Policy Laundering and International Co-operation as a Good Thing tm.

Slides:



Advertisements
Similar presentations
Department of Foreign Affairs Office of United Nations and Other International Organizations Republic of the Philippines Briefing on Philippine Export.
Advertisements

UN Comprehensive Study on Cybercrime
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
State of play and activities in 2014 March 2014
MEDIA LAW Copenhagen University Session 9 Dirk VOORHOOF Ghent University (->contact)
What about a future European Safety Act ? June 8, 2012 Noëlle Lenoir.
Regional conference on the 1980 Hague Convention on the Civil Aspects of International Child Abduction, February, Belgrad,Serbia Albania’s Challenges.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Legal Context Saskia Mermans  Ispa and the legislation  Legal Framework for the Internet: general observation  Highlights of the legislation.
Mandatory Retention of Traffic Data: What is next? Prof. Dr. Henrik W.K.Kaspersen Computer/Law Institute Vrije Universiteit Amsterdam- The Netherlands.
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
THE CFATF MUTUAL EVALUATION PROCESS (IN A (SMALL) NUTSHELL) Robin Sykes Financial Investigations Division.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Using the UN Convention against Corruption as a Basis for Good Governance.
Child Protection Policies Training Prepared by: SUNY Office of General Counsel SUNY Compliance Office 2015.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Federal Bureau of Investigation
Human Rights: Civil Rights & Liberties Meryl Mohan Monica Thomas Sherine Rahimi Meryl Mohan Monica Thomas Sherine Rahimi.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
1 Security-related internal market measures on explosives FEEM AGM, Brussels, 5 June 2013 Julian Foley Desk Officer – Civil explosives and pyrotechnic.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Personal data protection in criminal procedure International collaboration and principle of proportionality LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007.
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
PRESENTATION TO SELECT COMMITTEE FOR SECURITY AND CONSTITUTIONAL AFFAIRS RATIFICATION OF THE INTERNATIONAL CONVENTION ON THE SUPPRESSION OF.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
EU responses to international terrorism. Definition of terrorism Schmit & Jongman: ‘an anxiety-inspiring method of repeated violent action, employed by.
Institute for Security Studies Institute for Security Studies Submission on the Anti-Terrorism Bill Some Comments and Suggested Approaches.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
European Commission TAIEX Technical Assistance and Information Exchange Instrument TAIEX Technical Assistance and Information Exchange Instrument Ivana.
June 1, st Asia Pacific Privacy Authorities (APPA) Forum – PHAEDRA Workshop Nr. 3: The EU Data Protection Regulation and regional perspectives.
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
Ratification of the Second Revision of the EU-ACP Cotonou Partnership Agreement (CPA) Presentation to the Portfolio Committee on International Relations.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 19.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Principle of availability: investigation of crime vs. data protection Julio Pérez Gil University of Burgos. Spain.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
WHOIS Public safety and data protection requirements.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
Department of Health The Australian Charter of Healthcare Rights in Victoria Your role in realising the Australian Charter of Healthcare Rights in Victoria.
Issues for Computer Users, Electronic Devices, Computer and Safety.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
Key Requirements Hywel Thomas, Ministry of Justice Adult Human Trafficking Victim Care Coordination and Delivery.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Privacy in the Digital Age: the UN General Assembly Resolution
Surveillance around the world
Johannesburg, South Africa
Data Protection: EU & International
MUTUAL ASSISTANCE Brussels, June 2013 M O N T E N E G R O
Protection of Personal Information Bill: An International Perspective
Forth International Forum
The Modernisation of Convention108
Cybercrime legislation and policies in Africa: Issues for discussion
Deborah Housen-Couriel, ADV.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Policy Laundering and International Co-operation as a Good Thing tm

Attorney General of Australia stated in June 2001, trying to pass the Cybercrime Bill: “A magistrate would be able to order a person with knowledge of a computer system to provide such information or assistance as is necessary and reasonable to enable the officer to access, copy or print data. Such a power is contained in the draft Council of Europe Convention on Cybercrime and will assist officers in gaining access to encrypted information.”

New Zealand Herald, Justice Minister Phil Goff stated in April 2003 that the new Counter-Terrorism Bill “was the final step in adopting the last of 12 United Nations conventions aimed at fighting terrorism.” “It will give police and customs officers more powers to fight terrorism, including enabling police to use tracking devices, and will allow evidence found in the investigation of one crime to be used in the prosecution of another.”

Circumventing Deliberation Using the language of ‘international obligations’ ‘harmonisation’ ‘multilateralism’ ‘support to allies in war on terror’

PL1: Forum-Shifting and Laundering Data Retention

1995: FBI Director calls for ISPs to keep data stores. 2000: United Kingdom proposes retention for 7 years : G8 and CoE were thinking about it.

LAUGHTER

“[To further international cooperation, please c]onsider data protection issues in the context of law enforcement and counterterrorism imperatives,” and “[r]evise draft privacy directives that call for mandatory destruction to permit the retention of critical data for a reasonable period.” Letter from GWB to RP-EC, October “Any data protection regime should strike an appropriate balance between the protection of personal privacy, the legitimate needs of service providers to secure their networks and prevent fraud, and the promotion of public safety.” U.S. statement at November 2001 Cybercrime meeting.

March of Retention UK Anti-Terror Law. French Cyber-law. Spanish Crime Law. EU Electronic Privacy Directive. South Africa, Argentina, … Post-Madrid Bombings calls for harmonization at the EU.

PL2: Modeling in Anti-Terror

Canada’s Bill C-36 “causes serious interference with or serious disruption of an essential service, facility or system, whether public or private: Provided that nothing in this paragraph refers to any lawful advocacy, protest, dissent or stoppage of work, which does not involve an activity that is intended to result in the conduct or harm referred to in paragraph (a), (b) or (c).”

After deliberations, deleted ‘lawful’ “This would ensure that protest activity, whether lawful or unlawful, would not be considered a terrorist activity…”

Canada’s Law “causes serious interference with or serious disruption of an essential service, facility or system, whether public or private: Provided that nothing in this paragraph refers to any lawful advocacy, protest, dissent or stoppage of work, which does not involve an activity that is intended to result in the conduct or harm referred to in paragraph (a), (b) or (c).”

Jamaica’s Draft Bill “causes serious interference with or serious disruption of an essential service, facility or system, whether public or private: Provided that nothing in this paragraph refers to any lawful advocacy, protest, dissent or stoppage of work, which does not involve an activity that is intended to result in the conduct or harm referred to in paragraph (a), (b) or (c).”

South Africa’s Draft Bill “causes serious interference with or serious disruption of an essential service, facility or system, whether public or private: Provided that nothing in this paragraph refers to any lawful advocacy, protest, dissent or stoppage of work, which does not involve an activity that is intended to result in the conduct or harm referred to in paragraph (a), (b) or (c).”

Rhetorical Questions Where are decisions made? What happens to deliberative processes? Who participates at international level? Who adapts and how do they interpret?

We don’t want to give good people bad ideas. Nor do we want to give bad people good intentions.

…and this is why the U.S. must not ratify the CoE Convention. is.lse.ac.uk/staff/hosein