Harmonisation and Cybercrime Jurisdiction: Uneasy Bedfellows?

Total Page:16

File Type:pdf, Size:1020Kb

Harmonisation and Cybercrime Jurisdiction: Uneasy Bedfellows? Harmonisation and Cybercrime Jurisdiction: Uneasy Bedfellows? An analysis of the jurisdictional trajectories of the Council of Europe’s Cybercrime Convention Micheál Aaron O’ Flynn School of Law Queen Mary, University of London 2014 Submitted in partial fulfillment of the requirements of the Degree of Doctor of Philosophy Queen Mary, University of London 1 2 I, Micheál Aaron O’ Flynn, confirm that the research included within this thesis is my own work or that where it has been carried out in collaboration with, or supported by others, that this is duly acknowledged below and my contribution indicated. Previously published material is also acknowledged below. I attest that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge break any UK law, infringe any third party’s copyright or other Intellectual Property Right, or contain any confidential material. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. I confirm that this thesis has not been previously submitted for the award of a degree by this or any other university. The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without the prior written consent of the author. Micheál O’ Flynn 23 December 2014. Details of collaboration and publications: • Some paragraphs from chapter four, section 4.3 are drawn from a previous publication: *O'FLOINN, M., 'It Wasn't All White Light Before Prism: Law Enforcement Practices in Gathering Data Abroad, and Proposals for Further Transnational Access at the Council of Europe', Computer Law and Security Review, 29(5) (2013), 610. * My previous publications are in the Irish spelling of my surname (O’ Floinn) and are referred to herein as such. 3 Acknowledgements I am extremely grateful to the School of Law QMUL for awarding me the Graduate Teaching Assistant PhD scholarship that made this project possible. My supervisors, Ian Walden and Peter Alldridge, have provided constant support, and it has been a pleasure to work with them over the past four years. Ian’s perceptive comments and attentiveness to detail have always pushed me to develop my ideas; he has provided unstinting support and encouragement on this project, as well as others en route. Peter warmly welcomed me to the Law Department—prior to even commencing my PhD studies—when I taught with him on the evidence module. He always made himself available, at the shortest of notice, even while packing for holidays! David Ormerod helped to shape my ideas for this project at a very early stage, prior to moving to the Law Commission. Ever since he has been a friend and a mentor, and has always promoted my work, for which I am grateful. I would like to thank Giulia Liberatore, Donal Coffey, and Georgia Douglas for commenting on draft chapters, and the participants at conferences organised by the Judicial College, the Office of Surveillance Commissioners, the Institute of Advanced Legal Studies, the European Academy of Law, McKay Law, and the Jill Dando Institute of Security and Crime Science, who commented on various aspects of this work. My parents, Michael and Mary, I thank you for your encouragement and faith in my abilities, and for always doing everything within your means to support me, and my education. You have both influenced me, and shaped me as a person, in so many ways. To my brothers, Seán and Eamonn, and my adoptive family, Sergio and Grazia, Francesca and Spence, and Riccardo, thank you for your patience and support. You have all endured this project in so many ways. Finally, I thank Giulia Liberatore. Your love and support have been unwavering throughout this project. This thesis is dedicated to you. 4 Abstract This thesis examines the Council of Europe’s Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of ‘suppression’ conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the ‘suppressed’ offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers have provided powerful tools for policing cybercrime, and the Convention has been innovative by developing mechanisms for facilitating networking interactions between law enforcement, and on most interpretations, even providing for directly contacting foreign service providers for data. The traditional limitations of enforcement jurisdiction are gradually being transformed, but the resulting difficulties for jurisdictional concurrency are not appreciated. Given the malleability of the concept of ‘territoriality’, and the flexibility afforded in international law in its interpretation, seizures of jurisdiction over many cybercrimes have sometimes been on the most tenuous of grounds. This results in a problem of concurrent jurisdiction on a scale previously unseen in the context of other transnational offences. It is often assumed that once substantive criminal harmonisation occurs, jurisdictional conflict between States dissipates, but I highlight three areas where concurrency is beginning to generate difficulties: investigatory and prosecutorial negotiations, cybercrime extraditions, and the law relating to ne bis in idem. I argue that these problems are only going to be exacerbated given the inroads that are being made in investigative powers and enforcement jurisdiction, coupled with the global reach of cybercrime which brings more and more States into play. I provide both the theoretical and practical case for more refined approaches towards the concept of territoriality, and consider some of the potential mechanisms for dealing with these uneasy bedfellows in the Cybercrime Convention. 5 Table of Contents Chapter 1: Introduction ................................................................................ 13 1.1 Introduction ....................................................................................................... 13 1.2 Treaties and Transgovernmental Networks: A Powerful Combination ................................................................................................................. 16 1.3 A Structural Imbalance ................................................................................... 20 1.4 Methodology ...................................................................................................... 24 1.4.1. Interviews .................................................................................................................. 27 1.4.2. Observations at the COE ...................................................................................... 31 1.5 Chapter Outline ................................................................................................. 31 1.6 Looking forward ............................................................................................... 34 Chapter 2: Jurisdiction in International Law ......................................... 36 2.1 Introduction ....................................................................................................... 36 2.2 The Territorial Limits of Enforcement Jurisdiction ............................. 38 2.3 The Jurisdiction to Prescribe: The Vagaries of Public International Law 40 2.4 Territoriality and Trans-jurisdictional Offences .................................. 44 2.5 Extraterritorial Jurisdiction ......................................................................... 49 2.5.1. Nationality Jurisdiction ........................................................................................ 49 2.5.2. Passive Personality ................................................................................................ 51 2.5.3. The Protective Principle ...................................................................................... 52 2.5.4. Universal Jurisdiction ........................................................................................... 52 2.6 Resolving Concurrency? ................................................................................. 54 2.6.1. The Principle oF Legality ...................................................................................... 55 2.6.2. Jurisdictional Reasonableness and Ryngaert’s Rule of Reason .......... 56 2.7 Conclusion .......................................................................................................... 58 Chapter 3: The Suppression Process ........................................................ 61 3.1 Introduction ....................................................................................................... 61 3.2 Transnational Criminal Law ......................................................................... 62 3.2.1. Regularisation oF Relationships in the EU ................................................... 64 3.3 The Formation of Suppression Conventions ........................................... 67 3.3.1. Critiques of Guzman .............................................................................................. 69 3.3.2. Rational Choice and Suppression Conventions ......................................... 70 6 3.4 The Pattern of Suppression Conventions ................................................. 74 3.4.1. Jurisdiction
Recommended publications
  • Case 3:07-Cr-00057-MRK Document 6 Filed 03/21/2007 Page 1 of 9
    Case 3:07-cr-00057-MRK Document 6 Filed 03/21/2007 Page 1 of 9 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA : Case No: : : VIOLATIONS: : : 18 U.S.C. § 2339A (Providing Material v. : Support to Terrorists) : : 18 U.S.C. § 793(d) (Communicating : National Defense Information to Persons not : Entitled to Receive it) HASSAN ABUJIHAAD, : a/k/a PAUL R. HALL : 18 U.S.C. § 2 I N D I C T M E N T The Grand Jury charges that: INTRODUCTION 1. From on or about December 20, 1997, through on or about January 25, 2002, HASSAN ABUJIHAAD, a/k/a PAUL R. HALL (“ABUJIHAAD”), was an enlisted member of the United States Navy. From on or about July 1, 1998, through on or about January 10, 2002, ABUJIHAAD was assigned to a United States Navy destroyer named the U.S.S. Benfold, where his primary position was Signalman. In March and April 2001, the U.S.S. Benfold was part of a United States Navy Battle Group directed to transit from California to the Persian Gulf region. 2. On January 6, 1998, in connection with his duties in the United States Navy, ABUJIHAAD was approved by the Department of the Navy Central Adjudication Facility (“DONCAF”) for access to information classified at the “Secret” level pursuant to Executive Order 12,958, as amended by Executive Order 13,292. Case 3:07-cr-00057-MRK Document 6 Filed 03/21/2007 Page 2 of 9 3. Pursuant to Executive Order 12,958, as amended by Executive Order 13,292, national security information may be classified as, among other things, “Secret.” The designation “Secret” applies to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security.
    [Show full text]
  • Lauri Love -V- the Government of the United States of America & Liberty
    Neutral Citation Number: [2018] EWHC 172 (Admin) Case No: CO/5994/2016 IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 05/02/2018 Before: THE RIGHT HONOURABLE THE LORD BURNETT OF MALDON THE LORD CHIEF JUSTICE and THE HONOURABLE MR JUSTICE OUSELEY - - - - - - - - - - - - - - - - - - - - - Between: LAURI LOVE Appellant - and - THE GOVERNMENT OF THE UNITED STATES Respondent OF AMERICA - and - LIBERTY Interested Party - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MR EDWARD FITZGERALD QC AND MR BEN COOPER (instructed by KAIM TODNER SOLICITORS LTD) for the Appellant MR PETER CALDWELL (instructed by CPS EXTRADITION UNIT) for the Respondent MR ALEX BAILIN QC AND MR AARON WATKINS (instructed by LIBERTY) for the Interested Party Hearing dates: 29 and 30 November 2017 - - - - - - - - - - - - - - - - - - - - - Approved Judgment Judgment Approved by the court for handing down. Love v USA THE LORD CHIEF JUSTICE AND MR JUSTICE OUSELEY : 1. This is the judgment of the Court. 2. Lauri Love appeals against the decision of District Judge Tempia, sitting at Westminster Magistrates’ Court on 16 September 2016, to send his case to the Secretary of State for the Home Department for her decision whether to order his extradition to the United States of America, under Part 2 of the Extradition Act 2003 [“the 2003 Act”]. The USA is a category 2 territory under that Act. On 14 November 2016, the Home Secretary ordered his extradition. 3. The principal
    [Show full text]
  • High Court Judgment Template
    Case No: CO/5160/2014 Neutral Citation Number: [2015] EWHC 2354 (Admin) IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 07/08/2015 Before: THE HONOURABLE MR JUSTICE CRANSTON - - - - - - - - - - - - - - - - - - - - - Between: THE COMMISSIONER OF THE POLICE OF THE Claimant METROPOLIS - and - SYED TALHA AHSAN Defendant - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mr Tom Little (instructed by the Metropolitan Police Legal Service) for the Claimant Mr Daniel Squires (instructed by Birnberg Peirce & Partners) for the Defendant Hearing dates: 24/07/2015 - - - - - - - - - - - - - - - - - - - - - Judgmen tMr Justice Cranston: Introduction: 1. This is an application by the Commissioner of Police of the Metropolis (“the Commissioner”) for an order to impose notification requirements for a period of 15 years on Syed Talha Ahsan (“Mr Ahsan”) under the Counter-Terrorism Act 2008 (“the 2008 Act”). In 2013, he was convicted in the United States of conspiracy to provide material assistance for terrorism through his involvement in a website. He has now returned to the United Kingdom. The notification order will require him for that period to attend police stations to provide, and update, information about his living arrangements and to provide details about his travel plans, for which permission can be refused. Breach of the requirements is punishable with imprisonment of up to 5 years. 2. Notification requirements have been imposed in many cases when persons have been convicted in the UK of terrorist-related offences. This is the first case in which a notification order has been contested in respect of a person convicted outside the UK of a corresponding foreign offence.
    [Show full text]
  • Pietro Deandrea
    POETRY AND THE WAR ON TERROR: THE CASE OF SYED TALHA AHSAN Pietro Deandrea In May 2013 public opinion was informed that the British army in Camp Bastion (Afghanistan) held some ninety native prisoners in inhuman conditions, arbitrarily and indefinitely, as a result of a government decision to extend exceptional measures to all detainees. Predictably, the news stirred much shock and debate1, showing another appalling side of the involvement of the UK in the American War on Terror based on exceptional measures. Commenting on President Bush’s 2001 special laws, Giorgio Agamben identified in the state of exception, “state power’s immediate response to the most extreme internal conflicts”, a structural element of continuity between the techniques of government of modern totalitarian states and the “so- called democratic ones […] a threshold of indeterminacy between democracy and absolutism.” Agamben’s juridical and philosophical analysis shows that the state of exception “tends increasingly to appear as the dominant paradigm of government in contemporary politics”2. Unfortunately, in the past decade the exceptional practice whereby people can be detained without evidence and trial has been practised on British soil, too, thanks to a specific Act involving Britain and the US: In 2003 a new Extradition Act was fast-tracked into UK legislation without a formal consultative parliamentary process, scrutiny or debate. […] the UK would be expected to extradite any individual to the US on request, without the need for the US to provide prima facie evidence (only to invoke reasonable suspicion), and thus 1 E. GIORDANA, La Guantanamo di Sua Maestà, “Il manifesto” 30-5-2013, p.
    [Show full text]
  • Cyber Romance Scam Victimization Analysis Using Routine Activity Theory Versus Apriori Algorithm
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 2018 Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm Mohd Ezri Saad1 Siti Norul Huda Sheikh Abdullah2, Mohd Zamri Murah3 Commercial Crime Investigation Department Center for Cyber Security Faculty of Information Royal Malaysia Police, Bukit Aman Science and Technology Bangi, Kuala Lumpur, Malaysia Selangor, Malaysia Abstract—The advance new digital era nowadays has led to These cyber romance scams has fraud Australians out of the increasing cases of cyber romance scam in Malaysia. These millions every years [1], [5]. No exception to Malaysia that technologies have offered both opportunities and challenge, has been the top 6 countries that recorded highest number of depending on the purpose of the user. To face this challenge, the cybercrime cases, with total loses reaching RM1 billion key factors that influence the susceptibility to cyber romance (Source: Bernama Report in 2014). Other countries like scam need to be identified. Therefore, this study proposed cyber Taiwan, China, Thailand, Indonesia and Hong Kong also were romance scam models using statistical method and Apriori listed together. While, Sophos Threat Report in 2014 stated techniques to explore the key factors of cyber romance scam that cybercrime attacks have been increased in the first quarter victimization based on the real police report lodged by the of 2014 and 81% of them happened in Malaysia. This victims. The relationship between demographic variables such as phenomenon was in line with the rapid growth of Malaysia's age, education level, marital status, monthly income and independent variables such as level of computer skills and the digital economy [6].
    [Show full text]
  • Case Number 3:04CR301(JCH) : V
    Case 3:04-cr-00301-JCH Document 181 Filed 06/16/14 Page 1 of 30 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA : Case Number 3:04CR301(JCH) : v. : : BABAR AHMAD a/k/a “Abu Ammar”, : a/k/a “Abu Khubaib/Kubayb Al-Pakistani” : a/k/a “Salah” / “Salahuddin”, a/k/a : “Dr. Karim”, a/k/a “D. Karim”, a/k/a : “Maria Alcala”, a/k/a “Lara Palselmo” : a/k/a “Mr. B” : JUNE 16, 2014 GOVERNMENT’S SENTENCING MEMORANDUM On July 16, 2014, the Court will sentence the defendant, Babar Ahmad (“Ahmad”), for conspiring to provide and providing material support to terrorists, knowing and intending that such support would be used in preparation for and in carrying out: (1) a conspiracy to kill, kidnap, maim or injure persons or damage property; or (2) the murder of U.S. nationals abroad. Ahmad’s conduct, summarized in part below, warrants the maximum sentence of twenty-five (25) years. From at least 1997 through his arrest in August 2004, Babar Ahmad – through the use of numerous kunyas and aliases – surreptitiously led a sophisticated, highly organized, technically savvy and operationally covert support cell in London with global reach, through which he supported the Chechen mujahideen, the Taliban and Al-Qaida. Ahmad’s material support operation was robust, far-reaching and virtually unprecedented in its scope – indeed, Ahmad and his cell provided almost every single category of support set forth in the material support statute. Ahmad supplied funds, military equipment, communication equipment, lodging, training, expert advice and assistance and personnel – all of which were designed to raise funds, recruit for and provide equipment to the Chechen mujahideen, the Taliban and Al-Qaida, and to otherwise 1 Case 3:04-cr-00301-JCH Document 181 Filed 06/16/14 Page 2 of 30 support violent jihad in Afghanistan and Chechnya.
    [Show full text]
  • Syed Talha Ahsan : June 16, 2014
    Case 3:06-cr-00194-JCH Document 179 Filed 06/16/14 Page 1 of 52 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA : NO. 3:06CR194(JCH) v. : SYED TALHA AHSAN : JUNE 16, 2014 SYED TALHA AHSAN’S MEMORANDUM IN AID OF SENTENCING I. Introduction Syed Talha Ahsan has now served over eight (8) years in prisons in England and the United States, for his peripheral involvement in a case not susceptible to easy explanation or categorization. He is a highly intelligent, sensitive, inquisitive, creative man, who does not subscribe to violence as a means to solving problems. He is a threat to no one. The odds of his committing any kind of new offense are so low as to be virtually negligible. The parsimony clause of the Sentencing Reform Act would be fully satisfied by a sentence of less than the time which he has already served. Under all the circumstances here, a sentence of credit for time served is appropriate. All of Talha Ahsan’s conduct in this case occurred prior to September 11, 2001 (“9/11"). There is no allegation here that Mr. Ahsan committed or attempted to commit any act of violence. This case is not about al Qaeda. It is a case about a citizen of the United Kingdom, who before his extradition had never set foot in the United States, and the marginal assistance he provided to a website when he was twenty years old. The website reported on the plight of Muslim populations around the world. It provided information on the concept of defensive jihad, i.e., the religious obligation to protect Muslims at risk of genocide and violent persecution.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • Romance Scams Spotlight
    Romance scams take record dollars in 2020 They say love hurts. With romance scams that’s obvious reason may be the pandemic limiting our doubly true – hearts are broken and wallets are ability to meet in person. But outside the pandemic, emptied. For three years running, people have reported the share of people who have ever used an online losing more money on romance scams than on any dating site or app has also been rising.3 And romance other fraud type identified in Sentinel.1 In 2020, scammers are primed to take advantage. Scammers reported losses to romance scams reached a record fabricate attractive online profiles to draw people in, $304 million, up about 50% from 2019. For an often lifting pictures from the web and using made up individual, that meant a median dollar loss of $2,500. names. Some go a step further and assume the From 2016 to 2020, reported total dollar losses identities of real people. Once they make online increased more than fourfold, and the number of contact, they make up reasons not to meet in person. reports nearly tripled.2 The pandemic has both made that easier and inspired new twists to their stories, with many people reporting It is reasonable to wonder: what happened in 2020 to that their so-called suitor claimed to be unable to make these dollars losses continue to spike? An travel because of the pandemic. Some scammers have Consumer Protection Data Spotlight | February 2021 1 reportedly even canceled first date plans due to a the card’s PIN number to the scammer.
    [Show full text]
  • Download Profile
    Ben Cooper QC Call: 1999 Silk: 2020 Email: [email protected] Profile What the Directories Say A "formidable defence advocate" who "is tireless in representing defendants." He is particularly experienced at handling US extradition requests and also highly capable of conducting extradition cases relating to complex human rights issues."One of the best senior juniors in extradition. He completely immerses himself in the case." "His dedication to the cause is impressive. He is very well known for high-profile American cases, which he does very well due to his extensive experience." - Chambers and Partners 2019 Ben Cooper is an "acclaimed junior frequently instructed in high-profile and controversial proceedings. Commentators stress his intelligence and the creative strategic advice he offers. He is recommended for matters with significant human rights components to them and noted for his success in presenting arguments about prison conditions. "He is a tenacious barrister who is unwilling to give up in difficult cases." "He is single-minded and focused when on a matter and very very clever." - Chambers and Partners 2016 "When he takes a case on you know nothing will be missed as he goes into such detail." Acted on the extradition request for a Syrian national by the USA for importing chemical weapons to Syria. The case is controversial as it is public knowledge that the defendant is opposed to the Assad regime. - Chambers and Partners 2015 "Sources commend him for his fearless approach to extradition proceedings. Expertise: "He is involved in very big cases, and is very well known and respected at the Extradition Bar"."Recent work: He successfully acted for Gary McKinnon, the Scottish hacker requested for extradition by the USA." - Chambers and Partners 2014 "Admiring sources say Ben Cooper "has an amazing attention to detail and great knowledge." He is another at the set with strong extradition expertise allied to criminal defence, civil liberties and human rights capability.
    [Show full text]
  • Romance Scams Rank Number One on Total Reported Losses
    Romance scams rank number one on total reported losses People looking for romance are hoping to be swept off need help with travel costs for a long-awaited visit is their feet, not caught up in a scam. But tens of another common ruse. thousands of reports in Consumer Sentinel show that a scam is what many people find. In 2018, Sentinel had Scammers can reap large rewards for time spent more than 21,000 reports about romance scams, and courting their targets. The median individual loss to a people reported losing a total of $143 million – that’s romance scam reported in 2018 was $2,600, about more than any other consumer fraud type identified in seven times higher than the median loss across all Sentinel.1 These reports are rising steadily. In 2015, by other fraud types.2 People often reported sending comparison, people filed 8,500 Sentinel reports with money repeatedly for one supposed crisis after dollar losses of $33 million. another. Romance scammers lure people with phony online profiles, often lifting photos from the web to create attractive and convincing personas. They might make up names or assume the identities of real people. Reports indicate the scammers are active on dating apps, but also on social media sites that aren’t generally used for dating. For example, many people say the scam started with a Facebook message. Once these fraudsters have people by the heartstrings, they say they need money, often for a medical People who said they were ages 40 to 69 reported emergency or some other misfortune.
    [Show full text]