Verified Document

Designing A New Regulatory Framework Multiple Chapters

Although, as is consistent with the British model of legal evolution that relies heavily on interpretation of judicial action and precedent rather than overt legislative action, there have been no new statues issued in the intervening decade. The only other guiding document for law enforcement and judicial authorities to rely on regarding interception activity is a Code of Practice that was issued by the Home Secretary in 2002 (Interception of Communications: Code of Practice, 2002). This document provides more detailed procedural guidance and to some extent interpretation of the RIPA. The table below summarizes the key milestones in the evolution of the United Kingdoms' regulatory regime:

Milestones in the Evolution of the United Kingdom Regulatory Regime

Year

Act / Event

1985

Interception of Communications Act 1985 ("IOCA")

1999

Interception of Communications in the United Kingdom, Consultation Paper

2000

Regulation of Investigatory Powers Act ("RIPA")

2002

Interception of Communications: Code of Practice, issued by the Home Secretary

4.2.2 EVOLUTION of REGULATION in the UNITED STATES

The earliest evolutionary stages of the U.S. interception system run tandem to the U.K. system, with the development of cooperative monitoring efforts during World War II and the Cold War period. The first significant telecommunications interception legislation in the U.S. was the 1934 Communications Act. The 1934 act "recodified earlier U.S. legislation from 1912 and 1927, providing that no person not authorized by the sender could intercept any communication and divulge the contents or existence of the message to any other person." (Yeates, 2001-2). Apparently, these statutes were not intended to prevent interception by law enforcement, although in fact, the U.S. Supreme Court ruled in 1928 that law enforcement agencies could intercept communications and use them as evidence in court trials. However, several years later, the Supreme Court issued decisions regarding provisions of the 1934 Communications Act that created inconsistencies. Nevertheless, these inconsistencies then persisted for many years, allowing law enforcement to intercept communications, but preventing the intercepted communications from being used as court evidence (Yeates, 2001-2).

In 1967, the U.S. Supreme Court issued two decisions: Berger v. New York and Katz v. United States, which clarified that the concept of the Fourth Amendment of the U.S. Constitution (the amendment that protects "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures," applied to conversations as well. Thus, citizens should be protected from "searches and seizures" of any conversations in which an individual had a "reasonable expectation" of "privacy." In response to these decisions, Congress passed the Omnibus Crime Control and Safe Streets Act of 1968, which included "Title III" known as the Wiretap Act. The Wiretap Act established a regime of warrants required for law enforcement interception of communications, just as the Fourth Amendment had led to a system of warrants for law enforcement to conduct physical searches of an individual's premises.

The Wiretap Act addressed the issue of domestic law enforcement activity, but there were still gray areas with regard to national security interception activity. However, "as a result of a Congressional investigation following the Watergate scandal of 1974, the [collaboration with the British Echelon] project was halted. Charges that citizens had been spied on led in the late 1970s to President Carter ordering the end of 'back door' intelligence on U.S. political figures through the swapping of intelligence data with the British." (Hills, 2006). From this point onward, the U.S. interception regulatory framework takes a distinct evolutionary pathway. Notably,

"the scandals of unauthorized surveillance on individuals resulted in the passage by Congress in 1978 of the Foreign Intelligence Surveillance Act (FISA). This Act codified the authority that the FBI required in order to undertake domestic electronic surveillance, and separated out intelligence and criminal investigations. It created the Foreign Intelligence Surveillance Court, a secret court to approve requests for domestic surveillance (expected to be of non-American citizens) and to act as a watchdog over the rights of citizens subject to surveillance." (Hills, 2006).

One of the finer points of the Wiretap Act is that it focused exclusively on the surveillance of content -- i.e., the words that are spoken or communicated via an electronic medium. However, there are other mediums of communication and law enforcement continued to make use of every tool available at its disposal. One of these tools used in the U.S. was something called a pen register, a "device that permits the recording of telephone numbers that one dials. A similar machine,...

The Pen Register Act passed by Congress in 1968 regulates use of pen registers and trap and trace devices. However, even though warrants are required for pen register and trap and trace interception, there is a lower standard of review required for these warrants than for wire taps. (Schwartz, 2008).
Another significant development in the U.S. regulatory framework occurred in 1986, as an attempt to keep up with new forms of communication such as cellular phones, computer transmissions, pagers, and other electronic devices. Recognizing the evolution of technology, Congress enacted the Electronic Communications Privacy Act of 1986 ("ECPA"), which included Title III, commonly referred to as the Stored Communications Act ("SCA"). While not a replacement for the Wiretap Act, EPCA extended the provisions of the Wiretap Act and the various protections and restrictions on telephone interception, clearly establishing that those protections and restrictions apply to the various new forms of electronic communication as well (Yeates, 2001-2).

However, as Yeates explains, the EPCA extended law enforcement officers' ability to get interception warrants for any form of communication that they now had the technological capability to access. But EPCA did not address the more subtle issue of obtaining warrants for types of electronic communications that law enforcement could not technically access. "This is where CALEA comes in." (Yeates, 2001-2).

Following the first bombing of the World Trade Center in 1983 (a truck bomb attack that caused damage and took some lives, but was far less catastrophic than the later 2001 attacks), the government began to look closely again at a previously rejected proposal from the FBI which proposed "that U.S. telephone companies design their systems to guarantee they could be tapped by law enforcement agencies." (Hills, 2006). Previously, civil rights groups had expressed concerns about extending this capability to law enforcement, however the bombing provided the momentum to expand interception capabilities under the Communications Assistance for Law Enforcement Act (CALEA). The intent of CALEA was "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes." (Communications Assistance for Law Enforcement Act).

Despite objections from telecommunications and internet carriers about the potential cost and burden of complying with expanded requirements, in 2004 the U.S. Federal Communications Commission expanded CALEA provisions to incorporate the technical ability to intercept and access internet communications, including broadband telephony services such as voice over IP (VoIP). (Hills, 2008).

An additional U.S. legal mechanism that is used to set up communications interception for national security purposes are National Security Letters (NSLs), which were first introduced in the 1970s. An NSL "is a written directive by the FBI in cases involving national security; it does not require judicial review." (Schwartz, 2008). An NSL allows the government to act without going through the normal warrant process. In addition to electronic communications themselves, NSLs can also be used to obtain financial records, certain "telecommunications attributes" such as "subscriber information and toll billing records information, or electronic communication transactional records." (Schwartz, 2008).

By the turn of the Millennium, the 1968 Wiretap Act allowed interception of the content of communications, the Pen Register Act/Trap and Trace provisions allowed the collection of and access to the data surrounding communications, the Stored Communications Act dealt with access to stored communications, and FISA governed surveillance activities conducted for national security purposes. The parameters of all these Acts were soon to be tested and stretched. One of the most significant events in modern U.S. history occurred on September 11, 2001, when four jet airplanes were hijacked by Al-Qaeda terrorists on the Eastern seaboard. Two of these planes flew into and destroyed the twin towers of the World Trade Center in New York City killing more than 3,000 civilians, police and fire fighters; one plane flew into the Pentagon (the seat of the U.S. Defense Department) causing significant damage and loss of life; and a fourth plane crashed in a field in Pennsylvania, believed to have been headed for a second target in Washington, D.C. At the time, and killing all aboard. The impact of these events in the U.S., both in terms of societal/cultural attitudes, and with respect to the governmental and military response to the events, cannot be overstated. As national security concerns and fears of terrorist activity with U.S. borders rose to a fever pitch, the U.S. Congress acted quickly by passing the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act,…

Sources used in this document:
References

Brownstone, R.A., & Voglei, C.A., (2006). U.S.A PATRIOT Act Impasse: E-mail Interception Rules Need Congressional Attention, Too. The Privacy and Data Protection Legal Review, 1(2).

Calleja, R. (2000). RIP ACT 2000 -- U.K.. Computer Law & Security Report, 16(6), pp. 400-401

Communications Assistance for Law Enforcement Act, (1994). Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 U.S.C 1001-1010

Foreign Intelligence Surveillance Act, 1978. Public Law 95-511. Library of Congress
Gellman, B. (2005). The FBI's Secret Scrutiny. The Washington Post, 6 November, 2006. Retrieved 9 May, 2010 from http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html
Risen, J. And Lichtblau, E. (2005). Bush Lets U.S. Spy on Callers Without Courts. New York Times, 5 December, 2005. Retrieved 10 May, 2010 from http://www.commondreams.org/headlines05/1216-01.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Designing a New Regulatory Framework for Telecommunications Interception...
Words: 5019 Length: 18 Document Type: Discussion Chapter

New Regulatory Framework for Telecommunications in Jordan Jordan Telecommunications QUANTITATIVE RESULTS AND ANALYSIS Chapter X presented the pre-test results of the pilot study that used qualitative data collected from the interviews with Jordanian dignitaries. This chapter presents the quantitative results from the survey administered to the larger representative sample of respondents from Jordanian businesses. The interviews conducted for the pilot study and a review of the literature supported the development of questions used in

Telecommunication Interception and Access in
Words: 661 Length: 2 Document Type: Conclusion

Conclusion: Chapter 2. Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations" , is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless. Parties involved in the interception process are sender of

International Regulation of Tourism in Antarctica
Words: 19613 Length: 75 Document Type: Term Paper

International Regulation of Tourism in Antarctica Since the mid-1980s, Antarctica has been an increasingly popular tourist destination, despite the relative danger of visiting the largest, least explored -- and arguably least understood -- continent on earth. Beginning with the 1959 treaty establishing Antarctica as an international zone free of claims of sovereignty by nation's that had been instrumental in establishing research stations there, there has been almost constant negotiation about how

Marketing Plan for Miller Inc.
Words: 6075 Length: 20 Document Type: Term Paper

As a result of huge growth, the company's management may lose focus of the scope of their business. Miller Inc. has a highly centralized hierarchy of management and lacks the managerial backup to promote creativity amons the employees. Single-sourcing which is the characteristic of Miller Inc. could be a recipe of disaster should the supplier fail. Contingency plans for supplies need to be considered. The constrant production nature of the product leads to

Credit Risk in Banking in Agreement With the Basel Accords
Words: 13816 Length: 50 Document Type: Thesis

Credit Risk Management Banks are an important part of the economy of any nation. Traditionally, the banks operate as financial intermediaries serving to satisfy the demand of people in need of various forms of financing. Through this, banks enable people to purchase home and businesses to expand. These financial institutions therefore facilitate investment and spending that are responsible for fueling the growth of the economy. In spite of their vital role

Improve Ethical Behavior of Those
Words: 3551 Length: 10 Document Type: Term Paper

From this broader perspective and in their planning and operations they have changed the term 'stockholder' to 'stakeholder' to cover employees, customers, suppliers and the community at large. With the growing complexity and dynamism brought about in business, organizations understood they required more guidance to guarantee that their dealings aligned with the overall good and did not pose any harm to others and with this was born business ethics.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now