«They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.»1
Benjamin Franklin
1.
Introduction ^
2.
The Dynamics of the Balance ^
3.
The Contest of Powers ^
The balance point between privacy, freedom of information and restrictive interests of national security in the light of new emerging cyber threats, determines who has a hold over political, military, and economic power.16 In 2013 Snowden wrote to Brazilian government that the National Security Agency’s (hereinafter NSA) programs were never about terrorism: they were about economic spying, social control and diplomatic manipulation.17 From an economic point of view, surveillance practices provide insight into other countries' economic policy or behaviour which could affect global markets. A complex and often relatively complete «digital dossier»18 of individuals can be assembled by private companies as was evidenced in the Apple case when it was caught sharing a year’s worth of location data on every user’s iPhone with state officials.19 From a military perspective, the possession of surveillance assets provides the confidence to adequately assess the capabilities of a potential partner over time.20 And finally, spying on the UN, European Union (hereinafter EU), the European Parliament, the G20 summit, the Vatican, and world leaders is aimed at gaining advantage in diplomatic negotiations.21 These considerations lead progressive states (United States (hereinafter US), United Kingdom (hereinafter UK), Canada) to admit that there are no better alternatives in the current digitized world to effectively protect country’s sovereignty than by advancing defence capacities of information technology and corresponding national legislation.
A number of technologically advanced countries have already adopted regulations to establish legal base for state practices in order to guarantee national security in a digital society. These laws have raised intense concerns among human rights watchers22, journalists and academic representatives23 that highlight internal state conflicts between civil and political individuals. One of the main concerns is about the power that public authorities gain through new technological means as well as their control of an individual’s data. In 2001 the US signed the Patriot Act that bypasses the Foreign Intelligence Surveillance Court (hereinafter FISA Court)24 and allows direct spying through a new NSA electronic surveillance program.25 In 2014, Russia passed several amendments to its counterterrorism legislation that increased the penalties for, and broadened the definition of terrorist-related crimes.26 In 2015 the UK adopted the Counter-Terrorism and Security Act with security measures through targeted and effective surveillance, criminal investigations and prosecution.27 At the same time, the UK28, like Australia,29 lacks an impartial safeguards system to ensure against the abuse of such powers.30 Thus, states have adopted number of counterterrorism legislative measures that focus on the protection of national security and allow states to take over control over personal data of every individual both inside and outside of a state’s territory.
4.
Global imbalance ^
For the European region, the European Court of Human Rights (hereinafter ECtHR) case-law emphasizes: both the collection of communications data and the interception of content interfere with art 8 of the European Convention of Human Rights (hereinafter ECHR).50 In some cases, there are hints in the ECtHR jurisprudence that they may legitimately be treated differently. This way the case-law of the ECtHR suggests that bulk data collection and analysis, in the absence of suspicion, is not in itself a disproportionate interference with the right to respect for private life, but is assessed against a higher standard than individual interferences with the right to privacy.51 The decisions of the ECtHR illustrate that the EU courts have given priority to national security interests only in those cases where interference with human rights was justified by passing a control «triple» test of necessity, legitimacy and proportionality by means of lawful limitations.52 The research from 2012 on examination of the data privacy laws revealed, that the «European standard» has exerted an influence in a majority of the world’s countries53, although, it originated from the universal legal standards established in the Universal Declaration of Human Rights (hereinafter UDHR) and in the International Covenant on Civil and Political Rights (hereinafter ICCPR) which follows the same logic of subordination for rights and restrictions, legally binding on all UN Member States. In European case-law, we see that an unlimited mass communication interception is strictly prohibited. Where the judicial balance gives an advantage to human rights with proportional, legitimate and necessary restrictions, the balance established in national counterterrorism laws tends to hold in favour of state interests. Thus, the gap between balances for the legislative, executive and judicial powers emerges, as the political and judicial concepts for the balance of the privacy, freedom of information and national security in Europe differ substantially.
5.
Solution Perspectives ^
6.
Conclusion ^
7.
Acknowledgements ^
- 1 Published in the «Memoirs of the Life and Writings of Benjamin Franklin» in 1818. Attributed to him around February 17, 1775 as he prepared for the Pennsylvania Assembly.
- 2 The promotion, protection and enjoyment of human rights on the Internet, UN HRC A/HRC/20/L.13, 29 June 2012.
- 3 Andrew Preston, Monsters Everywhere: A Genealogy of National Security, Diplomatic History, vol. 38, issue 3, 2014, p. 480.
- 4 Ibid. p. 484.
- 5 Strategija nacionalnoj bezopasnosti Rossijskoj Federaciji do 2020 goda ot 12 May 2009, no. 537, http://www.scrf.gov.ru/documents/1/99.html.
- 6 Russia’s National Security Concept, 1 January 2000, https://www.armscontrol.org/act/2000_01-02/docjf00.
- 7 Alexander Klimburg (Ed.), National Cyber Security Framework Manual (Tallinn: NATO CCD COE Publication, 2012), p. 9.
- 8 Ferdinand D. Schoeman, Philosophical Dimensions of Privacy: An Anthology (Cambridge, London, New York: Cambridge University Press, 1984), p. 2.
- 9 Austin Sarat, A world Without Privacy: What Law Can and Should Do? (New York, NY: Cambridge University Press, 2015), p. 48.
- 10 Daniel J. Solove, Understanding Privacy (Cambridge, London: Harvard University Press, 2008), p. X.
- 11 Edward Snowden, Snowden: «The Balance of Power Is Beginning to Shift», 5 June 2015, http://truthinmedia.com/snowden-the-balance-of-power-is-beginning-to-shift/.
- 12 Megan Warshawsky, The Balance to be found between civil liberties and national security, The RUSI Journal, Vol. 158, issue 2, 2013 p. 94.
- 13 Ibid. p. 95.
- 14 Eneken Tikk-Ringas, Norms for International Peace and Security: Privacy, Freedom of Information and National Security, ICT4Peace Norms Project, April 2015, p. 3.
- 15 Megan Warshawsky, The Balance to be found between civil liberties and national security, The RUSI Journal, Vol. 158, issue 2, p. 94.
- 16 Douglas M. McLeod, Dhavan V. Shah, News Frames and National Security, Covering Big Brother (New York: Cambridge University Press, 2015), p. 71. Shawn Powers, Michael Jablonski, The real Cyber War, The Political Economy and Internet Freedom (Urbana: University of Illinois Press, 2015), p. 75.
- 17 Josh Levs, Snowden’s open letter offers to help Brazil investigate NSA surveillance, 18 December 2013, http://edition.cnn.com/2013/12/17/world/americas/snowden-nsa-brazil-letter/.
- 18 Lauren Gelman, Privacy, Free Speech, and «Blurryedged» Social Networks, Boston College Law Review, vol. 50, issue 5, 2009, p. 1316.
- 19 «Devices that betray you», The TechPro Series, 2014, p. 27.
- 20 David W. Kearn, Great Power Security Cooperation, Arms Control and the Challenge of Technological Change (Lanham: Lexington Books, 2015), p. 27–28.
- 21 «These Programs Were Never About Terrorism: They’re About Economic Spying, Social Control, and Diplomatic Manipulation. They’re About Power», 17 December 2013, http://www.washingtonsblog.com/2013/12/programs-never-terrorism-theyre-economic-spying-social-control-diplomatic-manipulation-theyre-power.html.
- 22 «Human Rights Organisations Alarmed by Bill That Will Give Surveillance Agencies Dangerous New Powers», 25 March 2015, http://en.rsf.org/france-human-rights-organisations-alarmed-25-03-2015,47728.html.
- 23 Alan Travis, University professors decry Theresa May’s campus anti-terrorism bill, 3 February 2015, http://www.theguardian.com/uk-news/2015/feb/03/professors-letter-protest-counter-terrorism-campuses.
- 24 David Cole, Reviving the Nixon Doctrine: NSA Spying, the Commander-In-Chief, and Executive Power in the War on Terror, Georgetown University Law Center, 2006, p. 3, http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1404&context=facpub.
- 25 «NSA inspector general report on email and internet data collection under Stellar Wind – full document», 27 June 2013, http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection.
- 26 «Country Reports on Terrorism 2014», United States Department of State Publication (Bureau of Counterterrorism, 2015), p. 136, http://www.state.gov/documents/organization/239631.pdf.
- 27 «Counter-Terrorism and Security Act 2015», http://services.parliament.uk/bills/2014-15/counterterrorismandsecurity.html.
- 28 Andrew Fishman, Glenn Greenwald, Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, The Intercept_, 22 June 2015, https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/.
- 29 Nigel Waters, Responding to new challenges to privacy through law reform: a privacy advocate´s perspective, in Normann Witzleb, David Lindsay, Moira Paterson, Sharon Rodrick (eds.), Emerging challenges in privacy law: comparative perspectives (Cambridge, United Kingdom: Cambridge University Press, 2014), 2014, p. 54–55.
- 30 Anthony W. Bradley, Keith D. Ewing, Christopher J. Knight, Constitutional and Administrative Law, (16th ed.), (Harlow, England: Pearson, 2015), p. 429.
- 31 Alessandria Masi, France’s Online War on Terror Sympathizers and Extremists Has A New Cyber Security Cell, International Business Times, 17 January 2015, http://www.ibtimes.com/frances-online-war-terror-sympathizers-extremists-has-new-cyber-security-cell-1786662.
- 32 Sanja Kelly, Madeline Earp, Laura Reed, Adrian Shahbaz, and Mai Truong, Tightening the Net: Governments Expand Online Controls, Freedom House, https://freedomhouse.org/report/freedom-net/2014/tightening-net-governments.
- 33 2015 World Press Freedom Index, Reporters Without Borders, For Freedom of Information, June 2015, http://index.rsf.org/#!/.
- 34 NSA Surveillance, Center for Democracy and Technology, https://cdt.org/campaign/nsa-surveillance/.
- 35 Shawn M. Powers, Michael Jablonski, The Real Cyber War, The Political Economy and Internet Freedom (Urbana: University of Illinois Press, 2015), p. 171.
- 36 See world map of countries under surveillance in 2015: http://en.rsf.org/surveillance-malaysia,36670.html.
- 37 Sanja Kelly, Madeline Earp, Laura Reed, Adrian Shahbaz, and Mai Truong, Tightening the Net: Governments Expand Online Controls, Freedom House, https://freedomhouse.org/report/freedom-net/2014/tightening-net-governments.
- 38 «Freedom on the Net 2014», https://freedomhouse.org/report/freedom-net/freedom-net-2014#.VZ6TPV9Viko.
- 39 Alexander Nicoll, Communications interception: UK report seeks legal reform. Strategic Comments (London: IISS 2015), vol. 21, issue 18, 8 July 2015.
- 40 See world map of countries under surveillance in 2015: http://en.rsf.org/surveillance-malaysia,36670.html.
- 41 Sanja Kelly, Madeline Earp, Laura Reed, Adrian Shahbaz, and Mai Truong, Tightening the Net: Governments Expand Online Controls, Freedom House, https://freedomhouse.org/report/freedom-net/2014/tightening-net-governments.
- 42 Mike Rettig, Democracy and Intelligence: An Uneasy Working Partnership, Fair Observer: Make Sense of the World, 12 March 2013, http://www.fairobserver.com/region/north_america/democracy-intelligence-uneasy-working-partnership/#sthash.kPMckhes.dpuf.
- 43 Simon Chesterman, One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty (Oxford, New York: Oxford University Press, 2011), p. 57.
- 44 David Anderson, A Question of Trust, Report of the Investigatory Powers Review, Presented to the Prime Minister on June 2015, p. 190–191.
- 45 Elizabeth Sepper, Democracy, Human Rights, and Intelligence Sharing, Texas International Law Journal, 2010, vol. 46, p. 194, http://www.tilj.org/content/journal/46/num1/Sepper151.pdf.
- 46 Lars Schall, Intelligence services and democracy, Asia Times, 27 November 2013, http://www.atimes.com/atimes/World/WOR-02-271113.html.
- 47 Jef Huysmans, Security Unbound, Enacting Democratic Limits (London; New York: Routledge, Taylor & Francis Group, 2014), p. 126.
- 48 See also: ECtHR, Association for European Integration and Human Rights and Ekimdzhiev v. Bulgaria, no. 62540/00, 28 June 2007; ECtHR, Shimovolos v. Russia, no. 30194/09, 21 June 2011; and ECtHR, Vetter v. France, no. 59842/00, 31 May 2005.
- 49 Megan Warshawsky, The Balance to be found between civil liberties and national security, The RUSI Journal, Vol. 158, issue 2, pp. 94–99.
- 50 ECtHR, Malone v. UK, no. 8691/79, 26 April 1985, para 84; ECtHR, Copland v. United Kingdom, no. 62617/00, 3 April 2007, paras 39–47.
- 51 David Anderson, A Question of Trust, Report of the Investigatory Powers Review, Presented to the Prime Minister on June 2015, p. 79.
- 52 ECtHR, Chauvy and Others v. France, no. 64915/01, 29 September 2004, para. 70; ECtHR, Pfeifer v. Austria, no. 12556/03, 15 November 2007, para. 35; and ECtHR, Polanco Torres and Movilla Polanco v. Spain, no. 34147/06, 21 September 2010, para. 40.
- 53 Except for Japan, Bahamas, Vietnam and Chile. See more: Graham Greenleaf, A World Data Privacy Treaty? «Globalisation» and «Modernisation» of Council of Europe Convention 108, in Normann Witzleb, David Lindsay, Moira Paterson, Sharon Rodrick (eds.), Emerging Challenges in Privacy Law: Comparative Perspectives (Cambridge, United Kingdom: Cambridge University Press, 2014), p. 94–95.
- 54 Douglas M. McLeod, Dhavan V. Shah, News Frames and National Security: Covering Big Brother (New York: Cambridge University Press, 2015), p. 1, 2.
- 55 Jef Huysmans, Security Unbound: Enacting Democratic Limits (London; New York: Routledge, Taylor & Francis Group, 2014), p. 46.
- 56 US Supreme Court, New York Times Co. v. United States, no. 403 U.S. 713, 30 June 1971.
- 57 Douglas M. McLeod, Dhavan V. Shah, News Frames and National Security: Covering Big Brother (New York: Cambridge University Press, 2015), p. 1 and 2.
- 58 Ibid. p. 44.
- 59 Ibid. p. 45.
- 60 Ibid. p. 45.
- 61 David Kravets, Secret US court allows resumption of bulk phone metadata spying, ArsTechnica, 30 June 2015, http://arstechnica.com/tech-policy/2015/06/secret-us-court-allows-resumption-of-bulk-phone-metadata-spying/.
- 62 ECtHR, Khan v. UK, no. 35394/97, 12 May 2001.
- 63 United Kingdom: House of Lords (Judicial Committee), Secretary of State for the Home Department v. Rehman (AP), [2001] UKHL 47, 11 October 2001.
- 64 Matthew Holehouse, Counter-terrorism Bill: What it contains, The Telegraph, 26 November 2014, http://www.telegraph.co.uk/news/worldnews/islamic-state/11254950/Counter-terrorism-Bill-What-it-contains.html.
- 65 Home Secretary Theresa May on counter-terrorism, 24 November 2014, Royal United Services Institute, https://www.gov.uk/government/speeches/home-secretary-theresa-may-on-counter-terrorism.
- 66 Investigatory Powers Tribunal, Liberty & Others v. the Security Service, SIS, GCHQ, [2014] UKIPTrib 13_77-H, 5 December 2014.
- 67 GCHQ does not breach human rights, judges rule, BBC News, 5 December 2014, http://www.bbc.co.uk/news/uk-30345801.
- 68 ECtHR, 10 Human Rights Organisations v. United Kingdom, an application filed on 10 April 2015.
- 69 ECtHR, Big Brother Watch and others v. United Kingdom, no. 58170/13, lodged on 4 September 2013.
- 70 David Anderson, A Question of Trust, Report of the Investigatory Powers Review, Presented to the Prime Minister on June 2015, p. 224, https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Print-Version.pdf.
- 71 Amitai Etzioni, The New Normal: Finding a Balance Between Individual Rights and the Common Good (New Brunswick (U.S.A.): Transaction Publishers, 2015), p. 62. See also: William A. Schabas, Invalid Reservations to the International Covenant on Civil and Political Rights: Is the United States Still a Party?, Brooklyn Journal of International Law, no. 21, 1995, p. 277, 280. Kristina Ash, U.S. Reservations to the International Covenant on Civil and Political Rights: Credibility Maximization and Global Influence, Northwestern Journal of International Human Rights, 2005.
- 72 Martti Koskenniemi, Formalism, Fragmentation, Freedom: Kantian Themes in Today’s International Law, No Foundations. Journal of Extreme Legal Positivism, 2007, p. 17.
- 73 The right to privacy in the digital age, Brazil and Germany: draft resolution, UNGA A/C.3/68/L.45. See also The right to privacy in the digital age, UNGA A/RES/68/167.
- 74 Alexander Nicoll, Communications interception: UK report seeks legal reform. Strategic Comments (London: IISS 2015), vol. 21, issue 18, 8 July 2015.
- 75 David Anderson, A Question of Trust, Report of the Investigatory Powers Review, Presented to the Prime Minister on June 2015, p. 75.
- 76 Annegret Bendiek, European Cyber Security Policy (Berlin: SWP Research Paper, October 2012), p. 15.
- 77 Jonathan Watts, Brazil to legislate on online civil rights following Snowden revelations, The Guardian, 1 November 2013, http://www.theguardian.com/world/2013/nov/01/brazil-legislate-online-civil-rights-snowden.
- 78 Eneken Tikk-Ringas, Norms for International Peace and Security: Privacy, Freedom of Information and National Security, ICT4Peace Norms Project, April 2015, p. 3. See also: Eneken Tikk-Ringas, Comprehensive Normative Approach to Cyber Security, ICT4Peace Norms Project, April 2015.