Atnaujinkite slapukų nuostatas

El. knyga: National Security Law, Procedure, and Practice

Edited by (, Commissioner of the Criminal Cases Review Commission), Edited by (Judge of the Upper Tribunal, Administrative Appeals Chamber), Associate editor (Barrister in independent practice)
  • Formatas: 992 pages
  • Išleidimo metai: 11-Mar-2021
  • Leidėjas: Oxford University Press
  • Kalba: eng
  • ISBN-13: 9780192650405
Kitos knygos pagal šią temą:
  • Formatas: 992 pages
  • Išleidimo metai: 11-Mar-2021
  • Leidėjas: Oxford University Press
  • Kalba: eng
  • ISBN-13: 9780192650405
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This detailed, practitioner text, explains national security law in all its aspects. It collates and explains the core elements of the law, both substantive and procedural, and the practical issues which may arise in national security litigation. The book draws on the professional experience
of a team of expert contributors. The first part explores the meaning of “national security”, examines the respective roles in this area of Parliament, the executive and the courts, and explains the law relating to the security and intelligence agencies, their powers and oversight. The core of the
book addresses the various executive measures used to disrupt terrorism, espionage and other hostile state activity, usually on the basis of secret intelligence, and the civil proceedings that may result from executive action taken for the national security purposes. The third part addresses
national security and the criminal law. The remaining chapters address national security law in such diverse contexts as inquests, inquiries, employment, vetting, family, freedom of information, and data protection proceedings.

National security law is now of relevance to a wide range of practising lawyers, judges, legislators, policymakers, oversight bodies, and academic experts working in a variety of legal fields well beyond public law. The highly-specialised nature of the topic make this book a vital text not only for
those seeking an overview of the law, but also for experienced practitioners instructed to act in proceedings in which national security issues may arise. The intense media and public scrutiny which accompanies many national security cases will also make this book of interest to a wider audience
seeking to understand the legal context of such cases.
Table of Cases
xxxvii
Table of Legislation
lxv
List of Contributors
ciii
I OVERVIEW
1 National Security, Intelligence, and the Law
3(31)
Robert Ward
A Introduction
1(2)
B Sources of UK national security law
3(20)
1 Statute
3(1)
2 Common law
4(3)
3 European Convention on Human Rights
7(3)
4 International law
10(4)
5 EUlaw
14(9)
C Development of national security law
23(10)
D The meaning of `national security'
33(42)
1 Academic approaches
34(11)
2 The National Security Strategy
45(9)
3 Statute
54(8)
4 Domestic case law
62(8)
5 ECHR
70(5)
E Intelligence and its use in legal proceedings
75(5)
1 Intelligence and evidence
80(6)
2 The overall public interest
86
2 National Security and the Separation of Powers
34
Robert Ward
A Parliament and national security
1(1)
1 Out of the shadows
1(3)
2 The devolved legislatures
4(2)
3 Parliamentary oversight--ISC v select committees
6(8)
(a) The National Cyber Security Centre
14(2)
B The executive and national security
16(15)
1 The machinery of government
16(1)
(a) The National Security Council
17(2)
(b) COBR (or COBRA)
19(1)
(c) Joint Intelligence Committee
20(4)
(d) Joint Terrorism Analysis Centre
24(2)
(e) Joint State Threats Assessment Team
26(1)
2 Ministers and officials
27(2)
(a) The Carltona principle
29(2)
C Policy responses to threats to UK national security
31(29)
1 Terrorism
32(1)
(a) CONTEST
32(16)
2 Extremism
48(1)
(a) Counter Extremism Strategy
48(3)
(b) Commission for Countering Extremism
51(1)
(c) Extremism Analysis Unit
52(5)
3 State-based threats or `hostile State activity'
57(3)
D The courts and national security
60(14)
1 Judicial deference and relative institutional competence
62(6)
2 Fact and evidence
68(3)
3 Human rights cases
71(5)
4 National security and other aspects of the public interest
76(7)
5 Derogation from ECHR in time of war or other public emergency
83(3)
(a) Time of war or `other public emergency threatening the life of the nation'
86(2)
(b) Measures limited to the'extent strictly required'
88(3)
(c) Measures not inconsistent with State's other obligations under international law
91
3 The Security and Intelligence Agencies
74
Robert Ward
A Legal basis
1(1)
1 Security Service Act 1989 and Intelligence Services Act 1994
1(6)
2 Functions
7(1)
(a) MI5
7(4)
(b) SIS
11(1)
(c) GCHQ
12(1)
(d) `The protection of' and `the interests of'
13(7)
3 `Authority' and `control'
20(4)
4 MI5, national security, and subversion
24(10)
5 Actual and potential threats
34(6)
B Statutory gateways
40(4)
C Neither confirm nor deny principle
44(10)
1 The rationale for' neither confirm nor deny
44(6)
2 Exceptions to the principle
50(4)
D Control principle or third-party rule
54(47)
4 Surveillance Powers
101(34)
Christopher McNall
Laura Sheldon Green
Caroline Stone
Robert Ward
A Introduction
1(1)
B Powers
2(87)
1 Intelligence Services Act 1994
4(1)
(a) Property warrants
4(5)
(b) Section 7 authorisations
9(4)
2 Regulation of Investigatory Powers Act 2000
13(3)
(a) Directed surveillance authorisations
16(5)
(b) Intrusive surveillance warrants
21(6)
(c) CHIS authorisations
27(11)
3 Investigatory Powers Act 2016
38(3)
(a) Legal challenges to the bulk powers
41(8)
(b) Targeted interception warrants
49(13)
(c) Targeted examination warrants
62(1)
(d) Authorisations for obtaining communications data
63(3)
(e) Communications data retention notices
66(1)
(f) Targeted equipment interference (`EI') warrants
67(7)
(g) Bulk interception warrants
74(2)
(h) Bulk acquisition warrants
76(1)
(i) Bulk equipment interference (`EI') warrants
77(2)
(j) Bulk personal dataset (`BPD') warrants
79(7)
(k) Combined warrants and authorisations
86(1)
(i) National Security Notices and Technical Capability Notices
87(2)
C Members of Parliament and the `Wilson doctrine'
89(6)
D Legally privileged information
95(40)
1 Legal professional privilege
96(6)
2 Lawyer-client communications--the IPA 2016 framework
102(7)
3 Key safeguards
109(1)
(a) Warrants or authorisations where the purpose, or one of the purposes, is to obtain or examine legally privileged communications
109(3)
(b) Specific handling measures and need to consult internal lawyers
112(2)
(c) Retention of material--oversight of the Investigatory Powers Commissioner
114(2)
4 Use and dissemination of LPP material
116(19)
5 Oversight and Accountability
135(35)
Christopher McNall
Robert Ward
A Introduction
1(2)
B Intelligence and Security Committee of Parliament
3(18)
C Investigatory Powers Commissioner
21(52)
1 The work of the IPC and the other Commissioners
28(2)
2 Review and oversight of systems
30(7)
3 Codes of Practice
37(2)
4 The Consolidated Guidance and Principles
39(4)
5 Efficacy of IPCO's review and inspection
43(10)
6 Consideration of individual warrants by Commissioners (the "doublelock" mechanism)
53(12)
(a) Rejection and resubmission of warrants
65(8)
D The Investigatory Powers Tribunal
73(65)
1 Making a claim or a complaint to IPT
93(1)
(a) A human rights claim--RIPA section 65(2)(a)
93(2)
(b) A complaint--RIPA section 65(2)(b)
95(2)
2 Entertainment of a claim or complaint
97(6)
3 The Tribunal's information powers
103(6)
4 Hearings
109(7)
5 Evidence
116(1)
6 Counsel to the Tribunal
117(4)
7 Remedies
121(3)
8 Decision-making
124(4)
9 Applications for leave to appeal
128(7)
10 Other routes of challenge to decisions of the IPT
135(3)
E The Independent Reviewer of Terrorism Legislation
138(32)
1 Statutory functions
143(2)
2 Non-statutory functions
145(2)
(a) The `stock-take'
147(23)
6 Closed Proceedings
170(35)
Angus McCullough
Ben Watson
A Introduction
1(2)
B Public interest immunity
3(13)
C The development of Closed proceedings
16(17)
1 The Advisory Panel in Immigration Proceedings
16(3)
2 The Special Immigration Appeals Commission
19(1)
3 Closed procedures in counter-terrorism legislation
20(8)
4 AlRawiv Security Service
28(1)
5 The Justice and Security Act 2013
29(4)
D Current extent of Closed material procedures in national security contexts
33(6)
E Key features of CMPs
39(7)
F Special advocates
46(8)
1 Appointment of special advocates
46(4)
2 Role of the special advocate
50(1)
3 Communication by and with special advocate
51(1)
4 The Special Advocates' Support Office
52(2)
G Closed proceedings in practice
54(8)
1 The preliminary disclosure process
54(5)
2 The substantive hearing
59(1)
3 Judgment
60(2)
H Fairness and disclosure
62(30)
1 Article 6 ECHR
63(6)
(a) Secretary of State for the Home Department v AF (No. 3)
69(4)
(b) AF (No.3) disclosure in other proceedings
73(4)
(c) The approach in Article 6 cases where AF (No. 3) does not apply
77(6)
2 EU rights cases
83(4)
(a) ZZ disclosure
87(2)
(b) Disclosure in non-ZZ cases
89(3)
I Disclosure in practice
92(113)
1 Exculpatory material and searches
92(12)
2 Gisting
104(101)
II EXECUTIVE MEASURES AND RELATED CIVIL PROCEEDINGS
7 Executive Measures and Civil Proceedings--Common Evidential and Procedural Issues
205(48)
Rosemary Davidson
Jonathan Glasson
Caroline Stone
A Introduction
1(4)
1 Types of hearing
4(1)
B Assessment of future risk
5(6)
C Use of torture-tainted evidence
11(18)
1 The exclusionary rule
11(2)
2 Does the exclusionary rule apply to evidence obtained by inhuman or degrading treatment?
13(3)
3 Standard of proof
16(2)
4 Establishing whether evidence has been obtained by torture and `diligent inquiries'
18(2)
5 Approach to weight where evidence admitted but there is doubt about how it was obtained
20(3)
6 Exculpatory material obtained by torture
23(1)
7 The executive's use of evidence obtained by torture
24(2)
8 Reliance on torture-tainted evidence in court proceedings in defending the lawfulness of executive action?
26(3)
D Reverse Closed procedures
29(17)
1 The power to make a reverse Closed order
29(3)
2 The procedure for making a reverse Closed order
32(6)
3 Limitations on the use of reverse Closed orders
38(4)
4 The irrevocable nature of a reverse Closed order and the potential for an application for waiver
42(2)
5 The weight to be placed on evidence adduced under a W (Algeria) order
44(2)
E Reliance on material from criminal investigations and proceedings
46(12)
1 Criminal convictions
48(1)
(a) UK convictions
48(2)
(b) Foreign convictions
50(2)
(c) Acquittals
52(6)
F Third party legal professional privilege
58(12)
1 Scope of `legal professional privilege'
60(4)
2 Litigation regarding interception and handling of third-party LPP
64(1)
3 Abuse of process application
65(5)
G Res judicata
70(26)
1 Res judicata--legal principles
72(2)
2 Identity of parties
74(1)
3 Cause of action estoppel
75(3)
4 Issue estoppel
78(3)
5 Cases where there is no identity of parties
81(5)
6 Res judicata in SIAC cases
86(5)
7 Res judicata in other national security cases
91(5)
H Abuse of process
96(24)
1 The abuse of process jurisdiction
100(1)
(a) The conduct of the parties
100(2)
(b) Fair trial and executive misconduct
102(5)
2 The exercise of the abuse jurisdiction in the national security context
107(1)
(a) National security cases in the High Court
107(6)
(b) The Special Immigration Appeals Commission (`SIAC')
113(4)
(c) The Investigatory Powers Tribunal
117(1)
3 Burden of proof
118(1)
4 Disclosure
119(1)
I Anonymity and reporting restrictions
120(11)
1 Governing principles
120(4)
2 Grounds for an anonymity order
124(2)
3 Terms of the order and associated measures
126(2)
4 Procedure
128(3)
J Costs in cases involving Closed proceedings
131(122)
1 Governing principles
131(4)
(a) BeggvHM Treasury
135(5)
(b) Beyond Beg?
140(6)
(c) Assessment of costs--proportionality
146(1)
2 Closed costs--the practicalities
147(2)
(a) Costs budgets and costs management
149(4)
(b) Assessment of Closed costs
153(3)
3 SIAC
156(97)
8 Judicial Review
253(42)
David Blundell
A Introduction
1(5)
B Issues in national security judicial review cases
6(27)
1 SIAC's application of judicial review principles
8(5)
2 AHK disclosure
13(7)
3 Irrationality/proportionality
20(8)
4 Natural justice
28(3)
5 Judicial deference
31(2)
C Judicial review in practice
33(262)
1 Prerogative powers--passport denial and cancellation
35(3)
(a) The nature of a passport
38(2)
(b) The power to grant or withdraw a passport
40(7)
(c) Has the royal prerogative to cancel passports been superseded by statute?
47(17)
(d) Does a passport cancellation decision engage EU law?
64(12)
(e) Standards of disclosure
76(9)
(f) Necessity and proportionality
85(3)
(g) Fact-finding and the approach to review
88(5)
(h) New material
93(5)
(i) Prior representations
98(8)
(j) Articles 6 and 8 ECHR
106(3)
2 Temporary exclusion orders
109(3)
(a) The statutory framework
112(4)
(b) Effect of a TEO
116(2)
(c) TEO procedure
118(3)
(d) Revocation of a TEO
121(1)
(e) Permit to return
122(8)
(f) Further TEO provisions
130(1)
(g) TEO obligations
131(2)
(h) Breach of a TEO a criminal offence
133(1)
(i) Notice of a TEO
134(1)
(j) Judicial oversight of TEO decisions and standard of review
135(1)
(k) Permission--court review under Condition E
136(10)
(l) Review of TEO decisions
146(4)
3 Other uses of judicial review
150(1)
(a) Immigration decisions on common law grounds
151(4)
(b) Refusal or revocation of bail
155(4)
(c) Decisions of the Investigatory Powers Tribunal
159(136)
9 Terrorism Prevention and Investigation Measures
295(45)
Andrew Deakin
Helen Thompstone
A Introduction
1(15)
1 Historical and policy background
1(6)
2 Basic structure of TPIM regime
7(4)
3 TPIMs in the context of other disruptive powers
11(3)
4 Process for recommending a TPIM
14(2)
B Condition A: terrorism-related activity
16(7)
C Condition B: `new' terrorism-related activity
23(3)
D Condition C: necessity for a TPIM
26(5)
E Condition D: necessity for the specified measures
31(5)
F Condition E: court permission
36(26)
G Measures
62(28)
1 Overnight residence measure
64(8)
2 Travel measure
72(2)
3 Exclusion measure
74(1)
4 Movement directions measure
75(1)
5 Financial services measure
76(1)
6 Property measure
77(1)
7 Weapons and explosives measure
78(1)
8 Electronic communication device measure
79(3)
9 Association measure
82(2)
10 Work or studies measure
84(1)
11 Reporting measure
85(1)
12 Appointments measure
86(2)
13 Photography measure
88(1)
14 Monitoring measure
89(1)
H Notices and police powers
90(13)
1 Service of TPIM notices
90(2)
2 Powers of entry, search, seizure, and retention
92(7)
3 Powers to take fingerprints and samples
99(4)
I Duration, extension, revocation, revival, and review
103(5)
J Section 9 review
108(39)
1 Function of the court
109(3)
2 Conditions A and B
112(5)
3 Conditions C and D
117(2)
(a) Meaning of `necessary'
119(4)
(b) Timing of the consideration of necessity
123(5)
4 Sensitive information
128(8)
5 Material for the review
136(2)
6 The special advocate
138(1)
7 The hearing
139(4)
8 Following the hearing
143(4)
K Variations
147(6)
L Section 16 appeals
153(17)
1 Types of appeal
153(1)
(a) Against the extension or revival of a TPIM notice
154(1)
(b) Against variation of TPIM measures without consent, where that variation does not consist of the removal or relaxation of measures
155(1)
(c) Against the refusal of an application for variation
156(2)
(d) Against the refusal of an application for revocation
158(1)
(e) Against the refusal of an application for permission
159(1)
2 Conduct of a section 16 appeal
160(4)
3 Section 16 appeals in advance of section 9 reviews
164(1)
4 Interlocutory relief
165(5)
M Reconsideration and further appeals
170(2)
N Additional obligations
172(3)
O Offences
175(165)
10 Special Immigration Appeals Commission--General
340(44)
Robin Tarn
A History and establishment
1(6)
B Constitution
7(8)
C The Closed material procedure and the special advocate
15(10)
D Jurisdiction
25(54)
1 Non-EEA immigration appeals
25(9)
2 EEA immigration appeals
34(5)
3 Jurisdiction--appeals against deprivation of citizenship
39(4)
4 Other decisions
43(7)
5 Bail
50(29)
E Procedure
79(94)
1 Starting proceedings
79(7)
2 Directions hearing
86(12)
3 Making a bail application
98(5)
4 Open and Closed evidence
103(27)
5 Communication involving the special advocate
130(9)
6 Procedure--confidential evidence and W (Algeria)
139(15)
7 The hearing
154(14)
8 The determination
168(5)
F Onward appeals and challenges
173(211)
11 SIAC Individual Measures (1)--Deportation with Assurances
384(30)
Robin Tarn
A History
1(21)
B The deportation power and rights of appeal
22(8)
C National security and the conducive to the public good' test
30(8)
D `Safety on return grounds
38(26)
1 The time at which `safety on return' should be considered
58(6)
E Assurances and securing safety for Article 3 purposes
64(15)
F Assurances and other Articles of the ECHR
79(335)
12 SIAC Individual Measures (2)--Deprivation, Exclusion, and Naturalisation
414(52)
Rupert Jones
A Introduction
1(1)
B Deprivation of citizenship
2(81)
1 Notices of deprivation
7(1)
2 Timing of deprivation--notices and orders
8(3)
3 Serving of deprivation notices
11(2)
4 Timing of deprivation--subject outside the jurisdiction
13(5)
5 `Conducive to the public good'
18(7)
6 Is deprivation lawful only where the person poses a risk of current harm?
25(2)
7 Effect of deprivation
27(1)
8 Proportionality
28(4)
9 Application of the European Convention on Human Rights
32(7)
10 Appeals to SIAC
39(2)
11 Practice and procedure in SIAC--time limit for appealing and extensions
41(6)
12 Practice and procedure in SIAC--strike out and summary judgment
47(2)
13 Practice and procedure--appellants not giving evidence to SIAC
49(1)
14 Exclusion of evidence or abuse of process in appeals before SIAC
50(1)
15 Disclosure in deprivation notices and appeals
51(5)
16 ECHR and disclosure of the grounds relied on by the Secretary of State
56(2)
17 EU law and disclosure of the essence of the grounds
58(7)
18 EU rights and the impact of Brexit
65(2)
19 Resolving disputes as to whether sufficient disclosure has been made
67(1)
20 Statelessness
68(6)
(a) Evidence of foreign nationality
74(3)
(b) Burden of proof in statelessness
77(1)
(c) Statelessness and causation
78(1)
(d) The exception in section 40(4A) of the BNA1981
79(4)
C Exclusion from the UK
83(54)
1 Exclusion decisions against non-European Economic Area nationals
85(1)
(a) Exclusion decisions--source of the power
86(10)
(b) Challenging an exclusion decision
96(4)
(c) Procedure on the review before SIAC
100(3)
(d) The approach SIAC applies in reviewing the conducive grounds
103(3)
(e) Opportunity for subject of exclusion decision to make representations prior to decision
106(1)
(f) No in-country right of appeal against an exclusion or deprivation decision
107(2)
(g) Impact of the ECHR on exclusion decisions
109(5)
2 Exclusion orders--exclusion of EEA nationals and their non-EEA family members
114(4)
(a) Individuals with a permanent right of residence--serious grounds of public security
118(2)
(b) EEA nationals with a permanent right of residence and ten years' residence in the UK or who are children--imperative grounds of public security
120(3)
(c) Appeal rights against exclusion orders
123(2)
(d) Exclusion orders--notifications and removals
125(1)
(e) Application of EU law to exclusion orders--disclosure of the essence of the grounds
126(10)
(f) Proportionality
136(1)
D Refusal of naturalisation
137(329)
1 Challenging the refusal of naturalisation on national security grounds
138(7)
E Appeals before the First-tier and Upper Tribunals (Immigration and Asylum Chamber) which may give rise to issues of national security
145(321)
13 Proscription
466(14)
Robert Ward
Clare Pophale
A Introduction
1(5)
B Legal framework
6(14)
1 Statutory test
7(5)
2 Discretionary factors
12(5)
3 Proscription order
17(2)
4 European Convention on Human Rights
19(1)
C Continuing duty of review
20(3)
D Criminal offences arising from proscription
23(2)
E Application for deproscription
25(8)
1 Cessation of involvement in terrorism but possibility of future re-engagement
26(4)
2 Application process
30(3)
F Appeal to POAC
33(13)
1 Lodging an appeal
36(3)
2 Case management and Closed material procedure
39(4)
3 Determination of the appeal
43(3)
G Further appeal
46(434)
14 Civil Proceedings--General
480(53)
Kate Grange
Caroline Stone
I CMPs And Withholding Disclosure On Public Interest Grounds
1(1)
A Background to the JSA 2013
1(6)
B Closed material procedures under the JSA 2013
7(101)
1 Overview--three stages: section 6 (declaration), section 8 (application), and section 7 (review)
7(3)
2 Jurisdiction--'relevant civil proceedings'
10(3)
3 The first stage--section 6 declaration
13(1)
(a) PII pre-condition--section 6(7)
14(2)
(b) The test for granting asection 6 declaration--sections 6(4) and 6(5)
16(12)
(c) Residual discretion
28(1)
(d) Grant of a section 6 declaration
29(1)
(e) Lessons from the case law--making section 6 applications in practice
30(8)
(f) Procedure--how to apply for a section 6 declaration
38(9)
4 The second stage--section 8 Closed material application
47(3)
(a) Test to be applied
50(6)
(b) Summaries of sensitive material
56(2)
(c) Election not to disclose
58(1)
(d) Article 6 ECHR
59(3)
(e) Procedure--how to make a section 8 application
62(7)
5 The third section 7 review stage
69(1)
(a) Test to be applied
69(6)
(b) Procedure
75(3)
6 Article 6 ECHR in JSA 2013 proceedings
78(1)
(a) Governing principles
78(2)
(b) Disclosure in JSA 2013 proceedings where Article 6 applies
80(2)
7 JSA 2013 and Part 82 CPR--other key features
82(1)
(a) Modification of the overriding objective
82(2)
(b) Role of the special advocate
84(5)
(c) Hearings and judgments
89(6)
(d) Miscellaneous provisions
95(2)
8 Appeals
97(2)
(a) Appeals regarding substantive decisions
99(7)
9 Annual reports and the review--sections 12 and 13
106(2)
C Other potential mechanisms for withholding full disclosure of sensitive material
108(58)
1 Public interest immunity (`PII')
108(1)
(a) Ongoing importance of PII
108(1)
(b) The legal basis for PII
109(3)
(c) The threshold tests for claiming PII
112(12)
(d) PII in the national security context
124(2)
(e) Procedure for determining PII claims
126(2)
(f) Use of PII advocates
128(5)
(g) Handling the making of PII applications in practice
133(7)
(h) Interplay between CMPs and PII
140(3)
2 Haralambous--CMPs available where lower court has statutory CMPs
143(4)
3 Confidentiality rings
147(7)
4 Residual role of CarHdu/f strike out application
154(2)
5 Preclusion oiNorwich Pharmacol claims
156(2)
(a) JSA 2013, section 17
158(4)
(b) JSA 2013, section 18--challenging certification
162(4)
II Jurisdictional Hurdles In Civil Claims
166(2)
D State immunity
168(6)
1 Outline of the principles
168(4)
2 Application in national security sphere
172(2)
E Foreign act of state
174(6)
1 Outline of the principles
174(4)
2 Application in the national security sphere
178(2)
F Crown act of state
180(6)
1 Outline of the principles
180(5)
2 Application in the national security sphere
185(1)
G Justiciability
186(347)
1 Outline of the principles
186(2)
2 Application in the national security sphere
188(345)
15 Civil Proceedings--the Main Types of Claim
533(42)
Charlotte Ventham
Georgina Wolfe
A Introduction
1(9)
B Causes of action in tort
10(64)
1 False imprisonment
10(12)
2 Misfeasance in public office
22(3)
(a) Act or omission
25(1)
(b) Public officer
26(2)
(c) Exercise of power
28(1)
(d) Bad faith
29(8)
(e) Causation
37(1)
(f) Actionable damage that is not too remote
38(3)
3 Conspiracy to injure
41(8)
4 Negligence
49(12)
5 Assault and battery
61(5)
6 Harassment
66(6)
7 Defences
72(2)
C Limitation
74(8)
D Applicable law
82(21)
1 Introduction
82(1)
2 Private International Law (Miscellaneous Provisions) Act 1995
83(8)
3 Foreign Limitation Periods Act 1984
91(5)
4 Rome II
96(5)
5 Practicalities
101(2)
E Convention claims
103(20)
1 Introduction
103(1)
2 Victim status
104(4)
3 Jurisdiction
108(4)
4 Secret surveillance
112(10)
5 Other HRA claims
122(1)
F Damages
123(46)
1 Introduction
123(3)
2 General damages
126(1)
(a) Pain, suffering and loss of amenity (`PSLA')
126(2)
(b) Loss of liberty
128(10)
(c) Injury to feelings
138(4)
(d) Loss of congenial employment
142(1)
3 Aggravated damages
143(5)
4 Exemplary damages
148(8)
5 Special damages
156(5)
6 Damages under the Human Rights Act
161(8)
G Conducting private law damages claims in the national security context
169(406)
1 Introduction
169(1)
2 Statements of case
170(6)
3 Corporate witnesses
176(4)
4 Alternative dispute resolution
180(3)
5 Judgments
183(392)
16 Asset Freezing
575(39)
Richard O'Brien
Linda Moss
A Introduction
1(4)
B United Nations asset freeze
5(18)
1 Overview of regime
5(3)
(a) UN sanctions against specific organisations
8(9)
(b) UN sanctions against terrorists (thematic/general)
17(2)
2 Methods of challenge
19(4)
C European Union asset freeze
23(16)
1 Overview of regime
23(7)
(a) EU sanctions against terrorists (thematic/general)
30(2)
(b) EU sanctions regime against specific organisations
32(4)
2 Methods of challenge
36(3)
D Domestic asset freeze
39(40)
1 Overview of regime
39(8)
2 Designation by the Treasury
47(1)
3 Final designation
48(2)
(a) The first condition--reasonable belief of involvement in terrorist activity
50(10)
(b) The second condition--necessary for purposes connected with protecting the public
60(2)
(c) Proportionality
62(4)
4 Interim designation
66(3)
5 Notification--the Consolidated List
69(3)
6 Extent and duration
72(1)
(a) Territorial extent and application
72(2)
(b) Duration and renewal
74(2)
7 Methods of challenge
76(1)
(a) Appeal to the court in relation to Treasury designations
76(3)
E Penalties and enforcement
79(32)
1 Prohibited activities
83(6)
2 Offences
89(3)
3 Reporting obligations
92(3)
4 Monetary penalties
95(4)
5 Exceptions and licences
99(1)
(a) Exceptions
99(2)
(b) Licences
101(8)
(c) Review of licensing decisions
109(2)
F Asset freeze proceedings
111(18)
1 Rules of court
111(2)
(a) Closed material procedure
113(3)
(b) Disclosure
116(3)
(c) Anonymity
119(3)
(d) Costs
122(2)
(e) Damages
124(5)
G Other counter-terrorist financing legislation
129(10)
1 Other domestic asset-freezing powers
129(1)
(a) Overseas asset freeze
130(3)
(b) Account freezing orders
133(2)
(c) Restrictions on terrorist financing
135(2)
2 Other counter-terrorism financing legislation
137(2)
H Sanctionsand Anti-Money Laundering Act 2018
139(475)
1 Power to make sanctions regulations
141(2)
(a) Financial sanctions (section 3)
143(1)
(b) Immigration sanctions (`travel bans') (section 4)
144(1)
(c) Trade sanctions (section 5)
145(1)
2 Requirements for sanctions
146(3)
3 Financial sanctions regimes
149(1)
(a) UN regime
150(1)
(b) International counter-terrorism regime
151(1)
(c) Domestic counter-terrorism regime
152(5)
4 Methods of challenge
157(1)
(a) Review by a Minister
157(3)
(b) Court reviews
160(454)
17 National Security and Education Law
614(31)
Mark Greaves
Sarah Hannett
Aidan Wills
A Introduction
1(5)
B Specified authorities--schools and childcare
6(1)
C Statutory obligations on schools
7(25)
1 Maintained schools
7(1)
(a) Content of the curriculum
8(6)
(b) Duty of safeguarding
14(3)
2 Independent schools (including academies)
17(1)
(a) Part IV of the Education and Skills Act 2008
17(5)
(b) The Independent School Standards
22(9)
3 Early years childcare providers
31(1)
D Monitoring of schools
32(25)
1 Maintained schools and academy schools
32(1)
(a) Section 5 inspections
32(9)
(b) Section 8 inspections
41(2)
2 Independent schools
43(1)
(a) Inspection framework
43(2)
(b) Enforcement action available where the Independent School Standards are not being met
45(4)
3 Illegal schools
49(6)
4 Out-of-school settings
55(2)
E Regulation of teachers
57(11)
1 The legal and policy framework
57(5)
2 Examples of disciplinary proceedings against teachers in the national security context
62(1)
(a) Sophie Rahman
62(1)
(b) The `Trojan Horse' cases
63(5)
E Regulation of governors
68(5)
G Higher education institutions
73(32)
1 The Prevent Duty and freedom of expression
73(6)
2 Events and external speakers
79(8)
3 Other areas of HEI activity in which the Prevent Duty is relevant
87(1)
4 Monitoring and enforcement of the Prevent Duty in HEIs
88(8)
5 Student unions and societies
96(9)
H Further education institutions
105(540)
III NATIONAL SECURITY AND CRIMINAL LAW
18 Official Secrets and Spying--Principal Offences
645(49)
Robert Ward
A Introduction
1(7)
B Official Secrets Act 1911
8(61)
1 `Spying'
11(4)
2 Scope of section 1--spying and sabotage
15(1)
3 Elements of the section 1 offences
16(1)
(a) `Enemy' and `useful to an enemy'
17(8)
(b) `Purpose prejudicial to the safety or interests of the state'
25(5)
(c) `Prohibited place'
30(6)
4 Proof
36(1)
(a) Section 1(2) of the Official Secrets Act 1911
37(2)
(b) Presumptions introduced by the Official Secrets Act 1920
39(5)
(c) Effect of Human Rights Act 1998
44(4)
(d) In camera proceedings
48(1)
5 Inchoate offences and' acts preparatory"
49(7)
6 Police power to require information
56(3)
7 Consent to prosecute
59(1)
8 Harbouring spies
60(2)
9 Territorial extent
62(7)
C Official Secrets Act 1920
69(6)
D Official Secrets Act 1989
75(619)
1 Introduction
75(7)
2 Section 1--security and intelligence information
82(1)
(a) Members of the Agencies and notified persons
83(6)
(b) Crown servants and government contractors
89(6)
3 Section 4--crime and special investigation powers
95(5)
4 Section 5--information resulting from unauthorised disclosures or entrusted in confidence
100(8)
5 Authorised disclosures
108(1)
(a) Crown servants and notified persons
109(2)
(b) Government contractors
111(1)
(c) Any other person
112(8)
6 Proofofdamage
120(5)
(a) Damage and NCND
125(1)
(b) Prior publication
126(2)
7 Mental element
128(4)
8 Safeguarding of information
132(9)
9 Territorial extent
141(1)
10 Consent to prosecute
142(4)
11 Access to legal advice
146(6)
12 `Public interest' disclosures
152(6)
13 Defences of necessity and duress of circumstances
158(4)
14 Sentence
162(532)
19 Terrorism--Principal Offences
694(43)
Alison Morgan
Victoria Oakes
A Introduction
1(10)
1 Definition of `terrorism'
7(4)
B Offences under the Terrorism Act 2000
11(80)
1 Offences relating to proscribed organisations--sections 11-13
12(3)
(a) Section 11--Membership
15(6)
(b) Section 12--Support
21(5)
(c) Section 13--Uniform and publication of images
26(7)
2 Offences relating to terrorist property-- sections 15-18
33(9)
3 Failure to disclose information--section 38B
42(4)
4 Offences under Part VI of TACT 2000--sections 54,56,57,58,58A.58B
46(1)
(a) Section 54--Weapons training
47(5)
(b) Section 56--Directing a terrorist organisation
52(6)
(c) Section 57--Possession of an article for terrorist purposes
58(11)
(d) Section 58--Collection of information
69(8)
(e) Section 58A--Eliciting, publishing, or communicating information about members of armed forces etc
77(3)
(f) Section 58B--Entering or remaining in a designated area
80(7)
5 Schedule 7 ports power
87(4)
C Offences under the Terrorism Act 2006
91(33)
1 Encouragement of terrorism--section 1
92(10)
2 Dissemination of terrorist publications--section 2
102(6)
3 Preparation of terrorist acts--section 5
108(9)
4 Training for terrorism--section 6
117(4)
5 Attendance at a place used for terrorist training--section 8
121(3)
D Evidence
124(14)
1 Role of the expert
126(8)
2 `Battlefield' evidence
134(3)
3 Mindset evidence
137(1)
E Consent to prosecution
138(3)
F Extraterritorial effect
141(2)
G Sentencing
143(12)
1 Sentencing Guideline
143(7)
2 Notification requirements
150(3)
3 Forfeiture
153(2)
H Release
155(7)
I The Counter-Terrorism and Sentencing Bill 2020
162(575)
20 National Security and Criminal Procedure
737(34)
Rosemary Davidson
Dan Pawson-Pounds
A Introduction
1(2)
B Case management of terrorism trials
3(8)
1 The Criminal Procedure Rules and Practice Directions
3(2)
2 The Protocol on the Case Management of Terrorism Cases
5(6)
C Case management of OSA trials
11(3)
D Pre-trial hearings
14(4)
E Preparatory hearings
18(11)
1 Conditions under which a preparatory hearing must be ordered
20(1)
2 Conditions under which a preparatory hearing may be ordered
21(3)
3 The start of the trial and arraignment
24(1)
4 The judge's powers at a preparatory hearing
25(2)
5 Appeals against rulings at preparatory hearings
27(2)
F Bail and custody time limits
29(6)
1 Bail
29(4)
2 Custody time limits
33(2)
G Disclosure in terrorism and OSA cases
35(50)
1 Disclosure obligations
35(4)
2 Disclosure management
39(1)
3 Material held by third parties or overseas
40(4)
4 NCND responses to defence assertions
44(5)
5 Disclosure relevant to anonymity applications
49(1)
6 Withholding material in the public interest
50(1)
(a) The staged approach to be taken in PII applications
50(3)
(b) Relevance
53(3)
(c) Prejudice to an important public interest
56(4)
(d) The balancing exercise
60(2)
(e) Protection of the defendant's interests by more limited disclosure
62(2)
(f) Previous publication of sensitive material
64(1)
(g) PII hearing procedure
65(3)
(h) The appointment of special counsel and confidentiality rings
68(5)
(i) Review of PII rulings and notification hearings
73(3)
(j) The interception of communications
76(9)
H In camera proceedings
85(22)
1 The principle of open justice
85(4)
2 The court's power to make an in camera order
89(1)
(a) The common law
89(7)
(b) Official secrets legislation
96(1)
3 Procedure for making an in camera application
97(3)
4 Procedure to be applied during in camera hearings
100(4)
5 Appeals against in camera orders
104(3)
I Special measures and witness anonymity
107(15)
1 Special measures
107(3)
2 Witness anonymity
110(12)
J Jury panel vetting
122(649)
1 Jury panel questions
122(1)
2 Challenges to jurors
123(1)
(a) `For cause'
123(1)
(b) `By right'
124(2)
3 Jury panel vetting
126(645)
IV NATIONAL SECURITY IN INQUESTS AND INQUIRIES
21 Inquests and National Security
771(24)
Andrew O'Connor
A Introduction
1(11)
1 Coroners and inquests
1(6)
2 Inquests and national security--an overview
7(5)
B No power to conduct Closed material procedures in inquests
12(6)
C Disclosure--general principles
18(16)
D Disclosure--practical issues
34(25)
1 Disclosing intercept material to a coroner
34(8)
2 Disclosing national security-sensitive material to a coroner
42(10)
3 Practical means of making sensitive material available to coroner/DV counsel
52(1)
4 Exclusion or limiting of national security evidence--gisting
53(6)
E Public interest immunity
59(14)
1 Claiming public interest immunity
59(9)
2 Challenging a PII ruling made by a coroner
68(5)
F The hearing
73(5)
1 Agency witnesses--anonymity and screening and other special measures
73(5)
G Conversion to inquiry
78(717)
22 Public Inquiries and National Security
795(28)
Martin Smith
A Introduction
1(17)
1 Types of inquiry
1(3)
2 Statutory and non-statutory inquiries
4(5)
3 Terms of reference
9(2)
4 Chair or panel?
11(2)
5 Requirement to hold an inquiry in public
13(4)
6 Core participants
17(1)
B Disclosure to an inquiry
18(14)
1 Power to compel witnesses and the production of documents
18(5)
2 Identification and provision of relevant documents
23(5)
3 Investigatory Powers Act 2016
28(4)
C Excluding or limiting national security evidence
32(9)
1 Relevance
33(5)
2 PII--assertion of national security no'trump card'
38(3)
D Restriction notices and orders
41(16)
1 Public access to inquiry proceedings
41(3)
2 Section 19 of the 2005 Act
44(9)
3 `Test' applications
53(1)
4 Potentially restricted evidence
54(2)
5 Variation or revocation
56(1)
E Closed hearings
57(8)
F Special measures in Open hearings
65(6)
G The inquiry report
71(7)
H Challenging a chair's ruling
78(745)
V NATIONAL SECURITY AND EMPLOYMENT LAW
23 Employment and National Security
823(29)
Keith Bryant
Mark Green
A Introduction
1(6)
B Key legislation
7(12)
1 Rule 94
7(9)
2 Schedule 2
16(3)
C Rule 94--substantive issues
19(21)
1 The legislative test
19(2)
2 Timing of rule 94 applications
21(5)
3 Rule 94(3)
26(5)
4 Review of rule 94 orders
31(2)
5 Disclosure and gisting
33(4)
6 Disclosure of material into Open or Closed
37(3)
D Practicalities of making and responding to national security claims--step by step
40(812)
1 Types of case
40(6)
2 Potential respondents
46(3)
3 Third parties
49(1)
4 Practicalities of instructing representation
50(3)
5 Special advocates
53(1)
(a) Communication between special advocate and claimant
54(7)
6 ACAS conciliation
61(4)
7 Pleadings
65(2)
8 Amendments in Closed
67(4)
9 Witness statements
71(2)
10 Bundles
73(2)
11 Powers of the Tribunal as to special arrangements for hearings
75(6)
(a) Cyphering
81(1)
(b) Screening
82(1)
(c) Restricted reporting
83(3)
12 Judges and lay members
86(1)
13 Dealing with the Open/Closed divide in hearings
87(4)
14 Hearings by telephone or video
91(1)
15 Interaction with other jurisdictions
92(1)
(a) High Court and County Court
93(1)
(b) Security Vetting Appeals Panel (SVAP)
94(1)
16 Settlement
95(2)
17 Judgment and post-hearing
97(4)
18 Appeals
101(751)
24 National Security Vetting
852(21)
Mark Green
A Introduction
1(7)
B National security vetting considerations
8(4)
C Vetting decisions
12(4)
D Consequences of vetting decisions
16(2)
E Compatibility of the UK vetting system with ECHR rights
18(5)
F Security Vetting Appeals Panel
23(48)
1 Process and procedure
28(1)
(a) Statements of case
28(2)
(b) Representation
30(3)
(c) Directions
33(2)
(d) Disclosure process/bundles
35(2)
(e) Hearing
37(2)
(f) Decisions
39(3)
(g) Outcomes
42(1)
(h) Timescales
43(1)
2 Substantive issues
44(1)
(a) Disclosure--case law
44(4)
(b) Disclosure--parameters of argument
48(4)
(c) Disclosure--form of submissions
52(3)
3 The merits of the appeal
55(1)
(a) Reasons for the refusal/withdrawal and risk
55(1)
(b) Risk
56(11)
(c) Procedural challenges
67(2)
4 BPSS
69(2)
G Interaction with other jurisdictions
71(802)
1 Investigatory Powers Tribunal
71(1)
2 Judicial review
72(1)
3 Employment Tribunal
73(800)
VI NATIONAL SECURITY AND FAMILY LAW
25 National Security in Family Law Proceedings
873(24)
Lisa Giovannetti
Richard Wilkin
A Introduction
1(2)
B Types of proceedings--an overview
3(1)
C The Radicalisation Guidance
4(6)
D Radicalisation defined
10(3)
E Public law proceedings under the Children Act 1989--threshold criteria and orders
13(14)
F Public law proceedings pursuant to the inherent jurisdiction and wardship
27(5)
G Consequences of wardship for public authorities
32(2)
H Private law proceedings
34(3)
I Disclosure--third-party orders
37(10)
J Managing national security material--Closed material procedure and special advocates
47(6)
K Disclosure of documents and information from family proceedings
53(844)
VII NATIONAL SECURITY, FREEDOM OF INFORMATION, AND DATA PROTECTION
26 Freedom of Information and National Security
897(27)
Julian Blake
Eugene McCaffrey
A Introduction
1(2)
B The Freedom of Information Act 2000--a summary
3(16)
1 The right to information
4(3)
2 Public authorities
7(3)
3 Exemptions
10(1)
(a) Absolute exemptions
11(2)
(b) Qualified exemptions
13(3)
4 Certificates
16(2)
5 Challenges
18(1)
C Disclosure of information--the security body exemption
19(23)
1 Section 23(1) of FOIA
19(5)
2 Information `relating to' a section 23 body
24(18)
D Disclosure of information--other relevant exemptions
42(18)
1 National security (section 24)
42(8)
2 Defence (section 26) and International relations (section 27)
50(10)
E Neither confirm nor deny
60(13)
F Information held by The National Archives
73(5)
G Ministerial certificates
78(7)
H Information type and disaggregation
85(8)
I Enforcement
93(12)
1 Application to the Commissioner
93(4)
2 Appeal
97(1)
(a) Ordinary appeals
97(4)
(b) Appeal against a national security certificate
101(4)
J Special considerations for handling sensitive material
105(819)
1 The Information Commissioner
105(3)
2 The Tribunal
108(4)
3 Closed material procedures
112(812)
27 Data Protection and National Security
924(39)
Julian Blake
Eugene McCaffrey
A Introduction
1(10)
B Key terms and definitions in the GDPR
11(12)
1 Personal data
12(6)
2 Special categories of personal data
18(1)
3 Processing
19(1)
4 Data controllers and processors
20(3)
C General data processing--overview
23(44)
1 Data protection principles
24(1)
(a) Lawfulness, fairness, and transparency
24(8)
(b) Purpose limitation
32(3)
(c) Data minimisation
35(2)
(d) Accuracy
37(3)
(e) Storage limitation
40(2)
(f) Integrity and confidentiality
42(3)
(g) Accountability
45(3)
2 Special category and criminal conviction data
48(3)
3 Rights of the data subject
51(1)
(a) The right to be informed
51(2)
(b) The right of access
53(2)
(c) The right of rectification
55(1)
(d) The right of erasure
56(2)
(e) The right to restrict processing
58(1)
(f) The right to data portability
59(1)
(g) The right to object
60(1)
(h) Rights in relation to automated decision-making and profiling
61(1)
4 Exemptions
62(5)
D Applied GDPR--national security exemption
67(36)
1 The applied GDPR
67(1)
2 The national security and defence exemption
68(12)
3 National Security Certificate
80(9)
(a) National Security Certificates and NCND
89(5)
(b) Records of National Security Certificates
94(3)
4 Modification of the GDPR
97(3)
5 Post-EU exit changes
100(3)
E Law enforcement processing
103(8)
F Intelligence Services Processing
111(45)
1 Part4oftheDPA2018
111(2)
2 Key terms
113(2)
3 Data protection principles
115(1)
(a) The first data protection principle--lawful, fair, and transparent
116(5)
(b) The second data protection principle--specific, explicit, and legitimate purposes
121(3)
(c) The third data protection principle--adequate, relevant, and not excessive
124(1)
(d) The fourth data protection principle--accurate and up to date
125(1)
(e) The fifth data protection principle--no longer than necessary
126(2)
(f) The sixth data protection principle--processed in a secure manner
128(1)
4 Rights ofthe data subjects
129(1)
(a) Right to information
130(3)
(b) Right of access
133(4)
(c) Rights related to decision-making
137(2)
(d) Right to object
139(2)
(e) Right to rectification or erasure
141(2)
5 Additional obligations
143(1)
6 Data breaches
144(4)
7 International transfers
148(3)
8 Exemptions
151(1)
(a) National security
151(1)
(b) National Security Certificate
152(1)
(c) Other exemptions
153(3)
G The Information Commissioner and the courts
156(807)
1 The Information Commissioner
156(4)
2 The courts
160(803)
Index 963
Robert Ward is a barrister who has had an extensive career as a Government lawyer specialising in national security matters. Robert was formerly a lecturer in law at the University of Cambridge. He is currently a Commissioner of the Criminal Cases Review Commission. Robert is co-author of Rook and Ward on Sexual Offences Law and Practice.

Rupert Jones is a Judge of the Upper Tribunal assigned to the Administrative Appeals Chamber since 2018 and the Tax & Chancery Chamber since 2020. He was Attorney General and Director of Public Prosecutions of Anguilla between 2014 and 2016, whereby he was a member of the Executive Council (cabinet government) and House of Assembly (legislature). He practised at the English Bar from 2000 to 2014 and was appointed as one of the Attorney General's panel of counsel and specialised in indirect taxation, proceeds of crime and national security cases. He is co-author and co-editor of Millington and Sutherland Williams on the Proceeds of Crime.

The assistant editor is Caroline Stone, barrister in independent practice and tenant at 3PB chambers. She is a member of the Attorney General's panel of junior counsel to the Crown with particular expertise in national security litigation.