The Use of the Internet for Terrorist Purposes

Total Page:16

File Type:pdf, Size:1020Kb

The Use of the Internet for Terrorist Purposes The use of the Internet for terrorist purposes In collaboration with the UNITED NATIONS COUNTER-TERRORISM IMPLEMENTATION TASK FORCE UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED NATIONS New York, 2012 © United Nations, September 2012. All rights reserved. The designations employed and the presentation of material in the present publica- tion do not imply the expression of any opinion whatsoever on the part of the Sec- retariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are cor- rect at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban Ki-moon Secretary-General of the United Nations Foreword Executive Director United Nations Office on Drugs and Crime The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role inproviding assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the international legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards. In particular, in 2011, the General Assembly, in its resolution 66/178, reaffirmed the mandate of UNODC to continue to develop specialized legal knowledge in the area of counter-terrorism and pertinent thematic areas, including the use of the Internet for terrorist purposes. Despite increasing international recognition of the threat posed by terrorists’ use of the Internet in recent years, there is currently no universal instrument specifically address- ing this pervasive facet of terrorist activity. Moreover, there is limited specialized training available on the legal and practical aspects of the investigation and prosecution of ter- rorism cases involving the use of the Internet. The present publication complements the existing resources developed by UNODC in the areas of counter-terrorism, cyber- crime and rule of law. It also addresses the importance of developing integrated, specialized knowledge to respond to the technical assistance needs of Member States in combating this continually evolving threat. UNODC is deeply grateful for the generous support of the Government of the United Kingdom of Great Britain and Northern Ireland, which made the publication of that work possible. The publication, which is intended for use both as a stand-alone resource and in sup- port of the capacity-building initiatives of UNODC, is aimed at providing guidance regarding current legal frameworks and practice at the national and international levels relating to the criminalization, investigation and prosecution of terrorist cases involving the Internet. Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of ter- rorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed. Yury Fedotov Executive Director United Nations Office on Drugs and Crime v Secretary-General’s Counter-Terrorism Implementation Task Force The Working Group on Countering the Use of the Internet for Terrorist Purposes of the Counter-Terrorism Implementation Task Force is aimed at coordinating the activities of the United Nations system in support of the United Nations Global Counter- Terrorism Strategy, adopted by the General Assembly in its resolution 60/288, in which Member States resolved to “coordinate efforts at the international and regional levels to counter terrorism in all its forms and manifestations on the Internet” and “use the Internet as a tool for countering the spread of terrorism, while recognizing that States may require assistance in this regard”. The Working Group has identified three key themes for discussion: legal issues, technical issues and ways in which the international community might use the Internet more effectively to counter terrorism by exposing the fallacy of the terrorist message that violence is a legitimate way to effect political change. The present study, produced by the United Nations Office on Drugs and Crime and conducted within the framework of the Working Group, owes much to the contribution and support of Member States. It takes discussion of the legal challenges to the next stage and adds significantly to the knowledge and expertise that the Working Group has accumulated and shared with Member States in that area. In particular, it provides important examples of Member State legislation dealing with terrorist use of the Internet and demonstrates, through real examples of legal cases, the difficulties faced by Member States in criminalizing and prosecuting such acts. The Working Group is confident that the present report will help to identify the legisla- tive areas in which the United Nations can assist in the implementation by Member States of the Global Counter-Terrorism Strategy in combating the use of the Internet for terrorist purposes. Richard Barrett Coordinator of the Analytical Support and Sanctions Monitoring Team Co-Chair of the Counter-Terrorism Implementation Task Force Working Group on Countering the Use of the Internet for Terrorist Purposes vi Government of the United Kingdom The United Kingdom has pioneered legislation to counter use of the Internet for ter- rorist purposes over the past decade; we have had considerable success in tackling online terrorist activity within the country’s borders, while doing our utmost to uphold free- doms and benefits that the Internet has brought to our citizens. However, we recognize that the threat is transnational by its very nature. Only by tak- ing action together can the international community hope to tackle terrorist use of the Internet effectively. The British Government therefore welcomes the opportunity to support UNODC in producing the publication that you are about to read. We hope that it will rapidly become a useful tool for legislators, law enforcement officials and criminal justice practitioners to develop and implement legal frameworks that will effectively disrupt terrorists’ activities online. If so, it will make a valuable contribution to making our communities—both real and virtual—safer places. Simon Shercliff Sue Hemming OBE Head, Counter Terrorism (Ops) Head of the Special Crime and Counter Department Foreign and Terrorism Division Commonwealth Office Crown Prosecution Service vii Contents Page Foreword . v Executive Director United Nations Office on Drugs and Crime ............ v Secretary-General’s Counter-Terrorism Implementation Task Force .......... vi Government of the United Kingdom ................................. vii Background . 1 I .Use of the Internet for terrorist purposes ...................... 3 A. Introduction ............................................ 3 B. Means by which the Internet is utilized for terrorist purposes ..... 3 C. Uses of the Internet for countering terrorist activity ............. 12 D. Rule-of-law considerations ................................. 13 II . The international context . 15 A. Introduction ............................................ 15 B. United Nations counter-terrorism resolutions .................. 16 C. Universal counter-terrorism legal instruments .................. 17 D. International human rights law ............................. 19 E. Regional and subregional counter-terrorism legal instruments ..... 20 F. Model legislation ........................................ 23 III . Policy and legislative frameworks . 27 A. Introduction ............................................ 27 B. Policy ................................................. 27 C. Legislation ............................................. 31 IV . Investigations and intelligence-gathering . 53 A. Tools in the commission of terrorist offences involving the Internet . 53 B. Investigations of terrorist cases involving the Internet ............ 60 ix Page C. Forensic data preservation and recovery ...................... 64 D. Supporting the authentication of digital evidence ............... 67 E. Operational cybercrime units ............................... 68 F. Intelligence-gathering ..................................... 70 G. Training ............................................... 72 V . International cooperation . 73 A. Introduction ............................................ 73 B. Instruments and arrangements relating to international cooperation . 73 C. National legislative
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • THE CASE for CHANGE a Review of Pakistan’S Anti-Terrorism Act of 1997
    THE CASE FOR CHANGE A Review of Pakistan’s Anti-Terrorism Act of 1997 October 2013 A Report by the Research Society of International Law, Pakistan i PROJECT RESEARCHERS ISLAMABAD DIVISION Jamal Aziz Muhammad Oves Anwar LL.B (London), LL.M (UCL) LL.B (London), LL.M (SOAS), LL.M (Vienna), D.U. (Montpellier) Saad-ur-Rehman Khan Abid Rizvi LL.B (London), LL.M (Manchester) BA-LL.B (LUMS), LL.M (U.Penn) Aleena Zainab Alavi Zainab Mustafa LL.B (London), LL.M (Warwick) LL.B (London) LAHORE DIVISION Ali Sultan Amna Warsi J.D. (Virginia) LL.M (Punjab) Ayasha Warsi Moghees Khan LL.M (Punjab) LL.B (London), LL.M (Warwick) Mishael Qureshi LL.B (Lond.), LL.M (Sussex) INTERNS Muhammad Bin Majid Muhammad Abdul Ghani Awais Ahmad Khan Ghauri This material may not be copied, reproduced or transmitted in whole or in part without attribution to the Research Society of International Law (RSIL). Unless noted otherwise, all material is property of RSIL. Copyright © Research Society of International Law 2013. ii CONTENTS SUMMARY OF RECOMMENDATIONS .......................................................................................... IX CHAPTER ONE ....................................................................................................................................... 7 TERRORISM IN THE PAKISTANI CONTEXT .................................................................................. 7 1.1 TRENDS IN TERRORISM ........................................................................................................... 7 1.2 THE ANATOMY OF TERRORISM
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • A Decade of Australian Anti-Terror Laws
    A DECADE OF AUSTRALIAN ANTI-TERROR LAWS GEORGE WILLIAMS* [This article takes stock of the making of anti-terror laws in Australia since 11 September 2001. First, it catalogues and describes Australia’s record of enacting anti-terror laws since that time. Second, with the benefit of perspective that a decade brings, it draws conclusions and identifies lessons about this body of law for the Australian legal system and the ongoing task of protecting the community from terrorism.] CONTENTS I Introduction ..........................................................................................................1137 II Australia’s Anti-Terror Laws ................................................................................1139 A Number of Federal Anti-Terror Laws ......................................................1140 1 Defining an Anti-Terror Law ......................................................1141 2 How Many Anti-Terror Laws? ....................................................1144 B Scope of Federal Anti-Terror Laws .........................................................1146 1 The Definition of a ‘Terrorist Act’ ..............................................1146 2 Offence of Committing a ‘Terrorist Act’ and Preparatory Offences ......................................................................................1146 3 Proscription Regime ....................................................................1147 4 Financing Offences and Regulation ............................................1147 (a) Offences ..........................................................................1147
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Counter-Terrorism Bill
    Counter-Terrorism Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 65—EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following statement under section 19(1)(a) of the Human Rights Act 1998: In my view the provisions of the Counter-Terrorism Bill are compatible with the Convention rights. HL Bill 65 54/3 Counter-Terrorism Bill CONTENTS PART 1 POWERS TO GATHER AND SHARE INFORMATION Power to remove documents for examination 1 Power to remove documents for examination 2 Offence of obstruction 3 Items subject to legal privilege 4 Record of removal 5 Retention of documents 6 Access to documents 7 Photographing and copying of documents 8 Return of documents 9 Power to remove documents: supplementary provisions Power to take fingerprints and samples from person subject to control order 10 Power to take fingerprints and samples: England and Wales 11 Power to take fingerprints and samples: Scotland 12 Power to take fingerprints and samples: Northern Ireland 13 Power to take fingerprints and samples: transitional provision Retention and use of fingerprints and samples 14 Material subject to the Police and Criminal Evidence Act 1984 15 Material subject to the Police and Criminal Evidence (Northern Ireland) Order 1989 16 Material subject to the Terrorism Act 2000: England and Wales and Northern Ireland 17 Material subject to the Terrorism Act 2000: Scotland 18 Material not subject to existing statutory restrictions Disclosure of information and the
    [Show full text]
  • Terrorism Act 2000
    Status: This version of this Act contains provisions that are prospective. Changes to legislation: There are outstanding changes not yet made by the legislation.gov.uk editorial team to Terrorism Act 2000. Any changes that have already been made by the team appear in the content and are referenced with annotations. (See end of Document for details) Terrorism Act 2000 2000 CHAPTER 11 An Act to make provision about terrorism; and to make temporary provision for Northern Ireland about the prosecution and punishment of certain offences, the preservation of peace and the maintenance of order. [20th July 2000] Be it enacted by the Queen’s most Excellent Majesty, by and with the advice and consent of the Lords Spiritual and Temporal, and Commons, in this present Parliament assembled, and by the authority of the same, as follows:— Annotations: Modifications etc. (not altering text) C1 Act modified (21.2.2009) by The Banking Act 2009 (Parts 2 and 3 Consequential Amendments) Order 2009 (S.I. 2009/317), art. 3, Sch. C2 Act modified (1.12.1997) by S.I. 1994/1405, art. 7; London Gazette reissue number 55144 (as amended (26.10.2006) by S.I. 2006/2627, art. 2 and (2.1.2008) by S.I. 2007/3579, art. 3) PART I INTRODUCTORY 1 Terrorism: interpretation. (1) In this Act “terrorism” means the use or threat of action where— (a) the action falls within subsection (2), (b) the use or threat is designed to influence the government [F1or an international governmental organisation] or to intimidate the public or a section of the public, and (c) the use or threat is made for the purpose of advancing a political, religious [F2, racial] or ideological cause.
    [Show full text]
  • Al Muhajiroun and Islam4uk: the Group Behind the Ban
    Developments in Radicalisation and Political Violence Al Muhajiroun and Islam4UK: The group behind the ban Catherine Zara Raymond May 2010 Developments in Radicalisation and Political Violence Developments in Radicalisation and Political Violence is a series of papers published by the International Centre for the Study of Radicalisation and Political Violence (ICSR). It features papers by leading experts, providing reviews of existing knowledge and sources and/or novel arguments and insights which are likely to advance our understanding of radicalisation and political violence. The papers are written in plain English. Authors are encouraged to spell out policy implications where appropriate. Editor Prof. Harvey Rubin University of Pennsylvania Dr John Bew ICSR, King’s College London Editorial Assistant Katie Rothman International Centre for the Study of Radicalisation and Political Violence (ICSR) Editorial Board Prof. Sir Lawrence Freedman King’s College London Dr. Boaz Ganor Interdisciplinary Center Herzliya Dr. Peter Neumann King’s College London Dr Hasan Al Momani Jordan Institute of Diplomacy Contact All papers can be downloaded free of charge at www.icsr.info. To order hardcopies, please write to mail@icsr. info. For all matters related to the paper series, please write to: ICSR King’s College London, 138-142 Strand London WC2R 1HH United Kingdom © ICSR 2010 1 Summary On 2nd January 2010, Islam4UK, an off-shoot of the extremist Islamist group Al Muhajiroun, announced their intention to stage a procession through Wootton Bassett, a town which is now synonymous in the eyes of the British public with the funerals of UK soldiers killed in Iraq and Afghanistan. Less than two weeks later the group was proscribed by the British government under the Terrorism Act 2000.
    [Show full text]
  • Decennium 7/7 the United Kingdom Terrorist Attacks on July 7, 2005, and the Evolution of Anti-Terrorism Policies, Laws, and Practices
    Decennium 7/7 The United Kingdom terrorist attacks on July 7, 2005, and the evolution of anti-terrorism policies, laws, and practices By Prof. Dr. Dr. Clive Walker , Leeds I. Introduction might be termed ‘neighbour terrorism’ 5 has taken centre- 6 The tenth anniversary (the Decennium) of the 7 July 2005, stage rather than terrorism from alien sources. London transport bombings provides a poignant but appro- The human and material wreckage of 7/7 was also the priate juncture at which to reflect upon the lessons learned catalyst for signalling major changes in the long history of from those coordinated and severe terrorist attacks. 1 The United Kingdom counter-terrorism policy and laws. A com- killing of 52 civilians by four ‘home-grown’ extremists, who prehensive strategy, entitled CONTEST, which had been prepared in secret by 2003, 7 was finally unveiled to the public had been inspired by the violent ideology of Al Qa’ida, 8 marked the worst terrorist atrocity in the United Kingdom in 2006. The strategy includes the traditional approaches of since the Lockerbie air disaster of 1988. 2 The seminal im- ‘Pursuit’ (policing and criminal justice tactics). Protective portance of 7/7 resides in both the nature of the attack and the security (dubbed ‘Prepare’ and ‘Protect’) is also highlighted, official response, both marking a transition to a new, but not and this element builds on the Promethean and expensive duties of planning and resilience established in the Civil wholly distinct, stage of United Kingdom terrorism and coun- 9 ter-terrorism. Contingencies Act 2004. However, CONTEST also address- As for the nature of the terrorism, the characteristics of ji- es the more pioneering and problematic agenda of ‘Prevent’ – hadi terrorism, 3 with its vaulting ambitions, strident ideology ‘tackling disadvantage and supporting reform […] deterring those who facilitate terrorism and those who encourage oth- and disregard for civilian casualties signified new challenges 10 for the state authorities and public alike.
    [Show full text]
  • What If the Founders Had Not Constitutionalized the Privilege of the Writ of Habeas Corpus?
    THE COUNTERFACTUAL THAT CAME TO PASS: WHAT IF THE FOUNDERS HAD NOT CONSTITUTIONALIZED THE PRIVILEGE OF THE WRIT OF HABEAS CORPUS? AMANDA L. TYLER* INTRODUCTION Unlike the other participants in this Symposium, my contribution explores a constitutional counterfactual that has actually come to pass. Or so I will argue it has. What if, this Essay asks, the Founding generation had not constitutionalized the privilege of the writ of habeas corpus? As is explored below, in many respects, the legal framework within which we are detaining suspected terrorists in this country today—particularly suspected terrorists who are citizens1—suggests that our current legal regime stands no differently than the English legal framework from which it sprang some two-hundred-plus years ago. That framework, by contrast to our own, does not enshrine the privilege of the writ of habeas corpus as a right enjoyed by reason of a binding and supreme constitution. Instead, English law views the privilege as a right that exists at the pleasure of Parliament and is, accordingly, subject to legislative override. As is also shown below, a comparative inquiry into the existing state of detention law in this country and in the United Kingdom reveals a notable contrast—namely, notwithstanding their lack of a constitutionally- based right to the privilege, British citizens detained in the United Kingdom without formal charges on suspicion of terrorist activities enjoy the benefit of far more legal protections than their counterparts in this country. The Essay proceeds as follows: Part I offers an overview of key aspects of the development of the privilege and the concept of suspension, both in England and the American Colonies, in the period leading up to ratification of the Suspension Clause as part of the United States Constitution.
    [Show full text]
  • University of Groningen Jihadism and Suicide Attacks Nanninga
    University of Groningen Jihadism and Suicide Attacks Nanninga, Pieter IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2014 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Nanninga, P. (2014). Jihadism and Suicide Attacks: al-Qaeda, al-Sahab and the Meanings of Martyrdom. s.n. Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. Download date: 29-09-2021 Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom Pieter Nanninga Cover design: Anna Woldring Cover photograph: still from al-Sahab, Winds of Paradise: Part 1, 20" Printing: CPI Koninklijke Wöhrmann ISBN 978-90-367-7040-8 (printed version) ISBN 978-90-367-7045-3 (electronic version) © Copyright 2014 Pieter Gerhardus Theodorus Nanninga Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom PhD thesis to obtain the degree of PhD at the University of Groningen on the authority of the Rector Magnificus Prof.
    [Show full text]
  • Download Thepdf
    Volume 59, Issue 5 Page 1395 Stanford Law Review KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker © 2007 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 59 STAN. L. REV. 1395 (2007). For information visit http://lawreview.stanford.edu. KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker* INTRODUCTION: THE DYNAMICS OF COUNTER-TERRORISM POLICIES AND LAWS................................................................................................ 1395 I. CONTROL ORDERS ..................................................................................... 1403 A. Background to the Enactment of Control Orders............................... 1403 B. The Replacement System..................................................................... 1408 1. Control orders—outline................................................................ 1408 2. Control orders—contents and issuance........................................ 1411 3. Non-derogating control orders..................................................... 1416 4. Derogating control orders............................................................ 1424 5. Criminal prosecution.................................................................... 1429 6. Ancillary issues............................................................................. 1433 7. Review by Parliament and the Executive...................................... 1443 C. Judicial Review..................................................................................
    [Show full text]