This module is a resource for lecturers
Additional teaching tools
This section includes links to relevant teaching aides such as PowerPoint slides, video material and case studies, that could help the lecturer teach the issues covered by the Module. Lecturers can adapt the slides and other resources to their needs.
PowerPoint presentation
- Presentation on Module 12: Privacy, Investigative Techniques and Intelligence Gathering (forthcoming)
Tools
Several useful tools exist which touch on many different issues covered by this Module as well as other related topics, these include:
- The UN Special Rapporteur on the Protection of Human Rights while Countering Terrorism has produced a report on good practice by intelligence agencies in counter-terrorism efforts, including in respect of the use of agents. See, United Nations, General Assembly, Human Rights Council (2010). Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Martin Scheinin. 17 May. A/HRC/14/46.
- The United Nations, General Assembly (2010). Annual Report of the United Nations High Commissioner for Human Rights on the protection of human rights and fundamental freedoms while countering terrorism. A/HRC/16/50. It discusses specific challenges concerning the use of intelligence in the context of criminal justice processes.
- For an overview of international practice in relation to issues arising in the context of the investigation of terrorist incidents, including practice relating to the relationship between intelligence gathering and the gathering of evidence in relation to terrorist offences see: UNODC, Digest of Terrorist Cases (New York, United Nations, 2010), especially Chapter V (B).
- For examples of good practice in dealing with the various problems that can arise in the context of electronic surveillance see: UNODC, Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime (New York, United Nations, 2009).
- The UNODC publication The Use of the Internet for Terrorist Purposes (New York, United Nations, 2012) provides (in chapter IV) examples of investigative techniques used in the investigation of terrorism-related Internet activities.
- Council of Europe, Committee of Ministers (2005). Recommendation Rec(2005)10 of the Committee of Ministers to member states on "special investigation techniques" in relation to serious crimes including acts of terrorism. 20 April. There is also an Explanatory Report to the Recommendation available, providing useful legal analysis.