THE INTERNET and TERRORISM EXPRESSION CRIME WHERE IS the NEW BOUNDARY? Diritto Penale (IUS/17)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
PRISM Syrian Supplemental
PRISM syria A JOURNAL OF THE CENTER FOR COMPLEX OPERATIONS About PRISM PRISM is published by the Center for Complex Operations. PRISM is a security studies journal chartered to inform members of U.S. Federal agencies, allies, and other partners Vol. 4, Syria Supplement on complex and integrated national security operations; reconstruction and state-building; 2014 relevant policy and strategy; lessons learned; and developments in training and education to transform America’s security and development Editor Michael Miklaucic Communications Contributing Editors Constructive comments and contributions are important to us. Direct Alexa Courtney communications to: David Kilcullen Nate Rosenblatt Editor, PRISM 260 Fifth Avenue (Building 64, Room 3605) Copy Editors Fort Lesley J. McNair Dale Erikson Washington, DC 20319 Rebecca Harper Sara Thannhauser Lesley Warner Telephone: Nathan White (202) 685-3442 FAX: (202) 685-3581 Editorial Assistant Email: [email protected] Ava Cacciolfi Production Supervisor Carib Mendez Contributions PRISM welcomes submission of scholarly, independent research from security policymakers Advisory Board and shapers, security analysts, academic specialists, and civilians from the United States Dr. Gordon Adams and abroad. Submit articles for consideration to the address above or by email to prism@ Dr. Pauline H. Baker ndu.edu with “Attention Submissions Editor” in the subject line. Ambassador Rick Barton Professor Alain Bauer This is the authoritative, official U.S. Department of Defense edition of PRISM. Dr. Joseph J. Collins (ex officio) Any copyrighted portions of this journal may not be reproduced or extracted Ambassador James F. Dobbins without permission of the copyright proprietors. PRISM should be acknowledged whenever material is quoted from or based on its content. -
Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K. -
Afghan Women at the Crossroads: Agents of Peace—Or Its Victims?
AFGHAN WOMEN AT THE CROSSROADS: AGENTS OF PEACE—OR ITS VICTIMS? ORZALA ASHRAF NEMAT A CENTURY FOUNDATION REPORT The Century Foundation Headquarters: 41 East 70th Street, New York, New York 10021 D 212.535.4441 D.C.: 1333 H Street, N.W., 10th floor, Washington, D.C. 20005 D 202.387.0400 THE CENTURY FOUNDATION PROJECT ON AFGHANISTAN IN ITS REGIONAL AND MULTILATERAL DIMENSIONS This paper is one of a series commissioned by The Century Foundation as part of its project on Afghanistan in its regional and multilateral dimensions. This initiative is examining ways in which the international community may take greater collective responsibility for effectively assisting Afghanistan’s transition from a war-ridden failed state to a fragile but reasonably peaceful one. The program adds an internationalist and multilateral lens to the policy debate on Afghanistan both in the United States and globally, engaging the representatives of governments, international nongovernmental organizations, and the United Nations in the exploration of policy options toward Afghanistan and the other states in the region. At the center of the project is a task force of American and international figures who have had significant governmental, nongovernmental, or UN experience in the region, co-chaired by Lakhdar Brahimi and Thomas Pickering, respectively former UN special representative for Afghanistan and former U.S. undersecretary of state for political affairs. The views expressed in this paper are those of the authors. Nothing written here is to be construed as necessarily reflecting the views of The Century Foundation or as an attempt to aid or hinder the passage of any bill before Congress. -
Voluntary Refusal to Commit a Crime: Significance, General and Special Signs
1884 International Journal of Criminology and Sociology, 2020, 9, 1884-1888 Voluntary Refusal to Commit a Crime: Significance, General and Special Signs Sergej N. Bezugly, Evgenij A. Ignatenko*, Elena F. Lukyanchikova, Oksana S. Shumilina and Natalia Yu. Zhilina Belgorod State University, 85 Pobedy Street, Belgorod, 308015, Russian Federation Abstract: The article describes and examines the significance of the rule of the voluntary refusal to commit a crime, as well as explores its general and special signs. It is noted that the voluntary refusal to commit a crime is the rule contained in any modern, progressive law. In this vein, there are different theoretical approaches to the determination of its value and signs. The signs are debatable in nature, and their establishment by the law enforcer may cause difficulties. The difference between voluntary refusal to commit a crime, which is implemented in three functions, is determined, definitions of general signs of voluntary refusal are proposed, their content is clarified. Special signs of voluntary refusal are disclosed. Keywords: Voluntary refusal to commit a crime, signs of voluntary refusal, stages of a crime, preparation for a crime, attempted crime, criminal liability. INTRODUCTION instance, Greenawalt investigates communications that can lead to antisocial behaviour. Moreover, he Each rule of criminal law has its significance, which concentrates on criminal counselling and vaguer is subject to theoretical understanding. Voluntary advocacy of crime, that is to say, definitions refusal to commit a crime implements several encouraging illegal actions. However, the discussion necessary socially useful, humanistic, economic also covers provocative comments that trigger hostile, functions. violent responses, as well as to disclosures of the reality that supplies incentives to commit crimes or help The issue of signs of voluntary refusal is highly with their commission. -
Crisiswatch, Nr. 73
1 September 2009, No73 Board of Trustees Co-Chairs CrisisWatch: Christopher Patten summarises briefly developments during the previous month in some 70 situations of current or potential Thomas Pickering conflict, listed alphabetically by region, providing references and links to more detailed information sources (all references mentioned are hyperlinked in the electronic version of this bulletin); President and CEO assesses whether the overall situation in each case has, during the previous month, significantly deteriorated, Louise Arbour significantly improved, or on balance remained more or less unchanged; alerts readers to situations where, in the coming month, there is a particular risk of new or significantly Executive Committee escalated conflict, or a particular conflict resolution opportunity (noting that in some instances there may in Morton Abramowitz Emma Bonino* fact be both); and Cheryl Carolus summarises Crisis Group’s reports and briefing papers that have been published in the last month. Maria Livanos Cattaui Yoichi Funabashi CrisisWatch is compiled by Crisis Group’s Brussels Research Unit, drawing on multiple sources including Frank Giustra the resources of our some 130 staff members across five continents, who already report on some 60 of the Stephen Solarz situations listed here. Comments and suggestions can be sent to [email protected]. George Soros Pär Stenbäck To search past issues of CrisisWatch visit our databases and resources page at www.crisisgroup.org. *Vice-Chair Adnan Abu-Odeh August 2009 Trends Kenneth Adelman Turki al-Faisal Deteriorated Situations Improved Situations Kofi Annan Louise Arbour Chechnya (Russia) (p. 8) Armenia/Turkey (p. 8) Richard Armitage Niger (p. 4) Mali (p. 4) Paddy Ashdown North Caucasus (non-Chechnya) (p. -
Cyber Terrorism Best Practices Analysis
Funded by the European Commission Seventh Framework Programme CyberROAD Development of the Cybercrime and Cyber-terrorism Research Roadmap Grant Agreement N. 607642 D 6.3 – Cyber Terrorism Best Practices Analysis Date of deliverable: 30/09/2015 Actual submission date: 30/09/2015 Start date of the Project: 1st June 2014 Duration: 24 months Coordinator: UNICA – University of Cagliari, PRA Lab - Pattern Recognition and Applications Lab Version: 2.2 Project funded by the European Commission Directorate-General Home Affairs in the Prevention of and Fight against Crime Programme Restriction Level PU Public No PP Restricted to other programme participants (including the Commission services) No RE Restricted to a group specified by the consortium (including the Commission services) No CO Confidential, only for members of the consortium (including the Commission) Yes D6.2 Cyber Terrorism - Preliminary Best Practices Analysis Funded by the European Commission under the Seventh Framework Programme Page 1 of 23 Revision history Version Object Date Author(s) 0.1 Creation 05/03/2015 INOV, PJ 1.0 Revision 1 13/03/2015 INOV, PJ 1.1 Revision 2 18/03/2015 INOV, PJ, INDRA 2.0 Revision 3 17/09/2015 INOV, MELANI, FORTH, CYBERDEFCON 2.1 Revision 4 24/09/2015 INOV, HMoD 2.2 Final 30/09/2015 INOV D6.2 Cyber Terrorism - Preliminary Best Practices Analysis Funded by the European Commission under the Seventh Framework Programme Page 2 of 23 D6.3 Cyber Terrorism - Best Practices Analysis Responsible INOV Contributors PJ INDRA FORTH-ICS CYBERDEFCON HMoD MELANI Summary: Focused on cyber terrorism, this deliverable was divided into two releases: a preliminary best practices analysis (D6.2) and a final best practices analysis document (D6.3). -
The International Clean IT Project Is Initiated by the Netherlands
1 Clean IT Project To whom it may concern Return adress: Ministry of Security and Justice / NCTV Oranjebuitensingel 25 2511 VE The Hague PO box 16950 2500 BZ The Hague www.nctv.nl Email: [email protected] URL: www.cleanITproject.eu Date 16 November 2011 Concerning Progress Report Clean IT project With the financial support from the Prevention of and Clean IT Fight against Crime Programme of the European The international Clean IT project is initiated by the Netherlands, Belgium, Germany, the Union United Kingdom and Spain and is partly funded by the European Commission. The European Commission – main goal of the Clean IT project is to initiate cooperation between public and private Directorate-General Justice, partners to counter the illegal use of the internet by terrorists. This will be done Freedom and Security through a series of workshops and conferences in Europe. Public and private partners will define their problems and try to establish a non-regulatory, pragmatic and transparent form of cooperation. EuroDIG in Belgrade During the European Dialogue on Internet Governance (2011 EuroDIG conference, May 31st) in Belgrade, the project partners had their kick-off meeting and discussed the scope of the project. The partners agreed that the project will focus on Al Qaïda influenced content. In the plenary cybersecurity session at the EuroDIG conference, the start of this project was announced. The Amsterdam workshop The first workshop took place in Amsterdam on October 24-25. A mix of public and private organizations was present to discuss illegal use of the internet. The fact that there is misuse of the internet, including cybercrime, hate speech, discrimination, illegal software, child pornography and terrorism, was not disputed.The internet is used by terrorists and extremists to spread violent images and propaganda material, glorify and encourage violence, radicalize and recruit individuals, spread training manuals and other knowledge on how to commit violent acts, and the internet is even used to plan and organize deadly attacks. -
The Abandonment Defense
European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 03, 2020 3122 THE ABANDONMENT DEFENSE Dildora Kamalova Tashkent State University of Law, Republic of Uzbekistan Abstract: In this article, the author analysed the role, significance and need for the correct determination of the motive for the pre-crime abandonment based on the analysis of a judgment, and also developed scientific conclusions on this issue. Key words: voluntary renunciation, motivation, volunteering, finality, preparation for crime, criminal attempt, rape, forceful sexual intercourse in unnatural form INTRODUCTION The adoption of the Criminal Code of the Republic of Uzbekistan in 1994 (1994) marked a new stage in the development of the criminal law, which establishes responsibility for the stages of crime. The legislature, after analyzing law enforcement practices, has seriously revised its criminal law provisions. Thus, a new chapter entitled "Incomplete Crimes" was added to the Code. It is noteworthy that for the first time in criminal law the concept of "incomplete crimes" was used. Article 25 of the Criminal Code is called preparation for a crime and attempt to commit a crime, and Article 26 of the Criminal Code is entitled "voluntary return from the commission of a crime", which includes the concept of voluntary return from a crime, its signs and legal consequences. It is crucially and globally important to apply properly criminal law norms in regard inchoate crimes, differentiation of sentencing for preparation of an offence and criminal attempt, individualizing punishment of convicts, properly identify the features of pre-crime abandonment, differ it from inchoate offence and finally rewarding active and good behavior which is aimed at deterring a crime. -
The New Netwar
The New Netwar: Countering Extremism Online Dr Martyn Frampton with Dr Ali Fisher and Dr Nico Prucha Foreword by General David H. Petraeus (US Army, Ret.) The New Netwar: Countering Extremism Online The New Netwar: Countering Extremism Online Dr Martyn Frampton With Dr Ali Fisher and Dr Nico Prucha Foreword by General David H. Petraeus (US Army, Ret.) Policy Exchange is the UK’s leading think tank. We are an educational charity whose mission is to develop and promote new policy ideas that will deliver better public services, a stronger society and a more dynamic economy. Registered charity no: 1096300. Policy Exchange is committed to an evidence-based approach to policy development. We work in partnership with academics and other experts and commission major studies involving thorough empirical research of alternative policy outcomes. We believe that the policy experience of other countries offers important lessons for government in the UK. We also believe that government has much to learn from business and the voluntary sector. Trustees Diana Berry, Andrew Feldman, Candida Gertler, Greta Jones, Edward Lee, Charlotte Metcalf, Roger Orf, Krishna Rao, Andrew Roberts, George Robinson, Robert Rosenkranz, Peter Wall. policyexchange.org.uk | 2 The New Netwar: Countering Extremism Online About the Authors Dr Martyn Frampton is a Reader in Modern History at Queen Mary University of London. He is the author of three books on ‘the Troubles’ in Northern Ireland and more recently has completed a major book on the history of the relationship between the Muslim Brotherhood and the West, which is due to be published by Harvard University Press in late 2017. -
International Initiatives Committee Book Discussion
INTERNATIONAL INITIATIVES COMMITTEE BOOK DISCUSSION POSSIBILITIES Compiled by Krista Hartman, updated 12/2015 All titles in this list are available at the MVCC Utica Campus Library. Books already discussed: Achebe, Chinua. Things Fall Apart. (Nigeria ; Fiction) Badkken, Anna. Peace Meals: Candy-Wrapped Kalashnikovs and Other War Stories. Cohen, Michelle Corasanti. The Almond Tree. (Palestine/Israel/US ; Fiction) Hosseini, Khaled. A Thousand Splendid Suns. (Afghanistan ; Fiction) Lahiri, Jhumpa. The Namesake. (East Indian immigrants in US ; Fiction) Maathai, Wangari. Unbowed: a Memoir. (Kenya) Menzel, Peter & D’Alusio, Faith. Hungry Planet: What the World Eats. Barolini, Helen. Umbertina. (Italian American) Spring 2016 selection: Running for My Life by Lopez Lomong (Sudan) (see below) **************************************************************************************** Abdi, Hawa. Keeping Hope Alive: One Woman—90,000 Lives Changed. (Somalia) The moving memoir of one brave woman who, along with her daughters, has kept 90,000 of her fellow citizens safe, healthy, and educated for over 20 years in Somalia. Dr. Hawa Abdi, "the Mother Teresa of Somalia" and Nobel Peace Prize nominee, is the founder of a massive camp for internally displaced people located a few miles from war-torn Mogadishu, Somalia. Since 1991, when the Somali government collapsed, famine struck, and aid groups fled, she has dedicated herself to providing help for people whose lives have been shattered by violence and poverty. She turned her 1300 acres of farmland into a camp that has numbered up to 90,000 displaced people, ignoring the clan lines that have often served to divide the country. She inspired her daughters, Deqo and Amina, to become doctors. Together, they have saved tens of thousands of lives in her hospital, while providing an education to hundreds of displaced children. -
Transitional Justice and Violent Extremism
i n s t i t u t e f o r i n t e g r at e d t r a n s i t i o n s Transitional Justice and Violent Extremism September 2020 About IFIT The Institute for Integrated Transitions (IFIT) aims to help fragile and conflict-affected states achieve more sustainable transitions out of war or authoritarianism by serving as an inde- pendent expert resource for locally-led efforts to improve political, economic, social and security conditions. IFIT seeks to transform current practice away from fragmented inter- ventions and toward more integrated solutions that strengthen peace, democracy and human rights in countries attempting to break cycles of conflict or repression. The ideas in this publication are informed by the diverse global experiences of IFIT’s Law and Peace Practice Group, whose members have had direct involvement in the negotia- tion of amnesty and accountability issues in over 20 countries. About the Project This publication is part of a project that aims to fill a major gap in policy making: the fail- ure to integrate lessons learnt and best practices from the field of transitional justice in relation to conflict resolution strategies with two kinds of unconventional armed actors: 1) “violent extremist” groups, such as jihadists; and 2) organised crime groups, such as mafia, gang networks and drug cartels. IFIT’s work on the former began in 2017 with the UN University Centre for Policy Research (UNU-CPR). The project was concerned with the fact that, to date, what has reigned is an overwhelmingly punitive and dragnet approach which, rather than helping address root causes and break cycles of resentment and vio- lence, instead risks renewing or reinforcing them. -
From Internet Referral Units to International Agreements: Censorship of the Internet by the Uk and Eu
FROM INTERNET REFERRAL UNITS TO INTERNATIONAL AGREEMENTS: CENSORSHIP OF THE INTERNET BY THE UK AND EU Brian Chang* TABLE OF CONTENTS I. Internet Referral Units .................................. 116 A. Setting the Scene: UK and EU Law and Policy Toward Censorship of Extremist Content Online .............. ..... 116 B. The UK Counter Terrorism Internet Referral Unit.................126 (1) Background ...................................... 126 (2) Modus Operandi ..................................... 129 (3) Aggregate Statistics and Lack of Transparency ................. 130 (4) Future Directions? .................................... 132 C. The EU IRU........................................ 133 (1) Background ................................. ..... 133 (2) Modus Operandi ...................... .............. 134 (3) Mission Creep ....................................... 139 (4) Statistics ........................................ 140 (5) Future Directions ............................ ..... 142 D. Criticisms of IRUs. ............................. ...... 143 * Brian Chang is a Research Assistant with the University of Oxford's Parliaments, Rule of Law and Human Rights research project. He graduated from the University of Oxford with a B.A. (Hons.) in Jurisprudence and received an LL.M. (with Highest Honors) in International and Comparative Law from The George Washington University Law School, where he was also a Thomas Buergenthal Scholar. He would like to thank Professors Dawn Nunziato and Arturo Carrillo for their help and encouragement, Cynthia Wong and Emma Llanso for inspiring this topic, Alexandra Bornstein and the rest of the editors at Columbia for their tireless editorial assistance, and his family and partner for their never- ending support. The views presented here and any errors are the author's alone and should not be attributed to any of the persons or organizations he has had the good fortune of working with. 2018] From Internet Referral Units to InternationalAgreements 115 II. The International Human Rights Law Framework.....