Professional Documents
Culture Documents
Full download Rights As Security: The Theoretical Basis Of Security Of Person 1st Edition Rhonda Powell file pdf all chapter on 2024
Full download Rights As Security: The Theoretical Basis Of Security Of Person 1st Edition Rhonda Powell file pdf all chapter on 2024
https://ebookmass.com/product/the-indian-ocean-as-a-new-
political-and-security-region-1st-edition-samaan/
https://ebookmass.com/product/principles-of-computer-security-
comptia-security-and-beyond-2nd-edition-edition-conklin/
https://ebookmass.com/product/the-palgrave-handbook-of-national-
security-1st-edition-michael-clarke/
https://ebookmass.com/product/the-handbook-of-security-3rd-
edition-martin-gill/
Theoretical Basis for Nursing Fifth, North American
Edition
https://ebookmass.com/product/theoretical-basis-for-nursing-
fifth-north-american-edition/
https://ebookmass.com/product/fundamentals-of-information-
systems-security/
https://ebookmass.com/product/preventive-diplomacy-security-and-
human-rights-in-west-africa-1st-ed-edition-okon-akiba/
https://ebookmass.com/product/people-centric-security-
transforming-your-enterprise-security-culture-1st-edition-hayden/
https://ebookmass.com/product/principles-of-information-
security-6th-edition-whitman/
RIGHTS AS SECURITY
ii
Rights as Security
The Theoretical Basis of Security of Person
R H O N D A P OW E L L
1
Rights as Security: The Theoretical Basis of Security of Person. First Edition. Rhonda Powell.
© The several contributors 2019. Published 2019 by Oxford University Press.
iv
1
Great Clarendon Street, Oxford, OX2 6DP,
United Kingdom
Oxford University Press is a department of the University of Oxford.
It furthers the University’s objective of excellence in research, scholarship,
and education by publishing worldwide. Oxford is a registered trade mark of
Oxford University Press in the UK and in certain other countries
© Rhonda Powell 2019
The moral rights of the author have been asserted
First Edition published in 2019
Impression: 1
All rights reserved. No part of this publication may be reproduced, stored in
a retrieval system, or transmitted, in any form or by any means, without the
prior permission in writing of Oxford University Press, or as expressly permitted
by law, by licence or under terms agreed with the appropriate reprographics
rights organization. Enquiries concerning reproduction outside the scope of the
above should be sent to the Rights Department, Oxford University Press, at the
address above
You must not circulate this work in any other form
and you must impose this same condition on any acquirer
Crown copyright material is reproduced under Class Licence
Number C01P0000148 with the permission of OPSI
and the Queen’s Printer for Scotland
Published in the United States of America by Oxford University Press
198 Madison Avenue, New York, NY 10016, United States of America
British Library Cataloguing in Publication Data
Data available
Library of Congress Control Number: 2018961282
ISBN 978–0–19–958911–1
Printed and bound by
CPI Group (UK) Ltd, Croydon, CR0 4YY
Links to third party websites are provided by Oxford in good faith and
for information only. Oxford disclaims any responsibility for the materials
contained in any third party website referenced in this work.
Acknowledgements
Rights as Security: The Theoretical Basis of Security of Person. First Edition. Rhonda Powell.
© The several contributors 2019. Published 2019 by Oxford University Press.
vi
vi Acknowledgements
My children, Matilda and George, tolerate my never-ending work habits
admirably. I hope that my example helps them to set their horizons widely.
My husband, Michael, has provided the stability needed to sustain my bur-
geoning academic and professional commitments. My mother, Gaylia, has
diligently proofread this piece of work in its entirety more than once and has
offered unquestioning support in all my endeavours.
Thank you all.
Christchurch, New Zealand
4 September 2018
Introduction: The Right to Security of Person
1
M Ignatieff, ‘Is the Human Rights Era Ending?’ New York Times (New York, 5 February 2002).
See also M Ignatieff, The Lesser Evil: Political Ethics in an Age of Terror (Edinburgh UP 2004).
2
See R Ashby Wilson, ‘Human Rights in the “War on Terror” ’ in Human Rights in the ‘War on
Terror’ (CUP 2005) 2; L Lazarus and B Goold, ‘Introduction: Security and Human Rights: The
Search for a Language of Reconciliation’ in Security and Human Rights (Hart 2007) 2and the works
cited there.
3
M Atkin, Balancing Liberty and Security: An Ethical Study of US Foreign Intelligence Surveillance
(Rowman & Littlefield 2013); G Treverton, Balancing Security and Liberty in the War on Terror
(Maxwell School of Syracuse University 2004).
4
D Luban, ‘Eight Fallacies about Liberty and Security’ in R Ashby Wilson, Human Rights in the
‘War on Terror’ (n 2); J Waldron, ‘Security and Liberty: The Image of Balance’ in Torture, Terror and
Trade-Offs: Philosophy for the White House (OUP 2010); R Dworkin, ‘Terror and the Attack on Civil
Liberties’ (6 November 2003) New York Rev of Books 37; R Dworkin, ‘The Threat to Patriotism’
(28 February 2002) New York Rev of Books 44.
5
D McGee, Security, Citizenship and Human Rights: Shared Values in Uncertain Times (Palgrave
MacMillan 2010).
Rights as Security: The Theoretical Basis of Security of Person. First Edition. Rhonda Powell.
© The several contributors 2019. Published 2019 by Oxford University Press.
2
6
L Lazarus, ‘Mapping the Right to Security’ in L Lazarus and B Goold (eds), Security and
Human Rights (Hart 2007) 327–8.
7
I Turner, ‘A Positive, Communitarian Right to Security in the Age of Super-Terrorism’ (2017)
13 Democracy and Security 46.
8
See, eg, International Covenant on Civil and Political Rights (adopted 16 December 1966, en-
tered into force 23 March 1976) 999 UNTS 171 (ICCPR), arts 12–13, 18–19, 21–22; International
Covenant on Economic, Social and Cultural Rights (adopted 16 December 1966, entered into force
3 January 1976) 999 UNTS 3 (ICESCR), art 8; Convention for the Protection of Human Rights
and Fundamental Freedoms (European Convention on Human Rights, as amended) (ECHR),
arts 8–11.
9
See, eg, ICCPR, art 4; ECHR, art 15.
10
See Al-Jedda v The United Kingdom (2011) 53 EHRR 23, in which a claim for breach of the
right to liberty and security of person in art 5 of the ECHR was successful. The applicant had been
in long-term preventative detention due to his terrorist activities.
11
French Declaration of the Rights of Man and of the Citizen (26 August 1789), art 2.
12
Universal Declaration of Human Rights (adopted 10 December 1948, UNGA Res 217 A(III))
(UDHR), art 9.
13
International Convention on the Elimination of All Forms of Racial Discrimination (adopted
7 March 1966, entered into force 4 January 1969) 660 UNTS 195, art 5.
14
ICCPR, art 9.
The illusive right to security 3
also found in five regional human rights instruments.15 At the national level,
the right to security of person is recognized in a number of bills of rights,
including those of Jamaica,16 Canada,17 Hungary,18 South Africa,19 and the
United States.20
Interestingly, the right to security of person is rarely found on its own.
More often it forms part of the right to ‘life, liberty and security of person’,21
or the right to ‘liberty and security of person’.22 There are two exceptions to
this: CERD and the South African Bill of Rights each specify the right to
security of person independently from the right to liberty of person.23 The
South African Bill of Rights is also unusual in defining the right to security of
person in the text. In most instances it is simply asserted, with interpretation
and definition left to the courts.
The right to security of person is also widely recognized in rights theory.
For example, Henry Shue suggests that it is one of three ‘basic rights’.24 The
right to security of person is mentioned as an example by Joseph Raz when
discussing rights and duties more generally.25 Even John Rawls’ ‘thin theory
of rights’ includes the right to security.26 The reason theorists often use the
right to security of person as an example is likely to be that its existence is un-
controversial. Notably, like legislators, rights theorists tend not to define the
right to security of person. This may suggest that they too assume its meaning
to be uncontroversial.
In fact, despite the prevalence of the right to security of person, over the
past decade or so questions have arisen as to what it means in law, what
15
ECHR, art 5; African Charter on Human and Peoples’ Rights (adopted 27 June 1981, en-
tered into force 21 October 1986) 1520 UNTS 217 (African Charter), art 6; American Convention
on Human Rights (signed 22 November 1969, entered into force 18 July 1978) 1144 UNTS 123
(American Convention), art 7; Charter of Fundamental Rights of the European Union, 2000/C
364/1 (EU Charter), art 6; League of Arab States, Revised Arab Charter on Human Rights (adopted
22 May 2004, entered into force 15 March 2008), art 14.
16
The Jamaica (Constitution) Order in Council 1962, s 13(a).
17
The Constitution Act, 1982, Schedule B to the Canada Act 1982 (UK), c11, Part 1 (Canadian
Charter of Rights and Freedoms) (Canadian Charter), s 7.
18
Constitution of India (as amended) 1949, art 55(1).
19
Constitution of the Republic of South Africa, 1996, ch 2 (SA Bill of Rights), s 12.
20
Constitution of the United States (as amended), Amendment IV.
21
UDHR, art 3; ICCPR, art 9.
22
ECHR, art 5; EU Charter, art 6; Canadian Charter, s 7; African Charter, art 6; American
Convention, art 7; Revised Arab Charter on Human Rights, art 14.
23
SA Bill of Rights, s 12; ICESCR, art 5(b).
24
H Shue, Basic Rights: Subsistence, Affluence, and US Foreign Policy (2nd edn, Princeton
UP 1996).
25
J Raz, The Morality of Freedom (Clarendon 1986) 170–1.
26
J Rawls, ‘The Law of Peoples’ in S Shute and S Hurley (eds), On Human Rights: The Oxford
Amnesty Lectures 1993 (Basic Books 1993) 68.
4
27
Lazarus (n 6) 326.
28
S Fredman, ‘The Positive Right to Security’ in Lazarus and Goold, Security and Human Rights
(n 2) 307.
29
ibid, 308. 30
Lazarus (n 6) 326. 31
Turner (n 7).
32
East African Asians (British Protected Persons) v United Kingdom (1981) 3 EHRR 76
(Commission Decision).
33
Rodriguez v British Columbia (AG) [1993] 3 SCR 519 (CanLII).
Inquiring into the right to security 5
positive concept and that therefore the right to security of person should
ground both negative and positive duties. It is argued further that security
is a ‘relational’ and not a ‘substantive’ concept. This means that security pro-
vides a structure for understanding the relation between other things but that
it does not itself tell us which interests are protected by the right to security
of person. The ‘substance’ of the right comes from an analysis of person-
hood. The book draws upon the notion of personhood put forward as part of
Martha Nussbaum and Amartya Sen’s ‘capabilities approach’, which is used
for measuring human well-being.34 The capabilities approach suggests that
the correct focus for policy-making is upon what each individual is able to do
and to be in relation to certain universally valuable ‘functionings’. Nussbaum
provides a list of core capabilities, a minimum of which should be guaranteed
to all on the basis of human dignity.35 The capabilities approach can be ap-
plied to construct a substantive right to security of person by treating the core
capabilities as the interests to be protected by the right.36
This new and original theoretical development of security of person is then
applied to the legal context in order to illustrate the variety of interests the
right to security of person covers and the types of duties it imposes. For in-
stance, it extends to things like food, minimum welfare, and education, as
well as protection against violence and the opportunity to exercise practical
reason. The right to security of person imposes negative and positive duties
on states to protect, promote, and fulfil a wide range of important personal
interests.
The analysis demonstrates that the right to security of person is very broad.
This helps explain why, when it forms the basis of a legal right, different jur-
isdictions are able to legitimately give such different meanings to the right.
Each jurisdiction is protecting some aspects of personhood, but not all: se-
lection and prioritization has taken place in order to create a legal right that
has clear boundaries. It is argued that those boundaries are pragmatic and
not principled. Existing legal rights to security of person do not protect the
full scope of the right. However, it is not argued that existing legal rights to
security of person should be given meanings in line with the true breadth of
the right on a theoretical level.
Instead, an alternative and preferable way of understanding the relation-
ship between security of person and human rights is put forward, drawing
once again upon the capabilities approach which this time plays a different
34
M Nussbaum, Frontiers of Justice: Disability, Nationality, Species Membership (Belknap Press
2006); A Sen, Development as Freedom (OUP 1999).
35
Nussbaum (n 34) 76–8.
36
This is a variation on the approach taken by Fredman (n 28).
6
Outline of chapters
Chapter 1 investigates the approach taken to the right to security of person in
law. It focuses on the ECHR, the Canadian Charter, and the South African
Bill of Rights. It is revealed that the right to security of person is portrayed
37
For instance, to my knowledge the United Nations Human Rights Committee has only con-
sidered the right to security of person (as opposed to the right to liberty of person) on one occa-
sion: William Eduardo Delgado Páez v Colombia CCPR/C/39/D/195/1985 23 August 1990 (HRC).
The Office of the United Nations High Commission on Human Rights (OHCHR) and the Joint
United Nations Programme on HIV/AIDS (UNAIDS) have interpreted art 9 to extend to com-
pulsory AIDS testing: OHCHR and UNAIDS, International Guidelines on HIV/AIDS and Human
Rights: 2006 Consolidated Version (Geneva 2006) 95–6.
Outline of chapters 7
inconsistently between the jurisdictions. The legal analysis shows a lack of
agreement about the meaning of the right to security of person. While it gives
plenty of food for thought, descriptive legal analysis is not able to provide a
common understanding of the right. It is therefore necessary to take a more
theoretical approach.
The book then turns to conceptual analysis. This is a technique of analyt-
ical philosophy in which a concept or its constituent parts are broken down,
in order to gain a better understanding of the philosophical issues which
apply to the concept. As Thomas Nagel describes, conceptual analysis is con-
cerned ‘with the concepts and methods that enable us to describe and think
about what we can observe’.38 The conceptual method has been employed by
analytical legal philosophers, most famously by HLA Hart in analysing the
concept of law.39
Chapter 2 considers whether the meaning of the right to security of person
can be understood through a conceptual analysis of security. It discusses lit-
erature, drawn primarily from the discipline of international relations,40 but
also from criminology,41 which attempts to define the concept of security. It
is argued that no previous attempt to define security is sufficiently context-
neutral that it can be applied to the right to security of person.
Chapter 3 puts forward a new analysis of the concept of security, relying
on the strengths and improving on the weaknesses of the existing accounts.
It is argued that security describes a fourfold relation between other concepts
and that in order to understand its meaning in any particular context, one
must identify four factors: security for whom (an agent or patient), security of
what (an interest or value), security from what (a risk or threat), and security
by whom (a protector). As a relational concept, security relies upon both pol-
itical philosophy and political discourse to determine each of these variables
in any particular context. Importantly, this means that security need not be
restricted to preserving that which we have but that it can extend to putting
people in a ‘secure’ position for the future.
Chapter 3 also argues that security is both intrinsically negative and in-
trinsically positive: one cannot be secure in the absence of protection even if
one faces no threat. It follows that the legal right to security of person should
incorporate both negative and positive duties. It is concluded that whilst the
relational analysis of security establishes the type of duties required by the
38
T Nagel, ‘The Central Questions (Review of “A Life of HLA Hart: The Nightmare and the
Noble Dream” by Nicola Lacey)’ in London Rev of Books (London, 3 February 2005) 12, 13.
39
H Hart, The Concept of Law (Clarendon 1979).
40
K Booth, Theory of World Security (CUP 2007); B Buzan, O Waever, and J de Wilde, Security: A
New Framework for Analysis (Lynne Rienner 1998).
41
I Loader and N Walker, Civilizing Security (CUP 2007).
8
(n 24).
Outline of chapters 9
through human rights law. Rather than expanding the meaning of existing
legal rights to security of person, it may be preferable to focus on creating
further specific rights to protect any important personal interests that are
not already protected by human rights law. In relation to important personal
interests that are already included but that are not afforded the full positive
protection that they deserve, human rights law should be strengthened. This
is particularly necessary in the area of socio-economic rights.
Finally, Chapter 7 proposes a new framework with which to view the rela-
tionship between security of person and human rights: ‘rights as security’. It
is proposed that human rights law as a whole can be seen as a way to secure
the person, with individual rights protecting individual personal interests.
The ‘rights-as-security’ approach enables security of person to take on its full
meaning in the context of human rights law. The capabilities approach could
still serve as a tool to identify what it takes to fulfil a right, thus defining what
it means to secure the person.
10
1
The Legal Right to Security of Person
Introduction
There is no agreed meaning ascribed to the legal right to security of person,
even though it is an internationally recognized human right and a term
found in legislation and political dialogue around the world. Most jurisdic-
tions have left the courts to interpret the meaning of the right to security of
person. Security takes on different meanings according to context and ac-
cordingly, courts in different jurisdictions have taken different approaches to
determining which interests should be protected by the right to security of
person. This can be demonstrated by analysing the meaning that courts have
given to the right as it appears in the European Convention for the Protection
of Human Rights and Fundamental Freedoms (ECHR),1 the Canadian
Charter of Rights and Freedoms (Canadian Charter),2 and the South African
Bill of Rights.3 As noted in the introduction, these jurisdictions are explored
because they have a developed body of jurisprudence about the right to se-
curity of person.
Under the ECHR, the right to security of person amounts to proced-
ural safeguards against arbitrary detention. In developing the case law, the
European Court of Human Rights (the ‘Strasbourg Court’) has considered
whether the right has any broader relevance but has decided on a limited
definition that restricts ‘security of person’ to situations in which somebody’s
liberty is restricted (eg when somebody is arrested, detained, or at risk of im-
prisonment). In comparison, the approach taken by the Canadian Supreme
Court in its interpretation of the Canadian Charter is broader. In that con-
text, the right to security extends to bodily and psychological integrity and in
some instances, autonomy. Finally, in South Africa, the only jurisdiction of
1
Convention for the Protection of Human Rights and Fundamental Freedoms (European
Convention on Human Rights, as amended) (ECHR).
2
The Constitution Act, 1982, Schedule B to the Canada Act 1982 (UK), c11, Part 1 (Canadian
Charter of Rights and Freedoms) (Canadian Charter).
3
Constitution of the Republic of South Africa, 1996, ch 2 (SA Bill of Rights).
Rights as Security: The Theoretical Basis of Security of Person. First Edition. Rhonda Powell.
© The several contributors 2019. Published 2019 by Oxford University Press.
The right to security in the European Convention 11
the three to provide a legislative definition of the right to security of person,
the cases focus primarily upon violence to the person. Rather than providing
a structured understanding of the right to security, the analysis in Chapter 1
demonstrates a lack of cohesiveness internationally, particularly in relation to
the relationship between liberty of person and security of person. As Lazarus
has noted, there is ‘a curious schizophrenia between a view of security as in-
distinct from and submerged within liberty, and a clearly autonomous notion
of security as inclusive of liberty and many other rights’.4
It is not normally seen as problematic that courts in different jurisdictions
take different approaches to resolving similar legal problems. International,
regional, and domestic rights instruments use different wording and have dif-
ferent internal structures. Varying local legal, social, and political norms result
in great diversity in legal systems and legal solutions worldwide. International
and regional courts work within a constrained political context. Differences
between jurisdictions can be therefore explained on the basis of textual and
contextual differences. However, arguably human rights protection in dif-
ferent jurisdictions should be based on an element of commonality because
legal rights are built on a common understanding of the human rights on
which they are based. By their very nature, human rights are universally ap-
plicable5 and we should therefore expect that in interpreting human rights
law in domestic contexts, relevant international norms will be considered.
Indeed, in some instances, judges are explicitly directed to do so by the legis-
lature.6 That does not mean that human rights law is necessarily a coherent
system as a whole, but that in the various contexts in which any one human
right is protected any local variation should be based on the common uni-
versal core. In terms of the right to security of person, this is not the case.
4
L Lazarus, ‘Mapping the Right to Security’ in L Lazarus and B Goold (eds), Security and
Human Rights (Hart 2007) 333.
5
See the reference to the ‘equal and inalienable rights of all members of the human family’ in the
Preamble to the Universal Declaration of Human Rights (adopted 10 December 1948) UNGA Res
217 A(III) (UDHR). See further Chapter 7, 154.
6
See, eg, Charter of Human Rights and Responsibilities Act 2006 (Vic) s 32(2); SA Bill of
Rights s 39(1); Human Rights Act 1998 (UK) s 2.
12
7
UDHR, art 3.
8
J Morsink, ‘World War II as a Catalyst’ in The Universal Declaration of Human Rights: Origins,
Drafting, and Intent (U of Philadelphia Press 1999) 40.
9
Rodriguez v British Columbia (AG) [1993] 3 SCR 519 (CanLII).
10
See Lazarus (n 4) and R Powell, ‘The Right to Security of Person in European Court of Human
Rights Jurisprudence’ (2007) 6 EHRLR 649.
11
See the discussions of Canada and South Africa below.
12
East African Asians (British Protected Persons) v United Kingdom (1981) 3 EHRR 76
(Commission Decision) [222].
13
ECHR, art 5(2). 14
ECHR, art 5(3).
15
ECHR, art 5(4); see MH v United Kingdom (2014) 58 EHRR 35.
16
ECHR, art 5(5).
The right to security in the European Convention 13
of positive obligations was in its early stages at that point in time.17 However,
with the benefit of hindsight it can be seen that the same procedural safe-
guards could stem from the right to liberty. It is difficult to see what ‘security’
adds to Article 5.
The cases about the right to security in ECHR jurisprudence can be div-
ided into four sets. Each new set reflects a subtle change in interpretation of
the right over time. The first set, in the 1970s, made it clear that the right
to security of person had no meaning outside the context of deprivations of
liberty. In the second set, in the late 1990s, the language changed slightly to
recognize the potential for security to have an independent meaning from
liberty. The third set, in the early twenty-first century, signalled movement
towards recognizing security as a separate right from liberty, although it did
not actually take this step. The fourth set, during a similar time period, took
a different approach by examining the issues under other ECHR provisions,
despite the claims for breach of right to security of person under Article
5. This same period saw an increase in usage of the rhetoric of security by
the Strasbourg Court. The overall picture is of increasing claims related to
security of person and increasing use of security language by the court, but a
failure to move from the position outlined in the first right to security chal-
lenge. That is, security of person, within the meaning of Article 5, is restricted
to the context of liberty deprivation.
It is important not to overestimate these variations, as the Strasbourg Court
steadfastly limits security to procedural protections against arbitrary deten-
tion. Nevertheless, the subtle changes are illuminating because Strasbourg
judgments tend to follow standard forms such that the reasoning in one judg-
ment may be repeated verbatim in another.18 It is therefore likely that changes
in the standard wording are deliberate. If these subtle changes are not delib-
erate, then the rhetoric of security may be influencing the Strasbourg Court
to find new ways to protect a broader sense of security of person within the
framework of the ECHR.
The first set of cases firmly establishes that the right to security in Article 5
is only relevant in the context of deprivations of liberty. In East African Asians
v United Kingdom,19 United Kingdom passport holders of Asian origin who
17
The doctrine was first recognized in the Case “Relating to Certain Aspects of the Laws on the Use
of Languages in Education in Belgium” (No 2) (1968) 1 EHRR 252. See further M Mowbray, The
Development of Positive Obligations under the European Convention on Human Rights by the European
Court of Human Rights (Hart 2004); D Xenos, The Positive Obligations of the State under the European
Convention of Human Rights (Routledge 2012).
18
This is one way the Strasbourg Court achieves consistency. It may also be the result of the pro-
cedures of the Court or be due to the time spent negotiating wording between judges of different
jurisdictions.
19
East African Asians (n 12).
Another random document with
no related content on Scribd:
Soak the gelatine in the milk for two hours. Beat up the eggs till
very light. Add the sugar and beat again. Bring the milk and gelatine
to the boil. Pour over the eggs and sugar. Strain. Put on the fire in a
double boiler and stir till thick; but do not allow it to boil. Add the
vanilla and pour into a wet mould.
*Strawberry Sponge
1 quart strawberries
Powdered sugar
4 whites of eggs
¹⁄₂ pint boiling water
1 oz. isinglass
Mash the strawberries with sufficient sugar to sweeten and set
them aside for about an hour. Boil the water and two ounces of sugar
for twenty minutes. Add the gelatine which has been soaked for an
hour in a little cold water. Remove from the fire and strain. Put the
strawberries through a fine sieve. Add the syrup gradually, beating
hard for five minutes. Beat the whites to a stiff froth. Add them to the
strawberries and beat till the mixture begins to set. Put into a wet
mould. Serve with whipped cream.
*King’s Soufflé
General Directions
In making pastry, the colder the hands of the maker, the water and
the room, the better. A marble slab is the best thing on which to
make it: otherwise a hard board which is kept for pastry only should
be used.
Use iced water for mixing, when possible. Pastry will be flakier if
set on ice before it is finally rolled out for use. The flour used should
be very dry and should be sifted with a little salt. Use the best flour
only and fresh butter, or half butter, half lard.
Use as little water as possible.
Never knead pastry.
Use the hands as little as possible. Mix with a knife unless
otherwise specified.
Bake in a moderate or quick oven.
Baking powder, in the proportion of one tea-spoon to each quart of
flour, may be added when eggs are not used. The baking powder
should be sifted twice with the flour before mixing.
It is better to bake pastry separately from the fruit when possible. It
will thus be much crisper. To do this fill the dish which is to be used
with stiff crumpled paper, over which a smooth and well-buttered
piece should be laid. Cover with the pastry and bake. Remove the
pastry and fill the dish with well-sweetened stewed fruit. Moisten the
edges of the dish with white of egg and replace the crust.
In making open tarts and tartlets, when the tin is lined with pastry it
can be filled with rice and baked. This is in order to keep the crust
crisp. The rice must be taken out and the fruit or jam put in its place
just before serving.
Plain Pastry—I
12 ozs. flour
3 ozs. butter
3 ozs. lard
Salt
Cut up the lard and butter, very finely, in the flour. With a knife, mix
with a little water. Roll and fold up three or four times.
Plain Pastry—II
1 lb. flour
¹⁄₂ lb. butter
Cold water
Rub the butter into the flour. Add cold water gradually to make a
stiff paste, mixing with a knife. Roll out quickly.
*Puff Pastry
1 lb. fresh butter
1 lb. dry sifted flour
Salt
Work the flour well with a little water into a still dough. Flour the
pastry board slightly. Roll out the dough until one inch thick. Flatten
the butter and put in the centre of the dough. Fold the edges up over
the butter and roll out very lightly five times, always rolling outwards,
and using as little flour as possible on the board. The butter must on
no account be allowed to work through the paste. Set aside in a cold
place, or on ice, for at least an hour. When making tarts, &c., cut off
a piece at a time, instead of using the whole quantity, and roll out
very lightly. Bake in a rather hot oven. This is a simple and excellent
receipt.
*Rich Crust—IV
10 ozs. flour
8 ozs. butter
Juice of a lemon
Rub two ounces of the butter into the flour. Mix with the lemon
juice and a little water. Divide the rest of the butter into three parts.
Roll out the paste half an inch thick. Cut one lot of butter into small
pieces and dab them on the paste. Fold it over three times
lengthwise, and then three times the other way. Roll out again.
Repeat the process twice, when the butter will be used up.
This receipt may be made with baking powder (see General
Directions).
*Short Crust—V
(For Tartlets)
1 lb. flour
³⁄₄ lb. butter
2 table-spoons powdered sugar
Yolks of 3 eggs
Water
Salt
Rub the butter into the flour and sugar. Beat the yolks with a little
water. Stir into the flour with a knife until smooth.
Biscuit Paste—VI
(For Open Tarts and Tartlets)
1 lb. flour
¹⁄₄ lb. sugar
6 yolks
Milk
Sift the flour and sugar together. Stir in the eggs with a knife. Make
into a stiff paste with some milk (about 1 gill).
Open Tarts and Tartlets
PAGE
Almond Tartlets—I. 129
” ” II. 129
Chocolate Cream Tartlets 130
Cream Tartlets 130
Cream and Fruit Tartlets 131
Fruit Tartlets 132
Lemon Cheesecakes 132
Mincemeat 133
Orange Tartlets 133
Strawberry Tartlets 134
Almond Tartlets—I
Almond Tartlets—II
5 ozs. potato flour
8 yolks
3 whites
2¹⁄₂ ozs. butter
2 lemons
2¹⁄₂ ozs. sweet almonds
¹⁄₄ oz. bitter almonds
Blanch and pound the almonds. Melt the butter. Grate the rind of
the lemons. Beat the yolks. Mix all thoroughly together except the
whites. Beat them to a froth, and stir them in last.
Line two round tins with short crust (see p. 127). Spread it with
apricot jam, and pour the almond mixture over it. Bake in a slow
oven.
Cream Tartlets
1 pint cream
¹⁄₂ pint milk
2 ozs. powdered sugar
Peel of one lemon
8 yolks
Put the cream and milk into a sauce-pan. When they boil, add the
sugar, the very finely-pared lemon peel and a little salt. Stir for a few
moments. Pour the cream over the well beaten yolks. Set back on
the fire. When thick, strain into a basin. Set aside in a cool place till
wanted. Line some small tins with puff paste. Fill with uncooked rice.
Bake. Take out the rice and fill with custard. Sprinkle with lemon
sugar (see p. 164).
Fruit Tartlets
Stew the fruit until tender, taking care to keep it whole, in plenty of
water and sugar. Take out the fruit gently with a skimmer when done.
Add a few drops of lemon juice to the syrup. Boil it until reduced to a
thick syrup. Line several small tins with a short crust (No. IV. or V.).
Fill with uncooked rice and bake. Take out the rice. Arrange the fruit
in them and pour the syrup over.
Lemon Cheesecakes
Mincemeat
2 lbs. suet
3 lbs. raisins
2 lbs. sultanas
2 lbs. currants
1 lb. mixed candied peel
2 lbs. moist sugar
1 dozen sour apples
4 lemons, grated peel and juice
2 tea-spoons mixed spice
2 ” ground ginger
¹⁄₄ lb. pounded sweet almonds
2 grated nutmegs
¹⁄₂ pint brandy
¹⁄₂ pint sherry
Mix the sugar, spices and very finely-chopped suet. Chop the fruit,
and peel as fine as possible. Mix all well together, adding the brandy
and wine last. It is best made several weeks before using.
Orange Tartlets
7 oranges
¹⁄₂ pint syrup
1 lemon
Puff or short paste
Peel six oranges. Scrape off all the white skin with a sharp knife.
Divide into sections, removing all the rest of the white and seeds.
Drop them very carefully into boiling syrup (see p. 151) and let them
simmer three minutes. Take the pieces out gently, and set them on a
sieve to drain over a basin.
To the syrup add the juice of an orange and lemon and the juice
that drains from the cooked oranges. Reduce it by boiling till very
thick.
Line some patty pans with short or puff paste. Fill them with
uncooked rice and bake quickly. Remove the rice, arrange the
oranges on the pastry and pour the syrup over them just before
serving.
Strawberry Tartlets
1 lb. loaf sugar
1 gill water
1 wine-glass brandy or sherry
Strawberries
Make a syrup of the sugar and water. Add the brandy or sherry.
Reduce until thick. Pour this syrup over a number of fine
strawberries.
Line some small tins with short crust (No. 125). Fill them with
uncooked rice and bake in a quick oven.
Turn out the rice and fill with the strawberries and syrup. Serve
hot.
American Pies
PAGE
Apple Pie 137
Cocoanut Pie 137
Custard Pie 138
Lemon Pie—I. 138
” ” II. 139
Mincemeat 140
Mock Mincemeat 141
Pine-Apple Pie 141
General Directions
The following American receipts are all good. Care, however, must
be taken in baking that there is a good bottom heat, or the under
crust will be sodden.
The pies should be made in shallow tins about 8 to 9 inches in
diameter. Puff paste may be used; but No. II. pastry (see p. 125) is
very satisfactory. It should be rolled very thin.
Where a covering of pastry is used, it should be slit across the
centre in three places, about two inches long, to allow the steam to
escape.
Apple Pie
1 lb. sour apples
7 ozs. brown sugar
Roll out pie crust No. II. very thin. Line a tin with it. Pare and core
the apples and cut them in thin sections. Arrange them symmetrically
on the undercrust. Add the sugar. Cover with a thin overcrust,
moistening it with water at the edges and pressing down. Make three
slits about two inches long in the centre of the crust to allow the
steam to escape. Bake in a moderate oven.
Wellington apples should be used, if possible.
Cocoanut Pie
Custard Pie
3 eggs
1 table-spoon sifted flour
3 table-spoons powdered sugar
1 tea-spoon vanilla
1 pint scalded milk
Beat the yolks till light and creamy. Sift the sugar and flour
together. Add it to the yolks. Add a little salt and the vanilla. Beat the
whites to a stiff froth. Whip them in. Add the cold scalded milk
gradually. Put into a tin lined with puff pastry. Bake thirty minutes.
Lemon Pie—I
2 lemons
3 eggs
2 table-spoons flour
12 ozs. powdered sugar
1 pint water
1 oz. butter
Grate the rind of the lemons. Pare off with a sharp knife all the
white skin. Cut the lemons into very small pieces, removing all skin
and pips. Put them in an enamelled saucepan. Add the sugar, flour
and two-thirds of the grated rind and the water. When hot, stir in the
beaten eggs. Remove from the fire when just below boiling point. Stir
in the butter. When cold, pour into a tin lined with thin pastry. Cover
with pastry and bake.
Lemon Pie—II
2 lemons
1¹⁄₂ cups powdered sugar
1 table-spoon corn-flour
3 eggs
2 cups of water
Butter size of a walnut
Mix the sugar, flour and grated rind of the lemons thoroughly. Beat
the yolks till light and creamy. Add to the sugar and beat well. Stir in
the water. Set on the fire in a double boiler. Stir continually. When
hot, add the butter. Stir till thick but do not allow it to boil. When cool
pour it into a rather deep tin lined with No. II. pastry or puff pastry,
and bake. Whip the whites to a froth, adding gradually three table-
spoons powdered sugar. Spread on the pie when cold. Put in the
oven to brown a little. Serve cold.
Mincemeat
³⁄₄ lb. meat
1 lb. suet
2 lbs. raisins
1 lb. currants
4¹⁄₂ lbs. chopped apples
1 lb. golden syrup
2¹⁄₂ lbs. brown sugar
¹⁄₂ lb. mixed peel
¹⁄₂ table-spoon salt
¹⁄₂ tea-spoon white pepper
1 nutmeg, grated
¹⁄₂ tea-spoon ground cloves
1 tea-spoon ground cinnamon
1 bottle sherry
¹⁄₂ pint brandy
Use lean beef. Chop very fine and remove all gristle and fat. Mix
all well together, adding the wine and brandy last.
Bake as directed for apple pie or in small covered tarts, using No.
II. pastry.
Add a little lemon-juice to the mincemeat each time it is used.
Mock Mincemeat
6 toast biscuits
¹⁄₂ pint molasses or syrup
¹⁄₂ pint brown sugar
¹⁄₂ pint cider vinegar
³⁄₄ pint melted butter
¹⁄₂ pint chopped raisins
¹⁄₂ pint currants
2 well beaten eggs
1 dessert-spoon allspice
¹⁄₂ tea-spoon grated nutmeg
¹⁄₂ tea-spoon cloves
1 tea-spoon salt
¹⁄₂ tea-spoon black pepper
1 gill brandy
Crush the biscuits. Mix all well together, adding the brandy last of
all.
Pine-Apple Pie
*Cream Ice—I
1 quart cream
1 cup powdered sugar
1 table-spoon vanilla
Scald the cream. Add the sugar. When it is melted set aside to
cool. Flavour when cold. Freeze.
The whites of three eggs beaten to a foam, but not stiff, may be
added to the cream just before it is put into the freezer.
Cream Ice—II
(Frozen Custard)