Verified Document

Telecommunication Interception And Access In Conclusion

Conclusion: Chapter 2.

Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations"

, is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless. Parties involved in the interception process are sender of the telecommunication; particular Law Enforcement Agencies, and the receiver and lawful enforcements include 'phone tapping' and 'wiretapping'

Pertinent Australian policies, such as the Patriot Act, enable the government to strike equilibrium between privacy and necessary government surveillance.

Since cost is often a factor that intimidates developing countries from designing and implementing such laws, the development and implementation of interception capability expenses, in Australia,...

, are the responsibility of carriers who are accorded funding towards the cost as well as a waiver from the condition for several years.
Legal interception requires various technicalities, foremost of which is a distinct separation between the Public Telecom Network (PTN) and the network used for distribution and processing of lawful interception information.

Finally, different models are used as regards lawful Internet interception, the most common approach being the European Telecommunication Standards Institute (ETSI) model.

ADDIN EN.CITE Thorogood2007<

ecNum>5<

ecord><

ec-number>55<

ef-type name="Web Page">12Thorogood, Rupert Brookson, Charles < itles>< itle>Lawful Interception 2008<

umber>10 Augest2007Telektronikk<

elated-urls> http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf ?Rupert Thorogood and Charles Brookson, Lawful Interception (2007) Telektronikk < http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf > at 10 Augest 2008?

Sources used in this document:
ef-type name="Web Page">12Thorogood, Rupert Brookson, Charles < itles>< itle>Lawful Interception 2008<

umber>10 Augest2007Telektronikk<

elated-urls> http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf
?Rupert Thorogood and Charles Brookson, Lawful Interception (2007) Telektronikk < http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf > at 10 Augest 2008?
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now