10 September 2024: Due to technical disruption, we are experiencing some delays to publication. We are working to restore services and apologise for the inconvenience. For further updates please visit our website: https://www.cambridge.org/universitypress/about-us/news-and-blogs/cambridge-university-press-publishing-update-following-technical-disruption

We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings .

Login Alert

terrorism law research paper

  • > Journals
  • > International & Comparative Law Quarterly
  • > Volume 66 Issue 2
  • > DEFINING TERRORISM: ONE SIZE FITS ALL?

terrorism law research paper

Article contents

  • Introduction
  • Defining Terrorism
  • The Single Definition of Terrorism and the Principle of Legality
  • A Multi-Definitional Approach to Terrorism?
  • Departing from the Single Definition: Legal versus Political Frames
  • Conclusions

DEFINING TERRORISM: ONE SIZE FITS ALL?

Published online by Cambridge University Press:  20 February 2017

This article challenges the idea, both in domestic and international law, of defining terrorism. Using section 1 of the UK's Terrorism Act 2000 as an illustrative example, this article argues that a single definition of terrorism is invariably broad owing to the need to accommodate the lowest common denominator. This is damaging to the ‘principle of legality’ as recognized in British public law and the ECHR. Moreover, this problem is further exacerbated by the increasing application of counterterrorism legislation to non-international armed conflicts. This article therefore suggests an alternative solution: multiple definitions of terrorism whose breadth is dependent upon the specific circumstances for which they are designed. Fears that such an approach may amount to an ‘expression of inconsistency’ will be addressed by arguing that law's capacity to shape and frame public and political debate on the concept of terrorism is over-exaggerated. Legal definitions of terrorism therefore should remain primarily concerned with the legal rather than political function of defining terrorism.

I. Introduction

‘The UK uses the same legal definition for every situation in which ‘‘terrorism’’ is a legally-relevant category.’ Footnote 1 This definition, in section 1 of the Terrorism Act 2000, is vague, broad and widely criticized by experts, courts and academics. Yet the decision to take a ‘one-size fits all’ approach to defining terrorism was taken without much consideration of alternatives and there has been little appetite for questioning this approach since. This article outlines the wide-ranging difficulties with both the current definition as it stands and the notion of a single definition for terrorism that can be applied across multiple, highly varied, legal contexts. It is argued that it is preferable to adopt a multi-definitional approach to the concept of terrorism in legal terms, with the definition used being determined by the powers exercisable in respect of it. This would work as a sliding scale: the more intrusive, repressive and oppressive the powers the narrower the definition. Such an approach is entirely consistent with the idea that the greater the exercise of State power the clearer, tighter and more limited the definition that empowers the State should be. This is, as Lord Bingham has observed, key to limiting discretion and thus maintaining the rule of law and stands in sharp contrast to the status quo. Footnote 2

This article commences by questioning the need to legally define terrorism in the first instance, distinguishing between the descriptive definitions of the social sciences and the prescriptive exercise that the law undertakes. While a distinction will also be made between domestic and international requirements for a single legal definition, it will be argued that these two spheres are not wholly severable from each other, notwithstanding the fact that the geopolitical factors making the quest for an internationally agreed definition of terrorism almost impossible do not necessarily play out in national politics. A common theme recurring in these various disciplines regarding the definition of terrorism is the key role that the labeller plays in identifying who or what is a terrorist and the delegitimizing effect that this categorization has. An important issue related to this is the idea that by legally defining terrorism, the use of the term can be controlled.

Using the UK definition of terrorism as a case study, Part III argues that a single definitional approach to terrorism results in a ‘race to the bottom’, requiring the broadest possible definition in order to accommodate every possible scenario. This, in turn, confers extensive discretion on decision makers which is applied in an inconsistent and unclear manner, undermining the principle of legality as reflected in British constitutional law, and the European Convention on Human Rights (ECHR). This problem is further exaggerated by the increasing application of this definition of terrorism overseas in non-international armed conflicts and the issue of British citizens engaging in terrorist activities overseas returning to the UK. Footnote 3

In light of this, Part IV advances an argument in favour of a multi-definitional approach to the concept of terrorism. Concerns that this approach would amount to an expression of inconsistency or would reduce law's ability to control the use of the term ‘terrorism’ are addressed in Part V. These concerns overstate the role that law plays in framing political debates, ignoring the powerful political and social forces that instead shape public perceptions of what constitutes terrorism.

II. Defining Terrorism

The quest for a satisfactory definition of terrorism, described by Nicholas J Perry as the search for the ‘Holy Grail’, is one pursued by law and various other branches of the social sciences. Footnote 4 To define terrorism, however, assumes that such a phenomenon exists. As a concept, terrorism has oscillated in meaning, reflecting ideas contextually specific to the time period and location to which it is being applied. Many etymological studies of the origins of terrorism trace the term back to the aftermath of the French Revolution and Maximilien Robespierre's ‘reign of terror’ between 1792 and 1794. Footnote 5 The Oxford English Dictionary first mentions the word ‘terrorism’ in 1795, shortly after this violent period, and today the Oxford English Dictionary still starts its definition of terrorism with this ‘at once too literal and too historical’ definition. Footnote 6 As a result, this definition is, according to Bruce Hoffmann, not ‘of much use’ when trying to understand the concept of terrorism. Footnote 7 Terrorism has deviated from this original meaning of State-sponsored violence designed to induce fear and terror in order to control and dominate an otherwise anarchical society, to describe the exact opposite: political violence directed against the State. In the late nineteenth and early twentieth centuries, terrorism was often used to refer to anarchists, particularly following the assassination of US President William McKinley in 1901 by Leon Czolgosz—a self-confessed anarchist. Footnote 8 At the same time, in Europe terrorism was gaining its connection with ‘freedom fighters’ as a result of renewed struggles for Irish independence from Britain using tactics such as bombings, assassination techniques and guerrilla warfare. Footnote 9 This evolution from State-sponsored to State-targeted terrorism was not linear, however; in the 1930s, terrorism again became associated with State-sponsored violence due to the rise of violent, authoritarian regimes in Italy, Spain and Nazi Germany. Footnote 10 Following the end of World War II and the decline of the European empires, terrorism again became linked with freedom fighters and the violent methods used by various anti-colonialist groups seeking self-determination. Footnote 11 Today, these two issues of whether States can commit terrorism, and whether one can distinguish the terrorist from the freedom fighter struggling against an oppressive regime are the fundamental problems afflicting attempts to provide a definition of terrorism in international law. Footnote 12

A. Terrorism: A Social Construct

Terrorism therefore is a social construct, its meaning shaped by the subjective perspectives of the categorizer. Footnote 13 These in turn are influenced by the society and circumstances in which the categorizer finds themselves in, varying upon the historical and political context in which they live. Consequently, attempts to understand terrorism have spawned a vast array of different methodologies, paradigms and branches of knowledge. Certain branches of ‘terrorism studies’ may be conceptualized as cultural anthropology, viewing ‘terrorists’ as natives that need to be studied. Footnote 14 Under this approach, the subject of study is the terrorist actor. Contrasting approaches to understanding terrorism instead train their lens upon those labelling terrorists as such. These ‘critical terrorism studies’ emphasize the subjective nature of terrorism and seek to unveil the power dynamics at play in constructing these labels. Footnote 15 Discourse-centred terrorism studies instead look not necessarily at the categorizer or the categorized, but at the discourse surrounding terrorism to reveal the nature of terrorism. Footnote 16 This constructivist approach conceptualizes terrorism as possessing certain objective criteria; however, it also acknowledges that there are powerful subjective forces at play in constructing this object. Footnote 17

The need for a definition of terrorism also varies according to the different fields undertaking the quest. Sociologists and criminologists require one in order to define the parameters of that which they study. Footnote 18 Theirs is, for the most part, a descriptive endeavour. Despite this need, however, a famous 1988 survey found over 100 definitions used by terrorism researchers in the literature. Footnote 19 This has been described as ‘a perverse situation where a great number of scholars are studying a phenomenon, the essence of which they have … agreed to disagree upon’. Footnote 20 Law, however, is not merely a descriptive exercise but is predominately a prescriptive (and indeed a proscriptive) exercise. The normative factors that accompany this prescriptive exercise are ones which the sociologist may not necessarily have to confront. Footnote 21 Relatedly, terrorist studies that scrutinize the power structures at play in the labelling of an event or individual as ‘terrorist’, reveal that terrorism is a pejorative term, loaded with condemnation that delegitimizes the political motive that the deed seeks to propagate. Footnote 22 This ‘labelling’ is of paramount importance when understanding terrorism as a legal construct.

B. Terrorism as a Legal Construct

Much has been written on the difficulties surrounding a legal definition of terrorism; however, considerably less attention has been devoted to why there is a need to define terrorism in law in the first instance. The literature that does exist on this question tends to focus on debates in international law. Jörg Friedrichs’ account of attempts to define terrorism in international law illustrates two major hurdles that have, to date, stumped this quest. Footnote 23 Firstly, States fundamentally disagree as to the distinction between freedom fighters and terrorists. Footnote 24 Secondly, States disagree as to whether a definition of terrorism in international law should cover State acts or not. Footnote 25 These differences are politically and ideologically driven, with a State's perspective on the issue predicated by its own self-interests. Thus the UK in the past insisted on no distinction being made between terrorists and freedom fighters due to its struggles with the Irish Republication Army (IRA). Footnote 26 Arab States took the opposite stance in defence of Palestinian resistance to Israeli occupation. Footnote 27 A number of Arab States may, however, have changed their stance in the aftermath of the ‘Arab Spring’ and attempts—both successful and unsuccessful—to usher in internal regime change by various opposition groups.

International law has instead developed in a piecemeal manner, with treaties based upon specific crimes considered to be indicative of terrorism—eg plane hijacking and hostage taking. Footnote 28 While lacking definitions of terrorism, this approach would be similar to a multi-definitional approach or ‘inductive’ approach to terrorism whereby the definition used is particular to the power or problem identified. Footnote 29 The inductive approach does not commence with a broad hypothesis, but instead constructs its hypothesis based on observations. This hypothesis is then assessed against reality for accuracy. An inductive approach to defining terrorism thus does not necessarily seek to provide a universal definition covering all instances but instead defines terrorism to only cover specific situations that it can accommodate. Footnote 30 An inductive approach therefore can consist of multiple separate definitions applicable to distinct situations. Footnote 31 While an inductive approach resulting in multiple definitions of terrorism may be of little use to the social scientist who is seeking to define the parameters of that which they are studying, it may nevertheless be the case that it still has a function in the prescriptive and proscriptive function of the law.

In contrast to the inductive approach, the deductive approach starts out with a general definition of terrorism and applies this to numerous different circumstances. Footnote 32 For deductive reasoning to operate effectively, the initial hypothesis must be correct, and, indeed it must be agreed upon in the first instance and it is this hurdle that international law has not yet managed to cross. A deductive approach would be expected to produce a single definition of terrorism.

A number of different arguments have been put forward as to why a single definition of terrorism is preferable to a multi-definitional approach. Christian Walter, for example, argues that clarity and certainty are key justifications for a single legal definition of terrorism:

The main reason for slightly different definitions is not a decision on the purpose by the legislator, but rather the adoption of different measures at different times and a corresponding lack of co-ordination. For the purpose of clarity and legal certainty it would be desirable to adopt as much as possible a single definition of ‘terrorism’ within any given legal order. Footnote 33

A similar argument in the international context is put forward by Ben Golder and George Williams who argue that as ‘terrorism’ has entered the political discourse, the law is to keep pace with this discussion by reflecting our current understanding of terrorism and ‘crystallising it in a form consistent with rule of law principles’. Footnote 34

Also referring to the international debate, Alex Schmid argues that a single definition would avoid the ‘defeatist’ position that one man's terrorist is another man's freedom fighter, thus moving the discourse into an area where there is international agreement. Footnote 35 Geoffrey Levitt argues that on a practical level, a single definition is more convenient, neater, and more efficient. Footnote 36 However, Levitt also suggests that this practical reason alone is not sufficient to justify a deductive approach to defining terrorism. Furthermore, Levitt concedes that ‘it may also be possible to employ a multi-definitional approach in a way that is convenient, neat, and efficient’. Footnote 37 Levitt instead concludes that it is the moral-political benefits of a single definition of terrorism that is the true reason that underlies such an approach, echoing the concerns of RR Baxter that there is no real necessity for a single ‘deductive’ definition of terrorism. Footnote 38 Referring to the quest for a single definition of terrorism in international law as distinct from a domestic legal system, Levitt argues that:

A multilateral anti-terrorism legal instrument based on a generic definition of terrorism would in effect put the official international seal of disapproval on the whole range of violent political behaviour, with a moral emphasis that the facially apolitical inductive approach lacks. Those who engage in such behaviour would be effectively branded as international outlaws. Footnote 39

While Levitt is referring to efforts to define terrorism in an international context, the advantages to be gained from a single definitional approach are nevertheless transposable into the domestic context: the political benefit to be gained from having such a delegitimizing label that is ‘terrorism’ at the disposal of the government. Caleb Carr also agrees with this assertion, arguing that a single definition of terrorism is necessary in law in order to expose it for what it is: a belligerent activity. Footnote 40 Carr embraces this moral political benefit of having a delegitimizing label at the disposal of decision makers:

It must be [broad], if we are to recognise and expose terrorism in every one of its guises and permutations, and thus reveal two truths: first, that terrorism is among mankind's most outrageously unacceptable belligerent practices, which include piracy, slavery, and genocide; and second, that every people and nation has, at one time or another, practiced a form of warlike behaviour that easily fits the definition cited above. It is only by recognizing such globally generalized responsibility for terrorism's development that we can hope to end the cyclical pattern of atrocity, accusation, rationalisation, recrimination, and revenge that has allowed the practice to remain alive. Footnote 41

Thus Carr's exposing of the delegitimizing effect of the ‘terrorist’ label is not done in order to give the State a weapon with which it can attach to its political opponents, but also to reveal the delegitimizing actions of States themselves.

Carr's argument assumes that defining what terrorism is can frame our understanding and perspectives of it. A similar argument is put forward by Ben Saul who contends that a single definition of terrorism in international law is necessary in order that the definition can be controlled. Footnote 42 Golder and Williams, by arguing that law should define terrorism so as to circumscribe it within the rule of law and feed into public discourse, also appear to advance this argument of control. Footnote 43 Definitions, in order to be effective, must exclude certain phenomena from their ambit, thus ensuring parameters around concepts and managing its use. A single legal definition of terrorism can potentially help shape how the term is used by both national and international actors. Indeed, one of the key concerns driving the quest for a definition of terrorism in international law is this desire to control its use. Rumyana Grozdanova suggests that the litmus test for an effective definition of terrorism in international law would be to ‘limit the scope for a political, rather than legal determination of what is ‘terrorism’ and who is a ‘terrorist’. Footnote 44 A single definition of terrorism may help to confront this subjective nature of labelling an individual or event as terrorist as the labeller is simply applying the legal definition of terrorism to the facts at hand. As we shall see below, however, this argument over-estimates the capacity of legal terms to ‘frame’ political, public, and media debate surrounding terrorist events. Footnote 45

C. The Definition of Terrorism in UK Law

The quest to provide a single definition of terrorism in the UK finds its origins in the recommendations made by Lord Lloyd in his 1996 Inquiry into Legislation against Terrorism report. Footnote 46 Lord Lloyd's report was produced at a time when the main definition of terrorism in UK law was contained in the Prevention of Terrorism (Temporary Provisions) Act 1974 (PTA). Section 14(1) of the PTA 1974 defined terrorism as ‘the use of violence for political ends, and includes any use of violence for the purpose of putting the public or any section of the public in fear.’ Footnote 47 The PTA 1974, motivated by the conflict in Northern Ireland and in particular the threat posed by the IRA, only covered acts of domestic terrorism. Lord Lloyd, concerned by this distinction between domestic and international terrorism proposed that any new legislation should contain a definition which covered all forms of terrorism. He then recognized the difficulties in providing just a single definition of terrorism, noting that he was aware of ‘at least four different definitions of terrorism’ in US law. Footnote 48 Nevertheless, he then went on to recommend the following definition as used by the FBI as a template for which a UK definition could be based upon:

The use of serious violence against persons or property, or the threat to use such violence, to intimidate or coerce a government, the public or any section of the public, in order to promote political, social or ideological objectives. Footnote 49

The difficulty with using this definition, however, as Clive Walker highlights, is that the FBI definition is ‘an administrative construct for jurisdictional, budgetary and other administrative purposes. It does not serve as a legal term or art on which liberty depends.’ Footnote 50 Lord Lloyd's report thus does not go into any great detail as to why only a single definition of terrorism is needed and does not look at the underlying purpose of the FBI definition recommended.

The definition proffered by Lord Lloyd is decontextualized from the specific purpose it was designed for; it is one of a number of different definitions in US law. These definitions are of varying breadths, particular to the specific purpose of the legal source which contains them. Nicholas Perry, criticizing this piecemeal, multi-definitional approach describes this as amounting to an expression of inconsistency. Footnote 51 A single definition, according to Perry, would allow for better communication between law enforcement and intelligence agencies thus improving the operational efficiency of counterterrorist powers. Footnote 52 Again, however, this justification is absent from Lord Lloyd's report. As is consideration of arguments similar to Levitt's discussed above that a multi-definitional approach could be deployed ‘in a way that is convenient, neat, and efficient’. Footnote 53 Instead, Lord Lloyd's report starts at the point at which a general definition should be provided and then seeks to expand it to provide a general definition applicable to domestic and international terrorism.

1. S1 Terrorism Act 2000

The result of Lord Lloyd's report was the Terrorism Act 2000 (2000 Act) and the definition of terrorism contained in section 1 . This was subsequently amended twice by Terrorism Act 2006 and the Counter-Terrorism Act 2008 and today reads as follows:

(1) In this Act ‘terrorism’ means the use or threat of action where —

(a) the action falls within subsection (2) [outlined below]

(b) the use or threat is designed to influence the government or an international governmental organization or to intimidate the public or a section of the public, and

(c) The use or threat is made for the purpose of advancing a political, religious or ideological cause.

(2) Action falls within this subsection if it —

(a) involves serious violence against a person,

(b) involves serious damage to property,

(c) endangers a person's life, other than that of the person committing the action,

(d) creates a serious risk to the health or safety of the public or a section of the public, or

(e) is designed seriously to interfere with or seriously disrupt an electronic system.

Finally, section 1.1(3) states that:

The use or threat of action falling within subsection (2) which involves the use of firearms or explosives is terrorism whether or not subsection (1)(b) is satisfied.

The UK's approach to defining terrorism therefore is a deductive one: it starts out with an initial statement and then applies it to a broad array of crimes, inchoate offences, police and immigration powers, and as a guide for prosecutorial discretion.

This definition was itself the subject of a comprehensive review by the then Independent Reviewer of Terrorism Legislation Lord Carlisle undertaken at the request of the then Home Secretary. Footnote 54 Lord Carlisle identified four alternative propositions that could be followed to reform section 1 , all of which he rejected. First, that no definition of terrorism is needed, nor any special procedures required. Second, that a definition is needed but no special procedures and offences required; rather, adjustment to the sentencing powers would suffice. Third, that a definition is needed, including special procedures and offences but that the definition ought to be tighter than at present. Finally, that a definition is needed, including special procedures and offences, drawn broadly and to anticipate estimates of future terrorism activity. Footnote 55 What is common to these propositions is that they all assume a single definitional approach. Even the first argument that rejects outright the need to define terrorism is framed in terms critical of a single definition of terrorism. Thus Lord Carlisle, like Lord Lloyd before him, exercises no critical analysis of the merits of a multi-definitional approach, assuming that the choices are either a single definition of terrorism or none at all.

III. The Single Definition of Terrorism and the Principle of Legality

The UK's ‘one size fits all’ definition of terrorism, pursued without much thought into the actual advantages and disadvantages of a single definitional approach, is one of substantial breadth which poses considerable difficulties for the rule of law. This is ironic seeing as one of the primary justifications for a single definition of terrorism is that it can provide clarity and certainty in a way that a multi-definitional approach cannot. Footnote 56 Like the notion of terrorism, the rule of law is itself an incredibly broad concept, lacking comprehensive agreement as to its scope. Footnote 57 At a minimum, however, the rule of law requires the principle of legality: that law should be ex ante promulgated in a clear manner, so that individuals may be certain that their conduct is in conformity with it. Footnote 58 These elements of clarity and certainty are evident in even the thinnest conceptions of the rule of law. Clarity and certainty appear in Dicey's formulation of the rule of law, Footnote 59 and indeed in Carl Schmitt's conception of law. Footnote 60 Thus Schmitt's argument that states of exception cannot be circumscribed by law due to the inability of law to prescribe ex ante the possible conditions that may warrant the ushering in of a state of exception is a testament to this. Clarity and certainty also have a degree of normative value to them, even if the law that they refer to is one that would be abhorrent to most standards of morality or judicial cultures today. Footnote 61

Section 1's conformity with the principle of legality was raised by the Supreme Court in R v Gul . Footnote 62 The defendant in that case had been convicted under section 2 of the Terrorism Act 2006 for dissemination of terrorist publications. The defendant had uploaded onto YouTube:

(i) attacks by members of Al-Qaeda, the Taliban, and other proscribed groups on military targets in Chechnya, and on the Coalition forces in Iraq and in Afghanistan, (ii) the use of improvised explosive devices (‘IEDS’) against Coalition forces, (iii) excerpts from ‘martyrdom videos’, and (iv) clips of attacks on civilians, including the 9/11 attack on New York. These videos were accompanied by commentaries praising the bravery, and martyrdom, of those carrying out the attacks, and encouraging others to emulate them. Footnote 63

Whether Gul had uploaded ‘terrorist publications’ thus depended upon whether the individuals in the videos in question were engaged in terrorist activity. Gul attempted to argue on three separate grounds that the definition of terrorism contained in section 1 of the 2000 Act should be read down:

i. The 2000 Act, like the 2006 Act was intended, at least in part, to give effect to the UK's international treaty obligations and therefore the concept of terrorism in the 2000 Act should accord to the concept of terrorism in international law which does not extend to military acts by a non-state armed group against a state or IGO [Inter-governmental Organization]. Footnote 64

ii. That it would be wrong to read the 2000 and 2006 Acts as criminalising in the UK an act abroad, unless that act would be regarded as criminal by international law. Footnote 65

iii. As a matter of domestic law, as distinct from international law, some qualifications must be read into the very wide words of section 1 of the 2000 Act. Footnote 66

The Supreme Court rejected all three arguments. Arguments (i) and (ii) are based on international law and were dismissed as imposing any limit on the breadth of section 1 with the Supreme Court concluding that there was no rule that precluded the UK from going beyond what was required by international law so long as it did not drop below the minimum agreed upon. Footnote 67 Argument (i) is particularly problematic as there is no clear definition of terrorism in international law. Footnote 68 The disagreement regarding the status of freedom fighters in international law fell far short of a ‘general understanding of what terrorism was’ and indeed is the key stumbling block for the question for a single definition of terrorism in international law. Footnote 69

Argument (iii) instead was based on domestic law, with counsel urging the Court to read some qualifications into section 1 so as to narrow its breadth. The Government submitted that the common sense usage of discretion by the Crown Prosecution Service (CPS) could justify in law the breadth of section 1 . Footnote 70 While the Independent Reviewer of Terrorism Legislation David Anderson (the Independent Reviewer) believes that the operation of prosecutorial discretion can mitigate the negative effects of the breadth of section 1 , Footnote 71 the Supreme Court expressly rejected this in Gul :

It may well be that any concern which Parliament had about the width of the definition of terrorism in section 1 (1) was mitigated by the existence of the statutory prosecutorial discretion but … we do not regard it as an appropriate reason for giving ‘terrorism’ a wide meaning. Footnote 72

This lack of clarity leaves an individual uncertain as to whether their actions will be retrospectively described as terrorist, leaving a temporal gap between their actions and their subsequent labelling as terrorist. Footnote 73 Thus reliance upon prosecutorial discretion, while de facto may alleviate some of the fears regarding the breadth of section 1 ; de jure it is not acceptable. The Supreme Court stated that Parliament had essentially abdicated its responsibility to an unelected official of the executive. Footnote 74

British courts can legitimately engage in an interpretive exercise that assumes Parliament intended to legislate in conformity with fundamental constitutional principles such as the rule of law. Footnote 75 This has resulted in some high-profile instances where courts have creatively interpreted statutory provisions to what would be in the eyes of some commentators the apparent contrary of what Parliament intended. Footnote 76 Nevertheless, despite this capacity for courts to vindicate the principle of legality and the strong concerns regarding the reliance on prosecutorial discretion to curtail the breadth in section 1 , the Supreme Court could find no indication in the words laid down by Parliament that they intended anything other than this outcome. As a result of Gul , the breadth of section 1 was left untempered.

While Gul ultimately lost his case, the Supreme Court nevertheless expressed a powerful obiter dictum regarding the scope of the definition of terrorism contained in section 1 :

While acknowledging that the issue is ultimately one for Parliament, we should record our view that the concerns and suggestions about the width of the statutory definition of terrorism which Mr Anderson has identified in his two reports merit serious consideration. Any legislative narrowing of the definition of ‘terrorism’, with its concomitant reduction in the need for the exercise of discretion under section 117 of the 2000 Act, is to be welcomed, provided that it is consistent with the public protection to which the legislation is directed. Footnote 77

The second general point is that the wide definition of ‘terrorism’ does not only give rise to concerns in relation to the very broad prosecutorial discretion bestowed by the 2000 and 2006 Acts. The two Acts also grant substantial intrusive powers to the police and to immigration officers, including stop and search, which depend upon what appears to be a very broad discretion on their part. While the need to bestow wide, even intrusive, powers on the police and other officers in connection with terrorism is understandable, the fact that the powers are so unrestricted and the definition of ‘terrorism’ is so wide means that such powers are probably of even more concern than the prosecutorial powers to which the Acts give rise. Footnote 78

A. The Definition of Terrorism and the Principle of Legality in ECHR Jurisprudence

This concern of the Supreme Court regarding the principle of legality in the context of stop and search powers is echoed by the European Court of Human Rights (ECtHR). The principle of legality is expressly enumerated in a number of Convention articles requiring that measures which infringe upon qualified rights in order to give effect to a pressing social need must do so in a manner ‘prescribed by law’. The prohibition on retrospective criminal punishment, for example, is enumerated in Article 7 and is given non-derogable status. Footnote 79 Article 7 is, however, rarely considered by the ECtHR and instead more common challenges to criminal offences tend to arise under Article 5 (right to liberty) and Article 6 (right to a fair trial). Footnote 80 Under Article 5(1) of the ECHR, for example, any restriction on liberty must be ‘in accordance with a procedure prescribed by law’. An illustrative example of this is contained in Article 5(1)(c) of the Convention which permits the lawful arrest of a person on the grounds of reasonable suspicion that they have committed and offence. ‘Offence’ in this paragraph has an autonomous Convention meaning and so the mere fact that a contracting State has labelled a certain provision of its criminal law as an ‘offence’ will not be conclusive. Footnote 81

In Brogan v UK , the ECtHR found that the then UK definition of terrorism contained in the Prevention of Terrorism Act 1984 (PTA 1984)—the use of violence for political ends, and includes any use of violence for the purpose of putting the public or any section of the public in fear—was ‘well in keeping with the idea of an offence.’ Footnote 82

To corroborate this, the Court in Brogan cited paragraph 196 of its judgment in Ireland v UK . Footnote 83 Paragraph 196, however, merely repeats the phrase ‘well in keeping with the idea of an offence’ and cross-cites back to paragraphs 85–88 of itself. Paragraphs 85–88 of Ireland v UK do not, however, yield any other authority to corroborate this confident assertion that the definition of terrorism in question is ‘well in keeping with the idea of an offence’. Instead, these paragraphs contain a descriptive discussion of the domestic legal provisions relevant to Ireland v UK and their origins. Paragraph 85 draws attention to the Terrorists Order which was a ministerial order passed by the Secretary of State for Northern Ireland in accordance with the Northern Ireland (Temporary Provisions) Act 1972. The Terrorists Order defined terrorism as ‘the use of violence for political ends, [including] any use of violence for the purpose of putting the public or any section of the public in fear’; ie it was the definition that was subsequently contained in the PTA 1984. There is no substantive analysis of why this definition is ‘well in keeping with the idea of an offence’. At best, Brogan reveals a very thin ‘rule by law’ approach to the meaning of ‘offence’, with the ECtHR's reasoning wholly reliant upon the fact that that the law in question is enumerated in a statute and ministerial order. There is no substantive analysis of the actual text in question and its conformity with the principle of legality. The ECtHR therefore has never actually attempted to unpack whether the definition of terrorism in the PTA 1984 is ‘well in keeping with the idea of an offence’. Instead, it repeats this phrase until it becomes a self-justifying loop.

A further problem with relying upon paragraph 85 of Ireland v UK as an authority for a definition of terrorism being ‘well in keeping with the idea of an offence’ is that this case explicitly states that that the Terrorist Order in question was subject to a notice of derogation under Article 15 of the ECHR made by the UK government on 23 January 1973. Footnote 84 The entire purpose of declaring an emergency and derogating from the Convention is to take measures that are ordinarily not permitted under the ECHR. Footnote 85 It is not correct to assert that the Terrorist Order subject to derogation under Article 15 is compliant with the ordinary scope Convention as it operates in normalcy—when an emergency has not been declared. The authority of Ireland v UK pertaining to the definition of terrorism should be ‘quarantined’ to when an emergency is declared under Article 15. In Brogan , no such derogation was in effect. Footnote 86 However, even such a restriction is itself overly broad as each emergency experienced by a State or by different States may be different and so what may be ‘proportionate to the exigencies of the situation’ in one emergency may not be so in another. Consequently, the Court's reliance upon Ireland v UK as an authority for the statement that the definition of terrorism contained in the PTA 1984 is, at its most generous reading, weak; at worst it is simply mistaken.

One must, of course, look at the substantive elements of a particular definition to assess whether it is ‘well in keeping with the idea of an offence’. In this regard, the definition of terrorism in the PTA 1984 is noticeably narrower than that contained in section 1 of the 2000 Act. Footnote 87 It referred only to ‘the use of violence for political ends’, whereas section 1 refers to the ‘use or threat of action’. Action is defined in section 1 (2) as something which is not necessarily physical violence against a person or property but can include an action that puts others at risk or can ‘seriously to interfere with or seriously disrupt an electronic system’. Moreover, in Brogan , the offences delineated were scheduled offences. The petitioners were charged with the more narrowly defined membership of a prescribed organization as distinct from being involved in terrorism more generally.

In contrast to Brogan , more recent cases suggest that the ECtHR is engaging in closer scrutiny of whether State measures taken in the name of national security are ‘prescribed by law’. In Gillan and Quinton v UK , police stop and search powers under section 44 of the Terrorism Act 2000 were found by the ECtHR to be incompatible with the right to privacy in Article 8. Footnote 88 Such stop and search powers were, according to the Court not ‘prescribed by law’. Finding that the rule of law ‘is inherent in the object and purpose of Article 8 and expressly mentioned in the preamble to the convention’, Footnote 89 the Court held that ‘[T]he law must thus be adequately accessible and foreseeable, that is, formulated with sufficient precision to enable the individual — if need be with appropriate advice — to regulate his conduct.’ Footnote 90 However, while the definition of terrorism in section 1 of the 2000 Act is relevant for the operation of section 44 stop and search powers, the judgment of the ECtHR in Gillan did not address this issue. Instead, it was specific failures of section 4 that made it fall foul of the rule of law. Gillan thus illustrates the difficulties in trying to challenge section 1 's conformity with the principle of legality as courts will tend to home in on the specific power or offence in question, rather than the definition of terrorism in the abstract. Cases such as Gul , where the particular facts of the case meant that the definition's scope had to be directly addressed will be rare. Footnote 91

B. The Principle of Legality and the Application of UK Terrorism Legislation Overseas

Challenges to the principle of legality by the operation of decision-maker discretion are particularly heightened in the context of the application of UK counterterrorism legislation overseas. A State on the domestic level does not have to deal with the geopolitical wrangling of whether there is a distinction between ‘terrorist’ and ‘freedom fighter’ and so is free to define terrorism in line with its subjective perspectives on the issue. Whether the lack of such a distinction exists in UK domestic law, however, depends upon the interpretation of the word ‘government’ in section 1 (b) of the 2000 Act. Section 1 (4)(d) defines ‘government’ to mean ‘the government of the United Kingdom, a Part of the United Kingdom or of a country other than the United Kingdom’. Footnote 92

Despite this clarification, there is still room for interpretation. In R v F , the Court of Appeal upheld the Appellant's conviction for possession of a document or record containing information of a kind likely to be useful to a person committing or preparing an act of terrorism. Footnote 93 The material in question included a CD with material downloaded from a Jihadist website, containing instructions regarding the manufacturing of explosive devices. Footnote 94 The appellant was also in possession of a document detailing how to set up a ‘terrorist cell’. Footnote 95 The appellant argued, however, that he did not intend to attack the UK but instead attack the Libyan government of Muammar Gaddafi. He therefore argued that the meaning of ‘government’ in section 1 of the 2000 Act should be read compatibly with the ECHR by using the Court's interpretive obligation under section 3 of the Human Rights Act 1998 so as to exclude dictatorships or military junta. Footnote 96 The Court of Appeal rejected this argument stating that ‘[I]n our judgment the meaning of the phrase—“a country other than the United Kingdom”—is plain enough.’ The Court added:

We can see no reason why, given the random impact of terrorist activities, the citizens of Libya should not be protected from such activities by those resident in this country in the same way as the inhabitants of Belgium or the Netherlands or the Republic of Ireland. More important, we can see nothing in the legislation which might support this distinction. Footnote 97

This approach has a number of difficulties attached to it, however; as identified by the Court of Appeal:

What is striking about the language of s[ection] 1, read as a whole, is its breadth. It does not specify that the ambit of its protection is limited to countries abroad with governments of any particular type or possessed of what we, with our fortunate traditions, would regard as the desirable characteristics of representative government. There is no list or schedule or statutory instrument which identifies the countries whose governments are included within s[ection]1(4)(d) or excluded from application of the Act. Finally, the legislation does not exempt nor make an exception, nor create a defence for, nor exculpate what some would describe as terrorism in a just cause. Such a concept is foreign to the Act. Terrorism is terrorism, whatever the motives of the perpetrators. Footnote 98 …

It was however open to Parliament to decide that because of the evils of terrorism and the manifold dangers that terrorist activities create, it should impose a prohibition on the residents of this country from participating or seeking to participate in terrorist activities, which may have a devastating impact wherever in the world they occur. Footnote 99

According to the Court of Appeal, section1 of the 2000 Act makes no distinction between terrorist and freedom fighter. The problem with this approach, however, as suggested by Ben Saul, is that it negates any incentive for a non-State belligerent to comply with international humanitarian law. Footnote 100

An additional issue not addressed by the Court of Appeal in R v F is the effect of UK government recognition of whom the legitimate authority of a State is. R v F was decided before UK military intervention in Libya where NATO forces gave military support to armed groups seeking to oust the Gaddafi regime. In 2011, UN Security Council Resolution 1973 authorized the enforcement of a no-fly zone in Libya for the express purposes of protecting civilians. Footnote 101 This resolution was enforced by NATO with the UK playing a major role in ‘Operation Unified Protector’. Footnote 102 According to the literal meaning of Resolution 1973, it did not, however, authorize ‘regime change’. While the resolution does state that it authorized ‘all necessary measures,’ Olivier Corten and Vaios Koutroulis argue that this cannot be used to justify regime change. Footnote 103 Firstly, while ‘all necessary measures’ has become the standard terminology in international law for permitting the use of force, in this instance it was followed by the phrases ‘to protect civilians and civilian populated areas under threat of attack in the Libyan Arab Jamahiriya’ and ‘to enforce compliance with the ban on flights’. ‘All necessary measures’ therefore was not a carte blanche grant of discretion but was clarified to require these measures be directed towards a specific objective only. Footnote 104 This is further corroborated by the general principle in international law that there is no norm permitting a State to support an armed rebel group in the overthrow of a government, even if that said government was guilty of gross human rights violations. Footnote 105 Finally, General Assembly Resolution 2625 (XXV) which reflects general customary international law affirmed that support to rebels falls under the prohibition of the use of force. Footnote 106 Consequently, Security Council Resolution 1973 could not be used as a legal basis for regime change in Libya.

Despite this strong prohibition against using military support to effect regime change in international law, the NATO campaign diverged dramatically from its initial objective of enforcing a no-fly zone to one which had the clear purpose of effecting a regime change. Footnote 107 The UK Government therefore gave military support to armed groups that would satisfy the UK definition of terrorism. The extraterritorial application of section 1 means that individuals fighting for such groups in Libya could be guilty of terrorist offences in UK domestic law and thus liable for prosecution. During this military campaign, France, the UK and other NATO members officially recognized the Libyan Transnational National Council (TNC) as the legitimate authority of Libya. Footnote 108 The recognition of the TNC as the legitimate authority of Libya by member of the coalition of the willing did not affect the legality under international law of the military support for the rebels; however, whether such an argument could influence the interpretation of section 1 is unclear. In addition, throughout the conflict, Libyan rebel groups were accused of a number of breaches of international humanitarian law. Footnote 109 Therefore, even if the UK definition of terrorism were amended so that it would not cover armed groups that abide by international humanitarian law, the Libyan rebels would have failed to satisfy this.

1. Prosecutorial Discretion and British combatants in non-international armed conflicts

R v F , decided in 2007, contains some prophetic statements pertaining to UK intervention in non-international conflicts that erupted from the Arab Spring:

If it were ever permissible to visit terrorist activities on a tyrannical government, would that immunity extend to a group seeking by violent means to foist its own different but equally undemocratic principles on the country whose tyrant was overthrown? Footnote 110

Thus if the UK definition of terrorism were to exclude attacks against, for example, the Syrian government of President Bashar al-Assad and the ruling Ba'ath Party, this would apply to all those who perpetrated such attacks, including so-called Islamic State (ISIS), or their known associates. The complexities and contradictions of this approach are numerous. In September 2013, Parliament refused to give consent to UK military intervention in Syria against the Assad regime following the alleged use of chemical weapons in Ghouta, Syria. Footnote 111 This intervention would have directly and indirectly aided all armed groups opposed to the Assad regime. Each and every one of these opposition groups would satisfy the UK domestic definition of terrorism. Two years later in December 2015, Parliament affirmed the Government's request to launch airstrikes in Syria, not against the Assad regime but against ISIS a terrorist organization which constitutes an ‘unprecedented threat to international peace and security’. Footnote 112

The UK officially recognized the ‘Syrian National Coalition’ (SNC) as the country's legitimate government back in 2012; but once again this cannot affect the legality of military support for such a rebel grouping according to international law. Footnote 113 The UK's support for the SNC and other Syrian opposition groups extends beyond military (humanitarian) assistance to include ‘over £45 million of non-humanitarian aid in response to the Syria conflict. £2 million of this has gone directly to fund the SNC’. Footnote 114 An absurd example of this clash between the legal definition of terrorism and the political reality is the case of Bherlin Gildo, a Swedish national accused of terrorist activities in Syria; however, the case against him collapsed when it became clear that British security and intelligence agencies were supporting the group he was affiliated with. Footnote 115

This difficulty therefore is not merely one of a political complaint about the hypocritical disjuncture between domestic law and the UK government's practice overseas but gives rise to genuine legal difficulties concerning the principle of legality in the context of prosecuting British citizens or residents who were belligerents in non-international conflicts who have subsequently returned home to the UK. When the Crown Prosecution Service (CPS) decides to prosecute a person, it does so based on whether there is a sufficiently strong case against a person and whether it is in the public interest to bring the prosecution forward. Footnote 116 Under the 2000 and 2006 acts, the CPS must seek the consent of the Attorney General before prosecutions may be brought against individuals for terrorist offences committed outside the UK. Footnote 117 This requirement is in place in order to prevent compromising both British and foreign intelligence operations. It may be the case that the CPS, in its discretion, is only deciding to prosecute combatants returning to the UK that pose a threat to the UK itself. Alternatively, it may take the position that it is in the public interest to deter individuals from travelling abroad to fight in armed conflict and so may decide to prosecute whether or not the individual poses a threat to the UK. Either way, the issue is not settled by the fact that the UK definition of terrorism makes no formal distinction between terrorist and freedom fighter. Rather, this broad conflation of the two in UK law results in prosecutors, and the Attorney General making this decision and exercising vast discretion as they do so.

The result is that the current definition of terrorism places too much discretionary power on unelected officials and, as stated by R v Gul , is inherently damaging to the rule of law and the principle of legality. In effect, the conflation of terrorist and freedom fighter has not resulted in the abolition of the distinction between these two concepts in Government policy. The moral judgment involved in labelling an act as terroristic is still preserved under section 1 . The breadth of section 1 means that this distinction between legitimate and illegitimate violence is being made by government officials rather than by Parliament.

IV. A Multi-Definitional Approach to Terrorism?

Notwithstanding the persuasiveness of arguments discussed that terrorism is no more than a social construct amounting to political violence that the observer considers to be illegitimate, it appears that counterterrorist legislation is here to stay. Indeed, it may be the case that abandoning the concept of terrorism could be more damaging to human rights as the powers limited (albeit very broadly) by this definition would most likely remain on the statute books in some form. For example, while defining terrorism with reference to motive is problematic, this additional hurdle that the prosecution or decision maker must prove or factor into account can act as a control on the breath of the power in question. Footnote 118 The solution therefore that this article advocates is a pragmatic one: if we are to include counterterrorist powers and offences in our legal system then the quest for a single definition should be abandoned. Instead a multi-definitional approach should be pursued.

From a rule of law perspective, a multi-definitional approach would have the advantage of avoiding the accommodation of the ‘lowest common denominator’ that afflicts the single definitional approach. A narrower definition can be used in certain instances, thus better protecting human rights and the principle of legality. At the same time, a broader definition could apply to legal norms where it is of ‘operational necessity’ to do so.

This more nuanced approach to defining terrorism is arguably already the case at present. In addition to section 1 , the UK has one other definition of terrorism in the Reinsurance (Acts of Terrorism) Act 1993 which is specifically for the purposes of defining terrorism for insurance claims. Footnote 119 More significantly, recent changes to the Terrorism Prevention and Investigation Measures Act 2011 (TPIMA) also depart from section 1 . In his report on the operation of terrorism legislation in 2013, David Anderson responded to government plans to reintroduce relocation orders in TPIMs. Footnote 120 Anderson acknowledged the potential operational necessity of such a reintroduction; however, he also suggested that the broad definition of ‘terrorist-related activity in the TPIMA be revisited, with a view to narrowing it. The Counter-Terrorism and Security Act 2015 gave effect to the Independent Reviewer's suggestion, reintroducing relocation orders while at the same time narrowing the definition of ‘terrorist related activity’ to exclude support or assistance to those who are themselves facilitating or encouraging the commission, preparation or instigation of acts of terrorism. Footnote 121

A. Miranda v SSHD: Towards a Multi-Definitional Approach?

One such area in which a narrower definition of terrorism would be beneficial for both human rights and the rule of law would be in criminal offences or State powers that impact upon freedom of expression. In Miranda v SSHD , Footnote 122 the applicant was detained and questioned at Heathrow airport under paragraph 2(1) of schedule 7 of the 2000 Act. Personal items including encrypted storage devices were taken from him. The applicant was the spouse of Glenn Greenwald, the journalist who had interviewed and subsequently published in The Guardian material leaked by whistle-blower Edward Snowden regarding the activities of the US National Security Association (NSA) and their capacity to access individuals’ digital data. Footnote 123

Schedule 7 can be exercised when an examining officer has grounds for suspecting that an individual is a ‘terrorist’. ‘Terrorist’ is circularly defined in section 40(1)(b) as being an individual who ‘is or has been concerned in the commission, preparation or instigation of acts of terrorism’. Footnote 124 Thus the scope of schedule 7 is necessarily dependent upon the definition of terrorism in section 1 of the 2000 Act.

While there was some dispute as to the purpose of the detention, the Court of Appeal, agreeing with the police, held that the purpose was to determine whether Miranda was a person falling within section 40(1)(b) of the 2000 Act, ie whether he was a terrorist under the meaning of the 2000 Act. Focus therefore centred on the meaning of section 1 . Concerns were raised as to the breadth of this definition when applied to the publication of material related to terrorism and other journalistic activities. This concern is heightened when one, as Laws LJ did at first instance, takes a literal approach to its interpretation. Laws LJ accepted the argument that:

… the section 1 definition is ‘capable of covering the publication or threatened publication [for the purpose of advancing a political, religious, racial or ideological cause] of stolen classified information which, if published, would reveal personal details of members of the armed forces or security and intelligence agencies, thereby endangering their lives, where that publication or threatened publication is designed to influence government policy on the activities of the security and intelligence agencies’: section 1 (1)(b) and (c), and (2)(c). Footnote 125

The appellant argued that this literal interpretation was too broad as:

It would include activity that is entirely non-violent; is in pursuit of a legitimate and mainstream political cause; may ‘endanger life’ by accident; and where the person may be ‘concerned’ in such activity wholly accidentally or even without knowledge … On this interpretation of ‘act of terrorism’, section 41 would allow a power of arrest, detention and questioning of any person on reasonable grounds to suspect that he was accidentally or unknowingly involved in non-violent political activity that indirectly, inadvertently and unintentionally happened to endanger life. Footnote 126

A number of examples of the absurd application of this over-broad definition were given. For example, a junior doctor who erects a sign to protest about Government policy towards the NHS but inadvertently erects it in a way that accidentally endangers the life of a passer-by. Footnote 127 The chilling effect that this may have on free speech was also stressed by the appellant and by the Independent Reviewer. Footnote 128 Anderson gives the example of the publication of a blog that argues on religious or political grounds against the vaccination of children. If this publication were judged to create a serious risk to public health and designed to influence the government, then it would be classified as a terrorist action. Footnote 129

Dyson MR, persuaded by these arguments, adopted an alternative approach to the interpretation of section 1 , arguing that a mental element must be read into section 1 when it is applied in certain instances. Dyson MR parses the section 1 definition of terrorism into three distinct categories of action. The first category is defined exclusively by the action itself; the second are actions defined by their consequences; and the final is an action defined by reference to its aim. Arguing that a mental element is necessary for the first and third categories, Dyson MR concludes that although on a literal interpretation it is possible that a mental element is not necessary for the second category, it would be an anomaly if Parliament intended it to be read as so. Dyson MR therefore concludes that actions defined as terrorist by reference to their consequence must require that the individual intended or was reckless as to these consequences coming to fruition. Footnote 130 He therefore argues that:

On the interpretation which I would adopt, such a blogger would not be a terrorist even if his blog were judged to create a serious risk to public health, unless he intends his publication to create the risk (or is reckless as to whether his blog will have that effect). Likewise, on this interpretation the junior doctors … would not be terrorists either. Footnote 131

Ultimately, the Court of Appeal issued a declaration of incompatibility of Schedule 7 with Article 10 of the ECHR on the grounds that it was not ‘prescribed by law’:

I accept that these are constraints on the exercise of the power, but in my judgment they do not afford effective protection of journalists’ article 10 rights. The central concern is that disclosure of journalistic material (whether or not it involves the identification of a journalist's source) undermines the confidentiality that is inherent in such material and which is necessary to avoid the chilling effect of disclosure and to protect article 10 rights. If journalists and their sources can have no expectation of confidentiality, they may decide against providing information on sensitive matters of public interest … It is, therefore, of little or no relevance that the schedule 7 powers may only be exercised in a confined geographical area or that a person may not be detained for longer than nine hours. Footnote 132

‘Obvious’ solutions suggested by the court to rectify this incompatibility is ‘some form of judicial or other independent and impartial scrutiny conducted in such a way as to protect the confidentiality in the material’. Footnote 133 An alternative approach, and one suggested by this article, would be for a narrower definition of terrorism to trigger schedule 7 stop and search powers.

While Dyson MR's interpretation does rein in somewhat the excesses of section 1 , concerns, nevertheless, remain. Dyson MR's second category of terrorist acts is based upon their consequences— the endangerment of a person's life or the creation of a serious risk to the health or safety of the public or section of the public. Footnote 134 In the examples given by Dyson MR and the Independent Reviewer, these consequences have already occurred and the prosecution is concerned with proving whether the individual intended these consequences or was reckless as to whether they would come to fruition. However, the primary function of counterterrorist powers is to prevent the consequences in the first instance— to ‘defend further up the field’. Footnote 135 The preventative nature of counterterrorist powers is the driving force behind the breadth of the definition of terrorism. Footnote 136 Interference with expression can therefore happen before publication or before the consequences occur. Journalists or other publishers are aware of this. Dyson MR's narrowing of the definition is thus of minimal assistance to the journalist as the ‘chilling effect’ still remains.

The chilling effect could be avoided by a tighter definition of terrorism to apply when the ‘action’ that is seeking to be prevented is a form of written or verbal expression, rather than an act of violence. For example, amending ‘influence the government’ in section 1 (1)(b) to ‘designed to compel, coerce or intimidate’ the government. Footnote 137 This would increase the threshold of what would be considered a terrorist publication, thus mitigating the chilling effect by reassuring journalists that they have greater freedom to express themselves. The narrowing, however, would be limited only to specific offences, thus not hampering the operational necessity of a broader definition in circumstances where it is considered necessary.

By departing from the single definitional approach, clarity could be brought to this area by drafting a separate definition of terrorism deal with inchoate offences or offences that deal with the publication or dissemination of terrorism. In this way, the mental element could be more clearly refined and elucidated in a manner that Parliament may have been reluctant to do for all other offences or powers that derive from section 1 . A multi-definitional approach could be used to design a legislative landscape for acts of terrorism committed outside the UK that would avoid, or at least reduce, the current reliance upon prosecutorial discretion that currently prevents its absurd, and at times hypocritical application.

V. Departing from the Single Definition: Legal versus Political Frames

A multiple definitional approach to terrorism therefore has significant advantages for the rule of law and human rights. As stated previously, however, this approach has been criticized as amounting to an expression of inconsistency. Footnote 138 Despite this concern, the UK's single definition of terrorism has also not been applied in a consistent fashion due to the broad discretion afforded to decision makers such as the CPS. Indeed, the UK government's actions overseas in Syria and Libya have also been inconsistent with this definition. Of course, section 1 was never designed to constrain the Government's actions; however, the argument may still be put that the inconsistency demonstrated by a multiple definitional approach may feed into public discourse on terrorism and thus reduce law's ability to influence this discussion. A key argument in favour of a single definition of terrorism that has not yet been confronted is the idea that by defining terrorism we can control it. Footnote 139 This ‘moral-political’ condemnation of political violence can, according to this argument, shape the debate and control the use of who or what is labelled a terrorist. Footnote 140 This argument thus conceptualizes law and legal definitions as shaping and framing the political debate; however, this contention overstates law's role in public discourse.

A. Framing Public Discourse on Terrorism

The subjective nature of the ‘terrorist’ label bestows a considerable power on the individual doing the categorizing. The British Government's use of the label ‘terrorist’ is not the application of the section 1 definition to a given individual or their acts; rather, we have seen that this conceptualization of terrorism deviates substantially from the legal definition, incorporating strategic political preferences and elements that are absent from section 1 . It is this conception of terrorism—not the section 1 definition—that shapes and ‘frames’ the subsequent public discourse surrounding the nature of terrorism. Footnote 141

According to RM Entman, to frame is ‘to select some aspects of a perceived reality and make them more salient in a communicating text, in such a way as to promote a particular problem definition, causal interpretation, moral evaluation, and/or treatment recommendation for the item described’. Footnote 142 Jim Kuypers further defines framing as:

… a process whereby communicators, consciously or unconsciously, act to construct a point of view that encourages the facts of a given situation to be interpreted by others in a particular manner. Frames operate in four key ways: they define problems, diagnose causes, make moral judgments, and suggest remedies. Footnote 143

Frames thus affect the manner in which individuals perceive and understand events. In public discourse, there will be competing frames proffered from various sources. Meaning is not found but is created by rhetors and, in this regard, the executive above all other branches of government is best placed to frame a crisis and interpret a particular act as terrorist or not. Footnote 144 This is the case, regardless of whether there exists a settled definition of terrorism in law. In the aftermath of a so-called ‘terrorist attack’ the media will react by seeking to apply a previously used narrative in order to filter information and make sense of the unfolding events. Footnote 145 Once the frame of ‘terrorism’ is established it dominates the reporting of the event to the exclusion of other competing frames. Footnote 146 Familiar sources of information will be approached in order to expedite the explanation and this, in turn, facilitates the agenda-setting role of the executive. Footnote 147

B. Constructing the Political Frame

Framing theory thus explains how politicians and, in particular, the executive construct the public narrative surrounding terrorism; however, it does not explain why there is a marked disjuncture between the legal definition of terrorism and the image constructed by the political narrative. Defining what constitutes an enemy to the State is of fundamental importance to politics, and law enforcement and punishment has always been a key feature of sovereign power. Footnote 148 The decision to differentiate friend from enemy is also closely linked to this expression of sovereignty. Footnote 149 This distinction between legitimate and illegitimate political violence is not done through law but instead through a process of ‘othering’. Footnote 150

Stanley Cohen, in his seminal work on othering and moral panics termed the groups that are the subject of these panics ‘folk devils’. Footnote 151 The ‘otherness’ of these folk devils—such as the archetypal terrorist—are reinforced by crude stereo-types based on race, religion and other factors. This folk-devil construct of the archetypal terrorist may be strong enough to displace the actual reality of the terrorist threat facing a State, both in the minds of the public and political actors. Thus the threat from Islamic extremist terrorism is more politically salient than that from dissident Irish republicanism, notwithstanding statistical evidence indicating that the latter has caused more deaths in the UK in the past five years than the former. Footnote 152 Indeed, Islamic extremist terrorism is such a strong frame that when other forms of terrorism do occur, the media is often reluctant to frame the act as terrorism. Thus the killing of MP Jo Cox in June 2016 by Thomas Mair who allegedly shouted out ‘put Britain first’ and gave his name in court as ‘death to traitors, freedom for Britain’ clearly satisfied the definition of terrorism; however, there was an appreciable reluctance from many media outlets to frame it as such at the time. Footnote 153 Instead, many outlets sought to emphasize Mair's struggles with mental illness; Footnote 154 a factor which others convicted of offences related to Islamic extremist terrorism also faced. Footnote 155 Moreover, the framing of Islamic terrorism as a global threat can be utilized to selectively conceptualize an attack anywhere in the world as an attack on the UK. A Government now does not have to experience first-hand an attack in its State for it to be able to invoke the rhetoric of an emergency, arguing that a threat exists which justifies exceptional counterterrorist measures that derogate from human rights and the rule of law. Islamic terrorism can thus be conceptualized as a global threat in a way that Irish republicanism never could.

The result of this is that the legal definition of terrorism cannot hope to control the use of the term ‘terrorism’ by political actors, the media or the public as a whole. Such arguments ignore the powerful functions that frames have in the public consciousness and agenda-setting, elevating the law to a lofty status of political influence that it simply does not occupy. At most, the legal definition of terrorism can only seek to demarcate and control public decision-makers when exercising counterterrorist powers. We have seen, however, that the current broad definition of terrorism contained in section 1 of the 2000 Act fails to do even that. This conclusion, while based on an analysis of British domestic law, also has ramifications for the necessity of a definition of terrorism in international law.

VI. Conclusions

The UK's current definition of terrorism contained in section 1 of the TA 2000 has worrying implications for the principle of legality and human rights. Moreover, it has minimal impact in shaping public and political discourses regarding what constitutes terrorism. At most, the legal definition of terrorism can only seek to demarcate and control public decision-makers when exercising counterterrorist powers. We have seen, however, that the current broad definition of terrorism contained in section 1 of the 2000 Act fails to do even that. Instead, it paves the way for the socially constructed terrorist to influence decision makers.

Further counterterrorist or counter-extremist strategies may exacerbate this issue further. Recent policy pronouncements from the British Government indicating a shift towards tackling ‘extremism’ rather than ‘terrorism’ will potentially increase reliance by decision makers on this social construct. The aim of counterterrorist legislation is distinct from the ordinarily reactive criminal justice system and seeks to ‘defend further up the field’, preventing attacks from happening in the first instance. Footnote 156 Focusing on ‘extremism’ rather than terrorism will shift this defence even further up. The British Government's ‘Comprehensive Strategy to Defeat Extremism’ Defines extremism as:

The vocal or active opposition to our fundamental values, including democracy, the rule of law, individual liberty and the mutual respect and tolerance of different faiths and beliefs. We also regard calls for the death of members of our armed forces as extremist. Footnote 157

Whether this definition of such considerable breadth is transposed into law is unclear; nevertheless, any legal definition of extremism will invariably suffer from similar accusations of vagueness that plague the section 1 definition of terrorism. This in turn will result in a huge degree of decision-maker discretion being exercised in order to prevent abuses of counter-extremist powers, again undermining the principle of legality that is a fundamental cornerstone of the British Constitution.

The pragmatic solution that this article suggests is to abandon the single definition of terrorism and instead have multiple definitions the breadths of which vary according to the particular power exercised. An alternative solution is not a legal one but a political one. The UK could act in the conduct of its international affairs in a manner consistent with its domestic definition of terrorism. This would entail providing no material or financial support to groups that are using armed force against the government of specific States. This approach would also be consistent with international law which prohibits the support for rebel groups against the incumbent government. This approach, however, in blunt terms, is unlikely to be realized. The power to distinguish friend from enemy is one that is intimately linked with sovereignty and one that governments will be loath to relinquish. Footnote 158 Even with a clear legal definition of terrorism, governments will still deviate from this when it is advantageous. This tendency is amplified in the context of the quest for a single definition of terrorism in the international setting. If a domestic definition of terrorism, agreed upon and shaped by the government cannot control the government in its actions, there is little hope for the quest for an international definition of terrorism that seeks to control and bind the various disparate perspectives on terrorists and freedom fighters in international law. Indeed, it is for this reason that Conor Gearty argues that terrorism is far too useful a term for governments for it to be controlled. Footnote 159 It is not the lack of a legal definition of terrorism in international law that has resulted in hegemonic powers like the US and UK deciding on a case-by-case basis who is the international public enemy. Footnote 160

I would like to thank Colin Murray, Fiona de Londras, Ntina Tzouvala and the anonymous reviewers for their helpful comments and suggestions on this article.

1 With the one narrow exception of the Reinsurance (Acts of Terrorism) Act 1993 which is specifically for the purposes of defining terrorism for insurance claims. Section 2(2) of the Act defines terrorism as: ‘acts of persons acting on behalf of, or in connection with, any organisation which carries out activities directed towards the overthrowing or influencing, by force or violence, of Her Majesty's government in the United Kingdom or any other government de jure or de facto’.

2 See Bingham , T , The Rule of Law ( Penguin 2011 ) Google Scholar ch 4.

3 D Anderson, ‘The Terrorism Acts in 2014: Report of the Independent Reviewer on the Operation of the Terrorism Act 2000 and Part I of the Terrorism Act 2006’ (September 2015) at < https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/09/Terrorism-Acts-Report-2015-Print-version.pdf > 2.

4 Perry , NJ , ‘ The Numerous Federal Legal Definitions of Terrorism: The Problem of Too Many Grails ’ ( 2004 ) 30 ( 2 ) Journal of Legislation 249 Google Scholar .

5 Hoffmann , B , Inside Terrorism: Revised and Expanded Edition ( Columbia University Press 2006 ) 2 Google Scholar .

6 Gearty , C , The Future of Terrorism ( Phoenix 1997 ) 5 Google Scholar .

7 Hoffmann (n 5).

9 ibid 8–9.

10 ibid 14.

11 ibid 16.

12 See (n 23).

13 R Jackson, L Jarvis, J Gunning and M Breen Smyth, Terrorism — a critical introduction (Palgrave MacMillan 2011) 164; Anderson , D. , ‘ Shielding the Compass ’ ( 2013 ) 3 EHRLR 233 Google Scholar , 240.

14 Hülsse , R and Spencer , A , ‘ The Metaphor of Terror: Terrorism Studies and the Constructivist Turn ’ ( 2008 ) 39 ( 6 ) Security Dialogue 571 CrossRef Google Scholar , 573.

15 ibid 575.

16 ibid 575–8.

18 See Schmid , AP and Jongman , AJ , Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature ( Transaction Books 1988 ) Google Scholar ch 1.

20 Brannan , D , Esler , P and Strindberg , T , ‘ Talking to “terrorists” towards an independent analytical framework for the study of violent substate activism ’ ( 2001 ) 24 Studies in Conflict and Terrorism 3 CrossRef Google Scholar , 11; Stampnitzky , L , Disciplining Terror: How Experts Invented “Terrorism” ( Cambridge University Press 2013 ) 5 CrossRef Google Scholar .

21 Blackbourn , J , Davis , F and Taylor , NC , ‘ Academic Consensus and Legislative Definitions of Terrorism: Applying Schmid and Jongman ’ ( 2013 ) 34 ( 3 ) Statute Law Review 239 CrossRef Google Scholar , 255.

22 Hoffmann (n 5) 23; Schmidt , AP , ‘ The Definition of Terrorism ’ in Schmid , AP (ed), The Routledge Handbook of Terrorism Research ( Routledge 2011 ) 39 – 40 CrossRef Google Scholar .

23 Friedrichs , J , ‘ Defining the International Public Enemy: The Political Struggle Behind the Legal Debate on International Terrorism ’ ( 2006 ) 19 LJIL 69 CrossRef Google Scholar , 76.

24 ibid 72–6.

25 ibid 76–7.

26 ibid 80.

27 ibid 72–3. See also Brulin , R , ‘ Defining “Terrorism”: The 1972 General Assembly debates on “international terrorism” and their coverage by the New York Times ’ in Baybars-Hawks , B and Baruh , L (eds), If It Was Not for Terrorism: Crisis, Compromise, and Elite Discourse in the Age of War on Terror ( Cambridge Scholars Publishing 2011 ) 12 Google Scholar .

28 Levitt , G , ‘ Is “Terrorism” Worth Defining? ’ ( 1986 ) 13 ( 1 ) OhioNULRev 97 Google Scholar ,101; The European Union has also has a single definition of terrorism although the UK has adopted out of this. See Council Framework Decision 2002/475 on Combating Terrorism.

29 ibid 97.

30 ibid 109.

31 ibid 97.

32 ibid 97.

33 C Walter, ‘Defining Terrorism in National and International Law’ (Paper presented at the Max Planck Society Conference on Terrorism as a Challenge for National and International Law, Heidelberg, 24 January 2003) < https://www.unodc.org/tldb/bibliography/Biblio_Terr_Def_Walter_2003.pdf > 10.

See eg de Londras , F , ‘ Terrorism as an International Crime ’ in Schabas , W and Bernaz , N (eds), Routledge Handbook of International Criminal Law ( Routledge 2010 ) 167 Google Scholar , 167.

34 Golder , B and Williams , G , ‘ What is “Terrorism” Problems of a Legal Definition ’ ( 2004 ) 27 ( 2 ) UNSWLJ 270 Google Scholar , 288.

35 See Schmid , AP , ‘ The Response Problem as a Definition Problem ’ ( 1992 ) 4 ( 4 ) Terrorism and Political Violence 7 CrossRef Google Scholar .

36 Levitt (n 28) 110.

37 ibid 109–10.

38 ibid 110–11, 115; Baxter , RR , ‘ A Skeptical Look at the Concept of Terrorism ’ ( 1974 ) 7 AkronLRev 380 Google Scholar , 380.

39 ibid 111.

40 Carr , C , ‘ Why the Definition of Terrorism Must be Broad ’ ( 2007 ) 24 ( 1 ) World Policy Journal 47 CrossRef Google Scholar , 47.

41 ibid 48.

42 Saul , B , ‘ Defining “Terrorism” to Protect Human Rights ’ in Staines , D (ed), Interrogating the War on Terror: Interdisciplinary Perspectives ( Cambridge Scholars Press 2007 ) 190 Google Scholar , 210.

43 See (n 34).

44 Grozdanova , R , ‘ ‘‘Terrorism” — Too Elusive a Term for an International Legal Definition? ’ ( 2014 ) 61 ( 3 ) NILR 305 CrossRef Google Scholar , 315.

45 See (n 142).

46 Lord Lloyd, Inquiry into Legislation against Terrorism: Volume 1 (TSO 1996) 24 Netherlands International Law Review 6.

47 Prevention of Terrorism Act 1974, section 14(1).

48 Lloyd (n 46) 26.

50 Walker , C , Blackstone's Guide to The Anti-Terrorism Legislation ( Oxford University Press 2002 ) 21 Google Scholar .

51 Perry , NJ , ‘ The Numerous Federal Legal Definitions of Terrorism: The Problem of Too Many Grails ’ ( 2004 ) 30 ( 2 ) Journal of Legislation 249 Google Scholar , 269.

52 ibid 272.

53 See (n 37).

54 Lord Carlisle, ‘The Definition of Terrorism’ (Cm 7052, March 2007).

55 ibid 19.

56 Walter (n 33).

57 See Bingham (n 2); Tamanaha , B , On The Rule of Law: History, Politics, Theory ( Cambridge University Press 2007 ) Google Scholar ; Craig , P , ‘ Formal and Substantive Conceptions of the Rule of Law: An Analytical Framework ’ [ 1997 ] PL 567 Google Scholar .

58 Fuller , L , The Morality of Law ( Yale University Press 1969 ) 74 Google Scholar .

59 Dicey , AV , Introduction to the Study of the Law of the Constitution ( 6th edn , Macmillan and Co 1902 ) 183 –4 Google Scholar .

60 See Schmitt , C , Political Theology: Four Chapters on the Concept of Sovereignty ( Schwab , G trans, University of Chicago Press 2005 ) Google Scholar ; McCormick , JP , ‘ The Dilemmas of Dictatorship: Carl Schmitt and Constitutional Emergency Powers ’ ( 1997 ) 10 CJLJ 163 Google Scholar , 169.

61 Thus the Code of Hammurabi reflected at a minimum level of a formal concept of the rule of law. By prescribing an ‘eye for an eye’ the punishment is known before an individual conducts their affairs. See Pound , R , ‘ The End of Law as Developed in Legal Rules and Doctrines ’ ( 1914 ) 27 ( 3 ) HarvLRev 195 Google Scholar , 199.

62 R v Gul [2013] UKSC 64. See also Greene , A , ‘ The Quest for a Satisfactory Definition of Terrorism: R v Gul ’ ( 2014 ) 77 ( 5 ) MLR 780 CrossRef Google Scholar .

63 ibid [2].

64 ibid [24].

67 ibid [53].

68 ibid [18].

69 See (n 23).

70 Gul (n 62) [30]; Greene (n 62) 783.

71 ibid at [40].

72 ibid 15 at [40].

73 Greene (n 62) 785.

74 Gul (n 62) [26].

75 See Elliott , M , The Constitutional Foundations of Judicial Review ( Hart Publishing 2001 ) Google Scholar ch 4.

76 See Anisminic v Foreign Compensation Commission [1969] 2 AC 147; R v Evans [2015] UKSC 21.

77 Gul (n 62) at [62].

78 ibid [63].

79 Art 15.2 ECHR.

80 See Harris , DJ , O'Boyle , M , Bates , EP and Buckley , CM , Law of the European Convention on Human Rights ( 2nd edn , Oxford University Press , 2009 ) Google Scholar ch 10.

81 ibid ; Engels v Netherlands A 22 (197) EHRR 706.

82 Brogan v UK A 145-B (1988) 11 EHRR 117 PC, para. 51.

83 Ireland v United Kingdom A 25 (1978) 2 EHRR 25.

84 ibid para 85; 16 Yearbook of the Convention, 24–6.

85 See Greene , A , ‘ Separating Normalcy from Emergency: The Jurisprudence of Article 15 of the European Convention on Human Rights ’ ( 2011 ) 12 ( 10 ) German Law Journal 1764 CrossRef Google Scholar ; Gross , O and Aoláin , F Ní , ‘ From Discretion to Scrutiny: Revisiting the Application of the Margin of Appreciation Doctrine in the Context of Article 15 of the European Convention on Human Rights ’ ( 2001 ) 3 HumRtsQ 623 Google Scholar .

86 Brogan (n 82) [48].

87 See (n 47).

88 Gillan and Quinton v United Kingdom ECtHR 12 January 2010.

89 ibid [76].

90 ibid , quoting S and Marper v United Kingdom [2008] ECHR 1581.

91 See text to n 122 below for a discussion of Miranda v SSHD where the Court of Appeal issued a declaration of incompatibility against schedule 7 of the 2000 Act which permits stop and search powers of individuals suspected of terrorism at UK borders.

92 Terrorism Act 2000, section 1 (4)(d).

93 R v F [2007] QB 960; Terrorism Act 2000, section 58(1)(b).

94 ibid [5]

96 ibid [6].

97 ibid [26].

98 ibid [27].

99 ibid [29].

100 Saul , B , ‘ Terrorism as a Legal Concept ’ in Lennon , G and Walker , C (eds), Routledge Handbook of Law and Terrorism ( Routledge 2015 ) Google Scholar ch 3; Sydney Law School Research Paper No 15/85 available at SSRN < http://ssrn.com/abstract=2664404 > 9.

101 UNSC Res 1973 (17 March 2011) UN Doc S/RES/1973.

102 See NATO, ‘Operation UNIFIED PROTECTOR: Final Mission Stats’ (2 November 2011) < http://www.nato.int/nato_static/assets/pdf/pdf_2011_11/20111108_111107-factsheet_up_factsfigures_en.pdf >.

103 O Corten and V Koutroulis, ‘The Illegality of Military Support to Rebels in the Libyan War: Aspects of jus contra bellum and jus in bello’ (2013) 18(1) JC&SL 59.

105 ibid 71–3.

106 ibid 65; UN General Assembly (UNGA) Res 2625 (XXV) (24 October 1970);

107 Corten and Koutroulis (n 103) 71–3.

108 See Talmon , S , ‘ Recognition of the Libyan National Transitional Council ’ ( 2011 ) 15 ( 16 ) ASIL Insights Google Scholar < https:// www.asil.org/insights/volume/15/issue/16/recognition-libyan-national-transitional-council >; ‘Libya: France Recognises Rebels as Government’ (BBC News, 10 March 2011) < http://www.bbc.com/news/world-africa-12699183 >; ‘Britain Recognises Libyan Rebels as Legitimate Government’ (CNN News, 27 July 2011) < http://edition.cnn.com/2011/WORLD/europe/07/27/uk.libya.embassy/ >.

109 Corten and Koutroulis (n 103) 87–90.

110 R v F (n 93) [30].

111 HC Deb 29 Aug 2013, vol 566, cols 1426–1556.

112 HC Deb2 Dec 2015, vol 603, cols 323–500.

113 R Spencer and R Sherlock, ‘Britain officially recognises new Syrian rebel coalition as country's ‘‘legitimate’’ government’ The Telegraph (20 November 2012) < http://www.telegraph.co.uk/news/9691319/Britain-officially-recognises-new-Syrian-rebel-coalition-as-countrys-legitimate-government.html >.

114 ‘UK Non-Humanitarian Aid in Response to the Syria Conflict’ < https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/371647/Syria_UK_Non-Humanitarian_Support_-_Public_document__3_Apr___3_.pdf > 1.

115 R Norton-Taylor, ‘Terror Trial Collapses after Fears of Deep Embarrassment to Security Services’ The Guardian (1 June 2015) < http://www.theguardian.com/uk-news/2015/jun/01/trial-swedish-man-accused-terrorism-offences-collapse-bherlin-gildo > KJ Heller, ‘British Government says “Oops, Our Bad” in Terrorism Case’ (Opinio Juris, 7 September 2015) < http://opiniojuris.org/2015/09/07/uk-government-says-oops-our-bad-in-terrorism-case/ >.

116 Crown Prosecution Service, ‘The Code for Crown Prosecutors’ (January 2013) < https:// www.cps.gov.uk/publications/docs/code_2013_accessible_english.pdf > 7–10 .

117 Terrorism Act 2000, section 117; Terrorism Act 2006, Pt I.

118 Walker , C , Terrorism and the Law ( Oxford University Press 2011 ) 38 Google Scholar .

119 See Reinsurance (Acts of Terrorism) Act 1993 (n 1).

120 D Anderson, ‘Second Report of the Independent Reviewer on the Operation of the Terrorism Prevention and Investigation Measures Act 2011’ (TSO 2014) 51–3.

121 ibid 48–9.

122 [2016] EWCA Civ 6.

123 See G Greenwald, E MacAskill and L Poitras, ‘Edward Snowden: The whistleblower behind the NSA surveillance revelations’ The Guardian (11 June 2013) < http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance >.

124 Terrorism Act 2000, section 40(1)(b).

125 Miranda (n 122) [41].

126 ibid [43].

127 ibid [46].

128 ibid [47].

129 D Anderson, ‘The Terrorism Acts in 2013: Report of the Independent Reviewer on the Operation of the Terrorism Act 2000 and Part 1 of the Terrorism Act 2006’ (TSO 2014) at [4.19].

130 Miranda (n 122) [53]–[54].

131 ibid [56].

132 ibid [113].

133 ibid [119].

134 See (n 130).

135 Anderson , D , ‘ Shielding the Compass ’ ( 2013 ) 3 EHRLR 233 Google Scholar , 243.

136 Walker , C , ‘ The Legal Definition of “Terrorism” in United Kingdom Law and Beyond ’ [ 2007 ] PL 331 Google Scholar , 337.

137 The Independent Reviewer in his 2014 Report suggested changing ‘influence’ to ‘designed to compel, coerce or undermine the government or an international organisation’. See D Anderson, ‘The Terrorism Acts in 2013: Report of the Independent Reviewer on the Operation of the Terrorism Act 2000 and Part 1 of the Terrorism Act 2006’ (TSO 2014) [10.35–10.43].

138 Perry (n 4).

139 Saul (n 42).

141 Thus Conor Gearty argues that it is this actual use of this term ‘terrorism’ that shapes legal, political and public discussions on the issue. See Gearty , C , ‘ Human Rights in an Age of Counter-Terrorism ’ in Gearty , C , Essays on Human Rights and Terrorism: Comparative Approaches to Civil Liberties in Asia, the EU and North America ( Cameron May Publishers , 2008 ) 565 –6 Google Scholar ; Grozdanova (n 44) 315.

142 Entman , RM , ‘ Framing: Toward Clarification of a Fractured Paradigm ’ ( 1993 ) 43 ( 1 ) Journal of Communication 51 CrossRef Google Scholar ; Papacharissi , Z and de Fatima Oliveira , M , ‘ News Frames Terrorism: A Comparative Analysis of Frames Employed in Terrorism Coverage in US and UK Newspapers ’ ( 2008 ) 13 ( 1 ) International Journal of Press/Politics 52 CrossRef Google Scholar , 53.

143 Kuypers , JA , Bush's War: Media Bias and Justifications for War in a Terrorist Age ( Rowman & Littlefield 2009 ) 8 Google Scholar ; Gross , O and Aoláin , F Ní , ‘ The Rhetoric of War: Words, Conflict, and Categorisation Post-9/11 ’ ( 2014 ) 24 ( 2 ) Cornell Journal of Law and Public Policy 241 Google Scholar , 247.

144 Gross and Ní Aoláin, ibid; see also generally Stuckey , ME , The President as Interpreter-in-Chief ( CQ Press 1991 ) Google Scholar ; and Neustadt , RE , Presidential Power: The Politics of Leadership from FDR to Carter ( Wiley 1980 ) Google Scholar .

145 Norris , P , Kern , M and Just , M (eds), Framing Terrorism: The News Media, The Government, and the Public ( Routledge 2003 ) 12 – 14 Google Scholar .

146 See, for example, the June 2016 mass shooting in a gay nightclub in Orlando Florida. Initially framed as a homophobic attack, the subsequent establishment of a possible Islamic extremist motivation dominated the reporting of the event from that point on. See A Greene, ‘Orlando Massacre shows our understanding of ‘‘terrorism’’ is too focused on jihad’ The Conversation (14 June 2016) < https://theconversation.com/orlando-massacre-shows-our-understanding-of-terrorism-is-too-focused-on-jihad-60949 >.

148 See Garland , D , ‘ The Limits of the Sovereign State ’ ( 1996 ) 36 ( 4 ) British Journal of Criminology 445 CrossRef Google Scholar ; Kahn , P , ‘ Torture and Democratic Violence ’ ( 2009 ) 22 ( 2 ) Ratio Juris 244 CrossRef Google Scholar .

149 See Schmitt , C , The Concept of the Political ( Schwab , G trans, University of Chicago Press 2007 ) 26 CrossRef Google Scholar ; Bökenförde , E-W , ‘ The Concept of the Political: A Key to Understanding Carl Schmitt's Constitutional Theory ’ ( 1997 ) 10 Canadian Journal of Law and Jurisprudence 5 CrossRef Google Scholar ;

150 Garland , D , The Culture of Control: Crime and Social Order in Contemporary Societies ( OUP 2001 ) 184 CrossRef Google Scholar .

151 See Cohen , S , Folk Devils and Moral Panics ( 3rd edn , Routledge , 2002 ) Google Scholar .

152 Anderson (n 3) 12.

153 D Boffey and N Slawson, ‘Jo Cox accused gives name as “death to traitors, freedom for Britain”’ The Guardian (18 June 2016) < https://www.theguardian.com/uk-news/2016/jun/18/jo-cox-murder-suspect-thomas-mair-told-police-he-was-political-activist >.

154 ‘Wrong to Make Political Capital from Jo Cox's Death’ The Daily Express (17 June 2016) < http://www.express.co.uk/comment/expresscomment/681026/jo-cox-mp-murdered-killed-wrong-political-capital > P Foster, R Mendick and M Wilkinson, ‘Thomas Mair: Man arrested in connection with Jo Cox attack was a ‘‘loner’’ with ‘‘history of mental health problems’’’ The Telegraph (16 June 2016) < http://www.telegraph.co.uk/news/2016/06/16/jo-cox-mp-everything-we-know-so-far-about-thomas-mair/ >.

155 J Grierson, ’ Leytonstone tube attacker “psychotic” at time of assault, court told’ The Guardian (27 July 2016) < https://www.theguardian.com/uk-news/2016/jul/27/leytonstone-tube-attacker-muhiddin-mire-psychotic-court-told > P Cheston and J Davenport, ‘Lee Rigby murderer Adebowale ‘‘is borderline schizophrenic recommended for Broadmoor’’’ The London Evening Standard (19 December 2013) < http://www.standard.co.uk/news/crime/lee-rigby-murderer-adebowale-is-borderline-schizophrenic-recommended-for-broadmoor-9015617.html >.

156 Anderson (n 13).

157 Home Office, Counter Extremism Strategy (CM 9148, 2015) 9.

158 See (n 148).

159 Gearty, Terror (Faber and Faber 1991) 6.

160 As suggested by Friedrichs (n 23) and Grozdanova (n 44).

Crossref logo

This article has been cited by the following publications. This list is generated based on data provided by Crossref .

  • Google Scholar

View all Google Scholar citations for this article.

Save article to Kindle

To save this article to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle .

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Volume 66, Issue 2
  • Alan Greene (a1)
  • DOI: https://doi.org/10.1017/S0020589317000070

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox .

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive .

Reply to: Submit a response

- No HTML tags allowed - Web page URLs will display as text only - Lines and paragraphs break automatically - Attachments, images or tables are not permitted

Your details

Your email address will be used in order to notify you when your comment has been reviewed by the moderator and in case the author(s) of the article or the moderator need to contact you directly.

You have entered the maximum number of contributors

Conflicting interests.

Please list any fees and grants from, employment by, consultancy for, shared ownership in or any close relationship with, at any time over the preceding 36 months, any organisation whose interests may be affected by the publication of the response. Please also list any non-financial associations or interests (personal, professional, political, institutional, religious or other) that a reasonable reader would want to know about in relation to the submitted work. This pertains to all the authors of the piece, their spouses or partners.

  • DOI: 10.4324/9781315612133
  • Corpus ID: 153301794

Terrorism, War and International Law: The Legality of the Use of Force Against Afghanistan in 2001

  • M. Williamson
  • Published 20 May 2009
  • Law, Political Science

32 Citations

Necessity within the legal framework of self-defence against terrorism, towards a critical discourse analysis of new zealand security policy in afghanistan, a re-assesment [sic] of the effectiveness of oau (au) conventions on preventing and combating terrorism, need for a globally agreed upon defintion of terrorism, force of circumstance: the european arrest warrant and human rights, discursive security: f.b.i. stings and the nature of peace, the true meaning of terrorism and response to terrorism, individual protection versus national security : a balancing test concerning the principle of non-refoulement, historical background of the criminalization of aggression, our holy grail: states, power, and networks in the stymied global quest to define terrorism, related papers.

Showing 1 through 3 of 0 Related Papers

Terrorism and International Humanitarian Law

RESEARCH HANDBOOK ON INTERNATIONAL LAW AND TERRORISM, B. Saul, ed., Edward Elgar, pp. 208-231, 2014

Sydney Law School Research Paper No. 14/16

17 Pages Posted: 13 Feb 2014 Last revised: 19 Aug 2022

The University of Sydney - Faculty of Law

Date Written: February 11, 2014

This chapter focuses on the threshold issue when international humanitarian law (IHL) applies to violence involving terrorism or terrorist groups, in the context of international or non-international armed conflicts. It discusses the particularly complex problem of ‘transnational’ violence and the geographical and temporal scope of hostilities. It then considers the legal consequences of the classification of conflicts, as regards targeting, detention, substantive criminal liabilities, and criminal trial procedure. Overall the challenge of terrorism has principally impelled a clarification of existing IHL norms but without generating terrorism-specific rules or refashioning IHL’s basic norms. Terrorists can be targeted for direct participation in hostilities; administratively detained where they are dangerous; and prosecuted for war crimes. Human rights law applies alongside the lex specialis of IHL to supplement its rules in certain areas, particularly as regards detention in non-international conflict. There is no need for any special status of ‘terrorist’ in IHL, which would only serve to diminish existing humanitarian protections. The chapter concludes with observations about the impact of international counter-terrorism law on the effectiveness of IHL, including its balance between military necessity and humanitarian protection.

Keywords: terrorism, armed conflict, international humanitarian law, detention, targeting, direct participation in hostilities, war crimes

JEL Classification: K10, K30, K33

Suggested Citation: Suggested Citation

Ben Saul (Contact Author)

The university of sydney - faculty of law ( email ).

New Law Building, F10 The University of Sydney Sydney, NSW 2006 Australia

HOME PAGE: http://https://sydney.edu.au/law/about/people/profiles/ben.saul.php

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, law & humanities ejournal.

Subscribe to this fee journal for more curated articles on this topic

Public International Law: Human Rights eJournal

Law & society: international & comparative law ejournal, social & political philosophy ejournal.

Subscribe to this free journal for more curated articles on this topic

Law & Society: Public Law - Crime, Criminal Law, & Punishment eJournal

National security & foreign relations law ejournal, law, international affairs & csr ejournal, human rights & the corporation ejournal, international, transnational & comparative criminal law ejournal, types of offending ejournal, conflict studies: prevention, management & resolution ejournal, conflict studies: terrorism ejournal, human rights ejournal.

  • Search Menu
  • Sign in through your institution
  • Browse content in A - General Economics and Teaching
  • Browse content in A1 - General Economics
  • A10 - General
  • A12 - Relation of Economics to Other Disciplines
  • A13 - Relation of Economics to Social Values
  • A14 - Sociology of Economics
  • Browse content in A2 - Economic Education and Teaching of Economics
  • A29 - Other
  • Browse content in B - History of Economic Thought, Methodology, and Heterodox Approaches
  • B0 - General
  • Browse content in B1 - History of Economic Thought through 1925
  • B11 - Preclassical (Ancient, Medieval, Mercantilist, Physiocratic)
  • B12 - Classical (includes Adam Smith)
  • Browse content in B2 - History of Economic Thought since 1925
  • B20 - General
  • B21 - Microeconomics
  • B22 - Macroeconomics
  • B25 - Historical; Institutional; Evolutionary; Austrian
  • B26 - Financial Economics
  • Browse content in B3 - History of Economic Thought: Individuals
  • B31 - Individuals
  • Browse content in B4 - Economic Methodology
  • B41 - Economic Methodology
  • Browse content in B5 - Current Heterodox Approaches
  • B55 - Social Economics
  • Browse content in C - Mathematical and Quantitative Methods
  • Browse content in C0 - General
  • C00 - General
  • C02 - Mathematical Methods
  • Browse content in C1 - Econometric and Statistical Methods and Methodology: General
  • C10 - General
  • C11 - Bayesian Analysis: General
  • C12 - Hypothesis Testing: General
  • C13 - Estimation: General
  • C14 - Semiparametric and Nonparametric Methods: General
  • C15 - Statistical Simulation Methods: General
  • C19 - Other
  • Browse content in C2 - Single Equation Models; Single Variables
  • C21 - Cross-Sectional Models; Spatial Models; Treatment Effect Models; Quantile Regressions
  • C22 - Time-Series Models; Dynamic Quantile Regressions; Dynamic Treatment Effect Models; Diffusion Processes
  • C23 - Panel Data Models; Spatio-temporal Models
  • C24 - Truncated and Censored Models; Switching Regression Models; Threshold Regression Models
  • C25 - Discrete Regression and Qualitative Choice Models; Discrete Regressors; Proportions; Probabilities
  • C26 - Instrumental Variables (IV) Estimation
  • Browse content in C3 - Multiple or Simultaneous Equation Models; Multiple Variables
  • C31 - Cross-Sectional Models; Spatial Models; Treatment Effect Models; Quantile Regressions; Social Interaction Models
  • C32 - Time-Series Models; Dynamic Quantile Regressions; Dynamic Treatment Effect Models; Diffusion Processes; State Space Models
  • C33 - Panel Data Models; Spatio-temporal Models
  • C34 - Truncated and Censored Models; Switching Regression Models
  • C35 - Discrete Regression and Qualitative Choice Models; Discrete Regressors; Proportions
  • C36 - Instrumental Variables (IV) Estimation
  • Browse content in C4 - Econometric and Statistical Methods: Special Topics
  • C41 - Duration Analysis; Optimal Timing Strategies
  • C43 - Index Numbers and Aggregation
  • Browse content in C5 - Econometric Modeling
  • C51 - Model Construction and Estimation
  • C52 - Model Evaluation, Validation, and Selection
  • C53 - Forecasting and Prediction Methods; Simulation Methods
  • C54 - Quantitative Policy Modeling
  • Browse content in C6 - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling
  • C60 - General
  • C61 - Optimization Techniques; Programming Models; Dynamic Analysis
  • C62 - Existence and Stability Conditions of Equilibrium
  • C63 - Computational Techniques; Simulation Modeling
  • Browse content in C7 - Game Theory and Bargaining Theory
  • C71 - Cooperative Games
  • C72 - Noncooperative Games
  • C73 - Stochastic and Dynamic Games; Evolutionary Games; Repeated Games
  • C78 - Bargaining Theory; Matching Theory
  • Browse content in C8 - Data Collection and Data Estimation Methodology; Computer Programs
  • C81 - Methodology for Collecting, Estimating, and Organizing Microeconomic Data; Data Access
  • C82 - Methodology for Collecting, Estimating, and Organizing Macroeconomic Data; Data Access
  • C83 - Survey Methods; Sampling Methods
  • Browse content in C9 - Design of Experiments
  • C90 - General
  • C91 - Laboratory, Individual Behavior
  • C92 - Laboratory, Group Behavior
  • C93 - Field Experiments
  • Browse content in D - Microeconomics
  • Browse content in D0 - General
  • D00 - General
  • D01 - Microeconomic Behavior: Underlying Principles
  • D02 - Institutions: Design, Formation, Operations, and Impact
  • D03 - Behavioral Microeconomics: Underlying Principles
  • D04 - Microeconomic Policy: Formulation; Implementation, and Evaluation
  • Browse content in D1 - Household Behavior and Family Economics
  • D10 - General
  • D11 - Consumer Economics: Theory
  • D12 - Consumer Economics: Empirical Analysis
  • D13 - Household Production and Intrahousehold Allocation
  • D14 - Household Saving; Personal Finance
  • D15 - Intertemporal Household Choice: Life Cycle Models and Saving
  • D16 - Collaborative Consumption
  • D18 - Consumer Protection
  • D19 - Other
  • Browse content in D2 - Production and Organizations
  • D21 - Firm Behavior: Theory
  • D22 - Firm Behavior: Empirical Analysis
  • D23 - Organizational Behavior; Transaction Costs; Property Rights
  • D24 - Production; Cost; Capital; Capital, Total Factor, and Multifactor Productivity; Capacity
  • D29 - Other
  • Browse content in D3 - Distribution
  • D30 - General
  • D31 - Personal Income, Wealth, and Their Distributions
  • D33 - Factor Income Distribution
  • D39 - Other
  • Browse content in D4 - Market Structure, Pricing, and Design
  • D40 - General
  • D41 - Perfect Competition
  • D42 - Monopoly
  • D43 - Oligopoly and Other Forms of Market Imperfection
  • D44 - Auctions
  • Browse content in D5 - General Equilibrium and Disequilibrium
  • D50 - General
  • D53 - Financial Markets
  • D58 - Computable and Other Applied General Equilibrium Models
  • Browse content in D6 - Welfare Economics
  • D60 - General
  • D61 - Allocative Efficiency; Cost-Benefit Analysis
  • D62 - Externalities
  • D63 - Equity, Justice, Inequality, and Other Normative Criteria and Measurement
  • D64 - Altruism; Philanthropy
  • D69 - Other
  • Browse content in D7 - Analysis of Collective Decision-Making
  • D70 - General
  • D71 - Social Choice; Clubs; Committees; Associations
  • D72 - Political Processes: Rent-seeking, Lobbying, Elections, Legislatures, and Voting Behavior
  • D73 - Bureaucracy; Administrative Processes in Public Organizations; Corruption
  • D74 - Conflict; Conflict Resolution; Alliances; Revolutions
  • D78 - Positive Analysis of Policy Formulation and Implementation
  • Browse content in D8 - Information, Knowledge, and Uncertainty
  • D80 - General
  • D81 - Criteria for Decision-Making under Risk and Uncertainty
  • D82 - Asymmetric and Private Information; Mechanism Design
  • D83 - Search; Learning; Information and Knowledge; Communication; Belief; Unawareness
  • D84 - Expectations; Speculations
  • D85 - Network Formation and Analysis: Theory
  • D86 - Economics of Contract: Theory
  • Browse content in D9 - Micro-Based Behavioral Economics
  • D90 - General
  • D91 - Role and Effects of Psychological, Emotional, Social, and Cognitive Factors on Decision Making
  • D92 - Intertemporal Firm Choice, Investment, Capacity, and Financing
  • Browse content in E - Macroeconomics and Monetary Economics
  • Browse content in E0 - General
  • E00 - General
  • E01 - Measurement and Data on National Income and Product Accounts and Wealth; Environmental Accounts
  • E02 - Institutions and the Macroeconomy
  • Browse content in E1 - General Aggregative Models
  • E10 - General
  • E11 - Marxian; Sraffian; Kaleckian
  • E12 - Keynes; Keynesian; Post-Keynesian
  • E13 - Neoclassical
  • E19 - Other
  • Browse content in E2 - Consumption, Saving, Production, Investment, Labor Markets, and Informal Economy
  • E20 - General
  • E21 - Consumption; Saving; Wealth
  • E22 - Investment; Capital; Intangible Capital; Capacity
  • E23 - Production
  • E24 - Employment; Unemployment; Wages; Intergenerational Income Distribution; Aggregate Human Capital; Aggregate Labor Productivity
  • E25 - Aggregate Factor Income Distribution
  • E27 - Forecasting and Simulation: Models and Applications
  • Browse content in E3 - Prices, Business Fluctuations, and Cycles
  • E30 - General
  • E31 - Price Level; Inflation; Deflation
  • E32 - Business Fluctuations; Cycles
  • E37 - Forecasting and Simulation: Models and Applications
  • Browse content in E4 - Money and Interest Rates
  • E40 - General
  • E41 - Demand for Money
  • E42 - Monetary Systems; Standards; Regimes; Government and the Monetary System; Payment Systems
  • E43 - Interest Rates: Determination, Term Structure, and Effects
  • E44 - Financial Markets and the Macroeconomy
  • E47 - Forecasting and Simulation: Models and Applications
  • Browse content in E5 - Monetary Policy, Central Banking, and the Supply of Money and Credit
  • E50 - General
  • E51 - Money Supply; Credit; Money Multipliers
  • E52 - Monetary Policy
  • E58 - Central Banks and Their Policies
  • Browse content in E6 - Macroeconomic Policy, Macroeconomic Aspects of Public Finance, and General Outlook
  • E60 - General
  • E61 - Policy Objectives; Policy Designs and Consistency; Policy Coordination
  • E62 - Fiscal Policy
  • E63 - Comparative or Joint Analysis of Fiscal and Monetary Policy; Stabilization; Treasury Policy
  • E65 - Studies of Particular Policy Episodes
  • E69 - Other
  • Browse content in E7 - Macro-Based Behavioral Economics
  • E70 - General
  • E71 - Role and Effects of Psychological, Emotional, Social, and Cognitive Factors on the Macro Economy
  • Browse content in F - International Economics
  • Browse content in F0 - General
  • F02 - International Economic Order and Integration
  • Browse content in F1 - Trade
  • F10 - General
  • F11 - Neoclassical Models of Trade
  • F12 - Models of Trade with Imperfect Competition and Scale Economies; Fragmentation
  • F13 - Trade Policy; International Trade Organizations
  • F14 - Empirical Studies of Trade
  • F15 - Economic Integration
  • F16 - Trade and Labor Market Interactions
  • F17 - Trade Forecasting and Simulation
  • F18 - Trade and Environment
  • Browse content in F2 - International Factor Movements and International Business
  • F21 - International Investment; Long-Term Capital Movements
  • F22 - International Migration
  • F23 - Multinational Firms; International Business
  • F24 - Remittances
  • Browse content in F3 - International Finance
  • F30 - General
  • F31 - Foreign Exchange
  • F32 - Current Account Adjustment; Short-Term Capital Movements
  • F33 - International Monetary Arrangements and Institutions
  • F34 - International Lending and Debt Problems
  • F35 - Foreign Aid
  • F36 - Financial Aspects of Economic Integration
  • F37 - International Finance Forecasting and Simulation: Models and Applications
  • Browse content in F4 - Macroeconomic Aspects of International Trade and Finance
  • F40 - General
  • F41 - Open Economy Macroeconomics
  • F42 - International Policy Coordination and Transmission
  • F43 - Economic Growth of Open Economies
  • F44 - International Business Cycles
  • F45 - Macroeconomic Issues of Monetary Unions
  • Browse content in F5 - International Relations, National Security, and International Political Economy
  • F50 - General
  • F51 - International Conflicts; Negotiations; Sanctions
  • F52 - National Security; Economic Nationalism
  • F53 - International Agreements and Observance; International Organizations
  • F55 - International Institutional Arrangements
  • F59 - Other
  • Browse content in F6 - Economic Impacts of Globalization
  • F62 - Macroeconomic Impacts
  • F63 - Economic Development
  • F64 - Environment
  • Browse content in G - Financial Economics
  • Browse content in G0 - General
  • G01 - Financial Crises
  • G02 - Behavioral Finance: Underlying Principles
  • Browse content in G1 - General Financial Markets
  • G10 - General
  • G11 - Portfolio Choice; Investment Decisions
  • G12 - Asset Pricing; Trading volume; Bond Interest Rates
  • G14 - Information and Market Efficiency; Event Studies; Insider Trading
  • G15 - International Financial Markets
  • G18 - Government Policy and Regulation
  • Browse content in G2 - Financial Institutions and Services
  • G20 - General
  • G21 - Banks; Depository Institutions; Micro Finance Institutions; Mortgages
  • G22 - Insurance; Insurance Companies; Actuarial Studies
  • G24 - Investment Banking; Venture Capital; Brokerage; Ratings and Ratings Agencies
  • G28 - Government Policy and Regulation
  • Browse content in G3 - Corporate Finance and Governance
  • G30 - General
  • G32 - Financing Policy; Financial Risk and Risk Management; Capital and Ownership Structure; Value of Firms; Goodwill
  • G33 - Bankruptcy; Liquidation
  • G34 - Mergers; Acquisitions; Restructuring; Corporate Governance
  • G35 - Payout Policy
  • G38 - Government Policy and Regulation
  • Browse content in G5 - Household Finance
  • G51 - Household Saving, Borrowing, Debt, and Wealth
  • Browse content in H - Public Economics
  • Browse content in H0 - General
  • H00 - General
  • Browse content in H1 - Structure and Scope of Government
  • H10 - General
  • H11 - Structure, Scope, and Performance of Government
  • H12 - Crisis Management
  • Browse content in H2 - Taxation, Subsidies, and Revenue
  • H20 - General
  • H21 - Efficiency; Optimal Taxation
  • H22 - Incidence
  • H23 - Externalities; Redistributive Effects; Environmental Taxes and Subsidies
  • H24 - Personal Income and Other Nonbusiness Taxes and Subsidies; includes inheritance and gift taxes
  • H25 - Business Taxes and Subsidies
  • H26 - Tax Evasion and Avoidance
  • Browse content in H3 - Fiscal Policies and Behavior of Economic Agents
  • H30 - General
  • H31 - Household
  • Browse content in H4 - Publicly Provided Goods
  • H40 - General
  • H41 - Public Goods
  • H42 - Publicly Provided Private Goods
  • Browse content in H5 - National Government Expenditures and Related Policies
  • H50 - General
  • H51 - Government Expenditures and Health
  • H52 - Government Expenditures and Education
  • H53 - Government Expenditures and Welfare Programs
  • H54 - Infrastructures; Other Public Investment and Capital Stock
  • H55 - Social Security and Public Pensions
  • H56 - National Security and War
  • Browse content in H6 - National Budget, Deficit, and Debt
  • H60 - General
  • H61 - Budget; Budget Systems
  • H62 - Deficit; Surplus
  • H63 - Debt; Debt Management; Sovereign Debt
  • Browse content in H7 - State and Local Government; Intergovernmental Relations
  • H70 - General
  • H71 - State and Local Taxation, Subsidies, and Revenue
  • H72 - State and Local Budget and Expenditures
  • H75 - State and Local Government: Health; Education; Welfare; Public Pensions
  • H76 - State and Local Government: Other Expenditure Categories
  • H77 - Intergovernmental Relations; Federalism; Secession
  • Browse content in H8 - Miscellaneous Issues
  • H83 - Public Administration; Public Sector Accounting and Audits
  • H84 - Disaster Aid
  • H87 - International Fiscal Issues; International Public Goods
  • Browse content in I - Health, Education, and Welfare
  • Browse content in I0 - General
  • I00 - General
  • Browse content in I1 - Health
  • I10 - General
  • I12 - Health Behavior
  • I14 - Health and Inequality
  • I15 - Health and Economic Development
  • I18 - Government Policy; Regulation; Public Health
  • I19 - Other
  • Browse content in I2 - Education and Research Institutions
  • I20 - General
  • I21 - Analysis of Education
  • I22 - Educational Finance; Financial Aid
  • I23 - Higher Education; Research Institutions
  • I24 - Education and Inequality
  • I25 - Education and Economic Development
  • I26 - Returns to Education
  • I28 - Government Policy
  • I29 - Other
  • Browse content in I3 - Welfare, Well-Being, and Poverty
  • I30 - General
  • I31 - General Welfare
  • I32 - Measurement and Analysis of Poverty
  • I38 - Government Policy; Provision and Effects of Welfare Programs
  • Browse content in J - Labor and Demographic Economics
  • Browse content in J0 - General
  • J00 - General
  • J01 - Labor Economics: General
  • J08 - Labor Economics Policies
  • Browse content in J1 - Demographic Economics
  • J10 - General
  • J11 - Demographic Trends, Macroeconomic Effects, and Forecasts
  • J12 - Marriage; Marital Dissolution; Family Structure; Domestic Abuse
  • J13 - Fertility; Family Planning; Child Care; Children; Youth
  • J14 - Economics of the Elderly; Economics of the Handicapped; Non-Labor Market Discrimination
  • J15 - Economics of Minorities, Races, Indigenous Peoples, and Immigrants; Non-labor Discrimination
  • J16 - Economics of Gender; Non-labor Discrimination
  • J17 - Value of Life; Forgone Income
  • J18 - Public Policy
  • Browse content in J2 - Demand and Supply of Labor
  • J20 - General
  • J21 - Labor Force and Employment, Size, and Structure
  • J22 - Time Allocation and Labor Supply
  • J23 - Labor Demand
  • J24 - Human Capital; Skills; Occupational Choice; Labor Productivity
  • J26 - Retirement; Retirement Policies
  • J28 - Safety; Job Satisfaction; Related Public Policy
  • Browse content in J3 - Wages, Compensation, and Labor Costs
  • J30 - General
  • J31 - Wage Level and Structure; Wage Differentials
  • J32 - Nonwage Labor Costs and Benefits; Retirement Plans; Private Pensions
  • J33 - Compensation Packages; Payment Methods
  • J38 - Public Policy
  • Browse content in J4 - Particular Labor Markets
  • J41 - Labor Contracts
  • J42 - Monopsony; Segmented Labor Markets
  • J45 - Public Sector Labor Markets
  • J46 - Informal Labor Markets
  • J48 - Public Policy
  • Browse content in J5 - Labor-Management Relations, Trade Unions, and Collective Bargaining
  • J50 - General
  • J51 - Trade Unions: Objectives, Structure, and Effects
  • J52 - Dispute Resolution: Strikes, Arbitration, and Mediation; Collective Bargaining
  • J53 - Labor-Management Relations; Industrial Jurisprudence
  • J54 - Producer Cooperatives; Labor Managed Firms; Employee Ownership
  • J58 - Public Policy
  • Browse content in J6 - Mobility, Unemployment, Vacancies, and Immigrant Workers
  • J60 - General
  • J61 - Geographic Labor Mobility; Immigrant Workers
  • J62 - Job, Occupational, and Intergenerational Mobility
  • J63 - Turnover; Vacancies; Layoffs
  • J64 - Unemployment: Models, Duration, Incidence, and Job Search
  • J65 - Unemployment Insurance; Severance Pay; Plant Closings
  • J68 - Public Policy
  • Browse content in J7 - Labor Discrimination
  • J71 - Discrimination
  • J78 - Public Policy
  • Browse content in J8 - Labor Standards: National and International
  • J81 - Working Conditions
  • J88 - Public Policy
  • Browse content in K - Law and Economics
  • Browse content in K0 - General
  • K00 - General
  • Browse content in K1 - Basic Areas of Law
  • K11 - Property Law
  • K12 - Contract Law
  • K13 - Tort Law and Product Liability; Forensic Economics
  • K14 - Criminal Law
  • K16 - Election Law
  • K2 - Regulation and Business Law
  • Browse content in K3 - Other Substantive Areas of Law
  • K31 - Labor Law
  • K32 - Environmental, Health, and Safety Law
  • K34 - Tax Law
  • K37 - Immigration Law
  • Browse content in K4 - Legal Procedure, the Legal System, and Illegal Behavior
  • K41 - Litigation Process
  • K42 - Illegal Behavior and the Enforcement of Law
  • K49 - Other
  • Browse content in L - Industrial Organization
  • Browse content in L0 - General
  • L00 - General
  • Browse content in L1 - Market Structure, Firm Strategy, and Market Performance
  • L10 - General
  • L11 - Production, Pricing, and Market Structure; Size Distribution of Firms
  • L12 - Monopoly; Monopolization Strategies
  • L13 - Oligopoly and Other Imperfect Markets
  • L14 - Transactional Relationships; Contracts and Reputation; Networks
  • L16 - Industrial Organization and Macroeconomics: Industrial Structure and Structural Change; Industrial Price Indices
  • Browse content in L2 - Firm Objectives, Organization, and Behavior
  • L20 - General
  • L21 - Business Objectives of the Firm
  • L22 - Firm Organization and Market Structure
  • L23 - Organization of Production
  • L24 - Contracting Out; Joint Ventures; Technology Licensing
  • L25 - Firm Performance: Size, Diversification, and Scope
  • L26 - Entrepreneurship
  • L29 - Other
  • Browse content in L3 - Nonprofit Organizations and Public Enterprise
  • L30 - General
  • L31 - Nonprofit Institutions; NGOs; Social Entrepreneurship
  • L32 - Public Enterprises; Public-Private Enterprises
  • L33 - Comparison of Public and Private Enterprises and Nonprofit Institutions; Privatization; Contracting Out
  • Browse content in L4 - Antitrust Issues and Policies
  • L40 - General
  • L41 - Monopolization; Horizontal Anticompetitive Practices
  • L43 - Legal Monopolies and Regulation or Deregulation
  • Browse content in L5 - Regulation and Industrial Policy
  • L50 - General
  • L51 - Economics of Regulation
  • L52 - Industrial Policy; Sectoral Planning Methods
  • L53 - Enterprise Policy
  • Browse content in L6 - Industry Studies: Manufacturing
  • L60 - General
  • L66 - Food; Beverages; Cosmetics; Tobacco; Wine and Spirits
  • Browse content in L7 - Industry Studies: Primary Products and Construction
  • L71 - Mining, Extraction, and Refining: Hydrocarbon Fuels
  • L78 - Government Policy
  • Browse content in L8 - Industry Studies: Services
  • L81 - Retail and Wholesale Trade; e-Commerce
  • L83 - Sports; Gambling; Recreation; Tourism
  • L86 - Information and Internet Services; Computer Software
  • Browse content in L9 - Industry Studies: Transportation and Utilities
  • L94 - Electric Utilities
  • L98 - Government Policy
  • Browse content in M - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics
  • Browse content in M1 - Business Administration
  • M12 - Personnel Management; Executives; Executive Compensation
  • M14 - Corporate Culture; Social Responsibility
  • M16 - International Business Administration
  • Browse content in M3 - Marketing and Advertising
  • M31 - Marketing
  • Browse content in M5 - Personnel Economics
  • M50 - General
  • M51 - Firm Employment Decisions; Promotions
  • M52 - Compensation and Compensation Methods and Their Effects
  • M53 - Training
  • M54 - Labor Management
  • M55 - Labor Contracting Devices
  • Browse content in N - Economic History
  • Browse content in N1 - Macroeconomics and Monetary Economics; Industrial Structure; Growth; Fluctuations
  • N10 - General, International, or Comparative
  • N11 - U.S.; Canada: Pre-1913
  • N12 - U.S.; Canada: 1913-
  • N13 - Europe: Pre-1913
  • N15 - Asia including Middle East
  • Browse content in N2 - Financial Markets and Institutions
  • N20 - General, International, or Comparative
  • N24 - Europe: 1913-
  • N25 - Asia including Middle East
  • Browse content in N3 - Labor and Consumers, Demography, Education, Health, Welfare, Income, Wealth, Religion, and Philanthropy
  • N31 - U.S.; Canada: Pre-1913
  • N33 - Europe: Pre-1913
  • N34 - Europe: 1913-
  • Browse content in N4 - Government, War, Law, International Relations, and Regulation
  • N40 - General, International, or Comparative
  • N45 - Asia including Middle East
  • N47 - Africa; Oceania
  • Browse content in N5 - Agriculture, Natural Resources, Environment, and Extractive Industries
  • N50 - General, International, or Comparative
  • N53 - Europe: Pre-1913
  • N57 - Africa; Oceania
  • Browse content in N7 - Transport, Trade, Energy, Technology, and Other Services
  • N70 - General, International, or Comparative
  • N72 - U.S.; Canada: 1913-
  • Browse content in N9 - Regional and Urban History
  • N97 - Africa; Oceania
  • Browse content in O - Economic Development, Innovation, Technological Change, and Growth
  • Browse content in O1 - Economic Development
  • O10 - General
  • O11 - Macroeconomic Analyses of Economic Development
  • O12 - Microeconomic Analyses of Economic Development
  • O13 - Agriculture; Natural Resources; Energy; Environment; Other Primary Products
  • O14 - Industrialization; Manufacturing and Service Industries; Choice of Technology
  • O15 - Human Resources; Human Development; Income Distribution; Migration
  • O16 - Financial Markets; Saving and Capital Investment; Corporate Finance and Governance
  • O17 - Formal and Informal Sectors; Shadow Economy; Institutional Arrangements
  • O18 - Urban, Rural, Regional, and Transportation Analysis; Housing; Infrastructure
  • O19 - International Linkages to Development; Role of International Organizations
  • Browse content in O2 - Development Planning and Policy
  • O22 - Project Analysis
  • O23 - Fiscal and Monetary Policy in Development
  • O24 - Trade Policy; Factor Movement Policy; Foreign Exchange Policy
  • O25 - Industrial Policy
  • Browse content in O3 - Innovation; Research and Development; Technological Change; Intellectual Property Rights
  • O30 - General
  • O31 - Innovation and Invention: Processes and Incentives
  • O32 - Management of Technological Innovation and R&D
  • O33 - Technological Change: Choices and Consequences; Diffusion Processes
  • O34 - Intellectual Property and Intellectual Capital
  • O38 - Government Policy
  • O39 - Other
  • Browse content in O4 - Economic Growth and Aggregate Productivity
  • O40 - General
  • O41 - One, Two, and Multisector Growth Models
  • O42 - Monetary Growth Models
  • O43 - Institutions and Growth
  • O47 - Empirical Studies of Economic Growth; Aggregate Productivity; Cross-Country Output Convergence
  • O49 - Other
  • Browse content in O5 - Economywide Country Studies
  • O50 - General
  • O52 - Europe
  • O53 - Asia including Middle East
  • O55 - Africa
  • O57 - Comparative Studies of Countries
  • Browse content in P - Economic Systems
  • Browse content in P1 - Capitalist Systems
  • P10 - General
  • P13 - Cooperative Enterprises
  • P16 - Political Economy
  • P17 - Performance and Prospects
  • Browse content in P2 - Socialist Systems and Transitional Economies
  • P20 - General
  • P26 - Political Economy; Property Rights
  • Browse content in P3 - Socialist Institutions and Their Transitions
  • P31 - Socialist Enterprises and Their Transitions
  • Browse content in P4 - Other Economic Systems
  • P48 - Political Economy; Legal Institutions; Property Rights; Natural Resources; Energy; Environment; Regional Studies
  • Browse content in P5 - Comparative Economic Systems
  • P50 - General
  • Browse content in Q - Agricultural and Natural Resource Economics; Environmental and Ecological Economics
  • Browse content in Q0 - General
  • Q02 - Commodity Markets
  • Browse content in Q1 - Agriculture
  • Q11 - Aggregate Supply and Demand Analysis; Prices
  • Q13 - Agricultural Markets and Marketing; Cooperatives; Agribusiness
  • Q15 - Land Ownership and Tenure; Land Reform; Land Use; Irrigation; Agriculture and Environment
  • Q16 - R&D; Agricultural Technology; Biofuels; Agricultural Extension Services
  • Q17 - Agriculture in International Trade
  • Q18 - Agricultural Policy; Food Policy
  • Browse content in Q2 - Renewable Resources and Conservation
  • Q20 - General
  • Q22 - Fishery; Aquaculture
  • Q23 - Forestry
  • Q25 - Water
  • Q26 - Recreational Aspects of Natural Resources
  • Q29 - Other
  • Browse content in Q3 - Nonrenewable Resources and Conservation
  • Q30 - General
  • Q32 - Exhaustible Resources and Economic Development
  • Q33 - Resource Booms
  • Q34 - Natural Resources and Domestic and International Conflicts
  • Q38 - Government Policy
  • Browse content in Q4 - Energy
  • Q40 - General
  • Q41 - Demand and Supply; Prices
  • Q42 - Alternative Energy Sources
  • Q43 - Energy and the Macroeconomy
  • Q48 - Government Policy
  • Browse content in Q5 - Environmental Economics
  • Q50 - General
  • Q51 - Valuation of Environmental Effects
  • Q52 - Pollution Control Adoption Costs; Distributional Effects; Employment Effects
  • Q53 - Air Pollution; Water Pollution; Noise; Hazardous Waste; Solid Waste; Recycling
  • Q54 - Climate; Natural Disasters; Global Warming
  • Q56 - Environment and Development; Environment and Trade; Sustainability; Environmental Accounts and Accounting; Environmental Equity; Population Growth
  • Q58 - Government Policy
  • Browse content in R - Urban, Rural, Regional, Real Estate, and Transportation Economics
  • Browse content in R1 - General Regional Economics
  • R10 - General
  • R11 - Regional Economic Activity: Growth, Development, Environmental Issues, and Changes
  • R15 - Econometric and Input-Output Models; Other Models
  • Browse content in R2 - Household Analysis
  • R23 - Regional Migration; Regional Labor Markets; Population; Neighborhood Characteristics
  • R29 - Other
  • Browse content in R4 - Transportation Economics
  • R40 - General
  • R41 - Transportation: Demand, Supply, and Congestion; Travel Time; Safety and Accidents; Transportation Noise
  • Browse content in R5 - Regional Government Analysis
  • R58 - Regional Development Planning and Policy
  • Browse content in Z - Other Special Topics
  • Browse content in Z1 - Cultural Economics; Economic Sociology; Economic Anthropology
  • Z10 - General
  • Z11 - Economics of the Arts and Literature
  • Z12 - Religion
  • Z13 - Economic Sociology; Economic Anthropology; Social and Economic Stratification
  • Z19 - Other
  • Browse content in Z2 - Sports Economics
  • Z21 - Industry Studies
  • Z22 - Labor Issues
  • Z29 - Other
  • Browse content in Z3 - Tourism Economics
  • Z30 - General
  • Advance articles
  • Author Guidelines
  • Submission Site
  • Open Access
  • About Oxford Economic Papers
  • Editorial Board
  • Advertising and Corporate Services
  • Journals Career Network
  • Self-Archiving Policy
  • Dispatch Dates
  • Terms and Conditions
  • Journals on Oxford Academic
  • Books on Oxford Academic

Issue Cover

Article Contents

1. introduction, 2. on terrorism, 3. event data sets, 4. domestic and transnational terrorism: some data plots, 5. counterterrorism, 6. findings of the articles of the special issue, 7. concluding remarks, acknowledgements, terrorism and counterterrorism: an overview.

  • Article contents
  • Figures & tables
  • Supplementary Data

Todd Sandler, Terrorism and counterterrorism: an overview, Oxford Economic Papers , Volume 67, Issue 1, January 2015, Pages 1–20, https://doi.org/10.1093/oep/gpu039

  • Permissions Icon Permissions

This introduction sets the stage for the articles collected in this special issue of Oxford Economic Papers . It begins by introducing essential concepts including domestic terrorism, transnational terrorism, defensive actions, proactive countermeasures, and guerrilla warfare. Three terrorist event databases, used by seven of the articles, are briefly introduced. These data sets are then used to display some stylized facts about domestic and transnational terrorism during the past four decades. Next, some essential strategic distinctions are drawn between defensive and proactive measures in the case of transnational terrorism when multiple countries are confronted by a common terrorist group. These strategic concerns vanish for domestic terrorism as a central government is able to internalize potential externalities. Finally, the key findings of the articles in the special issue are highlighted in two tables.

Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate noncombatant victims ( Enders and Sandler, 2012 , p.4). The two essential ingredients of terrorism are its violence and its political or social motive. Terrorists tend to employ shockingly violent acts, such as beheadings, downing of commercial airlines, bombings in public markets, and armed attacks in public places, to intimidate an audience. Their unpredictable and horrific attacks are meant to make everyone feel at risk even though the true likelihood of falling victim to a terrorist incident is rather minuscule, roughly equivalent to that of drowning in one's bathtub ( Mueller, 2006 ). Terrorists seek to circumvent normal channels for political change by traumatizing the public with brutal acts so that governments feel compelled to either address terrorist demands or divert public funds into hardening potential targets. Terrorist campaigns are more prevalent in liberal democracies, where the government's legitimacy hinges on its ability to protect the lives and property of its citizens ( Eubank and Weinberg, 1994 ).

The four airplane hijackings on 11 September 2001 (9/11) are terrorist acts since the perpetrators were members of al-Qaida, a subnational terrorist group, bent on pressuring the USA to remove its troops from Saudi Arabia, which was al-Qaida's primary political goal at the time. These skyjackings intimidated a global audience, caused huge temporary losses to the major stock exchanges ( Chen and Siems, 2004 ), and created $80–90 billion in direct and indirect damages ( Kunreuther et al ., 2003 ). Even though stock exchanges recovered lost values in just over a month, the death of almost 3,000 people caused rich industrial countries to allocate more resources to counterterrorism, shook insurance markets, and made an indelible impression on virtually the entire world. Heinous terrorist incidents continue to capture headlines with recent newsworthy incidents involving al-Shabaab's armed attack on the Westgate Mall in Nairobi, Kenya, on 21 September 2013; Chechen separatists’ suicide bombings of a train station and a trolley in Volgograd, Russia, on 29 and 30 December 2013, respectively; and Boko Haram's kidnapping of more than 200 female students in Chibok, Nigeria, on 14–15 April 2014. These and countless other incidents since 9/11 indicate that the government must allocate resources in an effective and measured manner to counterterrorism activities so that terrorists cannot circumvent legitimate political processes or cause significant economic losses. These losses may involve reduced foreign direct investment ( Enders and Sandler, 1996 ; Abadie and Gardeazabal, 2008 ), lower economic growth ( Abadie and Gardeazabal, 2003 ; Eckstein and Tsiddon, 2004 ; Gaibulloev and Sandler, 2008 , 2011 ), less trade ( Nitsch and Schumacher, 2004 ), reduced tourism ( Enders et al ., 1992 ; Drakos and Kutan, 2003 ), or lost values of stock and bond indexes ( Kollias et al ., 2013 ). Economic impacts of terrorism are greatest in small terrorism-plagued countries and developing countries ( Keefer and Loayza, 2008 ; Sandler and Enders, 2008 ). Modern industrial economies can insulate themselves through judicious fiscal and monetary policy, rapid counterterrorism responses, and the transference of economic activities ( Enders and Sandler, 2012 ). The latter involves economic activities moving from terrorism-prone sectors and regions to safer areas, which advanced, diversified economies allow. Thus, economic activity may switch from the tourism sector to other sectors when the former is targeted. In Spain, economic investment switched from the Basque Country to other Spanish provinces because of Euskadi ta Askatasuna attacks ( Abadie and Gardeazabal, 2003 ).

Modern-day econometric methods—time series, panel, and discrete-choice models—lend themselves to the quantification of these economic losses as shown in this special issue by Choi (2015) , Egger and Gassebner (2015) , and Younas (2015) . Additionally, game-theoretic models can display counterterrorism interactions among terrorists and governments as in the contributions in this issue by Carter (2015) and Kaplan (2015) . In fact, game theory is an excellent tool to study interactions among targeted governments, between rival terrorist groups, between a terrorist group and its sponsoring state, and among the media, the terrorist group, and the public. 1

The purpose of this article is to provide the requisite background to the studies in this special issue of Oxford Economic Papers . This task requires a fuller discussion of the notion of terrorism and its two primary subdivisions—domestic and transnational terrorism—in Section 2. The three event data sets employed in empirical studies, including seven of the eight articles in this issue, are briefly presented in Section 3. In Section 4, two of these data sets are used to display some recent trends and aspects of domestic and transnational terrorism during the last four decades. Essential concepts of counterterrorism are then presented in Section 5, where proactive measures are distinguished from defensive actions. Key findings of the four terrorism and four counterterrorism articles contained in this special issue are highlighted in two summarizing tables in Section 6. Concluding remarks follow in Section 7.

I now return to the definition of terrorism, given at the outset of this article. Any definition of terrorism involves much debate ( Hoffman, 2006 ; Enders and Sandler, 2012 ). The research community is converging to a consensus based on an operational definition on which to construct event data sets to test theoretical propositions. The article puts forward a definition that is consistent with that used by the main event data sets and relied on by researchers. Also, this definition possesses the main ingredients that are agreed on by economists, political scientists, and political economists.

The three stakeholders in this definition are the perpetrators, the victims, and the audience. By limiting terrorism to subnational agents including individuals or a ‘lone wolf’, my definition rules out state terror in which a government terrorizes its own people. The definition, however, does not rule out state-sponsored terrorism where a government clandestinely assists a terrorist group through various means, including supplying weapons, safe haven, intelligence, training, funding, or safe passage ( Mickolus, 1989 ; Bapat, 2006 ). There was a lot of state sponsorship of terrorism during the final decade of the Cold War with groups such as the Abu Nidal Organization serving as a terrorist group for hire ( Hoffman, 2006 ). 2 The most controversial element of my definition is the victim, since some definitions exclude combatants, so that attacks against an occupying army, such as US forces in Iraq or Afghanistan, are not viewed as terrorism. Generally, an attack against peacekeepers, such as the 23 October 1983 suicide bombing of the US Marines barracks at Beirut International Airport, is considered an act of terrorism. The barracks’ bombing had the political objective of removing peacekeepers from Lebanon, which happened in February 1984. Attacks against US soldiers and their dependents stationed in Germany constitute terrorist incidents, because these targeted individuals were noncombatants when attacked. ‘Audience’ refers to the collective that terrorists seek to intimidate through their wanton brutality. With sufficient and sustained intimidation, the audience will apply pressures on the besieged government to concede to the terrorist group's political demands or alternatively to take decisive action to annihilate the group. 3 In the latter case, the Italian authorities dismantled the Italian Red Brigades in the 1980s.

There are some crucial distinctions to draw between terrorism and related concepts. For instance, there is the distinction between terrorism and crime. A kidnapping for ransom is a criminal act of extortion when the kidnappers are not pursuing or financing a political agenda. If a political motive is tied to the kidnapping, then it is a terrorist incident even with ransom demands being made. The hijacking of a commercial airliner by a deranged person is a crime but not terrorism. In the absence of a political motive, an armed attack by a student on fellow students or teachers is a criminal action. Next consider an insurrection, which ‘is a politically based uprising intended to overthrow the established system of governance and to bring about a redistribution of income’ ( Sandler and Hartley, 1995 , p. 307). Leaders of insurrections recruit from the peasantry and general population in the hopes of challenging the government's hold on power ( Grossman, 1991 ). Successful rebel operations can generate new recruits and may ideally cause the government to impose draconian measures on its citizens, which subsequently create more support for the insurgency. If a tipping point is attained, then the government may be sufficiently challenged to lose its power to the rebels.

In distinction to insurrections, guerrilla warfare generally involves a band of rebel forces (e.g., the Revolutionary Armed Forces of Colombia [FARC], Abu Sayyaf in the Philippines, or Shining Path in Peru) that controls a sector of the country, from which to dispatch its operatives to confront government forces. Some guerrilla wars take place in urban centers. In contrast to most terrorist groups, guerrilla groups are larger in number and organized like a military force. Some guerrilla groups engage in terrorist acts, such as the three just-mentioned groups, to raise funds to secure their operations and pursue their political aims. For example, FARC kidnaps government officials and others for ransoms. Unlike an insurrection, guerrilla groups are not bent on overthrowing the government or engaging in propaganda to gain popular support ( Hoffman, 2006 ). Shining Path and FARC apply threats and harsh measures to gain the compliance of the people in the territory that they control. Guerrilla groups rely on surprise and cover to harass numerically superior government forces. Terrorism is a tactic employed by both insurrections and guerrilla movements. As a consequence, many guerrilla groups are listed as terrorist groups despite their control of territory. Often, countries with jungle cover or mountainous terrain provide remote areas where guerrillas can conduct training and operations. In this special issue, Carter (2015) is interested in the interaction between a guerrilla group and the government, as the former chooses between terrorism and the control of territory and the latter chooses between defensive counterterrorism actions and proactive military responses to influence the group's decision.

2.1 Domestic versus transnational terrorism

Domestic terrorism is homegrown and home-directed, and represents the most common form of terrorism. For domestic acts of terrorism, the perpetrators, victims, and audience hail from the venue country, where the attack takes place. Domestic terrorist incidents include Timothy McVeigh's bombing of the Alfred P. Murrah Federal Building in Oklahoma City on 19 April 1995 or Eric Rudolph's anti-abortionist bombing of Centennial Olympic Park in Atlanta, Georgia, on 27 July 1996. Civil wars often involve numerous domestic terrorist attacks before and during the conflict by the adversaries ( Findley and Young, 2012 ). 4 These terrorist acts are more apt to be domestic when an intervention by a third party from outside the country is not involved. Boko Haram's kidnapping of more than 200 female students is a domestic terrorist incident, which involves victims and perpetrators from the venue country of Nigeria. Boko Haram is an Islamic jihadist terrorist group that controls territory in the northeast portion of Nigeria. Given the country's limited military capabilities, its government sought some assistance from the USA in terms of military advisors and intelligence in addressing the significant threat that Boko Haram poses. At times, Boko Haram crosses into Chad. If one or more of the schoolgirls are moved into a neighboring country, then the kidnapping becomes a transnational terrorist incident. In general, poor countries may request foreign assistance if they cannot properly confront an indigenous terrorist group that may attack at home or abroad ( Azam and Thelen, 2010 ; Fleck and Kilby, 2010 ; Bandyopadhyay et al ., 2011 , 2014 ; Young and Findley, 2011 ).

Terrorism is transnational when an incident in the venue country concerns perpetrators or victims from another country. If a terrorist attack in the UK is perpetrated by terrorists from Yemen, then the incident is one of transnational terrorism. When a terrorist attack in France harms Dutch citizens, the attack is transnational. If one or more victims or perpetrators are not citizens of the venue country, then the terrorist attack is transnational. The kidnapping in January 2002 and subsequent murder of US reporter Daniel Pearl in Pakistan is classified as a transnational terrorist incident. The same is true of the near-simultaneous bombings of the US embassies in Kenya and Tanzania on 7 August 1998. Terrorist attacks against another country's embassy, even when perpetrated by citizens of the venue country, are transnational terrorist events because an embassy's grounds represent foreign soil. Similarly, terrorist attacks against international organizations’ personnel or property are considered to be transnational terrorist acts. An important transnational terrorist incident is the August 2006 plot to use liquid explosives to blow up 10 or more transatlantic flights departing the UK for the USA and Canada. A skyjacking originating in one country that is diverted to another country for political purposes is a transnational terrorist event. If a politically motivated hijacked plane has citizens from more than one country, the event is transnational terrorism even if the flight is domestic and ends in the country of origin. On 9/11, the four skyjackings are transnational terrorist acts since the victims were citizens from upward of 80 nations and the perpetrators were foreigners. The kidnapping of US journalist James Foley in Syria on 22 November 2012 and his beheading on 19 August 2014 is a transnational terrorist act. The victim was American, whereas the murderer is allegedly a British citizen from the Islamic State in Iraq and Syria (ISIS), also known as Islamic State (IS).

Transnational terrorist incidents frequently imply transnational externalities—for example, perpetrators from one country impose uncompensated costs on the victims of another country. If a country provides safe haven to a transnational terrorist group that attacks other countries’ interests, then transnational externalities ensue. 5 The Taliban in Afghanistan had given safe haven to Osama bin Laden's al-Qaida, which planned and executed the events of 9/11. When the Taliban would not surrender bin Laden to the USA following 9/11, the USA led an invasion of Afghanistan on 7 October 2001 ( Enders and Sandler, 2012 ). In this extreme case, the transnational externality resulted in a military invasion with the intent to defeat the Taliban and al-Qaida. Transnational externalities also arise from counterterrorism policies of targeted countries, which result in inefficient levels of these policies ( Sandler and Lapan, 1988 ; Sandler and Siqueira, 2006 ; Bueno de Mesquita, 2007 ). Actions by one targeted country to secure its borders and ports of entry may merely transfer the attack abroad, where borders are more porous (see Section 5). Since 9/11, few transnational terrorist incidents occur on US soil but 35% to 40% of such incidents involve US people or property in other countries ( Enders and Sandler, 2006 , 2012 ).

2.2 Some historical considerations of transnational terrorism

Hoffman ( 2006 , pp.63–5) traces the modern era of transnational terrorism to the 22 July 1968 hijacking of an Israeli El Al flight en route from Rome to Athens by three armed members of the Popular Front for the Liberation of Palestine (PFLP) terrorist group. This skyjacking was motivated by the intention of the PFLP terrorist to trade its hostages for Palestinian prisoners held by Israel. This event is noteworthy for a number of reasons. First, through its protracted 40-day negotiations, the Israelis were forced to negotiate with the Palestinian terrorists, which the Israelis had hitherto vowed they would never do ( Hoffman, 1998 , p.68). Second, the media coverage demonstrated to terrorists worldwide that such incidents could garner worldwide attention for their cause. Not surprisingly, transnational terrorist attacks increased greatly in numbers during the years following this incident (see the figures in Section 4). Third, there was evidence of state sponsorship after the diverted plane landed in Algiers as Algerian forces secured the hostages and held some Israeli hostages until 1 September 1968 when a deal was concluded ( Mickolus, 1980 , pp.93–4). Fourth, Israel eventually traded 16 Arab prisoners from the 1967 Arab-Israeli War for the remaining Israeli hostages. This trade showed terrorists that hostage taking could yield significant concessions.

Transnational terrorist groups were primarily nationalists/separatists or leftists (socialists) during the late 1960s until the late 1980s ( Rapoport, 2004 ). Even the Palestinian terrorists were secular until the end of the 1980s with the rise of Hamas, Palestinian Islamic Jihad, and other groups. After the mid-1990s, the religious fundamentalists came to dominate and increased the carnage ( Enders and Sandler, 2000 ; Gaibulloev and Sandler, 2014 ). The phenomenon of religious-based transnational terrorism is not novel and can be traced back to the Sicarii or Zealots, a Jewish sect that conducted a terror campaign against the Romans and their Jewish collaborators in Judea from CE 48 to 73 ( Rapoport, 1984 ; Bloom, 2005 ). Sicarii terrorists engaged in daytime assassinations in public places that typically resulted in the death of the assassin. As such, their dagger attacks were an early form of suicide terrorism, since the perpetrator had little chance of escape. 6 From 1090 to 1256, the Islamic Assassins opposed Sunni rule in Persia and Syria, with the intent to set up their own community and state of believers in the region ( Bloom, 2005 ). Although the Assassins’ terrorist campaign was on a much smaller scale, their goal was similar to that of ISIS. Like the Sicarii, the Assassins relied on politically motivated assassinations, performed with a dagger. Perpetrators usually sacrificed their own lives by making no efforts to escape after the deed.

In the beginning of the 1980s, the first terrorist event data set—International Terrorism: Attributes of Terrorist Events (ITERATE)—was made available to researchers. ITERATE only includes transnational terrorist attacks. Coverage starts in 1968, the beginning of the modern era of transnational terrorism, and runs until the end of 2012, with annual updates in August ( Mickolus et al ., 2013 ). ITERATE codes many variables—for example, incident date, country start location, country end location, attack type, target entity, terrorist group, perpetrators’ nationalities, number of deaths, number of injuries, victims’ nationalities, logistical outcome, US victims, state sponsorship, and scene of attack—in its Common File of over 40 variables. In addition, there is a Fate File indicating the fate of the terrorists—for example, the number of terrorists captured, the number of terrorists sentenced, and their length of incarceration. There is also a Hostage File, which has invaluable observations used by researchers to analyze logistical and negotiation success of hostage taking ( Santifort and Sandler, 2013 ). If an attack is completed as planned, then it is a logistical success. For hostage missions, securing one or more hostages is deemed a logistical success. The Hostage File of ITERATE is currently updated through 2010. Finally, there is a Skyjacking file with additional observations, and variables on skyjacking missions such as the duration of the incidents, airline involved, and negotiation strategies used. ITERATE, like the other event data sets, relies on the news media—print, broadcast, and digital—for the observations of its variables.

An initial focus of empirical studies was on transnational terrorism because ITERATE was the most extensive data set available throughout the 1980s and 1990s. Its lengthy series of daily data were ideal for time-series studies, which dominated the research landscape except for a few survival studies, the first being Atkinson et al .'s (1987) study of the duration of hostage-taking incidents. Today, panel studies are prevalent including those in this special issue— Berrebi and Ostwald (2015) , Choi (2015) , Egger and Gassebner (2015) , Gries et al . (2015) , and Younas (2015) .

Another competing event data set, modeled after ITERATE, is the RAND (2012) data set, which currently codes incidents for 1968–2009 and is not being updated. Gaibulloev (2015) uses the RAND event data in conjunction with Jones and Libicki's (2008) classification of terrorist groups’ ideologies in his study of groups’ location decisions. For 1968–97, RAND event data only include transnational terrorist attacks; after 1998, RAND data distinguish between transnational and domestic terrorist attacks in a manner consistent with my early definitions. Compared to ITERATE, RAND data code fewer variables and, for transnational terrorist incidents, have more limited coverage than ITERATE as demonstrated by Enders (2007) .

The third event data set, germane to this special issue, is that of the Global Terrorism Database (GTD), which records both domestic and transnational terrorist incidents ( La Free and Dugan, 2007 ; National Consortium for the Study of Terrorism and Response to Terrorism, 2013 ). Although GTD recorded both kinds of incidents, until 2013 it did not distinguish between the two kinds of incidents. Enders et al . (2011) devised a five-step procedure for distinguishing between domestic and transnational terrorist incidents in GTD for 1970–2007 and made their breakdown available to researchers. This division is now applied to 2008–2012 (see Enders et al ., 2014 ). A breakdown of terrorism into its two components is essential because the two types of terrorism may affect economic variables and counterterrorism differently—for example, economic growth or foreign direct investment is more influenced by transnational terrorism ( Gaibulloev and Sandler, 2008 ). Moreover, the influence of other variables on domestic and transnational terrorism may differ ( Sandler, 2014 ; Choi, 2015 ). The Enders et al . (2011) procedure does a much better job in distinguishing between the two types of events than recent GTD efforts, based on the authors’ method without attribution. GTD has tens of thousands of unclassified incidents compared to Enders et al . (2011) .

There are some things to note about GTD. First, it has changed its coding conventions a few times, most recently for the 2012 data. Coding was also changed after the National Consortium for the Study of Terrorism and Responses to Terrorism (2013) , based at the University of Maryland, took charge of the data around 2005. As shown by Enders et al . (2011) , there are periods of undercounting and overcounting of incidents, which can be addressed by these authors’ calibration methods. Second, GTD data for 1993 are very incomplete because in an office move by Pinkerton, which originated the database, the box containing 1993 fell off of the truck! Third, perpetrators’ nationalities are not identified. Fourth, GTD does not contain any hostage negotiation variables, making the study of hostage-taking incidents impossible with this database. Fifth, GTD coverage of some kinds of domestic incidents, such as kidnappings, is virtually nonexistent prior to the late 1990s ( Enders et al ., 2011 ).

Key aspects of the articles for the special issue

ArticleType of terrorismMethodsUnit of analysisData sourcesYears/countriess
GaibulloevTransnationalConditional logitGroup-base countryRAND1970–2006
Jones and Libicki113 countries
Egger and GassebnerTransnationalPoisson pseudo-maximum likelihoodCountry-monthITERATE1970–2008
30 OECD
181 partner countries
Berrebi and OstwaldTotal and domesticPanel/IV, first differencesCountry-yearGTD*1970–2007
170 countries
Gries TransnationalPanel negative binomial, SGMMCountry-yearITERATE1984–2008
126 countries
KaplanDomestic or transnationalQueuing theoryNot applicableGTD*2002–2011
Game theoryUSA
CarterDomestic or transnationalGame theoryNot applicableNot applicableNot applicable
YounasTotal, domestic, transnationalPanel/SGMMCountry-yearGTD*1976–2008
Panel/FGLS120 countries
ChoiDomestic, transnational, suicidePanel negative binomial, Rare event logitCountry-yearGTD*1970–2007
127 countries
ArticleType of terrorismMethodsUnit of analysisData sourcesYears/countriess
GaibulloevTransnationalConditional logitGroup-base countryRAND1970–2006
Jones and Libicki113 countries
Egger and GassebnerTransnationalPoisson pseudo-maximum likelihoodCountry-monthITERATE1970–2008
30 OECD
181 partner countries
Berrebi and OstwaldTotal and domesticPanel/IV, first differencesCountry-yearGTD*1970–2007
170 countries
Gries TransnationalPanel negative binomial, SGMMCountry-yearITERATE1984–2008
126 countries
KaplanDomestic or transnationalQueuing theoryNot applicableGTD*2002–2011
Game theoryUSA
CarterDomestic or transnationalGame theoryNot applicableNot applicableNot applicable
YounasTotal, domestic, transnationalPanel/SGMMCountry-yearGTD*1976–2008
Panel/FGLS120 countries
ChoiDomestic, transnational, suicidePanel negative binomial, Rare event logitCountry-yearGTD*1970–2007
127 countries

Notes: *denotes that Enders et al . (2011) breakdown of GTD into domestic and transnational terrorist incidents was used. ITERATE = International Terrorism: Attributes of Terrorist Events; GTD = Global Terrorism Database.

A variety of empirical techniques are applied by the six empirical articles. In his cross-sectional study of the location choice of terrorist groups, Gaibulloev (2015) relies on a conditional logit estimator. To account for the count nature of the dependent terrorism variable, Choi (2015) and Gries et al . (2015) apply a negative binomial panel estimator. Endogeneity between the dependent variable and one or more independent variables is addressed in various ways: the Berrebi and Ostwald (2015) article employs instrumental variables (IV), consisting of lagged domestic terrorist attacks in neighboring countries, whereas the Younas (2015) article uses system generalized method of moments (SGMM) to augment his feasible generalized least squares (FGLS) estimates. The Gries et al . (2015) article addresses endogeneity with lagged values of the independent variables and also SGMM estimates. The Choi (2015) article primarily uses lagged independent variables to partly handle the endogeneity concern.

ITERATE transnational terrorist incidents and total casualties per year, 1968–2012

ITERATE transnational terrorist incidents and total casualties per year, 1968–2012

GTD terrorist incidents per year, 1970–2012

GTD terrorist incidents per year, 1970–2012

ITERATE attacks against US interests per year, 1968–2012

ITERATE attacks against US interests per year, 1968–2012

Annual number of casualties per attack

Annual number of casualties per attack

This special issue contains articles on terrorism and counterterrorism. Given my discussion of terrorism and its concepts, it is now instructive to introduce some basic concepts and concerns that are associated with the practice of counterterrorism.

Quite simply, counterterrorism corresponds to actions to ameliorate the threat and consequences of terrorism. These actions can be taken by governments, military alliances, international organizations (e.g., INTERPOL), private corporations, or private citizens. Counterterrorism comes in two basic varieties: defensive and proactive measures.

Defensive countermeasures protect potential targets by making attacks more costly for terrorists or reducing their likelihood of success. When, however, successful terrorist attacks ensue, defensive actions also serve to limit the resulting losses to the target. Defensive measures have generally been reactive, instituted after some successful or innovative terrorist attacks. In the USA, airline passengers are now required to remove their shoes when being screened, following the innovative, but fortunately unsuccessful, attempt by Richard Reid to bring down American Airlines flight 63 en route from Paris to Miami on 22 December 2001 with explosives hidden in his shoes. Before the installation of metal detectors to screen passengers at US airports on 5 January 1973, there were on average over 25 skyjackings each year in the USA ( Enders et al ., 1990 ). After their installation, attempted US skyjackings dropped to fewer than four a year. The success of these metal detectors in US airports led to their installation worldwide over the next six months. Following the downing of Pan Am flight 103 over Lockerbie, Scotland, on 21 December 1988 and the downing of UTA flight 772 over Niger on 19 September 1989, bomb-detecting devices were used to screen checked luggage. Defensive or protective counterterror actions may involve more than technological barriers. Other instances of defensive measures include target hardening, such as defensive perimeters around government buildings or embassies, or guards at key points of a country's infrastructure. Defensive measures can also take the form of issuing terrorism alerts, enacting stiffer penalties for terrorism offenses, enhancing first-responder capabilities, and stockpiling antibiotics and antidotes for biological and chemical terrorist attacks. This list of defensive actions is by no means exhaustive.

By contrast, proactive measures are offensive as a targeted government directly confronts the terrorist group or its supporters. Proactive measures may destroy terrorists’ resources (e.g., training camps), curb their finances, eliminate their safe havens, or kill and capture their members. In recent years, the Obama administration has relied on drone attacks to assassinate terrorist leaders and operatives. Proactive operations may assume myriad other forms, including a retaliatory raid against a state sponsor that provides resources, training, sanctuary, logistical support, or intelligence to a terrorist group. On 15 April 1986, the USA launched a retaliatory bombing raid on targets in Libya for its alleged support in the terrorist bombing of the La Belle discotheque in West Berlin on 4 April 1986, where 3 died and 231 were wounded, including 62 Americans ( Mickolus et al ., 1989 , vol. 2, pp.365–7). Another proactive measure takes the form of a preemptive attack against a terrorist group or a harboring country, such as the US-led invasion of Afghanistan four weeks after 9/11. A preemptive strike differs from a retaliatory raid because the former is more sustained and meant to severely compromise the capabilities of the terrorists to conduct future missions. Such strikes or raids concern transnational terrorism where a targeted country confronts the foreign threat. Other proactive measures include infiltrating terrorist groups, engaging in military action, conducting propaganda campaigns against the terrorists, and gathering intelligence to foil terror plots ( Kaplan, 2015 ). ‘Military action’ generally refers to operations by the host government against a resident terrorist group as in Carter (2015) . Actions that improve the economy, which in turn reduces grievances, can also be proactive ( Choi, 2015 ). Younas (2015) demonstrates empirically that increased globalization of a country's economy may also be proactive by limiting harmful and therefore grievance-causing effects of terrorism on economic growth. In this special issue, the four counterterrorism articles primary address aspects of proactive measures. Only Carter (2015) considers both defensive and proactive counterterrorism responses.

The game-theoretic literature on counterterrorism draws some fascinating strategic contrasts between defensive and proactive countermeasures. Suppose that two or more countries are confronted by the same Islamic jihadist terrorist group—for example, al-Qaida in the Arabian Peninsula (AQAP). In this transnational terrorism scenario, each at-risk country is inclined to work at cross-purposes by engaging in a defensive race in the hopes of transferring the terrorist attacks to other targeted countries ( Sandler and Lapan, 1988 ; Arce and Sandler, 2005 ). In the process, the countries engage in too much defense since the negative transference externality is not internalized. The only check on this adverse ‘defense race’ stems from the countries having large interests abroad, which may be hit when attacks are transferred abroad—recall Fig. 3 and attacks against US interests ( Bandyopadhyay and Sandler, 2011 ; Bandyopadhyay et al ., 2011 ).

Next consider proactive measures in these multicountry scenarios. Any country's actions to confront the common terrorist threat confer purely public (nonrival and nonexcludable) benefits to all potential target countries. As a result, there is too little proactive response as each country tries to free ride on the actions of other countries. Thus, defensive measures are strategic complements as one country's actions encourage those of other countries (i.e., reaction paths are upward-sloping), whereas proactive measures are strategic substitutes as one country's actions inhibit those of other countries (i.e., reaction paths are downward-sloping) ( Eaton, 2004 ; Sandler and Siqueira, 2006 ). Moreover, leadership can be shown to curb the defensive race, whereas leadership exacerbates the free-riding underprovision of offensive measures ( Sandler and Siqueira, 2006 ). Thus, there is no simple fix for these concerns among sovereign targeted nations.

For domestic terrorism, countries possess the proper incentives to choose defensive and proactive measures judiciously, because all associated costs and benefits are internalized ( Enders and Sandler, 2012 ). Thus, Kaplan's (2015) finding that the USA staffs about the right number of intelligence analysts to intercept terror plots is consistent with past game-theoretic findings regarding domestic counterterrorism optimality. Carter's (2015) article is also geared to domestic terrorism, whereas Choi (2015) and Younas (2015) may involve economic-based countermeasures for either type of terrorism.

Key findings of terrorism studies

Gaibulloev
Egger and Gassebner
Berrebi and Ostwald
Gries
Gaibulloev
Egger and Gassebner
Berrebi and Ostwald
Gries

Key findings of counterterrorism studies

Kaplan
Carter
Younas
Choi
Kaplan
Carter
Younas
Choi

This special issue contains many noteworthy advances in the study of terrorism. Gaibulloev (2015) is the first article to address terrorist groups’ base location choice; currently, the study of terrorist group survival is an active area of research. Berrebi and Ostwald (2015) is the initial study to examine the impact of terrorism on fertility. Younas (2015) and Choi (2015) refine the relationship between terrorism and growth; Egger and Gassebner (2015) show that terrorism has less of an effect on trade than conventionally believed. Kaplan (2015) investigates the social efficiency of intelligence staffing in intercepting terror plots. Carter's (2015) analysis is novel because the terrorist group must decide between terrorist attacks and holding territory in reaction to the government's countermeasures. The interface between terrorism and other forms of political violence is seldom studied. Finally, the Gries et al . (2015) study extends knowledge of the determinants of anti-American terrorist attacks, which comprise 35–40% of all transnational terrorism.

Terrorism remains an active research area in economics, political economy, and political science. Given the microeconomic and macroeconomic consequences of terrorism, its study is a fitting topic for a general economics journal such as Oxford Economic Papers . Following 9/11, industrial countries engaged in a huge reallocation of resources toward counterterrorism, whose efficacy can be best studied and understood with the theoretical and empirical tools drawn from economics.

The rise of ISIS and the considerable threat that its Western fighters pose for their home countries means that terrorism will remain a policy concern. AQAP's war on the USA and its allies is yet another terrorist threat. Just as Africa appears to be achieving sustained economic growth in select countries, significant terrorist challenges arise from Boko Haram and al-Shabaab in Nigeria and Kenya, respectively. Failed states—for example, Afghanistan, Iraq, Somalia, Syria, and Yemen—supply safe havens for terrorist groups that threaten Western interests. It is my hope that this special issue on terrorism and counterterrorism will stimulate further research in these two topics.

The present collection arises from a set of papers presented at the sixth conference on Terrorism and Counterterrorism Policy at the University of Texas, Dallas. Held between 21 May and 24 May 2014, this conference invited many leading contributors to the study of terrorism and counterterrorism. Past conferences resulted in special issues published in Economics &Politics (November 2009), Journal of Conflict Resolution (April 2010), Journal of Peace Research (May 2011), Public Choice (December 2011), and Southern Economic Journal (April 2013). While assuming full responsibility for any remaining shortcomings, this article has profited from comments from Anindya Banerjee, who also advised me on the special issue. Khusrav Gaibulloev read and commented on an earlier version. Finally, I thank all of this special issue's reviewers, most of whom are major contributors to the study of terrorism. These reviewers provided rigorous reviews in a timely fashion. All articles went through a careful and demanding prescreening process, followed by two rounds of reviews by two to three anonymous referees. I appreciate the understanding of those authors whose papers did not make it into the special issue.

On the game-theoretic literature on terrorism, see Bandyopadhyay and Sandler (2011) , Bandyopadhyay et al . ( 2011 , 2014 ), Sandler and Arce (2003) , Bueno de Mesquita (2005) , and Sandler and Siqueira (2009) .

The Abu Nidal Organization was headed by Sabri Khali al-Banna. Its notorious attacks included the simultaneous armed attacks on the Rome and Vienna airports on 27 December 1985, the armed attack on the Neve Shalom Synagogue in Istanbul on 6 September 1986, and the attempted hijacking of Pan Am flight 73 in Karachi, Pakistan, on 5 September 1986 ( Enders and Sandler, 2012 ). This group is credited with the first simultaneous terrorist attacks.

On alternative ways that terrorist groups end, see Carter (2012) , Gailbulloev and Sandler (2014) , and Phillips (2014a) .

On the relationship between civil wars and terrorism, see Sambanis (2008) .

How terrorist groups choose their home base is discussed in this special issue by Gaibulloev (2015) . On the definition of terrorist groups, see Phillips (2014b) .

In this special issue, Choi (2015) investigates suicide terrorism, which may be domestic or transnational in nature. Suicide terrorist attacks grew in numbers after 1988 ( Santifort-Jordan and Sandler, 2014 ).

Abadie A. Gardeazabal J. ( 2003 ) The economic cost of conflict: a case study of the Basque Country , American Economic Review , 93 , 113 – 32 .

Google Scholar

Abadie A. Gardeazabal J. ( 2008 ) Terrorism and the world economy , European Economic Review , 52 , 1 – 27 .

Arce D.G. Sandler T. ( 2005 ) Counterterrorism: a game-theoretic analysis , Journal of Conflict Resolution , 49 , 183 – 200 .

Atkinson S.E. Sandler T. Tschirhart J. ( 1987 ) Terrorism in a bargaining framework , Journal of Law and Economics , 30 , 1 – 21 .

Azam J.-P. Thelen V. ( 2010 ) Foreign aid versus military intervention in the war on terror , Journal of Conflict Resolution , 54 , 237 – 61 .

Bandyopadhyay S. Sandler T. ( 2011 ) The interplay between preemptive and defensive counterterrorism measures: a two-stage game , Economica , 78 , 546 – 64 .

Bandyopadhyay S. Sandler T. Younas J. ( 2011 ) Foreign aid as counterterrorism policy , Oxford Economic Papers , 63 , 423 – 47 .

Bandyopadhyay S. Sandler T. Younas J. ( 2014 ) Foreign direct investment, aid, and terrorism , Oxford Economic Papers , 66 , 25 – 50 .

Bapat N. A. ( 2006 ) State bargaining with transnational terrorist groups , International Studies Quarterly , 50 , 213 – 29 .

Berrebi C. Ostwald J. ( 2015 ) Terrorism and fertility: evidence for a causal inference of terrorism on fertility , Oxford Economic Papers , 67 , 63 – 82 .

Bloom M. ( 2005 ) Dying to Kill: The Allure of Suicide Terror , Columbia University Press , New York .

Google Preview

Bueno de Mesquita E. ( 2005 ) The quality of terror , American Journal of Political Science , 49 , 515 – 30 .

Bueno de Mesquita E. ( 2007 ) Politics and the suboptimal provision of counterterror , International Organization , 61 , 9 – 36 .

Carter D.B. ( 2012 ) A blessing or curse? State support for terrorist groups , International Organization , 66 , 129 – 51 .

Carter D.B. ( 2015 ) When terrorism is evidence of state success: securing the state against territorial groups , Oxford Economic Papers , 67 , 116 – 32 .

Chen A.H. Siems T.F. ( 2004 ) The effects of terrorism on global capital markets , European Journal of Political Economy , 20 , 249 – 66 .

Choi S.-W. ( 2015 ) Economic growth and terrorism: domestic, international, and suicide , Oxford Economic Papers , 67 , 157 – 81 .

Drakos K. Kutan A.M. ( 2003 ) Regional effects of terrorism on tourism in three Mediterranean countries , Journal of Conflict Resolution , 47 , 621 – 41 .

Eaton B.C. ( 2004 ) The elementary economics of social dilemmas , Canadian Journal of Economics , 37 , 805 – 29 .

Eckstein Z. Tsiddon D. ( 2004 ) Macroeconomic consequences of terror: theory and the case of Israel , Journal of Monetary Economics , 51 , 971 – 1002 .

Egger P. Gassebner M. ( 2015 ) International terrorism as a trade impediment? Oxford Economic Papers , 67 , 42 – 62 .

Enders W. ( 2007 ) Terrorism: an empirical analysis , in Sandler T. Hartley K. (eds) Handbook of Defense Economics: Defense in a Globalized World , North-Holland , Amsterdam .

Enders W. Hoover G.A. Sandler T. ( 2014 ) The changing nonlinear relationship between income and terrorism , Journal of Conflict Resolution , doi: 10.1177/0022002714535252 .

Enders W. Sandler T. ( 1996 ) Terrorism and foreign direct investment in Spain and Greece , Kyklos , 49 , 331 – 52 .

Enders W. Sandler T. ( 2000 ) Is transnational terrorism becoming more threatening? A time-series investigation , Journal of Conflict Resolution , 44 , 307 – 32 .

Enders W. Sandler T. ( 2006 ) Distribution of transnational terrorism among countries by income classes and geography after 9/11 , International Studies Quarterly , 50 , 367 – 93 .

Enders W. Sandler T. ( 2012 ) The Political Economy of Terrorism , 2nd edn., Cambridge University Press , New York .

Enders W. Sandler T. Cauley J. ( 1990 ) UN conventions, technology, and retaliation in the fight against terrorism: an econometric evaluation , Terrorism and Political Violence , 2 , 83 – 105 .

Enders W. Sandler T. Gaibulloev K. ( 2011 ) Domestic versus transnational terrorism: data, decomposition, and dynamics , Journal of Peace Research , 48 , 319 – 37 .

Enders W. Sandler T. Parise G.F. ( 1992 ) An econometric analysis of the impact of terrorism on tourism , Kyklos , 45 , 531 – 54 .

Eubank W.L. Weinberg L.B. ( 1994 ) Does democracy encourage terrorism? , Terrorism and Political Violence , 6 , 417 – 35 .

Faria J.R. ( 2003 ) Terror cycles , Studies in Nonlinear Dynamics and Econometrics , 7 , 1 – 11 .

Findley M.G. Young J.K. ( 2012 ) Terrorism and civil war: a spatial and temporal approach to a conceptual problem , Perspectives on Politics , 10 , 285 – 305 .

Fleck R.K. Kilby C. ( 2010 ) Changing aid regimes? US foreign aid from the Cold War to the war on terror , Journal of Development Economics , 91 , 185 – 97 .

Gaibulloev K. ( 2015 ) Terrorist group location decision: an empirical investigation , Oxford Economic Papers , 67 , 21 – 41 .

Gaibulloev K. Sandler T. ( 2008 ) Growth consequences of terrorism in Western Europe , Kyklos , 61 , 411 – 24 .

Gaibulloev K. Sandler T. ( 2011 ) The adverse effect of transnational and domestic terrorism on growth in Africa , Journal of Peace Research , 48 , 355 – 71 .

Gaibulloev K. Sandler T. ( 2014 ) An empirical analysis of alternative ways that terrorist groups end , Public Choice , 160 , 25 – 44 .

Gries T. Meierrieks D. Redlin M. ( 2015 ) Oppressive governments, dependence on the United States and anti-American terrorism , Oxford Economic Papers , 67 , 83 – 103 .

Grossman H.I. ( 1991 ) A general equilibrium model of insurrections , American Economic Review , 81 , 912 – 21 .

Hoffman B. ( 1998 ) Inside Terrorism , Columbia University Press , New York .

Hoffman B. ( 2006 ) Inside Terrorism , rev. edn., Columbia University Press , New York .

Jones S.G. Libicki M.C. ( 2008 ) How Terrorist Groups End: Lessons for Countering al Qa'ida , Monograph MG-741-1, RAND, Santa Monica, CA .

Kaplan E.H. ( 2015 ) Socially efficient detection of terror plots , Oxford Economic Papers , 67 , 104 – 15 .

Keefer P. Loayza N. (eds) ( 2008 ) Terrorism, Economic Development, and Political Openness , Cambridge University Press , New York .

Kollias C. Papadamou S. Arvanitis V. ( 2013 ) Does terrorism affect the stock-bond covariance? Evidence from European countries , Southern Economic Journal , 79 , 832 – 48 .

Kunreuther H. Michel-Kerjan E. Porter P. ( 2003 ) Assessing, managing and financing extreme events: dealing with terrorism , Working Paper 10179, National Bureau of Economic Research .

La Free G. Dugan L. ( 2007 ) Introducing the global terrorism database , Terrorism and Political Violence , 19 , 181 – 204 .

Mickolus E.F. ( 1980 ) Transnational Terrorism: A Chronology of Events 1968–1979 , Greenwood Press , Westport, CT .

Mickolus E.F. ( 1989 ) What constitutes state support to terrorism? , Terrorism and Political Violence , 1 , 287 – 93 .

Mickolus E.F. Sandler T. Murdock J.M. ( 1989 ) International Terrorism in the 1980s: A Chronology of Events , 2 vols. , Iowa State University Press , Ames .

Mickolus E.F. Sandler T. Murdock J.M. Flemming P. ( 2013 ) International Terrorism: Attributes of Terrorist Events, 1968–2013 (ITERATE) , Vinyard Software , Ponte Vedra, FL .

Mueller J. ( 2006 ) Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats and Why We Believe Them , Free Press , New York .

National Consortium for the Study of Terrorism and Responses to Terrorism . ( 2013 ) Global Terrorism Database , available at http://www.start.umd.edu/gtd/ (accessed 25 August 2013) .

Nitsch V. Schumacher D. ( 2004 ) Terrorism and international trade: an empirical investigation , European Journal of Political Economy , 20 , 423 – 33 .

Phillips B.J. ( 2014a ) Terrorist group cooperation and longetivity , International Studies Quarterly , 58 , 336 – 47 .

Phillips B.J. ( 2014b ) What is a terrorist group? Conceptual issues and empirical implications , Terrorism and Political Violence , doi: 10.1080/09546553.2013.800048 .

RAND . ( 2012 ) RAND database of worldwide terrorism incidents , available at http://www.rand.org/nsrd/projects/terrorism-incidents.html (accessed 3 August 2012) .

Rapoport D.C. ( 1984 ) Fear and trembling: terrorism in three religious traditions , American Political Science Review , 78 , 658 – 77 .

Rapoport D.C. ( 2004 ) Modern terror: the four waves , in Cronin A.K. Ludes J.M. (eds) Attacking Terrorism: Elements of a Grand Strategy , Georgetown University Press , Washington, DC .

Sambanis N. ( 2008 ) Terrorism and civil war , in Keefer P. Loayza N. (eds) Terrorism, Economic Development and Political Openness , Cambridge University Press , New York .

Sandler T. ( 2014 ) The analytical study of terrorism: taking stock , Journal of Peace Research , 51 , 257 – 71 .

Sandler T. Arce D.G. ( 2003 ) Terrorism and game theory , Simulation &Gaming , 34 , 319 – 37 .

Sandler T. Enders W. ( 2008 ) Economic consequences of terrorism in developed and developing countries: an overview , in Keefer P. Loayza N. (eds) Terrorism, Economic Development and Political Openness , Cambridge University Press , New York .

Sandler T. Hartley K. ( 1995 ) The Economics of Defense , Cambridge University Press , Cambridge .

Sandler T. Lapan H.E. ( 1988 ) The calculus of dissent: an analysis of terrorists’ choice of targets , Synthese , 76 , 245 – 61 .

Sandler T. Siqueira K. ( 2006 ) Global terrorism: deterrence versus preemption , Canadian Journal of Economics , 50 , 1370 – 87 .

Sandler T. Siqueira K. ( 2009 ) Games and terrorism: recent developments , Simulation &Gaming , 40 , 164 – 92 .

Santifort C. Sandler T. ( 2013 ) Terrorist success in hostage-taking mission , Public Choice , 156 , 125 – 37 .

Santifort-Jordan C. Sandler T. ( 2014 ) An empirical study of suicide terrorism: a global analysis , Southern Economic Journal , 80 , 981 – 1001 .

Younas J. ( 2015 ) Does globalization mitigate the adverse effects of terrorism on growth? Oxford Economic Papers , 67 , 133 – 56 .

Young J.K. Findley M.G. ( 2011 ) Can peace be purchased? A sectoral-level analysis of aid's influence on transnational terrorism , Public Choice , 149 , 365 – 81 .

Month: Total Views:
January 2017 57
February 2017 192
March 2017 157
April 2017 62
May 2017 30
June 2017 74
July 2017 49
August 2017 74
September 2017 136
October 2017 246
November 2017 382
December 2017 2,255
January 2018 1,832
February 2018 1,473
March 2018 2,189
April 2018 2,615
May 2018 2,829
June 2018 1,791
July 2018 1,338
August 2018 1,614
September 2018 1,913
October 2018 2,083
November 2018 1,931
December 2018 1,608
January 2019 1,754
February 2019 1,675
March 2019 2,041
April 2019 2,208
May 2019 1,956
June 2019 1,451
July 2019 1,627
August 2019 1,610
September 2019 1,382
October 2019 793
November 2019 698
December 2019 951
January 2020 397
February 2020 572
March 2020 409
April 2020 470
May 2020 295
June 2020 381
July 2020 317
August 2020 309
September 2020 330
October 2020 365
November 2020 418
December 2020 314
January 2021 335
February 2021 332
March 2021 403
April 2021 427
May 2021 362
June 2021 298
July 2021 301
August 2021 251
September 2021 259
October 2021 284
November 2021 306
December 2021 269
January 2022 322
February 2022 323
March 2022 449
April 2022 416
May 2022 400
June 2022 310
July 2022 275
August 2022 238
September 2022 292
October 2022 370
November 2022 386
December 2022 346
January 2023 231
February 2023 191
March 2023 179
April 2023 243
May 2023 245
June 2023 99
July 2023 169
August 2023 182
September 2023 179
October 2023 196
November 2023 333
December 2023 240
January 2024 294
February 2024 250
March 2024 268
April 2024 289
May 2024 436
June 2024 263
July 2024 157
August 2024 284
September 2024 60

Email alerts

Citing articles via.

  • Recommend to your Library

Affiliations

  • Online ISSN 1464-3812
  • Print ISSN 0030-7653
  • Copyright © 2024 Oxford University Press
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

  • Political Science
  • International Security and Arms Control

Globalization and International Terrorism: Its Implications on Global Peace and Security

  • September 2023

Callistus Francis Azubuike at Nnamdi Azikiwe University, Awka

  • Nnamdi Azikiwe University, Awka
  • This person is not on ResearchGate, or hasn't claimed this research yet.

Arinze Emmanuel Okonkwo at Nnamdi Azikiwe University, Awka

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • Gilles Kepel
  • David Harvey
  • Joseph E. Stiglitz

David Held

  • Anthony McGrew
  • THEOR CULT SOC

Mohammed Hafez

  • Creighton Mullins
  • Martha Crenshaw
  • Eur J Polit Econ

Ekkart Zimmermann

  • INT SECURITY
  • Max Abrahms
  • FOREIGN AFF
  • Rhys H. Williams
  • Mark Juergensmeyer
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. Terrorism and Human Rights Free Essay Example

    terrorism law research paper

  2. Routledge Research in Terrorism and the Law: The United States

    terrorism law research paper

  3. Terrorism: : Documents in International Law Ben Saul Hart Publishing

    terrorism law research paper

  4. Research Paper On Terrorism : Partnership with Tech Against Terrorism

    terrorism law research paper

  5. Anti-terror essay

    terrorism law research paper

  6. (PDF) The Evolving Common Law Jurisprudence Combatting the Threat of

    terrorism law research paper

COMMENTS

  1. Full article: Research on Terrorism, 2007-2016: A Review of Data

    Between 2007 and 2016, 74.7% of research-based papers were the work of a single author and 74.8% of authors made only one such contribution to the field. ... (2009): 171-84; Gary LaFree and Gary Ackerman, "The Empirical Study of Terrorism: Social and Legal Research," Annual Review of Law and Social Science 5 ...

  2. Domestic Terrorism: Overview of Federal Criminal Law and Constitutional

    Domestic Terrorism: Overview of Federal Criminal Law and Constitutional Issues Congressional Research Service 2 crime, however, under numerous statutes prohibiting terrorism6 and other types of violent or destructive conduct.7 In addition, domestic terrorism may be relevant to the sentencing of those convicted of federal crimes.8 Any congressional consideration of additional legislation in the ...

  3. The Revised Academic Consensus Definition of Terrorism

    international law). The Ad Hoc Committee on Terrorism of the 6th (legal) Committee of the General Assembly has, with some interruptions, been trying to reach a legal definition since 1972 - but in vain. In the absence of a legal definition, attempts have been made since the 1980s to reach agreement on an academic consensus definition. The ...

  4. DEFINING TERRORISM: ONE SIZE FITS ALL?

    I. Introduction 'The UK uses the same legal definition for every situation in which ''terrorism'' is a legally-relevant category.' Footnote 1 This definition, in section 1 of the Terrorism Act 2000, is vague, broad and widely criticized by experts, courts and academics. Yet the decision to take a 'one-size fits all' approach to defining terrorism was taken without much ...

  5. Critical terrorism studies and the far-right: beyond problems and

    Introduction. The prominence of far-right terrorism and extremism has grown considerably within terrorism studies in recent years as evidenced by special issues (such as this!) (also Ravndal and Bjørgo Citation 2018); published bibliographies (Axelsen Citation 2018; Tinnes Citation 2020); research networks, centres and projects; and even university degrees (Schooling Citation 2021).

  6. International Laws to Control Terrorism : A Comparative Study

    Worse still, how might a definition impact seeming terrorist acts by a state's armed forces? It's a million dollar question said Subramaniam (2002) to know how far special laws would be of use in containing the menace of cross border terrorism. Terrorism has to be fought according to the rule of law and combating terrorism must be legal.

  7. Defining Terrorism: A Conceptual Minefield by Ben Saul :: SSRN

    Abstract. Calls to define 'terrorism' as a legal concept arose in the context of efforts to extradite 'political offenders' from the 1930s onwards, with many efforts, over 80 years to the present, to define, criminalize, and depoliticise a common global concept of 'terrorism'. Those international efforts remain largely unsuccessful ...

  8. Topics in terrorism research: reviewing trends and gaps, 2007-2016

    Although a standalone piece of research, this paper is part of a larger project on the state of terrorism research and is the companion piece to an article that delves into the field's methodological development over these same ten years (Schuurman Citation 2018). To maximize transparency, the dataset used for both papers is available for ...

  9. What is Terrorism? Assessing Domestic Legal Definitions

    UCLA Journal of International Law and Foreign Affairs, Vol. 16, 2011, UNSW Law Research Paper No. 2013-16 Number of pages: 86 Posted: 08 Feb 2013 Last Revised: 19 Feb 2013. You are currently viewing this paper. ... It focuses on legal definitions of terrorism in the United Kingdom, Canada, Australia, South Africa, New Zealand, India, and the ...

  10. Terrorism, Law and Policy: A Comparative Study

    This paper explores two significant factors that contribute to the conceptual ambiguity surrounding far-right violent extremism as terrorism: the legal double standards in the treatment of ...

  11. The Role of International Law and The Functioning of States in

    Action to promote peace. 1. and subversion of state sponsors of terrorism and support peace-. oriented policy action is achieved by the high level of political freedoms. 2. Political freedom does ...

  12. Fifty years of scholarly research on terrorism: Intellectual

    The scholarly literature on terrorism research is estimated to have exceeded 18,651 items as of September 2020. Articles of this literature have been disseminated across of range of different sources and disciplines including social and psychological sciences, but their concentration is most noticeable in two particular disciplines: "Political Science" (N = 4177) and "International ...

  13. Terrorism, War and International Law: The Legality of the Use of Force

    Contents: Preface Introduction The changing nature of conflict A definition of 'terrorism' Evolution of limitations on the use of force: from the League of Nations to the United Nations - 1919-1944 Evolution of limitations on the use of force: from the United Nations Charter to the present - 1945-2008 The use of force against Afghanistan in 2001 Conclusion Appendices Index.

  14. PDF Human Rights, Terrorism and Counter-terrorism

    A) and the flexibility built into human rights law to deal with exceptional circumstances (sect. B). A. The promotion and protection of human rights while countering terrorism. Just as terrorism impacts on human rights and the functioning of society, so too can measures adopted by States to counter terrorism.

  15. (PDF) International criminal law and terrorism

    The second part of the paper examines the existing definitions of terrorism and analyzes terrorism as a crime in international criminal law. Terrorism has long transcended national borders and is ...

  16. Terrorism and International Humanitarian Law by Ben Saul

    Sydney Law School Research Paper No. 14/16. 17 Pages Posted: 13 Feb 2014 Last revised: 19 Aug 2022. See all articles by Ben Saul ... Terrorism and International Humanitarian Law (February 11, 2014). RESEARCH HANDBOOK ON INTERNATIONAL LAW AND TERRORISM, B. Saul, ed., Edward Elgar, pp. 208-231, 2014, Sydney Law School Research Paper No. 14/16 ...

  17. PDF Defining Terrorism in National and International Law

    It consists of two elements. The first relies on the success of prohibiting specific ac-tion in the Conventions that where brought about from the 1960s to the 1980s. Art. 2, para. 1 a) of the Convention simply refers to these specific conventions and declares as terrorism acts which are mentioned in these conventions.

  18. Terrorism and counterterrorism: an overview

    1. Introduction. Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate noncombatant victims (Enders and Sandler, 2012, p.4).The two essential ingredients of terrorism are its violence and its political or social motive.

  19. 50 Un- and Under-researched Topics in the Field of (Counter-) Terrorism

    Alex P. Schmid, 50 Un- and Under-researched Topics in the Field of (Counter-) Terrorism Studies, Perspectives on Terrorism, Vol. 5, No. 1 (March 2011), pp. 76-78

  20. PDF Essay 1. Terrorism and the law: past and present international approaches

    Campaigns of terror—whether instigated by states (as in Guatemala in the 1980s) or by non-state groups (as in Angola in the past three decades)—are often simply mass violations of fundamental human rights such as the right to life and to security. 4 The convention was signed at The Hague on 16 Dec. 1970.

  21. PDF Module 1 INTRODUCTION TO INTERNATIONAL TERRORISM

    The term "terrorism" was initially coined to describe the Reign of Terror, the period of the French Revolution from 5 September 1793 to 27 July 1794, during which the Revolutionary Government directed violence and harsh measures against citizens suspected of being enemies of the Revolution.

  22. (PDF) Globalization and International Terrorism: Its Implications on

    The findings of this study suggest that globalization has contributed to the rise of terrorism, and that its impacts on global peace and. security are complex and multi-faceted. The impact of ...

  23. Full article: Too Close for Comfort: Cyber Terrorism and Information

    Cyber terrorism is an elusive concept. Most definitions make a distinction between on the one hand politically motivated violent acts, or the threat thereof, using the internet, and on the other hand all the preparatory and supporting activities for terrorism done on or via the internet, such as recruitment, communication and financing.