Preview

Electronic Surveillance in a Digital Age

Powerful Essays
Open Document
Open Document
29769 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Surveillance in a Digital Age
Electronic Surveillance in a Digital Age July 1995
OTA-BP-ITC-149 GPO stock #052-003-01418-1

Recommended Citation: U.S. Congress, Office of Technology Assessment, Electronic Surveillance in a Digital Age, OTA-BP-ITC-149 (Washington, DC: U.S. Government Printing Office, July 1995).

ii

oreword awlessness and terrorism present new challenges to our society as the 21st Century approaches. Electronic surveillance is an invaluable tool in America’s arsenal to fight crime in this era of high-speed, global communications. Digital communications technology has recently outpaced the ability of the law enforcement agencies to implement court authorized wiretaps easily and effectively. To address this problem, the 103d Congress enacted the Communications Assistance for Law Enforcement Act (P.L. 103-414). This Act invokes the assistance of the telecommunications industry to provide technological solutions for accessing call information and call content for law enforcement agencies when legally authorized to do so. The law enforcement community and the telecommunications industry are currently working collaboratively on solutions to implement the requirement of the Act. On September 27, 1994, Congressman Michael G. Oxley, a member or OTA’s Technology Assessment Board, requested that OTA consider the technical aspects of implementing the law that will affect the ultimate cost to the government, the industry, and the rate payers. This background paper reviews the progress of the industry and the law enforcement agencies in implementing the Act since its approval in October 1994. OTA extends its thanks to the Alliance for Telecommunications Industry Solutions (ATIS) that sponsors the Electronic Communications Service Providers (ECSP) committee, which is the forum for the collaborative efforts of the industry and law enforcement in seeking solutions for complying with the requirements of the Act. Without the willful cooperation of the ECSP, OTA would likely not have

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Electronic Communications Privacy Act, an extension of the Federal Wiretap Statute, was endorsed in 1986 (Justice Information Sharing, 2010). This was a necessary implementation with how technology was diversifying ways to communicate and share information. In order to oversee and safeguard technological advancements such as email, cordless and cell phone communications, and electronically stored data the federal government had to amend and sometimes put into operation new policies. These policies, like the Electronic Communications Privacy Act, minimize many ethical issues that came along with the development of these advancements.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the excerpt, Surveillance is Necessary the author, Dan White is stating an argument that people who have a different ethnic background are more likely to be shoplifters. I disagree with this argument because anyone can be a shoplifter. It shouldn’t matter what race they are. People would agree with white's argument because in the article “ Racial Profiling- it works” by Anna Amberg, states “it's a rational judgment, based on facts, that helps us make sense of our would.” (Amberg Paragraph 3)…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are many different ways law enforcement agencies fight crime and solve them. The continuous usage of technology is one of those major ways. Law enforcement agencies uses different technologies that are needed depending on the situation and the outcome of it. Some examples of technology that police use Today are GPS systems(global…

    • 834 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Uncle Bob

    • 942 Words
    • 4 Pages

    Over the years there have been much technological advancement that help authorities be able to communicate with each other. During these times the technology officer’s use is electronic communication which was simple telegraph system. This system that they used was a one-way communication that was originate in the police headquarters where an officer moved a dial with about ten choices to let headquarters know what type assistance that officer needs. Then as times progressed the simple signal went towards the headquarters and told the police officer had arrived at the assigned beat. In the 1880 the law enforcement used telephone handset which they plugged into a box to communicate with the headquarters. “Early in the twentieth century in Washington, D.C., police officers began using a telephone handset, which plugged into the box for voice communication with headquarters, as seen here in about 1910 at the intersection of Pennsylvania and 7th Street, N.W”(Foster, 2005 pg.122). The handset begins to prove them very useful. They were more responsive and allowed for a broader range of communication. Then came the advancements of…

    • 942 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Take a second to think about that fleeting feeling of being watched. Every second of every minute of every day spent on technology is being recorded and scrutinized, so why is it that the feeling so fleeting? The National Security Agency, or NSA, had such a promising name, but they ultimately slandered and disgraced it with their horrendous violations of privacy. Action must be taken in an effort to abolish the unforgivable acts of domestic surveillance performed every single day by the NSA.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: USLegal.com (2010) Title II Enhanced Surveillance Procedures, Retrieved on February 9, 2012 from http://civilrights.uslegal.com/usa-patriot-act/provisions-of-the-patriot-act/title-ii-enhanced-surveillance-procedures/…

    • 2054 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The government is not spending enough time and resource in surveillance, which is resulting in the threats and decrease of national security. Surveillance is the act of observing, or monitoring a person. Monitoring a person can include the use of cameras, wiretaps, GPS tracking, and internet surveillance. Events such as the Oklahoma City bombing, and the attack on 9/11 lead to a law former President Bush passed. "On October 26th, 2001, Bush signed into law the USA Patriot Act." (Podesta) Government surveillance is an essential part of everyday life because not only does it keep the country under control, but ensures safety for Americans.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Domestic Surveillance is a withering matter which not many people care about because they think that it does not affect them. However, it is common in the daily lives of American citizens. But the question remains, how much does the U.S. government know about your personal privacy? Face it, it is a fact the United States peers on our personal life more than what you may think, and it does, in fact, appertain every single citizen of our nation. It is hidden, bathed in laws but linked to another.…

    • 1333 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Computer and telecommunications technologies in criminal justice system have developed at an extraordinary rate. Increased computing power, advances in data transmission and attractive and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Many people around the world use social media sites. However, many do not realize that governments are able to use surveillance programs to spy on them. According to Merriam-Webster dictionary, surveillance is the close observation, especially of a suspected spy or criminal and it can be defined as processes of information collection and processing. Surveillance on social media has its positives and negatives and people should know how to use it responsibly, critically and effectively. Surveillance programs endanger the privacy of each Internet user. The reason that surveillance is accepted is because it can help governments find terrorists and can help solve crimes. However, it is a concern for multiple people that there is no law or regulation on how governments are able to use the programs. Moreover, the surveillance programs are sold off the shelf to governments so…

    • 1321 Words
    • 6 Pages
    Good Essays
  • Better Essays

    References: Bloss, W. P. (2009). Transforming US police surveillance in a new privacy paradigm. Police Practice & Research, 10(3), 225-238. doi:10.1080/15614260802381083…

    • 1282 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The internet is being regulated more and more by governments, but is it a good thing?…

    • 1073 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Domestic Surveillance

    • 1760 Words
    • 7 Pages

    Have you ever wondered if you ever being watched? Almost like every time you go…

    • 1760 Words
    • 7 Pages
    Better Essays
  • Better Essays

    U.S. Department of Justice. (2005). The Federal Bureau of Investigation’s Management of the Trilogy Information Technology Modernization Project. Office of the Inspector General Audit Division.…

    • 1765 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Regulating Technology

    • 840 Words
    • 4 Pages

    Since the 1970’s, information technology has completely changed the world. Technology is an ever evolving machine whose possibilities are endless. This generation has seen more technological advances than any other generation in history. By having the ability to access and relay information so quickly, computers and other technological devices have proven to be both a blessing and a curse. Users have the ability to compile, analyze, store, retrieve and utilize information to make business processes more efficient; however, if compromised by unauthorized individuals for malevolent purposes, there can be a multitude of negative consequences. The Computer Fraud and Abuse Act, 1986 (CFAA) was designed to prevent such instances by deeming it a Federal offense to knowingly access a protected computer without authorization or exceeding one’s authorized access and as a result, causes damage. The Telephone consumer Protection Ac, 1991 (TCPA) is another Federal legislative action that governs the practices of telemarketer. The act was created to ensure a balance between protection of consumer rights and permitting companies to effectively utilize telemarketing. As a result of a myriad of technological tools, ranging from cell phones and laptops to government protected software, the U.S. Government recognized the need to create legislation that would facilitate the use of such technology to enhance our society by maintaining a secure structure for all parties.…

    • 840 Words
    • 4 Pages
    Good Essays