BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales Court of Appeal (Criminal Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales Court of Appeal (Criminal Division) Decisions >> Muhammed v R [2010] EWCA Crim 227 (19 February 2010) URL: http://www.bailii.org/ew/cases/EWCA/Crim/2010/227.html Cite as: [2010] EWCA Crim 227, [2010] 3 All ER 759 |
[New search] [Printable RTF version] [Help]
COURT OF APPEAL (CRIMINAL DIVISION)
ON APPEAL FROM THE CROWN COURT AT BLACKFRIARS
HHJ PONTIUS
T20077448/7449
Strand, London, WC2A 2LL |
||
B e f o r e :
MR JUSTICE WYN WILLIAMS
and
HIS HONOUR JUDGE WARWICK MCKINNON
THE RECORDER OF CROYDON
(SITTING AS A JUDGE OF THE COURT OF APPEAL CRIMINAL DIVISION)
____________________
Sultan Muhammed |
Appellant |
|
- and - |
||
The Crown |
Respondent |
____________________
Mr Simon Denison QC for the Respondent
Hearing date: 27/01/2010
____________________
Crown Copyright ©
LORD JUSTICE HOOPER:
DRAFT IDEAS
Mobile/Cell
Have a spare mobile/cell with a separate simcard and only give it to certain or close people.
Use sim cards registered on somebody else's details. (NOTE: You can also use operators that don't require registerating.)
Try use a Nokia 402n or older, this does not have GPRS and there for you are harder to track
Try using your phone outside a certain radius i.e. half a mile or a mile from your house (NOTE: is this certain radius and why do we use it out of this radius and what benefits)
Try avoiding using Islamic words on the phone e.g. jihad, insha'allaah, irhabi etc one of the reason is the phone systems have or are going to have tunnel systems were certain words go back to the operator… more details follow.
E-mail:
Never use email registered on your details… the kuffar linked a sister of one the tel aviv bombers: she had encouraged him email where sent from there home computer and also there details.
Avoid using j-related e mail from your house. (NOTE: Utilise non-home i.e. private flat connection or secure proxy in the least)
A method of email communication is saving comments in the draft folders. (NOTE: The email account used should be changed every so often and promptly in emergency and specific words and plans avoided)
Try have coded words. (NOTE: Best to agree about them offline and passwords agreed offline)
The authorities:
Be smart
Think that you being watched all the time… that way you think and are aware of what you are doing (also reminder the brothers) (NOTE: Dress sensibly to avoid detection, i.e. no military pants and large pagree in middle of London etc)
More details to follow… I will check Islamic awakening article "know your rights" applies to UK Muslims
The brother(s):
Books to read… fazial e jihad, army of medina (NOTE: Tibyaan books have been written to pin point nencessity and read history of islaamic battles and personalities and times of prophets and sahaabahs may Allaah be pleased with them all, and the phase of the prophet sallaahu 'alayhi wasallam.)
More to follow
Sisters:
Weather it be sister wife daughter mother auntie try get the sisters involved… they also have a role. (NOTE: They can be taught thing such as first aid, weapons and then they in turn teach other women secretly and they can be encouraged from examples in history like hawaa barayeb rahimahullaah or summayyah radiyallaahu anha the first martyr or umm ammarrah radiyallaahu anha the prophet sallaahu 'alayhi wasallam's shield in a battle)
Communication with sister should be done via husband brother etc because of the fitnah of today.
Nothing in the content related to the furtherance of the commission or preparation of any act of terrorism. Taken at its highest, the most the document amounted to was suggestions on page 1 about avoidance of surveillance or detection – but not in the context of the commission of any act of terrorism or preparation for any such act.
Have a spare mobile/cell with a separate simcard and only give it to certain or close people.
Use sim cards registered on somebody else's details. (NOTE: You can also use operators that don't require registerating.)
Try use a Nokia 402n or older, this does not have GPRS and there for you are harder to track
Try using your phone outside a certain radius i.e. half a mile or a mile from your house (NOTE: is this certain radius and why do we use it out of this radius and what benefits)
Collection of information
(1) A person commits an offence if -
(a) he collects or makes a record of information of a kind likely to be useful to a person committing or preparing an act of terrorism, or
(b) he possesses a document or record containing information of that kind.
(2) In this section "record" includes a photographic or electronic record.
(3) It is a defence for a person charged with an offence under this section to prove that he had a reasonable excuse for his action or possession.
...
If the person adduces evidence which is sufficient to raise an issue with respect to the matter the court or jury shall assume that the defence is satisfied unless the prosecution proves beyond reasonable doubt that it is not.
50. ... the Crown must prove beyond reasonable doubt that the defendant (1) had control of a record which contained information that was likely to provide practical assistance to a person committing or preparing an act of terrorism, (2) knew that he had the record, and (3) knew the kind of information which it contained. If the Crown establishes all three elements, then it has proved its case against the defendant and he falls to be convicted - unless he establishes a defence under subsection (3).
42. Obviously, on one reading, section 58(1) could cover a multitude of records of everyday common or garden information, which might actually be useful to a person who was preparing to carry out an act of terrorism - eg a Yellow Pages directory listing outlets where he could buy fertiliser and other chemicals for making into a bomb, a timetable from which he could discover the times of trains to take him to the city where he was going to plant his bomb, or an A to Z directory of that city which he could use to find his way to the target. But, rightly, appearing for the Crown, Mr Perry QC repudiated any such interpretation. Parliament cannot have intended to criminalise the possession of information of a kind which is useful to people for all sorts of everyday purposes and which many members of the public regularly obtain or use, simply because that information could also be useful to someone who was preparing an act of terrorism.
43. Indeed, it is clear from what Lord Lloyd said in his report that the aim was to catch the possession of information which would typically be of use to terrorists, as opposed to ordinary members of the population. So, to fall within the section, the information must, of its very nature, be designed to provide practical assistance to a person committing or preparing an act or terrorism. Because that is its nature, section 58(3) requires someone who collects, records or possesses the information to show that he had a reasonable excuse for doing so. The information is such as "calls for an explanation", as Lord Phillips of Worth Matravers LCJ, said in R v K [2008] 2 WLR 1026, 1031, para 14. Of course, it is not necessary that the information should be useful only to a person committing etc an act of terrorism. For instance, information on where to obtain explosives is capable of falling within section 58(1), even though an ordinary crook planning a bank robbery might also find it useful. (Underlining added)
14. ... The natural meaning of that section requires that a document or record that infringes it must contain information of such a nature as to raise a reasonable suspicion that it is intended to be used to assist in the preparation or commission of an act of terrorism. It must be information that calls for an explanation. Thus the section places on the person possessing it the obligation to provide a reasonable excuse. (Underlining added)
By its nature, the information in the notes would be capable of falling within the scope of section 58(1).
Lord Rodger also gave the example of a burglar being in possession of a document containing information about the security system protecting the Home Secretary's residence in order to burgle her house and steal her jewellery (see paragraph 77). Although Lord Rodger was giving this example in the context of his examination of the defence of reasonable excuse, it must follow that he was of the view that such information was, of its very nature, designed to provide practical assistance to a person committing or preparing an act or terrorism. It would not seem to matter that the document containing the information had been designed for a legitimate purpose by the installer of the security system.
45. Interpreted in that way, section 58(1) would cover, for instance, a training manual about making or planting bombs or explosives, or a document containing information about how to get unauthorised entry to military establishments, government offices etc. It would also cover information, whether in the form of an electronic key or otherwise, which enabled a potential terrorist to obtain access to such information. ...
43. ... Of course, it is not necessary that the information should be useful only to a person committing etc an act of terrorism. For instance, information on where to obtain explosives is capable of falling within section 58(1), even though an ordinary crook planning a bank robbery might also find it useful.
44. The role of extrinsic evidence is limited. It can be used to explain to the jury the significance of something in the document, say, a chemical formula, in connection with the planning of an explosion. It can also be used to explain the true nature of the information in a document which has been prepared so as to appear innocuous but whose actual nature and contents are concealed by the use of some sort of code or equivalent device. But, since the document must contain information which is, of its very nature, likely to be useful to a potential terrorist, evidence cannot be led with the aim of showing that a document, such as a timetable, containing everyday information, should be treated as falling within section 58(1). ...
As for the nature of a 'reasonable excuse', it seems to us that this is simply an explanation that the document or record is possessed for a purpose other than to assist in the commission or preparation of an act of terrorism. It matters not that that other purpose may infringe some other provision of the criminal or civil law.
77. ... Suppose, for example, that the accused had a document containing information about the security system protecting the Home Secretary's residence. The interpretation adopted by the Court of Appeal means that, if the defendant proved that he had this document because he was planning to burgle the Home Secretary's house and steal her jewellery, this would, by definition, be a reasonable excuse since the defendant's purpose would not be connected with the commission etc of an act of terrorism. The same would apply if the defendant's purpose was to murder the Home Secretary for purely personal motives. Even if the jury rightly considered that these "excuses" were outrageous rather than reasonable, in each case the judge would have to direct them that the defendant's purpose amounted to a reasonable excuse in terms of section 58(3) and that they would have to acquit him. In our view, Parliament could not have intended section 58(3) to be interpreted or applied in that way.
78. In the course of the hearing, counsel conjured up other, more or less fanciful, scenarios which, again, smacked more of a student moot than of real life. For example, we were asked to contemplate the case of an aspiring cracksman who attends an academy for safe-blowers, takes notes on how to make explosives, and keeps his notes in order to use the information to break open a bank vault. By its nature, the information in the notes would be capable of falling within the scope of section 58(1). The suggestion was that the apprentice cracksman would have a reasonable excuse under section 58(3) for collecting, recording and possessing the information.
79. Of course, if accepted, the explanation would show that the accused's purpose was not to commit an act of terrorism. But that is not the issue under section 58. Under section 58(1), the mere fact that the defendant's purpose was not to commit an act of terrorism is neutral. What he has to show is that he had an objectively reasonable excuse for possessing something which Parliament has made it, prima facie, a crime for him to possess because of its potential utility to a terrorist. An intention to use information in connection with a bank robbery may well be an explanation of why the defendant had the information, but it cannot be a "reasonable" excuse for having it. So the accused would be guilty of the section 58(1) offence. (Underlining added).
85. ... That may well be so. But prosecutors are very familiar with the need to exercise a wise discretion in deciding whether taking proceedings would ultimately be in the public interest. Sexual offences where both parties are under age and both consent are, perhaps, the most obvious example. In the case of sections 57 and 58, however, Parliament has enacted the safeguard that proceedings are not to be initiated without the consent of the Director of Public Prosecutions: section 117(2)(a). This can be seen as an acknowledgment that the nature of these offences is such that not all contraventions of the provisions should be prosecuted. More positively, the need for this consent should help ensure that prosecutors do indeed give due consideration to the public interest and do not embark on prosecutions in cases which do not merit it.
48. ... There was a great deal of anxiety in Parliament about criminalising precocious sexual activity between children. The offences covered by section 13 [of the Sexual Offences Act 2003] in combination with section 9 cover any sort of sexual touching however mild and however truly consensual. [E.g. a thirteen year old girl or boy sexually kissing a twelve year old]. As sexual touching is usually a mutual activity, both the children involved might in theory be prosecuted. Indeed, section 9 expressly contemplates that the person penetrated may be the offender. Obviously, therefore, there will be wide variations in the blameworthiness of the behaviour caught by sections 9 and 13. Both prosecutors and sentencers will have to make careful judgments about who should be prosecuted and what punishment, if any, is appropriate. In many cases, there will be no reason to take any official action at all. In others, protective action by the children's services, whether in respect of the perpetrator or the victim or both, may be more appropriate.
(Cf. K : [2001] UKHL 41; [2002] 1 AC 462; [2002] 1 Cr App R 13, paragraph 24, per Lord Bingham.)