01.06.2013 Views

The use of the Internet

The use of the Internet

The use of the Internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER III. POlICy AND lEGISlATIvE FRAMEwORKS<br />

<strong>the</strong>ir activities or publish information on how to make explosives or o<strong>the</strong>r substances<br />

for <strong>use</strong> in terrorist attacks. 80<br />

82. In 2008, <strong>the</strong> Government <strong>of</strong> Saudi Arabia implemented new technology-related<br />

laws, including one that established as a criminal <strong>of</strong>fence, punishable by fines and up<br />

to 10 years <strong>of</strong> imprisonment, owning a website that advocates or supports<br />

terrorism. 81<br />

83. Also in 2008, <strong>the</strong> Government <strong>of</strong> Pakistan enacted <strong>the</strong> Prevention <strong>of</strong> Electronic<br />

Crimes Ordinance, 2008, which made specific provision for <strong>of</strong>fences connected to cyberterrorism.<br />

<strong>The</strong> law is no longer in force, however. 82<br />

84. Finally, <strong>the</strong> same year saw <strong>the</strong> Government <strong>of</strong> India amend <strong>the</strong> Information<br />

Technology Act, 2000, to provide for <strong>the</strong> <strong>of</strong>fence <strong>of</strong> “cyber terrorism” (section 66F)<br />

and o<strong>the</strong>r <strong>Internet</strong>-related issues.<br />

85. Never<strong>the</strong>less, internationally, with some exceptions, in <strong>the</strong> absence <strong>of</strong> any universal<br />

instrument imposing an express obligation to enact legislation specifically targeting<br />

terrorist activity over <strong>the</strong> <strong>Internet</strong>, most Governments have elected to deal with such<br />

threats by using a mixed approach, utilizing a combination <strong>of</strong> general criminal laws, as<br />

well as cybercrime and counter-terrorism legislation. In some States, for example,<br />

criminal laws focus on substantive criminal acts without differentiating among <strong>the</strong><br />

specific means by which <strong>the</strong>y are committed. Under this approach, <strong>the</strong> <strong>Internet</strong> is<br />

regarded as merely a tool by which terrorists commit a substantive crime, <strong>of</strong>ten contained<br />

within <strong>the</strong> provisions <strong>of</strong> <strong>the</strong> national penal code.<br />

86. This is <strong>the</strong> approach in China, where <strong>the</strong> Criminal Law <strong>of</strong> <strong>the</strong> People’s Republic<br />

<strong>of</strong> China contains an article dealing with <strong>the</strong> criminalization <strong>of</strong> all illegal activities<br />

involving <strong>the</strong> <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong>. Article 287 <strong>of</strong> <strong>the</strong> Criminal Law makes it an <strong>of</strong>fence<br />

to <strong>use</strong> a computer in <strong>the</strong> commission <strong>of</strong> an <strong>of</strong>fence, which will be prosecuted and<br />

sentenced in accordance with <strong>the</strong> relevant criminalization and sentencing provisions in<br />

that law. In this way, under Chinese criminal law, <strong>the</strong> <strong>use</strong> <strong>of</strong> <strong>Internet</strong> is regarded as a<br />

medium or tool through which a criminal act may be committed, ra<strong>the</strong>r than an independent<br />

constituent element <strong>of</strong> <strong>the</strong> crime, and is <strong>the</strong>refore criminalized within <strong>the</strong><br />

substantive provisions <strong>of</strong> <strong>the</strong> criminal law.<br />

87. In <strong>the</strong> terrorism context, in China <strong>the</strong>re are provisions criminalizing different forms<br />

<strong>of</strong> terrorist activities, including article 120 <strong>of</strong> <strong>the</strong> Criminal Law, which criminalizes<br />

activities related to organizing, leading and participating in terrorist organizations. This<br />

broad criminalization provision covers a wide range <strong>of</strong> terrorism-related activities,<br />

including those carried out over <strong>the</strong> <strong>Internet</strong>.<br />

80 Federal Law No. (2) <strong>of</strong> 2006 on <strong>the</strong> Prevention <strong>of</strong> Information Technology Crimes, Official Gazette <strong>of</strong> <strong>the</strong> United<br />

Arab Emirates, vol. 442, 36th year, Muharam 1427 H/January 2006 (un<strong>of</strong>ficial English translation available from<br />

www.aecert.ae/pdfs/Prevention_<strong>of</strong>_Information_Technology_Crimes_English.pdf).<br />

81 David Westley, “Saudi tightens grip on <strong>Internet</strong> <strong>use</strong>”, Arabian Business, 26 January 2008.<br />

82 “Pakistan lacks laws to combat cyber terrorism”, <strong>The</strong> New New <strong>Internet</strong>, available from www.<strong>the</strong>newnew<strong>Internet</strong>.<br />

com/2010/09/01/pakistan-lacks-laws-to-combat-cyber-terrorism.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!