Telecommunications - Jordan the Impact essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights.

The fact that the electronic flow of information occurs on an increasingly global platform has complicated the issue, as divergent national norms and statutes confront each other with increasing frequency where privacy protection is concerned. The various national responses to the terrorism issue is a further complicating factor. The international policy confrontations regarding privacy protection for citizens ultimately resulted in prolonged international negotiation, and finally in a compromise known as the "Safe Harbor" agreement (Long and Quek 2002: 326). In this compromise, the somewhat stringent privacy requirements to protect EU citizens were relaxed to match the more lenient requirements by the United States. The purpose of the agreement was to facilitated electronic commerce between EU countries and the United States.

Where the EU then operates from a basis of privacy rights for citizens, other countries, like the United States, tend to again focus upon a more government-centered view, where national security and other political issues dictate privacy laws. This has been a particular issue in the years after 9/11, while still remaining controversial in the political and e-commerce arenas. Horn, writing in 2002, addresses some of the issues that created controversy in terms of the conflict between privacy rights and security after the 2001 attacks.

Horn (2002: 2234) addresses the specific concern of privacy advocates regarding electronic surveillance paradigms in the United States. Indeed, both privacy advocates and citizens in general have displayed an increasing distrust of electronic devices used by law enforcement agencies for electronic surveillance of suspects. The author notes that such distrust may not be displaced. The Carnivore system created by the FBI for example is the focus of such distrust. The system was created to intercept and collect electronic communications where criminal activity was suspected. As justification, the reason for the new system was that criminals are increasingly sophisticated in their use of the Internet for illegal activities. To counter this, Carnivore is installed on a computer network -- generally those of Internet Service Providers (ISPs) to capture and store information running through these networks.

Significantly, the system has been in existence since 1997, but only became known to the public in 2000 (Horn 2002: 2235). This resulted in significant controversy regarding the control the government and law enforcement have over citizens and their use of private information. While some have acknowledged the importance of electronic surveillance to ensure the safety of citizens, others believed that Carnivore and other electronic surveillance systems are simply too invasive, particularly in cases where no criminal activity has been proven.

This is also the case with the "War on Terrorism." Citizens and privacy advocates alike have increasingly voiced their concern over the increasing power of the government and law enforcement agencies to engage in surveillance of private citizens without their knowledge (Soma et al., 288). In addition to privacy rights, these activities have also resulted in controversies regarding the Constitution. Indeed, especially during the early part of the decade, there were numerous reports of profiling and general government harassment that targeted certain nationalities under the umbrella of "suspected terrorism." It therefore appears that privacy rights in the European Union have enjoyed greater constitutionality than those in the United States. It is however also important to make a specific comparative study of these issues in various major countries to obtain a more global view of how privacy and its variety of related concepts manifests itself across the world. Furthermore, the issue of terrorism and other types of crime also manifests itself in a variety of differential ways across national borders. All these issues have significant effects upon privacy rights and issues.

7.2

Impact of Telecommunications Interception and Access Law on Privacy

As seen above, the impact of telecommunications interception on privacy was varied since the time of its inception. With the development of technology today, this is becoming an increasingly important as well as controversial issue. Indeed, a variety of laws and policies have been implemented in order to mitigate the negative impacts of telecommunications interception on privacy and the rights that go along with it. It is also important however to consider what is being protected apart from human rights; the free flow of information could for example make countries vulnerable to infrastructure attack. Much legislation is focused upon mitigating this. The question remains however to what extent such legislation should be allowed to restrict constitutionally guaranteed human rights. One such important legislative issue is for example the extent to which police should be able to track wireless calls (Lee, 2003).

Privacy Protection and Lawful Access

Ayoade and Kosuge (2002: 274), privacy is not only a matter of government interference, but also of personal protection from access by outside parties. The authors mention encryption technology in this regard. The authors note that the increasing concern with privacy protection within the electronic environment has necessitated the relaxation of laws regarding the individual use of encryption technology. Concomitantly, however, this places tools in the hands of criminals and terrorists to prevent lawful access by government agencies in certain circumstances. This is why only a few countries allow the use of such technology by individuals. The conflict between the drive to protect individual privacy online and the ability of the government to access private information has created a significant controversy that has not yet been completely or indeed adequately addressed. The issue concerns not only individuals, but also the larger framework of society, such as critical infrastructure. The danger of disallowing cryptography could lead to an increasing ability by terrorists and criminals to access vital electronic frameworks to create damage that would take years to repair.

Protection of Critical Social Freedoms Amid Electronic Freedom

Abbas (2006) suggests that freely available information carries considerable risk, not only in terms of terrorism, but also in terms of the general bases upon which society functions, such as critical infrastructure. Critical infrastructure protection (CIP), in other words, is significantly impacted by technology that has developed and is developing so rapidly that no time has yet been taken to implement adequate security and protection measures. This is the reverse side of privacy protection of citizens. Businesses, entities, and infrastructure are all at risk of hacking or other types of terrorism because of the free flow of electronic information.

Critical infrastructure is then particularly important in terms of adequate protection, as this refers to essential services and structures upon which the stability and security of a country is built (Abbas 2006: 234). Such structures ensure the delivery of goods and services such as utilities, banking, finance, transport, health and food. Currently, critical infrastructure tends to be based upon electronic information systems and databases. It is therefore critical that the information in these databases be protected, particularly against terrorism and other malicious attacks. The success of such attacks in disabling such systems would also significantly impact upon the infrastructure elements that they control, and hence upon the economic and social well-being of citizens (Abbas, 2006: 235).

Important in this regard is the fact that physical and cyber infrastructures interconnect -- disabling one means disabling everything within the infrastructure system that depends upon it. Once again, the free availability of information within electronic systems means that all infrastructures are vulnerable to malicious terrorist and criminal attack. Because of this vulnerability, critical infrastructure protection (CIP) measures have been implemented, particularly in Australia to identify areas of potential harm and protect the infrastructure related to these areas (Abbas, 2006: 236). It is also important to recognize that vulnerabilities are not only related to deliberate sabotage by terrorists or criminals, but also to natural disasters, system complexities, equipment failure, and human error. Hence, protection of such infrastructure is multifocal.

In terms of protection against terrorism specifically, the CIP process has received particular attention from the government as well as funding and research entities, both in Australia and nationally. Indeed, it is regarded as one of the most important areas of priority in terms of mitigating terrorist threats in the country. Entities such as the Research Network for a Secure Australia for example regard CIP as one of the most important areas of funding and protection in the country. The author notes that this is the case for all countries, particularly since 2001, and other terrorist activities and threats throughout the last decade. This is perhaps also why some governments have lost sight of the importance of also protecting their citizens against undue state power, even while attempting to protect the infrastructure that ensures the continued peaceful…[continue]

Cite This Essay:

"Telecommunications - Jordan The Impact" (2010, July 19) Retrieved December 10, 2016, from http://www.paperdue.com/essay/telecommunications-jordan-the-impact-196670

"Telecommunications - Jordan The Impact" 19 July 2010. Web.10 December. 2016. <http://www.paperdue.com/essay/telecommunications-jordan-the-impact-196670>

"Telecommunications - Jordan The Impact", 19 July 2010, Accessed.10 December. 2016, http://www.paperdue.com/essay/telecommunications-jordan-the-impact-196670

Other Documents Pertaining To This Topic

  • Telecommunications Equipment

    Telecommunication equipment industry has undergone drastic developments and changes since the 1990s. The telecommunication equipment industry has become quite popular due to the tremendous increase in the use of communication services all over the world. This paper provides a deep insight into the major manufacturers involved in the telecommunication equipment industry. It also highlights the core policy transformations and privatization changes occurring in the global telecommunication industry which is affecting

  • Telecommunications and Networking in Business

    An example of this is how quickly Microsoft responded to their exclusion of the Internet as a viable strategy shift. Using a global telecommunications system and their global knowledge management network, they were able to quickly devise a product roadmap and recruit developments who knew the Web development platforms better than anyone did globally. This shift in strategy saved Microsoft from facing a daunting task of playing catch-up to

  • Telecommunications and Diplomacy Telecommunications Is

    Track II diplomacy takes over when Track I fails. A third great revolution has been described as enveloping the world in modern times (Wriston 1997) and the catalyst has been technological change. Technology, or telecommunications, has astoundingly affected the sovereignty of governments, the world economy, and military strategy. What took a century for the Industrial Revolution to do is nothing like what the combination of computers and telecommunications has been

  • Telecommunications Law the USA Patriot

    The law's intended purpose of preventing and detecting future attacks was the dominant concern of lawmakers. Yet, the hasty manner in which the law passed through Congressional lawmaking processes causes opponents to argue that lawmakers gave disproportionate consideration to the law enforcement and intelligence community's viewpoint in drafting the provisions. It is thought that in the future the law will face many challenges in the court system. Even though

  • Telecommunications Cultural Change and Telecommunications

    Cultural shifts and changes will always affect World-Wide communications because as culture changes so too does the manner in which people do business. World-Wide telecommunications are constantly adapting to meet the needs of modern man as man progresses into the next century. Cultural shifts and changes occur as a result in part of technological changes that allow men to communicate in more efficient and productive ways. As technology continues to

  • Telecommunications and Technology Analysis

    Safety Towards Telecommunications and Technology Analysis Safety Telecommunications and Technology Analysis Technology should not be under estimated in the ability to assist in transforming a business or an organization. Implementing new technology will change how a business is operating, and this will require excellent communication for positive change to take place. This is because people do not always embrace change remarkably well. Communications manager will implement these mechanisms through various methods like newsletters

  • Telecommunications & Networking Discuss the

    Many environmental activists have suggested that telecommunications technology is one of the keys to reducing the physical carbon footprint of modern enterprises. Faxes, video camcorders, and web conferencing technology make it easy for employees to obtain workplace documents and attend meetings. It is easy for employees to be present at the office, virtually, even when they are not physically present at their desks. Of course, there are some drawbacks. Telecommuting


Read Full Essay
Copyright 2016 . All Rights Reserved