Skip to main content

Privacy versus national security: The impact of privacy law on the use of location technology for national security purposes

  • Chapter
The European Information Society

Abstract

Location technology allows for the continuous tracking of individuals. Knowledge about the person’s whereabouts also allows for the development of location based services at a very detailed levels. However, there is a potential danger that the further development of the appealing technologies will be blocked by privacy regulations. This paper assesses the legal framework on balancing privacy and national security at the European level. Although the privacy restrictions may limit the use within the consumer market, for purposes of national security they appear to be almost non-existent. The European Court of Human Rights’ judgments confirm that privacy invading technologies can be used to increase national security. A discussion on the need for far-reaching surveillance mandates for national intelligence services concludes this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Literature

  1. Walters G.J.: Privacy and security. ACM SIGCAS Computers andSociety Vol. 31.(2001)8–23

    Article  Google Scholar 

  2. Haggerty K.D., Ericson R.V.: The surveillant assemblage. BritishJournal of Sociology Vol. 51. (2000) 605–622

    Article  Google Scholar 

  3. Levi M., Wall D.S.: Technologies, security, and privacy in the post9/11European information society. Journal of Law and Society Vol.31.(2004) 194–220

    Article  Google Scholar 

  4. Cooley T.: Cooley on Torts 2d ed., p. 29. (1880)

    Google Scholar 

  5. Margulis S.T.: On the status and contributions of Westin’s andAltman’s theories of privacy. Journal of Social Issues Vol. 59. (2003)411–429

    Article  Google Scholar 

  6. Westin A.F.: Privacy and Freedom. New York, Atheneum (1967)

    Google Scholar 

  7. Altman I.: The Environment and Social Behavior. Monterey,California, Brooks/ Cole Publishing Company (1975)

    Google Scholar 

  8. Westin A.F.: Social and political dimensions of privacy. Journal ofSocial Issues Vol. 59. (2003) 431–453

    Article  Google Scholar 

  9. IPTS (Institute for Prospective Technological Studies): Security andprivacy for the citizen in the post-September 11 digital age: Aprospective overview. Report to the European Parliament Committeeon Citizens Freedoms and Rights, Justice and Home affairs (LIBE),(2003)

    Google Scholar 

  10. Raab CD., Bennett C.J.: The Distribution of Privacy Risks: WhoNeeds Protection? The Information Society Vol. (1998) 263–274

    Google Scholar 

  11. Loof J.P.: Mensenrechten en staatsveiligheid: verenigbaregrootheden? Wolf Legal Publishers (2005)

    Google Scholar 

  12. Blok P.: Het recht op privacy. Boom juridische uitgevers (2002)

    Google Scholar 

  13. Longley P.A., Goodchild M.F., Maguire D.J., Rhind D.W.:Geographic information Systems and Science. Chicester, England, John Wiley and Sons Ltd(2001)

    Google Scholar 

  14. Gruteser M., Grunwald D.: A methodological assessment of locationprivacy risks in wireless hotspot networks. Lecture notes in computerscience Vol. 2802. (2004) 10–24

    Article  Google Scholar 

  15. Korff D.: EC Study On Implementation of Data Protection DirectiveComparative Summary of National Laws. Cambridge (UK), (2002)

    Google Scholar 

  16. Europe: Recommendation 1426 (1999) European democracies facingup to terrorism. Parliamentary Assembly of the Council of Europe.Text adopted by the Assembly on 23 September 1999 (30th Sitting)(ed), (1999)

    Google Scholar 

  17. Marx G.T.: What’s new about the “new surveillance”? Classifying forchange and continuity. Surveillance and Society Vol. 1. (2002) 9–29

    Google Scholar 

  18. Peissl W.: Surveillance and security: a dodgy relationship. Vienna/Den Haag, Institute of Technology Assessment/ Rathenau Instituut,(2002): 12

    Google Scholar 

  19. O’Harrow Jr. R.: No place to hide; Behind the scenes of our emergingsurveillance society. The Free Press (2005)

    Google Scholar 

  20. Danezis G., Stephen Lewis, Anderson R.: How much is your privacyworth? Fourth Workshop on the Economics of Information SecurityVol. (2005)

    Google Scholar 

European Court of Human Rights judgments

  • Dudgeon: Dudgeon v. the United Kingdom, (application no. 7525/76)

    Google Scholar 

  • Halford: Halford v. the United Kingdom, (application no. 73/1996/692/884),25 June 1997

    Google Scholar 

  • Hatton: Case of Hatton and Others v. UK (No.l), (application no. 36022/972003), 2 October 2001

    Google Scholar 

  • Klass: Klass and Others v. Germany, (application no. 5029/71), 6 September1978

    Google Scholar 

  • Leander: Leander v. Sweden (application no. 9248/81), 26 March 1987

    Google Scholar 

  • Malone: Malone v. United Kingdom, (application no. 8691/79), 2 August1984

    Google Scholar 

  • Marckx: Marckxv. Belgium, (application no. 6833/74), 13 June 1979

    Google Scholar 

  • Norris: Norris v. Ireland judgment, (application no. 10581/83)

    Google Scholar 

  • Olsson: Olssonv. Sweden (no.l), (application no. 10465/83), 24 March 1988

    Google Scholar 

  • Refah Partisi: Refah Partisi (the welfare party) and others v. Turkey(applications nos. 41340/98, 41342/98, 41343/98 and 41344/98), 31 July 2001

    Google Scholar 

  • Rotaru: Rotaru v. Romania, (application no. 28341/95), 4 May 2000

    Google Scholar 

  • Surek: Surekv. Turkey (no. 3), (application no. 24735/94), 8 July 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Loenen, B.v., Groetelaers, D., Zevenbergen, J., Jong, J.d. (2007). Privacy versus national security: The impact of privacy law on the use of location technology for national security purposes. In: Fabrikant, S.I., Wachowicz, M. (eds) The European Information Society. Lecture Notes in Geoinformation and Cartography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72385-1_8

Download citation

Publish with us

Policies and ethics