THE INTERNET and TERRORISM EXPRESSION CRIME WHERE IS the NEW BOUNDARY? Diritto Penale (IUS/17)

Total Page:16

File Type:pdf, Size:1020Kb

THE INTERNET and TERRORISM EXPRESSION CRIME WHERE IS the NEW BOUNDARY? Diritto Penale (IUS/17) UNIVERSITA’ DEGLI STUDI DI MILANO Dipartimento di Scienze Giuridiche “C. Beccaria” Dottorato di ricerca di Scienze Giuridiche "Cesare Beccaria" Curriculum Diritto Penale e Processuale Penale XXXI ciclo THE INTERNET AND TERRORISM EXPRESSION CRIME WHERE IS THE NEW BOUNDARY? Diritto penale (IUS/17) Relatore: Prof. Gian Luigi Gatta Correlatore: Prof. Francesco Viganò Tesi di Laurea di: Yan DONG Matr. R11316 Anno Accademico 2018/2019 Abstract The main purpose of this thesis is to figure out the new boundary of terrorism expression crime in the internet age. Before answering this question, it provided the empirical evidence of how terrorists are radicalized by the terrorism propaganda online and proposed a new theoretical framework to explain this phenomenon. Accordingly, how the legal framework evolved during the past years to combat this phenomenon was reviewed. By comparing the national laws and typical boundary cases in the Supreme Court of the US, the UK and Italy, it finally proposed some suggestions for Chinese criminal justice system to find a balancing roadmap in terms of combating modern terrorism expression offenses while protecting freedom of expression, taking considerations of the constitutional context in different countries. October 2018 Milan 1 1. Introduction ···································································································································· 4 2. The role of Internet and modern terrorism ····················································································· 5 2.1. The young foreign fighters .......................................................................................................... 6 2.1.1 The case of the youngest suicide bomber in the UK ................................................. 6 2.1.2 ISIS is alluring a younger generation of foreign fighters through the internet .......... 7 2.1.3 Penetration of the internet among the young ........................................................... 10 2.2. The women who travelled to Syria and Iraq ............................................................................. 16 2.2.1 The case of Lady Jihad in Italy ............................................................................... 16 2.2.2. Women influenced by ISIS‘ modern ―black propaganda‖ strategy ........................ 18 2.2.3 Women‘s strengthened role in terrorism recruitment through the internet .............. 20 2.3. The lone wolves ........................................................................................................................ 23 2.3.1. The case of a serial lone wolf in France ................................................................. 23 2.3.2 The internet facilitates lone-wolf attacks ................................................................ 24 3. A theoretical framework of the function of information and communication in modern terrorism30 3.1 Theories of information and communication mechanism in terrorism ...................................... 32 3.1.1 The communicative theories of terrorism ............................................................... 32 3.1.2. The triangle of Terrorism- Radicalized Victim-Target ........................................... 34 3.2 Information manipulation on individuals: taking ISIS as an example ....................................... 36 3.2.1. Emotional manipulation: pursuing the subservience of people at the cost of ruining human dignity and the right to life ...................................................................... 36 3.2.2. Behavioral manipulation: enlarging a group by fabricating and eschewing information ....................................................................................................................... 39 3.2.3. Cognitive manipulation: indoctrinating and training youths regardless of their physical and mental well-being ........................................................................................ 40 3.3 Turing people into tools of terror dissemination ........................................................................ 43 3.3.1. The priority of disseminating the terror message by self-reporting ....................... 43 3.3.2. The incitement speech: impetus of the terror spreading ―machine‖ ....................... 44 3.3.3. The echoes of glorification: maintaining the continuance of terror attacks ........... 47 4. The political and legal frameworks for combating modern terrorism from 2001 to 2017 at UN and European level ··························································································································· 50 4.1 The introduction of legal and political frameworks within the UN system and the European institutions ........................................................................................................................................ 52 4.2. The UN and EU legal framework from 2001 to 2010 ............................................................... 55 4.2.1. UN Resolution 1373(2001), 1624 (2005), EU Framework Decision 2002 and the Council of Europe Convention on the Prevention of Terrorism (2005) ........................... 55 4.2.2. UN Global Counter Terrorism Strategy 2006, EU Framework Decision 2008 and UN Resolutions 1963 (2010) ........................................................................................... 62 4.3 The UN, EU and OSCE legal and political frameworks to respond to foreign fighters and their recruitment from 2011 to 2017......................................................................................................... 70 4.3.1. The UN Global Counter Terrorism Strategy implementation reports, UN Resolutions 2170(2014) and 2178(2014) ......................................................................... 73 4.3.2. The EU legal Framework updates and OSCE recommendations ........................... 82 5. Terrorism expression crimes with the use of the internet in the jurisprudence of the US, the UK 2 and Italy ··········································································································································· 89 5.1. The incitement to terrorism offenses in the US jurisprudence .................................................. 89 5.1.1. The Material Support for Terrorism Statute and its constitutional review by the Supreme Court ................................................................................................................. 90 5.1.2. The interpretation of US v. Mehanna in the Supreme Court: ―indirect connection‖, intermediate theory and the ―real coordination‖ standard ................................................ 98 5.2. The terrorist possession offense in the UK jurisprudence ....................................................... 102 5.2.1. Section 57 and 58 of the Terrorism Act 2000 and parliament‘s ambiguous intention ......................................................................................................................... 104 5.2.2. The narrow constructions on ―likely to be useful‖ and ―reasonable excuse‖: different interpretations between 1996 and 2009 ........................................................... 106 5.3 The glorification of terrorism offense in the Italian Jurisprudence .......................................... 112 5.3.1. Article 414 of the Italian criminal law code, its constitutional review and the ―concrete danger‖ standard before 2015 ........................................................................ 114 5.3.2. The case of Halili El Mahdi, the current ―concrete danger‖ standard and the changing criminal policy ................................................................................................ 117 6. Combating modern terrorism in China: compared conclusions and future developments ········· 121 6.1. Historical terrorism issue background, modern terrorism and its exhaustive criminalization in China .............................................................................................................................................. 121 6.2. A broader sanction scope on modern terrorism expression crimes in Chinese courts ............. 126 6.3. Conclusions: the roadmap for China‘s criminal justice system to protect freedom of expression130 Reference ······································································································································· 136 3 1. Introduction Since the 9/11 event in 2001, the form of terrorism attacks had been evolved along with the growth of ISIS, the increased penetration of internet and the globalization process. The internet had facilitated different types of terrorists‘ attacks and made individuals to became radicalized into lone-wolves and foreign terrorist fighters. Part II of this thesis figured out some empirical evidence of this phenomena and Part III elaborated how theories of communicative theories and triangle of terrorism-radicalization victim-target could be applied to explain these currernt phenomena. Part IV reviewed how the legal and political framework had changed to confront the new form of terrorism crimes with the use of internet. It had made the question of ―where is the new boundary of terrorism expression crimes‖ an important inquiry in jurisprudences of different countries. Part V in this study explored how far terrorism expression offenses are criminalized in the US, the UK and Italy and analyzed the underlying rations and related theories derived from the typical cases in the Supreme
Recommended publications
  • PRISM Syrian Supplemental
    PRISM syria A JOURNAL OF THE CENTER FOR COMPLEX OPERATIONS About PRISM PRISM is published by the Center for Complex Operations. PRISM is a security studies journal chartered to inform members of U.S. Federal agencies, allies, and other partners Vol. 4, Syria Supplement on complex and integrated national security operations; reconstruction and state-building; 2014 relevant policy and strategy; lessons learned; and developments in training and education to transform America’s security and development Editor Michael Miklaucic Communications Contributing Editors Constructive comments and contributions are important to us. Direct Alexa Courtney communications to: David Kilcullen Nate Rosenblatt Editor, PRISM 260 Fifth Avenue (Building 64, Room 3605) Copy Editors Fort Lesley J. McNair Dale Erikson Washington, DC 20319 Rebecca Harper Sara Thannhauser Lesley Warner Telephone: Nathan White (202) 685-3442 FAX: (202) 685-3581 Editorial Assistant Email: [email protected] Ava Cacciolfi Production Supervisor Carib Mendez Contributions PRISM welcomes submission of scholarly, independent research from security policymakers Advisory Board and shapers, security analysts, academic specialists, and civilians from the United States Dr. Gordon Adams and abroad. Submit articles for consideration to the address above or by email to prism@ Dr. Pauline H. Baker ndu.edu with “Attention Submissions Editor” in the subject line. Ambassador Rick Barton Professor Alain Bauer This is the authoritative, official U.S. Department of Defense edition of PRISM. Dr. Joseph J. Collins (ex officio) Any copyrighted portions of this journal may not be reproduced or extracted Ambassador James F. Dobbins without permission of the copyright proprietors. PRISM should be acknowledged whenever material is quoted from or based on its content.
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • Afghan Women at the Crossroads: Agents of Peace—Or Its Victims?
    AFGHAN WOMEN AT THE CROSSROADS: AGENTS OF PEACE—OR ITS VICTIMS? ORZALA ASHRAF NEMAT A CENTURY FOUNDATION REPORT The Century Foundation Headquarters: 41 East 70th Street, New York, New York 10021 D 212.535.4441 D.C.: 1333 H Street, N.W., 10th floor, Washington, D.C. 20005 D 202.387.0400 THE CENTURY FOUNDATION PROJECT ON AFGHANISTAN IN ITS REGIONAL AND MULTILATERAL DIMENSIONS This paper is one of a series commissioned by The Century Foundation as part of its project on Afghanistan in its regional and multilateral dimensions. This initiative is examining ways in which the international community may take greater collective responsibility for effectively assisting Afghanistan’s transition from a war-ridden failed state to a fragile but reasonably peaceful one. The program adds an internationalist and multilateral lens to the policy debate on Afghanistan both in the United States and globally, engaging the representatives of governments, international nongovernmental organizations, and the United Nations in the exploration of policy options toward Afghanistan and the other states in the region. At the center of the project is a task force of American and international figures who have had significant governmental, nongovernmental, or UN experience in the region, co-chaired by Lakhdar Brahimi and Thomas Pickering, respectively former UN special representative for Afghanistan and former U.S. undersecretary of state for political affairs. The views expressed in this paper are those of the authors. Nothing written here is to be construed as necessarily reflecting the views of The Century Foundation or as an attempt to aid or hinder the passage of any bill before Congress.
    [Show full text]
  • Voluntary Refusal to Commit a Crime: Significance, General and Special Signs
    1884 International Journal of Criminology and Sociology, 2020, 9, 1884-1888 Voluntary Refusal to Commit a Crime: Significance, General and Special Signs Sergej N. Bezugly, Evgenij A. Ignatenko*, Elena F. Lukyanchikova, Oksana S. Shumilina and Natalia Yu. Zhilina Belgorod State University, 85 Pobedy Street, Belgorod, 308015, Russian Federation Abstract: The article describes and examines the significance of the rule of the voluntary refusal to commit a crime, as well as explores its general and special signs. It is noted that the voluntary refusal to commit a crime is the rule contained in any modern, progressive law. In this vein, there are different theoretical approaches to the determination of its value and signs. The signs are debatable in nature, and their establishment by the law enforcer may cause difficulties. The difference between voluntary refusal to commit a crime, which is implemented in three functions, is determined, definitions of general signs of voluntary refusal are proposed, their content is clarified. Special signs of voluntary refusal are disclosed. Keywords: Voluntary refusal to commit a crime, signs of voluntary refusal, stages of a crime, preparation for a crime, attempted crime, criminal liability. INTRODUCTION instance, Greenawalt investigates communications that can lead to antisocial behaviour. Moreover, he Each rule of criminal law has its significance, which concentrates on criminal counselling and vaguer is subject to theoretical understanding. Voluntary advocacy of crime, that is to say, definitions refusal to commit a crime implements several encouraging illegal actions. However, the discussion necessary socially useful, humanistic, economic also covers provocative comments that trigger hostile, functions. violent responses, as well as to disclosures of the reality that supplies incentives to commit crimes or help The issue of signs of voluntary refusal is highly with their commission.
    [Show full text]
  • Crisiswatch, Nr. 73
    1 September 2009, No73 Board of Trustees Co-Chairs CrisisWatch: Christopher Patten summarises briefly developments during the previous month in some 70 situations of current or potential Thomas Pickering conflict, listed alphabetically by region, providing references and links to more detailed information sources (all references mentioned are hyperlinked in the electronic version of this bulletin); President and CEO assesses whether the overall situation in each case has, during the previous month, significantly deteriorated, Louise Arbour significantly improved, or on balance remained more or less unchanged; alerts readers to situations where, in the coming month, there is a particular risk of new or significantly Executive Committee escalated conflict, or a particular conflict resolution opportunity (noting that in some instances there may in Morton Abramowitz Emma Bonino* fact be both); and Cheryl Carolus summarises Crisis Group’s reports and briefing papers that have been published in the last month. Maria Livanos Cattaui Yoichi Funabashi CrisisWatch is compiled by Crisis Group’s Brussels Research Unit, drawing on multiple sources including Frank Giustra the resources of our some 130 staff members across five continents, who already report on some 60 of the Stephen Solarz situations listed here. Comments and suggestions can be sent to [email protected]. George Soros Pär Stenbäck To search past issues of CrisisWatch visit our databases and resources page at www.crisisgroup.org. *Vice-Chair Adnan Abu-Odeh August 2009 Trends Kenneth Adelman Turki al-Faisal Deteriorated Situations Improved Situations Kofi Annan Louise Arbour Chechnya (Russia) (p. 8) Armenia/Turkey (p. 8) Richard Armitage Niger (p. 4) Mali (p. 4) Paddy Ashdown North Caucasus (non-Chechnya) (p.
    [Show full text]
  • Cyber Terrorism Best Practices Analysis
    Funded by the European Commission Seventh Framework Programme CyberROAD Development of the Cybercrime and Cyber-terrorism Research Roadmap Grant Agreement N. 607642 D 6.3 – Cyber Terrorism Best Practices Analysis Date of deliverable: 30/09/2015 Actual submission date: 30/09/2015 Start date of the Project: 1st June 2014 Duration: 24 months Coordinator: UNICA – University of Cagliari, PRA Lab - Pattern Recognition and Applications Lab Version: 2.2 Project funded by the European Commission Directorate-General Home Affairs in the Prevention of and Fight against Crime Programme Restriction Level PU Public No PP Restricted to other programme participants (including the Commission services) No RE Restricted to a group specified by the consortium (including the Commission services) No CO Confidential, only for members of the consortium (including the Commission) Yes D6.2 Cyber Terrorism - Preliminary Best Practices Analysis Funded by the European Commission under the Seventh Framework Programme Page 1 of 23 Revision history Version Object Date Author(s) 0.1 Creation 05/03/2015 INOV, PJ 1.0 Revision 1 13/03/2015 INOV, PJ 1.1 Revision 2 18/03/2015 INOV, PJ, INDRA 2.0 Revision 3 17/09/2015 INOV, MELANI, FORTH, CYBERDEFCON 2.1 Revision 4 24/09/2015 INOV, HMoD 2.2 Final 30/09/2015 INOV D6.2 Cyber Terrorism - Preliminary Best Practices Analysis Funded by the European Commission under the Seventh Framework Programme Page 2 of 23 D6.3 Cyber Terrorism - Best Practices Analysis Responsible INOV Contributors PJ INDRA FORTH-ICS CYBERDEFCON HMoD MELANI Summary: Focused on cyber terrorism, this deliverable was divided into two releases: a preliminary best practices analysis (D6.2) and a final best practices analysis document (D6.3).
    [Show full text]
  • The International Clean IT Project Is Initiated by the Netherlands
    1 Clean IT Project To whom it may concern Return adress: Ministry of Security and Justice / NCTV Oranjebuitensingel 25 2511 VE The Hague PO box 16950 2500 BZ The Hague www.nctv.nl Email: [email protected] URL: www.cleanITproject.eu Date 16 November 2011 Concerning Progress Report Clean IT project With the financial support from the Prevention of and Clean IT Fight against Crime Programme of the European The international Clean IT project is initiated by the Netherlands, Belgium, Germany, the Union United Kingdom and Spain and is partly funded by the European Commission. The European Commission – main goal of the Clean IT project is to initiate cooperation between public and private Directorate-General Justice, partners to counter the illegal use of the internet by terrorists. This will be done Freedom and Security through a series of workshops and conferences in Europe. Public and private partners will define their problems and try to establish a non-regulatory, pragmatic and transparent form of cooperation. EuroDIG in Belgrade During the European Dialogue on Internet Governance (2011 EuroDIG conference, May 31st) in Belgrade, the project partners had their kick-off meeting and discussed the scope of the project. The partners agreed that the project will focus on Al Qaïda influenced content. In the plenary cybersecurity session at the EuroDIG conference, the start of this project was announced. The Amsterdam workshop The first workshop took place in Amsterdam on October 24-25. A mix of public and private organizations was present to discuss illegal use of the internet. The fact that there is misuse of the internet, including cybercrime, hate speech, discrimination, illegal software, child pornography and terrorism, was not disputed.The internet is used by terrorists and extremists to spread violent images and propaganda material, glorify and encourage violence, radicalize and recruit individuals, spread training manuals and other knowledge on how to commit violent acts, and the internet is even used to plan and organize deadly attacks.
    [Show full text]
  • The Abandonment Defense
    European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 03, 2020 3122 THE ABANDONMENT DEFENSE Dildora Kamalova Tashkent State University of Law, Republic of Uzbekistan Abstract: In this article, the author analysed the role, significance and need for the correct determination of the motive for the pre-crime abandonment based on the analysis of a judgment, and also developed scientific conclusions on this issue. Key words: voluntary renunciation, motivation, volunteering, finality, preparation for crime, criminal attempt, rape, forceful sexual intercourse in unnatural form INTRODUCTION The adoption of the Criminal Code of the Republic of Uzbekistan in 1994 (1994) marked a new stage in the development of the criminal law, which establishes responsibility for the stages of crime. The legislature, after analyzing law enforcement practices, has seriously revised its criminal law provisions. Thus, a new chapter entitled "Incomplete Crimes" was added to the Code. It is noteworthy that for the first time in criminal law the concept of "incomplete crimes" was used. Article 25 of the Criminal Code is called preparation for a crime and attempt to commit a crime, and Article 26 of the Criminal Code is entitled "voluntary return from the commission of a crime", which includes the concept of voluntary return from a crime, its signs and legal consequences. It is crucially and globally important to apply properly criminal law norms in regard inchoate crimes, differentiation of sentencing for preparation of an offence and criminal attempt, individualizing punishment of convicts, properly identify the features of pre-crime abandonment, differ it from inchoate offence and finally rewarding active and good behavior which is aimed at deterring a crime.
    [Show full text]
  • The New Netwar
    The New Netwar: Countering Extremism Online Dr Martyn Frampton with Dr Ali Fisher and Dr Nico Prucha Foreword by General David H. Petraeus (US Army, Ret.) The New Netwar: Countering Extremism Online The New Netwar: Countering Extremism Online Dr Martyn Frampton With Dr Ali Fisher and Dr Nico Prucha Foreword by General David H. Petraeus (US Army, Ret.) Policy Exchange is the UK’s leading think tank. We are an educational charity whose mission is to develop and promote new policy ideas that will deliver better public services, a stronger society and a more dynamic economy. Registered charity no: 1096300. Policy Exchange is committed to an evidence-based approach to policy development. We work in partnership with academics and other experts and commission major studies involving thorough empirical research of alternative policy outcomes. We believe that the policy experience of other countries offers important lessons for government in the UK. We also believe that government has much to learn from business and the voluntary sector. Trustees Diana Berry, Andrew Feldman, Candida Gertler, Greta Jones, Edward Lee, Charlotte Metcalf, Roger Orf, Krishna Rao, Andrew Roberts, George Robinson, Robert Rosenkranz, Peter Wall. policyexchange.org.uk | 2 The New Netwar: Countering Extremism Online About the Authors Dr Martyn Frampton is a Reader in Modern History at Queen Mary University of London. He is the author of three books on ‘the Troubles’ in Northern Ireland and more recently has completed a major book on the history of the relationship between the Muslim Brotherhood and the West, which is due to be published by Harvard University Press in late 2017.
    [Show full text]
  • International Initiatives Committee Book Discussion
    INTERNATIONAL INITIATIVES COMMITTEE BOOK DISCUSSION POSSIBILITIES Compiled by Krista Hartman, updated 12/2015 All titles in this list are available at the MVCC Utica Campus Library. Books already discussed: Achebe, Chinua. Things Fall Apart. (Nigeria ; Fiction) Badkken, Anna. Peace Meals: Candy-Wrapped Kalashnikovs and Other War Stories. Cohen, Michelle Corasanti. The Almond Tree. (Palestine/Israel/US ; Fiction) Hosseini, Khaled. A Thousand Splendid Suns. (Afghanistan ; Fiction) Lahiri, Jhumpa. The Namesake. (East Indian immigrants in US ; Fiction) Maathai, Wangari. Unbowed: a Memoir. (Kenya) Menzel, Peter & D’Alusio, Faith. Hungry Planet: What the World Eats. Barolini, Helen. Umbertina. (Italian American) Spring 2016 selection: Running for My Life by Lopez Lomong (Sudan) (see below) **************************************************************************************** Abdi, Hawa. Keeping Hope Alive: One Woman—90,000 Lives Changed. (Somalia) The moving memoir of one brave woman who, along with her daughters, has kept 90,000 of her fellow citizens safe, healthy, and educated for over 20 years in Somalia. Dr. Hawa Abdi, "the Mother Teresa of Somalia" and Nobel Peace Prize nominee, is the founder of a massive camp for internally displaced people located a few miles from war-torn Mogadishu, Somalia. Since 1991, when the Somali government collapsed, famine struck, and aid groups fled, she has dedicated herself to providing help for people whose lives have been shattered by violence and poverty. She turned her 1300 acres of farmland into a camp that has numbered up to 90,000 displaced people, ignoring the clan lines that have often served to divide the country. She inspired her daughters, Deqo and Amina, to become doctors. Together, they have saved tens of thousands of lives in her hospital, while providing an education to hundreds of displaced children.
    [Show full text]
  • Transitional Justice and Violent Extremism
    i n s t i t u t e f o r i n t e g r at e d t r a n s i t i o n s Transitional Justice and Violent Extremism September 2020 About IFIT The Institute for Integrated Transitions (IFIT) aims to help fragile and conflict-affected states achieve more sustainable transitions out of war or authoritarianism by serving as an inde- pendent expert resource for locally-led efforts to improve political, economic, social and security conditions. IFIT seeks to transform current practice away from fragmented inter- ventions and toward more integrated solutions that strengthen peace, democracy and human rights in countries attempting to break cycles of conflict or repression. The ideas in this publication are informed by the diverse global experiences of IFIT’s Law and Peace Practice Group, whose members have had direct involvement in the negotia- tion of amnesty and accountability issues in over 20 countries. About the Project This publication is part of a project that aims to fill a major gap in policy making: the fail- ure to integrate lessons learnt and best practices from the field of transitional justice in relation to conflict resolution strategies with two kinds of unconventional armed actors: 1) “violent extremist” groups, such as jihadists; and 2) organised crime groups, such as mafia, gang networks and drug cartels. IFIT’s work on the former began in 2017 with the UN University Centre for Policy Research (UNU-CPR). The project was concerned with the fact that, to date, what has reigned is an overwhelmingly punitive and dragnet approach which, rather than helping address root causes and break cycles of resentment and vio- lence, instead risks renewing or reinforcing them.
    [Show full text]
  • From Internet Referral Units to International Agreements: Censorship of the Internet by the Uk and Eu
    FROM INTERNET REFERRAL UNITS TO INTERNATIONAL AGREEMENTS: CENSORSHIP OF THE INTERNET BY THE UK AND EU Brian Chang* TABLE OF CONTENTS I. Internet Referral Units .................................. 116 A. Setting the Scene: UK and EU Law and Policy Toward Censorship of Extremist Content Online .............. ..... 116 B. The UK Counter Terrorism Internet Referral Unit.................126 (1) Background ...................................... 126 (2) Modus Operandi ..................................... 129 (3) Aggregate Statistics and Lack of Transparency ................. 130 (4) Future Directions? .................................... 132 C. The EU IRU........................................ 133 (1) Background ................................. ..... 133 (2) Modus Operandi ...................... .............. 134 (3) Mission Creep ....................................... 139 (4) Statistics ........................................ 140 (5) Future Directions ............................ ..... 142 D. Criticisms of IRUs. ............................. ...... 143 * Brian Chang is a Research Assistant with the University of Oxford's Parliaments, Rule of Law and Human Rights research project. He graduated from the University of Oxford with a B.A. (Hons.) in Jurisprudence and received an LL.M. (with Highest Honors) in International and Comparative Law from The George Washington University Law School, where he was also a Thomas Buergenthal Scholar. He would like to thank Professors Dawn Nunziato and Arturo Carrillo for their help and encouragement, Cynthia Wong and Emma Llanso for inspiring this topic, Alexandra Bornstein and the rest of the editors at Columbia for their tireless editorial assistance, and his family and partner for their never- ending support. The views presented here and any errors are the author's alone and should not be attributed to any of the persons or organizations he has had the good fortune of working with. 2018] From Internet Referral Units to InternationalAgreements 115 II. The International Human Rights Law Framework.....
    [Show full text]