01.06.2013 Views

The use of the Internet

The use of the Internet

The use of the Internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10<br />

THE USE OF THE INTERNET FOR TERRORIST PURPOSES<br />

<strong>The</strong> court <strong>the</strong>refore found sufficient evidence to demonstrate, as required under <strong>the</strong> French<br />

Criminal Code, that Hicheur had provided not merely intellectual support but also direct<br />

logistical support to a clearly identified terrorist plan. <strong>The</strong> decision <strong>of</strong> <strong>the</strong> court is<br />

appealable.<br />

Sources: Judgement <strong>of</strong> 4 May 2012 <strong>of</strong> <strong>the</strong> Tribunal de Grande Instance de Paris; and Tung, Liam, Jihadists<br />

get world-class encryption kit (29 January 2008), available from www.zdnet.com.au/jihadists-get-world-class-encryption-kit-339285480.htm.<br />

21. Steps may also be taken via <strong>the</strong> <strong>Internet</strong> to identify a potential target <strong>of</strong> an attack<br />

and <strong>the</strong> most effective means <strong>of</strong> achieving <strong>the</strong> terrorist purpose. <strong>The</strong>se preparatory steps<br />

may range from obtaining instructions on recommended methods <strong>of</strong> attack to collecting<br />

open-source and o<strong>the</strong>r information regarding a proposed target. <strong>The</strong> ability <strong>of</strong> <strong>the</strong><br />

<strong>Internet</strong> to bridge distances and borders, and <strong>the</strong> vast amount <strong>of</strong> information publicly<br />

available in cyberspace, make <strong>the</strong> <strong>Internet</strong> a key tool in <strong>the</strong> planning <strong>of</strong> terrorist acts.<br />

(a) Preparatory secret communication<br />

22. <strong>The</strong> most basic function <strong>of</strong> <strong>the</strong> <strong>Internet</strong> is to facilitate communication. Terrorists<br />

have become increasingly sophisticated at exploiting communications technologies for<br />

anonymous communication related to <strong>the</strong> planning <strong>of</strong> terrorist acts. A simple online<br />

e-mail account may be <strong>use</strong>d by terrorists for electronic, or virtual, “dead dropping” <strong>of</strong><br />

communications. This refers to <strong>the</strong> creation <strong>of</strong> a draft message, which remains unsent,<br />

and <strong>the</strong>refore leaves minimal electronic traces, but which may be accessed from any<br />

<strong>Internet</strong> terminal worldwide by multiple individuals with <strong>the</strong> relevant password.<br />

23. <strong>The</strong>re is also an abundance <strong>of</strong> more sophisticated technologies that increase <strong>the</strong><br />

difficulty <strong>of</strong> identifying <strong>the</strong> originator, recipient or content <strong>of</strong> <strong>Internet</strong> communications.<br />

Encryption tools and anonymizing s<strong>of</strong>tware are readily available online for download.<br />

<strong>The</strong>se tools may, inter alia, mask <strong>the</strong> unique <strong>Internet</strong> Protocol (IP) address that identifies<br />

each device <strong>use</strong>d to access <strong>the</strong> <strong>Internet</strong> and its location, reroute <strong>Internet</strong> communications<br />

via one or more servers to jurisdictions with lower levels <strong>of</strong> enforcement<br />

against terrorist activity and/or encrypt traffic data relating to websites accessed. Steganography,<br />

<strong>the</strong> hiding <strong>of</strong> messages in images, may also be <strong>use</strong>d.<br />

(b) Publicly available information<br />

24. Organizations and individuals <strong>of</strong>ten publish extensive amounts <strong>of</strong> information on<br />

<strong>the</strong> <strong>Internet</strong>. In <strong>the</strong> case <strong>of</strong> organizations, this may be a result in part <strong>of</strong> a desire to<br />

promote <strong>the</strong>ir activities and streamline <strong>the</strong>ir interaction with <strong>the</strong> public. Some sensitive<br />

information that may be <strong>use</strong>d by terrorists for illicit purposes is also made available<br />

through <strong>Internet</strong> search engines, which may catalogue and retrieve inadequately protected<br />

information from millions <strong>of</strong> websites. Fur<strong>the</strong>r, online access to detailed logistical<br />

information, such as real-time closed-circuit television footage, and applications such<br />

as Google Earth, which is intended for and primarily <strong>use</strong>d by individuals for legitimate<br />

ends, may be mis<strong>use</strong>d by those intent on benefiting from <strong>the</strong> free access to

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!