By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.
This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.
Author(s): Claudine Guerrier
Series: Innovation, Enterpreneurship, Management Series: Innovation and Technology Set, 12
Publisher: Wiley-ISTE
Year: 2021
Language: English
Pages: 276
City: London
Cover
Half-Title Page
Title Page
Copyright Page
Contents
Introduction
1. Security: Actors and Rights
1.1. Numerous actors
1.1.1. Nation-states
1.1.2. Multinationals
1.1.3. The GAFAM
1.2. Rights and security
1.2.1. The law of armed conflict
1.2.2. Environmental law
2. Interceptions
2.1. International interceptions
2.1.1. Interceptions in the 20th century
2.1.2. Interceptions in the 21st century
2.2. Interceptions in France
2.2.1. The 1991 law
2.2.2. The law of March 9, 2004
2.2.3. The 2015 Intelligence Act
2.2.4. Reform of the code of criminal procedure
3. Geolocation and Video Protection
3.1. International standards for both geolocation and video protection/video surveillance
3.1.1. Comparative legal issues in the era of geolocalization
3.1.2. Belgian legislation on geolocation
3.1.3. Video surveillance/video protection
3.2. France
3.2.1. The legislative and regulatory framework
3.2.2. The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments
3.2.3. The entry into force of the LOPPSI 2
3.2.4. Jurisprudence after LOPPSI 2
3.2.5. Video protection and terrorism
4. Biometrics or “the Second Circle”
4.1. Biometrics and international law
4.1.1. The United States: a historical outline
4.1.2. Standardization
4.1.3. The European Union and biometrics
4.2. France
4.2.1. Visa control
4.2.2. Passports
4.2.3. The TES database
4.2.4. Setting up Alicem
4.3. Facial recognition at the heart of globalization
5. Personal Data in the United States and Europe
5.1. The United States and the protection of personal data in the European Union: Directive 95/46
5.1.1. Sensitive data
5.1.2. The right of access
5.1.3. Security
5.1.4. The directive of December 15, 19973, followed by the directive of July 12, 20024 and supplemented by the directive of November 25, 2009
5.1.5. Geolocalization
5.1.6. Cookies
5.2. The GDPR
5.2.1. Consent
5.2.2. Metadata and the “Privacy” bill
5.3. Cloud computing
5.3.1. Definition
5.3.2. The Safe Harbor Principles agreement
5.3.3. Privacy Shields
5.3.4. Two models
6. Cybersecurity and Privacy
6.1. Cybersecurity itself
6.1.1. Cybersecurity in the United States
6.1.2. Cybersecurity in China
6.1.3. Cybersecurity in Japan
6.1.4. Cybersecurity and the European Union
6.1.5. Cybersecurity in the United Kingdom
6.1.6. Cybersecurity in France
6.1.7. The dangers of cyber-attacks
6.1.8. Two interesting cases
6.2. Cybersecurity and cryptology
6.2.1. Cryptology: the science of secrecy
6.2.2. Risks
6.3. PNR data
6.3.1. Element of definition
6.3.2. PNR data and nation-states
6.4. Smart cities
6.4.1. The development of standardization and certification
6.4.2. Strategies and CSIRTs
7. Security Instruments in Texts Relating to Terrorism
7.1. Security instruments
7.1.1. The millimeter wave scanner
7.1.2. The body camera
7.1.3. UAVs: a dual use – military and civilian
7.2. Standards in relation to terrorism
7.2.1. The law of 2014
7.2.2. The law strengthening internal security and the fight against terrorism
8. Security and Democracy
8.1. Fake news
8.1.1. The definition
8.1.2. Obligations
8.2. Hate speech
8.2.1. The report
8.2.2. The proposed new mechanism
Conclusion: Security, Technologies and the Spirit of Freedom
References
Index
Other titles from iSTE in Innovation, Entrepreneurship and Management