01.06.2013 Views

The use of the Internet

The use of the Internet

The use of the Internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v<br />

Executive Director United Nations Office on Drugs and Crime ............ v<br />

Secretary-General’s Counter-Terrorism Implementation Task Force .......... vi<br />

Government <strong>of</strong> <strong>the</strong> United Kingdom ................................. vii<br />

Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

I . Use <strong>of</strong> <strong>the</strong> <strong>Internet</strong> for terrorist purposes . . . . . . . . . . . . . . . . . . . . . . 3<br />

A. Introduction ............................................ 3<br />

B. Means by which <strong>the</strong> <strong>Internet</strong> is utilized for terrorist purposes ..... 3<br />

C. Uses <strong>of</strong> <strong>the</strong> <strong>Internet</strong> for countering terrorist activity ............. 12<br />

D. Rule-<strong>of</strong>-law considerations ................................. 13<br />

II . <strong>The</strong> international context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

A. Introduction ............................................ 15<br />

B. United Nations counter-terrorism resolutions .................. 16<br />

C. Universal counter-terrorism legal instruments .................. 17<br />

D. International human rights law ............................. 19<br />

E. Regional and subregional counter-terrorism legal instruments ..... 20<br />

F. Model legislation ........................................ 23<br />

III . Policy and legislative frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />

A. Introduction ............................................ 27<br />

B. Policy ................................................. 27<br />

C. Legislation ............................................. 31<br />

IV . Investigations and intelligence-ga<strong>the</strong>ring . . . . . . . . . . . . . . . . . . . . 53<br />

A. Tools in <strong>the</strong> commission <strong>of</strong> terrorist <strong>of</strong>fences involving <strong>the</strong> <strong>Internet</strong> . 53<br />

B. Investigations <strong>of</strong> terrorist cases involving <strong>the</strong> <strong>Internet</strong> ............ 60<br />

ix<br />

Page

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!