The use of the Internet
The use of the Internet
The use of the Internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
20<br />
THE USE OF THE INTERNET FOR TERRORIST PURPOSES<br />
E. Regional and subregional counter-terrorism legal instruments<br />
57. In addition to <strong>the</strong> universal counter-terrorism instruments, several regional and<br />
subregional instruments <strong>of</strong>fer valuable substantive and procedural standards for criminalizing<br />
acts <strong>of</strong> terrorism that may be perpetrated by means <strong>of</strong> <strong>the</strong> <strong>Internet</strong>. <strong>The</strong>se<br />
instruments, which complement <strong>the</strong> universal counter-terrorism instruments, may vary<br />
in scope and in <strong>the</strong>ir degree <strong>of</strong> enforceability.<br />
1. Council <strong>of</strong> Europe<br />
58. In 2001, <strong>the</strong> Council <strong>of</strong> Europe elaborated <strong>the</strong> Council <strong>of</strong> Europe Convention on<br />
Cybercrime, 48 which is currently <strong>the</strong> only multilateral, legally binding instrument<br />
addressing criminal activity conducted via <strong>the</strong> <strong>Internet</strong>. <strong>The</strong> Council <strong>of</strong> Europe Convention<br />
on Cybercrime seeks to harmonize national laws relating to cybercrime, to<br />
improve domestic procedures for detecting, investigating, and prosecuting such crimes<br />
and to provide arrangements for fast and reliable international cooperation on <strong>the</strong>se<br />
matters. 49 <strong>The</strong> Convention establishes a common minimum standard for domestic<br />
computer-related <strong>of</strong>fences 50 and provides for <strong>the</strong> criminalization <strong>of</strong> nine such <strong>of</strong>fences,<br />
including <strong>of</strong>fences relating to unauthorized access to and illicit tampering with computer<br />
systems, programs or data; computer-related fraud and forgery; and attempting, aiding<br />
or abetting <strong>the</strong> commission <strong>of</strong> such acts. 51<br />
59. <strong>The</strong> Council <strong>of</strong> Europe Convention on Cybercrime also includes important procedural<br />
provisions which may facilitate investigations and evidence-ga<strong>the</strong>ring in connection<br />
with acts <strong>of</strong> terrorism involving <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong>. <strong>The</strong>se provisions apply to<br />
any criminal <strong>of</strong>fence committed by means <strong>of</strong> a computer and <strong>the</strong> collection <strong>of</strong> evidence<br />
in electronic form and are subject to applicable safeguards provided for under domestic<br />
law. 52<br />
60. For example, <strong>the</strong> Council <strong>of</strong> Europe Convention on Cybercrime requires parties<br />
to adopt legislation requiring <strong>Internet</strong> service providers (ISPs) to preserve specified data<br />
stored on <strong>the</strong>ir servers for up to 90 days 53 (renewable), if requested to do so by law<br />
enforcement <strong>of</strong>ficials during <strong>the</strong> course <strong>of</strong> a criminal investigation or proceeding, until<br />
<strong>the</strong> appropriate legal steps may be taken to compel disclosure <strong>of</strong> such data. 54 This<br />
expedited procedure for <strong>the</strong> preservation <strong>of</strong> stored data is crucial given <strong>the</strong> transient<br />
48 Council <strong>of</strong> Europe, European Treaty Series, No. 185 (also available from www.coe.int/cybercrime).<br />
49 Ibid., preamble.<br />
50 Explanatory report to <strong>the</strong> Council <strong>of</strong> Europe Convention on Cybercrime, para. 33. Available from http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.<br />
51 Ibid., arts. 2-8 and 11.<br />
52 Ibid., art. 14, para. 2 (b) and (c), and art. 15. Such conditions shall include protection <strong>of</strong> human rights and<br />
liberties, including rights arising pursuant to obligations undertaken under <strong>the</strong> European Convention for <strong>the</strong> Protection<br />
<strong>of</strong> Human Rights and Fundamental Freedoms, <strong>the</strong> International Covenant on Civil and Political Rights, o<strong>the</strong>r applicable<br />
international human rights instruments, and judicial or o<strong>the</strong>r independent supervision.<br />
53 A minimum <strong>of</strong> 60 days is imposed with respect to preservation effected in response to a request for mutual legal<br />
assistance (Council <strong>of</strong> Europe Convention on Cybercrime, art. 29).<br />
54 Council <strong>of</strong> Europe Convention on Cybercrime, art. 16.