Skip to main content
  • 179 Accesses

Abstract

Laws and policies are usually regarded as national affairs, for consideration in national policy discourses. This chapter argues, however, that we need to study the dynamics of modern policy development with an eye to international activities. I contend that this may involve focusing on three separate aspects of the policy process: policy laundering, modelling, and forum shifting. Policy laundering is a practice where policy makers make use of other jurisdictions to further their goals, and in so doing circumvent national deliberative processes. Modelling occurs when governments, overtly through calls of harmonization or subtly through quiet influence and translating of concepts, shape their laws based on laws developed in other jurisdictions. Forum shifting occurs when actors pursue rules in inter-governmental organizations (IGOs) that suit their purposes and interests, and when opposition and challenges arise, shift to other IGOs or agreement-structures. This chapter will review these dynamics and provide an example of their instantiation, being the initiatives on cyber crime emerging from the Group of Eight industrialized countries (G8) and the Council of Europe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Attorney General Cybercrime Bill 2001 Second Reading Speech by the Attorney General, The Parliament of the Commonwealth of Australia, 2001.

    Google Scholar 

  • Bush, G.W. ‘Letter from President George W. Bush to Mr Romano Prodi, President, Commission of the European Communities. Brussels’, forwarded by the Deputy Chief of Mission to the European Union, 16 October 2001.

    Google Scholar 

  • Canadian Delegation Discussion Paper for Workshop 1: Potential Consequences for Data Retention of Various Business Models Characterizing Internet Service Providers, Tokyo, G8 Government-Industry Workshop on Safety and Security In Cyberspace, 2001.

    Google Scholar 

  • Department of Justice, Industry Canada, et al. Lawful Access — Consultation Document. Ottawa, Government of Canada, 2002, p. 21.

    Google Scholar 

  • Escudero-Pascual, A. and I. Hosein The Hazards of Technology-Neutral Policy: Questioning Lawful Access to Traffic Data. Communications of the ACM, 2003. Accepted for publication 24 October 2002.

    Google Scholar 

  • European Union Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data: 0031–0050 (1995).

    Google Scholar 

  • G8 Justice and Interior Ministers Data Preservation Checklists. Mont-Tremblant, G8 Summit, 2002a.

    Google Scholar 

  • G8 Justice and Interior Ministers G8 Statement on Data Protection Regimes. Mont-Tremblant, G8 Summit, 2002b.

    Google Scholar 

  • G8 Justice and Interior Ministers Principles on the Availability of Data Essential to Protecting Public Safety. Mont-Tremblant, G8 Summit, 2002c.

    Google Scholar 

  • G8 Justice and Interior Ministers Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations. Mont-Tremblant, Quebec, Group of 8, 2002d.

    Google Scholar 

  • G8 Lyon Group ‘Un dialogue entre les pouvoirs publics et le secteur privé sur la sécurité et la confiance dans le cyberespace’. Communiqué du G8 (Groupe de Lyon) (Paris: G8, 2000).

    Google Scholar 

  • G8 Lyon Group Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations (Draft), G8, 2001.

    Google Scholar 

  • Gaspar, R. Looking to the Future: Clarity on Communications Data Retention Law. A submission to the Home Office for Legislation on Data Retention, On behalf of ACPO and ACPO(S); HM Customs & Excise; Security Service; Secret Intelligence Service; and GCHQ, 2000.

    Google Scholar 

  • Goldsmith, J.L. ‘Against Cyberanarchy’, University of Chicago Law Review, 65 (1998), 1199–1250.

    Article  Google Scholar 

  • Goldsmith, J.L. ‘Symposium on the Internet and Legal Theory: Regulation of the Internet: Three Persistent Fallacies’, Chicago-Kent Law Review, 73 (1998) 1119–1131.

    Google Scholar 

  • Johnson, D.R. and D.G. Post ‘Law And Borders — The Rise of Law in Cyberspace’, Stanford Law Review, 48 (1996) 1369.

    Google Scholar 

  • Lugar, Serator R.G., Chairman. Opening Statement for Hearing on Law Enforcement Treaties, 17 June 2004. Available at http://foreign.serate.gov/testimony/2004/LugarStatement040617.pdf.

    Google Scholar 

  • Purdy, D. Report of the G8 Government/Private Sector High Level Meeting on High-tech Crime (Tokyo, Japan: Department of Foreign Affairs and International Trade, 2001).

    Google Scholar 

  • Sun, J.-M. and J. Pelkmans ‘Regulatory Competition in the Single Market’, in C. Hood (ed.), A Reader on Regulation (Oxford: Oxford University Press, 1998), pp. 443–67.

    Chapter  Google Scholar 

  • United States and Japan (2003) United States-Japan Joint Statement on Promoting Global Cyber Security.

    Google Scholar 

  • United States Government Comments of the United States Government on the European Commission Communication on Combating Computer Crime (Brussels, 2001).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2006 Dr Gus Hosein

About this chapter

Cite this chapter

Hosein, G. (2006). Policy Laundering, and Other Policy Dynamics. In: Halpin, E., Trevorrow, P., Webb, D., Wright, S. (eds) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave Macmillan, London. https://doi.org/10.1057/9780230625839_14

Download citation

Publish with us

Policies and ethics