01.06.2013 Views

The use of the Internet

The use of the Internet

The use of the Internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C. legislation<br />

1. Criminalization<br />

CHAPTER III. POlICy AND lEGISlATIvE FRAMEwORKS<br />

93. As stated above, none <strong>of</strong> <strong>the</strong> universal instruments against terrorism impose an<br />

obligation on States to enact legislation specifically targeting <strong>the</strong> <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong> by<br />

terrorists. Accordingly, while it is <strong>the</strong>refore highly likely that most terrorism cases will<br />

involve some <strong>use</strong> <strong>of</strong> <strong>the</strong> <strong>Internet</strong> by perpetrators, it is likely that in many States, in<br />

addition to using <strong>of</strong>fence provisions related to unlawful conduct specified in universal<br />

instruments, authorities will also be reliant on o<strong>the</strong>r criminal <strong>of</strong>fence provisions under<br />

<strong>the</strong>ir penal codes, including inchoate <strong>of</strong>fences such as conspiracy, solicitation and criminal<br />

association, in order to prosecute <strong>of</strong>fenders.<br />

94. In <strong>the</strong> present section, examples <strong>of</strong> different legislative provisions from some<br />

States are considered, with a view to identifying approaches that might provide <strong>the</strong><br />

basis for effective criminal justice responses to different types <strong>of</strong> conduct.<br />

(a) <strong>Internet</strong>-based acts or statements supporting terrorism<br />

95. In addition to acts associated with <strong>the</strong> commission <strong>of</strong> substantive terrorist acts<br />

(e.g. terrorist bombings), <strong>the</strong>re is clear evidence that <strong>the</strong> <strong>Internet</strong> is increasingly being<br />

<strong>use</strong>d by terrorists to carry out support actions such as recruiting and training members,<br />

sharing <strong>use</strong>ful information, disseminating propaganda and inciting <strong>the</strong> commission <strong>of</strong><br />

acts <strong>of</strong> terrorism. Owing to <strong>the</strong> configuration and global reach <strong>of</strong> <strong>the</strong> <strong>Internet</strong>, it is<br />

increasingly likely that <strong>the</strong>se types <strong>of</strong> activities may involve different actors being physically<br />

present in different legal jurisdictions.<br />

96. In <strong>the</strong> United Kingdom, part VI <strong>of</strong> <strong>the</strong> Terrorism Act 2000 contains several<br />

<strong>of</strong>fences that can provide <strong>the</strong> basis for charging individuals who have <strong>use</strong>d <strong>the</strong> <strong>Internet</strong><br />

to support terrorist activities.<br />

97. Section 54 <strong>of</strong> <strong>the</strong> Act makes it an <strong>of</strong>fence to provide, receive or invite o<strong>the</strong>rs to<br />

receive instruction or training in <strong>the</strong> making or <strong>use</strong> <strong>of</strong> firearms, radioactive material or<br />

related weapons, explosives or chemical, biological or nuclear weapons.<br />

98. Section 57 makes it an <strong>of</strong>fence to possess articles in circumstances that give rise<br />

to a reasonable suspicion that a person has such articles in connection with <strong>the</strong> preparation,<br />

instigation or commission <strong>of</strong> an act <strong>of</strong> terrorism. In recent years, this <strong>of</strong>fence<br />

has been <strong>use</strong>d to successfully prosecute several individuals who have been found in<br />

possession <strong>of</strong> items as diverse as hard drives, DVDs and instructional documents on<br />

how to make or operate items such as mortars, suicide vests and napalm. 84 For <strong>the</strong>re<br />

to have been a commission <strong>of</strong> this <strong>of</strong>fence, <strong>the</strong> prosecution must prove a connection<br />

between <strong>the</strong> article in question and a specific act <strong>of</strong> terrorism. <strong>The</strong>re have been several<br />

84 Susan Hemming, “<strong>The</strong> practical application <strong>of</strong> counter-terrorism legislation in England and Wales: a prosecutor’s<br />

perspective”, International Affairs, vol. 86, No. 4 (July 2010), p. 963.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!