Chapter Overview
This chapter examines the use of the criminal law to prevent terrorist attacks by prohibiting online preparatory activities. The chapter begins by explaining our understanding of the term cyberterrorism, arguing that whilst it is important that cyberterrorism is construed narrowly it is also important to recognise that it is qualitatively distinct from traditional forms of terrorism. After outlining the variety of ways in which terrorists may use the Internet in preparation for both cyber and non-cyber based attacks, the chapter then explains why terrorism precursor offences have been deemed necessary and argues that the notion of normative involvement offers both a principled basis on which to justify the criminalisation of preparatory activities as well as a yardstick for evaluating whether these offences overreach. Finally, the chapter considers another suggestion for limiting the scope of the precursor offences: stipulating that inherently innocent conduct should fall outside the scope of the criminal law. It argues that this proposal is problematic and that a more fruitful approach would be to strengthen the extra-legal constraints on prosecutorial discretion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Terrorism Act 2000, s. 40-41.
- 2.
Terrorism Act 2000, s. 43.
- 3.
Terrorism Act 2000, s. 41(7) & schedule 8.
- 4.
Terrorism Prevention and Investigation Measures Act 2011, s. 3.
- 5.
Three of the men (the ringleader, his right hand man and the explosives expert) were convicted of conspiracy to murder aircraft passengers using explosives. The other four (the would-be suicide bombers) were convicted of conspiracy to murder. See R v Ali (Ahmed) & others [2011] EWCA Crim 1260.
- 6.
Criminal Attempts Act 1981, s. 1(1).
- 7.
(1990) 93 Cr App R 350.
- 8.
[2009] UKHL 13.
- 9.
[2008] EWCA Crim 185.
- 10.
Indirect encouragement includes any statement which ‘glorifies’ the commission or preparation of terrorist acts (whether past, present or future) if members of the public could reasonably infer from the statement that they should emulate the conduct being glorified (Terrorism Act 2006, s. 1(3)).
- 11.
Terrorism Act 2006, s. 1(6).
- 12.
Simester’s proposal is based on the reasoning of the House of Lords in the indecent assault case R v Court [1989] AC 28.
- 13.
One well-known example is the House of Lords’ judgment in DPP v Gomez [1993] AC 442 on the meaning of the word ‘appropriates’ in the offence of theft. Whilst Lord Lowry’s dissenting judgment emphasised the meaning the Criminal Law Revision Committee intended the word to have, Lord Keith in his majority judgment stated that to look at the Committee’s intention would serve ‘no useful purpose’.
- 14.
The reports are available on the CPS website (www.cps.gov.uk).
- 15.
Terrorism Act 2000, s. 117; Terrorism Act 2006, s. 19.
- 16.
[2010] EWCA Crim 3215.
Further Reading and Resources
Hodgson J, Tadros V (2009) How to make a terrorist out of nothing. Mod Law Rev 72:984–998
Macdonald S (2014) Prosecuting suspected terrorists: precursor crimes, intercept evidence and the priority of security. In: Jarvis L, Lister M (eds) Critical perspectives on counter-terrorism. Routledge, Abingdon
Marchand SA (2010) An ambiguous response to a real threat: criminalizing the glorification of terrorism in Britain. George Wash Int Law Rev 42:123–157
United Nations Office on Drugs and Crime (2012) The use of the Internet for terrorist purposes. United Nations, New York
Weimann G (2004) How modern terrorism uses the Internet. United States Institute of Peace special report 116
Weimann G (2006) Terror on the Internet: the new arena, the new challenges. United States Institute of Peace Press, Washington, DC
References
Anderson D (2013) Shielding the compass: how to fight terrorism without defeating the law. Eur Hum Right Law Rev 233–246
Ashworth A, Zedner L (2012) Prevention and criminalization: justifications and limits. New Crim Law Rev 15:542–571
Ballard JD, Hornik JG, McKenzie D (2002) Technological facilitation of terrorism: definitional, legal and policy issues. Am Behav Sci 45:989–1016
Best C (2008) Open source intelligence. In: Fogelman-Souie F, Perrotta D, Piskorski J, Steinberger R (eds) Mining massive data sets for security: advances in data mining, search, social networks and text mining and their applications for security. IOS Press, Amsterdam, pp 331–344
Bradley A, Ewing K (2003) Constitutional and administrative law, 13th edn. Longman, Harlow
Carlile A (2007) The definition of terrorism, Cm 7052. The Stationery Office, London
Chen H, Larson C (2007) Dark web terrorism research. http://ai.arizona.edu/research/terror/. Accessed 16 Oct 2013
Clarkson C (2009) Attempt: the conduct requirement. Oxf J Leg Stud 29:25–41
Conway M (2002) Reality bytes: cyberterrorism and terrorist ‘use’ of the Internet. First Monday 7. http://firstmonday.org/ojs/index.php/fm/article/view/1001/922. Accessed 4 Oct 2013
Conway M (2006) Terrorist ‘use’ of the Internet and fighting back. Inform Secur 19:9–30
Cronin AK (2003) Behind the curve: globalisation and international terrorism. Int Secur 27:30–58
Crown Prosecution Service (2013) The code for Crown prosecutors. CPS Communication Division, London
Davis KC (1971) Discretionary justice: a preliminary inquiry. University of Illinois Press, Urbana
Denning D (2000) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Accessed 4 Oct 2013
Denning D (2010) Terror’s web: how the internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook of Internet crime. Willan Publishing, Devon, pp 194–213
Duff A (1996) Criminal attempts. Clarendon, Oxford
Duff AR, Farmer L, Marshall SE, Renzo M, Tadros V (eds) (2010) The boundaries of the criminal law. Oxford University Press, Oxford
Edwards J (2010) Justice denied: the criminal law and the ouster of the courts. Oxf J Leg Stud 30:725–748
Galligan D (1986) Discretionary powers. Clarendon, Oxford
Goodman S, Kirk J, Kirk M (2007) Cyberspace as a medium for terrorists. Technol Forecast Soc Change 74:193–210
Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21:636–647
Hawkins K (1992) The use of legal discretion: perspectives from law and social science. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford
Hawkins K (2003) Order, rationality and silence: some reflections on criminal justice decision-making. In: Gelsthorpe L, Padfield N (eds) Exercising discretion: decision-making in the criminal justice system and beyond. Willan Publishing, Cullompton
Hodgson J, Tadros V (2009) How to make a terrorist out of nothing. Mod Law Rev 72:984–998
Hoffman B (2006) Inside terrorism. Columbia University Press, Chichester
Holt TJ (2012) Exploring the intersections of technology, crime, and terror. Terrorism Polit Violence 24:337–354
Home Office (2011) CONTEST: the United Kingdom’s strategy for countering terrorism, Cm 8123. The Stationery Office, London
Homeland Security Institute (2009) The Internet as a terrorist tool for recruitment and radicalization of youth. Homeland Security Institute, Arlington
Horder J (2012) Harmless wrongdoing and the anticipatory perspective on criminalisation. In: Sullivan GR, Dennis I (eds) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford, pp 79–102
Hua J, Bapna S (2012) How can we deter cyberterrorism? Info Secur J Global Perspect 21:102–114
Jacobson M (2010) Terrorist financing and the Internet. Stud Conflict Terrorism 33:353–363
Jarvis L, Macdonald S (2014) What is cyberterrorism? Findings from a survey of researchers. Terrorism Polit Violence. Forthcoming
Joint Committee on Human Rights (2007) The Council of Europe Convention on the Prevention of Terrorism. First report of session 2006–07, HC 247
Keller J, DeSouza K, Lin Y (2010) Dismantling terrorist networks: evaluating strategic options using agent-based modelling. Technol Forecast Soc Change 77:1014–1036
Lacey N (1992) The jurisprudence of discretion: escaping the legal paradigm. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford
Lester A (2007) Redefining terror. Index Censorship 36:103–107
Libicki MC (2007) Conquest in cyberspace: National Security and Information Warfare. Cambridge University Press, Cambridge
Macdonald S (2014) Prosecuting suspected terrorists: precursor crimes, intercept evidence and the priority of security. In: Jarvis L, Lister M (eds) Critical perspectives on counter-terrorism. Routledge, Abingdon
Marchand SA (2010) An ambiguous response to a real threat: criminalizing the glorification of terrorism in Britain. George Wash Int Law Rev 42:123–157
McSherry B (2009) Expanding the boundaries of inchoate crimes: the growing reliance on preparatory offences. In: McSherry B, Norrie A, Bronitt S (eds) Regulating deviance: the redirection of criminalisation and the futures of criminal law. Hart Publishing, Oxford
Piper P (2008) Nets of terror: terrorist activity on the internet. Searcher 16:28–38
Pollitt MM (1998) Cyberterrorism: fact or fancy. Comput Fraud Secur 2:8–10
Privy Council Review of Intercept as Evidence (2008) Report to the Prime Minister and the Home Secretary, Cm 7324. The Stationery Office, London
Schmid AP, Jongman AJ (2008) Political terrorism: a new guide to actors, authors, concepts, data bases, theories, & literature (updated edn.). Transaction, New Burnswick
Schneider CE (1992) Discretion and rules: a lawyer’s view. In: Hawkins K (ed) The uses of discretion. Clarendon, Oxford
Simester AP (2012) Prophylactic crimes. In: Sullivan GR, Dennis I (eds) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford
Simester AP, von Hirsch A (2011) Crimes, harms, and wrongs: on the principles of criminalisation. Hart Publishing, Oxford
Simester AP, Spencer JR, Sullivan GR, Virgo GJ (2013) Simester and Sullivan’s criminal law: theory and doctrine, 5th edn. Hart Publishing, Oxford
Stenersen A (2008) The Internet: a virtual training camp? Terrorism Polit Violence 20:215–233
Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46:223–238
Sullivan GR, Dennis I (eds) (2012) Seeking security: pre-empting the commission of criminal harms. Hart Publishing, Oxford
Theohary CA, Rollins J (2011) Terrorist use of the Internet: information operations in cyberspace. Congressional Research Service report for congress 7-5700
Tsfati Y, Weimann G (2002) www. Terrorism.com: terror on the Internet. Stud Conflict Terrorism 25:317–332
Turpin C, Tomkins A (2011) British Government and the constitution. Cambridge University Press, Cambridge
United Nations Office on Drugs and Crime (2012) The use of the Internet for terrorist purposes. United Nations, New York
Weimann G (2004) How modern terrorism uses the Internet. United States Institute of Peace special report 116
Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Conflict Terrorism 28:129–149
Weimann G (2006) Terror on the Internet: the new arena, the new challenges. United States Institute of Peace Press, Washington, DC
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Carlile QC, L., Macdonald, S. (2014). The Criminalisation of Terrorists’ Online Preparatory Acts. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0962-9_9
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0961-2
Online ISBN: 978-1-4939-0962-9
eBook Packages: Computer ScienceComputer Science (R0)