Home The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism
Article
Licensed
Unlicensed Requires Authentication

The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism

  • Charanjit Singh ORCID logo EMAIL logo
Published/Copyright: August 2, 2021

Abstract

Crimes such as terrorism pose some of the biggest postmodern challenges faced by criminal justice systems worldwide. How systems react and prevent such crime raises numerous legal, political and strategic issues i.e. cross-jurisdictional collaboration, policing and the erosion of civil liberties such as privacy. In this article, taking inspiration from criminological theory, two criminal justice challenges that are posed by terrorism are explored from the United Kingdom’s perspective: the international definition of terrorism including the factors that impede a common definition from being established and the domestic response to define, prevent and prosecute this crime. The aim of, and originality in, this article is to explore the criminal justice challenge facing the United Kingdom in balancing complex and competing interests when effectively responding to terror crime.


Corresponding author: Charanjit Singh, Barrister-at-Law, Holborn Chambers, London and University of Westminster, London, UK, E-mail:

References

Abeyratne, R. 2011. “The Beijing Convention of 2010 on the Suppression of Unlawful Acts Relating to International Civil Aviation – an Interpretative Study.” Journal of Transportation Security 4: 131, https://doi.org/10.1007/s12198-011-0062-7.Search in Google Scholar

Al-Lami, M. 2009. Studies of Radicalisation: State of the Field Report. London: Department of Politics and International Relations: University of London.Search in Google Scholar

Amnesty International. “Encryption: A Matter of Human Rights.” POL40/3682/2016.Search in Google Scholar

Archick, K., J. Rollins, and S. Woehrel. 2005. Islamist Extremism in Europe. Washington DC: Congressional Research Service.Search in Google Scholar

Ashworth, A. 1977. “Excluding Evidence as Protecting Rights.” Criminal Law Review 3: 723–35.Search in Google Scholar

Al-Lami, M., and B. O’Loughlin. 2009. Jihadist Try to Make Friends on Facebook. London: Guardian.Search in Google Scholar

Baker, K., J. Mitchell, and B. Tindall. 2007. Combating Islamic Terrorism in Europe. Washington DC: American Diplomacy.Search in Google Scholar

Bass, G. J. 2000. Stay the Hand of Vengeance: The Politics of War Crimes Tribunals. Princeton: Princeton University Press.10.1515/9781400851713Search in Google Scholar

Benjamin, D., and S. Simon. 2002. The Age of Sacred Terror. New York: Random House.Search in Google Scholar

Benjamin, W. 2001. Critical Constellations (Key Contemporary Thinkers). UK: Polity Press.Search in Google Scholar

Bhui, K., N. Warfa, and E. Jones. 2014. “Is Violent Radicalisation Associated with Poverty, Migration, Poor Self-Reported Health and Common Mental Disorders?” PloS One 9 (3): 1–10.10.1371/journal.pone.0090718Search in Google Scholar

Biersteker, T. J., and S. Eckert. 2000. Targeted Financial Sanctions: A Manual for Design and Implementation. USA: Thomas J. Watson Jr. Institute for International Studies.Search in Google Scholar

Bigo, D., L. Bonelli, E-P. Guittet, F. Ragazzi, and Preventing and countering youth radicalisation in the EU. 2014. Directorate General for Internal Policies, Policy Department C: Citizens’ Rights and Constitutional Affairs, Civil Liberties, Justice and Home Affairs. Brussels: European Union.Search in Google Scholar

Bizina, M., and D. H. Gray. 2014. “Radicalization of Youth as a Growing Concern for Counter-terrorism Policy.” Global Security Studies 5 (1): 72–9.Search in Google Scholar

Brandon, B. 2004. “Terrorism, Human Rights and the Rule of Law: 120 Years of the UK’s Legal Response to Terrorism.” Criminal Law Review: 981–97.Search in Google Scholar

Briggs, R. 2010. “Community Engagement for Counterterrorism: Lessons from the United Kingdom.” International Affairs 86 (4): 971–81, https://doi.org/10.1111/j.1468-2346.2010.00923.x.Search in Google Scholar

Brodeur, J. P. 2002. “Undercover Policing in Canada: Wanting What is Wrong.” Crime, Law and Social Change 18 (10–12): 105–306. In: Loftus, B. and Goold, B. Covert Surveillance and the invisibilities of Policing. Criminology and Criminal Justice. 2012, 12: 275.10.1007/BF00230627Search in Google Scholar

Bull, R., and B. R. Clifford. 1984. “Ear-witness Voice Recognition Accuracy.” In Eyewitness Testimony: Psychological Perspectives, edited by G. L. Wells, and E. F. Loftus, 92–123. Cambridge: Cambridge University Press.Search in Google Scholar

Carr, S., E. Piasecki, G. Tully, and T. J. Wilson. 2016. “Opening the Scientific Expert’s Black Box: “Critical Trust” as a Reformative Principle in Criminal Evidence.” Journal of Criminal Law 80 (5): 364–86, https://doi.org/10.1177/0022018316669220.Search in Google Scholar

Carrabine, E., P. Cox, P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. 2014. Criminology: A Sociological Introduction, 3rd ed. London: Routledge.10.4324/9780203082492Search in Google Scholar

Chesney, R. M., and J. L. Goldsmith. 2010. “Terrorism and the Convergence of Criminal and Military Detention Models.” Stanford Law Review 60 (4): 1079.Search in Google Scholar

Christmann, K. 2012. Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. Huddersfield: Youth Justice Board for England and Wales Report and the University of Huddersfield.Search in Google Scholar

Clifford, B. R. 1980. “Voice Identification by Human Listeners: On Earwitness Reliability.” Law and Human Behavior 4: 373–94, https://doi.org/10.1007/bf01040628.Search in Google Scholar

Commons Library briefing. UK Parliament. 2017. “Counter-Terrorism and Security Act 2015 (Amendment) Bill 2016–17”.Search in Google Scholar

Council of Europe. Council Framework Decision of 13 June 2002 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/919/JHA.Search in Google Scholar

Council of Europe. Council Framework Decision of 28 November 2008 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/475/JHA.Search in Google Scholar

Covert Surveillance and Property Interference. 2010. Revised Codes of Practice, 7. London: HMSO.Search in Google Scholar

Davis, J. 2016. “Equality of Arms: Complying with International Human Rights Law in Cases against Alleged Terrorists.” Journal of Conflict and Security Law 21 (1): 69–89, https://doi.org/10.1093/jcsl/krv020.Search in Google Scholar

Duff, A., L. Farmer, S. Marshall, and V. Tadros. 2007. The Trial on Trial Volume 3: Towards a Normative Theory of Criminal Trial. Oxford: Hart Publishing.Search in Google Scholar

Daniels, R., P. Macklem, and K. Roach. 2001. The Security of Freedom: Essays on Canada’s Anti-terrorism Bill. Canada: University of Toronto Press.10.3138/9781442682337Search in Google Scholar

Deflem, M., ed. 2004. Terrorism and Counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.1108/S1521-6136(2004)5Search in Google Scholar

Draft Investigatory Powers Bill. 2015. Publications. UK: HMSO.Search in Google Scholar

Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Search in Google Scholar

Ericson, R. 1994. “The Royal Commission on Criminal Justice Surveillance.” In Criminal Justice in Crisis, edited by M. McConville, and L. Bridges, 113–40. UK: Edward Elgar.Search in Google Scholar

Ericsson, R. V., and K. D. Haggerty. 1997. Policing the Risk Society, 52–4. UK: OUP, and Barnard-Wills, D. and Wells, H. Surveillance, technology and the everyday. Criminology and Criminal Justice. 2012, 12: 227.10.3138/9781442678590Search in Google Scholar

Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Search in Google Scholar

Ferrell, J. 2007. “Cultural Criminology.” In Blackwell Encyclopaedia of Sociology, edited by G. Ritzer UK: Blackwell Publishing. Blackwell Reference Online, https://doi.org/10.1002/9781405165518.wbeosc171.Search in Google Scholar

Ferrell, J., and C. R. Sanders, eds. 1995. Cultural Criminology. Boston: Northeastern.Search in Google Scholar

Ferrell, J., K. Hayward, W. Morrison, and M. Presdee, eds. 2004. Cultural Criminology Unleashed. London: Cavendish/Glasshouse.Search in Google Scholar

Foucault, M. 1979. Discipline and Punish, the Birth of the Prison. New York: Vintage Books.Search in Google Scholar

Foucault, M. 2003. “Power/Knowledge.” In Philosophies of Social Science: The Classic and Contemporary Readings, edited by G. Delanty, and P. Strydom UK: Open University Press, https://doi.org/10.4324/9780203380437-12.Search in Google Scholar

Gateau, C., and P. Faron. 2015. Fight against Terrorism on the Internet: France Strengthens its Legal Arsenal. London: Global Media Communications Watch.Search in Google Scholar

Genser, J., and B. S. Ugarte. 2014. The United Nations Security Council in the Age of Human Rights, 200. Cambridge: Cambridge University Press.10.1017/CBO9781139626972Search in Google Scholar

Goldsmith, L. J., and N. Katyal, Op-eds. 2007. The op Terrorists’ Court. New York: N. Y. Times.Search in Google Scholar

Gragera, J. P., and D. S. Pascual. 2014. “A Phenomenological Analysis of Terrorism and Organized Crime from a Comparative Criminological Perspective.” Journal of Law and Criminal Justice 2 (2): 113–31, https://doi.org/10.15640/jlcj.v2n2a7.Search in Google Scholar

Guiora, A. N., and J. T. Parry. 2008. “Light at the End of the Pipeline: Choosing a Forum for Suspected Terrorists.” University of Pennsylvania Law Review Online 156 (1): 24.Search in Google Scholar

Hamm, M. 2004. “The USA Patriot Act and the Politics of Fear, chapter 24.” In Cultural Criminology Unleashed, edited by J. Ferrell, K. Hayward, W. Morrison, and M. Presdee, 293. UK: OUP.Search in Google Scholar

Hayward, K., and J. Young 2007. “Cultural Criminology.” In The Oxford Handbook of Criminology, edited by M.Maguire, R. Morgan, and R. Reiner, 102–21. Oxford: OUP.10.1093/obo/9780195396607-0003Search in Google Scholar

Hehir, A., N. Kuhrt, and A. Mumford, eds. 2011. International Law, Security and Ethics: Policy Challenges in the Post-9/11 World. New York: Routledge.Search in Google Scholar

Hill, M. 2018. Report of the Independent Reviewer of Terrorism Legislation, on the Operation of the Terrorism Acts 2000 and 2006, the Terrorism Prevention and Investigation Measures Act 2011, and the Terrorist Asset Freezing Etc. Act 2010. UK: HMSO.Search in Google Scholar

Home Office. 2009. Statistics on Terrorism Arrests and Outcomes Great Britain September 11, 2001 to March 31, 2008. London: Home Office. 04/09.Search in Google Scholar

Home Office. 2010. “Statistics on Terrorism Arrests.” [ONLINE] Available at https://www.gov.uk/government/statistics/statistics-on-terrorism-arrests.Search in Google Scholar

Home Office Statistical bulletin 32/19. Individuals Referred to and Supported through the Prevent Programme, England and Wales. UK: HMSO. April 2018 to March 2019.Search in Google Scholar

Honderich, T. 2002. After the Terror. Edinburgh: Edinburgh University Press.10.1515/9780585443652Search in Google Scholar

Horgan, J. 2008. “From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism.” The Annals of the American Academy of Political and Social Science 618: 1, https://doi.org/10.1177/0002716208317539.Search in Google Scholar

Horgan, J. 2009. “Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements.” In Criminology: A Sociological Introduction, 3rd ed., edited by E. Carrabine, P. Cox , P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. London: Routledge.Search in Google Scholar

House of Commons Written Statement 287 (HCWS287). 2015. “Witness Statement by the Secretary of State for the Home Department (Mrs Theresa May)”.Search in Google Scholar

Humanitarian Law Project v Ashcroft (HLP). “309 F. Supp.2d 1185, 1200.” (C.D. Cal. 2004).Search in Google Scholar

Jackson, J., and S. Doran. 1995. Judge without Jury: Diplock Trials in the Adversary System. United Kingdom: Clarendon Press.10.1093/oso/9780198258896.001.0001Search in Google Scholar

Jenkins, B. 2000. “Terrorism.” In Encyclopaedia of Sociology, edited by E. Borgatta, and R. Montgomery. New York: Macmillan.10.1080/02684528808431937Search in Google Scholar

Judgment of the Nuremberg Military Tribunal. 1947. “American Journal of International Law 41/172”.10.2307/2193873Search in Google Scholar

Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com No 325.Search in Google Scholar

Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com No 190.Search in Google Scholar

Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com. Report No. 325 (Date accessed January 20, 2015).Search in Google Scholar

Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com. Consultation Paper No. 190.Search in Google Scholar

Law Com. Report No. 325 (2011).Search in Google Scholar

Law Com. Consultation Paper No. 190 (2009).Search in Google Scholar

Liberty. 2010. Liberty’s Response to Lord Carlile’s Review of the Definition of Terrorism. London: Liberty.Search in Google Scholar

Liberty. 2010. Terrorism Pre-charge Detention Comparative Law Study. London: Liberty.Search in Google Scholar

Lyon, D. 2001. Surveillance Society: Monitoring Everyday Life. Philadelphia: Open University Press.Search in Google Scholar

Marx, G. 1988. Undercover: Police Surveillance in America. USA: California University press.10.1525/9780520910041Search in Google Scholar

MacDonald, L. 2011. Review of Counter-terrorism and Security Powers. London: HMSO.Search in Google Scholar

Manningham-Buller, E. 2005. “The International Terrorist Threat and the Dilemmas Countering it, Security Service MI5”.Search in Google Scholar

McIntyre, T. J. 2016. “Judicial Oversight of Surveillance: The Case of Ireland in Comparative Perspective.” In Judges as Guardians of Constitutionalism and Human Rights, edited by M. Scheinin, H. Krunke, and M. Aksenova, 136. USA: Edward Elgar Publishing.10.4337/9781785365867.00014Search in Google Scholar

Mclaughlin, E. 2006. “Terrorism.” In Sage Dictionary of Criminology, 2nd ed., edited by E. Mclaughlin, and J. Muncie. London: Sage. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.Search in Google Scholar

Murray, C. R. G. 2016. “Nudging or Fudging? the UK Courts’ Counterterrorism Jurisprudence since 9/11.” Journal of Conflict and Security Law 21 (1): 91–113, https://doi.org/10.1093/jcsl/krv021.Search in Google Scholar

Mythen, G., and S. Walklate. 2006. “Criminology and Terrorism: Which Thesis? Risk Society or Governmentality.” British Journal of Criminology 46: 379–98, https://doi.org/10.1093/bjc/azi074.Search in Google Scholar

O’Malley, P. 2008. “Experiments in Risk and Criminal Justice.” Theoretical Criminology 12 (4): 452–69, https://doi.org/10.1177/1362480608097152.Search in Google Scholar

Operation of police powers under the Terrorism Act 2000 and subsequent legislation. Arrests, Outcomes, and Stop and Search, Great Britain, Year Ending December 2019. Statistical Bulletin. UK: HMSO.Search in Google Scholar

Park, A., C. Bryson, E. Clery, J. Curtice, and M. Phillips, eds. 2013. British Social Attitudes: The 30th Report. London: NatCen Social Research.10.4135/9781446268292Search in Google Scholar

Paisley, I. 1991. Reasonable Doubt: Case for the U. D. R. Four. Ireland: The Mercier Press Ltd.Search in Google Scholar

Payne, T. 1791. The Rights of Man. USA: Dover Thrift. Abridged version published in 1999.Search in Google Scholar

Perera, A. R. 2020. In the Research Handbook on International Law and Terrorism. Draft Comprehensive Convention on International Terrorism, chapter 9, 152–62. UK: Edward Elgar Publishing.Search in Google Scholar

Philippon, A. C., J. Cherryman, A. Vrij, and R. Bull. 2008. “Why Is My Voice So Easily Recognized in Identity Parades? Influence of First Impressions on Voice Identification.” Psychiatry, Psychology and Law 15: 70–7, https://doi.org/10.1080/13218710701873999.Search in Google Scholar

Picinali, F. 2015. “The Threshold Lies in the Method: Instructing Jurors about Reasoning beyond Reasonable Doubt.” The International Journal of Evidence & Proof 19 (3): 139–53, https://doi.org/10.1177/1365712715571511.Search in Google Scholar

Precht, T. 2007. “Home Grown Terrorism and Islamist Radicalization in Europe.” Research funded by the Danish Ministry of Justice.Search in Google Scholar

Privy Council Review of Intercept as Evidence: Report to the Prime Minister and the Home Secretary Cm 7324. London, 2008.Search in Google Scholar

Quenivet, N. 2006. “You Are the Weakest Link and We Will Help You! the Comprehensive Strategy of the United Nations to Fight Terrorism.” Journal of Conflict and Security Law 11/317. In White, N. (2011). Terrorism, Security and International Law, https://doi.org/10.1093/jcsl/krl020.Search in Google Scholar

Reinares, F. 2009. “Jihadist Radicalization and the 2004 Madrid Bombing Network.” CTC Sentinel, Combating Terror Centre, United States Military Academy 2 (11).Search in Google Scholar

Sageman, M. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.10.9783/9780812206791Search in Google Scholar

Saul, B. 2006. Defining Terrorism in International Law. Oxford: Oxford University Press.Search in Google Scholar

Saul, B. 2014. Research Handbook on International Law and Terrorism. Cheltenham: Edward Elgar Publishing Ltd.10.4337/9780857938817Search in Google Scholar

Schmid, A. P. 2020. “Discussion 1 – Revisiting the Wicked Problem of Defining Terrorism.” In Contemporary Voices, 1 (Terrorism: Its Past, Present & Future Study – A Special Issue to Commemorate CSTPV at 25), 3–11. London: Routledge.10.15664/jtr.1601Search in Google Scholar

Schmitt, G. 2010. Safety, Liberty, and Islamist Terrorism: American and European Approaches to Domestic Counterterrorism. USA: AEI Press.Search in Google Scholar

Schwebel, S. M. 2011. Justice in International Law: Further Selected Writings, 125–6. Cambridge: Cambridge University Press.10.1017/CBO9780511793912Search in Google Scholar

Sharpe, C. 2002. “Covert Surveillance and the Use of Informants.” In The Handbook of Criminal Justice Process, edited by M. McConville, and G. Wilson. Oxford: OUP.Search in Google Scholar

Silke, A. 2008. “Research on Terrorism: A Review of the Impact of 9/11 and the Global War on Terrorism.” In Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, edited by H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor. New York: Springer. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.10.1007/978-0-387-71613-8_2Search in Google Scholar

Singh, C. 2013. Quis Custodiet Ipsos Custodies? Should Justice Beware: A Review of Voice Identification Evidence in Light of Advances in Biometric Voice Identification Technology, Vol. 11, 1–28. USA: De Gruyter.10.1515/ice-2014-0009Search in Google Scholar

Singh, C. 2020. “Prosecuting Terrorism: Secret Courts, Evidence and Special Advocates. The Panoply of Challenges Facing Criminal Justice, the United Kingdom Perspective.” Current Issues in Criminal Justice. 33(3), 1–27. https://doi.org/10.1080/10345329.2020.1850166.Search in Google Scholar

Special Advocates Further Memorandum to the Joint Committee on Human Rights on the Justice and Security Bill.” 2013.Search in Google Scholar

Stanford, B. 2017. “The Complexities of Contemporary Terrorism Trials Laid Bare.” Criminal Law & Justice Weekly 181 (33). Internet.Search in Google Scholar

Tadros, V. 2008. “Crime and Security.” Modern Law Review 71. 940: 967–8.10.1111/j.1468-2230.2008.00730.xSearch in Google Scholar

Thayer, J. B. 1898. A Preliminary Treatise on Evidence at the Common Law. Boston: Little, Brown and Company.10.2307/781035Search in Google Scholar

The Belfast Agreement/The Good Friday Agreement. (1998).Search in Google Scholar

The Guardian Newspaper. 2013. “MPs Told to Repay £500,000 Profits from Publicly Funded Homes.”.Search in Google Scholar

The Guardian Newspaper. 2016. “Tim Cook Says Apple’s Refusal to Unlock iPhone for FBI Is a ’civil Liberties’ Issue.”.Search in Google Scholar

The Guardian. 2015. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Search in Google Scholar

The Guardian. 2017. “UK ’has Stripped 150 Jihadists and Criminals of Citizenship.”.Search in Google Scholar

The Guardian. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Search in Google Scholar

UK Parliament. 2017. “Justice and Security Green Paper Report.UNSC S/Res/2462(2019)”.Search in Google Scholar

United Nations Counter-Terrorism Committee Executive Directorate (CTED)”.Search in Google Scholar

United Nations Office on Drugs and Crime (UNDOC). 2012. The Use of the Internet for Terrorist Purposes. Vienna: United Nations.Search in Google Scholar

UN Security Council Resolution 2178. 2014. “On Foreign Terrorist Fighters.”.Search in Google Scholar

UN Security Council Resolution 2396. 2017. “On Foreign Terrorist Fighters (Returnees and U.N. General Assembly Resolution on Measures to Prevent International Terrorism.” International Legal Materials 12 (1), January 1973.10.1017/S0020782900056291Search in Google Scholar

United Nations Security Council. 2004. “Resolution 1566 (2004).”.Search in Google Scholar

United Nations. 2016. Global Implementation Survey of Security Council Resolution 1373 (2001). Geneva: United Nations.Search in Google Scholar

van Duyne, P., M. Jager, K. von Lampe, and J. Newell, eds. 2004. Threats and Phantoms of Organised Crime, Corruption and Terrorism: Critical European Perspectives, 51–84. Nijmegen, Netherlands: Wolf Legal Publishers.Search in Google Scholar

Vladeck, S. I., and ‘The Case against National Security Court’. 2009. “Articles in Law Reviews and Other Academic Journals.” Paper 298. Originally published in the Willamette Law Review, 505–26.Search in Google Scholar

Wade, H. W. R. 1980. The Hamlyn Lectures: Constitutional Fundamentals, 55. London: Stevens and Sons.Search in Google Scholar

Walker, C. 2008. “Know Thine Enemy as Thyself: Discerning Friend from Foe under Anti-terrorism Laws.” Melbourne Law Review 32: 275.Search in Google Scholar

Walker, C. 2009. “Prosecuting Terrorism: The Old Bailey versus Belmarsh.” Amicus Curiae (79): 21–5.10.14296/ac.v2009i79.1207Search in Google Scholar

Zabel, R. B., and J. J. Benjamin Junior. 2008. Pursuit of Justice: Prosecuting Terrorism Cases in the Federal Courts. United States of America: Human Rights First.Search in Google Scholar

Zedner, L. 2009. Security. London: Routledge. See also: Deflem, M. (Ed.). (2004). Terrorism and counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.4324/9780203871133Search in Google Scholar

Published Online: 2021-08-02

© 2021 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 16.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/gj-2021-0036/html
Scroll to top button