Abstract
Laws and policies are usually regarded as national affairs, for consideration in national policy discourses. This chapter argues, however, that we need to study the dynamics of modern policy development with an eye to international activities. I contend that this may involve focusing on three separate aspects of the policy process: policy laundering, modelling, and forum shifting. Policy laundering is a practice where policy makers make use of other jurisdictions to further their goals, and in so doing circumvent national deliberative processes. Modelling occurs when governments, overtly through calls of harmonization or subtly through quiet influence and translating of concepts, shape their laws based on laws developed in other jurisdictions. Forum shifting occurs when actors pursue rules in inter-governmental organizations (IGOs) that suit their purposes and interests, and when opposition and challenges arise, shift to other IGOs or agreement-structures. This chapter will review these dynamics and provide an example of their instantiation, being the initiatives on cyber crime emerging from the Group of Eight industrialized countries (G8) and the Council of Europe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Attorney General Cybercrime Bill 2001 Second Reading Speech by the Attorney General, The Parliament of the Commonwealth of Australia, 2001.
Bush, G.W. ‘Letter from President George W. Bush to Mr Romano Prodi, President, Commission of the European Communities. Brussels’, forwarded by the Deputy Chief of Mission to the European Union, 16 October 2001.
Canadian Delegation Discussion Paper for Workshop 1: Potential Consequences for Data Retention of Various Business Models Characterizing Internet Service Providers, Tokyo, G8 Government-Industry Workshop on Safety and Security In Cyberspace, 2001.
Department of Justice, Industry Canada, et al. Lawful Access — Consultation Document. Ottawa, Government of Canada, 2002, p. 21.
Escudero-Pascual, A. and I. Hosein The Hazards of Technology-Neutral Policy: Questioning Lawful Access to Traffic Data. Communications of the ACM, 2003. Accepted for publication 24 October 2002.
European Union Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data: 0031–0050 (1995).
G8 Justice and Interior Ministers Data Preservation Checklists. Mont-Tremblant, G8 Summit, 2002a.
G8 Justice and Interior Ministers G8 Statement on Data Protection Regimes. Mont-Tremblant, G8 Summit, 2002b.
G8 Justice and Interior Ministers Principles on the Availability of Data Essential to Protecting Public Safety. Mont-Tremblant, G8 Summit, 2002c.
G8 Justice and Interior Ministers Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations. Mont-Tremblant, Quebec, Group of 8, 2002d.
G8 Lyon Group ‘Un dialogue entre les pouvoirs publics et le secteur privé sur la sécurité et la confiance dans le cyberespace’. Communiqué du G8 (Groupe de Lyon) (Paris: G8, 2000).
G8 Lyon Group Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations (Draft), G8, 2001.
Gaspar, R. Looking to the Future: Clarity on Communications Data Retention Law. A submission to the Home Office for Legislation on Data Retention, On behalf of ACPO and ACPO(S); HM Customs & Excise; Security Service; Secret Intelligence Service; and GCHQ, 2000.
Goldsmith, J.L. ‘Against Cyberanarchy’, University of Chicago Law Review, 65 (1998), 1199–1250.
Goldsmith, J.L. ‘Symposium on the Internet and Legal Theory: Regulation of the Internet: Three Persistent Fallacies’, Chicago-Kent Law Review, 73 (1998) 1119–1131.
Johnson, D.R. and D.G. Post ‘Law And Borders — The Rise of Law in Cyberspace’, Stanford Law Review, 48 (1996) 1369.
Lugar, Serator R.G., Chairman. Opening Statement for Hearing on Law Enforcement Treaties, 17 June 2004. Available at http://foreign.serate.gov/testimony/2004/LugarStatement040617.pdf.
Purdy, D. Report of the G8 Government/Private Sector High Level Meeting on High-tech Crime (Tokyo, Japan: Department of Foreign Affairs and International Trade, 2001).
Sun, J.-M. and J. Pelkmans ‘Regulatory Competition in the Single Market’, in C. Hood (ed.), A Reader on Regulation (Oxford: Oxford University Press, 1998), pp. 443–67.
United States and Japan (2003) United States-Japan Joint Statement on Promoting Global Cyber Security.
United States Government Comments of the United States Government on the European Commission Communication on Combating Computer Crime (Brussels, 2001).
Editor information
Editors and Affiliations
Copyright information
© 2006 Dr Gus Hosein
About this chapter
Cite this chapter
Hosein, G. (2006). Policy Laundering, and Other Policy Dynamics. In: Halpin, E., Trevorrow, P., Webb, D., Wright, S. (eds) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave Macmillan, London. https://doi.org/10.1057/9780230625839_14
Download citation
DOI: https://doi.org/10.1057/9780230625839_14
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-54123-2
Online ISBN: 978-0-230-62583-9
eBook Packages: Palgrave Political & Intern. Studies CollectionPolitical Science and International Studies (R0)