Telecommunication Interception and Access in Jordan Certain laws have been drafted, in developed countries, so as to enable lawful telephone interception and access for reasons of monitoring crime activity and security surveillance. Jordan, being a developing country, is still relatively new to Internet usage and, therefore, telecommunication surveillance and...
Telecommunication Interception and Access in Jordan Certain laws have been drafted, in developed countries, so as to enable lawful telephone interception and access for reasons of monitoring crime activity and security surveillance. Jordan, being a developing country, is still relatively new to Internet usage and, therefore, telecommunication surveillance and government involvement in Internet usage and other telecommunication operations for national security is inadequate. Internal security issues necessitate introduction of new technological systems that allow control of telecommunication technology.
Whilst the Jordanian Constitution Act Article 18 stipulates "all postal, telegraphic and telephonic communications shall be treated as secret..." security officers do intercept private communications of individuals who may be a threat to their country. Delineating conditions and statues of telecommunications interception and access are, however, lacking. Using Australia as comparison, the following research study intends to investigate the results of designing a new regulatory framework for telecommunications interception and access in Jordan as well as the expected contributions of such a development.
Primary hypotheses include the propositions that a telecommunication interception and access telecommunications law will be popularly received in Jordan, and that although obstacles stand in the way, such a telecommunication interception and access will assist the country in numerous ways that include enhancement of national security; international and national terrorism reduction; and greater economic growth.
A triangulated approach will be employed where the qualitative aspect will consist of a pilot study and interviews with dignitaries designed to investigate the benefits and barriers relevant to the implementation by government officials of telecommunications interception and access law. The quantitative aspect will consist of a survey that will (amongst other matters) assess the attitude of government officials to the implementation of the intended laws and investigate and test the perceived human rights and privacy issues faced by citizens in Jordan for implementing telecommunications interception and access law.
A t-test will be used followed by a SEM Structural Equation Model. It is hypothesized that contributions of this study will result in higher levels of Jordanian national security as well as in filling a vacuum in the current Jordanian legal system. Conclusion: Chapter 2.
Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations" , is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless.
Parties involved in the interception process are sender of the telecommunication; particular Law Enforcement Agencies, and the receiver and lawful enforcements include 'phone tapping' and 'wiretapping' Pertinent Australian policies, such as the Patriot Act, enable the government to strike equilibrium between privacy and necessary government surveillance. Since cost is often a factor that intimidates developing countries from designing and implementing such laws, the development and implementation of interception capability expenses, in Australia, are the responsibility.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.