2017 Surveillance Law Comparison Guide 2017

Total Page:16

File Type:pdf, Size:1020Kb

2017 Surveillance Law Comparison Guide 2017 2017 Surveillance Law Comparison Guide 2017 Baker McKenzie’s Global Surveillance Survey 2017 ©2017 Baker & McKenzie All rights reserved. This publication is copyrighted. Apart from any fair dealing for the purposes of private study or research permitted under applicable copyright legislation, no part may be reproduced or transmitted by any process or means without the prior permission of the editors. The material in this guide is of the nature of general comment only. It is not offered as legal advice on any specific issue or matter and should not be taken as such. Readers should refrain from acting on the basis of any discussion contained in this publication without obtaining specific legal advice on the particular facts and circumstances at issue. While the authors have made every effort to provide accurate and up to date information on laws and regulations, these matters are continuously subject to change. Furthermore, the application of these laws depends on the particular facts and circumstances of each situation, and therefore readers should consult their attorney before taking any action. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a “partner” means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an “office” means an office of any such law firm. This may qualify as “Attorney Advertising” requiring notice in some jurisdictions. Prior results do not guarantee a similar outcome. Baker McKenzie’s Global Surveillance Survey Baker McKenzie’s 2017 Global Surveillance Survey One year ago, in April 2016, Baker McKenzie published its first global surveillance survey - with overview heat maps and detailed questions and answers for 39 jurisdictions worldwide. A year later, the basic picture has not dramatically changed: Most countries are conducting surveillance and espionage to protect their national security - while at the same time opposing surveillance and espionage by other countries. But, some details have changed since details regarding the U.S. NSA program were leaked in 2013: Germany, Russia, the United Kingdom and a few other European jurisdictions have updated their surveillance, data residency and retention laws in the interest of increased national security - while the United States have enacted additional privacy protections and gradually scaled back their surveillance programs. Recall that in 2015, the Court of Justice of the European Union (CJEU) raised the question of whether the level of data protection in the US is adequate and equivalent to the European Economic Area (EEA). The CJEU did not answer this question in its judgment of 6 October 2015, but noted concerns regarding reports of indiscriminate mass surveillance by the National Security Agency (NSA) 1 and the Federal Bureau of Investigation (FBI) in the United States. Since then, the EU Commission and the U.S. Department of Commerce agreed on a new “EU-U.S. Privacy Shield Program,” which is accompanied by assurances by a number of U.S. government authorities regarding privacy protections relating to surveillance programs.2 At the same time, other institutions in the EU and scholars started to analyze the state of surveillance laws in individual jurisdictions within the EEA and elsewhere. They uniformly found comparisons difficult, as actual practices of intelligence authorities are cloaked in secrecy 1 CJEU C-362/14 Schrems v. Data Protection Commissioner), 6.10.2015, #31. 2 http://ec.europa.eu/justice/data-protection/files/privacy-shield-adequacy- decision_en.pdf Baker McKenzie | i and laws are complex and fragmented in this area. 3 Due to constitutional limitations on the EU’s jurisdiction to legislate matters of national security, the legal situation in the EEA member states is not very uniform. For example, in some EEA member states, senior police or military officers can issue search warrants.4 EU institutions have called for improvements in the U.S. as well as in the EEA. 5 Companies around the world are confronted with questions on how to comply with different jurisdictions’ laws and data access requests. Users and providers of cloud services, Software-as-a-Service and other services have to factor in government surveillance and data access practices of different countries into their business and location plans. With our surveillance law survey and heat map, we intend to contribute a global overview with broad jurisdictional scope to the discussion and corporate planning processes. See our heat maps here: 3 Cate/Dempsey/Rubinstein, Systematic government access to private-sector data, 2 International Data Privacy Law, 215 (2012); Schwartz, Systematic government access to private-sector data in Germany, 2 International Data Privacy Law, 289 (2012); Brown, Government access to private-sector data in the United Kingdom, 2 International Data Privacy Law, 230 (2012). Freiwald/ Métille, Reforming Surveillance Law: the Swiss Model, 28 Berkeley Tech. L. J., 1261 (2013). 4 See Study of the EU Agency for Fundamental Rights (FRA), Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU: Mapping Member States’ legal frameworks (2015), http://fra.europa.eu/en/publication/2015/surveillance-intelligence-services”: A comparison between US and EU data protection legislation for law enforcement purposes, www.europarl.europa.eu/RegData/etudes/STUD/2015/536459/IPOL_STU(2015)536459 _EN.pdf. 5 See studies cited in footnote 38 ii | Baker McKenzie Baker McKenzie’s Global Surveillance Survey Of course, the situation regarding individual data access requests and responses is more nuanced than a comparative overview survey can address. Therefore, companies cannot rely on our overview as legal advice regarding a particular situation and have to continue to assess their own individual situation based on the pertinent facts and circumstances. Please contact us with any questions or suggestions. Baker McKenzie | iii Baker McKenzie’s Global Data Security Leadership Team Brian Hengesbaugh (Chicago) +1 312 861 3077 [email protected] Lothar Determann (Palo Alto) +1 650 856 5533 [email protected] Patrick Fair (Sydney) +61 2 8922 5534 [email protected] Paul Forbes (Sydney) +61 2 8922 5346 [email protected] Francesca Gaudino (Milan) +39 02 76231 452 [email protected] Theo Ling (Toronto) +1 416 865 6954 [email protected] Carolina Pardo (Bogota) +571 634 1559 [email protected] Michael Stoker (Chicago) +1 312 861 2870 [email protected] iv | Baker McKenzie Baker McKenzie’s Global Surveillance Survey Contributing Lawyers Argentina Tel.: +43 1 2 42 50 278 marisa.schlacher Guillermo Cervio @bakermckenzie.com Buenos Aires Tel: +54 11 4310 2223 Brazil guillermo.cervio @bakermckenzie.com Flavia Rebello Sao Paulo Roberto Grané Tel: +55 11 3048 6851 Buenos Aires [email protected] Tel: +54 11 4310 2214 roberto.grane Gabriela Paiva-Morette @bakermckenzie.com Sao Paulo Tel: +55 11 3048 6785 Australia gabriela.paiva-morette @trenchrossi.com Patrick Fair Sydney Canada Tel: +61 2 8922 5534 [email protected] Theodore Ling Toronto Adrian Lawrence Tel: +416 865 6954 Sydney theodore.ling Tel: +61 2 8922 5204 @bakermckenzie.com adrian.lawrence @bakermckenzie.com Jonathan Tam Toronto Ju Young Lee Tel: +416 865 2324 Sydney jonathan.tam Tel: +61 2 8922 5260 @bakermckenzie.com [email protected] Chile Austria Diego Ferrada Lukas Feiler Santiago Vienna Tel: +56 22 367 7087 Tel: +43 1 24250 450 diego.ferrada [email protected] @bakermckenzie.com Marisa Schlacher Antonio Ortuzar, Jr. Vienna Santiago Baker McKenzie | v Tel: +56 22 367 7078 Milena Hoffmanova antonio.ortuzar.jr Prague @bakermckenzie.com Tel: +420 236 045 001 milena.hoffmanova China (PRC) @bakermckenzie.com Howard Wu Denmark Shanghai Tel: +86 21 6105 8538 Tina Brøgger Sørensen [email protected] Copenhagen Tel: +45 38 77 44 08 Chris Jiang [email protected] Shanghai Tel: +86 21 6105 5910 Daiga Grunte-Sonne [email protected] Copenhagen Tel: +45 38 77 41 18 Colombia [email protected] Carolina Pardo Finland Bogota Tel: +57 1 634 1559 Samuli Simojoki carolina.pardo Helsinki @bakermckenzie.com Tel: +358 20 713 3500 mobile +358 40 571 3303 Sandra Castillo [email protected] Bogota Tel: +57 1 634 1530 Susanna Niittymaa sandra.castillo Helsinki @bakermckenzie.com Tel: + 358 20 713 3298 [email protected] Daniela Cala Bogota France Tel: +57 1 634 1500 daniela.cala Denise Lebeau-Marianna @bakermckenzie.com Paris Tel: +33 1 44 17 53 33 Czech Republic denise.lebeau-marianna @bakermckenzie.com Jiri Cermak Prague Magalie Dansac Le Clerc Tel: +420 236 045 001 Paris [email protected] Tel: +33 1 44 17 59 82 magalie.dansacleclerc @bakermckenzie.com vi | Baker McKenzie Baker McKenzie’s Global Surveillance Survey Hugo Roy Hungary Paris Tel: +33144176560 Ines K. Radmilovic [email protected] Budapest Tel: +36 1 302 3330 Germany ines.radmilovic @bakermckenzie.com Joachim Scherer Frankfurt Adam Liber Tel: +49 69 2 99 08 189 Budapest joachim.scherer Tel: +36 1 302 3330 @bakermckenzie.com [email protected] Caroline Heinickel Janos Puskas Frankfurt Budapest Tel: +49 69 2 99 08 416 Tel: +36 1 302 3330 caroline.heinickel janos.puskas @bakermckenzie.com @bakermckenzie.com Andreas Neumann India Frankfurt Tel: +49 69
Recommended publications
  • Prevencia Trestnej Činnosti Páchanej Príslušníkmi Policajného Zboru.Pdf
    PREVENCIA TRESTNEJ ČINNOSTI PÁCHANEJ PRÍSLUŠNÍKMI POLICAJNÉHO ZBORU Vedecká monografia Bratislava 2018 Recenzenti: Dr. h. c. prof. JUDr. Jaroslav Ivor, DrSc. Dr. h. c. prof. JUDr. Lucia Kurilovská, PhD. prof. JUDr. Jozef Čentéš, PhD. Autor: plk. doc. Ing. Stanislav Šišulák, PhD. Akadémia Policajného zboru v Bratislave ISBN 978-80-8054-763-9 EAN 9788080547639 Obsah Zoznam ilustrácií ................................................................................................................. 5 Zoznam tabuliek .................................................................................................................. 6 Zoznam skratiek a značiek .................................................................................................. 7 Úvod ...................................................................................................................................... 8 1 Policajný zbor ............................................................................................................... 11 1.1 Základné pojmy ........................................................................................................ 12 1.2 Právne normy súvisiace s prevenciou ....................................................................... 22 1.3 Cieľ, objekt a predmet prevencie.............................................................................. 32 2 Metódy, formy a systém prevencie ............................................................................. 41 2.1 Sociálna prevencia ...................................................................................................
    [Show full text]
  • Head 122 — HONG KONG POLICE FORCE
    Head 122 — HONG KONG POLICE FORCE Controlling officer: the Commissioner of Police will account for expenditure under this Head. Estimate 2002–03................................................................................................................................... 12,445.8m Establishment ceiling 2002–03 (notional annual mid-point salary value) representing an estimated 34 597 non-directorate posts at 31 March 2002 reducing by 337 posts to 34 260 posts at 31 March 2003......................................................................................................................................... 9,473.1m In addition there will be 77 directorate posts at 31 March 2002 and at 31 March 2003. Capital Account commitment balance................................................................................................. 305.3m Controlling Officer’s Report Programmes Programme (1) Maintenance of Law and These programmes contribute to Policy Area 9: Internal Security Order in the Community (Secretary for Security). Programme (2) Prevention and Detection of Crime Programme (3) Reduction of Traffic Accidents Programme (4) Operations Detail Programme (1): Maintenance of Law and Order in the Community 2000–01 2001–02 2001–02 2002–03 (Actual) (Approved) (Revised) (Estimate) Financial provision ($m) 6,223.6 5,995.3 5,986.4 6,081.8 (–3.7%) (–0.1%) (+1.6%) Aim 2 The aim is to maintain law and order through the deployment of efficient and well-equipped uniformed police personnel throughout the land regions. Brief Description 3 Law
    [Show full text]
  • Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States
    Order Code RL33726 CRS Report for Congress Received through the CRS Web Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States September 7, 2006 Clare Feikert Foreign Law Specialist Law Library of Congress Charles Doyle Senior Specialist American Law Division Congressional Research Service ˜ The Library of Congress Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States Summary This is a comparison of the laws of the United Kingdom and of the United States that govern criminal and intelligence investigations of terrorist activities. Both systems rely upon a series of statutory authorizations: in the case of the United States primarily the Foreign Intelligence Surveillance Act and the Electronic Communications Privacy Act; in the case of the United Kingdom, the Regulation of Investigatory Powers Act, the Police Act, the Intelligence Services Act. Among other differences, the U.S. procedures rely more heavily upon judicial involvement and supervision, while those of the UK employ other safeguards. The UK procedures afford greater latitude to arrest, detain and supervise suspected terrorists than those available in the United States. Contents Introduction ......................................................1 Police Stop and Search Powers .......................................3 Police Arrest Powers ...............................................5 Detention of Suspected Terrorists.....................................5 Control Orders....................................................8
    [Show full text]
  • Lawful Interception of IP Traffic
    LawfulLawful InterceptionInterception ofof IPIP Traffic:Traffic: TheThe EuropeanEuropean ContextContext Jaya Baloo Draft 1 ContentsContents § Introduction to Lawful Interception § Interception of Internet services § Origins in The European Community § The European Interception Legislation in Brief § ETSI § The Dutch TIIT specifications § Interception Suppliers & Discussion of Techniques § Future Developments & Issues IntroductionIntroduction toto LawfulLawful InterceptionInterception § ETSI definition of (lawful) interception: § interception: action (based on the law), performed by an network operator/access provider/service provider (NWO/AP/SvP), of making available certain information and providing that information to a law enforcement monitoring facility. LI Law order Enforcement Network Operator, Agency (LEA) Access Provider or Service Provider Deliver requested Law Enforcement information Monitoring Facility LILIÕÕss RaisonRaison DDÕÕetreetre §§ WhyWhy intercept?intercept? § Terrorism § Pedophilia rings § Cyber stalking § Data theft ÐIndustrial espionage § Drug dealers on the internet §§ WhyWhy not?not? § Privacy § Security LegalLegal IssuesIssues inin LILI § Judge: "Am I not to hear the truth?" Objecting Counsel: "No, Your Lordship is to hear the evidence." § Some characteristics of evidence- relevance to LI § Admissible Ð can evidence be considered in courtÐ *differs per country § Authentic Ð explicitly link data to individuals § Accurate Ð reliability of surveillance process over content of intercept § Complete Ð tells a ÒcompleteÓ story of a particular circumstance § Convincing to juries Ð probative value, and subjective practical test of presentation AdmissibilityAdmissibility ofof SurveillanceSurveillance EvidenceEvidence § Virtual Locus Delecti § Hard to actually find criminals in delicto flagrante § How to handle expert evidence? Juries are not composed of network specialists. Legal not scientific decision making. § Case for treating Intercepted evidence as secondary and not primary evidence § Primary Ð is the best possible evidence Ð e.g.
    [Show full text]
  • Regulating Undercover Agents' Operations and Criminal
    This document is downloaded from CityU Institutional Repository, Run Run Shaw Library, City University of Hong Kong. Regulating undercover agents’ operations and criminal Title investigations in Hong Kong: What lessons can be learnt from the United Kingdom and South Australia Author(s) Chen, Yuen Tung Eutonia (陳宛彤) Chen, Y. T. E. (2012). Regulating undercover agents’ operations and criminal investigations in Hong Kong: What lessons can be learnt Citation from the United Kingdom and South Australia (Outstanding Academic Papers by Students (OAPS)). Retrieved from City University of Hong Kong, CityU Institutional Repository. Issue Date 2012 URL http://hdl.handle.net/2031/6855 This work is protected by copyright. Reproduction or distribution of Rights the work in any format is prohibited without written permission of the copyright owner. Access is unrestricted. Page | 1 LW 4635 INDEPENDENT RESEARCH Topic: Regulating Undercover Agents’ Operations and Criminal Investigations in Hong Kong: What Lessons can be learnt from the United Kingdom and South Australia? Student Name: CHEN Yuen Tung Eutonia1 Date: 13th April 2012 Word Count: 9570 (excluding cover page, footnote and bibliography) Number of Pages: 39 Abstract It is not a dispute that undercover police officers have a proper role to play in contemporary law enforcement. However, there is no clear legislation in Hong Kong on the issue of whether the undercover agent is, at law, an offender of crime(s). This paper would examine the limitations of the prevailing undercover policing laws in Hong Kong and suggest possible recommendations. In particular, a comparative study of the United Kingdom and South Australia would be made to investigate whether Hong Kong should enact a legislation regulating undercover operations and criminal investigations.
    [Show full text]
  • Action Plan Against Terrorism
    PREMIER MINISTRE ACTION PLAN AGAINST TERRORISM LutterEurope Menace Entraver Victimes Protéger Jihadisme Cribler r TechnologiesLutter ée Cr er Résilience Terroriste Menace Cribler tt tés aitre Réprimer Résilience Cibles nn Armes Co ili Lu r Comprendre Menace Identifier ée Europe Cibles ComprendreTechnologies aitre Armes nn Explosifs LutterCréer Cr Identifier Co Protéger Identifier Terroriste Entraver Cibles Victimes Coordonner Renforcer Europe Réprimer Réprimer Armes Vulnérab Protéger Contrôler Europe er Cibles r tt ée Créer Victimes Cibles Cr Résilience Réprimer Cibles Technologies ContrôlerLu ArmeCréer s Entraver Entraver er Victimes Victimes tés Cibles Protéger tt ili Europe Lu Menace Identifier Explosifs CriblerCoordonner Comprendre Europe Créer Cibles RadicalisationMenace erroristeenace Vulnérab TerroristeCibles Armes T M 13 July 2018 « Jihadism has not weakened over the last twenty or more years, it has simply moved to new places and taken on new forms. Responses to the threat it poses require mobilisation of all public policies: intelligence, security, justice and diplomacy. It is the State as a whole, and, in addition, all the national community’s living resources – its local authorities, political forces, enterprises and youth – which must mobilise around these challenges. » (Strategic Review of Defence and National Security. 2017). ACTION PLAN AGAINST TERRORISM Contents FRANCE’S SECURITY STRATEGY: TACKLING TERRORISM TOGETHER 5 1 Since 2016, France has continued to face up to a high terrorist threat 7 2 The action plan against
    [Show full text]
  • Wd 3 - 3000 - 016/17
    Wissenschaftliche Dienste Ausarbeitung Parlamentarische Kontrolle der Nachrichtendienste in ausgewählten Staaten Aktualisierung der Ausarbeitung WF III G - 12/06 vom 23. Januar 2006 © 2017 Deutscher Bundestag WD 3 - 3000 - 016/17 Wissenschaftliche Dienste Ausarbeitung Seite 2 WD 3 - 3000 - 016/17 Parlamentarische Kontrolle der Nachrichtendienste in ausgewählten Staaten Aktualisierung der Ausarbeitung WF III G - 12/06 vom 23. Januar 2006 Aktenzeichen: WD 3 - 3000 - 016/17 Abschluss der Arbeit: 12. Mai 2017 Fachbereich: WD 3: Verfassung und Verwaltung Die Wissenschaftlichen Dienste des Deutschen Bundestages unterstützen die Mitglieder des Deutschen Bundestages bei ihrer mandatsbezogenen Tätigkeit. Ihre Arbeiten geben nicht die Auffassung des Deutschen Bundestages, eines seiner Organe oder der Bundestagsverwaltung wieder. Vielmehr liegen sie in der fachlichen Verantwortung der Verfasserinnen und Verfasser sowie der Fachbereichsleitung. Arbeiten der Wissenschaftlichen Dienste geben nur den zum Zeitpunkt der Erstellung des Textes aktuellen Stand wieder und stellen eine individuelle Auftragsarbeit für einen Abgeordneten des Bundestages dar. Die Arbeiten können der Geheimschutzordnung des Bundestages unterliegende, geschützte oder andere nicht zur Veröffentlichung geeignete Informationen enthalten. Eine beabsichtigte Weitergabe oder Veröffentlichung ist vorab dem jeweiligen Fachbereich anzuzeigen und nur mit Angabe der Quelle zulässig. Der Fachbereich berät über die dabei zu berücksichtigenden Fragen. Wissenschaftliche Dienste Ausarbeitung Seite 3 WD 3 - 3000 - 016/17 Inhaltsverzeichnis 1. Einleitung 5 2. Dänemark 6 2.1. Überblick über die Nachrichtendienste 6 2.2. Kontrolle der Nachrichtendienste 6 2.2.1. Parlamentarische Kontrolle der Nachrichtendienste 6 2.2.2. Gremium für die Kontrolle der Nachrichtendienste 7 3. Frankreich 7 3.1. Überblick über die Nachrichtendienste 7 3.1.1. Dienst des Innenministeriums 8 3.1.2.
    [Show full text]
  • General Assembly Distr.: General 1 February 2021
    United Nations A/HRC/46/37/Add.2 General Assembly Distr.: General 1 February 2021 Original: English Human Rights Council Forty-sixth session 22 February–19 March 2021 Agenda item 3 Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development Visit to France Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci*, ** Summary The Special Rapporteur on the right to privacy, Joseph A. Cannataci, carried out an official visit to France from 13 to 17 November 2017. In the present report, he highlights concerns about the emergency laws and recommends that French law be reformed further to entrench the oversight powers of the National Commission for the Control of Intelligence Techniques and to bring the safeguards and remedies applicable to foreign intelligence in line with those required for domestic intelligence. * The summary of the report is being circulated in all official languages. The report itself, which is annexed to the summary, is being circulated in the language of submission and French only. ** The present report was submitted after the deadline in order to reflect the most recent information. GE.21-01269(E) A/HRC/46/37/Add.2 Annex Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, on his visit to France I. Introduction 1. The present report was finalized towards the end of 2020, after an evaluation of the preliminary results of the meetings held during the visit to France from 13 to 17 November 2017 and after having cross-checked those preliminary results against follow-up research and developments to date.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • The Establishment Responds Power, Politics, and Protest Since 1945
    PALGRAVE MACMILLAN TRANSNATIONAL HISTORY SERIES Akira Iriye (Harvard University) and Rana Mitter (University of Oxford) Series Editors This distinguished series seeks to: develop scholarship on the transnational connections of societies and peoples in the nineteenth and twentieth centuries; provide a forum in which work on transnational history from different periods, subjects, and regions of the world can be brought together in fruitful connection; and explore the theoretical and methodological links between transnational and other related approaches such as comparative history and world history. Editorial board: Thomas Bender University Professor of the Humanities, Professor of History, and Director of the International Center for Advanced Studies, New York University Jane Carruthers Professor of History, University of South Africa Mariano Plotkin Professor, Universidad Nacional de Tres de Febrero, Buenos Aires, and mem- ber of the National Council of Scientific and Technological Research, Argentina Pierre- Yves Saunier Researcher at the Centre National de la Recherche Scientifique, France Ian Tyrrell Professor of History, University of New South Wales. Published by Palgrave Macmillan: THE NATION, PSYCHOLOGY AND INTERNATIONAL POLITICS, 1870–1919 By Glenda Sluga COMPETING VISIONS OF WORLD ORDER: GLOBAL MOMENTS AND MOVEMENTS, 1880s–1930s Edited by Sebastian Conrad and Dominic Sachsenmaier PAN-ASIANISM AND JAPAN’S WAR, 1931–1945 By Eri Hotta THE CHINESE IN BRITAIN, 1800–PRESENT: ECONOMY, TRANSNATIONALISM, IDENTITY By Gregor Benton and Terence
    [Show full text]
  • Comparative Overview of Police Governance Arrangements
    Comparative overview of police governance arrangements Report for HM Chief Inspector of Constabulary in Scotland Dr Ali Malik April 2019 Aim The purpose of this report is to provide a comparative overview of police governance arrangements to inform HMICS’ ongoing thematic inspection of the Scottish Policy Authority (SPA). This report examines police governance arrangements in six international jurisdictions with an aim to identify best practice in line with the inspection terms of reference. Scope & Methodology The inspection aims to examine issues relating to the SPA’s role, responsibilities and relationships with key stakeholders. The inspection will also consider the independence of the SPA, the operational responsibility of the Chief Constable and how the SPA exerts effective governance in this context1. In order to provide examples of good practice along these key areas, a comparative overview of six international jurisdictions was undertaken to examine different models of police governance. In particular, the comparative work focused on how different models of police governance are implemented in practice, how powers of governance are shared between key stakeholders and how the delicate balance between operational independence of chief officers and legitimate democratic oversight is achieved. The three models identified for the comparison were: . A centralised model where the responsibility of police governance sits with the relevant Minister . A power-sharing model where the powers of police governance are shared between local and central government . A centralised model where the responsibility of police governance is delegated to an independent or arms-length policing Authority or a Joint Board The jurisdictions – New Zealand and Finland – both reflective of the first model, England and Wales and the Netherlands (to a lesser extent) – based upon the second model, and Northern Ireland and Republic of Ireland – both representative of the third model, were selected for this comparison.
    [Show full text]
  • International Narcotics Control Strategy Report
    United States Department of State Bureau for International Narcotics and Law Enforcement Affairs International Narcotics Control Strategy Report Volume II Money Laundering and Financial Crimes March 2014 INCSR 2014 Volume II Common Abbreviations Table of Contents Volume II Common Abbreviations .................................................................................................... iii Legislative Basis for the INCSR ................................................................................... 1 Introduction ..................................................................................................................... 3 Bilateral Activities ......................................................................................................... 4 Training and Technical Assistance ........................................................................................................... 4 Board of Governors of the Federal Reserve System ................................................. 5 Department of Homeland Security .............................................................................. 6 Customs and Border Protection ................................................................................................................ 6 Homeland Security Investigations ............................................................................................................ 6 Department of Justice .................................................................................................. 8 Drug Enforcement
    [Show full text]