Skip to main content
Log in

Terrorism and the law: Historical contexts, contemporary dilemmas, and the end(s) of democracy

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

Recent proposals by the G7 (and Russia) to clamp down on “terrorists” and “terrorism” do not define that which is prohibited. Instead, a threat is communicated which in turn allows, among other things, greater attention to be paid officially to “camouflage” charities and “terrorist” use of the Internet. Nevertheless, it is somewhat of a truism to note that terrorist violence is ultimately defined or characterized, for purposes of legal prohibition, within a highly politicized atmosphere. Starting with a short summary of “anti-terrorist” codification efforts made this century, this article examines some of the “security interests” cited by governments today in their respective struggles against “terrorism”. More specifically, it is argued that individual perceptions of personal and societal threat are heightened unnecessarily not only by a constant stream of governmental “anti-terrorist” rhetoric, but further, by an awareness of official and unofficial methods of “anti-terrorist” surveillance, and the use to which the information so obtained can be put.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. P. Webster and I. Brodie, “G7 vow to pursue terrorists,” The Times, 27 June 1996, 14.

  2. “World leaders approve call from President Clinton for a new international alliance,” The Times, 28 June 1996, 1. See also the Declaration on Measures to Eliminate International Terrorism, G.A. Res. 49/60, Annex, U.N. G.A.O.R., 49th Sess., Supp. No. 49, Vol. 1, 303, U.N. Doc. A/49/49 (1995).

  3. T. Rhodes, “U.S. seeks backing for plan to beat terrorism,” The Times, 30 July 1996, 1.

  4. B. MacIntyre, “Anti-terror war stepped up despite sanctions split,” The Times, 31 July 1996, 10.

    Google Scholar 

  5. Id. (statement of the French foreign minister).

  6. See infra, note 40, and accompanying text. Kleff notes that “it has become de-rigueur to state at the beginning of most articles and books about terrorism that it is a concept over which people have agreed to disagree.” R. Kleff, “Terrorism: The Trinity Perspective,” in H.H. Han (ed.), Terrorism and Political Violence: Limits and Possibilities of Legal Control (New York: Oceana Publications, 1993), 13. Murphy notes that “109 different definitions of the term were advanced between 1936 and 1981, and more have appeared since.” J.F. Murphy, “The Need for International Co-operation in Combating Terrorism,” Terrorism: An International Journal, 1988 (13), 381.

    Google Scholar 

  7. Lauterpacht defines “security” as “a system of obligations to enforce by common international action the existing limitations upon the right to go to war.” H. Lauterpacht (ed.), Oppenheim's International Law, Vol. II (London: Longmans, 7th ed. 1952), 93 n. 1. See, e.g., Lt. Col. (U.S.) R.J. Erickson, Legitimate Use of Military Force against State-Sponsored International Terrorism (Maxwell Air Force Base, Ala.: Air University Press, 1989).

  8. For purposes of brevity, so-called economic terrorism will not be dealt with in other than the indicated political context.

  9. See R.A. Friedlander, “The Origins of International Terrorism: A Micro Legal-Historical Perspective,” Israeli Yearbook of Human Rights, 1976 (6), 49, 52; R. Kleff, supra, note 6, 15–17.

  10. Nevertheless, murder and violence as methods to effect change were common to the ancient world. R.A. Friedlander, id., 51–2.

  11. Id., 52–3, where it is also noted that John Milton defined “tyrannicide” (the killing of a tyrant), as “not only lawful, but also laudable” (citations omitted). Cf. E. Marks, “Diplomacy and Terrorism: Conflicting Systems,” in Terrorism and Political Violence, supra, note 6, 41, 55–6, who characterizes this development as treason transformed into “being political.”

  12. See W.M. Hannay, “The Legislative Approach to the Political Offense Exception,” in M.C. Bassiouni (ed.), Legal Responses to International Terrorism — U.S. Procedural Aspects (Dordrecht: Nijhoff, 1988), 115, 116 n. 3.

    Google Scholar 

  13. Under this exception, the sanctuary state does not view politically motivated acts of violence as crimes. See, e.g., H.H. Almond, Jr., “The Legal Regulation of International Terrorism,” in Terrorism and Political Violence, supra, note 6, 199, 205, 208.

  14. R.A. Friedlander, supra, note 9, 53. Thus, the seeds were sown for confusion this century between acts of insurrection, rebellion, or political protest, and the idea of terror-violence.

  15. Id., 56–7. See also J. Dinse and S. Johnson, “Ideologies of Revolutionary Terrorism: Some Enduring and Emerging Themes,” in Terrorism and Political Violence, supra, note 6, 61.

  16. R.A. Friedlander, id., 58; R. Kleff, supra, note 6, 16.

  17. See C.H. Pyle, “The Political Offense Exception,” in Legal Responses to International Terrorism, supra, note 12, 181–2 n. 5; W.M. Hannay, supra, note 12, 116 n. 3.

  18. Editor's notes, Hudson, International Legislation, 7, No. 499, 862.

  19. Editorial Comment, Kuhn, “International Co-operation in the Suppression of Crime,” American Journal of International Law, 1934 (28), 541. See also Editorial Comment, Hudson, “The Proposed International Criminal Court,” American Journal of International Law, 1938 (32), 549.

    Google Scholar 

  20. For example, Article 3(e) of the Convention on Extradition, signed at Montevideo, 26 December 1933. See Editor's Notes, supra, note 18.

  21. Editorial Comment, Kuhn, supra, note 19, 544.

  22. Id., 543.

  23. Editorial Comment, Hudson, supra, note 19, 551 (citations omitted).

  24. Reprinted in Hudson, International Legislation, 7, No. 499, 862; League of Nations Official Journal, 62, January 1938, 23. Article 26(1)(2) of the Terrorist Convention provides for entry into force ninety days after the deposit of three ratifications or accessions.

  25. The convention is silent as to the purpose of the fear thus generated.

  26. A Convention for the Creation of an International Criminal Court, reprinted in Hudson, 7, No. 500, 878, supra, note 24, was opened for signature on the same day as the Terrorism Convention. Its entry into force was contingent upon that of the Terrorism Convention. Jurisdiction was optional.

  27. Terrorism Convention Article 8. Article 9 permits the non-extradition of nationals.

  28. While too numerous to list separately, the major terrorist conventions and other agreements are provided in O.Y. Elagab, International Law Documents Relating to Terrorism (London: Cavendish, 1995), many of which are discussed further in H.H. Almond, Jr., “The Legal Regulation of International Terrorism,” in Terrorism and Political Violence, supra, note 6, 199, 206–10; J.F. Murphy, supra, note 6; J.F. Murphy, “The Future of Multilateralism and Efforts to Combat International Terrorism,” Columbia Journal of Transnational Law, 1986 (25), 35.

    Google Scholar 

  29. See, e.g., R.J. Kuerbitz, “The Bombing of Harrods: Norms against Civilian Targeting,” in W.M. Reisman and A.R. Willard (eds), International Incidents (Princeton, N.J.: Princeton University Press, 1988), 238; A. Cassesse, Violence and Law in the Modern Age (Cambridge: Polity Press, 1986); M.C. Bassiouni, “Criminological Policy,” in A.E. Evans and J.F. Murphy (eds.), Legal Aspects of International Terrorism (Lexington, Mass.: D.C. Heath and Company, 1978), 523.

    Google Scholar 

  30. Article 1(4) of Protocol 1 of 1977 to the four Geneva Conventions of 1949 extends the provisions of international humanitarian law to a restrictive category of liberation conflicts. See, e.g., H.-P. Gasser, “Prohibition of Terrorist Acts in International Humanitarian Law,” International Review of the Red Cross, July–August 1986 (253), 200; R.J. Erickson, supra, note 7; V. Morris and M.-C. Bourloyannis-Vrailas, “Current Developments,” American Journal of International Law, 1996 (90), 491, 493 (reiteration by members of the 6th Committee at the 50th Session of the U.N.G.A. of controversial proposals to convene an international conference to define terrorism, and to differentiate it from the struggle of peoples for national liberation).

    Google Scholar 

  31. See, e.g., Fourth Interim Report of the I.L.A. Committee on International Terrorism, Appendix 1, Dissenting Statement by Professor L.C. Green and Dr. J. Lador-Lederer, and Y. Dinstein, “Comments on the Fourth Interim Report of the I.L.A. Committee on International Terrorism (1982),” Terrorism: An International Journal, 1984, 123, and 163, respectively.

  32. E.T.S. 90; in force 1978.

  33. See Report of the Department of State, submitted with the President's Letters of Transmittal to the U.S. Senate, reprinted in International Legal Materials, 1985 (24), 1104.

  34. These mainly concern conventional offenses within the scope of aviation and diplomatic safety, the prohibition of hostage-taking, and common crimes such as murder, property damage, and the possession of firearms.

  35. See A.D. Sofaer, “The U.S.-U.K. Supplementary Extradition Treaty,” Terrorism: An International Journal, 1986 (8), 327, 336 (“with respect to violent crimes, the political offense exception has no place in extradition treaties between stable democracies”).

    Google Scholar 

  36. For example, those concerning the safety of civil aviation. See also, J.J. Lambert, Terrorism and Hostages in International Law — A Commentary on the Hostages Convention 1979 (Cambridge: Grotius, 1990).

    Google Scholar 

  37. The text of the Draft Code that emerged on first reading proved controversial, and may be found at Yearbook of the International Law Commission, 1991 (2), 37, U.N. Doc. A/CN.4/SER.A./1991/Add.1. The U.K. has since questioned the need to continue work on the draft code given parallel work on a draft statute for an International Criminal Court. V. Morris and M.-C. Bourloyannis-Vrailas, supra, note 30, 494. The jurisdiction of the draft International Criminal Court is not linked to the draft Code. See Report of the Ad Hoc Committee on the Establishment of an International Criminal Court, UN GAOR, 50th Sess., Supp. No. 22, UN Doc. A/50/22 (1995); M.C. Bassiouni, A Draft International Criminal Code and Draft Statute for an International Criminal Tribunal (Dordrecht: Nijhhoff, 1987). Cf. supra, note 26.

  38. Dissent can be expressed through political agitation or labour disputes, for instance, and Devlin refers to labor relations in particular as the “litmus test” of state violence. R.F. Devlin, “Law's Centaurs: An Inquiry into the Nature and Relations of Law, State and Violence,” Osgoode Hall Law Journal, Summer 1989 (27), 219.

    Google Scholar 

  39. R.A. Friedlander, “Terrorism and the Law,” a research paper quoted by E. Marks, supra, note 11, 41, 54–5.

  40. See, e.g., A. Gresh, “Croisade antiterrorist,” Le Monde Diplomatique, September 1996, 1; I. Black, The Guardian, 17 December 1996, 3, reports that human rights groups fear the consequences of a U.K.-sponsored declaration in the U.N. General Assembly to deny refugee status to “terrorists.”

  41. Kleff ascribes rational decision-making to terrorists, referring to the use of terrorism as “an organization decision” in the sense of organizational behavior. R. Kleff, supra, note 6, 21. Perhaps this point supports an analogy between terrorist organizational decision-making and “white-collar” criminal conspiracy.

  42. See, e.g., Sec. 1003 of title 18 U.S.C. (Public Law 102–572), discussed at International Legal Materials, 1993 (32), 602, and infra, note 59 and accompanying text.

  43. See, e.g., M.W. Levine, “Cuban Hijackers and the United States: The Need for a Modified Aut Dedere Aut Judicare Rule,” Columbia Journal of Transnational Law, 1994 (32), 133; C. Reed, “US laughs at the one about the Irishman and the Englishmen,” The Observer, 10 October 1993, 20.

    Google Scholar 

  44. The principle of “dual criminality” refers to the arrangement whereby extradition should only be granted if the act the fugitive is sought for is an extraditable crime according to the law of both requesting, and requested, states. See M.C. Bassiouni and V.P. Nanda, A Treatise on International Criminal Law, Vol. II (Jurisdiction and Co-operation) (Springfield, Ill.: Thomas, 1973), 313–4.

    Google Scholar 

  45. R.A. Friedlander, supra, note 9, 54.

  46. See generally A. George (ed.), Western State Terrorism (Cambridge: Polity Press, 1991). For example, problems arose over the meaning of the principle of dual criminality in relations between socialist and non-socialist states, leading one socialist commentator to denounce the principle as “a test of bourgeois-capitalist conceptions.” M.C. Bassiouni and V.P. Nanda, supra, note 44, 313 n. 18.

    Google Scholar 

  47. Supra, note 1.

  48. See C.H. Pyle, supra, note 17.

  49. J. Dinse and S. Johnson, supra, note 15, 65.

  50. Id.

  51. See, e.g., “The Poverty of Aid,” The New Internationalist, November 1996 (285); D. Bigo, “L'archipel des polices,” Le Monde Diplomatique, October 1996, 9; K. Tomasevski, Development Aid and Human Rights Revisited (London: Pinter Publishers, 1993); M. Lippman, “Multinational Corporations and Human Rights,” in G.W. Shepherd, Jr., and V.P. Nanda (eds.), Human Rights and Third World Development (Westport: Greenwood, 1985), 249.

  52. See, e.g., “Seduced by Technology,” The New Internationalist, December 1996 (286); N. Cummings-Bruce, “Muslim killers bite the hand that trained them,” The Observer, 28 May 1995, 16 (Phillipine terrorists look to their Middle East backers and mentors); infra, notes 75–88.

  53. Supra, note 4.

  54. See, e.g., S. Raffy and A. Gerlach, “Carlos et l'Armée rouge du crime,” Le Nouvel Observateur, 2–8 August 1990, 10.

  55. See, e.g., “Les ghettos de Belfast,” Le Bouleversement du Monde, Manière de Voir, February 1995 (25), 83; B. Robertson, “Military Intervention in Civil Disturbance in Great Britain — What is the Legal Basis?,” Revue de Droit Militaire et de Droit de la Guèrre, 1990 (XXIX-1-2), 307; H. Jackson and A. McHardy, “The Two Irelands — the Problem of the Double Minority,” Minority Rights Group, 3d ed. 1984 (Report No. 2).

  56. See, e.g., B. Dayanin, “The Israeli Supreme Court and the Deportations of Palestinians,” Stanford Journal of International Law, 1994 (30), 115; “Common Agenda for the Bilateral Peace Negotiations, initialed at Washington [September 14, 1993],” reprinted in International Legal Materials, 1993 (32), 1522; R. Shehadeh, Occupier's Law — Israel and the West Bank (Washington: Institute for Palestine Studies, 2nd ed. 1988).

    Google Scholar 

  57. See J. Meek, “Chechen rebels rejoice in freedom,” The Guardian, 25 November 1996, 8.

  58. Cf. the purportedly “anti-communist” rationale of the Nato-backed West European secret paramilitary network “Gladio,” and the Swiss network “P26.” See R. Norton-Taylor, “The Gladio file: did fear of communism throw West into the arms of terrorists?,” D. Pallister, “How M16 and SAS joined in,” and E. Vulliamy, “Secret agents, freemasons, fascists ... and a top-level campaign of political ‘destabilisation’,” The Guardian, 5 December 1990, 5.

  59. Sec. 1003 of title 18 U.S.C., supra, note 42, provides civil remedies in U.S. Federal Courts for victims of international terrorism. Cf. the official 1984 United States Code definition of an act of terrorism, discussed by N. Chomsky, Pirates and Emperors (Montréal: Black Rose Books, 1991), 177, which omits the third requirement.

  60. See supra, note 58.

  61. R.A. Friedlander, supra, note 9, 54. Cf. E. Marks, supra, note 11.

  62. See J.G. Merquior, Foucault (London: Fontana Press, 1985), 92, who links the indicated phraseology into what Foucault terms the attributes of “carceral society.”

    Google Scholar 

  63. See, e.g., P.M. Twomey, “Denying Terrorists the Oxygen of Publicity: Broadcasting Restrictions in the UK and the Republic of Ireland,” paper delivered at the W. G. Hart Legal Workshop 1994 Understanding Human Rights (London: I.A.L.S.), 5 July 1994. Chomsky terms this “the totalitarian discipline deemed appropriate within the (antiterrorist) propaganda system.” N. Chomsky, supra, note 59, 86.

  64. See M.C. Bassiouni, supra, note 29, 530; Y. Alexander, “Introduction,” in Y. Alexander (ed.), International Terrorism (New York: Praeger, 1976), xi, xiv.

  65. See, e.g., Report of the I.L.A.'s 62nd Conference (Seoul): Legal Problems of Extradition in Relation to Terrorist Offences, Draft Articles on Extradition in Relation to Terrorist Offences, 1986, 559.

  66. B.H. Miller, “Terrorism and Language: A Text-Based Analysis of the German Case,” Terrorism: An International Journal, 1984 (9), 373.

    Google Scholar 

  67. Supra, note 38.

  68. Id., 220.

  69. A. Giddens, The Consequences of Modernity (Cambridge: Polity Press, 1990), 54.

    Google Scholar 

  70. Id., 33.

  71. See, e.g., P. Rowe, Defence: The Legal Implications: Military Law and the Laws of War (London: Brassey's Defence, 1987), 38–68.

    Google Scholar 

  72. R. Falk, “The Terrorist Foundations of Recent U.S. Foreign Policy,” in Western State Terrorism, supra, note 46, 102, 106.

  73. See, e.g., J. Verhaegen, “Legal Obstacles to Prosecution of Breaches of Humanitarian Law,” International Review of the Red Cross, November–December 1987 (261), 607.

    Google Scholar 

  74. Supra, note 69, 6. See also N. Chomsky, supra, note 59, 21.

  75. Supra, note 1.

  76. Supra, note 62, 94. See also T. Friedman, “Turning swords into beef-burgers,” The Guardian, 19 December 1996, 17 (“no two countries that both have a McDonald's have ever fought a war against each other).

  77. Supra, note 69, 57–8. See also G. Pitt, “Rights and Embloyee Rights — the Case of Free Speech,” in C. Gearty and A. Tomkins (eds.), Understanding Human Rights (London: Mansell, 1996), 380.

    Google Scholar 

  78. A. Giddens, id., 59–60. Giddens remarks further that “h. there are direct relations between military power and industrialism, one main expression of which is the industrialisation of war.” Id., 60.

  79. Supra, note 39.

  80. See generally Le Monde Diplomatique, August 1996. See also R. Kleff, supra, note 6, 14, who uses the term “authentic terrorism” in order to contrast the inherent political nature of terrorism with pure criminal activity.

  81. See, e.g., E. Galeano, “Guèrre aux Pauvres,” Le Monde Diplomatique, id., 6 (“(l)e néolibéralisme réduit les droits des citoyens à de simples faveurs du pouvoir”).

  82. See supra, note 69, 29–36.

  83. S. Sloan, “State-Organized Terrorism: The Privatization of Public Violence,” in Terrorism and Political Violence, supra, note 6, 129, 140.

  84. See, e.g., M. Henderson, “How I became a dangerous terrorist,” The Guardian, 19 December 1996, 17 (author “bugged” after terrorist suspect caught reading her book); H. Young, “Contemptible fallout of Blair's power bid,” The Guardian, 28 November 1996, 25 (Labour party fails to back House of Lords opposition to Clause 89 of the draft Police Bill); J. Wadham, “Reflections on Recent Cases in Strasbourg: Recent and Forthcoming Legislation in the UK,” paper delivered at the W.G. Hart Workshop, supra, note 63, 7 July 1994.

  85. Supra, note 83, 129, 134. Cf. A. Gewirth, Human Rights: Essays on Justification and Applications (London: The University of Chicago Press Ltd., 1982), 63.

    Google Scholar 

  86. Sloan takes note of information systems such as disposable computer banks and data bases. S. Sloan, id., 141. See, e.g., N.J. Sales, “Pynchon's coming home,” The Guardian Friday Review, 6 December 1996, 2 (open-access online data service combines telephone and credit card numbers to reveal author's “secret” address in New York). Cf. D. Gow and R. Norton-Taylor, “Surfing superhighwaymen,” The Guardian 7 December 1996, 28 (nearly $10 million of Citibank accounts transfered by hackers).

  87. See also B. Thompson, “Digital Footprints” (“(m)aking the Internet easier to use also compromises privacy”), and P. Wainewright, “Tales from beyond the encrypt,” The Guardian Online, 21 November 1996, 4 and 6, respectively.

  88. See N. Chomsky, supra, note 59, 175.

  89. Supra, note 5.

  90. Supra, note 30, and see E. Chadwick, Self-Determination, Terrorism, and the International Humanitarian Law of Armed Conflict (The Hague, Nijhoff, 1996); J.T. Burchael, “Framing a Moral Response to Terrorism,” in C.W. Kegley, Jr. (ed.), International Terrorism (New York: St. Martin's Press, 1990), 213 (terrorism raises “new questions about all the old forms of war”).

    Google Scholar 

  91. N. Chomsky, supra, note 59, 194.

  92. Supra, notes 7 and 79. This presumably extends to “internal security” arrangements.

  93. N. Chomsky, supra, note 59, 89.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chadwick, E. Terrorism and the law: Historical contexts, contemporary dilemmas, and the end(s) of democracy. Crime Law Soc Change 26, 329–350 (1996). https://doi.org/10.1007/BF00138900

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00138900

Keywords

Navigation