{"id":15268,"date":"2014-01-15T17:10:07","date_gmt":"2014-01-15T15:10:07","guid":{"rendered":"https:\/\/www.hiig.de\/?p=15268"},"modified":"2019-02-26T12:24:06","modified_gmt":"2019-02-26T11:24:06","slug":"civil-security-research-and-the-internet","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/","title":{"rendered":"Civil Security Research and the Internet"},"content":{"rendered":"<blockquote><p>&#8220;The worldwide web offers all the prerequisites needed to undermine all citizens\u2019 fundamental rights in this country being enshrined in the first ten articles of our constitution. This is particularly the case for the rights to freedom of expression and freedom of the press in article five which are a crucial and fundamental basis of our functioning democracy. In the end, it does also apply to the core statement of our constitution which states in article one: Human dignity is inviolable.<\/p>\n<p>In order to assess these dangers correctly for our common freedom in future and to enhance trust in this medium, we have to dedicate more sensitivity, more attention as well as research to the Internet.&#8221; (Joachim Gauck, Federal President Germany, February 2012)<\/p><\/blockquote>\n<p>Also for the purpose of not leaving our Federal President alone with his fears about fundamental rights\u2019 functional capability, the Alexander von Humboldt Institute for Internet and Society (HIIG) has gained a new thematic emphasis in autumn 2013. It is part of the area &#8220;Global Constitutionalism and the Internet&#8221;.\u00a0 Within the context of a project supported by the German Federal Ministry for Education and Research (Bundesministerium f\u00fcr Bildung und Forschung), four PhD candidates and two research students are dealing with questions of civil security law in Europe specific to the Internet.<\/p>\n<p>These four academic fellows cover the following topics:<\/p>\n<ol>\n<li>Legal Basis for a European Cyber Security law in the multilevel system of the EU<\/li>\n<li>Security of infrastructure, networks and data in a digital Europe<\/li>\n<li>Data exchange and information systems in the framework of police and judicial cooperation in the EU<\/li>\n<li>Combating cybercrime within the European Union<\/li>\n<\/ol>\n<p>At the same time, due to this research project the HIIG is one of four network partners in the Network for Civil Security Law in Europe (KORSE). The network aims at fostering and coordinating German jurisprudential security research as to make it visible and fruitful at the European level finally. While the academic fellows at the Centre for Security and Society at the University of Freiburg devote attention to general challenges of security research, its partners are equipped with specific areas of research. For instance, the German Police Academy in M\u00fcnster works in the field of &#8220;network-based security of interlinked police forces&#8221;, whereas the Claussen-Simon-Chair for International Law at Bucerius Law School in Hamburg considers the matter of &#8220;maritime security&#8221;.<\/p>\n<p>In addition to these classical analogue aspects of civil security, the digital security takes a special role of increasing importance in practice as well as in research. Admittedly, even if you as a reader of our blog would not look at the Internet with the same fear as our power holders and dignitaries, the specificity of the Internet justifies a seperate consideration of security law. Above all, that implies basically two things: safety related aspects, all of which are found in daily life, exist in the digital world too. They might even play a greater role there but also additional risks have been emerged.<\/p>\n<p>Relevance and timeliness of the four HIIG\/KORSE related research topics will be outlined by brief reflections in the following section:<\/p>\n<p>Data more rapidly and expansively revealed by Internet users, are not necessarily less worthy of protection. The international exchange of digital information between states in general and specifically between investigation authorities is able to happen without significant delay. Beside of that, digital infrastructures have become essential for the functioning of modern states. Consequently, more than ever their general and effective protection must be ensured which is especially important in order to guarantee critical infrastructures such as finance, energy supply and healthcare. Ultimately, these structure and digital information are especially worthwhile targets for criminals. Apart from commercial use by enterprises and surveillance of personal data and digital communication by the state, the criminal-law aspect in particular plays an essential role both for the Internet users and the investigation authorities.<\/p>\n<p>The approach, responding to potential &#8211; digital and analogue &#8211;\u00a0 security threat situations by using digital technologies increasingly, seems rarely thought through to the end yet.<\/p>\n<p>As a result, security law objectives contradict each other sometimes. Even if one give credit to, for instance, government bodies for processing data obtained by mechanisms like data retention carefully and permissible under constitutional law, huge and central information memories come up. They, for their part again are targets for less well-meaning user-groups of digital technologies. In this way, indeed, meant for prevention and detection of criminal activities in both the digital and analogue world, the tool itself is developing (at least passively) an own, separate hazard potential.<\/p>\n<p>Precisely because it is about groundless retention of call detail records, not even particularly decent citizens (whomever one might define as such) can feel secure like the former Interior Minister and today\u2019s Finance Minister Dr. Wolfgang Sch\u00e4uble. He was probably rather thinking about the danger of spying out citizens by the state than considering further possibilities for use and abuse\u00a0 of his personal data:<\/p>\n<p>&#8220;Moreover, I am decent. So, the Federal Criminal Police Office (BKA) has no reason to send me any Trojans.&#8221; (Dr. Wolfgang Sch\u00e4uble, Federal Interior Minister, February 2007)<\/p>\n<p>In fact,\u00a0 the above mentioned statements are only a tiny extract. However, they show that &#8220;the Internet&#8221; is treated, on one hand, as a great danger for security and freedom and is rated as an quite welcomed instrument in the field of security on the other hand.<\/p>\n<p>Admittedly, barely ever helpful, such a black and white thinking definitely not suits as a response to chances, risks and challenges of a digital world.<\/p>\n<p>That is also why the four KORSE-fellows at HIIG aim at considering the complex of themes more differentiated and in a global sense. It is made possible by an intense cooperation among each other as well as in a transdisciplinary exchange with researchers of other disciplines at HIIG. It might be that in the end even our Federal President will have a more restful sleep.<\/p>\n<h4>Sources:<\/h4>\n<ol>\n<li><a href=\"https:\/\/www.divsi.de\/wp-content\/uploads\/2013\/07\/DIVSI-Milieu-Studie_Gesamtfassung.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.divsi.de\/wp-content\/uploads\/2013\/07\/DIVSI-Milieu-Studie_Gesamtfassung.pdf<\/a><\/li>\n<li><a href=\"https:\/\/www.sicherheitundgesellschaft.uni-freiburg.de\">https:\/\/www.sicherheitundgesellschaft.uni-freiburg.de<\/a><\/li>\n<li><a href=\"http:\/\/www.dhpol.de\/\">http:\/\/www.dhpol.de\/<\/a><\/li>\n<li><a href=\"http:\/\/www.law-school.de\/prof_dr_doris_koenig_mcl.html\">http:\/\/www.law-school.de\/prof_dr_doris_koenig_mcl.html<\/a><\/li>\n<li><a href=\"http:\/\/www.korse.uni-freiburg.de\">http:\/\/www.korse.uni-freiburg.de<\/a><\/li>\n<li><a href=\"http:\/\/www.itwissen.info\/definition\/lexikon\/Vorratsdatenspeicherung-VDS.html\">http:\/\/www.itwissen.info\/definition\/lexikon\/Vorratsdatenspeicherung-VDS.html<\/a><\/li>\n<li><a href=\"http:\/\/www.taz.de\/1\/archiv\/archiv\/?dig=2007\/02\/08\/a0169\">http:\/\/www.taz.de\/1\/archiv\/archiv\/?dig=2007\/02\/08\/a0169<\/a><\/li>\n<\/ol>\n<h4>This post is part of a weekly series of articles by\u00a0<a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral canditates<\/a>\u00a0of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact\u00a0<a href=\"mailto:presse@hiig.de\">presse@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fcivil-security-research-and-the-internet%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Civil%20Security%20Research%20and%20the%20Internet https%3A%2F%2Fwww.hiig.de%2Fen%2Fcivil-security-research-and-the-internet%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fcivil-security-research-and-the-internet%2F&subject=Civil%20Security%20Research%20and%20the%20Internet\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>&#8220;The worldwide web offers all the prerequisites needed to undermine all citizens\u2019 fundamental rights in this country being enshrined in the first ten articles of our constitution. This is particularly the case for the rights to freedom of expression and freedom of the press in article five which are a crucial and fundamental basis of&hellip;<\/p>\n","protected":false},"author":53,"featured_media":15289,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[223,226],"tags":[116],"class_list":["post-15268","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation-and-work","category-knowledge","tag-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Civil Security Research and the Internet &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Civil Security Research and the Internet &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"&#8220;The worldwide web offers all the prerequisites needed to undermine all citizens\u2019 fundamental rights in this country being enshrined in the first ten articles of our constitution. This is particularly the case for the rights to freedom of expression and freedom of the press in article five which are a crucial and fundamental basis of&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-15T15:10:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-26T11:24:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/01\/european-union-155207_640.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adrian Haase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adrian Haase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Civil Security Research and the Internet &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/","og_locale":"en_US","og_type":"article","og_title":"Civil Security Research and the Internet &#8211; Digital Society Blog","og_description":"&#8220;The worldwide web offers all the prerequisites needed to undermine all citizens\u2019 fundamental rights in this country being enshrined in the first ten articles of our constitution. This is particularly the case for the rights to freedom of expression and freedom of the press in article five which are a crucial and fundamental basis of&hellip;","og_url":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/","og_site_name":"HIIG","article_published_time":"2014-01-15T15:10:07+00:00","article_modified_time":"2019-02-26T11:24:06+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/01\/european-union-155207_640.png","type":"image\/png"}],"author":"Adrian Haase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adrian Haase","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/"},"author":{"name":"Adrian Haase","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c4b59c3bb59d195ca49e88c66dc1fbbe"},"headline":"Civil Security Research and the Internet","datePublished":"2014-01-15T15:10:07+00:00","dateModified":"2019-02-26T11:24:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/"},"wordCount":1094,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","keywords":["news @en @en"],"articleSection":["Innovation and Work","Knowledge"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/","url":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/","name":"Civil Security Research and the Internet &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2014-01-15T15:10:07+00:00","dateModified":"2019-02-26T11:24:06+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/civil-security-research-and-the-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Civil Security Research and the Internet"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c4b59c3bb59d195ca49e88c66dc1fbbe","name":"Adrian Haase"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=15268"}],"version-history":[{"count":18,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15268\/revisions"}],"predecessor-version":[{"id":57011,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15268\/revisions\/57011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/15289"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=15268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=15268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=15268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}