Você está na página 1de 21

Terrorism, Surveillance and Privacy: Assessing the Excesses

2012

Introduction
Privacy is an essential element of a free society without which individuals would lose the ability
to interact with one another in private. However, following the September 11 terrorist attacks in
the United States and subsequent attacks on other influential western countries, new laws have
been put in place arguably as an effective tool to prevent terrorist attacks and conjointly fight the
war on drugs. Whereas advancement in police surveillance technology are necessary in the fight
against terrorism, there is a clash between an individuals right to privacy and the States power
to infringe that right. For instance , the Fourth amendment to the US Constitution provide
guidelines against unreasonable search and seizure on one hand, the Patriot Act violates the
same, yet the courts are reluctant to invalidate such a law that infringe constitutionally given
right to privacy.
With the aid of new technologies, privacy protection has been eroded in favor of law
enforcement. This shift has undermined one of the rights that American citizens have depended
upon for hundreds of years; the right to privacy against unreasonable searches.
1

Thus the paper seeks to show how surveillance technology has affected the traditional
understanding of privacy and what might be done to restore the fundamental protection privacy
right requires.

Privacy defined
Alan Westins four basic states of privacy are: solitude, intimacy, anonymity and reserve.
2

An early, and extremely influential definition of the right to privacy was formulated by Warren
and Brandeis
3
, who suggested that the right to privacy was the right to be left alone, to protect
the privacy of ones thoughts and emotions.
Another way of defining the right to privacy is in terms of a right to control access to ones
personal information.
4
. Seeing privacy in this way makes it akin to a property right, in that it can
be dealt with in any way that the owner wishes.

1
Eleanor, B (2005), Technology and the Fourth Amendment: Balancing Law Enforcement with Individual Privacy.
Pp. 2
2
Andrew Askland, WHAT, ME WORRY? THE MULTI-FRONT ASSAULT ON PRIVACY, 2006, 25 St. Louis
University Publisher. L. Rev. 33
3
Samuel Warren and Louis Brandeis, The Right to Privacy Harvard Law Review (1890) cited in Lisa Austin
Privacy and the Question of Technology. Law and Philosophy 22 (2003)119166. pp. 121123.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Also privacy may be defined by making reference to the notion of public and private spheres of
life. If privacy is taken as referring to the private realm, then a right to privacy is simply a right
to ensure that ones life is not subject to undue interference from the government.

Aspects of privacy
5

Privacy by its nature is relative and it is therefore difficult to rely on a single interpretation.
Rather than seeking to pin a single definition, it is perhaps more helpful to provide an overview
of the principal aspects of privacy.
Informational Privacy
Informational privacy concerns the collection, use, tracking, retention and disclosure of personal
information. It includes data protection and informational rights, such as freedom of
information.
Physical Privacy
It is concerned with the protection from outside interference of the body, the physical self.
It is widely protected through both the criminal and civil law (rape, assault, battery, and so on).
Spatial Privacy
Is concerned with the setting of limits on intrusion into personal spaces, which is not limited to
home and domestic environments, but also the workplace, ones car, and even public space,
depending upon the context as held in the admissibility decision in Martin v. UK
6
.
Relational Privacy
Relational privacy refers to the freedom to determine ones associations with others and or
freedom from others.
Relational privacy is protected in certain respects by the law (e.g trade union laws) but it is also
restricted in certain ways (for example, through limitations on who is entitled to marry).

Communicative privacy

4
Darren Charters Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the Double
Click Experience Journal of Business Ethics 35 (2002) 243254. Pp. 246 247
5
Gareth, C et al (2007): Overlooked: Surveillance and personal privacy in modern Britain. Pp. 7
6
Martin v. UK (Application No. 38199/97), March 27th 2003, European Court of Human Rights Admissibility);
case note at [2003] E.H.R.L.R. 461. The Government had unsuccessfully argued that covert surveillance of the
applicants home by video camera was not an Article 8 issue as the nuisance which the surveillance attempted to
address was not private in nature, and the camera only recorded what would have been visible to a neighbour or a
passer-by on the street.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

It relates with privacy of ones communication(s). Generally, that your communications, post, e-
mails or telephone calls should not be interfered with.

The traditional understanding of privacy focuses primarily with individual rights of privacy
against state interference, thus a presumption that privacy as an interest is competing with
security.
7


International Bill of Right: Justified Infringement of privacy Requirements
The International Bill of Rights as assented to by the General Assembly of the United Nations,
consists of three documents: the Universal Declaration of Human Rights (UDHR), the
International Covenant on Economic, Social and Cultural Rights (CESCR) and the International
Covenant on Civil and Political Rights (CCPR).
Both the UDHR and the CCPR assert that people have a right to privacy. Article 12 of the
UDHR states that:
No one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, nor to attacks upon his honour and reputation.
Everyone has the right to the protection of the law against such interference or attacks.
Article 17 of the CCPR is virtually identical:

The right to privacy under the International Bill of Right is not an absolute right, the declarations
under it seek to protect persons against arbitrary interference with their privacy.
8


In order the determine when it might be justified to infringe upon a particular persons right to
privacy, then the following principles must be established and met:
1) The data obtained aims at achieve a good end.
2) The infringement of rights is necessary i.e. there are no other means that could be used
to achieve this end.

7
Arthur J. Cockfield (2007), Protecting the Social Value of Privacy in the Context of State Investigations Using
New Technologies. 40 U.B.C. L. Rev. 41 67.
Westin argues that privacy is the claim of individuals, groups, or institutions to determine for themselves when,
how, and to what extent information about them is communicated to others.
8
An arbitrary infringement of privacy is that based on an unrestrained exercise of authority, and a non-arbitrary
infringement of privacy is one justified according to recognizable and objectively defined standards.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

3) The good that is being aimed at by infringing upon this right, outweighs the evil that will
follow from infringing upon the right i.e. the infringement of rights is proportional to
the end that is being aimed at.
The usual situation where a police officer will be required to infringe upon a particular persons
rights is where such an infringement is necessary in order to protect the rights of another person,
in which case, it is fundamental to show that the infringement is necessary and there are
reasonable grounds at law to allow infringement of rights

There are a number of justifications showing that intrusion into privacy using surveillance
undermine the value of privacy, such accounts include:
That, privacy is inherent and it is morally problematic to disrespects that person by invading his
privacy. Hence, respect individuals dignity, treat them as autonomous agents, and not
undermine their independence.
9

Secondly, based upon the moral status of those whose privacy is violated; impinging a persons
privacy is morally problematic in itself, without reference to other harms and regardless of
whether the subject knows his privacy has been invaded.
10


Terrorism defined
The international community has established mechanisms to address the issues related to
terrorism, including the creation of the Counter-Terrorism Committee (CTC) and the Counter-
Terrorism Executive Directorate (CTED), the international community has been unable to agree
on a universal definition of terrorism.
11




9
Bloustein, Edward J (1964)., Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser, New York
University Law Review (39): 962-1007.
10
Benn, Stanley I., Privacy, Freedom, and Respect for Persons, in J.R. Pennock and J.W. Chamman (eds.), Nomos
XIII: Privacy, (New York: Atherton Press, 1971), pp. 1-26; Reiman, Jeffrey, Privacy, Intimacy and Personhood,
Philosophy and Public Affairs 6(1) (1976): 26-44; Warren, Samuel and Brandeis, Louis, The Right to Privacy,
Harvard Law Review 4 (1890): 193-220
11
For reasons for lack of a universal definition, see: Informal summary prepared by the Chairman on the exchange
of views in plenary meeting and on the results of the informal consultations, A/AC.252/2009/L.1/Add.1, Annex 1,
Draft Report, para. 6 (30 June 2009). These include the inclusion of State use of force against civilians, including
forms of State terrorism and avoid criminalizing self-determination in the definition
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Shortcomings for lack of a universal definition
Lack of a universal definition of terrorism represents a serious limitation on States ability to
combat and prevent terrorism.
The lack of a definition also results in the creation of State counter-terrorism measures outside
the realm of international law and prevents the United Nations from exerting its moral authority
and from sending an unequivocal message that terrorism is never an acceptable tactic, even for
the most defensible of causes.
12

States may create broad, overreaching definitions and inadvertently criminalize activity outside
the realm of terrorism, suppress oppositional movements or unpopular groups and prosecute
people for the legitimate exercise of protected human rights due to vague and unclear domestic
definitions of terrorism
13
.
Despite these barriers, there has been movement toward a definition. The Secretary-General
proposed guidelines for a possible definition in a report presented to the General Assembly in
2004. In this report, the definition includes language from Security Council resolution 1566
(2004) and includes acts committed against civilians with both 1) the intention of causing death
or serious bodily injury, or the taking of hostages; and 2) for the purpose of provoking terror in
the general public or in a group of persons or particular persons, intimidating a population or
compelling a government or an international organization to do or abstain from doing any act
14
.
Surveillance Instruments and Techniques
Surveillance means in its broadest to watch over. Surveillance and monitoring technology
has become commonplace throughout the world. It is used to supervise both social and physical
processes, and to monitor individual behavior.
15


12
Follow-up to the outcome of the Millennium Summit, Note by the Secretary-General, A/59/565, para. 157 (2
December 2004)
13
Address by Ms. Navanethem Pillay to the Counter-Terrorism Committee of the Security Council, New York, p. 7
(29 Oct. 2009)
14
The U.N. Committee on Counter-Terrorism FES Briefing Paper, p. 10 (15 September 2007).
Through this definition, States can create more effective counter-terrorist policies within specific confines. This
narrow definition will protect human rights because States will not be able to justify acts under broad or vague
definitions.
15
Peter. K et al (2007): Surveillance technology and law: the social impact: Erasmus University Rotterdam. Pp. 1
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Information gathering by means of electronic surveillance can be conducted by means of the use
of non-communication devices such as biometrics, RFID and video cameras or communication
devices such as the cell phone and the Internet.
Surveillance of the internet is the collection of different type of information on the internet by
means of surveillance methods.
16


Camera surveillance
The use of audio-visual equipment (cameras) is closely connected to surveillance, especially the
use of CCTVs.
Cameras allow real time surveillance as well as retroactive surveillance.
These days the video signal is often not recorded and broadcast in an analogue form but directly
in a digital form, thus these video images can be relayed more easily to differing locations,
especially if the camera has a network connection and can communicate via the Internet
protocol.

Camera surveillance technique is reliable and commonly used as it is characterized by; motion
detection, zoom in on details, facial recognition, object pattern analysis and satellite image
transfer capabilities in advanced cameras.
The other technique is the radar detection device, used in road cameras and warns of the
vicinity of radar controlled speed measurement equipment.
The newest weapon against forgery is the use of digitalized biometric information as a means of
identification and DNA is generally regarded as being the most accurate and reliable biometrical
method. The technique uses the existing characteristics of persons or goods. This character can
be stored into a template which can be stored in a memory chip, which can be used in an ID.

The RFID, Radio Frequency Identification functions in the same way as the security bar code,
but it is so cheap and so small that it can be inserted during the manufacturing process of

16
Berkowitz Packet Sniffers and Privacy: why the No-Suspicion-Required Standard in the USA Patriot Act is
Unconstitutional 2002 Computer Law Review and Technology Journal 2. Information collected is content data and
traffic data: Traffic data is the addressing and routing information
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

virtually any product. The privacy aspect of this development, as it is, in principle, it can collect
information about what products a person has.
17


Telecommunication Surveillance
The monitoring of all forms of telecommunication has also become large-scale. That monitoring
applies not just to telephone and fax messages, but also, and increasingly, to data traffic on the
Internet. Intelligence agencies also tend to use methods such, interception of communications,
covert audio surveillance, covert surveillance and tracking and tracing devices.
From a technical viewpoint, even speech can often be directly digitalized and then transmitted.
This is, for example, the case with respect to mobile telecommunication via GSM, Global
System for Mobile communication used by almost all mobile phones. Another technique for
directly digitalizing speech is VOIP, Voice Over IP. In this case, the audio signal is converted
into data packages, structured in such a way that they can be sent over the Internet. VOIP can be
used between two computers connected to the Internet (both having audio hardware)
18
.
The GPS, the Global Positioning System. Save for its navigational purposes, it can also detect
the precise location of a person or a thing. This information is passed on t, for example via a
GSM connection, making it much simpler to tracking down.
19

A specific form of surveillance, entailing the surveillance of people rather than of telephone or
data traffic, allows people to be located, based on their mobile phone data. This information can
be derived from one or more transmitters for mobile phones. It makes it possible to determine
who was where (in the vicinity of one of these transmitters) at a certain time, at least if the
mobile phone was on.
Generally, surveillance technology infringes personal privacy, as it does not differentiate between
people; but monitors both suspects and non-suspects. This infringes the legal principle that coercive
measures should only be used against those for whom there are reasonable grounds to suspect them
of criminal activity.
20



17
An extensive report about RFID that pays attention to technical aspects as well as privacy aspects is published by
the US Government Accountability Office (GAO, Information Security, Radio Frequency Identification Technology
in the Federal Government, <www.gao.gov/new.items/d05551.pdf>
18
Peter. K et al (2007): Surveillance technology and law: the social impact: Erasmus University Rotterdam. Pp. 4
19
Ibid. Pp. 6
20
Ibid Pp. 10-11
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Terrorism, privacy and Surveillance in perspective
The United States of America
The Fourth Amendment
The Fourth Amendment to the United States Constitution is the part of the Bill of Rights, which
guards against unreasonable search and seizure. It purports that any arrest should have (1) some
form of individualized suspicion (probable cause), (2) judicial review where feasible, (3) notice
of any search and seizure.
21

Adequate notice requires that when agents use a warrant to seize property including intangible
property such as email or voicemail records they provide the owner of the property with an
inventory of the seized property.
22


The Patriot Act
23
: An appraisal
The Act was passed by Congress as a response to the terrorist attacks of September 11, 2001.
The Act allows federal officials greater authority in tracking and intercepting communications,
both for purposes of law enforcement and foreign intelligence gathering. It was intended to give
federal authorities increased abilities to combat international and domestic terrorism.
The Act was enacted principally to prevent and punish terrorist acts in the US and around the
world, as well as enhancing law enforcement investigative tools.
The Patriot Act and the Fourth Amendment
These are provisions in the Patriot Act that directly affect the United States Fourth
Amendment.
24


21
Susan N. Herman, The USA PATRIOT Act and the Submajoritarian Fourth Amendment,2006, 41 Harv. C.R.-
C.L. L. Rev. 67
22
Note, however, that covert entry for the purpose of installing surveillance devices (e.g., phone taps) has long been
considered constitutionally permissible. Dalia v. U.S., 441 U. S. 238, 248 (1979).
23
An acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorists], 2001
24
Susan N. H (2006), The USA PATRIOT Act and the Submajoritarian Fourth Amendment. 41 Harvard. C.R.-
C.L. L. Rev. 67
The Bill of Rights Defense Committee believing that the Patriot Act provisions were a threat to the value of privacy,
freedom of speech, freedom of religion, and other associations that one can have, led seven states and 399 cities to
adopt a resolution condemning many provisions of the Patriot Act
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Section 215
25
of the Patriot Act permits government to obtain a court order providing access to
tangible things and objects on the basis of certification by executive branch officials and orders
the recipient not to divulge the governments request. More importantly, the section requires that
no person shall disclose to any other person that the FBI has conducted a business records
search, as doing so would be breaking the law
26
, as section 505 does. In order to have its request
granted, the FBI need not show any reason to believe that the target of the investigation is
engaged in spying, terrorism, or criminal activity, and the FBI may base its investigation at least
in part on the subjects First Amendment-protected activity. There is no statutory requirement
that the government provide the subjects of a section 215 search with notice of such a search.

Section 213
27
, although the section allows the government to be granted a warrant on probable
cause, per the Fourth Amendment, the sneak and peak allows agents conducting search
warrants to delay telling their targets that their property is being searched or even seized as such
notification can have adverse result contrary to the Fourth Amendment that requires notice prior
to search.

Thus, section 213s sneak-and-peek warrants and section 215s gag-rule (coupled with the lack
of a notice requirement) make it more difficult to determine when law enforcement agents have
obtained information about oneself.
The consequence of extending the application of section 213 to other areas of investigation is the
ultimate fear for every clause in the Patriot Act as the Act has application beyond terror
investigation.
28


Section 218 requires a court order to authorize electronic surveillance, but it diverges from the
Fourth Amendment, as the rules on probable cause and notice are very relaxed.

25
Titled Access to Records and Other Items Under the Foreign Intelligence Surveillance Act, authorizes the
government to acquire records, including educational or financial institutions, Internet service providers, or even
librarians under court order.
26
The Reauthorization Act allows disclosure only where it is necessary to comply with the order or to an attorney in
order to obtain legal advice or assistance regarding the order; these other parties are prohibited from further
disclosure. H.R. 3199 106(e)
27
Sneak and Peak
28
Susan N. Herman, The USA PATRIOT Act and the Submajoritarian Fourth Amendment, 2006, 41 Harv. C.R.-
C.L. L. Rev. 67
A letter from the Department of Justice stated that the deferred notification was used 153 and only 18 of those times
were for terrorism investigation.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

This section expands the power of the government in their Foreign Intelligence Surveillance
(FISA) to conduct electronic surveillance. Hence electronic surveillance is allowed in
furthering the investigation without a probable cause.

Section 505 allows the government to issue National Security Letters (NSL) to retrieve customer
records from ISPs without necessary court order required by section 215.
Section 505 surpasses section 215 in overstepping judicial oversight of governments collection
of information from third parties. It permits government to extract records from a
communications provider by issuing its own administrative subpoena, NSL.
29
The government
only has to show that the information is relevant in a terrorist investigation, which the courts
have unambiguously allowed deviations from the Fourth Amendment principles of judicial
review, probable cause, and notice
30
.

The Fourth Amendment tests asks what expectations of privacy society is willing to protect,
however the court has allowed government discretion to perform surveillance under conditions
that the public would find unconstitutional and unreasonable.
31


To understand this shift and show how courts have been subdued by the legislative power and
instead do not safeguard constitutionally granted and protected right to privacy, case law is thus
introduced to show the historical progression.

For instance, one of the first steps by the court took spearheaded the Congress for the protection
of individual privacy was in the Olmstead Case
32
, while emphasizing the need to protect the
secrecy of telephone messages, the court ruled that wiretapping was not a search in the sense
of the Fourth Amendment and therefore did not require a warrant, a decision overruled by the
subsequent decision in Katz v. United States
33
, where the Supreme Court ruled that wiretapping
was a search in the sense of the Fourth Amendment and that law enforcement agencies needed to
obtain a warrant before they could tap a phone line. The court decided to limit the scope of Katz

29
These includes telephone companies, Internet service, and libraries with computer terminals
30
Besar, X and Emir, C (2006), Privacy & Terrorism Review: Where Have We Come In 10 Years? Journal of
International Commercial Law and Technology Vol. 7, Issue 2. Pg 6
31
Wayne N. Renke (2006 Who Controls the Past Now Controls the Future: Counter-Terrorism, Data Mining and
Privacy, 43 Alta. L. Rev. 779 823.
32
Olmstead v. United States (1928), 277 U.S. 438, 43 S. Ct. 394.
33
Katz v. United States (1967), 389 U.S. 347, 88 S. Ct. 507
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

by stating a person has no legitimate expectation of privacy in information he voluntarily turns
over to third parties.
34

In addition, Congress passed the Federal Communications Act of 1934 where no person not
being authorized by the sender shall intercept any communication and divulge or publish the
existence, contents, substance, purport, effect or meaning of such intercepted Communication to
any person
35
.
In United States v. Miller
36
the court found that handing over information voluntarily to third
parties and then when government requested such information was not found unconstitutional. In
Miller the government acquired checks and other financial statements from his bank. Miller
argued that the bank was required to keep the documents procured and not give them to the
government as per the federal Bank Secrecy Act of 1970. In a majority ruling, the Supreme
Court ruled that Miller had no legitimate expectation of privacy once he voluntarily handed the
information over to the bank.

In Kyllo v. United States
37
, the police agents used a thermal scanner to look at Kyllos home. The
fact that the defendants had taken no steps to prevent their heat waves escaping was used to show
that they clearly did not expect their heat waves to remain private, and therefore they could not
object when those waves were observed by police officers.
By distinguishing the private home from a more general location and asserting the existence of a
minimal reasonable expectation of privacy, the Kyllo decision managed to break out of the
privacy-erasing circular logic of the Katz test.

Canadian Privacy Laws post September 11
The gathering of evidence in many jurisdictions is governed by some form of protection from
unreasonable search and seizure by the state. In Canada, this protection is found in Section 8 of
the Canadian Charter of Rights and Freedoms 1982; hereafter the Charter.
The Charter of Rights and Freedoms offers the strongest legal protections in Canada because
they are rooted in the Constitution. In addition, it is possible that privacy could be understood to

34
Ibid
35
Susan N. Herman, The USA PATRIOT Act and the Submajoritarian Fourth Amendment,2006, 41 Harvard.
C.R.-C.L. L. Rev. 67
36
United States v. Miller (1939), 307 U.S. 174, 59 S. Ct. 816
37
Kyllo v. United States (2001)
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

fall under the broader protections of S.7 of the Charter, which reads Everyone has the right to
life, liberty and security of the person,
38

Personal information is protected by a number of federal, provincial, and territorial statues. The
Privacy Act governs the collection, use, and disclosure of personal information by the federal
government of Canada.
However, the Supreme Court ruled on privacy interests in relation to S.8 in a range of contexts
outside surveillance, for example, with respect to bodily privacy (R. v. Dyment, 1988;
R. v. Arp, 1998) or with respect to ones electricity records (R. v. Plant, 1993) These type of
cases hinge on the question of whether the search was legal, that is whether law enforcement was
entitled to gather the evidence without judicial oversight in the form of obtaining a warrant. As is
clear from Hunter v. Southam Inc. (1984), a search is not legal if a reasonable expectation of
privacy is found.
39


After the September 11, like the United States, Canada the government facilitated the
surveillance of citizens and foreign individuals.
Surveillance powers under the Canadian Criminal Code have been amended since 2001 by the
Anti- Terrorist Act. Although a judge of the Superior Court of justice has to approve the
electronic surveillance, the Act makes it easier to use electronic surveillance against terrorist
groups by extending the period of validity of wiretap authorization from 60 days up to one year
and delaying notice for a target after surveillance up to three years.
40


The Anti Terrorism Act has changed traditional Common law safeguards that required
independent judicial authorization prior to the issuance of a search warrant, instead discretionary
powers once reserved for the courts have been passed to the legislative powers.
41



38
Krista Boa (2007). Privacy Outside the Castle: Surveillance Technologies and Reasonable Expectations of Privacy
in Canadian Judicial Reasoning. Pg. 3
39
Ibid
40
Arthur J. Cockfield, The State of Privacy Laws and Privacy-Encroaching Technologies after September 11: A
Two-Year Report Card on the Canadian Government, 2003-2004, 1 UOLTJ 325 344.
41
For example, once the Minister of Defence is satisfied that his authorization would not encroach the privacy of
Canadians, he can authorize international electronic surveillance without the need to seek prior judicial
authorization.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

With the exception of Quebec, Canada has pursued a self-regulatory approach to private sector
privacy protection through the passage of Personal Information Protection and Electronic
Documents (PIPEDA). PIPEDA alongside the federal Privacy Act, are overseen by the Privacy
Commissioner, an independent officer of Parliament.
42
. The general approach to PIPEDA is that
the consent of an individual must be obtained before certain personal information can be
collected, used or disclosed. To forward the persons information to a third party, this would
require explicit consent by the subscriber.
43

In Europe, there is more protection of individuals information held by third parties, such
information cannot be released without the explicit consent of the subscriber. For instance, the
European Data Protection Directive seeks to provide consumer protection, and thus asserts that
European Union consumers must provide unambiguous consent prior to the collection of their
personal information.
44

The same directive is reflected in protection of privacy laws in the United Kingdom located in a
variety of sources,
45
the most notable being the remedy for breach of confidence
46
or, as it has
more recently been called, misuse of private information
47

For instance, the post-Campbell judgments in the Court of Appeal echo the words of Sedley L.J
in Douglas v Hello! Ltd: We have reached a point at which it can be said with confidence that
the law recognizes and will appropriately protect the right of personal privacy
48



42
Personal Information Protection and Electronic Documents Act (PIPEDA), S.C. 2000, c. 5.
43
Unlike the U.S where no consent of an individual must be obtained before certain personal information can be
collected, used or disclosed and anti-terrorism laws not subjected to open evaluation prior to their enactment
44
Arthur J. Cockfield, The State of Privacy Laws and Privacy-Encroaching Technologies after September 11: A
Two-Year Report Card on the Canadian Government, 2003-2004, 1 UOLTJ 325 344
45
See, generally, Winfield & Jolowicz on Tort 17 edited by W V H Rogers (Thomson: Sweet & Maxwell, 2006)
607-18. For instance, Glidewell J in Kaye v Robertson [1991] FSR 62 at 66 identified the remedy as malicious
falsehood. Remedies for invasion of privacy in the United Kingdom have been sought in libel, malicious
falsehood, nuisance and trespass. And the European Convention on Human Rights, especially art.8
46
Notably the more recent judgments of Campbell v MGN Ltd [2004] 2 All ER 995 (HL); [2004] UKHL 22 and
Douglas and Others v Hello! Ltd [2005] 4 All ER 128 (CA); [2005] EWCA Civ 595
88 Lord Nicholls in Campbell v MGN Ltd at para [14] and Sir Anthony Clarke MR in Murray v Big Pictures (UK)
Ltd [2008] EWCA Civ 446 at para 24. Tanya Aplin The Future of Breach of Confidence and the Protection of
Privacy (2007) 7 Oxford University Commonwealth Law Journal 137 argues that a limited tort of privacy in the
form of misuse of private information should be recognized in the United Kingdom.
47
Jonathan Morgan Privacy, Confidence and Horizontal Effect: Hello Trouble (2003) 62 Cambridge LJ 444 has
convincingly demonstrated that, while breach of confidence can do some of the work of an action for protection of
privacy, it cannot protect the whole sphere of privacy (at 452).
48
[2001] 2 All ER 289
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

In spite of the Constitutional protection of the right to privacy under the Charter, the Canadian
Courts have been unable to protect it in their decisions.
For instance, while heavily relying on the decision in Southam Inc
49
, that S.8 protects persons not
places, in R. v. Wise (1992)
50
, the Supreme Court ruled that, a reasonable level of surveillance
of each and every motor vehicle is readily accepted, indeed demanded, by society to obtain this
protection
51
. The case involved the use of a tracking device (beeper), to monitor movement of a
motor vehicle. Mr. Wise was a suspect in a series of homicides and the police wanted to track his
movement. The issue was whether there can be a reasonable expectation of privacy in ones
movements when in public, namely on public roads.
The reasoning underlying this position is that being seen is tantamount to being watched with
scrutiny and that if one can be seen it is implicitly acceptable to monitor that person.
52


R. v. Duarte (1990)
53

In R. v. Duarte (hereafter Duarte) the police made an audio-visual recording of a narcotic
transaction in an apartment specifically wired to make recordings, which was occupied by an
undercover agent and an informant. The question was whether such information was private and
not therefore not to be disclosed as was encompassing a reasonable expectation of Privacy. It
was held that using informants and relying on their memories is entirely different from
surreptitiously recording conversations. This position is opposed by another judge, Cory J. in a
dissenting opinion observes that, ..technology is merely an extension of human memory and
the use of human informants.
In this way, the content of the conversation becomes more public by virtue of having been
communicated to another, and the speaker risks further publication of the information should the
first listener report it to others
54
.

R. v. Wong (1990)
55


49
Hunter v. Southam Inc. 2 S.C.R. 145.(1984)
50
R. v. Wise. 1 S.C.R. 527 (1992
51
Para. 6
52
Krista, B (2007). Privacy outside the Castle: Surveillance Technologies and Reasonable Expectations of Privacy
in Canadian Judicial Reasoning. Pg. 10
53
R. v. Duarte. 1 S.C.R. 30. (1990)
54
Ibid. pg. 7
55
R. v. Wong. 3 S.C.R. 36. (1990)
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

In R. v. Wong, the police conducted electronic surveillance by installing a small camera in a hotel
room to determine whether it was being used as an illegal gambling parlour. The issue of
whether by inviting others (including strangers) to attend an event, that event becomes public,
regardless of the location.
Held: There is no reasonable expectation of privacy in the hotel room, based on the premise that
a person attending a function to which the general public has received an open invitation can
have no interest in being left alone
56

Finally, in R. v. Tessling (2004)
57
the police flew over Mr. Tesslings home and used forward-
looking infrared (FLIR) technology to capture an image of the heat distribution on the walls of
his home in order to develop an idea of whether he was growing marijuana inside. The judgment
focuses on whether the capability and sophistication of the FLIR technology, allows law
enforcement to see inside the home, thus constituting a search of the home, which clearly
requires a warrant.
While overturning the Court of Appeal decision which found that, FLIR technology constitutes a
search of the home, as it gathered information about what was happening inside that home, the
Supreme Court held that, using FLIR technology is not equivalent to a search of a home but an
external search for information about a home.
58


From the above Canadian Cases, it can be noted that, if issues of surveillance technologies and
the relationship between private and public are not accurately reflected in judicial reasoning and
policy making, the ability to protect individuals privacy interests will be at risk
59
.

Constitutional Privacy in Kenya and war on terror
Kenya has been a victim of terrorism before and after 9/11
60
. After the 9/11 terror attacks in the
U.S, the Kenya Government declared that it had joined the U.S. led global war on terror, which

56
Para. 17.
In this context, the hotel room ceases to be a private space when Mr. Wong invites others, strangers, into the room,
thus eliminating a privacy interest in the activities conducted in that space.
57
R. v. Tessling. S.C.C. 67. (2004)
58
Tessling, 2004. Para. 27
59
Krista Boa (2007). Privacy outside the Castle: Surveillance Technologies and Reasonable Expectations of Privacy
in Canadian Judicial Reasoning. Pg. 15
60
Examples are; the Norfolk Hotel bombing of 1970s, the August 1998 Bomb blast and the December 2002
Paradise Hotel Bombing.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

led to unsuccessful enactment of the Suppression of Terrorism Bill, 2003
61
which flopped as it
was perceived to target Muslims.
Attacks witnessed after Operation Linda Nchi have energized the need for such law, thus the
Publication of the Prevention of Terrorism Bill, 2012
The Bill and Right to Privacy
The Constitution of Kenya, 2010 protects right to privacy against search of their person, home or
property, seizure of possession, unnecessary accusation of their family or private affairs
information and infringement of their communication.
62

The broad right of all to privacy is broken down into this non-exhaustive list of facets of privacy
because it foresees a potential infringement by the State of an individuals privacy.

As a way of countering terror through money laundering and terrorism financing, the Bill
prohibits making funds available to a person residing outside the country who is likely to commit
a terrorist act in Kenya, allows police to access bank account details of terror suspects. In this
case, the cabinet secretary for internal security by an order published in the gazette prohibits any
citizen from sending funds to persons or terror organizations.
63

According to the Bill, the police can obtain a High Court order to intercept communications by
suspected terrorists which will then be used as evidence in a court of law, including seizing
property believed to be used to commit terror.
64

Lastly, it is important to note that, Kenya has no proper legal framework or law relating to
terrorism
65
and on the use of surveillance technology in crime investigation by security agents,
hence, no judicial precedent in light of privacy infringement. However, it remains interesting to
see how courts will tackle this issue when it arises.



61
See, Special issue of the Kenya Gazette as Supplement No. 38 on the 30th April 2003
62
Article 31, Constitution of Kenya,2010
63
See the Bill
64
Section 31(1) of the Bill and other relevant provisions
See, whether the courts while granting the permission to intercept communication will take into account the
principle of proportionality or will invalidate provisions in the Bill relating to the right to privacy as
unconstitutional.
65
Kenya does not have specific counter-terrorism legislation; instead it uses a mirage of laws to cause arrest,
detention and trial of terror suspects.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Difficulties in defending privacy
The following factors make it difficult to effectively and sufficiently defend privacy as a right,
namely:
Minimum standard of privacy: The establishment of a minimum standard of privacy is
not easy to come up with, save for by the legislature and the courts and this would not, on its
own, be sufficient to protect privacy against the encroachment of new technologies.
Time: It still leaves the issue of the time lag between the introduction and the regulation
of new technologies.
Decrease in penalties for unwarranted search: Court precedents have consistently
decreased the penalties for conducting illegal searches.
66
These effectively undermine any
incentive for law enforcement agencies to avoid potentially invasive technologies. Instead, these
rulings encourage these agencies to take advantage of all new technologies.
Determining a reasonable expectation of privacy with respect to technologically enabled
surveillance
67
. Two distinct and opposing approaches exist in three cases discussed on the
nature of privacy in relation to surveillance technology.
68
That is whether to determine subject it
to judicial oversight of obtaining a warrant; or only in terms of the individual involved and not
taking into account the social value of privacy generally.

Conclusion
All States have a duty and obligation to protect individuals within their jurisdiction from
terrorists under the International Covenant on Civil and Political Rights (ICCPR). While counter-
terrorist measures are essential for States to maintain national security and ensure safety for all
individuals, these measures must not circumvent international law or violate human rights.
While upholding, promoting and protecting rights and freedoms, the States is not to jeopardize,
infringe, restrict and or compromise any other right(s) or freedom while enforcing or

66
In United States v. Karo (1984), the Supreme Court decided that evidence gathered with an illegal search can be
suppressed only if there were no legal way to gather that evidence. In Doe v. Chao (2004), it decided that monetary
compensation for privacy invasions could only be claimed upon proof of damages.
67
Krista Boa (2007). Privacy outside the Castle: Surveillance Technologies and Reasonable Expectations of Privacy
in Canadian Judicial Reasoning. Pg. 5
68
R. v. Duarte (1990), R. v. Wong (1990), and R. v. Wise (1992)
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

implementing other rights(s) and freedom(s) unjustifiably. Such as providing security and
infringing on the right to privacy. Thus striking a balance is necessary.

Privacy must be protected under a rigorous analytical framework that secures that any
restrictions are adequately provided for in clear and precise provisions of domestic law, while
also ensuring that measures are effective for the purpose they are intended to serve, necessary in
a democratic society and proportionate to the real advantage gained.

In order for States to address possible violations of privacy rights and other human rights, the
international community must ensure that counter-terrorist measures comply with domestic and
international law as opposed to the massive, unjustified, unwarranted, unregulated and continued
intrusion into persons right to privacy, thus infringement of the right. And this can also be
achieved through adopting a universal definition of terrorism as its lack negatively impacts the
ability of the international community to fight terrorism.

Surveillance techniques adopted to counter terrorism may have a profound chilling effect on
other fundamental rights including the right to privacy. Therefore, it is essential that
surveillance measures be monitored to ensure compliance with human rights and protect the right
to privacy. Hence transparency, accountability and judicial oversight are necessary as seen in
Canada.











Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Bibliography
Legislations
Constitution of Kenya, 2010
The Prevention of Terrorism Bill, 2012
Personal Information Protection and Electronic Documents Act (PIPEDA)
The Reauthorization Act
The Anti Terrorism Act
Canadian Criminal Code
Privacy Act governs
Canadian Charter of Rights and Freedoms, 1982
The US Patriot Act
The Fourth Amendment; Constitution of the United States
Cases
Martin v. UK [2003] E.H.R.L.R. 461
Dalia v. U.S., 441 U. S. 238, 248 (1979).
Olmstead v. United States (1928), 277 U.S. 438, 43 S. Ct. 394.
Katz v. United States (1967), 389 U.S. 347, 88 S. Ct. 507
United States v. Miller (1939), 307 U.S. 174, 59 S. Ct. 816
Kyllo v. United States (2001)
Kaye v Robertson [1991] FSR 62
Campbell v MGN Ltd [2004] 2 All ER 995 (HL); [2004] UKHL 22
Douglas and Others v Hello! Ltd [2005] 4 All ER 128 (CA); [2005] EWCA Civ 595.
Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446
Hunter v. Southam Inc. 2 S.C.R. 145. (1984)
R. v. Wise. 1 S.C.R. 527. (1992
R. v. Duarte. 1 S.C.R. 30. (1990)
R. v. Wong. 3 S.C.R. 36. (1990)
R. v. Tessling. S.C.C. 67. (2004)
Treaties and Conventions
The European Convention on Human Rights,
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

The United Nations Declaration on Human Rights
International Convention on Civil and Political Rights
Books
Winfield & Jolowicz on Tort 17 edited by W V H Rogers (Thomson: Sweet & Maxwell,
2006) 607-18.

Articles and Journals
Andrew A, What, Me Worry? The Multi-Front Assault On Privacy, 2006, 25 St. Louis
University Publisher. L. Rev. 33
Samuel W. et al (1890), The Right to Privacy Harvard Law Review (1890) cited in
Lisa Austin Privacy and the Question of Technology. Law and Philosophy 22
(2003)119166. pp. 121123.
Darren, C (2002) Electronic Monitoring and Privacy Issues in Business-Marketing:
The Ethics of the Double Click Experience Journal of Business Ethics 35 243254.
Gareth. C et al (2007): Overlooked: Surveillance and personal privacy in modern Britain.
Arthur J. C (2007), Protecting the Social Value of Privacy in the Context of State
Investigations Using New Technologies. 40 U.B.C. L. Rev. 41 67.
Bloustein, E. J (1964): Privacy as an Aspect of Human Dignity: An Answer to Dean
Prosser, New York University Law Review (39): 962-1007.
Benn, S. I (1976): Privacy, Freedom, and Respect for Persons, in J.R. Pennock and J.W.
Chamman (eds.), Nomos XIII: Privacy, (New York: Atherton Press, 1971), pp. 1-26;
Reiman, J (1976): Privacy, Intimacy and Personhood, Philosophy and Public Affairs
Warren, S et al(1890): The Right to Privacy, Harvard Law Review 4: 193-220
Informal summary prepared by the Chairman on the exchange of views in plenary
meeting and on the results of the informal consultations, A/AC.252/2009/L.1/Add.1,
Annex 1, Draft Report,
The Millennium Summit, Note by the Secretary-General, A/59/565, 2004
The U.N. Committee on Counter-Terrorism FES Briefing Paper, p. 10 (15 September
2007).
Peter. K et al (2007): Surveillance technology and law: the social impact: Erasmus
University Rotterdam.
Terrorism, Surveillance and Privacy: Assessing the Excesses
2012

Berkowitz (2002): Packet Sniffers and Privacy: why the No-Suspicion-Required
Standard in the USA Patriot Act is Unconstitutional Computer Law Review and
Technology Journal 2.
The US Government Accountability Office (GAO, Information Security, Radio
Frequency Identification Technology in the Federal Government. Available at:
www.gao.gov/new.items/d05551.pdf.com
Susan N. H (2006), The USA PATRIOT Act and the Submajoritarian Fourth
Amendment, 41 Harv. C.R.-C.L. L. Rev. 67
Besar, X and Emir, C (2006), Privacy & Terrorism Review: Where Have We Come In
10 Years? Journal of International Commercial Law and Technology Vol. 7, Issue 2
Wayne N. R (2006 Who Controls the Past Now Controls the Future: Counter-Terrorism,
Data Mining and Privacy, 43 Alta. L. Rev. 779 823.
Krista. B (2007). Privacy outside the Castle: Surveillance Technologies and Reasonable
Expectations of Privacy in Canadian Judicial Reasoning.
Arthur J. Cockfield, The State of Privacy Laws and Privacy-Encroaching Technologies
after September 11: A Two-Year Report Card on the Canadian Government, 2003-
2004, 1 UOLTJ 325 344.
Jonathan. M (2003), Privacy, Confidence and Horizontal Effect: Hello Trouble 62
Cambridge LJ 444

Você também pode gostar