Advertisement

Instruments of International Law: Against Terrorist Use of the Internet

  • Ulrich Sieber
Chapter

Abstract

Because of its complex and transnational nature, to criminal justice systems within their traditional bounds, cyberterrorism presents fundamental challenges that can only be overcome by close international cooperation. The UN, the EU, and above all the Council of Europe have played key roles in attempts to facilitate such cooperation and ensure that an effective fight against cyberterrorism is possible. This chapter presents in detail the various legal instruments created, and presents an analysis of their potential to make a comprehensive provision for the fight against cyberterrorism. It investigates whether there are deficits in relation to the existing international instruments and suggests improvements where necessary.

Keywords

Framework Decision Additional Protocol Mutual Assistance Security Council Resolution Transnational Organize Crime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Bassiouni, M. C. (2001). International Terrorism: Multilateral Conventions (1937–2001). Transnational Publishers: New York.Google Scholar
  2. Breyer, P. (2001). Cyber-Crime-Konvention des Europarats. Datenschutz und Datensicherheit. Volume 25, pp. 592–600.Google Scholar
  3. Coll, S., Glasser, S. B. (2005). Terrorists Turn to the Web as Base of Operations. The Washington Post. 7 August 2005, Section A01.Google Scholar
  4. Council of Europe (2001). Council of Convention on Cybercrime of the Council of Europe of 23.11.2001 (ETS No. 185). Explanatory Report.Google Scholar
  5. Council of Europe (2005a). Council of Europe Convention on the Prevention of Terrorism of 16.05.2005 (ETS No. 196). Explanatory Report.Google Scholar
  6. Council of Europe (2005b). Human Rights and the Fight Against Terrorism. The Council of Europe Guidelines. Council of Europe Publishing: Strasbourg.Google Scholar
  7. Denning, D. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In: Arquilla, J. The Future of Terror, Crime and Militancy. Rand: Santa Monica et al., pp. 239–288. Also online available at http://www.rand.org/pubs/monograph_reports/MR1382/MR1382.ch8.pdf [last visited: 25 February 2009].Google Scholar
  8. Dix, A. (2001). Regelungsdefizite der Cyber-Crime-Konvention und der E-TKÜV. Datenschutz und Datensicherheit. Volume 25, pp. 588–591.Google Scholar
  9. Foltz, C. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management & Computer Security. Volume 12, No. 2, pp. 154–166.CrossRefGoogle Scholar
  10. Gercke, M. (2004). Cybercrime Konvention des Europarates. Computer und Recht. Volume 20, pp. 782–791.Google Scholar
  11. Gercke, M. (2006a). “Cyberterrorismus” - Aktivitäten Terroristischer Organisationen im Internet. Computer & Recht. pp. 62–68.Google Scholar
  12. Gercke, M. (2006b). The Slow Wake of a Global Approach Against Cybercrime. Computer Law Review International. pp. 140–145.Google Scholar
  13. Hoeren, T., Sieber, U. (2007). Handbuch Multimedia-Recht. Rechtsfragen des elektronischen Geschäftsverkehrs. Loose leaf. Beck: München.Google Scholar
  14. Murphy, S. D. (2002). Contemporary Practice of the United States Relating to International Law. American Journal of International Law. Volume 96, pp. 956–983.CrossRefGoogle Scholar
  15. Nuotio, K. (2006). Terrorism as a Catalyst for the Emergence, Harmonization and Reform of Law. Journal of International Criminal Justice. Volume 4, pp. 998–1016.CrossRefGoogle Scholar
  16. Oeter, S. (2002). Terrorismus und Menschenrechte. Archiv des Völkerrechts. Volume 40, pp. 422–453.Google Scholar
  17. Ramelsberger, A. (2007). Krieger im Internet. Süddeutsche Zeitung, p. 5. Also online available at http://www.sueddeutsche.de/politik/327/396114/text/[last visited: 25 February 2009].
  18. Ribbelink, O. M. (2004). Apologie du Terrorisme“and “Incitement to Terrorism. Council of Europe Publishing: Strasbourg.Google Scholar
  19. Secretary-General of the UN (2006). Protecting Human Rights and Fundamental Freedoms While Countering Terrorism. Report pursuant to the UN Resolution No. 60/158 of the UN General Assembly. A/61/353. http://daccessdds.un.org/doc/UNDOC/GEN/N06/526/78/PDF/N0652678.pdf?OpenElement [last visited: 25 February 2009].
  20. Sieber, U. (1999). Kinderpornographie, Jugendschutz und Providerverantwortlichkeit im Internet – Eine strafrechtsvergleichende Untersuchung. Edited by the German Ministry of Justice in the series “recht”. Forum Verlag: Mönchengladbach.Google Scholar
  21. Sieber, U. (2000). Legal Regulation, Law Enforcement and Self-Regulation – A New Alliance for Preventing Illegal Contents on the Internet. In: Waltermann, J., Machill, M. Protecting Our Children on the Internet. Towards a New Culture of Responsibility. Bertelsmann Foundation Publishing: Gütersloh, pp. 319–400.Google Scholar
  22. Sieber, U. (2001). Responsibility of Internet Providers: Comparative Analysis of a Basic Question of Information Law. In: Lederman, E., Shapira, R. Law, Information and Information Technology. Kluwer Law International: The Hague, pp. 231–292.Google Scholar
  23. Sieber, U. (2004). Punishment of Serious Crimes. A Comparative Analysis of Sentencing Law and Practice. Ed. Iuscrim: Freiburg im Breisgau.Google Scholar
  24. Sieber, U. (2005). The Threat of Cybercrime. In: Council of Europe (2005b). Organised Crime in Europe. The Threat of Cybercrime. Situation Report 2004. Council of Europe Publishing: Strasbourg, pp. 81–218.Google Scholar
  25. Sieber, U. (2006). Grenzen des Strafrechts. Zeitschrift für die gesamte Strafrechtswissenschaft. Volume 119, pp. 1–68.CrossRefGoogle Scholar
  26. Sieber, U. (2009). Sperrverpflichtungen gegen Kinderpornografie im Internet: Bewertung und Weiterentwicklung des Gesetzentwurfs BT-Drucks. 16/12850 vom 5. 5. 2009. Juristenzeitung, Volume 64, pp. 653–662.Google Scholar
  27. Sieber, U., Brunst, P. (2007). Cyberterrorism and Other Use of the Internet for Terrorist Purposes – Threat Analysis and Evaluation of International Conventions. In: Council of Europe (2007). Cyberterrorism – The Use of the Internet for Terrorist Purposes. Council of Europe Publishing: Strasbourg, pp. 9–105.Google Scholar
  28. Sieber, U., Höfinger, F. (2009). Allgemeine Grundsätze der Haftung. In: Hoeren, T., Sieber, U. Handbuch Multimedia Recht. Rechtsfragen des elektronischen Geschäftsverkehrs. Loose leaf. Beck: München, pp. 1–72.Google Scholar
  29. Sieber, U., Nolde, M. (2008). Sperrverfügungen im Internet. Nationale Rechtsdurchsetzung im globalen Cyberspace. Duncker & Humblot: Berlin.Google Scholar
  30. Sieber, U. (2009), Legitimation und Grenzen von Gefährdungsdelikten im Vorfeld von terroristischer Gewalt - Eine Analyse der Vorfeldtatbestände im “Entwurf eines Gesetzes zur Verfolgung der Vorbereitung von schweren staatsgefährdenden Gewalttaten”. Neue Zeitschrift für Strafrecht. Vol. 29 (2009), pp. 353–408.Google Scholar
  31. Taylor, G. (2002). The Council of Europe Cybercrime Convention - A Civil Liberties Perspective. http://www.crime-research.org/library/CoE_Cybercrime.html [last visited: 25 February 2009].
  32. Thomas, T. L. (2003). Cyberplanning, Al Qaeda and the Internet: The Danger of “Cyberplanning”. Parameters. Volume 33, No. 1, pp. 112–123. Also online available at http://www.iwar.org.uk/cyberterror/resources/cyberplanning/al-qaeda.htm [last visited: 25 February 2009].
  33. Tomuschat, C. (2005). Council of Europe Committee of Experts on Terrorism (CODEXTER), Strasbourg. on the Possible “Added Value” of a Comprehensive Convention on Terrorism. Human Rights Law Journal. Volume 26, pp. 287–306.Google Scholar
  34. U.S. Army Training and Doctrine Command (2006). Cyber Operations and Cyber Terrorism. DCSINT Handbook No. 1.02. http://www.fas.org/irp/threat/terrorism/sup2.pdf [last visited: 25 February 2009].
  35. Weimann, G. (2004a). www.terror.net. How Modern Terrorism Uses the Internet. United States Institute of Peace. Special Report No. 116. http://www.usip.org/pubs/specialreports/sr116.pdf [last visited: 25 February 2009].
  36. Weimann, G. (2004b). Terrorists and Their Tools – Part II. Using the Internet to Recruit, Raise Funds, and Plan Attacks. YaleGlobal Online. http://yaleglobal.yale.edu/article.print?id=3768 [last visited: 25 February 2009].
  37. Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism. Volume 28, pp. 129–149.CrossRefGoogle Scholar
  38. Whine, M. (1999). Cyberspace – A New Medium for Communication, Command, and Control by Extremists. Studies in Conflict & Terrorism. Volume 22, pp. 231–245.CrossRefGoogle Scholar
  39. Wilson, C. (2003). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress (RL32114). Updated 1 April 2005, http://www.iwar.org.uk/cyberterror/resources/crs/45184.pdf [last visited: 25 February 2009].

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Director at the Max Planck Institute for Foreign and International Criminal LawFreiburgGermany

Personalised recommendations