Telecommunications - Jordan The Impact Multiple Chapters

Length: 34 pages Sources: 40 Subject: Government Type: Multiple Chapters Paper: #30392712 Related Topics: Telecommunications, Workplace Privacy, Hostage Negotiations, Concealed Carry
Excerpt from Multiple Chapters :

According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights.

The fact that the electronic flow of information occurs on an increasingly global platform has complicated the issue, as divergent national norms and statutes confront each other with increasing frequency where privacy protection is concerned. The various national responses to the terrorism issue is a further complicating factor. The international policy confrontations regarding privacy protection for citizens ultimately resulted in prolonged international negotiation, and finally in a compromise known as the "Safe Harbor" agreement (Long and Quek 2002: 326). In this compromise, the somewhat stringent privacy requirements to protect EU citizens were relaxed to match the more lenient requirements by the United States. The purpose of the agreement was to facilitated electronic commerce between EU countries and the United States.

Where the EU then operates from a basis of privacy rights for citizens, other countries, like the United States, tend to again focus upon a more government-centered view, where national security and other political issues dictate privacy laws. This has been a particular issue in the years after 9/11, while still remaining controversial in the political and e-commerce arenas. Horn, writing in 2002, addresses some of the issues that created controversy in terms of the conflict between privacy rights and security after the 2001 attacks.

Horn (2002: 2234) addresses the specific concern of privacy advocates regarding electronic surveillance paradigms in the United States. Indeed, both privacy advocates and citizens in general have displayed an increasing distrust of electronic devices used by law enforcement agencies for electronic surveillance of suspects. The author notes that such distrust may not be displaced. The Carnivore system created by the FBI for example is the focus of such distrust. The system was created to intercept and collect electronic communications where criminal activity was suspected. As justification, the reason for the new system was that criminals are increasingly sophisticated in their use of the Internet for illegal activities. To counter this, Carnivore is installed on a computer network -- generally those of Internet Service Providers (ISPs) to capture and store information running through these networks.

Significantly, the system has been in existence since 1997, but only became known to the public in 2000 (Horn 2002: 2235). This resulted in significant controversy regarding the control the government and law enforcement have over citizens and their use of private information. While some have acknowledged the importance of electronic surveillance to ensure the safety of citizens, others believed that Carnivore and other electronic surveillance systems are simply too invasive, particularly in cases where no criminal activity has been proven.

This is also the case with the "War on Terrorism." Citizens and privacy advocates alike have increasingly voiced their concern over the increasing power of the government and law enforcement agencies to engage in surveillance of private citizens without their knowledge (Soma et al., 288). In addition to privacy rights, these activities have also resulted in controversies regarding the Constitution. Indeed, especially during the early part of the decade, there were numerous reports of profiling and general government harassment that targeted certain nationalities under the umbrella of "suspected terrorism." It therefore appears that privacy rights in the European Union have enjoyed greater constitutionality than those in the United States. It is however also important to make a specific comparative study of these issues in various major countries to obtain a more global view of how privacy and its variety of related concepts manifests itself across the world. Furthermore, the issue of terrorism and other types of crime also manifests itself in a variety of differential ways across national borders. All these issues have significant effects upon privacy rights and issues.


Impact of Telecommunications Interception and Access Law on Privacy

As seen above, the impact of telecommunications interception on privacy was varied since the time of its inception. With the development of technology today, this is becoming an increasingly important as well as controversial issue. Indeed, a variety of laws and policies have been implemented in order to mitigate the human rights; the free flow of information could for example make countries vulnerable to infrastructure attack. Much legislation is focused upon mitigating this. The question remains however to what extent such legislation should be allowed to restrict constitutionally guaranteed human rights. One such important legislative issue is for example the extent to which police should be able to track wireless calls (Lee, 2003).

Privacy Protection and Lawful Access

Ayoade and Kosuge (2002: 274), privacy is not only a matter of government interference, but also of personal protection from access by outside parties. The authors mention encryption technology in this regard. The authors note that the increasing concern with privacy protection within the electronic environment has necessitated the relaxation of laws regarding the individual use of encryption technology. Concomitantly, however, this places tools in the hands of criminals and terrorists to prevent lawful access by government agencies in certain circumstances. This is why only a few countries allow the use of such technology by individuals. The conflict between the drive to protect individual privacy online and the ability of the government to access private information has created a significant controversy that has not yet been completely or indeed adequately addressed. The issue concerns not only individuals, but also the larger framework of society, such as critical infrastructure. The danger of disallowing cryptography could lead to an increasing ability by terrorists and criminals to access vital electronic frameworks to create damage that would take years to repair.

Protection of Critical Social Freedoms Amid Electronic Freedom

Abbas (2006) suggests that freely available information carries considerable risk, not only in terms of terrorism, but also in terms of the general bases upon which society functions, such as critical infrastructure. Critical infrastructure protection (CIP), in other words, is significantly impacted by technology that has developed and is developing so rapidly that no time has yet been taken to implement adequate security and protection measures. This is the reverse side of privacy protection of citizens. Businesses, entities, and infrastructure are all at risk of hacking or other types of terrorism because of the free flow of electronic information.

Critical infrastructure is then particularly important in terms of adequate protection, as this refers to essential services and structures upon which the stability and security of a country is built (Abbas 2006: 234). Such structures ensure the delivery of goods and services such as utilities, banking, finance, transport, health and food. Currently, critical infrastructure tends to be based upon electronic information systems and databases. It is therefore critical that the information in these databases be protected, particularly against terrorism and other malicious attacks. The success of such attacks in disabling such systems would also significantly impact upon the infrastructure elements that they control, and hence upon the economic and social well-being of citizens (Abbas, 2006: 235).

Important in this regard is the fact that physical and cyber infrastructures interconnect -- disabling one means disabling everything within the infrastructure system that depends upon it. Once again, the free availability of information within electronic systems means that all infrastructures are vulnerable to malicious terrorist and criminal attack. Because of this vulnerability, critical infrastructure protection (CIP) measures have been implemented, particularly in Australia to identify areas of potential harm and protect the infrastructure related to these areas (Abbas, 2006: 236). It is also important to recognize that vulnerabilities are not only related to deliberate sabotage by terrorists or criminals, but also to natural disasters, system complexities, equipment failure, and human error. Hence, protection of such infrastructure is multifocal.

In terms of protection against terrorism specifically, the CIP process has received particular attention from the government as well as funding and research entities, both in Australia and nationally. Indeed, it is regarded as one of the most important areas of priority in terms of mitigating terrorist threats in the country. Entities such as the Research Network for a Secure Australia for example regard CIP as one of the most important areas of funding and protection in the country. The author notes that this is the case for all countries, particularly since 2001, and other terrorist activities and threats throughout the last decade. This is perhaps also why some governments have lost sight of the importance of also protecting their citizens against undue state power, even while attempting to protect the infrastructure that ensures the continued peaceful…

Sources Used in Documents:


Abbas, Roba. 2006. The risk of public data availability on critical infrastructure protection. The First Workshop on the Social Implications of National Security, edited by Katina Michael and M.G. Michael. Australia: University of Wollongong.

Ayoade, John Olurotimi and Kosuge, Toshio. 2002. Breakthrough in privacy concerns and lawful access conflicts. Telematics and Informatics, No. 19, p. 273-389.

Bhatt, Hiral. 2010. RIPA 2006: A human rights examination. The International Journal of Human Rights, Vol. 10, No. 3, p. 285-314.

Blunn, Anthony S. 2005. Report of the Review of the Regulation of Access to Communications. Commonwealth of Australia.
Campbell, Duncan. 2000. Inside Echelon. Telepolis. Retrieved from
Center for Criminology and Public Policy Research. 2010. Effectiveness of Electronic Monitoring. Retrieved from
and to Establish Meaningful Privacy Protections.
Clarke, Roger. 2008. Privacy Impact Assessment in Australian Contexts. Murdoch eLaw Journal Vol. 15, No. 1 (June).
Elliot, Chris. 1999. Development of Surveillance Technology and Risk of Abuse of Economic Information. Directorate General of Research, April. Retrieved from
Posner, Richard a. 2008. Privacy, Surveillance, and Law. HeinOnline,

Cite this Document:

"Telecommunications - Jordan The Impact" (2010, July 19) Retrieved August 8, 2022, from

"Telecommunications - Jordan The Impact" 19 July 2010. Web.8 August. 2022. <>

"Telecommunications - Jordan The Impact", 19 July 2010, Accessed.8 August. 2022,

Related Documents
Telecommunications Equipment
Words: 3286 Length: 10 Pages Topic: Education - Computers Paper #: 98834553

Telecommunication equipment industry has undergone drastic developments and changes since the 1990s. The telecommunication equipment industry has become quite popular due to the tremendous increase in the use of communication services all over the world. This paper provides a deep insight into the major manufacturers involved in the telecommunication equipment industry. It also highlights the core policy transformations and privatization changes occurring in the global telecommunication industry which is affecting

Telecommunications and Networking in Business
Words: 1244 Length: 4 Pages Topic: Business Paper #: 14945743

An example of this is how quickly Microsoft responded to their exclusion of the Internet as a viable strategy shift. Using a global telecommunications system and their global knowledge management network, they were able to quickly devise a product roadmap and recruit developments who knew the Web development platforms better than anyone did globally. This shift in strategy saved Microsoft from facing a daunting task of playing catch-up to

Telecommunications and Diplomacy Telecommunications Is
Words: 2980 Length: 10 Pages Topic: Physics Paper #: 89095956

Track II diplomacy takes over when Track I fails. A third great revolution has been described as enveloping the world in modern times (Wriston 1997) and the catalyst has been technological change. Technology, or telecommunications, has astoundingly affected the sovereignty of governments, the world economy, and military strategy. What took a century for the Industrial Revolution to do is nothing like what the combination of computers and telecommunications has been

Telecommunications Law the USA Patriot
Words: 7930 Length: 25 Pages Topic: Criminal Justice Paper #: 39332451

The law's intended purpose of preventing and detecting future attacks was the dominant concern of lawmakers. Yet, the hasty manner in which the law passed through Congressional lawmaking processes causes opponents to argue that lawmakers gave disproportionate consideration to the law enforcement and intelligence community's viewpoint in drafting the provisions. It is thought that in the future the law will face many challenges in the court system. Even though

Telecommunications Cultural Change and Telecommunications:
Words: 591 Length: 2 Pages Topic: Education - Computers Paper #: 76410886

Cultural shifts and changes will always affect World-Wide communications because as culture changes so too does the manner in which people do business. World-Wide telecommunications are constantly adapting to meet the needs of modern man as man progresses into the next century. Cultural shifts and changes occur as a result in part of technological changes that allow men to communicate in more efficient and productive ways. As technology continues to

Telecommunications and Technology Analysis
Words: 1000 Length: 3 Pages Topic: Business - Management Paper #: 4426296

Technology There are elements that drive successful technology and telecommunications integration and planning for an organization. Management needs to prioritize and evaluate technology used by the organization in day-to-day operations to identify which processes are critical to the organization's ability to conduct operations and which processes can be put on hold during an emergency. Scrambling to deal with technology issues once a disaster has hit is guaranteed to cost an organization. According