The use of the Internet
The use of the Internet
The use of the Internet
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Contents<br />
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v<br />
Executive Director United Nations Office on Drugs and Crime ............ v<br />
Secretary-General’s Counter-Terrorism Implementation Task Force .......... vi<br />
Government <strong>of</strong> <strong>the</strong> United Kingdom ................................. vii<br />
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />
I . Use <strong>of</strong> <strong>the</strong> <strong>Internet</strong> for terrorist purposes . . . . . . . . . . . . . . . . . . . . . . 3<br />
A. Introduction ............................................ 3<br />
B. Means by which <strong>the</strong> <strong>Internet</strong> is utilized for terrorist purposes ..... 3<br />
C. Uses <strong>of</strong> <strong>the</strong> <strong>Internet</strong> for countering terrorist activity ............. 12<br />
D. Rule-<strong>of</strong>-law considerations ................................. 13<br />
II . <strong>The</strong> international context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />
A. Introduction ............................................ 15<br />
B. United Nations counter-terrorism resolutions .................. 16<br />
C. Universal counter-terrorism legal instruments .................. 17<br />
D. International human rights law ............................. 19<br />
E. Regional and subregional counter-terrorism legal instruments ..... 20<br />
F. Model legislation ........................................ 23<br />
III . Policy and legislative frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />
A. Introduction ............................................ 27<br />
B. Policy ................................................. 27<br />
C. Legislation ............................................. 31<br />
IV . Investigations and intelligence-ga<strong>the</strong>ring . . . . . . . . . . . . . . . . . . . . 53<br />
A. Tools in <strong>the</strong> commission <strong>of</strong> terrorist <strong>of</strong>fences involving <strong>the</strong> <strong>Internet</strong> . 53<br />
B. Investigations <strong>of</strong> terrorist cases involving <strong>the</strong> <strong>Internet</strong> ............ 60<br />
ix<br />
Page