Journal of Comparative Law

Journal of Comparative Law

Response to Terrorism: Military, Political or Legal Approach?

Document Type : Research Article

Author
Faculty member of Mofid University Law Department
Abstract
Terrorism is not a new phenomenon; history is replete with heinous terrorist acts perpetrated out of various motives which have taken the lives of countless innocent persons and endangered the security of the people. Now the threat has turned from national to international and there is the fear that its expansion will peril international peace and security.
The author looks at reasons of terrorist acts, considers possible responses to them and after pointing out to three military, political and legal paradigms, concludes that the legal approach and its implementation within states as well as in international arena commands more attention, while negotiation diplomacy must be pursued when necessary. The article proposes that violence should not be expected to eradicate terrorism and when there is no way other than military and a war is waged under the supervision of international bodies, humanitarian laws and regulations are binding; thus in prosecuting those accused of terrorist crimes in national or international tribunals, the rights of the accused and the rules of fair trial must be observed.
Keywords

منابع:   
1_ حسن پوربافرانی, «اصل صلاحیت مبتنی بر تابعیت مجنی علیه در حقوق جزای بین الملل و ایران»، نامه مفید، ش37 .
2_ جیوانا بورادوری بایورگن هابرماس وژاک دریدا) «تروریسم چیست؟ (گفت و گو) ترجمه آزیتا نیکنام، روزنامه همبستگی، 16/12/1382.
3_ Antonio Cassese, Terrorism is also Disrupting some Crucial Legal Categories of international Law, 12 European journal of international law, 2001.
4_ Elizabeth Bumiller, President Rejects Offer  by Taliban for Negotiation, New York times, 15 October 2001.
5_G. Robertson: The Times, 18 September 2001.
6_ G.A  Declaration on measures to eliminate international terrorism, 1994,/Res 49/60.
7_ G.A  Resolution; 44/29, December4/1989.
8_ General Assembly resolution , 44/29, 4 December 1989.
9_ Howard abadinsky: organized crime, 6th edition, Belmont, U.S.A,2000.
10_James DerDerian: (the Terrorist Discourse: Signs, states and system of global- political violence) in world security: Trends and challenges at century End, ed.by Michael T.klare and Daniel c.thomas ,New York: st. martins press,1991.
11_ John Diamond: US hits suspected terrorist sites, Associated press, Aug.21,1998.
12_ Larry Neumeister: verdict: sheik, all co-defendants guilty in terror trial, the associated press, october2,1995.
13_ Lawless Case. European Court of Human Rights , 1961.
14_ M.Bassioni: International Terrorism and Political Crimes, 1975,XIV.
15_ Michael D.Malts: On Definition of Organized Crime and Delinquency,U.S.A. 1979.
16_ Nejla sammakia; Libya start parliamentary process that could give gadhafi way out, The Associated Press, may 8, 1992.
17_ Rod Stark : Cyber Terrorism, Rethinking New Technology, Department of Defense and – strategic Studies , 1999.
18_ Rosalyn Higgins and M. Flory; Terrorism and International Law,London and New York, Routledge, 1999.
19_ Statute of ICTY, ICTR , and I.C.C.
20_ Terrorism: An Introduction, 1991, quoted in: Michael D.lyman and Grave w.potter: (Terrorism as Organized Crime) in Organized Crime, Prentice Hall,2000.
21_ The New Encyclopedia Britannica, vole 11, Micropaedia, 1986.
22_ The North Atlantic Treaty, 24 august 1959, 34 unts 243 .
23_ U.N.Doc. E/CN: 15/1969/7.
24_ U.N.G.A/Resolution/50/53, Measures to eliminate International Terrorism, 11 Dec.1995.
25_ U.S issues warning on terrorist Attacks: state department's concern partly based on seizure of  explosives, arrests in Spain, Los Angeles times, Dec. 15.1989.
26_ UN General Assembly 56/1,18 September 2001.
27_ UN Security Council Resolution 1368 of 12 September 2001.
28_ Walter Laqueur: The New Terrorism, Fanaticism and the Arms of Mass Destruction,OxfordUniversity  Press,1999.
29_ www. ICRC.org/intl. htm.
30_ Y. Alexander and A. Nanes: Legislative responses to terrorism,1986.
Send comment about this article
Enter Name.
Enter a valid email address.
Enter a vaid affiliation.
Enter comments (At leaset 10 words)
CAPTCHA Image
Enter Security Code Correctly.