1
The Counter-Terrorism Constitution
I.Introduction
At the heart of the national security constitution in its modern form stand those powers which address, directly and explicitly, the threat of terrorism. Here, not only is there a significant body of law to consider, but that body of law is rapidly and constantly evolving: the law of counter-terrorism in the middle of the centuryâs second decade was very different from that which was put in place by the Terrorism Act 2000. This first chapter considers the evolution of that law, providing an overview of the background to the legal position, followed by a discussion of the key developments since the attacks of 11 September 2001, showing how the approach to counter-terrorism has shifted in response to changing patterns of national security threats (or at least changing perception as to the nature of those threats) and considering certain specifically constitutional themes which recur within the modern law of counter-terrorism. The most important point which emerges from this chapter, however, is one which cannot be made directly within it, but must be made elsewhere in this book: that the law of counter-terrorism upon which this chapter focuses, though it is the most direct constitutional response to modern threats to national security at home, constitutes only a small fraction of the national security constitution.
Though in beginning from a consideration of the law of counter-terrorism we are addressing that element of our broader subject which enjoys the highest public (and academic) profile, to focus only upon the law of counter-terrorism would be to miss the number of other ways in which the constitution promotes and otherwise reflects the ends of national security. One point to make is that in considering the counter-terrorism constitution, we are always in the domain of exceptionalism. Even where the law is stable over time, even where the powers are widely used, the law of counter-terrorism necessarily presents itself as something exceptional, a body of law which implements powers or limits rights in ways which would not otherwise be accepted because it responds to a phenomenon which exists outside the mainstream of those activities which the law is required to address. Were it otherwiseâwere terrorism understood by lawmakers to be a phenomenon capable of accommodation within the normal criminal and civil lawâthere would be no counter-terrorism law. In what follows, that claim to exceptionalism acts as the background to certain critical observations made about the law in this area, but it should not thereby be assumed that it is in any way endorsed. There is good reason to believe not only that terrorism is not an exceptional phenomenon requiring an exceptional legal response, butâfurtherâthat there does not exist a group of activities which can be usefully categorised, at least as a matter of law, as a single phenomenon of âterrorismâ.1
II.CONTEST and the Joint Terrorism Analysis Centre
The governmentâs approach to terrorism is underpinned by âCONTEST: The United Kingdomâs Strategy for Countering Terrorismâ, published for the first time in 2006 and reissued, following occasional revision, in 2011. The strategy, the aim of which is âto reduce the risk to the UK and its interests overseas from terrorism, so that people can go about their lives freely and with confidenceâ, is organised around four âworkstreamsâ: Pursue (âto stop terrorist attacksâ); Prevent (âto stop people becoming terrorists or supporting terrorismâ); Protect (âto strengthen our protection against a terrorist attack)â; and Prepare (âto mitigate the impact of a terrorist attackâ).2 The second of the four has been the subject of the most sustained attention, as a result of the perceived anti-Muslim bent of many of the projects which take place within the workstream.3 Otherwise, what is most striking about CONTEST strategy is the level of generality at which the key commitments are formulated, and how little work they are therefore able to do in determining the specific steps taken in order to combat the threat of terrorism. That is, though the various legal issues and regimes described in the chapter can all easily be numbered under one or the other of these headings, the specific form that they take and the manner in (and time at) which they are reformed or amended, appears to be causally connected to CONTEST in only the loosest of ways.
The key institution of the counter-terrorism constitutional order is the Joint Terrorism Analysis Centre (JTAC), established in 2003, which is the body which âpulls together all the available intelligence on the Islamist threat, analyses it and produces short-term assessments of the level of threat and longer-term assessments of terrorist networks, capabilities and trends.â4 JTAC enjoys a certain level of prominence as the body which sets the âthreat levelââthe threat posed to the UK by international terrorism on one hand and Northern Irish terrorism on the otherâchanges in the former of which are widely reported and often result directly in changes to the experience of travellers and other sections of the public.5 JTAC, though it is âself-standingâ and comprises representatives of over a dozen separate bodies and agencies, is based within MI5âs headquarters. Its head is accountable to the Director General of MI5, and reports periodically to the JTAC Oversight Board. The creation of JTAC is widely seen to have been a positive development (Hennessy notes that it has âspawned a number of imitators across the developed worldâ)6 and it may well be true that the quality of analysis has improved as a result. It is nevertheless clear that very little of JTACâs work leaves any obvious mark upon the legal record.
III.The Role of the Criminal Law in Counter-Terrorism
One of the key features of the legal response to terrorism is, of course, the criminal law. There exist, and have existed for many decades, a large (and growing) number of criminal offences which specifically relate to terrorism, as well as an unquantifiable number which might be committed by people recognisedâin law or merely informallyâas terrorists. Some of the terrorism offences are intuitively justified; others are far broader than can be justified and only selective enforcement prevents the law being brought into disputeâperhaps rendered farcicalâby their existence.7 Some are prosecuted with relative frequency; others rarely or not at all.8 There is also a special power of arrest under section 41 of the Terrorism Act 2000, to which a longer permissible period of pre-charge detention than usual applies.9 Though this chapter makes reference to some of the relevant offences at certain points, they are not its focus. For one thing, the offences in question (mostly) raise issues which are not relevant to a consideration of national security from a constitutional perspective. There are, of course, exceptionsâsee, for instance, the consideration of public interest immunity and in camera trials in Chapter 5âbut the primary issues to which the various relevant offences give rise are better addressed by criminal lawyers. That there remains a counter-terrorism constitution to consider in this chapter is the result of a variety of factors. A first is that the criminal law can respond only to acts which have already taken place (even if those acts are preparatory to some act which might take place in future). The legal response to terrorism seeks, alongside that possibility, to pre-empt terrorist acts; to put in place mechanisms which prevent them from taking place at all. Related to this is the criminal standard of proof: thoughâas we shall seeâthe legal threshold for the various mechanisms under discussion here varies, each is by definition lower than the âbeyond reasonable doubtâ standard used in the criminal law, and some are much lower indeed.
This alone does not explain the discrepancy: after all, the criminal standard of proof applies generally, and there is no sense in which too few offences are successfully prosecuted in the contemporary United Kingdom. More important within the specific context of terrorism is the law governing the use made within the legal process of material acquired via the interception of communications (what is usually described as âintercept evidenceâ, and which by statute includes the content of intercepted communications but also âsecondary dataâ or âcommunications dataâ associated with those communications).10 The relevant rules as found in the Regulation of Investigatory Powers Act 2000 (RIPA) provided that âno evidence shall be adduced, question asked, assertion or disclosure made or other thing done in, for the purposes of or in connection with any legal proceedingsâ which disclosed intercept material in circumstances suggesting that it originated in one of a number of acts, or which tended to suggest that such acts had taken place.11 For present purposes, the most important of those acts was âthe issue of an interception warrantâ but also included within the categories of acts which were not to be disclosed in this way were unlawful interception by one of a number of identified agents of the state, the making of an application for a warrant, and âthe imposition of any requirement on any person to provide assistance with giving effect to an interception warrant.â12 The basic position therefore effectively prevented the use of intercept evidence though without directly forbidding it: if the material could be adduced in a manner which did not suggest that it originated in any of the relevant acts (or that such acts had otherwise taken place) then it could be used. This rule was subject to a number of exceptions, the most important of which permitted the material to be used before various specialist bodies (the Investigatory Powers Tribunal, the Special Immigration Appeals Commission etc),13 subject to limitations preventing the disclosure of the relevant material to the non-state party (or parties) and their ordinary counsel (rather than special advocates).14 Communications data could be adduced in legal proceedings where to do so did not suggest the issue of an interception warrant; as, for example, where it was acquired under the separate powers in RIPA governing the acquisition of such data. An equivalent scheme to that in RIPA is now contained in the Investigatory Powers Act 2016 (IPA).15
The effect of these regimes is to allow intercept material to be disclosed (and relied upon) in those specialist tribunals which are required (or empowered) by statute to employ âclosed material proceduresâ, as long as doing so does not lead that material being disclosed to those (including the person on whom the measures etc are imposed) outside of the national security framework. As discussed in Chapter 5, however, such procedures are not available in the context of criminal law; their use therein would represent a clear (and inherent) breach of natural justice which, though it could as a matter of law be authorised by Parliament, would often be incompatible with the European Convention on Human Rights. Intercept evidence can therefore be used to demonstrate the necessity of imposing some civil measure upon persons suspected of involvement in terrorism (and in rebutting any challenge to that imposition) but ...