Violence, Law and Culture: The Social Construction of US and European Privacy Identities and Transatlantic Counter-Terrorism Cooperation

  • Michelle Frasher Molloy College, Department of History and Political Science
Keywords: social constructivism; culture; law; terrorism; privacy; data protection; Europe; United States

Abstract

Social constructivism, the influence of ideas, historical experience and culture on processes and institutions, explains how US and EU privacy identities—beliefs about the protection of an individuals’ data, have been shaped by historical episodes of violence. As sharing data across borders has become an important component of counter-terrorism (CT) operations, the differences among transatlantic privacy identities will affect cooperation in the “War on Terror.”

European experiences with state-led, left-wing, and nationalist terrorism (near enemy threats) during the Second World War and Cold War eras created a cultural consciousness that framed the EU’s privacy identity as a fundamental human right where data ownership is vested in the individual to protect intrusions from the states or private citizens. European counter-terrorism (CT) strategies developed within criminal law, which required officials to take notice of national privacy and data protection protections in their investigations.

The US did not encounter political violence during World War II or the Cold War, but was frequently the target of terrorism aboard (far enemy). As a result, US CT relied on military intervention, covert action, and sanctions against states who supported these groups, while allowing covert data collection and surveillance on its citizenry and foreign nationals. The American privacy identity is property based, and protects data in the possession of the holder, no matter what entity this might be, so legislation has selectively regulated data usages.

The variances in privacy identities are important to contemporary CT cooperation because information technologies and threats transcend sovereign borders causing national privacy identities, legal systems, and security interests to increasingly overlap and clash. However, as constructivism shows how institutions and procedures have been the result of interactions within societies and among societies, the last decade has shown how transatlantic data sharing has evolved to encompass both US and EU privacy and security values.

References

Allen, Michael. “Stranger than Science Fiction. Edwin Black, IBM, and the Holocaust.” Technology & Culture 43 (2002): 150-154.

American Civil Liberties Union (ACLU) “Surveillance Under the USA PATRIOT Act. http://www.aclu.org/national-security/surveillance-under-usa-patriot-act (accessed 12 June 2012).

Baldwin, David, ed. Neorealism and Neoliberalism. The Contemporary Debate. Cambridge, 1993.

Beckman, James. Comparative Legal Approaches to Homeland Security and Anti-Terrorism (Ashgate, 2007).

Bennett, Colin J. and Charles Raab. The Governance of Privacy. Ashgate, 2003.

Bignami, Francesca. “Privacy and Law Enforcement in the European Union: The Data Retention Directive.” Chicago Journal of International Law 8 (2007): 233-255.

Bunyan, Tony. Trevi, Europol and the European State. Statewatch.org (1993). http://www.statewatch.org/news/handbook-trevi.pdf (accessed 2 September 2012).

Buzan, Barry. “New Patterns of Global Security in the Twenty-First Century,” International Affairs 67 (2001): 431-451.

Cannataci, J. “Privacy, Technology Law and Religions Across Cultures.” Journal of Law and Technology 1 (2009). http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2009_1/cannataci/ (accessed 20 September 2012).

Center for Democracy and Technology. “Existing Federal Privacy Laws.” https://www.cdt.org/privacy/guide/protect/laws.php (accessed 10 September 2012).

Church Committee, Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA.

Collins, Stephen. “Dissuading State Support of Terrorism: Strikes or Sanctions? Studies in Conflict & Terrorism (2004): 1-18.

Committee of Experts on Terrorism (CODEXTER) Council of Europe. “Profiles on Counter-Terrorist Capacity, France.” June 2006. http://www.coe.int/t/dlapil/codexter/country_profiles_en.asp (accessed 15 September 2012).

Coors, Corinna. “Headwind from Europe: The New Position of the German courts on Personality Rights after the Judgment of the European Court of Human Rights.” German Law Journal 11 (2010): 527-537.

The Economist, “Private Data, Public Rules.” 28 January 2012.

European Commission. “Commission proposes a comprehensive reform of the data protection rules.” 25 January 2012 http://ec.europa.eu/justice/newsroom/data-protection/news/ 120125_en.htm (accessed 15 June 2012).

Firat, Gamze. A Common Counter-Terrorism Strategy in the European Union? How Member States’ Ideas, Norms and Identities Matter. MA Thesis. Lund University, Department of Political Science (2010).

Flaherty, David. Protecting Privacy in Surveillance Societies. University of North Carolina Press, 1992.

de Goede, Marieke, “The SWIFT Affair and the Global Politics of European Security.” Journal of Common Market Studies 50 (2012): 214-230.

Hart, Jeffrey A. and Sangbae Kim, “Power in the Information Age.” In Jose V. Ciprut, ed. Of Fears and Foes: International Relations in an Evolving Global Political Economy. Praeger, 2001.

Hoffman, Bruce. Inside Terrorism. Columbia, 2006.

Hoffman, Bruce. “Is Europe Soft on Terrorism?” Foreign Policy 115 (1999): 62-76.

Hopf, Ted. “The Promise of Constructivism in International Relations Theory”. International Security 23 (1998): 171-200.

Katzenstein, Peter J. “Same War-Different Views: Germany, Japan and Counterterrorism.” International Organization 57 (2003): 731-760.

Katzenstein, Peter J. “September 11 in Comparative Perspective: The Antiterrorism Campaigns of Germany and Japan.” International Organization (2002): 45-56.

Keohane, Robert O. ed. Neorealism and Its Critics. Cambridge, 1986.

Kierkegaard Sylvia. “US War on Terror EU SWIFT(ly) Signs Blank Cheque on EU Data.” Computer Law & Security Review 27 (2011): 451-464.

Kobrin, S. “Safe Harbors are Hard to Find: The Transatlantic Data Privacy Dispute, Territorial Jurisdiction and Global Governance.” Review of International Studies 20 (2004): 111-131.

van de Linde, Erik, Kevin O’Brien (et al.) “Quick scan of post 9/11 National Counter-Terrorism Policymaking and Implementation in Selected Countries.” RAND Europe. May 2002.

Luebke, David Martin, and Sybil Milton. “Locating the Victim: An Overview of Census-Taking, Tabulation Technology, and Persecution in Nazi Germany.” IEEE Annals of the History of Computing 16 (1994): 25-39.

MacMaster, Neil. “Identifying ‘Terrorists’ in Paris: A Police Experiment with IBM Machines during the Algerian War.” French Politics, Culture & Society 28 (2010): 23-45.

National Security Archive. “Electronic Surveillance From the Cold War to Al-Qaeda.” Briefing Book No. 178. 4 February 2006. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/index.htm (accessed 18 September 2012).

O’Cinneide, Colm, Myriam Hunter-Henin, Jorg Fedtke, “German Law” in J.M. Smits ed. Encyclopedia of Comparative Law (Elgar, 2006).

Post, Robert C. “Three Concepts of Privacy.” Yale Law School Faculty Scholarship Series. Paper 185. http://digitalcommons.law.yale.edu/fss_papers/185

Prosser, W. “Privacy”. California Law Review 48.3 (1960): 383-423.

Regan, Priscilla M. “Global Privacy Issues.” The International Studies Encyclopedia 2010.

Ripoll Servent, Ariadna and Alex MacKenzie, “Is the EP Still a Data Protection Champion? The Case of SWIFT.” Perspectives on European Politics and Society 12 (2011): 390-406.

Ruggie, John G. “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge.” International Organization 52 (1998): 855-885.

Schoeman, Ferdinand. Privacy and Social Freedom. Cambridge, 1992.

Sedgwick, Mark. “Inspiration and the Origins of Global Waves of Terrorism.” Studies in Conflict and Terrorism (2007): 97-112.

Seltzer, William. “Population Statistics, the Holocaust, and the Nuremberg Trials.” Population and Development Review 24.3 (1998): 511-552.

Seltzer, William and Margo Anderson. Census Confidentiality under the Second War Powers Act (1942-1947). Paper prepared for the Population Association of America Annual Meeting. 29-31 March 2007. https://pantherfile.uwm.edu/margo/public/Confidentiality/Seltzer-AndersonPAA2007paper3-12-2007.doc (accessed 18 September 2012).

Shapiro, Jeremy and Daniel Byman. “Bridging the Transatlantic Counterterrorism Gap.” The Washington Quarterly 29 (2006): 33-50.

Simmel, A. “Privacy.” In D.L.Sills (ed.) International Encyclopedia of the Social Sciences 12. (1968): 480-487.

Sorkin, David. “Wilhelm von Humboldt: The Theory and Practice of Self-Formation (Bildung), 1791-1810.” Journal of the History of Ideas 44 (1983): 55-73.

Strange, Susan. “Finance, Information and Power.” Review of International Studies 16 (1990), 259-274.

Theoharis, Athan. “FBI Surveillance During the Cold War Years: A Constitutional Crisis.” The Public Historian 3 (1981): 4-14.

Theoharis, Athan. Abuse of Power: How Cold War Surveillance and Secrecy Shaped the Response to 9/11. Temple University Press, 2011.

Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: France. 28 October 2008. http://www.transnationalterrorism.eu/tekst/publications/France%20case%20study%20(WP%206%20Del%2012b).pdf (accessed 15 September 2012)

Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Germany. 20 November 2008. http://www.transnationalterrorism.eu/tekst/publications/Germany%20case%20study%20(WP%206%20Del%2012b).pdf (accessed 15 September 2012).

Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Spain. The Ethical Justness of Counter-Terrorism Measures. 27 October 2008.http://www.transnationalterrorism.eu/tekst/publications/Spain%20case%20study%20(WP%206%20Del%2012b).pdf (accessed 15 September 2012).

Wade, Ariel. “ A New Age of Privacy Protection: A Proposal for an International Personal Data Privacy Treaty.” George Washington International Law Review 659 (2010): 1-15.

Waltz, Kenneth. Man, the State, and War. New York, 1959.

Waltz, Kenneth. Theory of International Politics. Addison-Wesley, 1979.

Warren, Samuel and Louis Brandeis, “The Right to Privacy.” Harvard Law Review 4 (December 1890).

Wattellier, Jeremie. “Comparative Legal Responses to Terrorism: Lessons from Europe.” Hastings International and Comparative Law Review 27 (2004): 1-21.

Wendt, Alexander. “Anarchy is what states make of it: the social construction of power politics.” International Organization 46 (1992): 391-425.

White House Press Secretary, “Privacy Bill of Rights” 23 February 2012 http://www.whitehouse.gov/the-press-office/2012/02/23/we-can-t-wait-obama-administration-unveils-blueprint-privacy-bill-rights (accessed 15 June 2012).

Whitman, James Q. “The Two Western Cultures of Privacy: Dignity versus Liberty.” Yale Law School Faculty Scholarship Series. Paper 649. http://digitalcommons.law.yale.edu/fss_papers/649 (accessed 10 August 2012)

Published
2020-01-02
Section
Articles