366
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      If you have found this article useful and you think it is important that researchers across the world have access, please consider donating, to ensure that this valuable collection remains Open Access.

      Journal of Global Faultlines is published by Pluto Journals, an Open Access publisher. This means that everyone has free and unlimited access to the full-text of all articles from our international collection of social science journals, and the authors don’t pay an author processing charge (APC’s).

       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Restraining the Surveillance State: A Global Right to Privacy

      research-article
      Journal of Global Faultlines
      Pluto Journals
      Bookmark

            Abstract

            Edward Snowden's revelations of massive data collecting surveillance conducted by the U.S. National Security Agency in June 2013 suggest that Franz Kafka's vision of a surveillance state has been globalised. A movement has developed in response to it urging reforms on an international scale. One feature of this debate lies in the idea of a global right to privacy. A global right to privacy suggests a global freedom from unjustified, bulk surveillance beyond the reaches of judicial oversight. While there are international covenants protecting the right to privacy, opinions on how such a right is enforced differ. This paper examines the nature of such a privacy right, its universal feasibility, and the arguments against it. It argues that privacy must keep pace with the technological applications that undermine it.

            Content

            Author and article information

            Contributors
            Journal
            10.13169
            jglobfaul
            Journal of Global Faultlines
            Pluto Journals
            23977825
            20542089
            April 2014
            : 2
            : 1
            : 1-16
            Affiliations
            Dr. Binoy Kampmark was a Commonwealth Scholar at Selwyn College, Cambridge. He lectures at the School of Global, Urban and Social Studies, RMIT University, Melbourne. He can be contacted at: { bkampmark@ 123456gmail.com }
            Article
            jglobfaul.2.1.0001
            10.13169/jglobfaul.2.1.0001
            0d82213c-0084-426e-b2ab-8aa3cfdad5d0
            This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.


            Social & Behavioral Sciences

            Endnotes

            1. Secondary Order, In re Application of the [FBI] for an Order Requiring the Production of Tangible Things from Version Business Network Services, Inc. on Behalf of MCI Communication Services, Inc. d/b/a Verizon Business Services , No. BR 13–80 at 2 (FISC Apr. 25, 2013) (attached a Ex. F to Gilligan Dec.) [Dkt # 25–7]

            2. Foreign Intelligence Surveillance Act of 1978, section 702.

            3. Cited in Klayman v Obama, Memorandum Opinion, December 16, 2013 [Dkt. #13 (No. 13–0851), #10 (No. 13–0881)], at 9: https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48 .

            4. , “U.S. Surveillance architecture includes collection of revealing Internet, phone metadata,” The Washington Post , Jun 16, 2013.

            5. Klayman v Obama , Memorandum Opinion.

            6. , , , and , “Mastering the Internet: How GCHQ set out to spy on the World Wide Web,” The Guardian , Jun 22, 2013.

            7. Der Spiegel , “Embassy Espionage: The NSA's Secret Spy Hub in Berlin,” Oct 27, 2013, http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html

            8. , “Brazil's president condemns NSA spying,” Washington Post , Sep 25, 2013.

            9. , “Joe Biden in 2006: Metadata Collection Is ‘Very Intrusive’, We Don't Know What NSA Is Doing With Our Data,” Business Insider Australia, Jul 6, 2013, http://www.businessinsider.com.au/joe-bidens-comments-about-nsa-spying-in-2006-2013-7

            10. , “Death by Data: how Kafka's The Trial prefigures the nightmare of the modern surveillance state,” New Statesman , Jan 16, 2014.

            11. Office of the High Commissioner for Human Rights, “Mass Surveillance: Pillay urges respect for right to privacy and protection of individuals revealing human rights violations,” Jul 12, 2013, http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=13534&

            12. , “NSA: Our Analogue Spying Laws Must Catch Up with the Digital Era,” The Guardian , Nov 11, 2013.

            13. and , “World's Leading Authors: State Surveillance of Personal Data is Theft,” The Guardian , Dec 10, 2013.

            14. For examples, see , “India's New Data Protection Legislation,” SCRIPTed 8, 2 (Aug. 2011): 192–203.

            15. See , “One Hundred Years of Privacy,” [1992] Wisconsin Law Review 1335, at 1397.

            16. The ICCPR , and eds., 533

            17. See , “Privacy,” in and , eds., The International Covenant on Civil and Political Rights and United Kingdom Law (Oxford: Clarendon Press, 1995), 333.

            18. , “Revisiting the Public/Private Distinction: Employee Monitoring in the Workplace,” (1998) 32 Georgia Law Review 825, 833; noted in The ICCPR, and eds., 534.

            19. , “What's Privacy?” in , ed., Privacy and Information Rights , in Issues in Society, vol 341 (Thirroul: The Spinney Press, 2012), 4.

            20. , Privacy/Data Protection: A German/European Perspective, Proc. 2nd Symposium of the Max Planck Project Group on the Law of Common Goods and the Computer Science and Telecommunications Board of the National Research Council, Wood Hole, Mass., June 1999, noted by , “What's Privacy?” 4.

            21. , Report on the Law of Privacy (Sydney: Government Printer, 1973).

            22. See , Fundamental Legal Conceptions , (ed) (New Haven: Yale University Press, 1919).

            23. and , “The Right to Privacy,” Harvard Law Review 4, 5 (1890), http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm

            24. , General Theory of Law and State , trans. (Cambridge, Mass: Harvard University Press, 1946), 37; , Law as a Leap of Faith (New York: Oxford University Press, 2012), 178.

            25. , The Power of Legitimacy Among Nations (New York: Oxford University Press, 1990), 6; , “Imagining International Community,” European Journal of International Law 13, 4 (2002): 961–992, 962.

            26. , Cases and Materials on International Law , 5th ed (London: Sweet & Maxwell, 1998), 65; , “The Challenge of Soft Law: Development and Change in International Law,” International and Comparative Law Quarterly 38 (1989): 850–866, 851.

            27. UN General Assembly, Guidelines for the Regulation of Computerized Personal Data Files, 14 Dec 1990, http://www.refworld.org/docid/3ddcafaac.html

            28. The International Covenant on Civil and Political Rights: Cases, Materials, and Commentary , 3rd ed., and , eds. (Oxford: Oxford University Press, 2013) noting HRC General Comment 16 (16.15), 540.

            29. ICCPR, and , eds., 541.

            30. Coeriel and Aurik v The Netherlands (453/91), para 10.1

            31. The terms “unnatural sexual intercourse” and “intercourse against nature” formed section 122 of the Tasmanian Criminal Code as it then stood.

            32. Toonen v Australia , para. 8.1

            33. Toonen v Australia , para. 8.2

            34. Toonen v Australia , para. 8.3.

            35. See , Protecting Human Rights in the EU: Controversies and Challenges of the Charter of Fundamental Rights (Dordrecht: Springer, 2013).

            36. See OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, updated 2013, http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm ; Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, Strasbourg, 29.1.1981, http://conventions.coe.int/Treaty/en/Treaties/Html/108.htm

            37. , “Facebook's Mark Zuckerberg says privacy is no longer a ‘social norm’,” The Telegraph , Jan 11, 2010.

            38. , , , and , “GCHQ taps fibre-optic cables for secret access to world's communications,” The Guardian , Jun 22, 2013.

            39. and , In the Matter of State Surveillance, Advice for Tom Watson MP, Chair of the All Parliamentary Group on Drones, http://www.brickcourt.co.uk/news-attachments/APPG_Final_(2).pdf

            40. Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Agenda Item 3, A/HRC/23/40 (United Nations, General Assembly), Distributed 17 April 2013.

            41. Report by Frank La Rue, A/HRC/23/40, 3

            42. and , “The Right to Privacy,” Harvard Law Review 4, 5 (1890), http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm

            43. Katz v United States , 389 U.S. 347 (1967).

            44. Katz v United States , per Justice Stewart.

            45. Klayman v Obama , Memorandum Opinion, December 16, 2013 [Dkt. #13 (No. 13–0851), #10 (No. 13–0881)], https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48

            46. , “We Are All Foreigners: NSA Spying and the Rights of Others,” Just Security , Oct 29 2013, http://justsecurity.org/2013/10/29/foreigners-nsa-spying-rights/

            47. , “We Are All Foreigners: NSA Spying and the Rights of Others,” Just Security , Oct 29 2013, http://justsecurity.org/2013/10/29/foreigners-nsa-spying-rights/

            48. , Law as a Leap of Faith , 175.

            49. , Law as a Leap of Faith , 150.

            50. , “More on the Rights of Others – Ben Wittes' Failure of Imagination,” Just Security , November 12, 2013, http://justsecurity.org/2013/11/12/rights-ben-wittes-failure-imagination/

            51. , “Does the ICCPR Establish an Exterritorial Right to Privacy?” Lawfare, Nov 16, 2013, http://www.lawfareblog.com/2013/11/does-the-iccpr-establish-an-extraterritorial-right-to-privacy/#.Uu8CBzAyZ8F

            52. , “The Functions and Differing Legal Character of Treaties,” British Year Book of International Law 11 (1930): 100–118.

            53. Re McKerr [2004] UKHL 12 at 51.

            54. , “Treaties and Legitimate Expectations – The Rise and Fall of Teoh in Australia,” Judicial Review 15, 4 (Dec 2010): 323–336.

            55. , Anarchical Fallacies; Being an Examination of the Declaration of the Rights Issued During the French Revolution (1843).

            56. See , “The NSA in Global Perspective: Surveillance, Human Rights and International Counterterrorism,” Roger Williams Univ. Legal Studies Paper, No. 144 (Jan 23, 2014), and forthcoming in Fordham Law Review.

            57. , “Are Foreign Nationals Entitled to the Same Constitutional Rights As Citizens?” Thomas Jefferson Law Review 25 (2003): 367–388.

            58. Demore v Kim , 538 U.S. 510 (2003).

            59. , International Law and International Revolution: Reconceiving the World (Hull: Hull University Press, 1989), 10.

            60. , “A Global Human Right to Privacy?” Lawfare , Nov 11, 2013, http://www.lawfareblog.com/2013/11/a-global-human-right-to-privacy/#.UvGfsDAyZ8E

            61. , “A Reply to David Cole on Rights of Foreigners Abroad,” Lawfare , Nov 2, 2013, http://www.lawfareblog.com/2013/11/a-reply-to-david-cole-on-rights-of-foreigners-abroad/#.UvQnZDAyZ8E

            62. , “More on the Rights of Others.”

            63. , “Foreign Surveillance and Human Rights, Part 1: Do Foreigners Deserve Privacy?” EJIL: Talk! , Nov 25, 2013, http://www.ejiltalk.org/foreign-surveillance-and-human-rights-part-1-do-foreigners-deserve-privacy/

            64. , Judgment, in The Tokyo Judgment: The International Military Tribunal for the Far East (IMTFE) 29 April 1946 – 12 November 1948 , and eds. (Amsterdam: University Press Amsterdam, 1977); , Victor's Justice: The Tokyo War Crimes Trial (Princeton: Princeton University Press, 1971).

            65. , “A Global Right to Privacy?”

            66. , “The Disciplines of International Law and Policy,” Leiden Journal of International Law 12 (1999): 9–133, 126.

            67. Weber and Saravia v Germany (2006) ECHR, Application No. 54934/00, http://hudoc.echr.coe.int/sites/fra/pages/search.aspx?i=001-76586#{“itemid”:[“001-76586”]}

            68. , “The NSA in Global Perspective.”

            69. Weber and Saravia v Germany , para. 94.

            70. Weber and Saravia v Germany , para. 94.

            71. , Fairness in International Law and Institutions (Oxford: Clarendon Press, 1995), 10.

            72. , “Will NSA revelations lead to the Balkanisation of the Internet? The Guardian , Nov 2, 2013.

            73. Viviane Reding, European Commission – Speech/13/845, Oct 22, 2013, http://europa.eu/rapid/press-release_SPEECH-13-845_en.htm?locale=en

            74. , “On Internet, Brazil is beating US at its own game,” Al-Jazeera America, Sep 20, 2013, http://america.aljazeera.com/articles/2013/9/20/brazil-internet-dilmarousseffnsa.html

            75. United Nations General Assembly, The right to privacy in the digital age, Draft Resolution, Agenda Item 69(b), 68th Session, Third Committee, Nov 2013, http://www.hrw.org/sites/default/files/related_material/UNGA_upload_0.pdf

            76. UN News Centre, “General Assembly backs right to privacy in digital age,” Dec 19, 2013, http://www.un.org/apps/news/story.asp?NewsID=46780&Cr=privacy&Cr1#.UvLo1DAyZ8E

            77. Right to Privacy in the Digital Age – U.S. Redlines, noted at: http://columlynch.tumblr.com/post/67588682409/right-to-privacy-in-the-digital-age-u-s

            78. Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World , Dec 12, 2013, available at: http://s3.documentcloud.org/documents/929267/review-group-exec-summary-and-recs.pdf

            79. Liberty and Security in a Changing World , 131.

            80. Liberty and Security in a Changing World , 132.

            81. Liberty and Security in a Changing World , 141.

            82. In Re DNI/AG 702(g), Docket Number 702(i)-11-01 (FISC October 3, 2011), noted in Liberty and Security in a Changing World , 141–2.

            83. Liberty and Security in a Changing World , 152–3.

            84. Liberty and Security in a Changing World , 154–157.

            85. , Transcript of President Obama's Jan 17 speech on NSA reforms, The Washington Post , Jan 18, 2014, http://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html

            86. , Jan 17 speech.

            87. , “White House Added Last-Minute Curbs on NSA Before Obama Speech,” Wall Street Journal , Jan 31, 2014.

            88. Office of the Press Secretary, White House, Presidential Policy Directive/PPD-28, Subject: Signals Intelligence Activities, January 17, 2014, https://fas.org/irp/offdocs/ppd/ppd-28.pdf (herein PPD-28).

            89. PPD-28, 1–2.

            90. PPD-28, 2.

            91. PPD-28, 3.

            92. PPD-28, Sec 1(d), 3.

            93. PPD-28, 3–4.

            94. See, for example, the Request for Information (RFI) form from the Office of the Director of National Intelligence (DNI), Solicitation Number: ODNI-RFI-13-01, Special Notice, Feb 5, 2014, https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&id=b4756bf512d4d7a385f765e5a3fd169d

            95. PPD-28, 5.

            96. Amnesty International, “Obama recognizes global rights to privacy, still falls far short of safeguards,” Jan 17, 2014, http://www.amnesty.org/en/news/obama-recognizes-global-rights-privacy-still-falls-far-short-safeguards-2014-01-17

            97. Executive Order 12333.

            98. , “Lawmakers Welcome Surveillance Changes, but Split Over Scope,” The Wall Street Journal , Jan 17, 2014.

            99. United States Foreign Intelligence Surveillance Court, Memorandum Opinion, Date redacted, http://www.dni.gov/files/documents/1118/CLEANEDPRTT%202.pdf

            100. , “The Right of Privacy,” Harvard Law Review 102, 4 (Feb., 1989): 737–807.

            101. , “What's Privacy?” 2; , Beyond the OECD Guidelines: Privacy Protection for the 21st Century (Xamac Consultancy, Pty Ltd., Jan. 2000).

            Comments

            Comment on this article