halford v. the United Kingdom, (application no. 73/1996/692/884),25 June 1997Google Scholar
  3. Hatton: Case of Hatton and Others v. UK (No.l), (application no. 36022/972003), 2 October 2001Google Scholar
  4. Klass: Klass and Others v. Germany, (application no. 5029/71), 6 September1978Google Scholar
  5. Leander: Leander v. Sweden (application no. 9248/81), 26 March 1987Google Scholar
  6. Malone: Malone v. United Kingdom, (application no. 8691/79), 2 August1984Google Scholar
  7. Marckx: Marckxv. Belgium, (application no. 6833/74), 13 June 1979Google Scholar
  8. Norris: Norris v. Ireland judgment, (application no. 10581/83)Google Scholar
  9. Olsson: Olssonv. Sweden (no.l), (application no. 10465/83), 24 March 1988Google Scholar
  10. Refah Partisi: Refah Partisi (the welfare party) and others v. Turkey(applications nos. 41340/98, 41342/98, 41343/98 and 41344/98), 31 July 2001Google Scholar
  11. Rotaru: Rotaru v. Romania, (application no. 28341/95), 4 May 2000Google Scholar
  12. Surek: Surekv. Turkey (no. 3), (application no. 24735/94), 8 July 1999Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Bastiaan van Loenen
  • Danielle Groetelaers
    • 1
  • Jaap Zevenbergen
    • 1
  • Jitske de Jong
    • 1
  1. 1.Delft University of TechnologyDelftNetherlands

Personalised recommendations