Monday, 5 June 2017

Monthly Legal Newsletter: Online Radicalisation and the Law


Online radicalisation and the law

Islamic groups such as ISIL/ISIS are presently the principle threat to the UK’s security[1].   We know that terrorist groups are increasingly using information and communication technology to recruit and radicalise those susceptible individuals in a purposeful and exacting manner[2] in order to grow their support base.  This seems like an obvious communication strategy[3] for terrorist recruiters and as the Internet has historically had few regulations[4], they have undertaken much of this radicalisation under the radar of various law enforcement agencies[5].  This has been the focus of much justified attention in the UK[6] and the importance highlighted with the creation of agencies such as Counter-Terrorism Internet Referral Unit (‘CITRU’); and the advent of the Government’s strategy on counter terrorism: ‘CONTEST’[7]; pursuant to, the relevant statutory provisions of Counter Terrorism and Security Act 2015 (‘CTSA 2015’).

Research indicates that initial contact is often made with the specifically targeted individuals via the Internet and in particular, via social media websites[8].  Thereafter the indirect contact can be solidified by deeper and intense (even direct) contact[9]

Furthermore, research shows that individuals often targeted and/or inclined to be drawn into the radicalisation machine are vulnerable and young[10], “socially deprived, marginalised males” who tend to spend more time online[11]. The sociological questions are naturally: are these individuals drawn to these available social media pages because they feel ostracised due to of failures within the host countries or; are they ostracised because they seek interests and values that are not within mainstream society?  Would the massive inequalities in wealth[12] have ensued had there been a “peace on terror” instead of a “war on terror”? Socio-economic divisions are notably marked during this period, and the UN pledged to overcome these divisions within their ‘Agenda for Peace’[13].  This Agenda distinguishes between terrorism and democracy; outlining terrorism as the antithesis of social inclusion, actively working against social acceptance within a democracy. 

In the UK, the Home Office does not believe a susceptible individual[14] can be pinpointed however, note that certain background factors may contribute to an individual’s vulnerability[15].  When this is coupled with the frequency with which young persons’ are online[16], the Home Office are able to draw inferences and react accordingly by providing necessary guidance for local authorities[17] on both recognising and tackling this growing concern[18].  In addition to the regulatory framework[19], the requirements are further fulfilled by the presence of supportive organisations armed with specialist techniques namely Channel’[20] and ’Families Against Stress and Trauma’ (‘FAST’)[21]
Interactivity within the cyber realm is increasing, playing games online with people worldwide, educating children online, and instant communication[22] is an intrinsic part of this enablement.  These interactive systems can ‘learn’ behavioural patterns of users and be manipulated accordingly[23].  It was only a matter of time before the criminal domain optimised this development to grow their following and desensitise potential recruits to violent extremism.  These interactions are readily available on a variety of platforms accessible to all[24]

The advantages of social media sites are that the posts can be quickly distributed, removed and re-posted as necessary[25]; with instantaneous alerts available on all viewing devices. 
Evidence of increased interactivity lends to the training of recruits; CONTEST reported that some returning radicalised Britons[26] were “likely to have received combat…and other…related training”[27] in situ however we are increasingly aware of training being disseminated online via social media[28] accounts[29].  Interactive processes are able to generate messages[30] at an alarming rate, recruiters are reported to bombard recruits with some “200,000 tweets a day”[31] effectively brainwashing “young, impressionable”[32] recruits with over-saturation of a message.

The disadvantages of social media sites are that the IP address, for the most part, can be located and the perpetrator apprehended however, there is evidence suggesting that ISIL is becoming adept at avoiding this pitfall[33].  Assisting this phenomenon, ‘Cloud’ computing increasingly allows for both secretive storage and dissemination of contentious material; and care should be taken here. 

The main processes used by ISIL revolve around the 4 essential themes[34].  All these themes are supported by powerful, persuasive images[35] and use of language[36] and literature[37] on the social media websites.  Processes potentially rely heavily on the individual’s own ability to ‘self-radicalise’[38] but these proven techniques act as a funnel.  Effectively, hitting a wide audience initially, getting individuals ‘hooked’, then taking those devoted individuals deeper into secretive communication with a view to encouraging travel to regions[39] and defection from Western values[40].  Western values that are not necessarily held by these individuals; research indicates that these opposing beliefs are held prior to interaction online, and are simply “reinforced”[41] by recruiters. 
In the years following 9/11 we witnessed regimes being terminated by force; including detentions without trial and torture[42] yet despite these deterrents, the recruitment of terrorists steadily continues.

And technological processes importantly, are such that the terrorist organisations use ‘PGP’[43] settings to achieve their goal of reaching individuals with communications covertly; evading interception by international law enforcement agencies.  Data is encrypted and capable of decryption with PGP software[44]

Processes are becoming increasingly interrupted by law enforcement agencies in the UK however these disruptions[45] can be overcome by highly motivated recruiters[46].  We know that initial contact is openly available and has been deemed “relatively easy”[47] to do.  Social media campaigns are utilised to effectively repost “closed forum” content to a wider group[48]

When examining counter terrorist strategies effectively interrupting these terrorist processes we know that “since February 2010 over 95,000 pieces of terrorist content have been removed from the Internet”[49] in the UK.  An achievement by organisations such as CITRU, working with “key social media outlets”[50] in a bid to eradicate the content deemed in breach of statutory provisions[51].   

In conclusion, wider concerns surrounding the interception of personal communication technology by government agencies[52], has justly prompted the UK to insert a regulated framework[53] to prevent any abuses.  We understand that “global consensus”[54] is required however, political beliefs are intrinsically subjective thus law enforcement is internationally variable on this topic allowing gaps to evolve.  We recognise that it is essential for law enforcement agencies to work ceaselessly to remove terrorist material[55] and overcome the legislative barriers when locating content on foreign servers.  It is critical to pre-empt the attractive trends for terrorist recruiters[56] and one argument is; if we are not able to remain one step ahead of terrorist’s technological tactics, simply adopt the same strategies for accomplishing counter terrorist goals[57].

As previously outlined, we all are required to act responsibly online and in the cyber realm.  Should you require legal assistance in this area, please contact me directly.

Please note this article was drafted prior to the recent attack in London and our thoughts are with all those affected.

Next time: looking at arming of PSCs/PMCs and legal implications.  Any issues that you may want covered, please contact.






[1] CONTEST: the UK’s strategy for countering terrorism.  (2015). Annual Report for 2014.  Retrieved: https://www.gov.uk/government/collections/contest
[2] Ibid.                                                                                                                 
[3] Freiburger, T., & Crane, J.S.  (2008). A Systematic Examination of Terrorist Use of the Internet.  International Journal of Cyber Criminology, Volume 2 (Issue 1), p 310.                                                                          
[4] CONTEST: the UK’s strategy for countering terrorism.  (2011). Report for July 2011.  Retrieved: https://www.gov.uk/government/collections/contest
[5] Op. cit. n. 3.
[6] Op. cit. n. 1.
[7] General outline of CONTEST: the UK’s strategy for countering terrorism. (2016).  Retrieved: https://www.gov.uk/government/collections/contest
[8] Families Against Stress and Trauma (‘FAST’).  (2016). Various.  Retrieved: http://www.familiesmatter.org.uk/should-i-worry/extremism-online/
[10] Paul Gill & John Horgan (2013) Who Were the Volunteers? The Shifting Sociological and Operational Profile of 1240 Provisional Irish Republican Army Members, Terrorism and Political Violence, 25:3, 435-456, DOI: 10.1080/09546553.2012.664587 cited in S. Macdonald and D. Mair, “Terrorism online: a new strategic environment,” chapter 1 of L. Jarvis, S. Macdonald and T. M. Chen (eds) Terrorism Online: Politics, Law and Technology (2015; Oxon: Routledge), p.16.
[11] Freiburger, T., & Crane, J.S.  (2008). A Systematic Examination of Terrorist Use of the Internet.  International Journal of Cyber Criminology, Volume 2 (Issue 1), at p 313.
[12] P. Rogers, “Peace Studies,” chapter 5 of A. Collins (ed) Contemporary Security Studies (2007; Oxford: Collins), p.80.
[13] United Nations: Security-General. (1992). The Agenda for Peace. (A/47/277).  Retrieved: http://www.un-documents.net/a47-277.htm
[14] Home Office.  (2015). Keeping Children Safe in Education: statutory guidance for schools and colleges. Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/447595/KCSIE_July_2015.pdf
[15] Ibid. 
[16] S. Macdonald and D. Mair, “Terrorism online: a new strategic environment,” chapter 1 of L. Jarvis, S. Macdonald and T. M. Chen (eds) Terrorism Online: Politics, Law and Technology (2015; Oxon: Routledge), p.16.
[17] Section 29 Counter Terrorism and Security Act 2015.
[18] The PREVENT strategy as outlined within the UK’s Strategy for countering Terrorism see: Op. cit. n. 4.
[19] Sections 36 to 38 Counter Terrorism and Security Act 2015.                                        
[20] As part of the PREVENT strategy within CONTEST reporting cited in: Home Office.  (2015). How Social Media is used to encourage travel to Syria and Iraq: Briefing Note for Schools.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/447595/KCSIE_July_2015.pdf
[21] Ibid.
[22] CONTEST: the UK’s strategy for countering terrorism.  (2011). Report for July 2011.  Retrieved: https://www.gov.uk/government/collections/contest
[23] This has been found particularly useful for legitimate marketing campaigns as the organisations can utilise dialogic media technology to strategically build rapport with their targeted audience see: WiKipedia (2016).  Interactive media.  Retrieved: https://en.wikipedia.org/wiki/Interactive_media
[24] Freiburger, T., & Crane, J.S.  (2008). A Systematic Examination of Terrorist Use of the Internet.  International Journal of Cyber Criminology, Volume 2 (Issue 1), p 313.
[25] Op. cit. n. 22.
[26] CONTEST: the UK’s strategy for countering terrorism.  (2015). Annual Report for 2014.  Retrieved: https://www.gov.uk/government/collections/contest
[27] Ibid.
[28] Op. cit. n. 24 at p. 311.
[29] For example; the videos available on YouTube and online bomb making guides cited: Op. cit. n. 24 at p. 315.
[30] By way of social media messaging in particular.
[31] As outlined when discussing the Counter Terrorism Project cited on: Families Against Stress and Trauma (‘FAST’).  (2016). Various.  Retrieved: http://www.familiesmatter.org.uk/should-i-worry/extremism-online/
[32] Ibid. 
[33] ISIL are developing software to evade IP address being located cited: United Nations Security Council.  (2015). Implementation of Security Council Resolution 2178 (2014) by States affected by foreign terrorist fighters.   (S/2015/683).  Retrieved: http://www.un.org/en/sc/ctc/docs/2015/N1527297_EN.pdf
34 Four themes are outlined: The image of success portrayed by the organisation; status and belonging (focusing on the individual’s duty to engage in travel); the personal duty of that individual to be part of the ‘caliphate’ and finally the expectation that the individual needs to defend the Sunni Muslims against the threat of the West see: Home Office.  (2015). How Social Media is used to encourage travel to Syria and Iraq: Briefing Note for Schools.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/447595/KCSIE_July_2015.pdf.
[35] Instagram used for images of fighters and a happy quality of life in Syria see Home Office Report: Ibid. 
[36] The Cyberterrorism Project.  (2015). Online Terrorist Magazines: Preliminary Findings November 2015.  Retrieved: http://www.cyberterrorism-project.org/wp-content/uploads/2015/11/CTP-2015-Report-Nov-03.pdf
[37] Often using “prayers, religious aphorisms and content from the Quran” see page 24 of: The Brookings Project on U.S Relations with the Islamic World: J.M Berger and Jonathan Morgan.  (2015). The Twitter Census: Defining and describing the population of ISIS supporters on Twitter (Analysis Paper No.20, March 2015).  Massachusetts: Brookings.
[38] S. Macdonald and D. Mair, “Terrorism online: a new strategic environment,” chapter 1 of L. Jarvis, S. Macdonald and T. M. Chen (eds) Terrorism Online: Politics, Law and Technology (2015; Oxon: Routledge), p.17.
[39] Explanation of private messaging as per the process see: Op. cit. n 35.
[40] Freiburger, T., & Crane, J.S.  (2008). A Systematic Examination of Terrorist Use of the Internet.  International Journal of Cyber Criminology, Volume 2 (Issue 1), p 314. 
[41] P. Gill and E. Corner, “Lone actor terrorist use of Internet and behavioural correlates,” chapter 2 of L. Jarvis, S. Macdonald and T. M. Chen (eds) Terrorism Online: Politics, Law and Technology (2015; Oxon: Routledge), p.40.
[42] P. Rogers, “Peace Studies,” chapter 5 of A. Collins (ed) Contemporary Security Studies (2007; Oxford: Collins), p.80.
[43] ‘Pretty Good Privacy’ (PGP) cited: WiKipedia.  (2016) Pretty Good Privacy (PGP).  Retrieved: https://en.wikipedia.org/wiki/Pretty_Good_Privacy

[44] PGP defined as per: Ibid.
[45] CONTEST: the UK’s strategy for countering terrorism.  (2015). Annual Report for 2014.  Retrieved: https://www.gov.uk/government/collections/contest
[46] ISIL has scuppered attempts at this see: United Nations Security Council.  (2015). Implementation of Security Council Resolution 2178 (2014) by States affected by foreign terrorist fighters.   (S/2015/683).  Retrieved: http://www.un.org/en/sc/ctc/docs/2015/N1527297_EN.pdf
[47] Ibid.         
[48] Op. cit. n. 46.
[49] Home Office.  (2015). How Social Media is used to encourage travel to Syria and Iraq: Briefing Note for Schools.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/447595/KCSIE_July_2015.pdf
[50] Counter Terrorism Internet Referral Unit. (2015). The Counter Terrorism Internet Referral Unit (CITRU). Retrieved: https://wiki.openrightsgroup.org/wiki/Counter_Terrorism_Internet_Referral_Unit
[51] Sections 1 & 2 Terrorism Act 2006.
[52] Op. cit. n. 46.                                                                        
[53] See Privacy and Civil Liberties Board to oversee and review Terrorism Legislation within Section 46 Counter Terrorism and Security Act 2015.
[54] Op. cit. n. 46.
[55] Sections 1 and 2 of Terrorism Act 2006.
[56] Op. cit. n. 46.
[57] Freiburger, T., & Crane, J.S.  (2008). A Systematic Examination of Terrorist Use of the Internet.  International Journal of Cyber Criminology, Volume 2 (Issue 1), p 316. 

Monday, 8 May 2017

Monthly Legal Newsletter: Cyberterrorism and International Legal Matters

Cyber threats in the form of cyberterrorism are complicated by the overarching international laws, creating challenges for you as security consultants.  I have been asked to advise on the supremacy of legal jurisdictions unfortunately, there is no easy way to answer this.  The relationship between national and international laws is a complex one and you need to factor in whether countries are signatories to treaties, if domestic jurisdictions have ratified all articles of conventions – this is not a tick box exercise thus, legal assistance may often be required. 

Although the likelihood of a cyberterrorist attack is low because of the costs involved; that is not to say it is impossible. 

As you will be aware, cyberterrorism is defined as one of three possible threats, by the Centre for the Protection of National Infrastructure[1] (‘CPNI’), faced in the UK.  And, the UN believe a “global consensus”[2] is required when addressing terrorism online.  In reality this is based on the supposition that non-state actors will utilise other states to facilitate their activities, either through lack of clear boundaries between a state’s cyberspace and/or taking advantage of a particular state’s bias toward a group and their beliefs.  Specifically when identifying the international risk posed by terror networks the CPNI recognise, that it is important to maintain and develop relationships with both private and public entities abroad to collectively work to prevent such attacks[3].

When acting in the best interests of our client’s security, mitigation is key and the CPNI urge businesses to remain aware of security risks thereby reducing the risk; and by mitigation we mean:

“Businesses can reduce the risk to themselves, their employees and customers by remaining vigilant, being security minded and having good security measures in place. A small investment in security measures helps to protect businesses against crime and make the work of terrorists and hostile foreign states more difficult.” 

Legal cases emanating from the International Court of Justice (‘ICJ’) demonstrate an obligation is placed on a state, to positively react to a threat and/or make a fellow state aware of a threat originating[4] from within ‘their’ state/cyberspace[5]; reinforcing CPNI’s position: we should all be aware of cybercrime and act proactively to prevent it and/or harden targets.  When we become aware of online security issues, we are all obliged to make the relevant authorities directly aware or follow an employer’s internal reporting protocol.  As roving security consultants; your ‘office’ is often ‘in the field’ however, your duties extend to you there (as you will be aware). 

The UK advocates a proactive stance on cyberterrorism, effectively promoting our national obligation to the wider global community and in particular, to “our allies”[6].  The ‘UK Cyber Security Strategy’[7] launched in 2011[8], is readily available online to assist our clients both practically and legally, and you can update your knowledge with the annual reports. 

Some threats may first appear as benign ‘glitch’; an attacker may hit our client’s systems with a vulnerability that is not intended to be discovered initially; but as work is done to rectify the glitch, a repetitive attack may be uncovered - thus demonstrating that both vigilance and reporting is critical.

There are arguments for and against an overarching international framework of governance for the Internet, in the absence of such a treaty we should remain live to the ‘Budapest Convention: The Convention on Cybercrime’ (‘the Convention’) as it reinforces the importance of fighting cybercrime for signatories.  The Convention is effectively reconciled against the backdrop of:  

“fundamental human rights as enshrined in the 1950 Council of Europe Convention for the Protection if Human Rights and Fundamental Freedoms”[9].

The Convention:
  • ·         Applies internationally, where ratified*;
  • ·         Contains helpful instructions and guidance to assist with both practical application of both members and non-members alike.

*those countries who have ratified the Convention are found easily online for you.

In the absence of clear virtual boundaries in cyberspace[10], there is an argument to adopt similar limitations as applied in the case of maritime law.  Many of you will be directly familiar with the United Nations Convention on the Law of the Sea[11] (‘UNCLOS’).  The idea is a simple one, conceptual boundaries in cyber-space, agreed by an overarching international organisation such as the UN.  In effect the notion of international zones depicting areas relating to territorial cyberspace.  This would serve to identify whether a cyberterrorist act is committed[12] by a state or non-state actor and allow for prosecution to be based on the boundaries as agreed.   

However in contrast, there is an argument that, as cyberspace exists supranationally, existing legal frameworks cannot be utilised.  Cyberspace, has borders that are not tangible and cannot be crossed and in addition, cyberspace is literally – above and beyond current “physical geographic borders”[13].

The aforementioned Convention, was launched by the European Community and has many non-member signatories and accessions; however the Convention does not apply globally and is not binding on all states.  When examining cyberterrorism and cultural variants[14], some states may be perceived as ‘soft’ option for certain networks and enable them to use their soil as a base[15] to launch cyberterrorist attacks.  

With this in mind; a UN treaty similar to UNCLOS could overcome these challenges by firstly harmonising[16] and consolidating a plethora of existing national[17] and international laws and; by creating an almost ‘physical’ set of boundaries/zones making individual states accountable for cyberterrorist attacks being developed on their soil. 

By growing accountability, both governance and liability could be effectively proportioned and prosecution of the same possible.  The UK recognise that prevention of “safe havens”[18] on foreign soils as crucial in the fight against cyberterrorism.  A treaty could establish governance and introduce a tribunal system as in the UNCLOS tribunal[19], acting as a mediator with international disputes regarding cyberspace and in an advisory capacity[20].  The ultimate challenge to overcome is drafting a constitution for the activities of cyberspace that is applicable to all cultures and legal jurisdictions[21].  This is overcome by ensuring that the framework[22] is reconciled against the existing international human rights law[23]

In conclusion, the fact that a number of non-member states’ signed up to the European Convention on cybercrime, would suggest that there is a requirement for such a global UN treaty.  Thus a pragmatic approach is recommended for policymakers to both pressurise the legislatures at international organisations and heed the inferences to be drawn from the ratification of the European Convention on cybercrime.

Those of you also working in this arena may be in the privileged position of speaking directly to the powers that be and, potentially lobbying for some advancement on this security concern.  Should further legal advice be required, please contact me directly at WHS Legal Consulting Ltd. 

[1] Centre for the Protection of National Infrastructure.  (2010)  Protecting Against Terrorism (3rd ed).  England: Crown Copyright.  Retrieved: http://www.cpni.gov.uk/threats/terrorism/
[2] United Nations Security Council.  (2015). Implementation of Security Council Resolution 2178 (2014) by States affected by foreign terrorist fighters.   (S/2015/683).  Retrieved: http://www.un.org/en/sc/ctc/docs/2015/N1527297_EN.pdf
[3] Centre for the Protection of National Infrastructure.  (2010). Who We Work With. England: Crown Copyright.  http://www.cpni.gov.uk/about/Who-we-work-with/

[4] This would also include data clouds being located within a jurisdiction, see relevant case law (made available on request).

[5] Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania) [1949] (Summary) 1949/3 Judgment of 15 Dec 1949.   

[6] Ibid. 
[7] Cabinet Office.  (2011). UK Cyber Security Strategy: Protecting and promoting the UK in a digital world report 2010.  London: Crown copyright.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[8] Following the NATO summit, Lisbon 2010 at para: 40 of the Declaration of the North Atlantic Treaty Organisation (NATO).  (2010). Lisbon Summit Declaration.  Lisbon: Public Diplomacy Division.  Retrieved: http://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2010_11/2010_11_11DE1DB9B73C4F9BBFB52B2C94722EAC_PR_CP_2010_0155_ENG-Summit_LISBON.pdf
[9] Budapest Convention: The Convention on Cybercrime 2001 [CETS No. 185] see Preamble.
[10] The “borderless and anonymous nature of the internet” prevents attributable liability see: Cabinet Office.  (2011). UK Cyber Security Strategy: Protecting and promoting the UK in a digital world report 2010.  London: Crown copyright.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[11] United Nations Convention on the Law of the Sea 1982 [Office of Legal Affairs, UN].   Retrieved: http://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf
[12] Op. cit. 9 at Section 3, Art 22 ‘Jurisdiction’.                                                                              
[13] K. M. Rogers., The Internet and the Law.  (2011; Palgrave Macmillan: Basingstoke). 
[14] The importance of remaining respectful of cultural differences see Cabinet Office.  (2011). UK Cyber Security Strategy: Protecting and promoting the UK in a digital world report 2010.  London: Crown copyright.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[15] This is due to different jurisdictions possessing varying thresholds for interception by authorities see United Nations Security Council.  (2015). Implementation of Security Council Resolution 2178 (2014) by States affected by foreign terrorist fighters.   (S/2015/683).  Retrieved: http://www.un.org/en/sc/ctc/docs/2015/N1527297_EN.pdf
[16]An integral and challenging component of any national Cybersecurity strategy is the adoption of regionally and internationally harmonized, appropriate legislations against the misuse of ICTs for criminal or other mischievous purposes’ found on International Telecommunications Unit.  (2016) Legal Measures: Legislation.  Retrieved: http://www.itu.int/en/ITU-D/Cybersecurity/Pages/Legal-Measures.aspx
[17] There are a number of statutes in the UK overarching the conduct of individuals’ when online see: The Computer Misuse Act 1990; Serious Crime Act 2015 and Serious Crime Act 2007. 
[18] Op. cit. 14.
[19] Statute of the International Tribunal for the Law of the Sea at Section 1, Art 1 onwards of Annex VI of the United Nations Convention on the Law of the Sea 1982 [Office of Legal Affairs, UN].  Retrieved: http://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf
[20] In particular, the Seabed Disputes Chamber acts in an advisory capacity see Section 5, Arts 186 – 191 of United Nations Convention on the Law of the Sea 1982 [Office of Legal Affairs, UN].   Retrieved: http://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf
[21] The UN believe that any “global commons” be regulated in a united manner and that includes “global communications” found: United Nations. (2016). Global Issues: International Law.  Retrieved: http://www.un.org/en/globalissues/internationallaw/  
[22] Cabinet Office.  (2011). UK Cyber Security Strategy: Protecting and promoting the UK in a digital world report 2010.  London: Crown copyright.  Retrieved: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[23] The Charter of the United Nations of 1945; in particular Art 2(4) and Art 51 retrieved: http://www.un.org/en/charter-united-nations/index.html

Monthly Legal Newsletter: Online Radicalisation and the Law

Online radicalisation and the law Islamic groups such as ISIL/ISIS are presently the principle threat to the UK’s security [1] .   We...