Introduction |
|
ix | |
|
Chapter 1 Security: Actors and Rights |
|
|
1 | (24) |
|
|
1 | (9) |
|
|
1 | (2) |
|
|
3 | (6) |
|
|
9 | (1) |
|
|
10 | (15) |
|
1.2.1 The law of armed conflict |
|
|
10 | (6) |
|
|
16 | (9) |
|
|
25 | (34) |
|
2.1 International interceptions |
|
|
25 | (12) |
|
2.1.1 Interceptions in the 20th century |
|
|
25 | (2) |
|
2.1.2 Interceptions in the 21st century |
|
|
27 | (10) |
|
2.2 Interceptions in France |
|
|
37 | (22) |
|
|
38 | (3) |
|
2.2.2 The law of March 9, 2004 |
|
|
41 | (1) |
|
2.2.3 The 2015 Intelligence Act |
|
|
42 | (10) |
|
2.2.4 Reform of the code of criminal procedure |
|
|
52 | (7) |
|
Chapter 3 Geolocation and Video Protection |
|
|
59 | (30) |
|
3.1 International standards for both geolocation and video protection/video surveillance |
|
|
59 | (8) |
|
3.1.1 Comparative legal issues in the era of geolocalization |
|
|
59 | (2) |
|
3.1.2 Belgian legislation on geolocation |
|
|
61 | (2) |
|
3.1.3 Video surveillance/video protection |
|
|
63 | (4) |
|
|
67 | (22) |
|
3.2.1 The legislative and regulatory framework |
|
|
67 | (2) |
|
3.2.2 The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments |
|
|
69 | (5) |
|
3.2.3 The entry into force of the LOPPSI 2 |
|
|
74 | (1) |
|
3.2.4 Jurisprudence after LOPPSI 2 |
|
|
74 | (14) |
|
3.2.5 Video protection and terrorism |
|
|
88 | (1) |
|
Chapter 4 Biometrics or "the Second Circle" |
|
|
89 | (32) |
|
4.1 Biometrics and international law |
|
|
90 | (8) |
|
4.1.1 The United States: a historical outline |
|
|
90 | (3) |
|
|
93 | (1) |
|
4.1.3 The European Union and biometrics |
|
|
94 | (4) |
|
|
98 | (21) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (16) |
|
|
117 | (2) |
|
4.3 Facial recognition at the heart of globalization |
|
|
119 | (2) |
|
Chapter 5 Personal Data in the United States and Europe |
|
|
121 | (24) |
|
5.1 The United States and the protection of personal data in the European Union: Directive 95/46 |
|
|
122 | (4) |
|
|
122 | (1) |
|
5.1.2 The right of access |
|
|
123 | (1) |
|
|
123 | (1) |
|
5.1.4 The directive of December 15, 1997. followed by the directive of July 12, 2002 and supplemented by the directive of November 25, 2009 |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (12) |
|
|
127 | (7) |
|
5.2.2 Metadata and the "Privacy" bill |
|
|
134 | (4) |
|
|
138 | (7) |
|
|
138 | (1) |
|
5.3.2 The Safe Harbor Principles agreement |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (5) |
|
Chapter 6 Cybersecurity and Privacy |
|
|
145 | (40) |
|
|
146 | (12) |
|
6.1.1 Cybersecurity in the United States |
|
|
146 | (1) |
|
6.1.2 Cybersecurity in China |
|
|
147 | (1) |
|
6.1.3 Cybersecurity in Japan |
|
|
147 | (1) |
|
6.1.4 Cybersecurity and the European Union |
|
|
148 | (1) |
|
6.1.5 Cybersecurity in the United Kingdom |
|
|
149 | (1) |
|
6.1.6 Cybersecurity in France |
|
|
149 | (2) |
|
6.1.7 The dangers of cyber-attacks |
|
|
151 | (3) |
|
6.1.8 Two interesting cases |
|
|
154 | (4) |
|
6.2 Cybersecurity and cryptology |
|
|
158 | (6) |
|
6.2.1 Cryptology: the science of secrecy |
|
|
158 | (3) |
|
|
161 | (3) |
|
|
164 | (15) |
|
6.3.1 Element of definition |
|
|
164 | (2) |
|
6.3.2 PNR data and nation-states |
|
|
166 | (13) |
|
|
179 | (6) |
|
6.4.1 The development of standardization and certification |
|
|
181 | (1) |
|
6.4.2 Strategies and CSIRTs |
|
|
182 | (3) |
|
Chapter 7 Security Instruments in Texts Relating to Terrorism |
|
|
185 | (40) |
|
|
185 | (23) |
|
7.1.1 The millimeter-wave scanner |
|
|
185 | (11) |
|
|
196 | (6) |
|
7.1.3 UAVs: a dual use - military and civilian |
|
|
202 | (6) |
|
7.2 Standards in relation to terrorism |
|
|
208 | (17) |
|
|
209 | (10) |
|
7.2.2 The law strengthening internal security and the fight against terrorism |
|
|
219 | (6) |
|
Chapter 8 Security and Democracy |
|
|
225 | (20) |
|
|
226 | (11) |
|
|
227 | (1) |
|
|
227 | (10) |
|
|
237 | (8) |
|
|
237 | (2) |
|
8.2.2 The proposed new mechanism |
|
|
239 | (6) |
Conclusion |
|
245 | (4) |
References |
|
249 | (2) |
Index |
|
251 | |