Skip to main content

The Criminalisation of Terrorists’ Online Preparatory Acts

  • Chapter
  • First Online:
Cyberterrorism

Chapter Overview

This chapter examines the use of the criminal law to prevent terrorist attacks by prohibiting online preparatory activities. The chapter begins by explaining our understanding of the term cyberterrorism, arguing that whilst it is important that cyberterrorism is construed narrowly it is also important to recognise that it is qualitatively distinct from traditional forms of terrorism. After outlining the variety of ways in which terrorists may use the Internet in preparation for both cyber and non-cyber based attacks, the chapter then explains why terrorism precursor offences have been deemed necessary and argues that the notion of normative involvement offers both a principled basis on which to justify the criminalisation of preparatory activities as well as a yardstick for evaluating whether these offences overreach. Finally, the chapter considers another suggestion for limiting the scope of the precursor offences: stipulating that inherently innocent conduct should fall outside the scope of the criminal law. It argues that this proposal is problematic and that a more fruitful approach would be to strengthen the extra-legal constraints on prosecutorial discretion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Terrorism Act 2000, s. 40-41.

  2. 2.

    Terrorism Act 2000, s. 43.

  3. 3.

    Terrorism Act 2000, s. 41(7) & schedule 8.

  4. 4.

    Terrorism Prevention and Investigation Measures Act 2011, s. 3.

  5. 5.

    Three of the men (the ringleader, his right hand man and the explosives expert) were convicted of conspiracy to murder aircraft passengers using explosives. The other four (the would-be suicide bombers) were convicted of conspiracy to murder. See R v Ali (Ahmed) & others [2011] EWCA Crim 1260.

  6. 6.

    Criminal Attempts Act 1981, s. 1(1).

  7. 7.

    (1990) 93 Cr App R 350.

  8. 8.

    [2009] UKHL 13.

  9. 9.

    [2008] EWCA Crim 185.

  10. 10.

    Indirect encouragement includes any statement which ‘glorifies’ the commission or preparation of terrorist acts (whether past, present or future) if members of the public could reasonably infer from the statement that they should emulate the conduct being glorified (Terrorism Act 2006, s. 1(3)).

  11. 11.

    Terrorism Act 2006, s. 1(6).

  12. 12.

    Simester’s proposal is based on the reasoning of the House of Lords in the indecent assault case R v Court [1989] AC 28.

  13. 13.

    One well-known example is the House of Lords’ judgment in DPP v Gomez [1993] AC 442 on the meaning of the word ‘appropriates’ in the offence of theft. Whilst Lord Lowry’s dissenting judgment emphasised the meaning the Criminal Law Revision Committee intended the word to have, Lord Keith in his majority judgment stated that to look at the Committee’s intention would serve ‘no useful purpose’.

  14. 14.

    The reports are available on the CPS website (www.cps.gov.uk).

  15. 15.

    Terrorism Act 2000, s. 117; Terrorism Act 2006, s. 19.

  16. 16.

    [2010] EWCA Crim 3215.

Further Reading and Resources

  • Hodgson J, Tadros V (2009) How to make a terrorist out of nothing. Mod Law Rev 72:984–998

    Google Scholar 

  • Macdonald S (2014) Prosecuting suspected terrorists: precursor crimes, intercept evidence and the priority of security. In: Jarvis L, Lister M (eds) Critical perspectives on counter-terrorism. Routledge, Abingdon

    Google Scholar 

  • Marchand SA (2010) An ambiguous response to a real threat: criminalizing the glorification of terrorism in Britain. George Wash Int Law Rev 42:123–157

    Google Scholar 

  • United Nations Office on Drugs and Crime (2012) The use of the Internet for terrorist purposes. United Nations, New York

    Google Scholar 

  • Weimann G (2004) How modern terrorism uses the Internet. United States Institute of Peace special report 116

    Google Scholar 

  • Weimann G (2006) Terror on the Internet: the new arena, the new challenges. United States Institute of Peace Press, Washington, DC

    Google Scholar 

References

  • Anderson D (2013) Shielding the compass: how to fight terrorism without defeating the law. Eur Hum Right Law Rev 233–246

    Google Scholar 

  • Ashworth A, Zedner L (2012) Prevention and criminalization: justifications and limits. New Crim Law Rev 15:542–571

    Google Scholar 

  • Ballard JD, Hornik JG, McKenzie D (2002) Technological facilitation of terrorism: definitional, legal and policy issues. Am Behav Sci 45:989–1016

    Article  Google Scholar 

  • Best C (2008) Open source intelligence. In: Fogelman-Souie F, Perrotta D, Piskorski J, Steinberger R (eds) Mining massive data sets for security: advances in data mining, search, social networks and text mining and their applications for security. IOS Press, Amsterdam, pp 331–344

    Google Scholar 

  • Bradley A, Ewing K (2003) Constitutional and administrative law, 13th edn. Longman, Harlow

    Google Scholar 

  • Carlile A (2007) The definition of terrorism, Cm 7052. The Stationery Office, London

    Google Scholar 

  • Chen H, Larson C (2007) Dark web terrorism research. http://ai.arizona.edu/research/terror/. Accessed 16 Oct 2013

  • Clarkson C (2009) Attempt: the conduct requirement. Oxf J Leg Stud 29:25–41

    Article  Google Scholar 

  • Conway M (2002) Reality bytes: cyberterrorism and terrorist ‘use’ of the Internet. First Monday 7. http://firstmonday.org/ojs/index.php/fm/article/view/1001/922. Accessed 4 Oct 2013

  • Conway M (2006) Terrorist ‘use’ of the Internet and fighting back. Inform Secur 19:9–30

    Google Scholar 

  • Cronin AK (2003) Behind the curve: globalisation and international terrorism. Int Secur 27:30–58

    Article  Google Scholar 

  • Crown Prosecution Service (2013) The code for Crown prosecutors. CPS Communication Division, London

    Google Scholar 

  • Davis KC (1971) Discretionary justice: a preliminary inquiry. University of Illinois Press, Urbana

    Google Scholar 

  • Denning D (2000) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Accessed 4 Oct 2013

  • Denning D (2010) Terror’s web: how the internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook of Internet crime. Willan Publishing, Devon, pp 194–213

    Google Scholar 

  • Duff A (1996) Criminal attempts. Clarendon, Oxford

    Google Scholar 

  • Duff AR, Farmer L, Marshall SE, Renzo M, Tadros V (eds) (2010) The boundaries of the criminal law. Oxford University Press, Oxford

    Google Scholar 

  • Edwards J (2010) Justice denied: the criminal law and the ouster of the courts. Oxf J Leg Stud 30:725–748

    Article  Google Scholar 

  • Galligan D (1986) Discretionary powers. Clarendon, Oxford

    Google Scholar 

  • Goodman S, Kirk J, Kirk M (2007) Cyberspace as a medium for terrorists. Technol Forecast Soc Change 74:193–210

    Article  Google Scholar 

  • Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21:636–647

    Article  Google Scholar 

  • Hawkins K (1992) The use of legal discretion: perspectives from law and social science. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford

    Google Scholar 

  • Hawkins K (2003) Order, rationality and silence: some reflections on criminal justice decision-making. In: Gelsthorpe L, Padfield N (eds) Exercising discretion: decision-making in the criminal justice system and beyond. Willan Publishing, Cullompton

    Google Scholar 

  • Hodgson J, Tadros V (2009) How to make a terrorist out of nothing. Mod Law Rev 72:984–998

    Google Scholar 

  • Hoffman B (2006) Inside terrorism. Columbia University Press, Chichester

    Google Scholar 

  • Holt TJ (2012) Exploring the intersections of technology, crime, and terror. Terrorism Polit Violence 24:337–354

    Article  Google Scholar 

  • Home Office (2011) CONTEST: the United Kingdom’s strategy for countering terrorism, Cm 8123. The Stationery Office, London

    Google Scholar 

  • Homeland Security Institute (2009) The Internet as a terrorist tool for recruitment and radicalization of youth. Homeland Security Institute, Arlington

    Google Scholar 

  • Horder J (2012) Harmless wrongdoing and the anticipatory perspective on criminalisation. In: Sullivan GR, Dennis I (eds) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford, pp 79–102

    Google Scholar 

  • Hua J, Bapna S (2012) How can we deter cyberterrorism? Info Secur J Global Perspect 21:102–114

    Article  Google Scholar 

  • Jacobson M (2010) Terrorist financing and the Internet. Stud Conflict Terrorism 33:353–363

    Article  Google Scholar 

  • Jarvis L, Macdonald S (2014) What is cyberterrorism? Findings from a survey of researchers. Terrorism Polit Violence. Forthcoming

    Google Scholar 

  • Joint Committee on Human Rights (2007) The Council of Europe Convention on the Prevention of Terrorism. First report of session 2006–07, HC 247

    Google Scholar 

  • Keller J, DeSouza K, Lin Y (2010) Dismantling terrorist networks: evaluating strategic options using agent-based modelling. Technol Forecast Soc Change 77:1014–1036

    Article  Google Scholar 

  • Lacey N (1992) The jurisprudence of discretion: escaping the legal paradigm. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford

    Google Scholar 

  • Lester A (2007) Redefining terror. Index Censorship 36:103–107

    Article  Google Scholar 

  • Libicki MC (2007) Conquest in cyberspace: National Security and Information Warfare. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Macdonald S (2014) Prosecuting suspected terrorists: precursor crimes, intercept evidence and the priority of security. In: Jarvis L, Lister M (eds) Critical perspectives on counter-terrorism. Routledge, Abingdon

    Google Scholar 

  • Marchand SA (2010) An ambiguous response to a real threat: criminalizing the glorification of terrorism in Britain. George Wash Int Law Rev 42:123–157

    Google Scholar 

  • McSherry B (2009) Expanding the boundaries of inchoate crimes: the growing reliance on preparatory offences. In: McSherry B, Norrie A, Bronitt S (eds) Regulating deviance: the redirection of criminalisation and the futures of criminal law. Hart Publishing, Oxford

    Google Scholar 

  • Piper P (2008) Nets of terror: terrorist activity on the internet. Searcher 16:28–38

    Google Scholar 

  • Pollitt MM (1998) Cyberterrorism: fact or fancy. Comput Fraud Secur 2:8–10

    Article  Google Scholar 

  • Privy Council Review of Intercept as Evidence (2008) Report to the Prime Minister and the Home Secretary, Cm 7324. The Stationery Office, London

    Google Scholar 

  • Schmid AP, Jongman AJ (2008) Political terrorism: a new guide to actors, authors, concepts, data bases, theories, & literature (updated edn.). Transaction, New Burnswick

    Google Scholar 

  • Schneider CE (1992) Discretion and rules: a lawyer’s view. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford

    Google Scholar 

  • Simester AP (2012) Prophylactic crimes. In: Sullivan GR, Dennis I (eds) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford

    Google Scholar 

  • Simester AP, von Hirsch A (2011) Crimes, harms, and wrongs: on the principles of criminalisation. Hart Publishing, Oxford

    Google Scholar 

  • Simester AP, Spencer JR, Sullivan GR, Virgo GJ (2013) Simester and Sullivan’s criminal law: theory and doctrine, 5th edn. Hart Publishing, Oxford

    Google Scholar 

  • Stenersen A (2008) The Internet: a virtual training camp? Terrorism Polit Violence 20:215–233

    Article  Google Scholar 

  • Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46:223–238

    Article  Google Scholar 

  • Sullivan GR, Dennis I (eds) (2012) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford

    Google Scholar 

  • Theohary CA, Rollins J (2011) Terrorist use of the Internet: information operations in cyberspace. Congressional Research Service report for congress 7-5700

    Google Scholar 

  • Tsfati Y, Weimann G (2002) www. Terrorism.com: terror on the Internet. Stud Conflict Terrorism 25:317–332

    Article  Google Scholar 

  • Turpin C, Tomkins A (2011) British Government and the constitution. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • United Nations Office on Drugs and Crime (2012) The use of the Internet for terrorist purposes. United Nations, New York

    Google Scholar 

  • Weimann G (2004) How modern terrorism uses the Internet. United States Institute of Peace special report 116

    Google Scholar 

  • Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Conflict Terrorism 28:129–149

    Article  Google Scholar 

  • Weimann G (2006) Terror on the Internet: the new arena, the new challenges. United States Institute of Peace Press, Washington, DC

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stuart Macdonald .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Carlile QC, L., Macdonald, S. (2014). The Criminalisation of Terrorists’ Online Preparatory Acts. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_9

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics