Telecommunication Interception and Access in Conclusion

Total Length: 661 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2



Conclusion: Chapter 2.

Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations"

, is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless. Parties involved in the interception process are sender of the telecommunication; particular Law Enforcement Agencies, and the receiver and lawful enforcements include 'phone tapping' and 'wiretapping'

Pertinent Australian policies, such as the Patriot Act, enable the government to strike equilibrium between privacy and necessary government surveillance.

Since cost is often a factor that intimidates developing countries from designing and implementing such laws, the development and implementation of interception capability expenses, in Australia, are the responsibility of carriers who are accorded funding towards the cost as well as a waiver from the condition for several years.

Stuck Writing Your "Telecommunication Interception and Access In" Conclusion?



Legal interception requires various technicalities, foremost of which is a distinct separation between the Public Telecom Network (PTN) and the network used for distribution and processing of lawful interception information.

Finally, different models are used as regards lawful Internet interception, the most common approach being the European Telecommunication Standards Institute (ETSI) model.

ADDIN EN.CITE Thorogood2007<

ecNum>5<

ecord><

ec-number>55<

ef-type name="Web Page">12Thorogood, Rupert Brookson, Charles < itles>< itle>Lawful Interception 2008<

umber>10 Augest2007Telektronikk<

elated-urls> http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf ?Rupert Thorogood and Charles Brookson, Lawful Interception (2007) Telektronikk < http://www.telenor.com/telektronikk/volumes/pdf/2.2007/Page_033-036.pdf > at 10 Augest 2008?.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Telecommunication Interception And Access In" (2011, March 13) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/telecommunication-interception-access-3767

Latest MLA Format (8th edition)

Copy Reference
"Telecommunication Interception And Access In" 13 March 2011. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/telecommunication-interception-access-3767>

Latest Chicago Format (16th edition)

Copy Reference
"Telecommunication Interception And Access In", 13 March 2011, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/telecommunication-interception-access-3767