Startseite The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism

  • Charanjit Singh ORCID logo EMAIL logo
Veröffentlicht/Copyright: 2. August 2021

Abstract

Crimes such as terrorism pose some of the biggest postmodern challenges faced by criminal justice systems worldwide. How systems react and prevent such crime raises numerous legal, political and strategic issues i.e. cross-jurisdictional collaboration, policing and the erosion of civil liberties such as privacy. In this article, taking inspiration from criminological theory, two criminal justice challenges that are posed by terrorism are explored from the United Kingdom’s perspective: the international definition of terrorism including the factors that impede a common definition from being established and the domestic response to define, prevent and prosecute this crime. The aim of, and originality in, this article is to explore the criminal justice challenge facing the United Kingdom in balancing complex and competing interests when effectively responding to terror crime.


Corresponding author: Charanjit Singh, Barrister-at-Law, Holborn Chambers, London and University of Westminster, London, UK, E-mail:

References

Abeyratne, R. 2011. “The Beijing Convention of 2010 on the Suppression of Unlawful Acts Relating to International Civil Aviation – an Interpretative Study.” Journal of Transportation Security 4: 131, https://doi.org/10.1007/s12198-011-0062-7.Suche in Google Scholar

Al-Lami, M. 2009. Studies of Radicalisation: State of the Field Report. London: Department of Politics and International Relations: University of London.Suche in Google Scholar

Amnesty International. “Encryption: A Matter of Human Rights.” POL40/3682/2016.Suche in Google Scholar

Archick, K., J. Rollins, and S. Woehrel. 2005. Islamist Extremism in Europe. Washington DC: Congressional Research Service.Suche in Google Scholar

Ashworth, A. 1977. “Excluding Evidence as Protecting Rights.” Criminal Law Review 3: 723–35.Suche in Google Scholar

Al-Lami, M., and B. O’Loughlin. 2009. Jihadist Try to Make Friends on Facebook. London: Guardian.Suche in Google Scholar

Baker, K., J. Mitchell, and B. Tindall. 2007. Combating Islamic Terrorism in Europe. Washington DC: American Diplomacy.Suche in Google Scholar

Bass, G. J. 2000. Stay the Hand of Vengeance: The Politics of War Crimes Tribunals. Princeton: Princeton University Press.10.1515/9781400851713Suche in Google Scholar

Benjamin, D., and S. Simon. 2002. The Age of Sacred Terror. New York: Random House.Suche in Google Scholar

Benjamin, W. 2001. Critical Constellations (Key Contemporary Thinkers). UK: Polity Press.Suche in Google Scholar

Bhui, K., N. Warfa, and E. Jones. 2014. “Is Violent Radicalisation Associated with Poverty, Migration, Poor Self-Reported Health and Common Mental Disorders?” PloS One 9 (3): 1–10.10.1371/journal.pone.0090718Suche in Google Scholar

Biersteker, T. J., and S. Eckert. 2000. Targeted Financial Sanctions: A Manual for Design and Implementation. USA: Thomas J. Watson Jr. Institute for International Studies.Suche in Google Scholar

Bigo, D., L. Bonelli, E-P. Guittet, F. Ragazzi, and Preventing and countering youth radicalisation in the EU. 2014. Directorate General for Internal Policies, Policy Department C: Citizens’ Rights and Constitutional Affairs, Civil Liberties, Justice and Home Affairs. Brussels: European Union.Suche in Google Scholar

Bizina, M., and D. H. Gray. 2014. “Radicalization of Youth as a Growing Concern for Counter-terrorism Policy.” Global Security Studies 5 (1): 72–9.Suche in Google Scholar

Brandon, B. 2004. “Terrorism, Human Rights and the Rule of Law: 120 Years of the UK’s Legal Response to Terrorism.” Criminal Law Review: 981–97.Suche in Google Scholar

Briggs, R. 2010. “Community Engagement for Counterterrorism: Lessons from the United Kingdom.” International Affairs 86 (4): 971–81, https://doi.org/10.1111/j.1468-2346.2010.00923.x.Suche in Google Scholar

Brodeur, J. P. 2002. “Undercover Policing in Canada: Wanting What is Wrong.” Crime, Law and Social Change 18 (10–12): 105–306. In: Loftus, B. and Goold, B. Covert Surveillance and the invisibilities of Policing. Criminology and Criminal Justice. 2012, 12: 275.10.1007/BF00230627Suche in Google Scholar

Bull, R., and B. R. Clifford. 1984. “Ear-witness Voice Recognition Accuracy.” In Eyewitness Testimony: Psychological Perspectives, edited by G. L. Wells, and E. F. Loftus, 92–123. Cambridge: Cambridge University Press.Suche in Google Scholar

Carr, S., E. Piasecki, G. Tully, and T. J. Wilson. 2016. “Opening the Scientific Expert’s Black Box: “Critical Trust” as a Reformative Principle in Criminal Evidence.” Journal of Criminal Law 80 (5): 364–86, https://doi.org/10.1177/0022018316669220.Suche in Google Scholar

Carrabine, E., P. Cox, P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. 2014. Criminology: A Sociological Introduction, 3rd ed. London: Routledge.10.4324/9780203082492Suche in Google Scholar

Chesney, R. M., and J. L. Goldsmith. 2010. “Terrorism and the Convergence of Criminal and Military Detention Models.” Stanford Law Review 60 (4): 1079.Suche in Google Scholar

Christmann, K. 2012. Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. Huddersfield: Youth Justice Board for England and Wales Report and the University of Huddersfield.Suche in Google Scholar

Clifford, B. R. 1980. “Voice Identification by Human Listeners: On Earwitness Reliability.” Law and Human Behavior 4: 373–94, https://doi.org/10.1007/bf01040628.Suche in Google Scholar

Commons Library briefing. UK Parliament. 2017. “Counter-Terrorism and Security Act 2015 (Amendment) Bill 2016–17”.Suche in Google Scholar

Council of Europe. Council Framework Decision of 13 June 2002 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/919/JHA.Suche in Google Scholar

Council of Europe. Council Framework Decision of 28 November 2008 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/475/JHA.Suche in Google Scholar

Covert Surveillance and Property Interference. 2010. Revised Codes of Practice, 7. London: HMSO.Suche in Google Scholar

Davis, J. 2016. “Equality of Arms: Complying with International Human Rights Law in Cases against Alleged Terrorists.” Journal of Conflict and Security Law 21 (1): 69–89, https://doi.org/10.1093/jcsl/krv020.Suche in Google Scholar

Duff, A., L. Farmer, S. Marshall, and V. Tadros. 2007. The Trial on Trial Volume 3: Towards a Normative Theory of Criminal Trial. Oxford: Hart Publishing.Suche in Google Scholar

Daniels, R., P. Macklem, and K. Roach. 2001. The Security of Freedom: Essays on Canada’s Anti-terrorism Bill. Canada: University of Toronto Press.10.3138/9781442682337Suche in Google Scholar

Deflem, M., ed. 2004. Terrorism and Counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.1108/S1521-6136(2004)5Suche in Google Scholar

Draft Investigatory Powers Bill. 2015. Publications. UK: HMSO.Suche in Google Scholar

Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Suche in Google Scholar

Ericson, R. 1994. “The Royal Commission on Criminal Justice Surveillance.” In Criminal Justice in Crisis, edited by M. McConville, and L. Bridges, 113–40. UK: Edward Elgar.Suche in Google Scholar

Ericsson, R. V., and K. D. Haggerty. 1997. Policing the Risk Society, 52–4. UK: OUP, and Barnard-Wills, D. and Wells, H. Surveillance, technology and the everyday. Criminology and Criminal Justice. 2012, 12: 227.10.3138/9781442678590Suche in Google Scholar

Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Suche in Google Scholar

Ferrell, J. 2007. “Cultural Criminology.” In Blackwell Encyclopaedia of Sociology, edited by G. Ritzer UK: Blackwell Publishing. Blackwell Reference Online, https://doi.org/10.1002/9781405165518.wbeosc171.Suche in Google Scholar

Ferrell, J., and C. R. Sanders, eds. 1995. Cultural Criminology. Boston: Northeastern.Suche in Google Scholar

Ferrell, J., K. Hayward, W. Morrison, and M. Presdee, eds. 2004. Cultural Criminology Unleashed. London: Cavendish/Glasshouse.Suche in Google Scholar

Foucault, M. 1979. Discipline and Punish, the Birth of the Prison. New York: Vintage Books.Suche in Google Scholar

Foucault, M. 2003. “Power/Knowledge.” In Philosophies of Social Science: The Classic and Contemporary Readings, edited by G. Delanty, and P. Strydom UK: Open University Press, https://doi.org/10.4324/9780203380437-12.Suche in Google Scholar

Gateau, C., and P. Faron. 2015. Fight against Terrorism on the Internet: France Strengthens its Legal Arsenal. London: Global Media Communications Watch.Suche in Google Scholar

Genser, J., and B. S. Ugarte. 2014. The United Nations Security Council in the Age of Human Rights, 200. Cambridge: Cambridge University Press.10.1017/CBO9781139626972Suche in Google Scholar

Goldsmith, L. J., and N. Katyal, Op-eds. 2007. The op Terrorists’ Court. New York: N. Y. Times.Suche in Google Scholar

Gragera, J. P., and D. S. Pascual. 2014. “A Phenomenological Analysis of Terrorism and Organized Crime from a Comparative Criminological Perspective.” Journal of Law and Criminal Justice 2 (2): 113–31, https://doi.org/10.15640/jlcj.v2n2a7.Suche in Google Scholar

Guiora, A. N., and J. T. Parry. 2008. “Light at the End of the Pipeline: Choosing a Forum for Suspected Terrorists.” University of Pennsylvania Law Review Online 156 (1): 24.Suche in Google Scholar

Hamm, M. 2004. “The USA Patriot Act and the Politics of Fear, chapter 24.” In Cultural Criminology Unleashed, edited by J. Ferrell, K. Hayward, W. Morrison, and M. Presdee, 293. UK: OUP.Suche in Google Scholar

Hayward, K., and J. Young 2007. “Cultural Criminology.” In The Oxford Handbook of Criminology, edited by M.Maguire, R. Morgan, and R. Reiner, 102–21. Oxford: OUP.10.1093/obo/9780195396607-0003Suche in Google Scholar

Hehir, A., N. Kuhrt, and A. Mumford, eds. 2011. International Law, Security and Ethics: Policy Challenges in the Post-9/11 World. New York: Routledge.Suche in Google Scholar

Hill, M. 2018. Report of the Independent Reviewer of Terrorism Legislation, on the Operation of the Terrorism Acts 2000 and 2006, the Terrorism Prevention and Investigation Measures Act 2011, and the Terrorist Asset Freezing Etc. Act 2010. UK: HMSO.Suche in Google Scholar

Home Office. 2009. Statistics on Terrorism Arrests and Outcomes Great Britain September 11, 2001 to March 31, 2008. London: Home Office. 04/09.Suche in Google Scholar

Home Office. 2010. “Statistics on Terrorism Arrests.” [ONLINE] Available at https://www.gov.uk/government/statistics/statistics-on-terrorism-arrests.Suche in Google Scholar

Home Office Statistical bulletin 32/19. Individuals Referred to and Supported through the Prevent Programme, England and Wales. UK: HMSO. April 2018 to March 2019.Suche in Google Scholar

Honderich, T. 2002. After the Terror. Edinburgh: Edinburgh University Press.10.1515/9780585443652Suche in Google Scholar

Horgan, J. 2008. “From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism.” The Annals of the American Academy of Political and Social Science 618: 1, https://doi.org/10.1177/0002716208317539.Suche in Google Scholar

Horgan, J. 2009. “Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements.” In Criminology: A Sociological Introduction, 3rd ed., edited by E. Carrabine, P. Cox , P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. London: Routledge.Suche in Google Scholar

House of Commons Written Statement 287 (HCWS287). 2015. “Witness Statement by the Secretary of State for the Home Department (Mrs Theresa May)”.Suche in Google Scholar

Humanitarian Law Project v Ashcroft (HLP). “309 F. Supp.2d 1185, 1200.” (C.D. Cal. 2004).Suche in Google Scholar

Jackson, J., and S. Doran. 1995. Judge without Jury: Diplock Trials in the Adversary System. United Kingdom: Clarendon Press.10.1093/oso/9780198258896.001.0001Suche in Google Scholar

Jenkins, B. 2000. “Terrorism.” In Encyclopaedia of Sociology, edited by E. Borgatta, and R. Montgomery. New York: Macmillan.10.1080/02684528808431937Suche in Google Scholar

Judgment of the Nuremberg Military Tribunal. 1947. “American Journal of International Law 41/172”.10.2307/2193873Suche in Google Scholar

Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com No 325.Suche in Google Scholar

Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com No 190.Suche in Google Scholar

Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com. Report No. 325 (Date accessed January 20, 2015).Suche in Google Scholar

Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com. Consultation Paper No. 190.Suche in Google Scholar

Law Com. Report No. 325 (2011).Suche in Google Scholar

Law Com. Consultation Paper No. 190 (2009).Suche in Google Scholar

Liberty. 2010. Liberty’s Response to Lord Carlile’s Review of the Definition of Terrorism. London: Liberty.Suche in Google Scholar

Liberty. 2010. Terrorism Pre-charge Detention Comparative Law Study. London: Liberty.Suche in Google Scholar

Lyon, D. 2001. Surveillance Society: Monitoring Everyday Life. Philadelphia: Open University Press.Suche in Google Scholar

Marx, G. 1988. Undercover: Police Surveillance in America. USA: California University press.10.1525/9780520910041Suche in Google Scholar

MacDonald, L. 2011. Review of Counter-terrorism and Security Powers. London: HMSO.Suche in Google Scholar

Manningham-Buller, E. 2005. “The International Terrorist Threat and the Dilemmas Countering it, Security Service MI5”.Suche in Google Scholar

McIntyre, T. J. 2016. “Judicial Oversight of Surveillance: The Case of Ireland in Comparative Perspective.” In Judges as Guardians of Constitutionalism and Human Rights, edited by M. Scheinin, H. Krunke, and M. Aksenova, 136. USA: Edward Elgar Publishing.10.4337/9781785365867.00014Suche in Google Scholar

Mclaughlin, E. 2006. “Terrorism.” In Sage Dictionary of Criminology, 2nd ed., edited by E. Mclaughlin, and J. Muncie. London: Sage. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.Suche in Google Scholar

Murray, C. R. G. 2016. “Nudging or Fudging? the UK Courts’ Counterterrorism Jurisprudence since 9/11.” Journal of Conflict and Security Law 21 (1): 91–113, https://doi.org/10.1093/jcsl/krv021.Suche in Google Scholar

Mythen, G., and S. Walklate. 2006. “Criminology and Terrorism: Which Thesis? Risk Society or Governmentality.” British Journal of Criminology 46: 379–98, https://doi.org/10.1093/bjc/azi074.Suche in Google Scholar

O’Malley, P. 2008. “Experiments in Risk and Criminal Justice.” Theoretical Criminology 12 (4): 452–69, https://doi.org/10.1177/1362480608097152.Suche in Google Scholar

Operation of police powers under the Terrorism Act 2000 and subsequent legislation. Arrests, Outcomes, and Stop and Search, Great Britain, Year Ending December 2019. Statistical Bulletin. UK: HMSO.Suche in Google Scholar

Park, A., C. Bryson, E. Clery, J. Curtice, and M. Phillips, eds. 2013. British Social Attitudes: The 30th Report. London: NatCen Social Research.10.4135/9781446268292Suche in Google Scholar

Paisley, I. 1991. Reasonable Doubt: Case for the U. D. R. Four. Ireland: The Mercier Press Ltd.Suche in Google Scholar

Payne, T. 1791. The Rights of Man. USA: Dover Thrift. Abridged version published in 1999.Suche in Google Scholar

Perera, A. R. 2020. In the Research Handbook on International Law and Terrorism. Draft Comprehensive Convention on International Terrorism, chapter 9, 152–62. UK: Edward Elgar Publishing.Suche in Google Scholar

Philippon, A. C., J. Cherryman, A. Vrij, and R. Bull. 2008. “Why Is My Voice So Easily Recognized in Identity Parades? Influence of First Impressions on Voice Identification.” Psychiatry, Psychology and Law 15: 70–7, https://doi.org/10.1080/13218710701873999.Suche in Google Scholar

Picinali, F. 2015. “The Threshold Lies in the Method: Instructing Jurors about Reasoning beyond Reasonable Doubt.” The International Journal of Evidence & Proof 19 (3): 139–53, https://doi.org/10.1177/1365712715571511.Suche in Google Scholar

Precht, T. 2007. “Home Grown Terrorism and Islamist Radicalization in Europe.” Research funded by the Danish Ministry of Justice.Suche in Google Scholar

Privy Council Review of Intercept as Evidence: Report to the Prime Minister and the Home Secretary Cm 7324. London, 2008.Suche in Google Scholar

Quenivet, N. 2006. “You Are the Weakest Link and We Will Help You! the Comprehensive Strategy of the United Nations to Fight Terrorism.” Journal of Conflict and Security Law 11/317. In White, N. (2011). Terrorism, Security and International Law, https://doi.org/10.1093/jcsl/krl020.Suche in Google Scholar

Reinares, F. 2009. “Jihadist Radicalization and the 2004 Madrid Bombing Network.” CTC Sentinel, Combating Terror Centre, United States Military Academy 2 (11).Suche in Google Scholar

Sageman, M. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.10.9783/9780812206791Suche in Google Scholar

Saul, B. 2006. Defining Terrorism in International Law. Oxford: Oxford University Press.Suche in Google Scholar

Saul, B. 2014. Research Handbook on International Law and Terrorism. Cheltenham: Edward Elgar Publishing Ltd.10.4337/9780857938817Suche in Google Scholar

Schmid, A. P. 2020. “Discussion 1 – Revisiting the Wicked Problem of Defining Terrorism.” In Contemporary Voices, 1 (Terrorism: Its Past, Present & Future Study – A Special Issue to Commemorate CSTPV at 25), 3–11. London: Routledge.10.15664/jtr.1601Suche in Google Scholar

Schmitt, G. 2010. Safety, Liberty, and Islamist Terrorism: American and European Approaches to Domestic Counterterrorism. USA: AEI Press.Suche in Google Scholar

Schwebel, S. M. 2011. Justice in International Law: Further Selected Writings, 125–6. Cambridge: Cambridge University Press.10.1017/CBO9780511793912Suche in Google Scholar

Sharpe, C. 2002. “Covert Surveillance and the Use of Informants.” In The Handbook of Criminal Justice Process, edited by M. McConville, and G. Wilson. Oxford: OUP.Suche in Google Scholar

Silke, A. 2008. “Research on Terrorism: A Review of the Impact of 9/11 and the Global War on Terrorism.” In Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, edited by H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor. New York: Springer. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.10.1007/978-0-387-71613-8_2Suche in Google Scholar

Singh, C. 2013. Quis Custodiet Ipsos Custodies? Should Justice Beware: A Review of Voice Identification Evidence in Light of Advances in Biometric Voice Identification Technology, Vol. 11, 1–28. USA: De Gruyter.10.1515/ice-2014-0009Suche in Google Scholar

Singh, C. 2020. “Prosecuting Terrorism: Secret Courts, Evidence and Special Advocates. The Panoply of Challenges Facing Criminal Justice, the United Kingdom Perspective.” Current Issues in Criminal Justice. 33(3), 1–27. https://doi.org/10.1080/10345329.2020.1850166.Suche in Google Scholar

Special Advocates Further Memorandum to the Joint Committee on Human Rights on the Justice and Security Bill.” 2013.Suche in Google Scholar

Stanford, B. 2017. “The Complexities of Contemporary Terrorism Trials Laid Bare.” Criminal Law & Justice Weekly 181 (33). Internet.Suche in Google Scholar

Tadros, V. 2008. “Crime and Security.” Modern Law Review 71. 940: 967–8.10.1111/j.1468-2230.2008.00730.xSuche in Google Scholar

Thayer, J. B. 1898. A Preliminary Treatise on Evidence at the Common Law. Boston: Little, Brown and Company.10.2307/781035Suche in Google Scholar

The Belfast Agreement/The Good Friday Agreement. (1998).Suche in Google Scholar

The Guardian Newspaper. 2013. “MPs Told to Repay £500,000 Profits from Publicly Funded Homes.”.Suche in Google Scholar

The Guardian Newspaper. 2016. “Tim Cook Says Apple’s Refusal to Unlock iPhone for FBI Is a ’civil Liberties’ Issue.”.Suche in Google Scholar

The Guardian. 2015. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Suche in Google Scholar

The Guardian. 2017. “UK ’has Stripped 150 Jihadists and Criminals of Citizenship.”.Suche in Google Scholar

The Guardian. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Suche in Google Scholar

UK Parliament. 2017. “Justice and Security Green Paper Report.UNSC S/Res/2462(2019)”.Suche in Google Scholar

United Nations Counter-Terrorism Committee Executive Directorate (CTED)”.Suche in Google Scholar

United Nations Office on Drugs and Crime (UNDOC). 2012. The Use of the Internet for Terrorist Purposes. Vienna: United Nations.Suche in Google Scholar

UN Security Council Resolution 2178. 2014. “On Foreign Terrorist Fighters.”.Suche in Google Scholar

UN Security Council Resolution 2396. 2017. “On Foreign Terrorist Fighters (Returnees and U.N. General Assembly Resolution on Measures to Prevent International Terrorism.” International Legal Materials 12 (1), January 1973.10.1017/S0020782900056291Suche in Google Scholar

United Nations Security Council. 2004. “Resolution 1566 (2004).”.Suche in Google Scholar

United Nations. 2016. Global Implementation Survey of Security Council Resolution 1373 (2001). Geneva: United Nations.Suche in Google Scholar

van Duyne, P., M. Jager, K. von Lampe, and J. Newell, eds. 2004. Threats and Phantoms of Organised Crime, Corruption and Terrorism: Critical European Perspectives, 51–84. Nijmegen, Netherlands: Wolf Legal Publishers.Suche in Google Scholar

Vladeck, S. I., and ‘The Case against National Security Court’. 2009. “Articles in Law Reviews and Other Academic Journals.” Paper 298. Originally published in the Willamette Law Review, 505–26.Suche in Google Scholar

Wade, H. W. R. 1980. The Hamlyn Lectures: Constitutional Fundamentals, 55. London: Stevens and Sons.Suche in Google Scholar

Walker, C. 2008. “Know Thine Enemy as Thyself: Discerning Friend from Foe under Anti-terrorism Laws.” Melbourne Law Review 32: 275.Suche in Google Scholar

Walker, C. 2009. “Prosecuting Terrorism: The Old Bailey versus Belmarsh.” Amicus Curiae (79): 21–5.10.14296/ac.v2009i79.1207Suche in Google Scholar

Zabel, R. B., and J. J. Benjamin Junior. 2008. Pursuit of Justice: Prosecuting Terrorism Cases in the Federal Courts. United States of America: Human Rights First.Suche in Google Scholar

Zedner, L. 2009. Security. London: Routledge. See also: Deflem, M. (Ed.). (2004). Terrorism and counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.4324/9780203871133Suche in Google Scholar

Published Online: 2021-08-02

© 2021 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 16.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/gj-2021-0036/html
Button zum nach oben scrollen