01.06.2013 Views

The use of the Internet

The use of the Internet

The use of the Internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

20<br />

THE USE OF THE INTERNET FOR TERRORIST PURPOSES<br />

E. Regional and subregional counter-terrorism legal instruments<br />

57. In addition to <strong>the</strong> universal counter-terrorism instruments, several regional and<br />

subregional instruments <strong>of</strong>fer valuable substantive and procedural standards for criminalizing<br />

acts <strong>of</strong> terrorism that may be perpetrated by means <strong>of</strong> <strong>the</strong> <strong>Internet</strong>. <strong>The</strong>se<br />

instruments, which complement <strong>the</strong> universal counter-terrorism instruments, may vary<br />

in scope and in <strong>the</strong>ir degree <strong>of</strong> enforceability.<br />

1. Council <strong>of</strong> Europe<br />

58. In 2001, <strong>the</strong> Council <strong>of</strong> Europe elaborated <strong>the</strong> Council <strong>of</strong> Europe Convention on<br />

Cybercrime, 48 which is currently <strong>the</strong> only multilateral, legally binding instrument<br />

addressing criminal activity conducted via <strong>the</strong> <strong>Internet</strong>. <strong>The</strong> Council <strong>of</strong> Europe Convention<br />

on Cybercrime seeks to harmonize national laws relating to cybercrime, to<br />

improve domestic procedures for detecting, investigating, and prosecuting such crimes<br />

and to provide arrangements for fast and reliable international cooperation on <strong>the</strong>se<br />

matters. 49 <strong>The</strong> Convention establishes a common minimum standard for domestic<br />

computer-related <strong>of</strong>fences 50 and provides for <strong>the</strong> criminalization <strong>of</strong> nine such <strong>of</strong>fences,<br />

including <strong>of</strong>fences relating to unauthorized access to and illicit tampering with computer<br />

systems, programs or data; computer-related fraud and forgery; and attempting, aiding<br />

or abetting <strong>the</strong> commission <strong>of</strong> such acts. 51<br />

59. <strong>The</strong> Council <strong>of</strong> Europe Convention on Cybercrime also includes important procedural<br />

provisions which may facilitate investigations and evidence-ga<strong>the</strong>ring in connection<br />

with acts <strong>of</strong> terrorism involving <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong>. <strong>The</strong>se provisions apply to<br />

any criminal <strong>of</strong>fence committed by means <strong>of</strong> a computer and <strong>the</strong> collection <strong>of</strong> evidence<br />

in electronic form and are subject to applicable safeguards provided for under domestic<br />

law. 52<br />

60. For example, <strong>the</strong> Council <strong>of</strong> Europe Convention on Cybercrime requires parties<br />

to adopt legislation requiring <strong>Internet</strong> service providers (ISPs) to preserve specified data<br />

stored on <strong>the</strong>ir servers for up to 90 days 53 (renewable), if requested to do so by law<br />

enforcement <strong>of</strong>ficials during <strong>the</strong> course <strong>of</strong> a criminal investigation or proceeding, until<br />

<strong>the</strong> appropriate legal steps may be taken to compel disclosure <strong>of</strong> such data. 54 This<br />

expedited procedure for <strong>the</strong> preservation <strong>of</strong> stored data is crucial given <strong>the</strong> transient<br />

48 Council <strong>of</strong> Europe, European Treaty Series, No. 185 (also available from www.coe.int/cybercrime).<br />

49 Ibid., preamble.<br />

50 Explanatory report to <strong>the</strong> Council <strong>of</strong> Europe Convention on Cybercrime, para. 33. Available from http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.<br />

51 Ibid., arts. 2-8 and 11.<br />

52 Ibid., art. 14, para. 2 (b) and (c), and art. 15. Such conditions shall include protection <strong>of</strong> human rights and<br />

liberties, including rights arising pursuant to obligations undertaken under <strong>the</strong> European Convention for <strong>the</strong> Protection<br />

<strong>of</strong> Human Rights and Fundamental Freedoms, <strong>the</strong> International Covenant on Civil and Political Rights, o<strong>the</strong>r applicable<br />

international human rights instruments, and judicial or o<strong>the</strong>r independent supervision.<br />

53 A minimum <strong>of</strong> 60 days is imposed with respect to preservation effected in response to a request for mutual legal<br />

assistance (Council <strong>of</strong> Europe Convention on Cybercrime, art. 29).<br />

54 Council <strong>of</strong> Europe Convention on Cybercrime, art. 16.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!