Show Less

Countering Terrorist Financing

The practitioner’s point of view

Edited By Mark Pieth, Daniel Thelesklaf and Radha Ivory

Terrorists need money to commit acts of violence and sustain their operations. Measures to combat terrorism therefore aim to prevent terrorists from raising, moving and using funds or other assets. The effectiveness – and the fairness – of these measures were considered at the second ‘Giessbach’ seminar on counter-terrorist financing (CTF) organised by the Basel Institute on Governance in October 2008.
This book contains essays presented at the seminar written by practitioners and academics with extensive experience in the field of CTF. The authors offer a diversity of views on the domestic, regional and international initiatives aimed at detecting terrorist funds in the financial system, preventing terrorists from moving their money via alternative financial channels and facilitating the recovery of terrorist assets. The editors conclude with in-sights into the ongoing challenge of making CTF measures both effective and legally sustainable in the lead-up to Giessbach III in December 2009.

Prices

Show Summary Details
Restricted access

MARCO GERCKE - Cyberterrorism: how terrorists use the Internet 127

Extract

MARCO GERCKE Cyberterrorism: how terrorists use the Internet I. Introduction Over the past decades, more and more societies have turned into in- formation societies, accessing the great opportunities made possible by the evolution of a Worldwide Web. This trend is generally charac- terised by an emerging use of information technology to access and share information.1 The availability of online services has influenced the means of communication for many Internet users. Other examples of popular Internet services are online banking and telephone com- munications using ‘voice over internet’ protocol (VoIP).2 But it is not Dr. Marco Gercke teaches criminal law with a focus on cybercrime at the Uni- versity of Cologne, Germany. Thanks go to Denise Berger and Radha Ivory of the Basel Institute on Governance for their valuable feedback on this chapter. For more information, please contact: gercke@cybercrime.de. 1 For more information on the information society, see Masuda, The Information Society as Post-Industrial Society; Dutta/De Meyer/Jain/Richter, The Information Society in an Enlarged Europe; Maldoom/Marsden/Sidak/Singer, Broadband in Europe: How Brussels can wire the Information Society; Salzburg Center for International Legal Studies, Legal Issues in the Global Information Society; Hornby/Clarke, Challenge and Change in the Information Society. 2 Regarding the new opportunities, see, e.g.: Communication from the Com- mission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions, 3, available at http://ec. europa.eu/information_society/eeurope/i2010/docs/communications/new_chall_ en_adopted.pdf. Regarding the extent of the integration of Information Com- munication Technologies (ICTs) into...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.