E-Book, Englisch, 553 Seiten
Wade / Maljevic A War on Terror?
1. Auflage 2009
ISBN: 978-0-387-89291-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
The European Stance on a New Threat, Changing Laws and Human Rights Implications
E-Book, Englisch, 553 Seiten
ISBN: 978-0-387-89291-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Marianne Wade and Almir Maljevi? Although the worries about terrorism paled in comparison to the economic crisis as a topic during the last US election, one can find plenty of grounds to assume that they remain issue number one in the minds of politicians in Europe. As the German houses of Parliament prepare to call in the mediation committee in the discussion of legislation which would provide the Federal Police - thus far mandated purely with the post-facto investigation of crime - with powers to act to prevent acts of terrorism, Spain's struggle with ETA and the British Government licks its wounds after a resounding defeat of its latest anti-terrorist proposals by the House of Lords, one cannot but wonder whether post 9/11, the Europeans are not even more concerned with terrorism than their US counterparts. A look at media reports, legislative and judicial activities in either Britain or Germany clearly underlines that those two countries are deeply embroiled in anti-terrorist activity. Can it be that Europe is embroiled in the 'War on Terror'; constantly providing for new arms in this conflict? Or is it a refusal to participate in the 'War on Terror' that fuels a constant need for Parliaments to grapple with the subject; begrudgingly conceding one increasingly draconian measure after the other? The question as to where Europe stands in the 'War on Terror' is a fascinating one, but one, which is difficult to answer.
Autoren/Hrsg.
Weitere Infos & Material
1;Wade_FM.pdf;1
1.1;Anchor 1;8
2;Wade_Introduction.pdf;13
3;Wade_Ch01.pdf;23
3.1;Chapter 1;24
3.1.1;International Terrorism – German Police Perspective: The Current Threat Environment and Counterstrategies from the German Pol;24
3.1.1.1;1.1 Introduction;24
3.1.1.2;1.2 Early Role of the Bundeskriminalamt, Germany’s Federal Criminal Police Office;26
3.1.1.3;1.3 General Threat Situation;27
3.1.1.3.1;1.3.1 Overall Situation;27
3.1.1.3.2;1.3.2 Germany;28
3.1.1.4;1.4 Phenomenology;31
3.1.1.4.1;1.4.1 Perpetrators and Organizational Structure;31
3.1.1.4.2;1.4.2 Offence Profile;33
3.1.1.4.2.1;1.4.2.1 Targets for Attacks;33
3.1.1.4.2.2;1.4.2.2 Importance of the Modern Media;33
3.1.1.4.2.3;1.4.2.3 Logistic and Financial Structures;34
3.1.1.4.3;1.4.3 Motivation;35
3.1.1.5;1.5 Suppression Approaches;36
3.1.1.5.1;1.5.1 Statutory Measures;36
3.1.1.5.2;1.5.2 Criminal Prosecution;39
3.1.1.5.3;1.5.3 Prevention;40
3.1.1.5.4;1.5.4 Freedom and Security;41
3.1.1.5.5;1.5.5 Investigative Measures;42
3.1.1.5.6;1.5.6 New Security Architecture;44
3.1.1.5.6.1;1.5.6.1 Gemeinsames Terrorismusabwehrzentrum;44
3.1.1.5.6.2;1.5.6.2 Anti-Terror-Datei;46
3.1.1.5.6.3;1.5.6.3 Gemeinsames Internetzentrum;47
3.1.1.5.6.4;1.5.6.4 Gemeinsames Analyse- und Strategiezentrum Illegale Migration;47
3.1.1.5.6.5;1.5.6.5 Dialogue with Muslims;48
3.1.1.5.6.6;1.5.6.6 Federation-State Project Group;49
3.1.1.5.6.7;1.5.6.7 Co-operation with the Business Sector;50
3.1.1.5.7;1.5.7 Early Detection;50
3.1.1.5.8;1.5.8 Source Country Strategy;51
3.1.1.6;1.6 Research;53
3.1.1.6.1;1.6.1 Forschungsstelle Terrorismus/Extremismus;53
3.1.1.6.2;1.6.2 Research Programmes;56
3.1.1.6.2.1;1.6.2.1 European Level;56
3.1.1.6.2.2;1.6.2.2 National Level;57
3.1.1.7;1.7 Conclusions;58
3.1.2;References;60
4;Wade_Ch02.pdf;62
4.1;Chapter 2;62
4.1.1;Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet;62
4.1.1.1;2.1 Introduction;62
4.1.1.2;2.2 Attacks via the Internet;63
4.1.1.2.1;2.2.1 Motivation;63
4.1.1.2.1.1;2.2.1.1 General Motivation;64
4.1.1.2.1.1.1;Location Independence;64
4.1.1.2.1.1.2;Speed;64
4.1.1.2.1.1.3;Anonymity;65
4.1.1.2.1.1.4;Internationality;65
4.1.1.2.1.1.5;Cost-Benefit Ratio;66
4.1.1.2.1.2;Specific Terrorist Motivation;67
4.1.1.2.2;2.2.2 Attacks;67
4.1.1.2.2.1;2.2.2.1 Attacks Aimed at Other IT Systems;68
4.1.1.2.2.1.1;Illegal Access (“Hacking”);68
4.1.1.2.2.1.2;Data Alteration;70
4.1.1.2.2.1.2.1;Defacements;70
4.1.1.2.2.1.2.2;Other Forms of Data Alteration;71
4.1.1.2.2.1.3;Data Espionage;71
4.1.1.2.2.1.4;Denial-of-Service Attacks;73
4.1.1.2.2.1.5;Conventional Attacks on IT Infrastructure;74
4.1.1.2.2.1.6;Hybrid Attacks;75
4.1.1.2.2.2;2.2.2.2 Attacks Against Human Lives;76
4.1.1.2.2.2.1;Technical Background;76
4.1.1.2.2.2.2;Attacks with an Immediate Outcome;77
4.1.1.2.2.2.2.1;Attacks on Hydroelectric Dams;77
4.1.1.2.2.2.2.2;Attacks on Traffic Control Systems;78
4.1.1.2.2.2.2.3;Attacks on Power Plants;78
4.1.1.2.2.2.3;Attacks with a Long-Term Effect;79
4.1.1.2.3;2.2.3 Risk Assessment;79
4.1.1.3;2.3 Dissemination of Terrorist Contents;81
4.1.1.3.1;2.3.1 Terrorist Websites;81
4.1.1.3.2;2.3.2 Threats and Propaganda;82
4.1.1.3.3;2.3.3 Financing;83
4.1.1.4;2.4 Conventional Use of the Internet;84
4.1.1.4.1;2.4.1 Individual Communication;84
4.1.1.4.2;2.4.2 Planning and Supporting;85
4.1.1.5;2.5 Conclusions;86
4.1.2;References;87
5;Wade_Ch03.pdf;90
5.1;Chapter 3;91
5.1.1;The Role of the United Nations in the Prevention and Repression of International Terrorism;91
5.1.1.1;3.1 Introduction;91
5.1.1.2;3.2 Early International Action against Terrorism;92
5.1.1.2.1;3.2.1 The League of Nations Conventions;92
5.1.1.2.2;3.2.2 Early UN Initiative Against Terrorism;94
5.1.1.3;3.3 More Recent Developments;96
5.1.1.3.1;3.3.1 Post-Cold War Consensus;96
5.1.1.3.2;3.3.2 Resolution 1267, the Al Qaida and Taliban Sanctions Committee and the Consolidated List;98
5.1.1.3.3;3.3.3 Resolution 1373 and the Counter-Terrorism Committee;103
5.1.1.3.3.1;3.3.3.1 The Aftermath of the Attacks of 11 September 2001;103
5.1.1.3.3.2;3.3.3.2 Resolution 1373: General and Contextual Aspects;103
5.1.1.3.3.3;3.3.3.3 Resolution 1373: Substantive Aspects;105
5.1.1.3.3.4;3.3.3.4 Counter-Terrorism Committee;106
5.1.1.3.4;3.3.4 The UN’s Office on Drugs and Crime and the Terrorism Prevention Branch;108
5.1.1.3.5;3.3.5 The Global Counter-Terrorism Strategy;109
5.1.1.3.6;3.3.6 The Comprehensive Convention and the Elusive Definition of Terrorism;110
5.1.1.3.7;3.3.7 Human Rights;112
5.1.1.4;3.4 Conclusion;114
5.1.1.5;3.5 Annex II;115
5.1.2;References;116
6;Wade_Ch04.pdf;117
6.1;Chapter 4;117
6.1.1;The European Union as an Actor in the Fight Against Terrorism;117
6.1.1.1;4.1 Introduction;117
6.1.1.2;4.2 Structure of the European Union;119
6.1.1.3;4.3 Foundations for the EU’s Counter-Terrorism Response;122
6.1.1.3.1;4.3.1 Fighting Terrorism as a Cross-Pillar Task;122
6.1.1.3.2;4.3.2 The Example of “Cross-Pillarisation”: EU Blacklisting and Freezing Assets of Terrorists;126
6.1.1.4;4.4 The EU’s Counter-Terrorism Arsenal;128
6.1.1.4.1;4.4.1 The Political Acquis Anti-terrorisme, in Particular, the EU’s Counter-Terrorism Strategy and Action Plan;129
6.1.1.4.2;4.4.2 The Legal Acquis Anti-terrorisme;132
6.1.1.4.2.1;4.4.2.1 Harmonisation of Substantive Criminal Law;132
6.1.1.4.2.2;4.4.2.2 Judicial Cooperation in Criminal Matters;136
6.1.1.4.2.3;4.4.2.3 Financing of Terrorism;139
6.1.1.4.2.4;4.4.2.4 Data Retention;142
6.1.1.4.2.5;4.4.2.5 Illegal Migration and Border Controls;144
6.1.1.4.2.6;4.4.2.6 Transport Security;146
6.1.1.4.3;4.4.3 Operational Acquis Anti-terrorisme;147
6.1.1.4.3.1;4.4.3.1 Operational Interaction Through Joint Investigation Teams;148
6.1.1.4.3.2;4.4.3.2 Excessive Exchange of Law Enforcement Information;148
6.1.1.4.3.3;4.4.3.3 Harnessing Central Databases for the Fight Against Terrorism;150
6.1.1.4.4;4.4.4 Institutional Acquis Anti-terrorisme;152
6.1.1.4.4.1;4.4.4.1 A Broker for Police Information and Intelligence on the Terrorism Threat: The Expansion of Europol;153
6.1.1.4.4.2;4.4.4.2 The Judicial Hub for Terrorist Prosecutions: The Emergence of Eurojust;157
6.1.1.4.4.3;4.4.4.3 Integrated Border Control and Terrorism: The Establishment of Frontex;159
6.1.1.4.4.4;4.4.4.4 Guiding Multilateral Police Operations: The Development of the European Police Chiefs Task Force;160
6.1.1.4.4.5;4.4.4.5 Pooling Intelligence: The EU Joint Situation Center (SitCen);162
6.1.1.4.4.6;4.4.4.6 The Watchdog for Implementing EU Anti-terrorism Measures: The EU Counter-Terrorism Coordinator;164
6.1.1.4.5;4.4.5 External Acquis Anti-terrorisme;165
6.1.1.4.5.1;4.4.5.1 EU–US Relations as an Example for the External Dimension of Justice and Home Affairs;165
6.1.1.4.5.2;4.4.5.2 Anti-terrorism Foreign Policy with the Means of the Second and First Pillars;168
6.1.1.5;4.5 Concluding Remarks and Perspectives;169
6.1.2;References;174
7;Wade_Ch05.pdf;181
7.1;Chapter 5;181
7.1.1;Instruments of International Law: Against Terrorist Use of the Internet;181
7.1.1.1;5.1 Introduction;181
7.1.1.1.1;5.1.1 The Need for International Cooperation Against Cyberterrorism and Other Uses of the Internet for Terrorist Purposes;181
7.1.1.1.2;5.1.2 Aim, Method, and Structure of this Analysis;183
7.1.1.2;5.2 Developing and Harmonizing National Substantive Criminal Law;183
7.1.1.2.1;5.2.1 Destructive Attacks Carried Out by Means of the Internet;184
7.1.1.2.1.1;5.2.1.1 Structural Analysis of the Relevant Attacks With Respect to the Existing Legal Framework;184
7.1.1.2.1.2;5.2.1.2 Analysis of the Relevant Instruments;186
7.1.1.2.1.2.1;Computer-Specific Instruments;186
7.1.1.2.1.2.1.1;CoE Convention on Cybercrime of 2001;186
7.1.1.2.1.2.1.2;EU Council Framework Decision on Attacks Against Information Systems of 2005;187
7.1.1.2.1.2.2;Terrorism-Specific Instruments;187
7.1.1.2.1.2.2.1;EU Council Framework Decision on Combating Terrorism of 2002/2008;187
7.1.1.2.1.2.2.2;UN Conventions and Protocols Against Specific Acts of Terrorism of 1970 et seq;189
7.1.1.2.1.3;5.2.1.3 Summary, Evaluation, and Consequences of Legal Policy;191
7.1.1.2.1.3.1;General Evaluation;191
7.1.1.2.1.3.2;Pros and Cons of an Additional Infrastructure Offence;191
7.1.1.2.1.3.3;Insufficient Signing, Ratification, and Implementation of the Cybercrime Convention;193
7.1.1.2.2;5.2.2 Dissemination of Illegal Content;193
7.1.1.2.2.1;5.2.2.1 Structural Analysis of the Phenomena With Respect to the Legal Framework;193
7.1.1.2.2.2;5.2.2.2 Threatening to Commit Terrorist Offences;195
7.1.1.2.2.2.1;UN Conventions and Protocols Against Specific Acts of Terrorism of 1970 et seq;195
7.1.1.2.2.2.2;EU Council Framework Decision on Combating Terrorism of 2002/2008;196
7.1.1.2.2.3;5.2.2.3 Incitement, Recruitment, and Training for Terrorism;197
7.1.1.2.2.3.1;CoE Convention on the Prevention of Terrorism of 2005;197
7.1.1.2.2.3.2;EU Council Framework Decision on Combating Terrorism of 2002/2008;197
7.1.1.2.2.3.3;UN Security Council Resolution 1624 of 2005;198
7.1.1.2.2.4;5.2.2.4 Fundraising for and Financing of Terrorism;198
7.1.1.2.2.5;5.2.2.5 Dissemination of Racist and Xenophobic Material;199
7.1.1.2.2.5.1;Additional Protocol to the CoE Convention on Cybercrime of 2003;199
7.1.1.2.2.5.2;European Union Council Framework Decision on Combating Racism and Xenophobia of 2008;200
7.1.1.2.2.6;5.2.2.6 Liability of the Media and of Internet Providers;201
7.1.1.2.2.6.1;The Media;201
7.1.1.2.2.6.2;Internet Providers;202
7.1.1.2.2.7;5.2.2.7 Summary, Evaluation, and Consequences of Legal Policy;204
7.1.1.2.2.7.1;General Evaluation;204
7.1.1.2.2.7.2;Gaps With Respect to Threatening to Commit Terrorist Offences;205
7.1.1.2.2.7.3;Lack of Specific Regulations Regarding Responsibility of Internet Providers;206
7.1.1.2.2.7.4;Insufficient Signing, Ratification, and Implementation of the Convention on the Prevention of Terrorism;207
7.1.1.2.3;5.2.3 Use of the Internet for Other Purposes;208
7.1.1.2.3.1;5.2.3.1 Relevant Phenomena;208
7.1.1.2.3.2;5.2.3.2 Analysis of Relevant Conventions;208
7.1.1.2.3.3;5.2.3.3 Summary and Evaluation;209
7.1.1.3;5.3 Developing and Harmonizing National Criminal Procedure and Preventive Measures;210
7.1.1.3.1;5.3.1 Computer-Specific Investigations;211
7.1.1.3.1.1;CoE Convention on Cybercrime of 2001;211
7.1.1.3.1.2;EC Directive on Data Retention of 2006;212
7.1.1.3.2;5.3.2 Financial Investigations;213
7.1.1.3.3;5.3.3 Terrorist-Specific Investigations;214
7.1.1.3.4;5.3.4 Evaluation and Consequences for Legal Policy;215
7.1.1.3.4.1;5.3.4.1 General Evaluation;215
7.1.1.3.4.2;5.3.4.2 Checking the Contemporariness of the Cybercrime Convention;215
7.1.1.3.4.3;5.3.4.3 Preventive Procedures with Respect to Illegal Content;216
7.1.1.4;5.4 Improving International Cooperation;217
7.1.1.4.1;5.4.1 Cooperation in Computer-Specific Cases;217
7.1.1.4.1.1;CoE Cybercrime Convention of 2001;217
7.1.1.4.1.2;EU Council Framework Decision on Attacks against Information Systems of 2005;219
7.1.1.4.2;5.4.2 Cooperation in Cases of Money Laundering and the Financing of Terrorism;219
7.1.1.4.3;5.4.3 Cooperation in Terrorist Cases;220
7.1.1.4.4;5.4.4 Cooperation in General Cases;221
7.1.1.4.5;5.4.5 Evaluation and Consequences for Legal Policy;222
7.1.1.4.5.1;5.4.5.1 General Evaluation;222
7.1.1.4.5.2;5.4.5.2 Political Offence Exception Clause;222
7.1.1.4.5.3;5.4.5.3 Specific Cooperation With Respect to the Prevention of Illegal Content;223
7.1.1.5;5.5 Summary;223
7.1.1.5.1;5.5.1 Use of the Internet for Terrorist Purposes;223
7.1.1.5.2;5.5.2 Applicability of Existing Conventions;224
7.1.1.5.3;5.5.3 General Problems of Existing Conventions;225
7.1.1.5.4;5.5.4 New Efforts With Respect to Illegal Content;226
7.1.2;References;227
8;Wade_Ch06.pdf;230
8.1;Chapter 6;230
8.1.1;Victims of Terrorism Policies: Should Victims of Terrorism Be Treated Differently?1;230
8.1.1.1;6.1 Introduction: Anti-Terrorism Policies and the Victim;230
8.1.1.1.1;6.1.1 Key Issues;230
8.1.1.1.2;6.1.2 Terrorism: Post-9/11 Legislation and the Victim;231
8.1.1.2;6.2 European Developments in the Field of Support of Victims of Terrorism;232
8.1.1.2.1;6.2.1 The Council of Europe and Victims of Terrorism;232
8.1.1.2.2;6.2.2 European Union;235
8.1.1.2.3;6.2.3 Experiences with Victim of Terrorism Compensation and Support Outside Europe;239
8.1.1.2.3.1;6.2.3.1 Victim of Terrorism Legislation in the USA;239
8.1.1.2.3.2;6.2.3.2 Israel;242
8.1.1.3;6.3 Varying Models and Practices of Compensation of Victims of Violence and Victims of Terrorism Across Europe;243
8.1.1.4;6.4 What Is Particular to the Compensation of Victims of Terrorism?;245
8.1.1.5;6.5 Conclusions;249
9;Wade_Ch07.pdf;251
9.1;Chapter 7;252
9.1.1;Anti-Terrorism Related Criminal Law Reforms and Human Rights in Slovenia;252
9.1.1.1;7.1 Introduction;252
9.1.1.2;7.2 Substantive Criminal Law in Force;254
9.1.1.2.1;7.2.1 Introductory Words;254
9.1.1.2.2;7.2.2 Incriminations on Terrorism;255
9.1.1.2.3;7.2.3 Participation in Terrorist Criminal Acts;258
9.1.1.2.4;7.2.4 Phases of the Criminal Act;260
9.1.1.2.5;7.2.5 Criminal Responsibility;261
9.1.1.2.6;7.2.6 Liability of Legal Persons;261
9.1.1.3;7.3 Criminal Procedural Law;262
9.1.1.4;7.4 Conclusion;264
9.1.2;References;265
10;Wade_Ch08.pdf;267
10.1;Chapter 8;267
10.1.1;Extraordinary Renditions – Shadow Proceedings,Human Rights, and “the Algerian six”:The War on Terror in Bosnia and Herzegovina;267
10.1.1.1;8.1 Introduction;267
10.1.1.2;8.2 The “Algerian six” Case5 Unfolds;269
10.1.1.3;8.3 The “Algerian six” and the European Conventionon Human Rights;273
10.1.1.3.1;8.3.1 The Algerian six and the Right not to Be ArbitrarilyExpelled;273
10.1.1.3.2;8.3.2 The Algerian six and the Right to Liberty and Securityof Persons;275
10.1.1.3.3;8.3.3 The Algerian six and the Right not to Be Subjectedto the Death Penalty;278
10.1.1.4;8.4 Concluding Remarks;279
10.1.1.5;References;280
11;Wade_Ch09.pdf;282
11.1;Chapter 9;282
11.1.1;Terrorist Attacks: Criminal Prosecution or National Defence?;282
11.1.1.1;9.1 Introduction;282
11.1.1.2;9.2 Averting Danger or State of Defence?;284
11.1.1.3;9.3 A Policy on Crime or Armament?;288
11.1.1.4;9.4 Enemy or Criminal?;293
11.1.1.5;9.5 War or Raid?;296
11.1.1.6;9.6 Rigourism or a Sense of Proportion?;299
11.1.1.7;9.7 Final Remarks;306
11.1.2;References;307
12;Wade_Ch10.pdf;309
12.1;Chapter 10;309
12.1.1;The Evolution of the Antiterror Legal and Institutional Framework in Croatia;309
12.1.1.1;10.1 Introduction;309
12.1.1.2;10.2 A Brief Overview of the Croatian Antiterrorism Legal Framework: Relevant Substantive and Procedural Criminal Law Provisi;312
12.1.1.3;10.3 Public Provocation to Commit a Criminal Offence (Art. 5 of the CECPT) and Croatian Substantive Criminal Law;317
12.1.1.4;10.4 Conclusion;321
12.1.2;References;323
13;Wade_Ch11.pdf;325
13.1;Chapter 11;325
13.1.1;Muslims Communities and Counterterrorism: The Dynamics of Exclusion and Possibilities of Inclusion;325
13.1.1.1;11.1 Introduction;325
13.1.1.2;11.2 Diversity of the Muslims in the UK;326
13.1.1.3;11.3 Social Marginalisation and Exclusion;331
13.1.1.4;11.4 Impact of Socio-Economic Factors and Government Policy;335
13.1.1.5;11.5 Engaging Communities;337
13.1.1.6;11.6 The Reinforcing Perceptions of a Muslim Threat;340
13.1.1.7;11.7 The Effect of New Laws;341
13.1.1.8;11.8 Conclusion: From Exclusion to Inclusion?;346
13.1.2;References;346
14;Wade_Ch12.pdf;350
14.1;Chapter 12;351
14.1.1;Control Orders: Borders to the Freedom of Movement or Moving the Borders of Freedom?;351
14.1.1.1;12.1 Background to the United Kingdom’s Control Order System;351
14.1.1.1.1;12.1.1 The United Kingdom’s Anti-terrorism Legislation;351
14.1.1.1.2;12.1.2 Indefinite Detention Without Trial;352
14.1.1.2;12.2 The Outset of the Control Order System;354
14.1.1.2.1;12.2.1 Non-derogating Control Orders and Derogating Control Orders;356
14.1.1.2.2;12.2.2 Possible Obligations and Restrictions;358
14.1.1.2.3;12.2.3 Duration of Control Orders;359
14.1.1.2.4;12.2.4 Procedure;360
14.1.1.2.5;12.2.5 Court Supervision of Control Orders;362
14.1.1.3;12.3 Control Orders on Trial;363
14.1.1.3.1;12.3.1 Control Orders and the Right to Liberty;363
14.1.1.3.2;12.3.2 The Right to a Fair Trial;367
14.1.1.3.3;12.3.3 Control Orders as a Measure of Last Resort?;371
14.1.1.4;12.4 Consequences for the Right to Liberty and Concluding Remarks;372
14.1.2;References;373
15;Wade_Ch13.pdf;375
15.1;Chapter 13;375
15.1.1;Telephone-Tap Evidence and Administrative Detention in the UK;375
15.1.1.1;13.1 Introduction;375
15.1.1.1.1;13.1.1 The Ban: Ancient or Modern?;376
15.1.1.1.2;13.1.2 The History of Interceptions in the UK;377
15.1.1.1.3;13.1.3 The Malone Case, and the Creation of the Statutory Ban;382
15.1.1.1.4;13.1.4 The Scope of the Ban;385
15.1.1.1.5;13.1.5 The Arguments For and Against the Ban;391
15.1.1.1.6;13.1.6 Terrorism, and Pressure to Remove the Ban;396
15.1.2;References;402
16;Wade_Ch14.pdf;403
16.1;Chapter 14;403
16.1.1;Fighting Terrorism – the Unprincipled Approach: the UK, the War on Terror and Criminal Law;403
16.1.1.1;14.1 The Aim of Criminal Proceedings in England and Wales;405
16.1.1.2;14.2 Challenging the Fundamentals of Criminal Law;406
16.1.1.2.1;14.2.1 Substantive Criminal Law and Criminal Procedure;407
16.1.1.2.2;14.2.2 Detention;409
16.1.1.2.3;14.2.3 Policing the Streets;413
16.1.1.2.4;14.2.4 The Interaction of Substantive and Procedural Law;414
16.1.1.2.5;14.2.5 The Broader Context;416
16.1.1.3;14.3 Substituting Criminal Law;417
16.1.1.3.1;14.3.1 Anti-Terrorist Policy Within the Broader Trend;424
16.1.1.4;14.4 Conclusion;426
16.1.2;References;427
17;Wade_Ch15.pdf;430
17.1;Chapter 15;430
17.1.1;Balancing Liberty and Security? A Legal Analysis of UK Anti-Terrorist Legislation1;430
17.1.1.1;15.1 Extended Powers of Pre-Trial Detention;435
17.1.1.2;15.2 “Special Advocates” and SIAC;436
17.1.1.3;15.3 The Role of the Judiciary36;437
17.1.2;References;442
18;Wade_Ch16.pdf;444
18.1;Chapter 16;444
18.1.1;Limiting Fundamental Rights in the Fight Against Terrorism in Spain;444
18.1.1.1;16.1 Introduction;444
18.1.1.2;16.2 Section 55.2 of the Spanish Constitution;445
18.1.1.3;16.3 The Fundamental Right to Freedom;448
18.1.1.3.1;16.3.1 Extending the Time Limit for Preventive Arrest;449
18.1.1.3.2;16.3.2 Incommunicado (Isolation) Detention;450
18.1.1.4;16.4 The Right to the Inviolability of the Home;454
18.1.1.5;16.5 The Right to Secrecy of Communications;456
18.1.1.6;16.6 The Right to Defence;459
18.1.1.7;16.7 The Right to the Ordinary Judge Predetermined by Law;461
18.1.1.8;16.8 The Ultimate Guarantee: The Right to Be Presumed Innocent;463
18.1.1.9;16.9 Conclusion;465
18.1.2;References;466
19;Wade_Ch17.pdf;468
19.1;Chapter 17;468
19.1.1;The Fight Against Terrorism and Human Rights: The French Perspective;468
19.1.1.1;17.1 Introduction;468
19.1.1.2;17.2 The Achieved Conciliation Between Counterterrorism and Human Rights: Keeping the Fight Against Terrorism within the Fram;470
19.1.1.2.1;17.2.1 The Coordination of Counterterrorism;471
19.1.1.2.1.1;17.2.1.1 Centralisation;471
19.1.1.2.1.2;17.2.1.2 Integration;472
19.1.1.2.2;17.2.2 Specialisation;474
19.1.1.2.2.1;17.2.2.1 Terrorist Offences;475
19.1.1.2.2.2;17.2.2.2 The Enforcement Apparatus;476
19.1.1.3;17.3 Weaknesses of the French Antiterrorism Framework: The Protection of Fundamental Rights and Civil Liberties;485
19.1.1.3.1;17.3.1 Arrogance of the Executive Bodies;486
19.1.1.3.1.1;17.3.1.1 The Fight Against Terrorism as a Pretext to Increase Police Powers;486
19.1.1.3.1.2;17.3.1.2 Police Forces’ Resistance to External Independent Controls;489
19.1.1.3.2;17.3.2 Deficiencies of Control Institutions;492
19.1.1.3.2.1;17.3.2.1 The Lowering of the Constitutionality Control;492
19.1.1.3.2.2;17.3.2.2 Lowering of Judicial Control;496
19.1.2;References;501
20;Wade_Ch18.pdf;505
20.1;Chapter 18;505
20.1.1;The Secret Service’s Influence on Criminal Proceedings;505
20.1.1.1;18.1 Introduction;505
20.1.1.2;18.2 Secret Services in Germany;506
20.1.1.2.1;18.2.1 General (Constitutional) Requirements;507
20.1.1.2.1.1;18.2.1.1 Constitutional Power;507
20.1.1.2.1.2;18.2.1.2 Requirement of a Statutory Provision;507
20.1.1.2.1.3;18.2.1.3 The Distinction Between Tasks and Powers;508
20.1.1.2.1.4;18.2.1.4 The Separation of Secret Services and the Police;509
20.1.1.2.2;18.2.2 Organizational Structure and Tasks;510
20.1.1.2.2.1;18.2.2.1 Federal Office for the Protection of the Constitution;510
20.1.1.2.2.2;18.2.2.2 Federal Intelligence Agency;511
20.1.1.2.2.3;18.2.2.3 Military Counter-Intelligence Service;511
20.1.1.2.3;18.2.3 Powers;512
20.1.1.2.3.1;18.2.3.1 Federal Office for the Protection of the Constitution;512
20.1.1.2.3.2;18.2.3.2 Federal Intelligence Agency;513
20.1.1.2.3.3;18.2.3.3 Military Counter-Intelligence Service;514
20.1.1.2.4;18.2.4 Conclusion;514
20.1.1.3;18.3 Cooperation of the Secret Services’ and Criminal Justice Institutions;515
20.1.1.3.1;18.3.1 Constitutional Framework for the Exchange of Information;516
20.1.1.3.2;18.3.2 Cooperation in Detail;519
20.1.1.3.2.1;18.3.2.1 Cooperation with the Police;519
20.1.1.3.2.1.1;The “Traditional” Way of Exchanging Information;519
20.1.1.3.2.1.2;The Anti-Terrorism File (ATDG)25;521
20.1.1.3.2.1.3;The Possibility to Establish Additional Databases;522
20.1.1.3.2.1.4;Organizational Cooperation;523
20.1.1.3.2.1.5;Conclusion;524
20.1.1.3.2.2;18.3.2.2 Cooperation with the Prosecution;524
20.1.1.3.2.3;18.3.2.3 Cooperation with the Courts;526
20.1.1.3.3;18.3.3 The Defense and the Secret Services;527
20.1.1.4;18.4 Problems Arising from the Use of Secret Services’ Information in Criminal Proceedings;528
20.1.1.4.1;18.4.1 Documents;529
20.1.1.4.2;18.4.2 Witnesses;529
20.1.1.4.2.1;18.4.2.1 Withholding Witnesses;530
20.1.1.4.2.2;18.4.2.2 Denial of Authorization to Testify;531
20.1.1.4.2.3;18.4.2.3 Measures by the Court to Ensure Witness Protection in Order to Enable the Witness to Testify;531
20.1.1.4.2.3.1;Protection During the Main Hearing;531
20.1.1.4.2.3.2;Questioning of the Witness Outside the Main Hearing;532
20.1.1.4.2.3.3;Written Statements and Hearsay Witnesses;533
20.1.1.4.2.4;18.4.2.4 Dropping of Cases Because Evidence is Withheld;534
20.1.1.4.3;18.4.3 Inadmissible Evidence;535
20.1.1.4.3.1;18.4.3.1 Illegally Collected Evidence;535
20.1.1.4.3.2;18.4.3.2 Evidence Collected Abroad;536
20.1.1.5;18.5 Conclusion;538
20.1.1.6;18.6 Decisions;545
20.1.2;References;542
21;Wade_Index.pdf;548




