The Terrorism Acts in 2018

Total Page:16

File Type:pdf, Size:1020Kb

The Terrorism Acts in 2018 THE TERRORISM ACTS IN 2018 REPORT OF THE INDEPENDENT REVIEWER OF TERRORISM LEGISLATION ON THE OPERATION OF THE TERRORISM ACTS 2000 AND 2006 By JONATHAN HALL Q.C. Independent Reviewer of Terrorism Legislation Presented to Parliament pursuant to Section 36(5) of the Terrorism Act 2006 March 2020 © Crown copyright 2020 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to us at: Direct Communications Unit, Home Office, 2 Marsham Street, London – SW1P 4DF ISBN 978-1-5286-1807-6 CCS0320303768 03/20 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office CONTENTS EXECUTIVE SUMMARY ..............................................................................................................................4 1. INTRODUCTION ..................................................................................................................................5 TERRORISM LEGISLATION ................................................................................................................................. 5 THE COUNTER-TERRORISM MACHINE ..............................................................................................................6 THE COUNTER-TERRORISM TOOLKIT ...............................................................................................................7 LIMITS TO THE ROLE OF THE INDEPENDENT REVIEWER ...................................................................................9 MY APPROACH ................................................................................................................................................ 10 STATISTICS ...................................................................................................................................................... 13 CONVENTIONS USED ....................................................................................................................................... 16 2. REVIEW OF 2018 ..............................................................................................................................17 A YEAR OF SELF-REFLECTION .......................................................................................................................17 ISLAMIST TERRORISM ...................................................................................................................................... 19 RIGHT WING TERRORISM ................................................................................................................................ 21 NORTHERN IRELAND-RELATED TERRORISM ...................................................................................................24 EMERGING THEMES ......................................................................................................................................... 27 NEW LEGISLATION IN 2018 .............................................................................................................................29 Primary Legislation. .................................................................................................................................. 29 Secondary legislation ............................................................................................................................... 32 3. TERRORIST GROUPS ......................................................................................................................33 PROSCRIPTION: INTRODUCTION ......................................................................................................................33 THE CURRENT LIST .......................................................................................................................................... 36 FOOTPRINT ...................................................................................................................................................... 37 Principal criminal offences ......................................................................................................................37 Funding Offences ..................................................................................................................................... 39 Communication, Planning and Training Offences ...............................................................................41 Extraterritorial Reach ............................................................................................................................... 42 Prosecutorial Discretion...........................................................................................................................42 Liability to Arrest ....................................................................................................................................... 43 Civil Powers ............................................................................................................................................... 43 Exclusion and Deportation ......................................................................................................................44 Digital Take-Downs .................................................................................................................................. 45 European Union Sanctions .....................................................................................................................45 Non-jury trials in Northern Ireland ..........................................................................................................46 The Charity Sector ................................................................................................................................... 46 Overseas Aid Agencies ...........................................................................................................................47 Footprint: Conclusion ............................................................................................................................... 49 KEEPING THE LIST UP TO DATE ......................................................................................................................49 REDUCING THE BURDEN ON AID AGENCIES ...................................................................................................54 4 INVESTIGATING TERRORISM ........................................................................................................57 INTRODUCTION ................................................................................................................................................. 57 STOP AND SEARCH ......................................................................................................................................... 57 SECTIONS 43 AND 43A ................................................................................................................................... 57 London ....................................................................................................................................................... 58 Northern Ireland ........................................................................................................................................ 59 Other forces ............................................................................................................................................... 60 SECTION 47A .................................................................................................................................................. 60 "TERRORIST INVESTIGATION" POWERS ..........................................................................................................63 CORDONS ........................................................................................................................................................ 64 SEARCH WARRANTS ........................................................................................................................................ 67 PRODUCTION ORDERS .................................................................................................................................... 68 CUSTOMER INFORMATION ORDERS, EXPLANATION ORDERS AND ACCOUNT MONITORING ORDERS .........68 1 POST-CHARGE QUESTIONING ..........................................................................................................................69 FINANCIAL INVESTIGATIONS ............................................................................................................................69 SUSPICIOUS ACTIVITY REPORTS ....................................................................................................................70 5. ARRESTING AND DETAINING........................................................................................................71 INTRODUCTION ................................................................................................................................................. 71 ARRESTS IN 2018 ...........................................................................................................................................
Recommended publications
  • Law Research Paper Series Paper #002 2019
    Law Research Paper Series Paper #002 2019 Terrorism and Transnational Law: Rules of Law Under Conditions of Globalisation Author: Dr Cian C. Murphy, Bristol Law School This paper is drawn from Zumbansen, ed, Oxford Handbook of Trasnational Law (forthcoming 2019). bristol.ac.uk/law/research/legal-research -papers ISSN 2515-897X The Bristol Law Research Paper Series publishes a broad range of legal scholarship in all subject areas from members of the University of Bristol Law School. All papers are published electronically, available for free, for download as pdf files. Copyright remains with the author(s). For any queries about the Series, please contact [email protected]. I. INTRODUCTION Since its first invocation, as a criticism of the French Revolution, the term ‘terrorism’ has been used to refer to threats to legal and political order. The Anglo-Irish political philosopher, Edmund Burke, said the French revolutionaries were ‘Hell-hounds called Terrorists’.1 The revolutionaries themselves wore the term with honour. Robespierre declared that terror is ‘nothing else than swift, severe, inflexible justice; it is therefore an emanation of virtue’.2 These two early uses of the term illustrate its role as a site of conflict about the legitimacy of political violence both by and against state order. And, at least until the end of the twentieth century, political violence – even terrorism – was seen as sometimes capable of justification. Today it is the pejorative meaning that has won out. The ‘-ist suggests a philosophy – but one which comes down to spilling guts and hacking off heads’ and so to be a terrorist is ‘to be accused of being cleaned out of ideas’.3 This, to an extent, is oxymoronic.
    [Show full text]
  • The Perilous Dialogue
    The Perilous Dialogue Laura K. Donohuet Five months before his retirement, Justice William Brennan wrote in a dissent: "the Framers of the Bill of Rights did not purport to 'create' rights. Rather, they designed the Bill of Rights to prohibit our Government from infringing rights and liberties presumed to be pre-existing."1 Professor Stephen Holmes reminds us in his lecture that such rights and liberties do not impede progress: they embody it. 2 The rules preserving rights and liberties can help to focus action by bringing clarity to the present, while still preserving a long- term political perspective. Yet, time and again, both these rights and the rules designed to protect them are sacrificed in the name of national security. The master metaphor in each sacrifice is, indeed, "security or freedom," and it is on this metaphor that I would like to focus. It dominates the counterterrorist discourse both in the United States and abroad.3 Transcripts from debates in Ireland's Ddil 1tireann, Turkey's Bilyilk Millet Meclisi, and Australia's Parliament are filled with reference to the need to weigh the value of liberty against the threat posed by terrorism. Perhaps nowhere is this more pronounced than in the United Kingdom, where, for decades, counterterrorist debates have turned on this framing. 4 However, owing in part to different Copyright © 2009 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. t Fellow, Constitutional Law Center, Stanford Law School. Special thanks to the Brennan Institute for their invitation to participate in the series, to Stephen Holmes and Paul Schwartz for their comments at the lecture, and to Aaron Gershbock at the California Law Review for his excellent editorial assistance.
    [Show full text]
  • THE CASE for CHANGE a Review of Pakistan’S Anti-Terrorism Act of 1997
    THE CASE FOR CHANGE A Review of Pakistan’s Anti-Terrorism Act of 1997 October 2013 A Report by the Research Society of International Law, Pakistan i PROJECT RESEARCHERS ISLAMABAD DIVISION Jamal Aziz Muhammad Oves Anwar LL.B (London), LL.M (UCL) LL.B (London), LL.M (SOAS), LL.M (Vienna), D.U. (Montpellier) Saad-ur-Rehman Khan Abid Rizvi LL.B (London), LL.M (Manchester) BA-LL.B (LUMS), LL.M (U.Penn) Aleena Zainab Alavi Zainab Mustafa LL.B (London), LL.M (Warwick) LL.B (London) LAHORE DIVISION Ali Sultan Amna Warsi J.D. (Virginia) LL.M (Punjab) Ayasha Warsi Moghees Khan LL.M (Punjab) LL.B (London), LL.M (Warwick) Mishael Qureshi LL.B (Lond.), LL.M (Sussex) INTERNS Muhammad Bin Majid Muhammad Abdul Ghani Awais Ahmad Khan Ghauri This material may not be copied, reproduced or transmitted in whole or in part without attribution to the Research Society of International Law (RSIL). Unless noted otherwise, all material is property of RSIL. Copyright © Research Society of International Law 2013. ii CONTENTS SUMMARY OF RECOMMENDATIONS .......................................................................................... IX CHAPTER ONE ....................................................................................................................................... 7 TERRORISM IN THE PAKISTANI CONTEXT .................................................................................. 7 1.1 TRENDS IN TERRORISM ........................................................................................................... 7 1.2 THE ANATOMY OF TERRORISM
    [Show full text]
  • Policing Terrorism
    Policing Terrorism A Review of the Evidence Darren Thiel Policing Terrorism A Review of the Evidence Darren Thiel Policing Terrorism A Review of the Evidence Darren Thiel © 2009: The Police Foundation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, without the prior permission of The Police Foundation. Any opinions, findings and conclusions or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the Police Foundation. Enquires concerning reproduction should be sent to The Police Foundation at the address below. ISBN: 0 947692 49 5 The Police Foundation First Floor Park Place 12 Lawn Lane London SW8 1UD Tel: 020 7582 3744 www.police-foundation.org.uk Acknowledgements This Review is indebted to the Barrow Cadbury Trust which provided the grant enabling the work to be conducted. The author also wishes to thank the academics, researchers, critics, police officers, security service officials, and civil servants who helped formulate the initial direction and content of this Review, and the staff at the Police Foundation for their help and support throughout. Thanks also to Tahir Abbas, David Bayley, Robert Beckley, Craig Denholm, Martin Innes and Bob Lambert for their insightful, constructive and supportive comments on various drafts of the Review. Any mistakes or inaccuracies are, of course, the author’s own. Darren Thiel, February 2009 Contents PAGE Executive Summary 1 Introduction 5 Chapter
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Post-Legislative Scrutiny of the Terrorism Act 2006, Cm 8186 (PDF)
    Memorandum to the Home Affairs Committee Post-Legislative Scrutiny of the Terrorism Act 2006 Cm 8186 £6.00 Memorandum to the Home Affairs Committee Post-Legislative Scrutiny of the Terrorism Act 2006 Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty September 2011 Cm 8186 £6.00 © Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us at: Counter-Terrorism Legislation Team Office for Security and Counter-Terrorism Home Office 2 Marsham Street London SW1P 4DF This publication is also available for download at www.official-documents.gov.uk ISBN: 9780101818629 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2455627 09/11 19585 15195 Printed on paper containing 75% recycled fibre content minimum. MEMORANDUM TO THE HOME AFFAIRS COMMITTEE POST-LEGISLATIVE SCRUTINY OF THE TERRORISM ACT 2006 1. INTRODUCTION 1.1 This memorandum provides a preliminary assessment of the Terrorism Act 2006 and has been prepared by the Home Office for submission to the Home Affairs Committee. It is published as part of the process set out in the document Post Legislative Scrutiny – the Government’s Approach.
    [Show full text]
  • The Impact of Counter-Terrorism Measures on Muslim Communities
    Equality and Human Rights Commission Research report 72 The impact of counter-terrorism measures on Muslim communities Tufyal Choudhury and Helen Fenwick Durham University The impact of counter-terrorism measures on Muslim communities Tufyal Choudhury and Helen Fenwick Durham University © Equality and Human Rights Commission 2011 First published Spring 2011 ISBN 978 1 84206 383 5 Equality and Human Rights Commission Research Report series The Equality and Human Rights Commission Research Report Series publishes research carried out for the Commission by commissioned researchers. The views expressed in this report are those of the authors and do not necessarily represent the views of the Commission. The Commission is publishing the report as a contribution to discussion and debate. Please contact the Research Team for further information about other Commission research reports, or visit our website: Research Team Equality and Human Rights Commission Arndale House The Arndale Centre Manchester M4 3AQ Email: [email protected] Telephone: 0161 829 8500 Website: www.equalityhumanrights.com If you require this publication in an alternative format, please contact the Communications Team to discuss your needs at: [email protected] Contents Tables i Acknowledgements ii Foreword iii Executive summary v 1. Introduction 1 1.1 Background 1 1.2 Methodology 2 1.3 Structure of this report 3 2. The community, security and policing context 5 2.1 The community context 5 2.2 The security context 9 2.3 The legal and policy context 13 2.4 The policing context 15 2.5 Summary 17 3. Ports and airports 18 3.1 Security measures 18 3.2 Schedule 7 19 3.3 Summary 28 4.
    [Show full text]
  • Counter-Terrorism Bill
    Counter-Terrorism Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 65—EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following statement under section 19(1)(a) of the Human Rights Act 1998: In my view the provisions of the Counter-Terrorism Bill are compatible with the Convention rights. HL Bill 65 54/3 Counter-Terrorism Bill CONTENTS PART 1 POWERS TO GATHER AND SHARE INFORMATION Power to remove documents for examination 1 Power to remove documents for examination 2 Offence of obstruction 3 Items subject to legal privilege 4 Record of removal 5 Retention of documents 6 Access to documents 7 Photographing and copying of documents 8 Return of documents 9 Power to remove documents: supplementary provisions Power to take fingerprints and samples from person subject to control order 10 Power to take fingerprints and samples: England and Wales 11 Power to take fingerprints and samples: Scotland 12 Power to take fingerprints and samples: Northern Ireland 13 Power to take fingerprints and samples: transitional provision Retention and use of fingerprints and samples 14 Material subject to the Police and Criminal Evidence Act 1984 15 Material subject to the Police and Criminal Evidence (Northern Ireland) Order 1989 16 Material subject to the Terrorism Act 2000: England and Wales and Northern Ireland 17 Material subject to the Terrorism Act 2000: Scotland 18 Material not subject to existing statutory restrictions Disclosure of information and the
    [Show full text]
  • Interview with Max Hill, QC, Independent Reviewer of Terrorism Legislation for the United Kingdom by Sam Mullins1
    PERSPECTIVES ON TERRORISM Volume 12, Issue 2 Policy Brief Interview with Max Hill, QC, Independent Reviewer of Terrorism Legislation for the United Kingdom by Sam Mullins1 Abstract The following text is a transcript of an interview between the author and the Independent Reviewer of Terrorism Legislation (IRTL) for the United Kingdom, Max Hill, QC, which took place on March 9, 2018 in Garmisch-Partenkirchen, Germany. Topics discussed included the role of the IRTL, prosecution of terrorism in the UK, returning foreign fighters, terrorism prevention and investigation measures (TPIMs), deportation of terrorism suspects, the involvement of children in terrorism, hate-preachers, and the British government’s efforts to counter non-violent extremism. The transcript has been edited for brevity. Keywords: terrorism, counter-terrorism, prosecution, security, human rights, civil liberties, United Kingdom. Introduction Security versus civil liberties. How to safeguard the population from the actions of terrorists, while at the same time preserving fundamental rights such as freedom of speech, movement and association? This is the age-old debate that lies at the heart of counter-terrorism (CT) in liberal democracies. The precise balance varies from country to country and across time but in the aftermath of attacks it is particularly likely to tip in favour of security, sometimes at the expense of certain liberties. The UK is no stranger to terrorism, but - similar to many other countries around the world - it has been on a heightened state of alert since 2014 when ISIS declared its caliphate, and last year the UK was rocked by a string of successful attacks, resulting in 36 fatalities [1].
    [Show full text]
  • Download Thepdf
    Volume 59, Issue 5 Page 1395 Stanford Law Review KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker © 2007 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 59 STAN. L. REV. 1395 (2007). For information visit http://lawreview.stanford.edu. KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker* INTRODUCTION: THE DYNAMICS OF COUNTER-TERRORISM POLICIES AND LAWS................................................................................................ 1395 I. CONTROL ORDERS ..................................................................................... 1403 A. Background to the Enactment of Control Orders............................... 1403 B. The Replacement System..................................................................... 1408 1. Control orders—outline................................................................ 1408 2. Control orders—contents and issuance........................................ 1411 3. Non-derogating control orders..................................................... 1416 4. Derogating control orders............................................................ 1424 5. Criminal prosecution.................................................................... 1429 6. Ancillary issues............................................................................. 1433 7. Review by Parliament and the Executive...................................... 1443 C. Judicial Review..................................................................................
    [Show full text]
  • A Comparative Research Study on Radical and Extremist (Hate) Speakers in European Member States
    A Comparative Research Study on Radical and Extremist (Hate) Speakers in European Member States Authors: Dr. Ulad Belavusau, Dr. Berenice Boutin, Dr. Rumyana Grozdanova, Dr. Marloes van Noorloos, Dr. Christophe Paulussen Independent Quality Control: Professor Emeritus Clive Walker Editors: Dr. Rumyana Grozdanova, Maria Sperling Table of Contents Introduction ................................................................................................................................ 4 Section 1 – International Legal Obligations ................................................................................... 5 Section 2 – Regional Legal Obligations .......................................................................................... 7 1. Council of Europe – General Regime ....................................................................................... 7 2. European Court of Human Rights Jurisprudence .................................................................... 9 Section 3 – Country Case Studies ................................................................................................ 10 A. Belgium ...................................................................................................................... 10 1. Criminal Law Provisions ........................................................................................................ 10 2. Immigration Law Provisions .................................................................................................. 13 3. Administrative Law on Demonstrations
    [Show full text]
  • The Terrorism Acts in 2015
    THE TERRORISM ACTS IN 2015 REPORT OF THE INDEPENDENT REVIEWER ON THE OPERATION OF THE TERRORISM ACT 2000 AND PART 1 OF THE TERRORISM ACT 2006 by DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation DECEMBER 2016 THE TERRORISM ACTS IN 2015 REPORT OF THE INDEPENDENT REVIEWER ON THE OPERATION OF THE TERRORISM ACT 2000 AND PART 1 OF THE TERRORISM ACT 2006 by DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation Presented to Parliament pursuant to Section 36(5) of the Terrorism Act 2006 December 2016 © David Anderson 2016 The text of this document (this excludes, where present, the Royal Arms and all departmental or agency logos) may be reproduced free of charge in any format or medium provided that it is reproduced accurately and not in a misleading context. The material must be acknowledged as David Anderson copyright and the document title specified. Where third party material has been identified, permission from the respective copyright holder must be sought. Any enquiries regarding this publication should be sent to the Independent Reviewer at [email protected] or by post to David Anderson Q.C. at Brick Court Chambers, 7-8 Essex Street, London WC2R 3LD. This publication is available at http://terrorismlegislationreviewer.independent.gov.uk Print ISBN 9781474138871 Web ISBN 9781474138888 ID 14111609 12/16 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Office CONTENTS Page EXECUTIVE SUMMARY 2 1. INTRODUCTION 3 2. THREAT PICTURE 9 3.
    [Show full text]