Cross-border investigative powers for law enforcement : discussion paper / Standing Committee of Attorneys-General and Australasian Police Ministers Council Joint Working Group on National Investigation Powers
Published
[Canberra] : Joint Working Group on National Investigation Powers, 2003
Controlled operations: Proposed legislative framework 1. Preliminary -- 2. Authorisation of cross-border controlled operations -- 3. Conduct of cross-border controlled operations -- 4. Monitoring of cross-border controlled operations -- 5. Miscellaneous -- Assumed identities: Legislative framework 1. General -- 2. Authority for assumed identity -- 3. Evidence of assumed identity -- 4. Effect of authority -- 5. Mutual recognition under corresponding laws -- 6. Miscellaneous -- Protection of witness identity: Proposed legislative framework 1. General -- 2. Witness identity protection certificates for operatives -- Witness protection program participants -- 3. Evidence by people in witness protection program -- Surveillance devices: Introduction -- Proposed legislative framework 1. Preliminary -- 2. Warrants -- 3. Emergency authorisations -- 4. Recognition of corresponding authorisations -- 5. Surveillance device operations -- 6. General -- App A. Comparison of Australian controlled operations legislation -- App B. Comparison of Australian electronic surveillance legislation -- App C. Joint Working Group contributions
Summary
Designed to facilitate the development of the model legislation by providing an overview of the existing legislative and common law approaches
Analysis
Criminal investigation
Legislative harmonisation
Law enforcement
Jurisdiction
Interstate comparisons
Interstate Comparisons
Notes
"February 2003"
At head of title: Leaders Summit on Terrorism and Multi-Jurisdictional Crime; (... Multijurisdictional Crime on cover.)
"... the Leaders' Summit ... on 5 April 2002 ... agreed to introduce model laws for all jurisdictions and mutual recognition for a national set of powers for cross-border investigations covering controlled operations, assumed identities, electronic surveillance devices and witness anonymity."--Introduction