1,008
Views
2
CrossRef citations to date
0
Altmetric
Articles

Prosecuting terrorism: secret courts, evidence and special advocates. The panoply of challenges facing criminal justice, the United Kingdom perspective

ORCID Icon

References

  • Anti-Terrorism, Crime and Security Act 2001
  • Anti-Terrorism Act 2015 (C-51)
  • Classified Information Procedures Act (CIPA) 18 U.S.C. App. 3
  • Counter-terrorism Act 2008
  • Counter-Terrorism and Security Act 2015
  • Counter Terrorism and Border Security Act 2019
  • Counter-Terrorism and Security Act 2015 (Amendment) Bill 2016-17
  • Criminal Justice and Public Order Act 1994
  • Criminal Justice Act 2003
  • Enhanced Terrorism Prevention and Investigation Measures Bill 2012
  • Explosive Substances Act 1883
  • National Security Act 2017 (C-59)
  • Police Act 1997
  • Police and Criminal Evidence Act 1984
  • Prevention of Terrorism Act 2005
  • Regulation of Investigatory Powers Act 2000
  • Surveillance Devices Act 2004 (Com Law)
  • Terrorism Act 2000
  • Terrorism Act 2006
  • Terrorism Prevent Investigation Measures Act 2011
  • AF (No 3) [2009] UKHL 28
  • A v Secretary of State for the Home Department (No 2) [2005] UKHL 71
  • Bennett v Horseferry Road Magistrates' Court [1993] UKHL 10
  • Breslin v McKenna [2005] NIQB 18
  • R v Bishop (Steven) [2018] (unreported)
  • R v Grant [2005] 2 Cr App R 28
  • Jencks v. United States, 353 U.S. 657, 671, 77 S. Ct. 1007, 1 L. Ed. 2d 1103 (1957) R v Khyam and Others [2008] All ER (D) 312
  • R v Latimer ([1986] 9 NIJB 1 (trial), [1988] 11 NIJB 1 (appeal)
  • R v McDonald and Others [2005] EWCA Crim 1945
  • DPP v McKevitt [2009] IESC 29
  • Miller v Minister of Pensions [1947] 2 All ER 372 at 373-4; [1947] WN 241
  • R v Mohammed Yamin [2015] (unreported)
  • R v Morrison and Others [2009] NICA 1
  • Official Solicitor v K [1963] Ch 381 at 405
  • Roviaro v. United States, 353 U.S. 53, 64-65, 77 S. Ct. 623, 1 L. Ed. 2d 639 (1957)
  • Secretary of the Home Department v MB and AF [2007] UKHL 46
  • United States v. Moussaoui (282 F. Supp. 2d 480 (E.D. Va. 2003))
  • Abeyratne, R. (2011). The Beijing convention of 2010 on the suppression of unlawful acts relating to international civil aviation – An interpretative study. Journal of Transportation Security, 4, 131–143.
  • Al-Lami, M. (2009). Studies of radicalisation: State of the field report. London: Department of Politics and International Relations: University of London, ESRC.
  • Al-Lami, M., & O’Loughlin, B. (2009). Jihadists try to make friends on Facebook. Guardian.
  • Archick, K., Rollins, J., & Woehrel, S. (2005, July 29). Islamist extremism in Europe. Congressional Research Service.
  • Ashworth, A. (1977). Excluding evidence as protecting rights. Criminal Law Review, 723–735.
  • Ashworth, A. (2010). Sentencing and criminal justice. London: Cambridge University Press.
  • Barnard-Wills, D., & Wells, H. (2012). Surveillance, technology and the everyday. Criminology and Criminal Justice, 12, 227.
  • Bass, G. J. (2000). Stay the hand of vengeance: The politics of war crimes tribunals. Princeton: Princeton University Press.
  • Benjamin, D., & Simon, S. (2002). The age of sacred terror. New York: Random House.
  • Benjamin, W. (2001). Critical constellations (key contemporary thinkers). Cambridge: Polity Press.
  • Bhui, K., Warfa, N., & Jones, E. (2014, March 5). Is violent radicalisation associated with poverty, migration, poor self-reported health and common mental disorders? Plos One, 9(3), 1–10.
  • Biersteker, T. J., Eckert, S. E., Romaniuk, P., Halegua, A., & Reid, N. (2001). Targeted financial sanctions: A manual for design and implementation. New York: Thomas J. Watson Jr. Institute for International Studies.
  • Bigo, D., Bonelli, L., Guittet, E.-P., & Ragazzi, F. (2014). Preventing and countering youth radicalisation in the EU. In Directorate general for internal policies, policy department C: Citizens’ rights and constitutional affairs, civil liberties, justice and home affairs (pp. 1–34). Brussels: European Union.
  • Binder, G. (2002, January). Punishment theory: Moral or political? Buffalo Criminal Law Review, 5(2), 321–372.
  • Bizina, M., & Gray, D. H. (2014). Radicalization of youth as a growing concern for counter-terrorism policy. Global Security Studies, 5(1).
  • Briggs, R. (2010, July). Community engagement for counterterrorism: Lessons from the United Kingdom. International Affairs, 86(4), 971–981.
  • Brodeur, J. P. (2002). Undercover policing in Canada: Wanting what is wrong. Crime, Law and Social Change, 18(10–12), 105–306. In Loftus, B., & Goold, B. (2012). Covert surveillance and the invisibilities of policing. Criminology and Criminal Justice, 12, 275.
  • Bull, R., & Clifford, B. R. (1984). Ear-witness voice recognition accuracy. In G. L. Wells & E. F. Loftus (Eds.), Eyewitness testimony: Psychological perspectives (pp. 92–123). Cambridge: Cambridge University Press.
  • Carr, S., Piasecki, E., Tully, G., & Wilson, T. J. (2016). Opening the scientific expert’s black box: ‘Critical trust’ as a reformative principle in criminal evidence. The Journal of Criminal Law, 80(5), 364–386.
  • Carrabine, E., Cox, P., Fussey, P., Hobbs, D., South, N., Thiel, D., & Turton, J. (2014). Criminology: A sociological introduction (3rd ed.). London: Routledge.
  • Chesney, R. M., & Goldsmith, J. L. (2010, April). Terrorism and the convergence of criminal and military detention models. Stanford Law Review, 60(4), 1079.
  • Christmann, K. (2012). Preventing religious radicalisation and violent extremism: A systematic review of the research evidence. Huddersfield: Youth Justice Board for England and Wales Report and the University of Huddersfield.
  • Clifford, B. R. (1980). Voice identification by human listeners: On earwitness reliability. Law and Human Behavior, 4, 373–394.
  • Commons Library briefing. UK Parliament. (2017). Counter-Terrorism and Security Act 2015 (Amendment) Bill 2016–17.
  • Covert Surveillance and Property Interference: Revised Codes of Practice. (2010). HMSO, see p. 7.
  • Crossely, D. J. (1976, April). Bradley’s utilitarian theory of punishment. Ethics, 86(3), 200–213.
  • Daniels, R., Macklem, P., & Roach, K. (2001). The security of freedom: Essays on Canada’s anti-terrorism bill. Toronto: University of Toronto Press.
  • Davis, J. (2016). Equality of arms: Complying with international human rights law in cases against alleged terrorists. Journal of Conflict and Security Law, 21(1), 69–89.
  • Deflem, M. (Ed.). (2004). Terrorism and counter-terrorism: Criminological perspectives. Amsterdam: Elsevier.
  • Draft Investigatory Powers Bill. (2015). Publications. London: HMSO.
  • Duff, A., Farmer, L., Marshall, S., & Tadros, V. (2007). The trial on trial volume 3: Towards a normative theory of criminal trial. Oxford: Hart Publishing.
  • Duff, R. A., & Garland, D. (Eds.). (1994). A reader on punishment. Oxford University Press.
  • Ericsson, R. V., & Haggerty, K. D. (1997). Policing the risk society (pp. 52–54). Oxford: OUP.
  • Foucault, M. (1979). Discipline and punish, the birth of the prison. New York: Vintage Books.
  • Foucault, M. (2003). Power/knowledge. In G. Delanty & P. Strydom (Eds.), Philosophies of social science: The classic and contemporary readings. Oxford: Open University Press.
  • Goldsmith, L. J., & Katyal, N. (Op-Eds.). (2007, July 11). The terrorists’ court. N. Y. Times.
  • Gragera, J. P., & Pascual, D. S. (2014, December). A phenomenological analysis of terrorism and organized crime from a comparative criminological perspective. Journal of Law and Criminal Justice, 2(2), 113–131.
  • Guiora, A. N., & Parry, J. T. (2008). Light at the end of the pipeline: Choosing a forum for suspected terrorists. University of Pennsylvania Law Review Online, 156(1), Article 24.
  • Hamm, M. (2004). The USA Patriot Act and the politics of fear. In J. Ferrell et al. (Eds.), Cultural criminology unleashed (pp. 459–472). OUP.
  • Hayward, K., & Young, J. (2007). Cultural Criminology. In M. Maguire, R. Morgan, & R. Reiner (Eds.), The Oxford handbook of criminology (pp. 102–121). Oxford: OUP.
  • Hehir, A., Kuhrt, N., & Mumford, A. (Eds.). (2011). International law, security and ethics: Policy challenges in the post-9/11 world. New York: Routledge.
  • Hill, M. (2018, October). Report of the independent reviewer of terrorism legislation, on the operation of the Terrorism Acts 2000 and 2006, the Terrorism Prevention and Investigation Measures Act 2011, and the Terrorist Asset Freezing etc. Act 2010. London: HMSO.
  • Hirsch, A. V. (1985). Past or future crimes: Deservedness and dangerousness in the sentencing of criminals. Rutgers University Press.
  • Home Office. (2009). Statistics on terrorism arrests and outcomes Great Britain September 11, 2001 to March 31, 2008 (04/09, Home Office, London).
  • Home Office. (2010–2019). Statistics on terrorism arrests. [Online]. Retrieved from https://www.gov.uk/government/statistics/statistics-on-terrorism-arrests
  • Home Office Statistical Bulletin 32/19. Individuals referred to and supported through the prevent programme, England and Wales, April 2018 to March 2019. London: HMSO.
  • Honderich, T. (2002). After the terror. Edinburgh: Edinburgh University Press.
  • House of Commons Written Statement 287 (HCWS287). (2015, February 12). Witness statement by the secretary of state for the home department (Mrs Theresa May).
  • Jackson, J., & Doran, S. (1995). Judge without jury: Diplock trials in the adversary system. Oxford: Clarendon Press.
  • Jenkins, B. (2000). Terrorism. In E. Borgatta & R. Montgomery (Eds.), Encyclopaedia of sociology. (Vol. 5) New York: Macmillan.
  • Law Commission. (2009). The admissibility of expert evidence in criminal proceedings in England and Wales: A new approach to the determination of evidentiary reliability. Law Com. Consultation Paper No. 190.
  • Law Commission. (2011). Expert evidence in criminal proceedings in England and Wales. Law Com. Report No. 325. Retrieved January 20, 2015.
  • Liberty. (2010a). Liberty’s response to Lord Carlile’s review of the definition of terrorism. London: Liberty.
  • Liberty. (2010b). Terrorism pre-charge detention comparative law study. London: Liberty.
  • Lyon, D. (2001). Surveillance society: Monitoring everyday life. Philadelphia: Open University Press.
  • McConville, M., & Wilson, G. (Eds.). (2002). The handbook of criminal justice process. Oxford: OUP.
  • MacDonald, L. (2011). Review of counter-terrorism and security powers. London: HMSO.
  • Manningham-Buller, E. (2005). The international terrorist threat and the dilemmas countering it, security service MI5.
  • McIntyre, T. J., (2016). Judicial oversight of surveillance: The case of Ireland in comparative perspective. In M. Scheinin (Ed.), Judges as guardians of constitutionalism and human rights (pp. 136–164). Edward Elgar Publishing.
  • Mclaughlin, E. (2006). Terrorism. In E. Mclaughlin & J. Muncie (Eds.), Sage dictionary of criminology (2nd ed.). London: Sage. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction (3rd ed.). London: Routledge.
  • Murray, C. R. G. (2016). Nudging or fudging? The UK courts’ counterterrorism jurisprudence since 9/11. Journal of Conflict and Security Law, 21(1), 91–113.
  • Operation of police powers under the Terrorism Act 2000 and subsequent legislation: Arrests, outcomes, and stop and search, Great Britain, year ending December 2019. Statistical Bulletin. HMSO.
  • Paisley, I. (1991). Reasonable doubt: Case for the U. D. R. Four. Cork: The Mercier Press Ltd.
  • Perera, A. R. Draft comprehensive convention on international terrorism, Chapter 9 (pp. 152–162). Edward Elgar Publishing.
  • Philippon, A. C., Cherryman, J., Vrij, A., & Bull, R. (2008). Why is my voice so easily recognized in identity parades? Influence of first impressions on voice identification. Psychiatry, Psychology and Law, 15, 70–77.
  • Picinali, F. (2015). The threshold lies in the method: Instructing jurors about reasoning beyond reasonable doubt. International Journal of Evidence and Proof, 19(3), 139–153.
  • Press Association. (2017, July 30). UK ‘has stripped 150 jihadists and criminals of citizenship’. The Guardian.
  • Privy Council Review of intercept as evidence: Report to the Prime Minister and the Home Secretary Cm 7324, London, 2008.
  • Reinares, F. (2009). Jihadist radicalization and the 2004 Madrid bombing network. CTC Sentinel, Combating Terror Centre, United States Military Academy, 2(11), 16–19.
  • Saul, B. (2006). Defining terrorism in international law. Oxford: Oxford University Press.
  • Saul, B. (Ed.). (2014). Research handbook on international law and terrorism. Cheltenham: Edward Elgar Publishing Ltd.
  • Schmitt, G. (2010). Safety, liberty, and Islamist terrorism: American and European approaches to domestic counterterrorism. AEI Press.
  • Sharpe, S. (2002). Covert surveillance and the use of informants. In M. McConville & G. Wilson (Eds.), The handbook of criminal justice process (pp. 59–74). Oxford: OUP.
  • Sharpe, R. J. (1976). Law of habeas corpus. Oxford: OUP.
  • Singh, C. (2015). Quis Custodiet Ipsos Custodies? Should justice beware: A review of voice identification evidence in light of advances in biometric voice identification technology. Vol. 11, 1–28. De Gruyter.
  • Special Advocates Further Memorandum to the joint Committee on Human Rights on the Justice and Security Bill. (2013).
  • Stanford, B. (2017). The complexities of contemporary terrorism trials laid bare. Criminal Law and Justice, 181(33), 594. Internet.
  • Thayer, J. B. (1898). A preliminary treatise on evidence at the common law. Boston: Little, Brown and Company.
  • The Guardian. (2017). UK ‘has stripped 150 jihadists and criminals of citizenship’.
  • Travis, A. (2017). Man who escaped mosque in burqa was under counter-terror restrictions. The Guardian, November 5, 2013. Retrieved from https://www.theguardian.com/uk-news/2013/nov/04/suspect-burqa-counter-terror-restrictions
  • Vladeck, S. I. (2009). The case against national security court. Articles in Law Reviews and Other Academic Journals, 298. Manchester: Originally published in the Willamette Law Review at pp. 505–526.
  • Wade, H. W. R. (1980). The Hamlyn lectures: Constitutional fundamentals (p. 55). London: Stevens and Sons.
  • Walker, C. (1992). The prevention of terrorism is British Law (2nd ed.). Manchester University Press.
  • Walker, C. (2007). Keeping control of terrorists without losing control of constitutionalism. Stanford Law Review, 59, 1395.
  • Walker, C. (2008). Know thine enemy as thyself: Discerning friend from foe under anti-terrorism laws. Melbourne Law Review, 32, 275.
  • Walker, C. (2009a). Prosecuting terrorism: The old Bailey versus Belmarsh. Amicus Curiae, 79, 664.
  • Walker, C. (2009b). The anti-terrorism legislation (2nd ed.). Oxford: OUP.
  • Walker, C., & Starmer, K. (1999). Miscarriages of justice: A review of justice in error. Oxford: Oxford University Press.
  • Wintour, P., & Watt, N. (2015, September 7). UK forces kill British Isis fighters in targeted drone strike on Syrian city. The Guardian. Retrieved from https://www.theguardian.com/uk-news/2015/sep/07/uk-forces-airstrike-killed-isis-briton-reyaad-khan-syria
  • Zedner, L. (2009). Security. London: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.