The use of the Internet
The use of the Internet
The use of the Internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
C. legislation<br />
1. Criminalization<br />
CHAPTER III. POlICy AND lEGISlATIvE FRAMEwORKS<br />
93. As stated above, none <strong>of</strong> <strong>the</strong> universal instruments against terrorism impose an<br />
obligation on States to enact legislation specifically targeting <strong>the</strong> <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong> by<br />
terrorists. Accordingly, while it is <strong>the</strong>refore highly likely that most terrorism cases will<br />
involve some <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong> by perpetrators, it is likely that in many States, in<br />
addition to using <strong>of</strong>fence provisions related to unlawful conduct specified in universal<br />
instruments, authorities will also be reliant on o<strong>the</strong>r criminal <strong>of</strong>fence provisions under<br />
<strong>the</strong>ir penal codes, including inchoate <strong>of</strong>fences such as conspiracy, solicitation and criminal<br />
association, in order to prosecute <strong>of</strong>fenders.<br />
94. In <strong>the</strong> present section, examples <strong>of</strong> different legislative provisions from some<br />
States are considered, with a view to identifying approaches that might provide <strong>the</strong><br />
basis for effective criminal justice responses to different types <strong>of</strong> conduct.<br />
(a) <strong>Internet</strong>-based acts or statements supporting terrorism<br />
95. In addition to acts associated with <strong>the</strong> commission <strong>of</strong> substantive terrorist acts<br />
(e.g. terrorist bombings), <strong>the</strong>re is clear evidence that <strong>the</strong> <strong>Internet</strong> is increasingly being<br />
<strong>use</strong>d by terrorists to carry out support actions such as recruiting and training members,<br />
sharing <strong>use</strong>ful information, disseminating propaganda and inciting <strong>the</strong> commission <strong>of</strong><br />
acts <strong>of</strong> terrorism. Owing to <strong>the</strong> configuration and global reach <strong>of</strong> <strong>the</strong> <strong>Internet</strong>, it is<br />
increasingly likely that <strong>the</strong>se types <strong>of</strong> activities may involve different actors being physically<br />
present in different legal jurisdictions.<br />
96. In <strong>the</strong> United Kingdom, part VI <strong>of</strong> <strong>the</strong> Terrorism Act 2000 contains several<br />
<strong>of</strong>fences that can provide <strong>the</strong> basis for charging individuals who have <strong>use</strong>d <strong>the</strong> <strong>Internet</strong><br />
to support terrorist activities.<br />
97. Section 54 <strong>of</strong> <strong>the</strong> Act makes it an <strong>of</strong>fence to provide, receive or invite o<strong>the</strong>rs to<br />
receive instruction or training in <strong>the</strong> making or <strong>use</strong> <strong>of</strong> firearms, radioactive material or<br />
related weapons, explosives or chemical, biological or nuclear weapons.<br />
98. Section 57 makes it an <strong>of</strong>fence to possess articles in circumstances that give rise<br />
to a reasonable suspicion that a person has such articles in connection with <strong>the</strong> preparation,<br />
instigation or commission <strong>of</strong> an act <strong>of</strong> terrorism. In recent years, this <strong>of</strong>fence<br />
has been <strong>use</strong>d to successfully prosecute several individuals who have been found in<br />
possession <strong>of</strong> items as diverse as hard drives, DVDs and instructional documents on<br />
how to make or operate items such as mortars, suicide vests and napalm. 84 For <strong>the</strong>re<br />
to have been a commission <strong>of</strong> this <strong>of</strong>fence, <strong>the</strong> prosecution must prove a connection<br />
between <strong>the</strong> article in question and a specific act <strong>of</strong> terrorism. <strong>The</strong>re have been several<br />
84 Susan Hemming, “<strong>The</strong> practical application <strong>of</strong> counter-terrorism legislation in England and Wales: a prosecutor’s<br />
perspective”, International Affairs, vol. 86, No. 4 (July 2010), p. 963.<br />
31