Advertisement

Regulation of State Surveillance of the Internet

  • Murdoch Watney

Abstract

The purpose of this paper is to investigate the legal justifiability of measures contained in state surveillance laws pertaining to the Internet.

The commercialisation of the Internet brought about many advantages but at the same time unlocked several challenges unknown to the physical world. Internet-connected countries battle to maintain control over information flowing across borders for the purposes of national security and law enforcement. State surveillance of the Internet may be utilised in addressing the abuse of the Internet, such as organised crime and terrorism.

The 9/11 terrorist attacks coupled with the effect of globalisation reinforced and accelerated the use of technology-based surveillance and that includes state surveillance of electronic communications in the USA. Many countries have since followed suit and introduced legislation providing for state surveillance of the Internet.

Keywords

European Union Terrorist Attack Traffic Data Data Retention European Union Member State 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BowrO5]
    Bowrey, Kathy: Law and Internet Cultures. Cambridge University Press, 2005, p.196.Google Scholar
  2. [BuysO6]
    Buys, Reinhardt: Newsletter, 2006. http://www.reinhardt@buys.co.za.
  3. [Carr03]
    Carr, Indira: Anonimity, the Internet and Criminal Law Issues. In: Nicoll, C; Prins, J E J and Van Dellen, M J M: Digital Anonymity and the Law: Tensions and Dimensions. TMC Asser Press, The Hague, 2003, p.199.Google Scholar
  4. [CassO3]
    Cassel, D: International Human Rights and the United States Response to 11 September. In: Nicoll, C; Prins, J E J and Van Dellen, M J M: Digital Anonymity and the Law: Tensions and Dimensions. TMC Asser Press, The Hague, 2003, p.293–295.Google Scholar
  5. [EdHoO3]
    Edwards, Lilian and Howells, Geriant: Anonymity, consumers and the Internet: where everyone knows you’re a dog. In: Nicoll, C; Prins, J E J and Van Dellen, M J M: Digital Anonymity and the Law: Tensions and Dimensions. TMC Asser Press, The Hague, 2003, p.237.Google Scholar
  6. [FiWnO4]
    Fijnaut, Cyrille; Wouters, Jan and Naert, Frederik: Legal Instruments in the Fight against International Terrorism: a Transatlantic Dialogue. Martinus Nijhoff Publishers, Leiden, 2004, p. 199.Google Scholar
  7. [GoDuO3]
    Goemans, Caroline and Dumortier, Jos: Enforcement Issues-mandatory retention of traffic data in the EU: possible impact on privacy and on-line anonymity. In: Nicoll, C; Prins, J E J and Van Dellen, M J M: Digital Anonymity and the Law: Tensions and Dimensions. TMC Asser Press, The Hague, 2003, p.169–172.Google Scholar
  8. [Gros]
    Grossman, Wendy: Will logging your email combat terrorism in Europe? http://technology.guardian.co.uk/weekly/story/O, 16376, 1683944,00.html.
  9. [KerrO3]
    Kerr, Orin: Internet Surveillance law after the USA Patriot Act: the big brother that isn’t. Northwestern University Law Review, 2003. p. 627–630.Google Scholar
  10. [Lyon94]
    Lyon, David: The Electronic Eye: The Rise of Surveillance Society. Polity Press, Cambridge, 1994, p.162–163.Google Scholar
  11. [LyonO3]
    Lyon, David: Surveillance after September 11. Polity Press, Cambridge, 1994, p. 5–57.Google Scholar
  12. [RaTy]
    Raul, Charles and Tyler, Amanda: The USA Patriot Act of 2001: Electronic Surveillance and Privacy. http://www.sidley.com/cyberlaw/features/patrot.asp ?print=yes.
  13. [Tayl87]
    Taylor, LB: Electronic Surveillance, Franklin Watts, New York, 1987, p.86.Google Scholar
  14. [WaldO3]
    Walden, Ian: Anonymising personal data under European law. In: Nicoll, C; Prins, J E J and Van Dellen, M J M: Digital Anonymity and the Law: Tensions and Dimensions. TMC Asser Press, The Hague, 2003, p.152.Google Scholar
  15. [WatnO3]
    Watney, Murdoch: Criminal and procedural measures regarding the prevention of cyber crime (part 1) Journal of South African Law, JUTA, South Africa, 2003, p.58.Google Scholar
  16. [WatnO6]
    Watney, Murdoch: Regulation of Internet pornography in South Africa (part 1). Tydskrif vir Hedendaagse Romeins-Hollandse Reg, Butterworths, South Africa, 2006, p.227.Google Scholar
  17. [ZagaO4]
    Zagaris, B: International Judicial Co-operation and Counterterrorism. In: Fijnaut, C; Wouters, J and Naert, F: Legal Instruments in the Fight against International Terrorism: a Transatlantic Dialogue, Martinus Nijhoff Publishers, Leiden, 2004, p.96.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Murdoch Watney
    • 1
  1. 1.University of JohannesburgJohannesburgSouth Africa

Personalised recommendations