首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
This article examines recent United Kingdom government proposals for secret inquests, which, it is argued, are part of a general push for secrecy discernible across common law jurisdictions, and which include developments such as increased recourse to sensitive evidence in forensic settings and the normalization of intelligence‐led policing. While the push for secrecy is justified by national security claims, the article shows that in cases of contentious death involving police, the issue is less about national security and more about the use of intercept evidence, covert surveillance, and intelligence‐led policing, all of which have implications for police trust, accountability, and reputation management.  相似文献   

2.
Recent and upcoming judgments of the Court of Justice of the European Union (CJEU) have resurfaced a much-debated topic on the legal limitations of law enforcement authorities and intelligence services under EU law in implementing surveillance operations. In its decisions, the CJEU has reinstated and at times remoulded its case-law on data retention, unearthing a variety of legal issues. This article aims to critically analyse the legal limitations of (indiscriminate) surveillance measures, the role of the private sector in the scheme, and the line between the competence of the Member States and that of the EU on national security matters. It also aims to remark on the latest developments on the reception of the decisions by the Member States and the EU legislator, as well as on the ongoing dialogue between the CJEU and the European Court of Human Rights (ECHR).  相似文献   

3.
A convergence of post-9/11 security governance practices and a dependence on extractive economies has resulted in changes to the way Canadian policing agencies classify environmental movements. We detail how the category of ‘critical infrastructure protection’ (CIP) now enables surveillance of environmentalists under the banner of national security. We examine the growth of CIP as a security category, its changing character from the Cold War to the present, and the role of threat entrepreneurs. We demonstrate that CIP networks have institutionalized collaborations between national security agencies and energy corporations, creating a petro-security apparatus that aims to suppress dissent. We conclude with reflections on what surveillance regimes driven by the petro-security apparatus mean for debates about national security and social movements.  相似文献   

4.
As the 21st century approaches, encryption is presenting a national security dilemma in the US. While the use of strong encryption for computerized data is essential in protecting our nation, widespread, unregulated encryption poses serious problems on two levels: encryption could inhibit the government's ability to enforce the law as well as gather foreign intelligence. As a result, the government has established export controls on encryption products and proposed a 'key recovery' system designed to enable law enforcement officers to access encrypted data in the course of lawful investigations. The export controls have been ineffective and counterproductive policy and are arguably unconstitutional under the First Amendment. However, export controls are the only viable solution to the intelligence gathering problem and will need to survive these political and legal attacks or our national security could be jeopardized. Key recovery will be difficult and costly to implement and has come under attack by civil liberties' groups. Nevertheless, a cost-effective compromise on key recovery is necessary to meet the needs of law enforcement. Such a system, if it mirrored current electronic surveillance law, would effectively balance individual privacy rights and governmental interests and thus should survive constitutional scrutiny. Congress and President Clinton ought to enact key recovery legislation soon before the use of encryption becomes commonplace. A failure to act intelligently and effectively on this critical, cutting-edge issue could compromise our nation's future.  相似文献   

5.
邢仁雷  刘昕 《行政与法》2013,(7):111-116
传统“国家安全”内涵延伸到经济领域导致贸易保护盛行,投资壁垒越来越多,尤以中兴、华为进入美国遭到的以国家安全审查为内容的新贸易保护阻挠为最.本文透视美国安全审查制度,分析了中国企业海外投资遭受歧视待遇的原因,以期为我国对外资的管制和促进海外投资的保护提供借鉴.  相似文献   

6.
Exemption 3 of the Freedom of Information Act states that a federal agency can withhold a document that has already been deemed non-disclosable by a different statute. That exemption is often used by agencies that are involved in traditional national security practices and the controversial modern techniques of pervasive electronic surveillance, as justification for keeping information on those practices secret. This article argues that Exemption 3 has inadvertently made the security and surveillance establishment more secretive, creating a nearly irrebuttable presumption that documents must not be disclosed to citizens or journalists. Exemption 3 jurisprudence has allowed precedents on the secrecy of old-school surveillance techniques to be applied to the far more pervasive techniques exercised by security agencies in the modern era.  相似文献   

7.
The Local Role in Homeland Security   总被引:1,自引:0,他引:1  
There has been considerable discussion since September 11 of the enormous resource that local police potentially represent in the fight against terrorism. This article identifies limits to the local role in homeland security by analyzing a case study of Dearborn, Michigan. Partly because Dearborn is home to one of the largest concentrations of Arabs in the United States, its experience with homeland security highlights two kinds of burdens that cities incur when they engage in proactive surveillance to identify potential terrorists: damage to their reputation (since police surveillance implies that its objects are not trustworthy) and damage to police legitimacy (since new surveillance may undermine trust between police and the community). Because the benefits of efforts to identify terrorists typically accrue to jurisdictions other than the one that engages in it—unlike street crime, terrorism is a national or even international problem—local governments have little reason to pursue it. Instead, cities such as Dearborn have reason to emphasize what I call the "community protection" aspects of homeland security, such as target hardening and emergency response. This finding has more general implications for our understanding of the police role and the politics of policing, showing how both are shaped by the structural location police occupy in federalist systems of government.  相似文献   

8.
Surveillance is becoming ubiquitous in our society. We can also see the emergence of “smart” surveillance technologies and the assemblages (or combinations) of such technologies, supposedly to combat crime and terrorism, but in fact used for a variety of purposes, many of which are intrusive upon the privacy of law-abiding citizens. Following the dark days of 9/11, security and surveillance became paramount. More recently, in Europe, there has been a policy commitment to restore privacy to centre stage. This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure the security of our society, and finds that improvements are needed in our legal and regulatory framework if privacy is indeed to be respected by law enforcement authorities and intelligence agencies. It then goes on to argue that privacy impact assessments should be used to sort out the necessity and proportionality of security and surveillance programmes and policies vis-à-vis privacy.  相似文献   

9.
本文结合国际上海洛因毒品的变化特点和各国政府采用的一些应对措施,就我国在海洛因毒品技术分析情报化的建立和完善做了初步的思索和探讨。  相似文献   

10.
This paper examines security networks in a context where security is increasingly regarded as a problem of intelligence. Data are derived from interviews with officers in criminal intelligence units in Ontario, Canada. A conceptual framework is developed to understand the limits of security intelligence within an emerging security network paradigm, focussing on the normative dimensions governing security networking, and the mechanisms and technologies limiting information deployment among public security agencies. Despite efforts to address security through the sharing of actionable information, security intelligence maintains an exclusive value. Technologies of control promoting this exclusivity also function to prevent intelligence from becoming common knowledge. Because of its limited value, intelligence is ill-suited for export into security governance writ large.  相似文献   

11.
为应对现代化进程中的社会风险,安抚公众对风险的恐慌情绪,公共空间大规模监控随之诞生,并迅速在现实社会和网络空间中全面运用。公共治理不能取安全保障而舍隐私保护,公共空间大规模监控的运用并非以牺牲隐私权为代价,而是在保障安全法益的同时兼顾隐私法益的保护。在此"既保障安全,又保护隐私"的法理念下,公共空间大规模监控的运用体现了风险治理从个人本位走向社会本位的转变趋势,并促进了个人信息保护从自主支配到有序共享的逻辑转换。为寻求安全保障与隐私保护之间的平衡路径,在公共空间合理运用大规模监控措施,就必须加强信息收集、存储、使用的阶段性控制,建立个人信息合理使用制度,实现个人信息的有序共享。  相似文献   

12.
《Global Crime》2013,14(3-4):561-582
The thousands of large and small private security establishments operating around the world today continue to expand in number, diversity, and capability. Government oversight is often lacking, and the impact on local, national and regional security and stability may be substantial. In the most troubled areas, the pockets of security provided by private security regimens provide may mean the difference between a failed state and one that is at least faltering. However, the advantages of “private security firm cover” quickly became evident to criminals and groups with terrorist agendas as well. This assessment addresses numerous cases from around the world of private security establishments that were either formed for—or otherwise turned to—the pursuit of criminal or terrorist purposes. The stated jihadist intent to infiltrate such companies underscores the need for law enforcement and intelligence attention to the recruiting, affiliations and activities of these security enterprises.  相似文献   

13.
论广州亚运安保警务情报机制的构建   总被引:1,自引:0,他引:1  
丘志馨 《政法学刊》2010,27(5):112-116
情报信息是亚运安保部门最重要的安全资源和工作基础,公安机关作为亚运安保工作的主力军,在亚运会的安全保卫工作中必须进行科学的社情评估,建立高效的警务情报机制,精心组织实施安保工作,力争实现"和谐亚运"的工作目标。  相似文献   

14.
Controversies have surrounded law enforcement intelligence because of past instances where the police maintained records of citizens' activities that were viewed as suspicious or anti-American, even though no crimes were being committed. This, of course, violates fundamental constitutional guarantees and offends the American sense of fairness with respect to government intrusiveness. Unfortunately, the boundary is not precise regarding the types of information the police can collect and keep. Some legal guidelines appear contradictory and the application of law to factual situations is often difficult. Beyond the legal ramifications, early intelligence initiatives by the police typically lacked focus, purpose, and process. Important lessons can be learned from these historical experiences that provide context and guidance for law enforcement intelligence today. Aggravating the [kinds of factors referred to above] has been the tenuous relationship between law enforcement intelligence and national security intelligence that has changed continuously since the mid-20th century. These changes have been both politically and legally controversial, responding to changing socio-political events in American history and most recently through post-9/11 counterterrorism efforts. As a result, there is value in understanding selected portions of history from both types of intelligence to gain context and understand the lessons learned.  相似文献   

15.
蔡宝刚 《法学》2022,(1):3-19
保证国家安全是当代中国的头等大事,国家安全日趋稳固是新时代党和国家事业取得的重要历史性成就。法治是保证和维护国家安全的基本方式和根本之策。习近平通过论述我国国家安全风险形势、依法防范化解国家安全风险等问题,阐释了新时代推进国家安全法治建设的现实需要;通过论述坚持总体国家安全观、统筹发展和安全等问题,阐释了新时代推进国家安全法治建设的指导思想;通过论述加强国家安全法治各环节建设等问题,阐释了新时代推进国家安全法治建设的总体进路;通过论述维护重点领域的国家安全等问题,阐释了新时代推进国家安全法治建设的重点任务。习近平国家安全法治理论是习近平法治思想的重要内容和有机组成部分,为我国新时代取得维护国家安全的历史性成就奠定了理论基石和提供了行动指南,对我国在新征程上不断加强国家安全法治建设具有极为重要的理论和实践指导意义。  相似文献   

16.
鉴于国家安全在我国经济和社会可持续发展中居于举足轻重的地位,本文从国家安全的内涵及其发展入手,论述运用环境法律制度保障国家安全的现实急迫性和法理基础,最后提出完善相关环境法律维护国家安全的建议措施。  相似文献   

17.
敌对势力敌对分子插手群体性事件有四个基本特点,即主体结构多元,政治目的明确;插手方式多样,活动手法诡秘;影响危害严重,发展趋势增强,敌我矛盾混合,预防处置困难。处置此类群体性事件的三项专门对策,即:提高国家安全意识,增强敌情观念,加强隐蔽斗争;建立健全预警机制,搜集情报信息,掌握工作主动权;采取正确策略方法,提高处置水平,预防危害。  相似文献   

18.
Forensic science laboratories are being challenged by the expanding decentralization of forensic capabilities, particularly for digital traces. This study recommends laboratories undertake digital transformations to capitalize on the decentralization movement, develop a more comprehensive understanding of crime and security‐relevant problems, and play a more central role in problem‐solving collaboratively with law enforcement organizations and other stakeholders. A framework for the bilateral transfer of information and knowledge is proposed to magnify the impact of forensic science laboratories on abating crime, strengthening security, and reinforcing the criminal justice system. To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence. Ultimately, this study encourages managers, educators, researchers, and policymakers to look beyond the usefulness of forensic results for solving individual investigations, and to realize the value of combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.  相似文献   

19.
殷炳华 《政法学刊》2009,26(4):86-90
国际恐怖主义犯罪是威胁当今国际社会安全的非传统安全因素,近年来,国际恐怖组织、个人,以及境内外“东突”恐怖势力、“藏独”恐怖势力、邪教恐怖势力,尤其是境内外“东突”及“藏独”势力的恐怖主义犯罪已经对我国构成了现实威胁。针对威胁,公安机关应积极推动我国反恐立法,完善反恐工作机制,参与国际反恐合作,重视情报、舆论引导和群众工作,加强安全防范和预案演练,以有效遏制和消除国际恐怖主义犯罪。  相似文献   

20.
Infectious diseases are a long-standing and continuing threat to health and welfare, with their containment dependent on national disease surveillance and response capacities. This article discusses infectious disease surveillance in the United States and the United Kingdom, examining historical national traditions for identifying and controlling infectious disease risks and how globalization and technical advances have influenced the evolution of their respective approaches. The two systems developed in different but parallel ways. In the United States, surveillance remained quite localized at the state level until the early twentieth century and still retains many of those features. The U.K. approach became centralized from the latter part of the nineteenth century and has principally remained so. In both cases, disease surveillance was traditionally conceived as a public good, where national or local authorities held sovereign rights and power to protect public health. With the increasing globalized nature of infectious disease, such notions shifted toward surveillance as a global public good, with countries responding in turn by creating new global health governance arrangements and regulations. However, the limitations of current surveillance systems and the strong hold of national interests place into question the provision of surveillance as a global public good. These issues are further highlighted with the introduction of new surveillance technologies, which offer opportunities for improved disease detection and identification but also create potential tensions between individual rights, corporate profit, equitable access to technology, and national and global public goods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号