MUST WE TRADE RIGHTS FOR SECURITY? THE CHOICE BETWEEN SMART, HARSH, OR PROPORTIONATE SECURITY STRATEGIES IN CANADA AND BRITAIN

Size: px
Start display at page:

Download "MUST WE TRADE RIGHTS FOR SECURITY? THE CHOICE BETWEEN SMART, HARSH, OR PROPORTIONATE SECURITY STRATEGIES IN CANADA AND BRITAIN"

Transcription

1 MUST WE TRADE RIGHTS FOR SECURITY? THE CHOICE BETWEEN SMART, HARSH, OR PROPORTIONATE SECURITY STRATEGIES IN CANADA AND BRITAIN Kent Roach * INTRODUCTION Most debates about terrorism proceed on the assumption that there is a trade-off between security and rights. The question is often defined in terms of the proper balance between these two important values. Some tilt the balance toward security and raise dire warnings that the Constitution is not a suicide pact. Others tilt the balance toward rights and raise equally dire warnings that excessive counterterrorism efforts will undermine the high ground that democracies occupy in their battle with terrorists. Recently, however, the idea of inevitable trade-off or balance between rights and security is being questioned. After having downplayed the relevance of human rights in combating terrorism immediately after 9/11, the United Nations has begun to place greater emphasis on the positive relationship between human rights and security. United Nations Secretary General Kofi Annan argued in a recent report that [i]t would be a mistake to treat human rights as though there were a trade-off to be made between human rights and goals such a security and development.... [S]trategies based on the protection of human rights are vital both for our moral standing and the practical effectiveness of our actions. 1 * Professor of Law, University of Toronto. This article is a revised version of the twentyseventh Viscount Bennett lecture given at the University of New Brunswick Faculty of Law on October 27, I thank the Faculty for inviting me to give this lecture and Sharryn Aiken, Michael Code, David Dyzenhaus, Audrey Macklin, Rayner Thwaites, and Reg Whitaker for helpful comments on an earlier draft. I also thank Michel Rosenfeld and the group that gathered at the Rockefeller Centre in Bellagio in July 2005 for helpful and challenging discussions that helped inform this article. The financial assistance of Canada s Social Sciences and Humanities Research Council is gratefully acknowledged. 1 The Secretary-General, Report of the Secretary-General: In Larger Freedom: Towards Development, Security and Human Rights for All, 140, delivered to the General Assembly, U.N. Doc. A/59/2005 (Mar. 21, 2005). 2151

2 2152 CARDOZO LAW REVIEW [Vol. 27:5 This argument suggests that human rights can be reconciled with security and that some abuses of human rights may be counterproductive in preventing terrorism. Much of the Bush administration s war on terrorism suggests that harsh anti-terrorism strategies may be ineffective. The attempt to detain people in a law-free zone at Guantanamo Bay, Cuba was ultimately unsuccessful. 2 The lack of full adversarial legal procedures for determining the status of Guantanamo detainees has produced both false negatives and false positives: namely, the release of people who have reportedly returned to hostilities and the detention of those who present no threat to the United States. 3 The bipartisan 9/11 Commission has called for the United States to adhere to the rule of law, including the Geneva Conventions, in large part because of the pressing need to respond to negative views of the United States and to help minimize the next generation of terrorists. 4 The use of extreme interrogation techniques has at times produced inaccurate intelligence and tainted the use of statements in criminal prosecutions. Nevertheless, coercive and humiliating interrogations at Abu Ghraib and elsewhere, as well as the invasion of Iraq, seem to have provoked and inspired more, not less, terrorism. The wholesale use of immigration detention in the immediate aftermath of 9/11 failed to result in any terrorism charges related to 9/11. 5 The inability of American governments effectively to mitigate the devastation caused by Hurricane Katrina has also raised concerns about the smartness of homeland security policies that focus on terrorism. Effective emergency preparedness can limit the harms and speed recovery not only from catastrophic terrorism but also from a variety of natural and man-made disasters. The question of whether it is truly necessary to sacrifice rights for security lies at the heart of the determination of whether a particular anti-terrorism measure is a proportionate response to the threat. Principles of proportionality found in many constitutions, including in the limitation and derogation sections of the European Convention for the Protection of Human Rights and Fundamental 2 Rasul v. Bush, 524 U.S. 466 (2004). But see Detainee Treatment Act of 2005, Title XIV of the National Defence Authorization Act for Fiscal Year 2006, H.R. 1815, S. 1405(e), 109th Cong. (amending 28 U.S.C and removing the right of Guantanamo Bay detainees to apply for habeas corpus and regulating appeals from combatant status review tribunals). 3 Kent Roach & Gary Trotter, Miscarriages of Justice in the War Against Terror, 109 PENN. ST. L. REV. 967, 1012 (2005). 4 THE NAT L COMM N ON TERRORIST ATTACKS UPON THE U.S., THE 9/11 REPORT 12.3 (2004) [hereinafter THE 9/11 REPORT]. 5 DAVID COLE, ENEMY ALIENS: DOUBLE STANDARDS AND CONSTITUTIONAL FREEDOMS IN THE WAR ON TERRORISM (2003).

3 2006] TRADING RIGHTS FOR SECURITY? 2153 Freedoms 6 and in Section 1 of the Canadian Charter of Rights and Freedoms, 7 require assessment of the effectiveness of any security measure that may violate rights. Proportionality analysis requires that limits on rights must be clearly prescribed by law so as to facilitate both political and judicial review. It asks whether a rational connection exists between the proposed measure and the goal of stopping terrorism, whether less drastic and rights-invasive means exist to stop terrorism, and finally how the measure s effectiveness in preventing terrorism compares to its burden on rights and affected individuals. Proportionality analysis is a more disciplined and demanding process than open-ended balancing of rights and security because it addresses whether rights violations will actually increase security and whether less drastic measures can be used to prevent terrorism. 8 In addition, proportionality analysis can consider the distributional consequences of violating the rights of minorities in an attempt to increase security. 9 We should never lose sight of the normative value of rights in proportionality analysis, and some antiterrorism strategies such as torture and racial and religious profiling would remain legally and morally wrong even if they were, at times, effective. However, proportionality analysis requires both judges and governments to consider the effectiveness of rights-invasive policies in preventing terrorism. In this Article, I argue that the relationship between rights and security is more complex than is suggested by those who argue that there is an inevitable trade-off between rights and security, or by those who argue that rights and security can be easily reconciled in every case. My argument proceeds in three parts. The first is that in many cases, the smartest and most effective security strategies may not violate rights in any serious manner. Such smart counter-terrorism strategies involve not the dramatic introduction of tough new laws criminalizing terrorism or speech related to terrorism, but rather more 6 See, for example, Article 10(2) of the European Convention for the Protection of Human Rights and Fundamental Freedoms, which allows necessary limits on freedom of expression, and Article 15, which allows derogating measures to the extent strictly required by the exigencies of the situation. Nov. 4, 1950, 213 U.N.T.S Constitution Act, 1982, Pt. I, Canada Act 1982, Sched. B, ch. 11 (U.K.). Section 1 provides: The Canadian Charter of Rights and Freedoms guarantees the rights and freedoms set out in it subject only to such reasonable limits prescribed by law as can be demonstrably justified in a free and democratic society. On the importance of proportionality in other systems, see Aharon Barak, A Judge on Judging: The Role of a Supreme Court in a Democracy, 116 HARV. L. REV. 16 (2002). 8 Jeremy Waldron, Security and Liberty: The Image of Balance, 11 J. POL. PHIL. 191 (2003); Lucia Zedner, Securing Liberty in the Face of Terror: Reflections from Criminal Justice, 32 J.L. & SOC Y 507 (2005). 9 Ronald Dworkin, The Threat to Patriotism, 49 N.Y. REV. BOOKS 3 (2002).

4 2154 CARDOZO LAW REVIEW [Vol. 27:5 mundane administrative regulation to help prevent terrorists from gaining access to substances and sites that can be used for terrorism. A smart security policy would also recognize the reality that it is impossible to prevent all acts of terrorism or other man-made or natural disasters and that considerable efforts and resources should be devoted to emergency preparedness and harm reduction measures. Although such strategies tend to be neglected as defeatist damage mitigation strategies, the events surrounding Hurricane Katrina demonstrate that evacuation and recovery strategies should be key components of national security strategies. 10 In a world of limited resources, increased emphasis should be placed on double-duty strategies that can respond to both terrorism and other threats to human security. 11 I also suggest that increased independent review of national security activities is a smart strategy that may make those activities more effective while at the same time helping to prevent or redress rights violations. The second part of my argument is that some harsh anti-terrorism policies may not only violate rights, but also prove ineffective in producing security. One such policy involves the use of overbroad definitions of terrorism that target conduct that is not directly related to the commission of violence against civilians. Police and security agencies should focus their efforts on terrorists who plan and prepare to commit serious acts of violence and not on others who may engage in illegal but non-violent dissent. Another harsh anti-terrorism strategy that violates rights and may be of limited effectiveness in preventing terrorism is the targeting of speech as a form of terrorism. I will also suggest that security strategies that target people on the basis of religion, race, or lack of citizenship may not only discriminate, but also may be of limited effectiveness because of their radical over- and under-inclusiveness in targeting terrorists. Although many smart security strategies do not violate rights and many harsh security strategies will not prevent terrorism, it would be wrong to suggest that there is never any tension between rights and security. The third part of this Article will explore three hard cases that implicate both rights and security. The hard cases are: the treatment of information that cannot be disclosed to the affected person or the public because of concerns about national security 10 SELECT BIPARTISAN COMM. TO INVESTIGATE THE PREPARATION FOR AND RESPONSE TO HURRICANE KATRINA, A FAILURE OF INITIATIVE: THE FINAL REPORT OF THE SELECT BIPARTISAN COMMITTEE TO INVESTIGATE THE PREPARATION FOR AND RESPONSE TO HURRICANE KATRINA (2006), available at 11 NAT L RESEARCH COUNCIL, MAKING THE NATION SAFER: THE ROLE OF SCIENCE AND TECHNOLOGY IN COUNTERING TERRORISM (2002); KENT ROACH, SEPTEMBER 11: CONSEQUENCES FOR CANADA ch. 7 (2003).

5 2006] TRADING RIGHTS FOR SECURITY? 2155 confidentiality, the treatment of non-citizen terrorist suspects who cannot be deported because of concerns that they will be killed or tortured upon their return, and preventive detention of suspected terrorists. In these difficult cases, I suggest that conflicts between rights and security should be resolved by the rigorous, rational, and logical application of proportionality principles. Such principles accept that the need to prevent terrorism is an important objective and that the importance of the objective may increase with the frequency and lethality of terrorist attacks. At the same time, however, proportionality analysis insists that counter-terrorism strategies must be legally authorized and subject to judicial application of principles of rationality, least drastic or restrictive means, and overall balance between effectiveness in preventing terrorism and infringement on rights and freedoms. In the last part of this article, I use a case study to test my thesis that some of the smartest and most effective anti-terrorism strategies do not violate rights while some of the harshest strategies may not be effective. I consider available information about whether the 1985 terrorist bombing of Air India Flight 182, which killed 329 people in what was before 9/11 the most deadly act of aviation terrorism in world history, could have been prevented either with smart security strategies such as better aviation security or through a variety of harsh or proportionate security strategies such as broad terrorism offenses, law against terrorist speech, the use of immigration law as antiterrorism law, or preventive arrests. Most of the examples I discuss in this Article come from Canadian and British anti-terrorism law and policy. Both British and Canadian approaches provide interesting contrasts and parallels with American anti-terrorism law and policy. 12 The United Kingdom has had much experience with terrorism and is an influential innovator with respect to anti-terrorism laws. 13 The United Kingdom has recently initiated various proposals with respect to preventive restraints on liberty of suspected terrorists and the punishment of terrorist speech that depart from traditional American policies that 12 Kim Lane Scheppele, Other People s PATRIOT Acts: Europe s Response to September 11, 50 LOY. L. REV. 89 (2004); Stephen J. Schulhofer, Checks and Balances in Wartime: American, British and Israeli Experiences, 102 MICH. L. REV (2004); Michael P. O Connor & Celia M. Rumann, Into the Fire: How to Avoid Getting Burned by the Same Mistakes Made Fighting Terrorism in Northern Ireland, 24 CARDOZO L. REV (2003). 13 On the influence of the Terrorism Act, 2000 on other post-9/11 anti-terrorism law, see Kent Roach, The World Wide Expansion of Anti-Terrorism Laws After 11 September 2001, 3 STUDI SENESI 487 (2004) [hereinafter Roach, The World Wide Expansion] and Kent Roach, The Post-9/11 Migration of Britain s Terrorism Act, 2000, in THE MIGRATION OF CONSTITUTIONAL IDEAS (Sujit Choudhry ed., forthcoming) [hereinafter Roach, The Post-9/11 Migration].

6 2156 CARDOZO LAW REVIEW [Vol. 27:5 favor liberty. Some of these British policies would remain problematic in the United States, but they may be influential in other countries. 14 Although Canada does not have the same experience with terrorism as the United Kingdom, or the same influence with respect to its anti-terrorism laws and policies, it was the launching ground for the Air India bombing. Pointing both to the Air India bombing and other events such as the border arrest of Ahmed Ressam, an illegal immigrant to Canada who had plans to bomb the Los Angeles Airport at the Millennium, 15 concerns have been expressed in some quarters that Canada may be a weak link in American anti-terrorism policies. 16 Canada also is significant because its post-9/11 security policy has taken a different path from that of the United States. 17 Canada has an official national security policy that defines terrorism as only one of many risks to human security. This policy places special emphasis on emergency preparedness 18 and includes effective review of security policies. Canada presently is holding an unprecedented public inquiry into the actions of Canadian officials in relation to Maher Arar. Arar, a Canadian citizen born in Syria, was detained in the United States when he was returning to Canada from Tunsia. He was ordered to be removed from the United States as a threat to national security and was sent to Syria. An independent fact finder appointed by the Canadian inquiry has found that Arar was tortured in Syria. He was released from Syria after almost a year s detention and has now returned to Canada. 19 Canada s public inquiry into Arar s treatment 14 For example, recent Australian legislation has borrowed from and adapted British innovations with respect to restricting the liberty of suspected terrorists through control orders and punishing advocacy of terrorism and other speech that may be associated with terrorism. Anti-Terrorism Act (No. 2), 2005, scheds. 1, 4, 7 (Austl.). 15 THE 9/11 REPORT, supra note 4, at For a survey and endorsement of various criticisms of Canadian anti-terrorism policy made by Americans, as well as criticisms of Canada s immigration policies on the basis of concerns about security, see MARTIN COLLACOTT, CANADA S INADEQUATE RESPONSE TO TERRORISM: THE NEED FOR POLICY REFORM (2006). For an alternative and, in my view, more compelling account about how Canada has altered its refugee policy because of security concerns, see François Crépeau & Delphine Nakache, Controlling Irregular Migration in Canada: Reconciling Security Concerns with Human Rights Protection, IRPP CHOICES, Feb. 2006, at 14-18, 21-25, available at The changes included decreased appeals to court, decreased legal aid, increased detention, the signing of a safe third country agreement with the United States, and serious contemplation of allowing non-citizens held to be security threats to be deported even where they will face torture. 17 See generally ROACH, supra note 11; Reg Whitaker, Made in Canada? The New Public Safety Paradigm, in HOW OTTAWA SPENDS : MANAGING THE MINORITY (G. Bruce Doern ed., 2005). 18 CANADA PRIVY COUNCIL OFFICE, SECURING AN OPEN SOCIETY: CANADA S NATIONAL SECURITY POLICY (2004). 19 Both American and Syrian officials have declined requests to participate in the inquiry.

7 2006] TRADING RIGHTS FOR SECURITY? 2157 stands in contrast to American concerns about secrecy and executive prerogatives in this matter. 20 For better or worse, Americans have an interest in understanding Canada s evolving anti-terrorism and national security policies. I. SMART SECURITY STRATEGIES THAT DO NOT INFRINGE RIGHTS Much of the post-9/11 response to terrorism has focused on new laws criminalizing a range of activities in preparation for acts of terrorism. UN Security Council Resolution 1373 supported this approach, calling on states to criminalize acts of terrorism including the financing of terrorism. The focus has been on directing criminal sanctions at terrorists and their supporters and depriving them of funds. 21 Much of the promise of this strategy has dissipated as subsequent investigations have revealed that terrorists have mounted deadly acts of terrorism with modest funds. The 9/11 Commission in particular was pessimistic about anti-financing strategies, commenting that trying to starve the terrorists of money is like trying to catch one fish by draining the ocean. 22 It expressed doubts that financing laws can be a primary weapon against decentralized terrorist groups. 23 A public report of the inquiry is expected to be released in 2006 regarding both the actions of Canadian officials in relation to Mr. Arar and an independent review mechanism for the national security activities of the Royal Canadian Mounted Police. Arar has not testified at the inquiry, but an independent fact-finder has concluded that he was tortured in Syria. COMM N OF INQUIRY INTO THE ACTIONS OF CANADIAN OFFICIALS IN RELATION TO MAHER ARAR, REPORT OF PROFESSOR STEPHEN J. TOOPE, FACT FINDER (Oct. 14, 2005), available at On the Commission s work and the terms of reference used in the inquiry, see (last visited Mar. 9, 2006). The Commission s public reports on the inquiry will eventually be made available on this web site. 20 Arar s civil law suit against various American officials involved in his rendition to Syria was recently dismissed, in large part on the basis that it related to questions of national security and foreign policy considerations that should be left to the executive and legislative branches of government. Judge Trager concluded that this case raises crucial national-security and foreign policy considerations, implicating the complicated multilateral negotiations concerning efforts to halt international terrorism. The propriety of these considerations, including supposed agreements between the United States and foreign governments regarding intelligence-gathering in the context of the efforts to combat terrorism, are most appropriately reserved to the Executive and Legislative branches of government. Moreover, the need for much secrecy can hardly be doubted. Arar v. Ashcroft, No. CV DGT VVP, 2006 WL , at *29 (E.D.N.Y. Feb. 16, 2006) (citation omitted). 21 S.C. Res. 1373, U.N. Doc. S/RES/1373 (Sept. 28, 2001). 22 THE 9/11 REPORT, supra note 4, at Id. It has been estimated that the 9/11 attacks cost under $500,000, and the Madrid, Bali, and London attacks cost as little as $15,000 each, and that the costs of complying with anti-terrorist financing regulations far outweigh their benefits. Financing Terrorism: Looking

8 2158 CARDOZO LAW REVIEW [Vol. 27:5 Focusing on the evil and spectacle of terrorism presents the danger of distorting rational analysis not only about the probability of terrorism, 24 but also about the best way to prevent it and limit its harms. Many anti-terrorism strategies focus on deterring or disabling terrorists before they commit an act of terrorism, an approach that may discount the full range of strategies that can limit terrorism and its harms. Much can be learned from other fields. For example, epidemiologist William Haddon constructed a famous matrix evaluating countermeasures to minimize harm before, during, and after traffic accidents. 25 Haddon argued that too many resources are devoted to changing driver behavior before accidents and too little attention is paid to the environment in which traffic accidents occur and to damage mitigation after accidents. His insights have led to increased attention to matters such as highway design, the interiors of automobiles (including airbags), and the evacuation and treatment of the critically injured. In other work, I have adapted the Haddon Matrix to terrorism prevention and the limitation of harms from terrorism. I have argued that examining the full spectrum of anti-terrorism policies that can be used both before and after acts of terrorism suggests that too much emphasis has been placed on attempts to deter terrorists and not enough on regulating the environment in which they operate and on various damage mitigation strategies. 26 Before such an approach is dismissed as defeatist damage control, a neglected finding of the 9/11 Commission should be considered. The Commission found that in the Wrong Places, ECONOMIST, Oct. 20, 2005, available at displaystory.cfm?story_id= CASS R. SUNSTEIN, LAWS OF FEAR ch. 9 (2005); Victor V. Ramraj, Terrorism, Risk Perception and Judicial Review, in GLOBAL ANTI-TERRORISM LAW AND POLICY 107 (Victor V. Ramraj, Michael Hor & Kent Roach eds., 2005). 25 William Haddon, A Logical Framework for Categorizing Highway Safety Phenomena and Activity, 12 J. TRAUMA 193 (1972). 26 ROACH, supra note 11, ch. 7; Kent Roach, The Criminal Law and Terrorism, in GLOBAL ANTI-TERRORISM LAW AND POLICY, supra note 24, at 129 [hereinafter Roach, Criminal Law and Terrorism]. The Haddon Matrix, as adapted to terrorism, draws distinctions among interventions aimed at terrorists, third parties, the physical environment, and the socioeconomic environment. With respect to each category, attention is given to interventions that occur before, during, and after acts of terrorism. Most anti-terrorism strategies have focused on identifying and deterring terrorists before they commit acts of terrorism, but target hardening and weapons controls are promising means to regulate the physical environment in which terrorists operate. Non-violent outlets for grievances, and other interventions including regime change, affect the socio-cultural environment in which terrorists operate. Laws against financing terrorism, as well as laws regulating sites and substances that are vulnerable to terrorism, are mainly directed toward third parties and not potential terrorists. First response and emergency preparedness are interventions that can minimize harm during and after acts of terrorism. In addition, both harsh responses and the stigmatization of acts of terrorism after they have occurred may be interventions that affect the likelihood of future acts of terrorism.

9 2006] TRADING RIGHTS FOR SECURITY? 2159 during the 1993 World Trade Center bombing, the evacuation of occupants took four hours, whereas in 2001 between 14,000 and 16,000 people were evacuated in under one hour, due in part to improvements of procedures and facilities since the 1993 attack. 27 The Haddon Matrix suggests that increased attention to emergency preparedness, and to the regulation of third parties and the environment, can mitigate the harms of terrorism. In an extensive study published in 2002, the National Research Council concluded that better protection of hazardous materials and critical infrastructure could not only help prevent terrorism, but also make the nation safer from natural disasters, infectious diseases, hackers disrupting the Internet, failures in electric power distribution and other complex public systems, and human error causing failures in such systems. 28 Double-duty strategies that can assist in the prevention or mitigation of terrorism as well as other harms may have particular promise. A broader array of anti-terrorism strategies may also reveal approaches that are effective but do not burden rights. A. Administrative Regulation of Sites and Substances Vulnerable to Terrorism One of the most promising strategies for preventing terrorism is tighter regulation of sites and substances that are vulnerable to terrorism. The greatest terrorist threat is the possible use of nuclear material by terrorists. Graham Allison of Harvard s Kennedy School of Government has written of the dangers of nuclear terrorism that can make 9/11 a footnote. 29 He notes that at various times Al Qaeda has attempted to buy enriched uranium or acquire nuclear warheads that Chechen separatists had said they acquired from Russian stockpiles. 30 Professor Allison proposes intensive regulation of fissile material, highly enriched uranium, and weapons-grade plutonium, which could be used for nuclear terrorism. He estimates that such regulation would cost between $5 and $10 billion out of the more than $500 billion that, at that time of his writing, already had been spent on defense and the war in Iraq. 31 Even if the likelihood of nuclear terrorism remains thankfully low, such investment may be 27 THE 9/11 REPORT, supra note 4, at NAT L RESEARCH COUNCIL, supra note 11, at GRAHAM ALLISON, NUCLEAR TERRORISM: THE ULTIMATE PREVENTABLE CATASTROPHE 3, 203 (2005). 30 Id. 31 Id. at 177.

10 2160 CARDOZO LAW REVIEW [Vol. 27:5 warranted, especially if it will also help prevent accidents with nuclear material. Internationally, there is increased interest in the dangers of nuclear terrorism. United Nations Security Council Resolution 1540, enacted in 2004, calls on states to take action to prevent non-state actors from gaining access to nuclear, chemical, or biological weapons or means of delivery. 32 It also establishes a committee to consider country reports on compliance with this resolution. The most recent UN anti-terrorism convention is the 2005 International Convention for the Suppression of Acts of Nuclear Terrorism, which focuses on criminalizing the sale and possession of radioactive material and taking steps to safeguard such material. 33 Even this Convention, however, emphasizes criminalizing the sale and possession of nuclear materials by non-state actors as opposed to the obligations of states and the international community to make every effort to safeguard and destroy nuclear material that could fall into the hands of terrorists. As in other areas, a danger exists that focusing on the evil of terrorism will lead to too much emphasis on the criminal sanction directed at terrorists and too little emphasis on administrative regulation to secure sites and substances that can be used for terrorism. Although tight administrative regulation of nuclear material may at times make it more difficult for universities and others to conduct research on such materials and may require extensive security checks on those who work with such materials, it cannot be seriously argued that administrative regulation and destruction of nuclear materials compromises fundamental rights. The Canadian experience with anti-terrorism law demonstrates how administrative regulation of sites and substances that can be used for terrorism can be eclipsed by the need to enact more visible and tougher strategies to criminalize terrorism. The immediate priority in Canada after 9/11 was to enact a new Anti-Terrorism Act 34 that created new crimes of terrorism, including crimes based on financing terrorism and participating in terrorist groups. The new law also provides for executive designation of terrorist groups and enhanced provisions to maintain national security confidentiality in legal proceedings. The Bill was introduced into Parliament on October 15, 2001 and, after a controversial national debate about its effects on civil liberties, 35 was enacted before the end of One of the 32 S.C. Res. 1540, U.N. Doc. S/RES/1540 (Apr. 28, 2004). 33 G.A. Res. 59/290, U.N. Doc. A/RES/59/290 (Apr. 13, 2005) S.C., ch. 41 (Can.). 35 See generally THE SECURITY OF FREEDOM: ESSAYS ON CANADA S ANTI-TERRORISM BILL (Ronald J. Daniels, Patrick Macklem, & Kent Roach eds., 2001).

PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au. 10 November 2014

PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au. 10 November 2014 PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au The Committee Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021 Parliament House Canberra ACT 2600 10 November

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

Federation of Law Societies of Canada

Federation of Law Societies of Canada Submission to the Standing Committee on Public Safety and National Security in respect of Bill C-44, An Act to Amend the Canadian Security Intelligence Service Act and other Acts Federation of Law Societies

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

Bill C-51, Anti-terrorism Act, 2015 Executive Summary

Bill C-51, Anti-terrorism Act, 2015 Executive Summary Bill C-51, Anti-terrorism Act, 2015 Executive Summary CANADIAN BAR ASSOCIATION March 2015 500-865 Carling Avenue, Ottawa, ON, Canada K1S 5S8 tel/tél : 613.237.2925 toll free/sans frais : 1.800.267.8860

More information

Australia s counter-terrorism laws

Australia s counter-terrorism laws Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter "the Parties");

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter the Parties); FRAMEWORK AGREEMENT ON INTEGRATED CROSS-BORDER MARITIME LAW ENFORCEMENT OPERATIONS BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF CANADA PREAMBLE THE GOVERNMENT OF THE UNITED

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

CHAPTER 13: International Law, Norms, and Human Rights

CHAPTER 13: International Law, Norms, and Human Rights CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?

More information

Council of Europe: European Court of Human Rights and the Parot Doctrine

Council of Europe: European Court of Human Rights and the Parot Doctrine Council of Europe: European Court of Human Rights and the Parot Doctrine March 2014 The Law Library of Congress, Global Legal Research Center (202) 707-6462 (phone) (866) 550-0442 (fax) law@loc.gov http://www.law.gov

More information

Anti-terrorism, Crime and Security

Anti-terrorism, Crime and Security Anti-terrorism, Crime and Security EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, Her Majesty s Treasury, the Department of Trade and Industry, the Department for Transport,

More information

Standing Committee on Justice, Human Rights, Public Safety and Emergency Preparedness. Ottawa, November 24, 2005. Speaking Notes

Standing Committee on Justice, Human Rights, Public Safety and Emergency Preparedness. Ottawa, November 24, 2005. Speaking Notes Standing Committee on Justice, Human Rights, Public Safety and Emergency Preparedness Ottawa, November 24, 2005 Speaking Notes Bill C-215: An Act to amend the Criminal Code (consecutive sentence for use

More information

PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL

PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL REPUBLIC OF SOUTH AFRICA PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL (As introduced in the National Assembly as a section 75

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of

More information

Passenger Protect Program Transport Canada

Passenger Protect Program Transport Canada AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported

More information

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights August 2007 Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights The Law of Citizenship and Entry into Israel (Temporary

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

Act CLXV of 2013. on Complaints and Public Interest Disclosures. 1. Complaint and public interest disclosure

Act CLXV of 2013. on Complaints and Public Interest Disclosures. 1. Complaint and public interest disclosure Act CLXV of 2013 on Complaints and Public Interest Disclosures The National Assembly, committed to increasing public confidence in the functioning of public bodies, recognising the importance of complaints

More information

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by

More information

New Zealand Bill of Rights Act 1990

New Zealand Bill of Rights Act 1990 Reprint as at 1 July 2013 New Zealand Bill of Rights Act 1990 Public Act 1990 No 109 Date of assent 28 August 1990 Commencement see section 1(2) Contents Page Title 2 1 Short Title and commencement 3 Part

More information

How To Implement International Terrorism Agreements

How To Implement International Terrorism Agreements STATEMENT OF BRAD WIEGMANN DEPUTY ASSISTANT ATTORNEY GENERAL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY UNITED STATES HOUSE OF REPRESENTATIVES

More information

Draft Resolution for the United Nations Human Rights Council 30 th Session, September 14-25, 2015. Situation of Human Rights in Venezuela

Draft Resolution for the United Nations Human Rights Council 30 th Session, September 14-25, 2015. Situation of Human Rights in Venezuela Draft Resolution for the United Nations Human Rights Council 30 th Session, September 14-25, 2015 Situation of Human Rights in Venezuela The Human Rights Council, Guided by the Charter of the United Nations

More information

Canadian Security Intelligence Service Act. R.S.C., 1985, c. C-23. An Act to establish the Canadian Security Intelligence Service SHORT TITLE

Canadian Security Intelligence Service Act. R.S.C., 1985, c. C-23. An Act to establish the Canadian Security Intelligence Service SHORT TITLE Canadian Security Intelligence Service Act R.S.C., 1985, c. C-23 An Act to establish the Canadian Security Intelligence Service Short title SHORT TITLE This Act may be cited as the Canadian Security Intelligence

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below.

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below. IN THE SUPREME COURT OF BRITISH COLUMBIA No. ----- Vancouver Registry BETWEEN: THE BRITISH COLUMBIA CIVIL LIBERTIES ASSOCIATION Plaintiff AND: THE ATTORNEY GENERAL OF CANADA Defendant Narne and address

More information

CROWN LAW STATUTORY OFFENCES REQUIRING THE CONSENT OF THE ATTORNEY-GENERAL

CROWN LAW STATUTORY OFFENCES REQUIRING THE CONSENT OF THE ATTORNEY-GENERAL CROWN LAW STATUTORY OFFENCES REQUIRING THE CONSENT OF THE ATTORNEY-GENERAL As at 1 July 2013 Antarctica Act 1960 s 3 Offences in Ross Dependency or any part of Antarctica other than the Ross Dependency

More information

Patrimoine canadien. Canadian. Heritage. The. Canadian. Charter of Rights and Freedoms

Patrimoine canadien. Canadian. Heritage. The. Canadian. Charter of Rights and Freedoms Canadian Heritage Patrimoine canadien The Canadian Charter of Rights and Freedoms The Canadian Charter of Rights and Freedoms Whereas Canada is founded upon principles that recognize the supremacy of God

More information

The Youth Drug Detoxification and Stabilization Act

The Youth Drug Detoxification and Stabilization Act YOUTH DRUG DETOXIFICATION 1 The Youth Drug Detoxification and Stabilization Act being Chapter Y-1.1* of The Statutes of Saskatchewan, 2005 (effective April 1, 2006) as amended by The Statutes of Saskatchewan,

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Privacy, data retention and terrorism

Privacy, data retention and terrorism Page 1 of 6 18th BILETA Conference:Controlling Information in the Online Environment April, 2003 QMW, London Privacy, data retention and terrorism Diane Rowland University of Wales, Aberystwyth Introduction

More information

Protection of Freedoms Bill

Protection of Freedoms Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 146 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Theresa May has made the following statement

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency CEAS ANALYSIS of the Law on Amendments of the Law on the Security Intelligence Agency Belgrade, July 2014. CEAS is supported by the Rockefeller Brother s Fund The views and analysis in this report do not

More information

5. The Model Strategies and Practical Measures are aimed at providing de jure and de

5. The Model Strategies and Practical Measures are aimed at providing de jure and de MODEL STRATEGIES AND PRACTICAL MEASURES ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN IN THE FIELD OF CRIME PREVENTION AND CRIMINAL JUSTICE 1. The multifaceted nature of violence against women suggests

More information

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony GAO For Release on Delivery Expected at 2:00 p.m. Thursday, April 6, 2000 United States General Accounting Office Testimony Before the Subcommittee on Oversight, Investigations, and Emergency Management,

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS

PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS HUMAN RIGHTS IN CONTEXT Britain has a long history of protecting human rights at home and standing

More information

Glossary. To seize a person under authority of the law. Police officers can make arrests

Glossary. To seize a person under authority of the law. Police officers can make arrests Criminal Law Glossary Arrest Charge Convicted Court Crime/Offence Crown Attorney or Prosecutor Criminal Custody Guilty Illegal Innocent Lawyer To seize a person under authority of the law. Police officers

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

ETHICS STILL UN-ADDRESSED IN PANDEMIC PREPAREDNESS: POSSIBLE PLANNING GUIDELINE

ETHICS STILL UN-ADDRESSED IN PANDEMIC PREPAREDNESS: POSSIBLE PLANNING GUIDELINE Management Ethics Fall 2006 ETHICS STILL UN-ADDRESSED IN PANDEMIC PREPAREDNESS: POSSIBLE PLANNING GUIDELINE Dr. Kirsty Duncan s article in the Spring 2006 edition of Management Ethics set past flu pandemics

More information

Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act

Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act Office of the Commissariat Privacy Commissioner à la protection de of Canada la vie privée du Canada Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Health Insurance Portability and Accountability Act of 1996 (HIPAA) and Drug Abuse Prevention, Treatment, and Rehabilitation ACT THE CENTER FOR HEALTH CARE SERVICES 3031 IH

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

As part of their course on law and/or sociology in this module, participants will be able to:

As part of their course on law and/or sociology in this module, participants will be able to: Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart

More information

Civil Wrongs (Liability of the State) Law, 5712 1952

Civil Wrongs (Liability of the State) Law, 5712 1952 The 1952 law presented here is the official English translation. The approved 2005 amendments are printed in bold italics and were translated by Adalah. Civil Wrongs (Liability of the State) Law, 5712

More information

235.1. Federal Act on Data Protection (FADP) Aim, Scope and Definitions

235.1. Federal Act on Data Protection (FADP) Aim, Scope and Definitions English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Data Protection (FADP) 235.1 of 19 June

More information

S Korea's National Security Law

S Korea's National Security Law Page 1 S Korea's National Security Law Editor's note: This is an unofficial translation of the National Security Law (see below for the original document). The sole purpose of this translation is to make

More information

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science Volume 10, Number 4, 2012 ª Mary Ann Liebert, Inc. DOI: 10.1089/bsp.2012.0054 Establishing a National Biological Laboratory Safety

More information

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

Guidelines on SPECIAL BRANCH WORK in the United Kingdom Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence

More information

Joint Select Committee on Australia s Immigration Detention Network By email: immigration.detention@aph.gov.au

Joint Select Committee on Australia s Immigration Detention Network By email: immigration.detention@aph.gov.au Dr Ben Saul BA(Hons) LLB(Hons) Sydney DPhil Oxford Professor of International Law, Sydney Centre for International Law Australian Research Council Future Fellow Joint Select Committee on Australia s Immigration

More information

BRIEF TO THE STANDING COMMITTEE ON FINANCE

BRIEF TO THE STANDING COMMITTEE ON FINANCE BRIEF TO THE STANDING COMMITTEE ON FINANCE By Terrance S. Carter (co-authored with Nancy Claridge and Sean Carter) Carters Professional Corporation April 20, 2015 It is a pleasure to receive the invitation

More information

7 August 2015. I. Introduction

7 August 2015. I. Introduction Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International

More information

Parliamentary Information and Research Service. Legislative Summary BILL C-60: KEEPING CANADIANS SAFE (PROTECTING BORDERS) ACT

Parliamentary Information and Research Service. Legislative Summary BILL C-60: KEEPING CANADIANS SAFE (PROTECTING BORDERS) ACT Legislative Summary LS-670E BILL C-60: KEEPING CANADIANS SAFE (PROTECTING BORDERS) ACT Christine Kostiuk International Affairs, Trade and Finance Division 12 February 2010 Library of Parliament Bibliothèque

More information

ADVANCE UNEDITED VERSION

ADVANCE UNEDITED VERSION Committee against Torture Forty-fifth session 1-19 November 2010 List of issues prior to the submission of the second periodic report of Qatar (CAT/C/QAT/2) 1 ADVANCE UNEDITED VERSION Specific information

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 13. National ID Cards and Military Tribunals Congress should resist the establishment of a national identification

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

NATIONAL COMPLIANCE AND ENFORCEMENT POLICY

NATIONAL COMPLIANCE AND ENFORCEMENT POLICY 1. Introduction NATIONAL COMPLIANCE AND ENFORCEMENT POLICY The Commonwealth, state and territory governments have agreed to harmonised work health and safety laws to improve work health and safety, provide

More information

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Collateral damage occurs in any war, including America s War on Crime.

Collateral damage occurs in any war, including America s War on Crime. 12 Collateral damage occurs in any war, including America s War on Crime. Ironically, our zealous efforts to keep communities safe may have actually destabilized and divided them. The vast expansion of

More information

Top Ten Organizational Commitments Needed to Make IGO Whistleblower Protection Policies Effective 1

Top Ten Organizational Commitments Needed to Make IGO Whistleblower Protection Policies Effective 1 1612 K Street Suite 1100 Washington, DC, USA 20006 202-408-0034 fax: 202-408-9855 Website: www.whistleblower.org Top Ten Organizational Commitments Needed to Make IGO Whistleblower Protection Policies

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

N.5 Immigration Holds and Immigration Detention; When to Obtain Release from Criminal Incarceration, and When Not To

N.5 Immigration Holds and Immigration Detention; When to Obtain Release from Criminal Incarceration, and When Not To and Immigration Detention; When to Obtain Release from Criminal Incarceration, and When Not To By Michael K. Mehr and Katherine Brady For more information about immigration holds/detainers, and state enforcement

More information

WITNESS PROTECTION ACT

WITNESS PROTECTION ACT LAWS OF MALAYSIA ONLINE VERSION OF UPDATED TEXT OF REPRINT Act 696 WITNESS PROTECTION ACT 2009 As at 1 May 2013 2 WITNESS PROTECTION ACT 2009 Date of Royal Assent............... 18 April 2009 Date of publication

More information

Data Protection Working Group. Final Report on the Draft Data Protection Bill

Data Protection Working Group. Final Report on the Draft Data Protection Bill Data Protection Working Group Final Report on the Draft Data Protection Bill Background In August 2009, upon a request from the Hon. Attorney General, the Governor-in-Cabinet established a Data Protection

More information

International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION

International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the

More information

SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003. Saskatchewan Workers Compensation Board

SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003. Saskatchewan Workers Compensation Board Date: August 29, 2012 File No.: 2008/101 SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003 Saskatchewan Workers Compensation Board Summary: The Commissioner

More information

Council of the European Union Brussels, 12 September 2014 (OR. en)

Council of the European Union Brussels, 12 September 2014 (OR. en) Council of the European Union Brussels, 12 September 2014 (OR. en) Interinstitutional File: 2013/0409 (COD) 13132/14 NOTE From: To: Presidency DROIPEN 104 COPEN 218 CODEC 1799 Working Party on Substantive

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

Resolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)]

Resolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)] United Nations A/RES/60/288 General Assembly Distr.: General 20 September 2006 Sixtieth session Agenda items 46 and 120 Resolution adopted by the General Assembly on 8 September 2006 [without reference

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Since 2001, the Administration: Funded over 5,700 new Border Patrol agents, and acquired nearly 7,800 new detention beds; Provided nearly $37.5 billion to State, local,

More information

Franklin Technology Center s Code of Conduct

Franklin Technology Center s Code of Conduct Franklin Technology Center s Code of Conduct Franklin Technology Center is comprised of students, faculty, staff and administrators. This community recognizes the need to establish a code of conduct that

More information

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION Introduced by: Co on Calendar By r&uest of I Maga 'la hen Guhhan in accordance with the Organic Act of Guam. AN ACT TO ESTABLISH THE

More information

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework. United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

British Columbia Justice Reform Initiative Submission

British Columbia Justice Reform Initiative Submission British Columbia Justice Reform Initiative Submission Prepared by the Canadian Bankers Association June 29, 2012 EXPERTISE CANADA BANKS ON LA RÉFÉRENCE BANCAIRE AU CANADA Introduction The Canadian Bankers

More information

Freedom of Information Act 2000

Freedom of Information Act 2000 ch3600a00a 02-12-00 01:13:30 ACTA Unit: PAGA Rev RA Proof, 29.11.2000 Freedom of Information Act 2000 CHAPTER 36 ARRANGEMENT OF SECTIONS Part I Access to information held by public authorities Right to

More information

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September

More information

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations

More information