Pursue Prevent Protect Prepare - The United Kingdom's Strategy For Countering International Terrorism
Pursue Prevent Protect Prepare - The United Kingdom's Strategy For Countering International Terrorism
Pursue Prevent Protect Prepare - The United Kingdom's Strategy For Countering International Terrorism
March 2009
The United Kingdom’s Strategy for
Countering International Terrorism
March 2009
Presented to Parliament
by the Prime Minister and the Secretary of State
for the Home Department
by Command of Her Majesty
ISBN: 9780101754729
Part 4 Communications
15 Counter-terrorism communications
Conclusion
Contents Page 5
Foreword
This new form of terrorism is different in scale and nature from the terrorist threats
we have had to deal with in recent decades. It is intent on inflicting mass casualties
without warning, motivated by a violent extremist ideology, and exploits modern travel
and communications to spread through a loose and dangerous global network.
This is the threat on which this updated strategy, CONTEST, is focused. In the six
years since we first developed CONTEST, the many thousands of hard working men
and women in the police, the intelligence and security agencies, our armed forces, the
emergency services, local authorities, businesses, community groups and others have
achieved a great deal in their work to counter this ongoing threat. I pay tribute to them.
But the threat remains, and is always evolving. We can never afford to assume that the
established way of doing things is enough. We are continuing to increase investment to
ensure the police, agencies and others are fully prepared, and we will make whatever
changes are necessary to protect our security – as well as ensuring we have learned the
lessons of recent experience to make sure we have the strongest possible response.
I believe that if people are better informed about the threat they will be more vigilant
but also more assured, and I am therefore pleased that this published strategy gives
a more detailed and wide-ranging account of our response than ever before.
It sets out our comprehensive approach for tackling international terrorism – from
the international, through the national, to the local. It outlines how we are tackling
the immediate threat through the relentless pursuit of terrorists and the disruption of
terrorist plots; how we are building up our defences against attacks and our resilience
to deal with them; and how we are addressing the longer term causes – particularly
by understanding what leads people to become radicalised, so we can stop them
becoming terrorists or supporting terrorism or violent extremism in the first place.
I believe this updated strategy leaves us better prepared to meet the terrorist threat,
and to achieve our objective of ensuring that the people of the United Kingdom can
go about their normal lives in confidence and free from fear.
Gordon Brown MP
This strategy aims to reduce the risk to the United Kingdom and our interests
overseas, so that people can go about their lives freely and with confidence.
We have had considerable success in countering the terrorist threat since CONTEST
was first adopted six years ago, including disrupting a number of planned terrorist
operations against the UK and bringing those responsible to justice.
But the threat is always changing. New groups emerge and terrorists continue
to develop new methods and make use of new technologies. Learning from our
experience over the past few years, we have updated all aspects of our strategy
to take account of this changing threat.
In publishing this strategy, our aim is to provide the people of the UK and our partners
overseas with as full and as open an account as possible of why and how we are
tackling this threat. And in setting out clearly the steps we are taking to protect the
public and to prevent the rise of violent extremism, I pay tribute to the dedication of
the thousands of people – police and intelligence officers, the emergency services,
local authorities, businesses, and voluntary and community groups – who are working
together to make Britain safe.
Jacqui Smith MP
Foreword Page 7
Introduction
The aim of the strategy is ‘to reduce the risk to the UK and
its interests overseas from international terrorism, so that
people can go about their lives freely and with confidence’.
The first part of the document then sets out how the terrorist
threat to the UK has evolved, the present threat, the factors
which are shaping it and our assumptions about how it may
develop in future.
The third part of the document outlines who will deliver the
strategy and how we will measure its impact. For security
reasons we have not been able to publish the ‘delivery
plans’ which describe in much more detail how we will
deliver CONTEST.
Introduction Page 9
Executive summary
A new form of terrorism emerged overseas in the late seventies and early eighties,
initially with little connection to the UK, when terrorist organisations in Egypt tried to
overthrow the Egyptian Government and establish what they regarded as a genuine
Islamic state. These militant groups had an explicitly religious agenda and justified
terrorism on religious grounds.
Following the invasion of Afghanistan by the Soviet Army in 1979 groups of this kind,
from Egypt and elsewhere in the Arab world, travelled to Afghanistan to fight against
the Soviet army. The 1987 intifadah reflected the growing influence of militant religious
groups in the Occupied Territories.
After the withdrawal of Soviet forces from Afghanistan in 1989 groups and individuals
who had fought there returned to their home countries or other areas of conflict. They
caused further unrest in Egypt and also played an important part in the Algerian civil
war. From the early nineties, groups with links to Egypt and Algeria began to conduct
terrorist operations in third countries, including the US and France.
The organisation now known as Al Qa‘ida formed in Afghanistan in the late 1980s.
It developed the thinking of earlier militant terrorist groups which relied on an explicitly
religious agenda and justified terrorism on religious grounds and from 1996 onwards
called for attacks not only on some Islamic states but also on the USA and its allies,
including the UK, and specifically on civilians.
1.02 Between 1969 and the signing 1.06 The first modern international
of the Belfast Agreement in April 1998, terrorist incident has been dated back
over 3,500 people died in the UK as a to 1968, when a faction of the Palestine
result of Irish-related terrorism3. Since Liberation Organisation (PLO) hijacked
then there have been attacks by dissident an Israeli commercial flight from Rome4.
republican terrorist groups, including Two years later the same organisation
the Omagh bombing of August 1998, took over a British commercial aircraft
and most recently the murder of two as part of a multiple hijacking and later
Army personnel and a Police Service destroyed it on the tarmac at an airfield
of Northern Ireland officer in separate in Jordan5. Further incidents rapidly
incidents in March 2009. followed, including the murder of Israeli
athletes at the Munich Olympic Games
1.03 These recent attacks show the in 1972. Over the next 20 years other
continued intent of dissident republicans groups motivated by Palestinian issues
in the face of the political progress that and principally comprising Palestinians,
has been made in recent years and conducted a range of attacks in the UK
which is supported by the overwhelming and against UK interests as part of a
majority of the people of Northern Ireland. wider pattern of operational activity6.
The additional investment, increased Among the most lethal was the Abu Nidal
capabilities, and improved structures we Organisation (ANO), led by Sabri al Banna,
have put in place since 2001 to counter which began operations in 19737 and
terrorism are available to respond to during the 1980s attacked Israeli and
threats as they arise. However, this Jewish targets in London and Europe,
counter-terrorism strategy is specifically as well as airports at Rome and Vienna.
addressed at the recent resurgence in In 1986, ANO took and killed three
international terrorism, which remains hostages (two British and one American)
the greatest current threat both in this in Lebanon and hijacked and destroyed
country and to our overseas interests. a US airliner8.
4.01 International terrorism in the UK and 4.03 International terrorist activity in and
against UK interests overseas during the against the UK since the early 1990s
1970s and 1980s was usually associated has been very different. Reflecting earlier
with the single issue of Palestine. Targets international trends, it draws explicitly on
attacked or threatened in the UK were the language of religion and its objectives
very often Israeli and/or Jewish. The are linked to a religious cause. Al Qa‘ida
groups responsible were predominantly is not a domestic terrorist group focused
secular and did not espouse Islamist on a single political issue or geographical
rhetoric or objectives. They claimed no area, but an international network with
religious justification for their actions. an international agenda. It aspires to be
They did not aim to cause mass a vanguard, provoking a violent uprising
casualties, which they judged would in the Islamic world which will overthrow
not assist in achieving their political existing political structures and establish
goals. The use of chemical, biological, a new world order80. Al Qa‘ida and other
radiological, or nuclear weapons was networks associated with it regard the
neither considered nor a practical option. UK itself as a key target and have sought
Those responsible for attacks here very to conduct operations here which would
often came into the country from outside cause mass casualties. Al Qa‘ida has
for that purpose and made little or no popularised and given spurious legitimacy
attempt to appeal directly to or recruit to suicide bombing and aspires to use
British nationals or people living here. chemical, biological, radiological and
nuclear weapons.
4.02 Many terrorist groups during
this period had relations with states 4.04 Al Qa‘ida and its associated
and the most lethal attack against UK networks also aim to recruit people
interests, on Pan Am 103, was itself in and from this country. They have
conducted by state organisations. But a detailed public narrative that claims
state sponsorship sometimes acted as to justify the killing of civilians and the
a constraint as well as a facilitator. Most means to disseminate that narrative
groups saw little purpose in attempting quickly and widely into homes in this
to overthrow governments across the country. They have consciously sought
Islamic world and therefore did not to use vulnerable institutions and
make the transition from terrorist to public places to provide a platform for
insurgency organisations79. their propaganda. They have had some
support, both explicit and implicit, from
some domestic extremist organisations.
www.cabinetoffice.gov.uk/security_and_
intelligence/community/threat_levels.aspx
www.mi5.gov.uk/output/news-threat-level-
updates.html
5.01 Four factors have led to the breakdown of law and order, and rapid
emergence of the contemporary population increases.
international terrorist networks that
pose a threat to the UK and its interests 5.05 Fragile and failed states are unable
overseas: conflict and instability, ideology, to meet the needs of their population
technology, and radicalisation. Each has and lack the capacity to effectively
had important effects and these effects tackle violent extremism. They can
have then reinforced one another. None provide uncontrolled spaces in which the
of these factors on their own would create infrastructure of terrorism may flourish,
the threat we face. It is a combination of where terrorist organisations not only
them all which has a significant impact. run training facilities but also provide
material support and protection to the
Conflict and instability local population which would normally be
provided by the state itself. Al Qa‘ida grew
5.02 Terrorism has usually been under the Taliban regime in Afghanistan
related to unresolved regional disputes and now depends on a safe haven in
and conflicts. The current wave of the FATA of Pakistan. Al Qa‘ida affiliates
international terrorism is specifically exploit ungoverned areas in Yemen, the
connected to disputes and conflicts which Sahel, and Somalia.
involve Muslims and the Islamic world.
5.06 Failed states can also facilitate
5.03 Palestine, Afghanistan, Bosnia, the transition of terrorist groups into
Chechnya, Lebanon, Kashmir, and Iraq larger and more ambitious insurgent
have become focal points for terrorism organisations that challenge the authority
over the past 20 years. In each of these of the government itself. The poorer the
areas terrorist groups have emerged country, the higher the percentage of
and grown, as disputes have remained terrorist groups that reach the insurgency
unresolved, conflict has persisted, and stage84. And when terrorist groups
people have suffered. By participating become insurgency organisations they
in these conflicts, terrorist organisations become much harder to defeat. Since
have acquired operational expertise 1945, successful counter-insurgency
and experience; developed quickly the campaigns have lasted for an average
technology of terrorism (notably IEDs) 82; of 14 years85.
and attracted local and international
support, often by claiming to provide the 5.07 Conflict and state fragility or failure
only solution to long-standing grievances. cause significant internal population
displacement and migration. In the 1970s
5.04 Terrorist groups can also thrive and 1980s some political refugees and
in fragile and failed states. States others, escaping from authoritarian
become fragile and fail for a range of and repressive governments in the
reasons of which conflict is itself one Islamic world, arrived in Europe and
(of the top 20 failed states in a 2008 established European factions of Islamist
Failed States Index, almost all are parties86. Since the late 1980s small
currently experiencing violent conflict numbers of people who had supported
or political violence83). But state or been actively involved in terrorism in
fragility and failure have wider causes, the Islamic world also fled to Europe,
including economic collapse, poor creating an international network of
governance, the abuse of human rights, like-minded activists, providing what had
the ready availability of weapons and been domestic terrorist groups with an
Section 5 extremist ideology and propaganda. The 5.18 Radicalisation in the context of
number of websites related to terrorist this strategy is the process by which
groups or supporting violent extremism people come to support terrorism and
has increased from as few as 12 in violent extremism and, in some cases,
1998 to over 4,00090. Al Qa‘ida has then to participate in terrorist groups.
its own media organisation, Al-Sahab, Radicalisation is the fourth key driver of
which produced just six audio and video contemporary international terrorism and
messages in 2002 but nearly 100 in one sense the most important: none
in 200791. of the other strategic factors identified
here would enable terrorism unless
5.15 Contemporary terrorist organisations people were also prepared to support
design, conduct and record their it. Radicalisation is partly the result of
operations with a view to publicity. On conflict, ideology and technology, but
violent extremist websites films of terrorist has additional causes; some of these
attacks are routinely combined with other are described below.
pictures from conflict areas which record
the suffering of Muslim communities. Causes
Al Qa‘ida’s ideology forces local events
5.19 There is no single cause of
into a global narrative; technology
radicalisation. The motivation of those who
constructs and illustrates that narrative
support violent extremism and terrorism
and conveys it to a global audience.
often varies from one country and one
terrorist organisation to another. Within
5.16 The communications revolution
terrorist networks the motivation as well
also facilitates a two-way dialogue
as the background of those in leadership
between organisations and their actual
positions differs from those who are not.
or prospective members. That dialogue
enables fundraising, recruitment and
5.20 But conflict and the failure of states
some training and operational planning:
create grievances which can play a key
to a limited extent the internet has
role in the radicalisation process. Many
superseded the terrorist training camp.
Muslims as well as non-Muslims believe
that the West (notably the US and the
5.17 Technology has also enabled new
UK) has either caused conflict, failure
tactics. Often facilitated by web-based
and suffering in the Islamic world or
communications, terrorists have learned
done too little to resolve them. Military
how to harness and share emerging
intervention in Iraq and Afghanistan
technology, making it easier to plan
(and consequent civilian casualties),
operations which can have a more lethal
perceived western inaction in Palestine
effect. Terrorists aspire to develop and
and alleged support for authoritarian
use chemical, biological, and radiological
Islamic governments have all created
weapons and look to the internet to
controversy and anger. The treatment
assist them.
of detainees in Guantanamo Bay (and
previously in Abu Ghraib) is widely
“…the strongest weapon which the
felt to demonstrate an unacceptable
mujahideen enjoy – after the help and
inconsistency in the commitment of the
granting of success by God – is popular
West to human rights and the rule of
support from the Muslim masses in
law. In recent polling across four Islamic
Iraq and the surrounding countries...
states a significant majority judged that
in the absence of this popular support,
it was the aim of the US to ‘weaken and
the Islamic mujahid movement would
divide the Islamic world’; a significant
be crushed.”
minority thought the purpose of the ‘war
on terror’ was to achieve US political and
Letter from Ayman Zawahiri to Abu
military domination ‘to control Middle
Musab al Zarqawi, 9 July 2005
East resources’92.
available at www.dni.gov/press_releases/
letter_in_english.pdf
Aim
CONTEST is based on principles that reflect both our core values, the lessons we and
others have drawn from experiences of terrorism to date, and the broader security
principles set out in the National Security Strategy:
• We will continue to regard the protection of human rights as central to our
counter-terrorism work in this country and overseas.
• Our response to terrorism will be based upon the rule of law.
• We will always aim to prosecute those responsible for terrorist attacks
in this country.
• Our strategy will tackle the causes as well as the symptoms of terrorism.
• Reducing support for terrorism and preventing people becoming terrorists are vital:
without popular support terrorism is unsustainable.
• Our strategy must be responsive to the threat which can be created by rapidly
evolving technology.
• We recognise that partnerships in this country and overseas are essential to
our success and that these partnerships depend on openness and trust.
• The threat we face crosses our borders and is international in scope.
We will depend upon our allies as they will depend on us.
Strategic framework
Each workstream has objectives which reflect the assumptions we have made
about the future threat and the principles to which we will hold. For each objective
we have a series of supporting programmes.
The strategy now places increased emphasis on a number of issues which are
common to all of the main workstreams. They include the CBRNE threat.
7.01 The United Kingdom’s strategy overseas, and we will challenge those
for countering international terrorism who seek to defend its perpetrators.
was established in 2003 and is known
• We recognise that this counter-terrorism
as CONTEST. Details of the strategy were
strategy must tackle causes as well as
published in July 2006111. It is an integral
symptoms: neither conventional law
element of the UK’s National Security
enforcement, nor security or military
Strategy published for the first time in
operations will be sufficient to address
March 2008112.
the threat. We will need to continue
to focus on conflict and instability,
Aim
ideology, technology and radicalisation.
Other Government policies which are
7.02 The aim of CONTEST is:
not specifically about counter-terrorism
…to reduce the risk to the United
will continue to be relevant to this
Kingdom and its interests overseas
broader agenda.
from international terrorism, so that
people can go about their lives freely • Reducing support for terrorism and
and with confidence. violent extremism and preventing
people becoming terrorists are vital.
Principles They are the objectives of a key
workstream of CONTEST and an
7.03 Our strategy for countering important aim of counter-terrorism
international terrorism is based on related communications. Without
key principles that reflect a broader popular support terrorism
framework set out in the National Security is unsustainable.
Strategy and the lessons drawn from our
• The strategy must ensure the
experience of terrorism to date113:
protection of sites in this country
• Our approach to national security in which are vulnerable to terrorist
general and to counter-terrorism in attacks. These include not only the
particular is grounded in a set of core UK’s critical national infrastructure
values. They include human rights, the but also places where people live
rule of law, legitimate and accountable and work. By continually enhancing
government, justice, freedom, tolerance the UK’s border security the
and opportunity for all114. Government will also seek to ensure
that terrorists cannot enter this
• In support of CONTEST, the Government
country from overseas.
will take only those measures
necessary to address the threat and • Our strategy must also anticipate
that are proportionate to it. the possibility that terrorists may
succeed in conducting an attack here.
• Work to stop terrorist attacks in this
It will ensure that we are prepared to
country will always aim to prosecute
respond effectively to any attack and
those responsible through the criminal
to mitigate its consequences.
justice system. Criminal investigations
into terrorist attacks will continue to • The strategy must remain responsive
be led by the police supported by the to new technology sought by terrorists,
security and intelligence agencies. notably chemical, biological, radiological
and nuclear weapons, to changing
• We condemn terrorism whenever and
methods of attack, and new targets.
wherever it occurs, at home or
In accordance with the principles set out above, the Government has introduced
new legislation to respond to the evolving terrorist threat. New offences relate to
the preparation of terrorist acts, receiving training for terrorist purposes, attending
a place used for terrorist training and encouraging terrorism or disseminating
terrorist publications.
It is not always possible to prosecute people who intelligence indicates are engaged
in terrorist-related activity: for this reason the Government has developed a range of
alternative non-prosecution actions to protect the public. They include control orders
(which impose restrictions on the movements and contacts of an individual who has
been engaged in terrorist-related activity); the exclusion of foreign nationals from
entering the UK; revocation of citizenship; and deportation. These powers directly
affect only a very small number of individuals.
On a number of key issues the position of the Government will remain uncompromising:
the Government opposes the use of torture in all its forms; and the Government has
always and will continue to condemn the practice of ‘extraordinary rendition’. UK
agencies and police have not and will never engage in these practices.
Section Seven made clear that the The UK is party to the key international
protection of human rights is a key agreements which prohibit the torture
principle underpinning our counter- of detainees, including: the Geneva
terrorism work at home and overseas. Conventions, which cover situations of
This is particularly relevant when military occupation and armed conflict;
questions arise about the treatment the International Covenant on Civil and
of detainees and these issues are Political Rights; and the UN Convention
considered further here. against Torture and Other Cruel, Inhuman
or Degrading Treatment or Punishment.
Intelligence from detainees held abroad The ECHR, Article 3 of which prohibits
who have been involved in terrorist- torture or inhuman or degrading treatment
related activity can be vital in stopping or punishment, has been incorporated
terrorist attacks. Detainee reporting has into domestic law.
helped save lives here in the UK and
protected our interests overseas. But Intelligence from the security and
the way in which detainees are held in intelligence services of other states
countries overseas varies significantly is vital to our own security and has
from the procedures to which we are repeatedly enabled us to disrupt attacks
accustomed in this country. planned against the UK or UK interests.
In most cases the source or sources of
Our intelligence and security services this intelligence will not be disclosed to
work to make Britain more secure, often the UK. If it is clear that the intelligence
in circumstances overseas that they has come from a detainee the service
do not control. This creates significant providing it will rarely volunteer the
challenges for our counter-terrorist work circumstances in which the detainee
and has led to intense scrutiny in recent is being held. If it is established that
months of the involvement of our security material has been obtained from a
services and armed forces in detention detainee by torture, it would not be
activities. These organisations operate admissible in criminal or civil legal
to strict guidance, including about their proceedings in the UK as part of the case
duties and responsibilities regarding against an individual, regardless of where
human rights. In March 2009, the Prime it was obtained. But as the House of
Minister announced a number of steps to Lords recognised in judgements in 2005
provide reassurance that everything has any intelligence which has been received
been done to ensure that these practices may still be used to investigate and to
are in line with UK and international law, stop terrorist attacks127.
including – for the first time – publishing
guidance to personnel involved in matters Our security and intelligence agencies
of detention126. may actively seek intelligence from
another service which is detaining
The UK’s opposition to torture an individual or interview a detainee
held overseas directly if that person is
The Government opposes the use of believed to have information important to
torture in all its forms and works hard the security of the UK or its interests. In
with international partners to stop the either case, the security and intelligence
practice of torture and of cruel, inhuman agencies will first try to establish the
or degrading treatment. circumstances in which the person
concerned is being held. Officials
interviewing detainees are given guidance
Summary
The Government has allocated new funding to a wide range of agencies and
Departments to develop programmes under these objectives. The cost of the key
deliverables in 2008/09 alone is over £140 million. These programmes include:
• The Preventing Violent Extremism programme: a community-led approach to
tackling violent extremism led by the Department for Communities and Local
Government in partnership with local authorities and a range of statutory and
voluntary organisations.
• The police Prevent Strategy and Delivery Plan with 300 new ring-fenced staff being
recruited in 24 forces to work alongside the national and regional counter-terrorism
policing structure and with neighbourhood policing teams.
• The Channel programme: a community-based initiative which utilises existing
partnership working between the police, local authority and the local community
to identify those at risk from violent extremism and provide help to them, primarily
through community-based interventions. There are currently 11 Channel sites;
another 15 are planned.
As part of this strategy we will take action against those who defend terrorism
and violent extremism. We will also continue to challenge views which fall short of
supporting violence and are within the law, but which reject and undermine our shared
values and jeopardise community cohesion. Some of these views can create a climate
in which people may be drawn into violent activity. We have no intention of outlawing
these views or criminalising those who hold them.
The internet presents significant challenges for CONTEST in general and Prevent in
particular. The Government has taken action here to explore ways of addressing the
widespread dissemination of terrorist related material. This material is usually hosted
outside this country. Further action is being taken with counterparts overseas and with
multilateral organisations, including the European Union and the United Nations.
The purpose of our Prevent strategy is to shared values will continue to be reflected
stop people from becoming terrorists or in the groups we support and the projects
supporting violent extremism. we sponsor.
As part of this strategy we will take action We will ensure that local authorities
against those who defend terrorism understand the risk to community
and violent extremism. The Government cohesion posed by some organisations.
will continue to take action outside this We will develop ways to help communities
strategy against those who try to defend challenge those who want to work against
the use of violence to further other our shared values.
causes (for example animal rights).
We want to make it harder for violent
As Government, we will also continue extremists to operate in our country
to challenge views which fall short of and win support for their activities and
supporting violence and are within the ideologies. But we also need to be clear
law, but which reject and undermine our about the kind of country which we want
shared values and jeopardise community for ourselves.
cohesion – the strong and positive
relationships between people of different
ethnic, faith and cultural backgrounds in
this country. Some of these views can
create a climate in which people may be
drawn into violent activity.
Strategic communications
9.30 This part of the Prevent strategy
is addressed in Section Fifteen on
Communications. Work on Prevent and
the internet is described in more detail
within ‘The internet and Prevent’, Section
Nine, page 94.
Part One of this paper identified As the Prevent strategy has evolved, the
technology as one of the strategic OSCT in the Home Office has developed
factors driving terrorism and noted work to disrupt use of the internet for
that the communications revolution in extremist messaging and increase use of
particular had enabled the wider and the internet to promote alternative views,
faster dissemination of violent extremist with the overall aim of making the internet
propaganda as well as fund-raising, a more hostile environment for terrorists
recruitment and operational planning. and violent extremists.
Tackling terrorist use of the internet is
therefore a key part of both the Pursue The legal basis for removing unlawful
and Prevent strategies. terrorist-related material from the internet
(whether or not the source of it can be
The security and intelligence agencies or has been arrested) is Section 3 of
and police have worked to address the Terrorism Act 2006. This allows a
terrorist operational use of the internet police officer to issue a notice on an
for many years. Internet Service Provider (ISP) requiring
it to remove or modify unlawful terrorist-
In July 2007, Younis Tsouli pleaded related material within two working days.
guilty to charges including incitement to In practice close cooperation with industry
commit acts of terrorism via the internet in this country means that, to date, the
and later that year he was sentenced police have been able to secure the
to 16 years in prison. From his home in removal of content without the need for
London, Tsouli set up websites which notices to be served under Section 3.
were uploaded with videos from Al Qa‘ida
in Iraq and established and administered The greater problem is that most of the
a chat forum on which suicide bombers material of concern is hosted on web
were recruited151. Facilitating contacts servers overseas. Section 3 notices
between thousands of individuals, he also can be issued to ISPs outside the UK
posted tutorials on making suicide vests but cannot be enforced. Multilateral
and explosive devices. Tsouli became the cooperation and coordination are
main distributor of video material from therefore essential. Most other states
Al Qa‘ida in Iraq after establishing an face challenges similar to our own. We
online relationship with an associate are actively engaged in a significant EU
of Abu Musab al Zarqawi152. project with Commission support in this
area. We are also assisting with the
In September 2008, Hammaad Munshi development of a Europol hosted web
was convicted of making a record of portal – the ‘Check the Web’ project
material likely to be useful for terrorism – which is available to investigating
after he downloaded information about agencies across the EU, to share
bomb-making from the internet. Munshi information on open access terrorism
was sentenced to two years in a young related websites and content. And we are
offenders’ institution153. cooperating with a UN Counter Terrorism
Implementation Task Force Working Group
on terrorist use of the internet, which
has recently published its first report
on the subject, evaluating options for the
future154.
Addressing grievances
The FCO leads a significant overseas
programme of work to build the
resilience of governments and
communities in Prevent priority
countries, for example by improving
governments’ capacity to tackle
radicalisation and supporting
communities to tackle extremism.
The first part of this strategy explained the new government. We have also
how terrorism has emerged and contributed to the building and equipping
flourished around unresolved regional of the African Union Mission in Somalia
disputes and conflicts. The National (AMISOM) with headquarters
Security Strategy identifies global in Mogadishu.
instability, conflict, and failed and fragile
states as one of the main security The resources available for interventions
challenges that we face155. to prevent and respond to conflict are
primarily controlled by the FCO, MOD and
The National Security Strategy explains DFID and include funding for stabilisation
that our response to these challenges and reconstruction in conflict zones,
will always favour early engagement and currently Afghanistan and Iraq. In
a multilateral approach, ideally through 2009/10 £627 million will be available to
international institutions. Our aims will support stabilisation, conflict prevention
be to: and peacekeeping activities (working
alongside the United Nations, NATO, the
• prevent conflict, by ensuring that its
European Security and Defence Policy,
causes are addressed early
the EU Common Foreign and Security
• manage conflict and its impact, by Policy, the Organisation for Security and
helping the development of local Cooperation in Europe and the African
and national solutions and conflict Union), up from £511 million in 2006/07.
resolution capacity
Overall funds available for conflict
• stabilise conflict prone environments
prevention and stabilisation were
• consolidate peace, by enabling the increased in the current Comprehensive
conditions leading to an effective, Spending Review (CSR).
capable and accountable state and
broad-based economic growth. These Departments and the Cabinet
Office jointly deliver the Government Public
Interventions designed to achieve Service Agreement for this area. The aim
progress towards one particular outcome of this is to reduce the impact of conflict
will nearly always have implications through enhanced UK and international
for others. Some interventions can be efforts. Indicators for this PSA include a
pursued in parallel. In Sudan we are downward trend in the number of conflicts
working with the international community globally in particular in sub Saharan
to prevent, manage and stabilise conflict, Africa, Europe, central and South Asia and
and to support both the Darfur Peace the Middle East and North Africa; reduced
Process and the Comprehensive Peace impact of conflict in specific countries and
Agreement. In Yemen our work to reduce regions (Afghanistan, Iraq, the Balkans,
tribal conflict focuses on issues like land Middle East, Sierra Leone, Democratic
and water resources, supporting broader Republic of Congo and the Great Lakes
development and counter-terrorism region, the Horn of Africa, Nigeria and
objectives. In Somalia we work with the Sudan); more effective international
international community to support the institutions; and more effective UK
Djibouti Process, facilitating political capability to prevent, manage and resolve
dialogue and a peaceful transition to conflict and build peace.
Part One of this strategy explained that were Pakistani. Violent extremist
the threat faced by the UK crosses organisations, including Al Qa‘ida and
national borders and an effective groups affiliated to the Taliban, have a
international response is critical to every very significant presence in the Federally
part of CONTEST. Most terrorist incidents Administered Tribal Areas (FATA). Their
in the UK have an overseas connection influence is spreading rapidly in areas
and international terrorist organisations of the North West Frontier Province.
threaten the UK’s interests overseas. A separate long-running separatist
Few countries around the world are as insurgency in Baluchistan continues.
important to CONTEST and to our broader In some areas extremist organisations
National Security Strategy as Pakistan have considerable freedom of movement
and Afghanistan. and local control.
The principles set out in Section Seven, This matters not just to Pakistan, but also
on which CONTEST is based, are the to the UK. In some cases cells in this
basis for our work in and with these two country have received tasking, direction
countries. We will address the causes as and training from Pakistan-based
well as the symptoms of radicalisation groups, principally Al Qa‘ida. In many
and terrorism, notably by tackling conflict, of the important attempted operations
poverty and poor governance and the here conspirators travelled to and from
absence of rule of law. Many of these Pakistan preparing operations.
underlying causes span the Pakistan-
Afghan border and demand a coordinated The investigation of these operations
approach across both countries, the requires very close cooperation between
wider region, and the different elements agencies in the UK and their counter
of our engagement. We will ensure that parts in Pakistan. Contacts have
our counter-terrorism cooperation with developed significantly in the last five
Pakistan, Afghanistan – as with other years, reflecting the scale of the shared
countries – is based on the rule of law threat. Our counter-terrorism programme
and fundamental regard for the protection with Pakistan, worth approximately £10
and promotion of human rights. million in 2008/09, includes assistance
with forensics, crime scene management,
Pakistan crisis response and civil aviation security
(further funding has been directed
Most significant terrorist investigations towards counter-narcotics projects). This
in the UK have links to Pakistan and for will enhance the capacity of civilian law
this reason cooperation with Pakistan is enforcement to tackle the terrorist threat
critical to our delivery of CONTEST. through the proper legal process.
More broadly, we want to see a secure, Prevent is an important part of our work
stable, prosperous and democratic in Pakistan. We are working with the
Pakistan. The Pakistani Government media, civil society and others to build
faces challenges in reaching these goals, resilience to violent extremism and tackle
including poverty, poor governance the grievances that drive radicalisation.
and extremism. The Government of Pakistan has the key
role to play in this – effectively countering
During 2008 terrorist and insurgent extremism will require strong political
attacks in Pakistan killed over 2,000 leadership and long-term commitment.
people. The great majority of the victims
The United Kingdom’s Strategy for Countering International Terrorism Page 100
Tackling both the causes and the Afghanistan
symptoms is particularly important in our
efforts to counter the Taliban insurgency We intervened, as part of an international
in Afghanistan. Pakistani support on coalition, in Afghanistan in 2001 because
this is essential. We recognise the the country had become a safe haven for
efforts Pakistan has made to tackle terrorist organisations, which threatened
violent extremism in the border areas, this country and the region. Coalition
but the challenge is very considerable. action destroyed much of the terrorist
A comprehensive strategy, combining infrastructure within Afghanistan. This
security, governance and development significantly disrupted the operational
measures is needed. We are working with capabilities of terrorist groups and
the Government of Pakistan to support dispersed the Al Qa‘ida leadership.
their efforts to improve the rule of law in The coalition action also created the
the border areas. conditions for elections, first for a
President and then, in 2005, for
Grievances associated with poor a National Assembly (when 51% of
governance, poverty and lack of access Afghans voted).
to services, alongside a number of
contributory factors (including The focus for the UK now is to work with
perceptions of Western foreign policy) the elected Government of Afghanistan
make communities vulnerable to to build a secure and stable country.
extremist messages. This will require a significant ongoing
security commitment as part of an
The Government of Pakistan faces international coalition – focused on the
significant economic and social continued development of Afghan police
challenges. 36 million Pakistanis (22% and military capacity to a level where
of the population) live below the poverty they can take the lead in dealing with
line. Two out of every five children the insurgency and maintaining security
are malnourished and many have no – to stop violent extremist organisations
education. The UK is committed to regaining the bases which they lost in
the fight against poverty in Pakistan, 2001 and using those bases to again
in partnership with the Government of threaten the security of this country.
Pakistan, the international community There are currently almost 8,500 British
and civil society. The UK is the second soldiers in Afghanistan. As part of our
largest bilateral donor to Pakistan and wider work training and supporting all
has doubled aid to £480 million during the Afghan security forces, we work
2008–11. Key aims of this programme with their security services on counter-
will be to give people access to better terrorism. We have already played a major
health and education. Alongside national role in building the capacity of both the
programmes development aid will be Afghan National Army and the security
focused on Pakistan’s poorest provinces: organisations to tackle terrorism and
Baluchistan, Punjab and the NWFP. insurgency and will continue to do so.
The United Kingdom’s Strategy for Countering International Terrorism Page 102
The contest Strategy Page 103
Part 2 Protect: strengthening our protection against attack
Section 10
Summary
The Government has put in place a comprehensive programme to protect the national
infrastructure from terrorism. The programme is supported by the Centre for the
Protection of National Infrastructure, established in 2007.
Crowded places are also a preferred terrorist target. Through the National Counter
Terrorism Security Office the Government has provided security advice to crowded
places (including sporting venues and shopping centres). Specialist programmes
have been developed for the transport network – air, sea, and rail (including
underground systems).
Protecting our borders has been a key part of this workstream. The new UK Border
Agency integrates three previous organisations into an agency of more than 25,000
staff, with a presence in 135 countries. New biometric visa and travel tracking
programmes have significantly enhanced border security.
The United Kingdom’s Strategy for Countering International Terrorism Page 104
Part 2
Section 10
Action has also been taken to minimise and manage the ‘insider threat’: the risk
of staff exploiting legitimate access to an organisation’s assets or premises for
unauthorised, malicious purposes, ranging from theft to terrorism.
The Government protects UK interests overseas, including British citizens who travel or
live overseas. Programmes provide accurate advice to travellers and the private sector
on the threat from terrorism and ensure the physical protection of British diplomatic
missions and personnel overseas.
In the next three years our objectives for Protect will be to further reduce the
vulnerability of:
• the critical national infrastructure
• crowded places
• the transport system
• and our borders.
New programmes will improve the security of hazardous materials which might now be
used in terrorist attacks.
Some terrorists use false papers to travel here and to conceal their real identity.
Others have created multiple identities to avoid detection and hide their activities.
The National Identity Scheme will provide a secure way to safeguard personal identities
from misuse, and will ‘lock’ a person’s biographic information to their unique facial
and fingerprint biometrics on a National Identity Register. This biographic and biometric
information will be stored in a chip on an identity card. Identity cards do not provide
a single solution to terrorism and the Government is not proposing their introduction
only for counter-terrorism related reasons, but they do provide a valuable tool for
authenticating identity and for that reason support counter-terrorist investigations.
The United Kingdom’s Strategy for Countering International Terrorism Page 106
Part 2 Crowded places 10.10 Building on existing and well-
developed programmes, which are
10.07 Crowded places are also preferred
Section 10 terrorist targets. The police National
subject to Government regulation and
enforcement action, the security of
Counter Terrorism Security Office
the transport sector has been further
(NaCTSO)157, established in 2002 and
strengthened since 9/11, the 7 July 2005
co-located with the CPNI, provides expert
bombings on London’s public transport
security advice to those responsible for
system, the alleged plot against aircraft in
crowded places and for storing chemical,
August 2006 and the attack on Glasgow
biological, radiological and explosive
Airport on 30 June 2007:
material. Advice is delivered through
a network of more than 250 Counter • Aviation – Although this is the most
Terrorism Security Advisers (CTSAs) mature of the Government’s transport
around the UK, including 70 recruited security programmes, both in-flight
in 2008/09 to support the delivery security and measures on the ground
of the Government’s crowded places have been strengthened in response
programme. to changing terrorist techniques and
developments in protective security;
Since May 2006 CTSAs have provided new measures have included an
comprehensive protective security in-flight armed policing capability;
guidance and given advice to over strengthened flight deck doors;
500 sports stadia, over 600 shopping restrictions on liquids that can be
centres and over 10,000 city and town taken through search areas into
centre bars and nightclubs. Since aircraft cabins; and guidance for
January 2007, CTSAs have also run airports on the security of
over 700 Project ARGUS scenario- landside areas.
based training events to city and town
• Since 2003 Multi-Agency Threat
centre businesses to help them identify
and Risk Assessments have been
measures they can take to protect
produced jointly by all security
themselves, and their customers, and
stakeholders at airports, the regulatory
recover from a terrorist attack.
authorities and industry. These
assessments identify the threats to
10.08 The National Barrier Asset
airports from terrorism and crime,
was established in 2004 providing
and the roles and responsibilities
police forces with a capability to deploy
the different agencies have for
temporary specialist protective security
addressing them.
barriers to protect high profile locations
or temporary events, such as political • Since 9/11, a small and highly
party conferences, from vehicle borne effective network of aviation security
suicide attacks. In 2008 the size of the experts has advised British airlines
National Barrier Asset was tripled to on the security of their overseas
meet expected demand. operations and worked with those
overseas governments to develop
Transport systems and their users their aviation security capability and
to share best practice.
10.09 The transport system contains
both crowded places and elements of • Maritime – Before 9/11 the UK was
the CNI. Transport can be an attractive one of the few countries that had
target for terrorists because of its a maritime security programme in
visibility and because a successful place. Since then, the Department
attack can cause significant loss of life. for Transport (DfT) has introduced
Protective security measures for transport further measures and implemented
systems must reduce the risk of attack, international requirements for both
increase resilience to attack, have ships and ports, many of which
minimal disruptive impact and retain the have built on UK best practice. The
confidence of people who are travelling. Government played a leading role
in the adoption by the International
Maritime Organisation in 2004
The United Kingdom’s Strategy for Countering International Terrorism Page 108
Part 2 to screen, check and risk assess
passenger details in advance of
10.12 To provide oversight of the UKBA,
the Home Secretary appointed John
Section 10 travel so that persons of interest can Vine as the first independent UKBA
be identified prior to their arrival in Chief Inspector. Mr Vine, a former Chief
or departure from the UK. The £1.2 Constable of Tayside Police, took up his
billion e-Borders system has screened post in July 2008. As Chief Inspector
over 80 million passengers travelling he is assessing the performance of
to the UK, using data received from the UKBA, including the operation of
approximately 105 carriers on over safeguards to protect personal data held
185 routes. This has led to over on the e-Borders system.
32,000 alerts and over 2,800 arrests
for all crimes, not specifically terrorist 10.13 Access to e-Borders information
charges, and has allowed police and is restricted to authorised staff and only
immigration resources to be targeted when necessary for legitimate border
better on those intending harm to the security and border control business.
public in the UK or to deceive the That access is controlled, monitored
UK authorities. and audited through a combination of
technical safeguards and operational
• Effective border controls: the UKBA
procedures. All information highlighted by
is trialling new facial recognition
the e-Borders system must be analysed
gates which use scanning equipment
by trained and security cleared UKBA
to compare the faces of UK and
officers. Alerts are issued only following
EEA passengers with their biometric
investigation by an analyst.
passports, providing high security with
quicker times at immigration control.
Personnel security
• New biometric visas: UKBA delivered
10.14 Personnel security seeks to
global roll-out of a visa biometric
minimise and manage the risk of staff
programme in December 2007. All visa
exploiting legitimate access to an
applicants, other than those benefiting
organisation’s assets or premises for
from a limited number of exemptions
unauthorised, malicious purposes from
and exceptions, are now required to
theft to terrorism. Perpetrators
provide their fingerprints and a digital
of this kind of activity are referred to
photograph as part of the application
as ‘insiders’.
process. The prints are checked
against the police biometric dataset.
10.15 CPNI provides personnel security
Biometric technology is proving to
advice across the national infrastructure
be a useful tool in informing the visa
on how to protect against hostile insider
decision-making process. To date, over
action, including terrorism. To raise
3.2 million enrolments have generated
awareness and improve personnel
over 23,000 matches to data recorded
security standards, CPNI has produced
in connection with an immigration
and disseminated evidence-based
matter in the UK and have revealed
guidance and advice to organisations
over 4,400 cases of identity fraud.
in the national infrastructure on a wide
• Radiological detection: ongoing range of issues including:
roll-out of the Cyclamen Programme
• pre-employment screening
is providing both a fixed and mobile
capability to detect, deter and intercept • personnel security risk assessment,
smuggled radiological material and
operated by UKBA at UK ports and
• ongoing personnel security.
airports. The mobile capability is able
to identify the material immediately
10.16 In December 2007 the
(more information on Cyclamen can be
Government commissioned an
found in Section Twelve, page 129).
independent review of personnel security
across the transport sector, which was
completed in July 2008. In the light of
its findings, a summary of which has
The United Kingdom’s Strategy for Countering International Terrorism Page 110
Part 2 Protect programmes • The principle of ‘user pays’ is already
applied to some crowded places:
Section 10 Critical national infrastructure football stadia and nightclub owners
are responsible for meeting security
10.24 Government Departments,
costs at their sites. The consultation
supported by CPNI, will continue working
on the guidance ‘Working together
closely with operators in all the sectors to
to protect crowded places’ will seek
improve security awareness and practices
further views on how best to apply
and to mitigate significant vulnerabilities.
this principle more widely.
Key programmes include:
• Delivery of an extensive programme Transport systems and their users
of security enhancements at critical
10.26 The Government will continue to
energy sites working with operators
enhance the security of the transport
such as National Grid.
sector in the UK:
• Security enhancements across the
• DfT is collaborating with industry
water sector to improve physical
and police stakeholders on a new
security at critical sites and prevent
regulatory framework for taking robust
malicious access to the water
and accountable risk-based decisions
network163.
at airports that will ensure effective
• A programme of security reviews and security and joint working, particularly
advice by CPNI to critical infrastructure between industry and the police.
in the finance, communications and Proposed legislation is being taken
emergency services sectors. forward in the Policing and Crime Bill.
• Work to understand and mitigate • Taking forward the recommendations
vulnerabilities in systems controlling of the independent review of personnel
infrastructure processes. security (paragraph 10.16 above)
DfT is considering a mandatory
Crowded places requirement for overseas criminal
record checks for those posts
10.25 The Government is taking forward
which present the highest risks,
the following priorities for protecting
notably those with specific security
crowded places:
responsibilities which are already
• The Government and NaCTSO have subject to a counter-terrorism check.
developed a new standard risk DfT will enhance the personnel
framework to enable national, regional security elements of current training
and local partners to identify the programmes and develop the capacity
highest risk crowded places around of industry partners to carry out risk
the UK. CTSAs are currently applying assessments.
this new framework in conjunction with
• Multi-agency port security authorities
public and private sector partners.
are being established to undertake
OSCT will shortly issue new guidance
joint agency threat and risk
on ‘Working together to protect
assessments at sea ports similar to
crowded places’.
those carried out at airports.
• To encourage architects and planners
to take into account the risks of a UK border security
terrorist attack when designing major
10.27 The National Identity Scheme will
new developments for crowded places,
make it more difficult for people to cross
recommended by Patrick Mercer MP
the UK border under a false identity by
in his contribution to the review of the
providing second-biometric passports and
protective security of crowded places,
identity cards (see ‘Identity cards and
the Government will consult on new
counter-terrorism’, page 114).
planning guidance with advice on how
to ‘design in’ improved protection
against terrorist attack.
The United Kingdom’s Strategy for Countering International Terrorism Page 112
Part 2 • New police powers to collect advance
passenger data on some domestic
Section 10 air and sea journeys and international
freight movements are currently
planned and subject to consultation.
Announcements on these powers will
be made during the course of 2009.
Personnel security
10.34 The Government will progress
work on personnel security by:
• producing further good practice
guidance, informed by research
and development led by CPNI in
partnership with industry, on issues
such as ongoing personnel security
and security culture
• considering the applicability of the
conclusions and recommendations in
the independent review of personnel
security across the transport sector
to other sectors in the national
infrastructure, and
• continued training and advice to
national infrastructure organisations in
order to raise awareness and improve
personnel security standards.
The United Kingdom’s Strategy for Countering International Terrorism Page 114
verifying the identity of their staff. At
airports, for instance, the identity card
will provide airport operators with a
single, consistent, robust and verifiable
form of identity replacing the wide
range of passports and other photo
documentation with which airport
operators are currently provided. The NIS
will help ensure all those using airports
are confident about their safety.
Counter-terrorism investigators in EU
member states which have identity
cards regard them as an integral part
of all counter-terrorism and criminal
investigations. Identity cards and the
data they hold authenticate an identity
and enable investigations to progress
more quickly.
The United Kingdom’s Strategy for Countering International Terrorism Page 116
Part 2 ensuring that business operators,
planners, architects and designers
Section 10 think in terms of ‘designing out’
vulnerabilities.
• The UK border will remain
critical to our security.
Enhancing technical systems
to track incoming and outgoing
movements; and upgrading
our programme to identify
radiological substances will both
be very challenging in their own
right. Enhancing collaborative
arrangements at the border
between police forces, and
between the police and the
UKBA, and delivering a coherent
programme of counter-terrorism
improvement across the whole
of the diverse UKBA business,
will all be vital.
• Striking and maintaining the right
balance between effective border
security and protecting personal
data about passengers will remain
a priority. Over the next 10 years
a further challenge for Government
will be to focus the resources of
the border security agencies on
the minority of passengers who
pose a threat or are a potential
risk to the public, and to enable
the vast majority of passengers
to complete their journeys with
minimal disruption.
Capabilities to respond to a terrorist attack have been enhanced by the new Police
Counter-Terrorism Network, by joint programmes between policing and the Armed
Forces, and by exercises to ensure all these capabilities are effective.
Specific and dedicated capabilities have been put in place in the emergency services
to manage the terrorist use of chemical, biological and radiological materials.
The Government will also conduct further planning to manage the consequences of
the UK’s highest impact terrorism threats as set out in the National Risk Assessment.
These include the use of unconventional techniques (eg chemical, biological and
radiological materials).
Many of the capabilities relevant for Prepare are also available to deal with the
consequences of other threats and hazards. For example, the local government
resilience network is configured to deal with the consequences of other local
emergencies as well as the impact of an act of terrorism.
Departments and Agencies are currently considering the implications of the recent
Mumbai attacks for our Prepare strategy.
The United Kingdom’s Strategy for Countering International Terrorism Page 118
Part 2 Prepare: mitigating the impact of attacks
Section 11
The United Kingdom’s Strategy for Countering International Terrorism Page 120
Part 2 11.13 In 2007 the Department of Health
produced guidance on planning for mass
• the UK critical national infrastructure
continues to deliver essential services
Section 11 casualty incidents169 which emphasised following a terrorist incident; or, where
that hospitals, in association with the services are disrupted, recovers as
police, should establish mechanisms for quickly as possible
getting information out quickly to those
• central, regional and local crisis
affected by any emergency.
management structures are
appropriately equipped, competent
11.14 Police casualty bureau
and trained, and
arrangements have undergone a
thorough review since July 2005 and new • plans are developed and capabilities
procedures, systems and training have improved to respond to a terrorist
been put in place. The new ‘National incident and to deal with the
Mutual Aid Telephony System’ and mutual consequences of the UK’s highest
aid telephony protocols between police impact terrorism threats as set out in
forces will enable a future casualty the NRA.
bureau to handle more calls than was the
case on 7 July. 11.18 The Prepare workstream will
continue to be based on the annual
11.15 New plans have been put in place NRA, setting out the highest risks to the
for incidents that result in mass fatalities; UK over the next five years, and on the
other initiatives have enhanced resilience National Resilience Planning Assumptions
in responders’ telecommunications which set out the potential consequences
systems. London Underground has of the full range of risks and the planning
introduced a £2 billion resilient digital required to deal with them. Improved
radio system across the whole of its capability to respond to the highest
network. Known as ‘Connect’ it serves impact threats identified in NRA will
both London Underground and BTP staff, increase the capability to respond to
enables communication between above lower order risks, most of which pose
and below ground, and is interoperable similar challenges on a lesser scale.
with the emergency services ‘Airwave’
digital radio system. 11.19 The Prepare objectives and
the NRA reflect the greater emerging
11.16 In an emergency, the rapid threats posed by terrorism as set out in
distribution of clear and accurate Section Five and Six of this strategy (on
information to the public is essential. the strategic factors affecting terrorism
Clear information relieves public and the planning assumptions we are
anxiety, helps the public to take steps making for the next three years). Some of
to protect themselves from danger and these threats go beyond current counter-
inconvenience, assists responders, terrorism capabilities and our Prepare
and supports the subsequent criminal planning will be adapted accordingly.
investigation. Communications strategies
have been developed to better ensure 11.20 The roles and responsibilities
the right information can reach the right for Prepare are unchanged. In the Home
people at the right time. Office, OSCT is responsible for oversight
of the management of an ongoing
Prepare: The current approach terrorist incident in close coordination
with the Cabinet Office, through the COBR
Key principles mechanism. OSCT is also responsible
for continued development of capabilities
11.17 The four objectives of the current
to respond to a CBRN incident and
Prepare strategy are to ensure that:
for working with the police to test and
• capabilities are in place to enable maintain their overall preparedness for
emergency services to respond a terrorist incident. And OSCT is tasked
effectively to most kinds of terrorist to collaborate with the MOD to ensure
attack, both during and after any that military assets are available in the
incident event of a terrorist incident. The dual role
The United Kingdom’s Strategy for Countering International Terrorism Page 122
Implications of the Mumbai attacks
The United Kingdom’s Strategy for Countering International Terrorism Page 124
Part 2 plans in the events that a terrorist
incident occurs which may make use
Section 11 of new technologies and techniques.
• Specific contingency planning will need
to address the threat from CBRN,
using improved capacity to model and
predict potential impacts.
• As in other CONTEST workstreams,
success here will depend on the
sharing of information with a wide
range of stakeholders including Local
and Regional Resilience Forums, the
Wales Resilience Forum, Strategic
Coordinating Groups in Scotland, the
public sector resilience community;
with the broader community of
partners in the private and voluntary
sectors; with small and medium-sized
enterprises whose resilience
is valuable to communities, and with
the public, building on the National
Risk Register175.
• Learning from counter-terrorism
exercises, from real life operations,
HM Inspectorate of Constabulary
inspection reports and other sources
needs to be integrated to improve the
operational response of the police and
other agencies to terrorist incidents and
to inform wider policy and programme
development. OSCT and ACPO (TAM)
have already begun to address this with
proposals to develop a more systematic
approach to organisational learning.
Summary
Our strategy is built around programmes under each of the four main CONTEST
workstreams. The intelligence services have a major role to play in Pursue aspects
of CBRNE work. We will need to reflect the CBRNE threat in the Prevent-related
work we do to challenge the ideology behind violent extremism and, specifically, the
legitimacy it claims for mass murder; major Protect-related programmes include the
provision of radiological detection systems at ports of entry to the UK, safeguarding
CBRNE materials and ensuring the security of the civil nuclear sector. Preparing for
a CBRNE attack has been a key feature of our broader preparedness work.
The United Kingdom’s Strategy for Countering International Terrorism Page 126
Part 2 hemical, biological, radiological and nuclear
C
Section 12 weapons and explosives (cbrne)
CBRNE: key achievements and current 12.04 But Al Qa‘ida is the first
approach transnational organisation to support the
use of CBRN weapons against civilian
12.01 This section considers the specific targets and to try to acquire them. That
challenge of terrorist use of chemical, interest reflects their broader wish to
biological, radiological and nuclear cause mass casualties, often using
(CBRN) weapons and of explosives (E). suicide attacks. In an interview with
This threat is addressed in part through Al Jazeera in 1998, Usama bin Laden,
the main CONTEST workstreams. But when asked if it was true that he was
the scale and complexity of the threat attempting to acquire nuclear weapons,
means that the Government has brought said “…there is a duty on Muslims to
its response together in one CBRNE acquire them, and America knows today
cross-cutting workstream and strategy, that Muslims are in possession of such a
led by OSCT. This ensures that separate weapon, by the grace of God Almighty”176.
initiatives under Pursue, Prevent, Protect
and Prepare are coherent, coordinated 12.05 Al Qa‘ida established facilities
and together address the threat. in Afghanistan during the rule of the
Taliban to research chemical, biological
12.02 A wide range of stakeholders and radiological weapons and training in
are involved in forming and delivering the use of contact poisons was provided
policy in this area, including: Government to large numbers of Al Qa‘ida members.
Departments and agencies; Devolved In 2001 Al Qa‘ida held talks with two
Administrations; emergency services; disaffected Pakistani nuclear scientists
local emergency planners; utilities and about acquiring or developing radiological
the private sector. This workstream also weapons177. By 2003 Al Qa‘ida had
connects with other Government policies developed a device to produce hydrogen
including, for example, work on counter- cyanide gas, intended for use in crowded
proliferation led by FCO and supported urban spaces178. In 2004 Al Qa‘ida
by MOD and Department of Energy and associated cells in the UK considered
Climate Change (DECC), which leads on the use of radiological devices179 and
nuclear safety elements. in 2006 the leader of Al Qa‘ida in Iraq
appealed for nuclear scientists to join
The CBRN threat his group and to attack US bases in Iraq
using non-conventional weapons180. In
12.03 Al Qa‘ida is not the only terrorist
2007 Al Qa‘ida in Iraq deployed a number
organisation which has tried to develop
of explosive devices utilising chlorine
CBRN weapons. Between 1993 and
gas cylinders181.
1995, the Japanese cult organisation
Aum Shinrikyo tried to manufacture nerve
12.06 The evolution of the Al Qa‘ida’s
agents, including sarin and VX, and
CBRN weapons capability, and of
biological agents, including anthrax and
intelligence about it, was described in
botulinum toxin. In 1995 Aum members
some detail in the Review of Intelligence
released sarin on the Tokyo metro killing
on Weapons of Mass Destruction
12 people. Shortly after Aum also tried
conducted by a committee of Privy
to release cyanide gas in a key
Counsellors chaired by Lord Butler, in July
Tokyo station.
2004. That review quoted extensively
from Joint Intelligence Committee (JIC)
conclusions about these programmes
and noted that many JIC judgements
12.08 There remains the further risk 12.12 Intelligence not only enables the
that the deliberate or unwitting release disruption of a specific threat but also
of information from state programmes informs and improves the effect of the
reaches terrorists and terrorist groups. interventions made under the Protect and
The activities of the AQ Khan proliferation Prepare workstreams.
network highlighted the damage that
compromise of this kind can cause Prevent
(although there is no evidence that AQ
12.13 The ideology of Al Qa‘ida (and
Khan talked directly to any terrorist
organisations associated with it) has
organisation184).
sought to justify the use of weapons
which can cause very large numbers of
The changing threat from explosives
civilian casualties. As part of our CBRNE
12.09 Alongside the potential threat work and in conjunction with other
from CBRN, there have been significant Prevent initiatives, we need to be able
developments in the more traditional to challenge that justification. This is not
threat to the UK and to UK interests something which Government can do on
overseas from IEDs – in particular, the use its own; as for all of our Prevent work the
of novel home-made explosives and the key role will be played by communities
detonation of devices by suicide bombers. and, in this case, also by scholars of
Islam who are best able to demonstrate
the flaws in Al Qa‘ida’s argumentation.
The United Kingdom’s Strategy for Countering International Terrorism Page 128
Part 2 Protect the Missile Technology Control Regime
and the Nuclear Suppliers Group.
12.14 Our aim here is to deny terrorist
Section 12 access to CBRNE materials, whether
12.18 The Cyclamen Programme
produced and stored in the UK legally
was established in 2002 as a joint
or imported (legally or illegally), and to
programme between the Home Office
screen for CBRNE materials entering
and the former HM Customs & Excise
protected areas, for example at airports.
to deter or detect the illicit importation
Work with European and other partners
of radiological materials into the UK that
is particularly important. Tighter controls
could be used for terrorist purposes.
on the movement of CBRNE materials
Cyclamen involves the development and
in Europe and beyond reduce their
roll-out of a suite of radiological detection
availability to terrorists, directly increasing
systems at ports of entry to the UK, now
UK security. European standards are
operated by UKBA. An initial set of fixed
being developed for explosives screening
detection portals was installed in 2004,
in commercial aviation, building on the
ahead of time and under budget.
measures initiated by the UK and put in
place for liquids in August 2006, which
12.19 Substances with legitimate
seek both to improve explosive detection
industrial or domestic uses can be
capability and to reduce disruption and
exploited by terrorist groups for the
inconvenience to the travelling public.
purposes of creating a CBRN or
improvised explosive device. Much work
12.15 The MOD has developed many
has already been undertaken to minimise
and varied tactics and techniques for
the opportunities to do so. NaCTSO and
assuring the safety of personnel in
the CPNI liaise with industry to provide
operational theatres, particularly from
specialist advice on the security of
explosive devices. We are working to
hazardous substances and the sites
ensure those lessons and experiences
which handle them. The ‘Know Your
are reflected in domestic counter-
Customer’ campaigns raise awareness
terrorism work.
about the ‘dual-use’ nature of certain
products and encourage suppliers to be
12.16 The multilateral Global Threat
more enquiring of new customers and to
Reduction Programme (GTRP)185 plays
report suspicious enquiries to the police.
an important role in denying terrorists
Through its network of CTSAs, NaCTSO
access to CBRN materials. The aim of
has delivered bespoke security advice
the GTRP is to improve the security of
to almost 2,000 sites storing
fissile materials held around the world;
hazardous material.
reduce the number of sites containing
nuclear and radiological material;
12.20 The Government is delivering an
contribute to the destruction of chemical
action plan for enhancing the safeguards
weapons stocks; and provide sustainable
in respect of CBRNE materials. This
employment for former weapon scientists
includes work to reduce accessibility to
whose expertise could otherwise be
hazardous substances posing the highest
acquired by terrorist organisations. It is
risk, based on their threat, vulnerability
the UK’s largest cooperative counter-
and impact across their life-cycle
proliferation assistance programme, and
(from their precursors through to their
is coordinated with other key donors,
disposal). The Government is working
notably the US.
with its international partners to improve
the security of hazardous substances
12.17 The UK is a leading participant
and potential radioactive sources and
in international multilateral regimes and
to ensure that the UK’s measures are
instruments designed to combat not only
not taken in isolation. Awareness-raising
the illicit transfer of CBRN material, but
measures for specific sectors, such as
also their means of delivery; these include
the academic community, are beginning
the Chemical Weapons Convention, the
and action is being taken to address
Biological and Toxin Weapons Convention,
identified gaps in the regulatory regime.
The United Kingdom’s Strategy for Countering International Terrorism Page 130
Part 2 Cbrne: future challenges
Summary
Delivery of the CONTEST Strategy requires close cooperation between a wide range of
organisations and stakeholders: local authorities, Government Departments, Devolved
Administrations, the police, security and intelligence agencies, emergency services and
the Armed Forces and international partners and multilateral organisations. CONTEST
also depends on the expertise and knowledge held by communities and citizens,
industry and the third sector.
For the first time, counter-terrorism work has a Public Service Agreement (PSA)
intended to set targets and monitor progress. The aim of this PSA is the same as
CONTEST: to reduce the risk to the UK and its interests overseas from international
terrorism. The PSA is based around nine intended outcomes across the four main
CONTEST workstreams.
Delivery of CONTEST and the PSA in particular is overseen by the CONTEST Board,
chaired by Director-General OSCT in his capacity as CONTEST Senior Responsible
Owner (SRO). Representatives from key Departments and agencies attend the Board;
governance arrangements are maintained by the CONTEST Portfolio Office.
Each workstream of CONTEST has a detailed delivery plan, identifying responsibility for
each programme, projected timescales, benefits and costs.
The United Kingdom’s Strategy for Countering International Terrorism Page 134
Part 3
The 2012 Olympic and Paralympic Games will be a celebration of sport and culture for
London and the UK. The Government is responsible for ensuring that the Games are
safe and secure against all types of risk including terrorism. Since December 2008,
the Olympic Security Directorate in OSCT has been leading work on a multi-agency
security strategy for the 2012 Games. OSCT reports to the Home Secretary and
to NSID.
Arrangements for the delivery of CONTEST programmes as the starting point for
in the West Midlands are representative its work and then aims to develop local
of the steps we have taken across projects within that framework.
the country.
The West Midlands has rolled out the
CONTEST in the West Midlands is Channel Project in Birmingham and
coordinated by a regional CONTEST Board Coventry, run in a partnership between
chaired by the Government Office for the the WM CTU, local authorities, statutory
West Midlands (GOWM) and attended and community partners. Building on the
by: Home Office representatives, West Prevent action plans and existing multi-
Midlands Police, Regional Offender agency relationships, Channel will provide
Managers, UKBA, Youth Justice Board, a focus for public sector professionals
Public Health, representatives for and members of the community to refer
Children & Young People and the Regional individuals of concern to a multi-agency
Resilience Forum. risk assessment and case management
system bringing to bear a variety of
Pursue resources and expertise to counter
radicalisation.
With the recent expansion of the Police
Counter-Terrorism Network, some 400 GOWM and ACPO are also coordinating
dedicated police officers are now working projects under the 2008 Prevent strategy,
in the West Midlands Counter-Terrorism notably:
Unit (WM CTU). This has enabled
• The successful Black Country Imams
more resources to be devoted to more
project developed by Dudley Council
effective counter-terrorism operations.
(one of the CLG-funded Pathfinder
The CTU works in close association with
projects) to build the capacity and
the police Senior National Coordinator
skills of Imams through the provision
Counter-Terrorism, with the security and
of a range of training.
intelligence agencies and with JTAC.
• The DCSF Preventing Violent
In line with national practice the CTU Extremism (PVE) toolkit for schools
provides background material on the and the ‘Watch Over Me: Living
regional threat (including material relating Together’ DVD and lesson plan which
to radicalisation) for local authorities. will be delivered by the GOWM, local
education authorities and the WM
Prevent CTU.
• The work of Youth Offending Teams
Regional understanding of Prevent
(YOT) in Coventry, Sandwell and
has increased significantly since CLG
Birmingham. Each has developed
launched the Pathfinder Fund in Spring
proposals aimed at young offenders or
2007 and the revised Prevent strategy
those at risk of offending. Coventry for
was developed by OSCT in 2008188.
example will be including an interactive
GOWM is taking a leadership role in
counter-terrorism exercise in YOT group
delivering Prevent across the region,
sessions and will run a theatre project
recruiting dedicated staff and hosting
in schools and colleges in the area.
Prevent Peer Support Network meetings
to help effective communications and
information sharing. GOWM takes
the national Prevent strategy and
The United Kingdom’s Strategy for Countering International Terrorism Page 136
An additional 23 Prevent police officers
are now in place in the West Midlands
as a result of £1.25 million funding.
These Security and Partnerships
Officers (SPOs) are overt, uniformed
counter-terrorism officers based in
the community, one in each of the 21
Operational Command Units, who will be
directly involved in making, and facilitating
from the community, referrals to Prevent
programmes.
Protect
Prepare
The United Kingdom’s Strategy for Countering International Terrorism Page 138
Part 3 Delivery partnerships
Section 14
The United Kingdom’s Strategy for Countering International Terrorism Page 140
Part 3 the Cross-Sector Working Group (covering
the critical national infrastructure) under
14.17 Terrorist threats cross
international borders. Terrorist incidents
Section 14 Protect; NSID(PSR)(R)(O), the official level in this country usually have an overseas
committee covering resilience (where connection: the term ‘home-grown’
relevant) under Prepare; the Devolved terrorism, though often used, can be
Administrations Prevent Delivery Group misleading. Planning for attacks in the
under Prevent. UK takes place overseas as well as
at home. Extremist narratives draw
14.15 Within each Devolved inspiration from overseas and have been
Administration, counter-terrorism activity influential in driving radicalisation in the
is organised as follows: UK. Perceptions of UK foreign policy can
become a grievance which is exploited
Scotland: coordination of the delivery by extremist networks. Overseas, British
of CONTEST in Scotland takes place citizens have been killed and injured in
between the Resilience Advisory attacks; others have engaged in terrorist
Board (Special) and Scottish Guardian activity.
Group. The Scottish Preventing Violent
Extremism Unit (SPVEU) is a joint initiative 14.18 The work of Departments and
between the Devolved Administration agencies overseas on counter-terrorism is
in Scotland and ACPOS to lead on the coordinated through the OCG (chaired by
national coordination of the delivery of the FCO) and focused on countries which
Prevent. have direct impact on the threat to the UK
and UK interests; and on countries which
Wales: a Board to coordinate are critical allies in our counter-terrorism
implementation of CONTEST has been work. The Government’s network of
established with senior representation overseas posts is used as a platform
from the Welsh Assembly Government, for the cross-Whitehall effort. More than
the Association of Chief Police Officers 14 Departments and agencies, including
Cymru, the Welsh Extremism and Counter- those traditionally with a domestic focus,
Terrorism Unit, the Home Office and contribute to the delivery of CONTEST
others. overseas.
Northern Ireland: policing and justice 14.19 The OCG is responsible for
have not yet been devolved. There agreeing, and keeping under review,
are long-standing arrangements for the priority countries and regions which
coordinating the counter-terrorism pose the greatest threat to the UK and
strategy in Northern Ireland, chiefly UK interests overseas. UK Government
through the Security Policy Meeting, officials working in priority countries
chaired by the Secretary of State for report to the OCG and are responsible for
Northern Ireland. In addition, the Northern developing and delivering country-specific
Ireland Office chairs a local CONTEST counter-terrorism strategies which set
group, comprising the NIO, PSNI and out their contribution to CONTEST. These
CPNI. The Group looks at CONTEST as strategies set out a long-term vision
a whole, and in particular at the delivery for our overseas CONTEST work and
of the eight objectives within the Protect articulate objectives against each of
programme. A focused working group the four workstreams. Each strategy is
has been established to concentrate on based on the threat to the UK and its
Crowded Places. interests overseas, and linked to rigorous
assessments of key capabilities in our
Working internationally priority countries and regions.
The United Kingdom’s Strategy for Countering International Terrorism Page 142
Part 3 governance and oversight, and policing
performance management.
Accountability
14.29 Counter-terrorism policing is
Section 14 overseen by a tripartite arrangement
Resourcing
comprising:
14.26 The Government continues to
• The Home Secretary – who is
invest in capability enhancement for
responsible for overall funding and
counter-terrorism policing, which has
setting strategic priorities.
been funded by specific grants. The
Police Counter-Terrorism Specific Grant • Chief Constables – who have
for England and Wales totalled more than operational responsibility for policing
£529 million in 2008/09 and consists of in their geographic area and who are
three main components: collectively represented at the national
level by ACPO.
• Metropolitan Police Service Counter-
Terrorism Specific Grant (£176 million). • Police Authorities – who are
responsible for ensuring that an
• Local and Regional Counter-Terrorism
effective and efficient police service is
specific funding (£128 million).
in place in their area.
• Dedicated Security Post funding
(£225 million). Governance and oversight
14.30 A new governance framework
14.27 The first two components
has been developed to support counter-
deliver enhanced counter-terrorism
terrorism policing:
policing capability including the Police
Counter-Terrorism Network, new Prevent • The Police Counter-Terrorism Board
officers, some protective measures at is the key forum for senior tripartite
ports, a number of national units and partners to consider the policing
programmes, and funding for forces contribution to CONTEST, policy and
when an operation places a strain on investment matters. It reports to the
their existing resources. In 2006/07, Home Secretary chaired National
£248 miliion was allocated to these Policing Board and to the CONTEST
areas (comprised of £142 million to the Board.
Metropolitan Police Service and £106
• A programme management team
million elsewhere) which was increased
has been established within the
to £299 million in 2007/08 (£161
ACPO’s Terrorism and Allied Matters
million to the Metropolitan Police Service
Business Area (TAM), responsible
and £138 million to other forces). The
for agreeing a strategy for the police
third component of the Police Counter-
service’s contribution to CONTEST
Terrorism Specific Grant is specifically for
and overseeing its coordination
specialist protection functions at ports,
and delivery through a Strategic
and royalty and VIP protection.
Programme Board, which is also
attended by the other tripartite
14.28 In 2007/08, the Scottish
members.
Executive provided £12 million from the
Police Central Government funds to pay • The ACPO (TAM) Finance and
for specialised counter-terrorism policing Workforce Planning Board offers
posts, which has continued in 2008/09. advice to the Home Office on the
This included funding to establish an onward allocation of relevant counter-
additional 55 specialised counter- terrorism grant monies.
terrorism posts across the Scottish Police
• A Joint Counter-Terrorism Oversight
Service. On top of that, in 2008/09 the
Group has been established
Scottish Executive has provided over £1.5
comprising relevant authorities for
million additional funding for counter-
the Metropolitan Police Service and
terrorism purposes to ACPOS.
lead forces within the Police Counter-
Terrorism Network.
The United Kingdom’s Strategy for Countering International Terrorism Page 144
Part 3 The Government instead plans to use the
Armed Forces to augment the response
in identifying and dealing with terrorist-
related content on the internet (see
Section 14 of others if this becomes necessary. ‘The internet and Prevent’, Section Nine,
Niche capabilities for responding to page 94).
attacks include scientific expertise and
analysis and the ability to operate in 14.43 The security and intelligence
high threat and hazardous environments. agencies, the police and MOD are
Defence holds some of the country’s dependent on a wide range of private
leading expertise in CBRN and explosive sector partnerships to develop and
materials. Building on this, a counter- maintain operational capabilities. These
terrorism centre has recently been range from significant information
established at the Defence Science and technology requirements to the
Technology Laboratories (Dstl), Porton application of specialist technologies in
Down, which is leading counter-terrorism the most sensitive circumstances in the
research across a range of areas. UK and overseas. Across this spectrum of
activity private sector staff work alongside
Working with the Private sector their public sector partners in the
operation and maintenance of capability.
14.40 The Private sector has a key
role to play in the local, national and Protect
international delivery of the CONTEST
14.44 Under Protect the private sector
Strategy. This role extends beyond
are key partners in delivering security
science and technology and the supply
enhancements across our national
of goods and services and requires
infrastructure, transport system, crowded
Government and the Private sector
places and hazardous sites. With the
to work closely to align commercial
majority of the sites and assets that we
opportunities with CONTEST priorities.
are seeking to protect in the ownership
of the private sector, it is vital that
Pursue
Government works in close partnership
14.41 Government needs to to identify proportionate programmes
communicate with industry the generic of security enhancements. Government
nature of the terrorist threat and specific will continue to invest in developing
threats to sectors or locations. There and facilitating these partnerships.
are a wide range of ways in which this is CPNI has developed a range of
managed, involving, in the UK, the police, information exchanges which bring
CPNI and overseas, the FCO. together stakeholders in the private and
public sector to discuss infrastructure
14.42 We rely on the private sector protection issues and to allow industry
for access to information on which representatives to discuss the common
Pursue operations depend. Specific security issues they face.
industrial sectors (notably finance
and communications) play a key role 14.45 Across a range of protective
in this area and their activities are security technologies UK industry has
supported by well-developed regulatory world class capabilities. They include:
and statutory regimes. For example,
• Detection – the UK is a world leader
investigations leading from Suspicious
in the manufacture of security
Activity Reports to SOCA provide
detection technologies such as
information about terrorist financing
x-ray and explosives detection
and data from Communications Service
systems. UK companies provide
Providers, obtained under UK legislation
over 60% of airport security systems
(see ‘Surveillance, interception of
to the US Government through the
communications, safeguards and
Transportation Security Administration.
oversight’, Section Eight, page 70), is
Over 9,000 ‘Explosive Trace Detection’
vital to the identification and investigation
systems are deployed worldwide for
of Pursue targets. Cooperation with
counter-terrorist applications.
Internet Service Providers is important
The United Kingdom’s Strategy for Countering International Terrorism Page 146
Part 3 explore how industry can best help with
the timely detection of suicide bombers.
on terrorism out to 2020, which is being
used to help shape future research
Section 14 requirements.
Science and Technology
14.56 Considering these trends, the
14.52 The Security and Counter- study identified that the key science and
Terrorism Science and Innovation technology domains relevant to CONTEST
Strategy was published in June 2007192. are ICT, biotechnology (including
The main objectives remain relevant: to synthetic biology), military sciences,
establish a stronger cross-Government nanotechnology, robotics, engineering and
approach to identification of counter- manufacturing. This work has significantly
terrorism requirements and research informed Part One of this document.
priorities; to improve horizon-scanning
for future threats and new scientific 14.57 OSCT is also leading on work to
developments; to increase collaboration ensure the Government has the ability
with international partners allowing to respond effectively, and with pace,
increased sharing of knowledge and to developments in technology and the
technology; and to cultivate a strong and terrorist threat. A recent study explored the
innovative counter-terrorism market. potential of the Government using venture
capital style techniques to draw through
Cross-Government approach to innovation for counter-terrorism. This work
science and technology used regional searches, competitions and
investor networks to access innovative
14.53 OSCT leads a network of cross-
ideas to protect crowded places and to
Departmental working groups bringing
understand developments in online ICT.
together policy leads, end users, and
The Government will build on this to enable
scientific experts to identify research
greater understanding of the innovation
priorities and address key capability
community, smarter influence over
requirements. This is managed by
external innovation and better coordination
the Science and Technology Board,
of investments in innovative ideas and
its associated sub-Boards and by a
solutions.
framework that maps science and
technology against CONTEST priorities.
International collaboration
14.54 It is supported in this work by 14.58 The Government has
several centres of expertise in science strengthened partnerships with the
and technology within Government. The international science community, notably
MOD Science and Technology Counter- in the US (through the Department of
Terrorism Centre plays an important role Homeland Security (DHS) and, through
in ensuring MOD investment in a range MOD, the Department of Defence) and in
of research and technologies assist Europe. There is also close working with
wider counter-terrorism requirements. partners in Canada and Australia.
The Home Office Scientific Development
14.59 Our international work is wide-
Branch provides high-quality advice,
ranging. There has been work with the
innovation and support in policing, crime
European Union on explosives-related
reduction, counter-terrorism, border
projects which have informed policy
security and identity management.
on hazardous substances. There is
And Her Majesty’s Government
collaborative working with the DHS
Communications Centre193 provides
in the development and evaluation of
expert, covert capabilities for the security
their fixed site, wide area, biological
and intelligence agencies.
detection system (the only one of its
kind in operational use worldwide). And
Horizon-scanning and innovation
the Government is benefiting from the
14.55 In collaboration with Dstl, MOD’s US’s direct practical experience in the
research arm, OSCT has conducted a clean-up and remediation of biological
review of future science and technology contamination of public areas resulting
developments that may have an impact from the Anthrax letters of 2001.
The 2012 Olympic and Paralympic Games forward by the police, the Home Office
will be a celebration of sport and culture and a range of other Departments and
for London and the UK. The Government agencies.
has a responsibility to ensure that the
Games are safe and secure against all Since December 2008, multi-agency
types of risks, including terrorism. Olympic security planning has been led by
the Olympic Security Directorate in OSCT.
The 2012 Games will pose significant
challenges: OSCT is responsible for developing the
2012 Olympic and Paralympic Safety
• The scale and duration of the Games
and Security Strategy (‘the Olympic
is much greater than previous
Security Strategy’) approved by the NSID
events in the UK: nine million ticket
Ministerial subcommittee in February
sales; over 30 Olympic venues;
2009 and for monitoring progress of its
over 200 competing nations;
associated programmes. OSCT reports
around 14,000 athletes; 250,000
on Olympic Security issues to the Home
accredited personnel, 20,000 media
Secretary and to NSID.
representatives, and unprecedented
numbers of VIP visitors requiring
The Olympic Security Strategy involves
protection.
other Government Departments,
• Events will be taking place across the the police service, the security and
UK, not just in London. intelligence agencies, other emergency
services, local authorities, the private
• Planning is taking place in the
sector and a wide range of other key
context of the current ‘Severe’ threat
stakeholders including the Olympic
assessment of terrorism in the UK.
Delivery Authority (ODA), which is
The level and nature of the terrorist
responsible for venue construction,
threat may change over the course of
and London Organising Committee of
the planning process, and our plans
the Olympic Games (LOCOG), which is
will be flexible enough to respond to
responsible for staging the Games.
this.
• Counter-terrorism measures will need Development and implementation of
to be an integrated part of a much the strategy will be closely coordinated
larger security operation encompassing with CONTEST, drawing on CONTEST
a wide range of other potential risks programmes and principles. But it will
to the 2012 Games including public also include significant programmes to
order, crime (volume crime, violent manage risks relating to public order,
crime, and serious organised crime) crime and natural hazards.
and non-terrorist incidents such as
flooding. The five key workstreams of the Olympic
Security Strategy are aligned with but
The Home Office made a commitment where necessary go beyond CONTEST;
to ‘coordinate all matters of security and they are to:
the emergency services for the Games’
• Protect Olympic and Paralympic
as part of the London 2012 Olympics
venues, events and supporting
Host City Contract signed in late 2004
transport infrastructure, and those
with the International Olympic Committee.
attending and using them.
Since London secured the 2012 Games,
security planning has been taken
The United Kingdom’s Strategy for Countering International Terrorism Page 148
• Prepare for events that may
significantly disrupt the safety and
security of the Games and ensure
capabilities are in place to mitigate
their impact.
• Identify and disrupt threats to the
safety and security of the Games.
• Command, control, plan and resource
for the safety and security operation.
• Engage with international and
domestic partners and with
communities to enhance security and
ensure the successful delivery of the
Olympic Security Strategy and a safe
Olympic and Paralympic Games. This
includes a significant and developing
Prevent programme which links
specifically to the broader Prevent
workstream in CONTEST.
Much of this work falls to the Research, Information and Communications Unit,
a cross-Departmental team established in June 2007.
The United Kingdom’s Strategy for Countering International Terrorism Page 152
Part 4 Counter-terrorism communications
Section 15
“…I say to you: that we are in a battle, and more than half of this battle is in the
battlefield of the media. And that we are in a media battle in a race for the hearts
and minds of our Umma. And that however far our capabilities reach, they will never
be equal to one thousandth of the capabilities of the kingdom of Satan that is
waging war on us.”
15.01 Communications are a vital part of not only the formation of OSCT but also
our work on counter-terrorism. CONTEST the creation of a new team to work on
depends for its success on partnerships. communications issues. This became
In the principles we set out earlier in this known as the Research, Information and
document (paragraph 7.03) we said that Communications Unit (RICU) which was
these partnerships depend on openness established in June 2007 and is staffed
and trust: both depend upon accurate and directed by CLG, FCO and the Home
communications about the threat we face Office. The unit forms part of OSCT.
and the responses we believe we have to
make. This document reflects the priority 15.04 The purpose of RICU is to ensure
we put on this part of the strategy. that the UK Government communicates
effectively to reduce the risk of terrorism,
15.02 Communications are also vital to by:
our work to refute the ideology of Al Qa‘ida
• advising CONTEST partners on
and the propaganda which they and other
their counter-terrorism related
terrorist organisations direct towards this
communications
country. In the first part of this document
we identified ideology as one of the four • exposing the weaknesses of violent
key drivers of contemporary terrorism. extremist ideologies and brands, and
We also noted that terrorist organisations
• supporting credible alternatives
have made use of communications
to violent extremism using
technology, using new media to ensure
communications.
that their ideology and propaganda reach
a wider audience than has been possible
15.05 RICU is therefore at the centre of
for terrorist groups before. But history has
the Government’s efforts to communicate
shown us that ideologies and propaganda
the Government’s counter-terrorism
can be attacked and weakened. It is
strategy and to use messaging to
vital that we use the tools of the new
disrupt the Al Qa‘ida narrative. It plays
communications age to refute the claims
a central strategic coordinating role
made by contemporary terrorism and by
to support other Departments and
that means to reduce the threat to the UK
Agencies, police and local authorities
and UK interests overseas.
in delivering their own Departmental
Prevent communications strategies. RICU
15.03 The review in 2006/07 of
also carries out its own campaigns and
Government arrangements for counter-
media work.
terrorism recognised the key role of
communications and recommended
The United Kingdom’s Strategy for Countering International Terrorism Page 154
Part 4 have international impact. In this area
RICU’s work is aligned with CLG, whose
Section 15 work puts communities at the centre of
the response to violent extremism and
supports them to deliver local solutions
for local challenges.
The United Kingdom’s Strategy for Countering International Terrorism Page 156
CONTEST must also coordinate with other Government
policies that are essential to its delivery. They include
conflict reduction, our international aid programme, our
work in Afghanistan and Pakistan and our support to
communities here, building cohesion, empowerment and
race equality in this country.
Public Service Agreements (PSAs) set out the key priority outcomes the Government
wants to achieve in the next spending period (currently 2008–11). For the first time,
counter-terrorism work has a PSA. The aim of PSA 26 is the same as that of CONTEST
– to reduce the risk to the UK and its interests overseas from international terrorism.
PSA 26 is based on the four main workstreams of CONTEST. Under each one, there
are a number of outcome measures designed to monitor and assess aspects of
the cross-Government counter-terrorism effort. The outcome measures are in turn
underpinned by a number of specific indicators (not shown).
Outcome 1: Detection
A reduction in the risk that attack planning against the UK or UK interests will go
undetected by means of improved intelligence coverage of the target community
Pursue
Outcome 2: Disruption
Reduction in the risk of a successful attack against the UK by means of an increase
in the impact of disruption on those who threaten the UK or UK interests
The United Kingdom’s Strategy for Countering International Terrorism Page 158
Annex B: Departmental roles and responsibilities
The United Kingdom’s Strategy for Countering International Terrorism Page 160
Annex B issues analytical reporting to Government
Departments and agencies.
crises; and to manage the Olympic Safety
Strategy.
The United Kingdom’s Strategy for Countering International Terrorism Page 162
GIA Armed Islamic Group
GCHQ Government Communications Headquarters
GO Government Office
GOWM Government Office for the West Midlands
GSPC Salafist Group for Preaching and Combat
GTRP Global Threat Reduction Programme
HEFCE Higher Education Funding Council for England
IAEA International Atomic Energy Agency
ICT Information and Communication Technology
IED Improvised Explosive Device
IMP Intercept Modernisation Programme
ISP Internet Service Provider
JI Jemaah Islamiyah
JIC Joint Intelligence Committee
JTAC Joint Terrorism Analysis Centre
LAA Local Area Agreement
LOCOG London Organising Committee of the Olympic Games
LRF Local Resilience Forums
LSP Local Strategic Partnership
MDP Ministry of Defence Police
MINAB Mosques and Imams National Advisory Board
MOD Ministry of Defence
MOJ Ministry of Justice
MOU Memorandum of Understanding
NaCTSO National Counter-Terrorism Security Office
NIR National Identity Register
NIS National Identity Scheme
NOMS National Offender Management Service
NIO Northern Ireland Office
NRA National Risk Assessment
NSID Ministerial Committee on National Security, International Relations
and Development
OSCT Office for Security and Counter-Terrorism
OCG Overseas CONTEST Group
The United Kingdom’s Strategy for Countering International Terrorism Page 164
Annex C: Acronyms and abbreviations Page 165
End notes
These end notes are intended to indicate where further open source information may
be found about details included in the text. HM Government does not necessarily
endorse all the views expressed in literature cited below.
2. Russel D. Howard and Reid L. Sawyer, Terrorism and Counterterrorism – Understanding The New Security
Environment Readings and Interpretations (Dubuque: McGraw Hill/Contemporary Learning Series, 2006), p.535
and 542
4. Bruce Hoffmann, Inside Terrorism (New York: Columbia University Press rev. ed, 2006), p.63
5. http://news.bbc.co.uk/onthisday/hi/dates/stories/september/12/newsid_2514000/2514929.stm
6. The RAND terrorist incident database indicates that between 1968 and 1980 Palestinian terrorist organisations
were responsible for 331 terrorist incidents, considerably more than other groups. See RAND – MIPT Terrorist
Incident Database (2007) and RAND Terrorism Chronology (1997); available at www.rand.org/ise/projects/
terrorismdatabase
7. www.guardian.co.uk/print/0,,4484907-103684,00.html
8. Con Coughlin, Hostage: The Complete Story of the Lebanon Captives (London, Little, Brown and Company,
1992) pp. 154, 259-62 and 285-6. In December 2003 Zaid Hassan Abd Latif Safarini pleaded guilty in the
United States to his role in the hijacking of Pan Am Flight 73 at Karachi in September 1986 and admitted his
membership of the Abu Nidal Organisation. See: www.usdoj.gov/usao/dc/Victim_Witness_Assistance/03386.
html
9. http://news.bbc.co.uk/onthisday/hi/dates/stories/october/24/newsid_2478000/2478505.stm
10. www.aaib.gov.uk/cms_resources/dft_avsafety_pdf_503158.pdf
11. www.scotcourts.gov.uk/library/lockerbie/index.asp
12. Islamism is a political philosophy which, in the broadest sense, promotes the application of Islamic principles
to modern governance. See for example Montasser Al-Zayyat, The Road to Al Qa‘ida, The story of Bin Laden’s
Right Hand Man (London: Pluto, 2004), preface p.xiii by Ahmed Fakry and Sara Nims. The term ‘Militant
Islamism’ is used here to specify an ideology which argues for the use of violence to achieve this objective.
There are no commonly agreed definitions of ‘Islamism’ and ‘Islamist’. They do not refer to a single unified
movement; and individuals and groups that define themselves using these terms or may be described by others
using the terms can hold widely differing views. Most Islamists do not condone the use of violence to achieve
their aims.
13. Lawrence Wright, The Looming Tower, Al-Qeada’s Road to 9/11 (London: Penguin Books, 2007), pp.48–57
14. F or further background see Malise Ruthven, A Fury for God: The Islamist attack on America (London: Granta,
2002) and Montasser Al-Zayyat The Road to Al Qaeda (London: Pluto, 2004). Zawahiri’s debt to Qutb was
explicitly acknowledged in his work entitled Knights Under the Prophets Banner; see Gilles Kepel and Jean-
Pierre Milelli (eds) Al Qaeda in its own words (Cambridge Mass and London: Harvard, 2008), pp.149–150.
15. Marc Sageman, Understanding Terror Networks (Philadelphia: University of Pennsylvania Press, 2004), p.34
17. Gilles Kepel, Jihad: The Trail of Political Islam (London: I.B.Tauris & Co, 2002), p.300
18. www.mi5.gov.uk/output/other-groups.html
19. olin Robinson, In the spotlight: Armed Islamic Group (GIA) a.k.a. Groupement Islamique Arme (Washington DC:
C
Center for Defense Information, 2003) available at: www.cdi.org/terrorism/gia_020503-pr.cfm See also www.
fco.gov.uk/en/about-the-fco/country-profiles/middle-east-north-africa/algeria?profile=politics&pg=7
The United Kingdom’s Strategy for Countering International Terrorism Page 166
20. Jason Burke, Al-Qaeda (London: Penguin Books, 2007), p.205
21. National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report, (Washington
DC: US Government Printing Office 2004), p.71 available at http://govinfo.library.unt.edu/911/
report/911Report.pdf
25. in Laden has written repeatedly on Saudi Arabia. See for example “The Invasion of Arabia” and “The Saudi
B
regime” (1996) in Bruce Lawrence (ed), Messages to the World: the statements of Osama bin Laden (London:
Verso, 2005), p.15 and p.31
26. National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report, (Washington
DC: US Government Printing Office 2004), p.57 available at http://govinfo.library.unt.edu/911/
report/911Report.pdf
27. “ Declaration of Jihad” in Bruce Lawrence (ed), Messages to the World: the statements of Osama bin Laden
(London: Verso, 2005), p.23. An annotated version is available in Gilles Kepel and Jean-Pierre Milelli (eds), Al
Qaeda in its own words (Cambridge, Mass and London: Harvard, 2008), p.47
28. “ The World Islamic Front” in Bruce Lawrence (ed) Messages to the World: the statements of Osama bin Laden
(London: Verso, 2005) p.58 and Gilles Kepel and Jean-Pierre Milelli (eds) Al Qaeda in its own words (Cambridge
Mass and London: Harvard, 2008), p.53
29. National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report, (Washington
DC: US Government Printing Office 2004), p.115 available at http://govinfo.library.unt.edu/911/
report/911Report.pdf
31. Marc Sageman, Understanding Terror Networks (Philadelphia: University of Pennsylvania Press, 2004) p.99-103
32. ational Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report, (Washington
N
DC: US Government Printing Office 2004), p.190 available at http://govinfo.library.unt.edu/911/
report/911Report.pdf
33. Ibid
34. www.fco.gov.uk/en/about-the-fco/country-profiles/asia-oceania/afghanistan?profile=history&pg=3
38. Ahmed S. Hashim, Insurgency and Counter-Insurgency in Iraq (London: Hurst & Company, 2006), p.47
39. ashington Post, “Death Could Shake Al-Qaeda in Iraq and Around the World” (10 June 2006) available at
W
www.washingtonpost.com/wp-dyn/content/article/2006/06/09/AR2006060902040_2.html
40. Marc Sageman, Leaderless Jihad (Philadelphia: University of Pennsylvania Press, 2008), p.63
44. ww.ag.gov.au/agd/WWW/nationalsecurity.nsf/Page/What_Governments_are_doing_Listing_of_Terrorism_
w
Organisations_Salafist_Group_for_Call_and_Combat
45. www.state.gov/s/ct/rls/crt/2007/103714.htm
46. arc Sageman, Understanding Terror Networks (Philadelphia: University of Pennsylvania Press, 2004), p.44 and
M
114
48. http://travel.state.gov/travel/cis_pa_tw/tw/tw_918.html
49. ee for example extracts from Ayman Al-Zawahiri “Knights Under the Prophets Banner” published in Gilles
S
Kepel and Jean-Pierre Milelli (eds), Al Qaeda in its own words (Cambridge Mass and London: Harvard, 2008),
pp.193–194.
51. www.state.gov/s/ct/rls/crt/2007/103714.htm
52. www.history.com/this-day-in-history.do?action=Article&id=7059
53. T he “Military Wings” of Hamas (izz-zl-Din al Qassem) IDZ) and Hizballah (Hizballah External Security
Organisation (ESO)) brigades (IDQ) were proscribed in March 2001. In July 2008 the Government laid an Order
in Parliament (approved as Statutory Instrument 2008/1931) to proscribe the entirety of Hizballah’s military
wing including the Jihad Council and all units reporting to it (including the Hizballah External Security
Organisation) in substitution for the existing entry “Hizballah External Security Organisation”. This means that it
is a criminal offence to belong to, fundraise and encourage support for the military wing of Hizballah however
the legitimate political, social and humanitarian role Hizballah plays in Lebanon is unaffected by the ban.
56. www.timesonline.co.uk/tol/news/world/article531110.ece
59. ichard Reid was arrested in Boston, USA on 22 December 2001, after his flight from Paris to Miami was
R
diverted there; in early 2003 he was sentenced to life imprisonment for attempting to destroy a commercial
airliner in flight.
60. Saajid Badat was arrested in November 2003, still in possession of an own explosive device; in February 2005
he pleaded guilty to conspiring to place a device on an aircraft in service and was sentenced to 13 years in
prison.
61. Seth Jones and Martin Libicki, How Terrorist Groups End (Santa Monica: Rand Corporation, 2008), p.132
62. In September 2005, Andrew Rowe was sentenced to 15 years, reduced to 10 years on appeal, for possessing
articles for use in terrorism.
63. In June 2004, Kamel Bourgass was sentenced to life imprisonment for the murder of DC Stephen Oake. In April
2005, he was also convicted of conspiracy to cause a public nuisance by the use of poisons and/or explosives
to cause disruption, fear or injury and sentenced to 17 years in what became known as the Ricin case.
64. sif Hanif carried out a suicide attack on Mike’s Place, a beachfront bar in Tel Aviv, on 30 April 2004; the body
A
of Omar Sharif was found in the sea off a Tel Aviv beach on 12 May.
65. peration CREVICE, which took place between 2003–04, was an investigation into a plot to cause explosions
O
in London. At the time, Operation CREVICE was the largest counter-terrorism operation ever seen in the UK. On
30 April 2007, five individuals were found guilty of conspiracy to cause explosions. On 23 July 2008, the Court
of Appeal published their judgement upholding the convictions of these five individuals.
66. peration RHYME was an investigation into an alleged cell planning attacks on buildings in the UK and the
O
United States. Possible targets included the IMF and World Bank buildings as well as the New York Stock
Exchange. The cell also considered using a radioactive bomb and had plans to blow up three limousines packed
with gas cylinders and explosives next to or under targets in the UK. Their leader, Dhiren Barot, pleaded guilty on
7 November 2006 and was sentenced to 40 years imprisonment, later reduced to 30 years on appeal. In 2007,
six other defendants pleaded guilty to conspiracy to cause explosions and received sentences of between 15
and 26 years. A further defendant was convicted of conspiracy to murder and received a 15-year sentence.
The United Kingdom’s Strategy for Countering International Terrorism Page 168
67. “ Our shared values – a shared responsibility” a speech by the Home Secretary, Jacqui Smith, at the First
International Conference on Radicalisation and Political Violence (January 2008); available at http://press.
homeoffice.gov.uk/Speeches/sp-hs-terrorism-keynote-jan-08
68. eport of the Official Account of the Bombings in London on 7th July 2005 (London: The Stationery Office,
R
2006); available at www.official-documents.gov.uk/document/hc0506/hc10/1087/1087.pdf
71. www.cps.gov.uk/news/pressreleases/187_08.html
72. T he Birmingham based network in Operation GAMBLE purchased and supplied items for use in acts of terrorism
abroad. The principal defendant, Parviz Khan, was also suspected of engaging in conduct to give effect to his
intention to kidnap and kill a member of the British Armed Forces. The trial ended in February 2008 when four
men pleaded guilty and one individual was found guilty. Two of the individuals pleaded guilty to offences relating
to the plot, the others with other terrorist-related offences.
73. L ondon/Glasgow incident June 2007: In the early hours of 29 June 2007 two Vehicle Borne Improvised
Explosive Devices (VBIEDs) were found in Central London and subsequently made safe. The following day there
was a VBIED attack on Glasgow Airport. One of the attackers later died as a result of injuries sustained in the
attack on the airport. On 11 April 2008, Sabeel Ahmed pleaded guilty to failure to disclose information in
relation to a terrorist attack. He was sentenced to 18 months imprisonment but due to time spent on remand,
was handed to UKBA for administrative removal to India. On 16 December 2008, Bilal Abdullah was convicted
of conspiracy to cause explosions and conspiracy to murder. He was sentenced to life imprisonment with a
recommended minimum tariff of 32 years.
74. T he Government will shortly be publishing a Statistical Bulletin which will provide further details relating to the
numbers arrested for terrorism-related offences in the UK and the outcome of those arrests. The statistics
have been compiled using administrative data collected by the National Coordinator of Terrorism Investigations,
the Crown Prosecution Service, the Prison Service and OSCT.
76. aniel Benjamin and Steven Simon, The Next Attack – The Globalisation of Jihad (London: Hodder and
D
Stoughton, 2005), p.88
77. utch National Coordinator for Counterterrorism (NCTb) , Salafism in the Netherlands (The Hague: The National
D
Coordinator for Counterterrorism 2008), p.39 available at http://english.nctb.nl/Images/Salafism%20UK_
tcm51-120948.pdf; the Dutch Ministry of Justice website has further details: www.om.nl
78. www.timesonline.co.uk/tol/news/uk/crime/article5619151.ece
80. For example, extracts from Ayman Al Zawahiri “Knights Under the Prophets Banner”, published in Gilles Kepel
and Jean-Pierre Milelli (eds) Al Qaeda in its own words (Cambridge Mass and London: Harvard, 2008), p.193.
81. ee the 2007 lecture by Peter Clarke, formerly Assistant Commissioner Special Operations and National
S
Coordinator for Terrorist Investigations at the Metropolitan Police; available at http://cms.met.police.uk/news/
major_operational_announcements/terrorism/dac_peter_clark_s_speech_on_counter_terrorism
83. F und for Peace and Foreign Policy, “Failed States Index 2008”, Foreign Policy, August/September 2008;
available at www.foreignpolicy.com/story/cms.php?story_id=4350
84. eth Jones and Martin Libicki, How Terrorist Groups End, Lessons for Countering Al Qa‘ida (Santa Monica:
S
RAND Corporation, 2008), p.99; available at www.rand.org/pubs/monographs/2008/RAND_MG741-1.pdf
86. mel Boubekeur, “Political Islam in Europe”, in Samir Amghar, Amel Boubekeur and Michael Emerson (eds.),
A
European Islam Challenges For Society And Public Policy (Brussels: Centre for European Policy Studies, 2007),
p.19; available at http://shop.ceps.eu/BookDetail.php?item_id=1556
87. See Bruce Lawrence (ed), Messages to the World: the statements of Osama bin Laden (London: Verso, 2005) and
Gilles Kepel and Jean-Pierre Milelli (eds) Al Qaeda in its own words (Cambridge Mass and London: Harvard, 2008).
89. illes Keppel, Beyond Terror and Martyrdom (Cambridge Mass. and London: Harvard University Press, 2008),
G
p.89
90. aniel Benjamin and Stephen Simon, The Next Attack – The Globalization of Jihad (London: Hodder and
D
Stoughton, 2005), pp.59-65; and Gabriel Weimann, Terror on the Internet: the New Arena, the New Challenge
(US Institute of Peace, 2006); and The Dutch National Coordinator for Counterterrorism Jihadis and the internet
(The Hague: National Coordinator for Counterterrorism, 2007).
91. ernard Finel and Holly Gell, Are we Winning?: Measuring Progress in the Struggle Against Violent Jihadism,
B
(American Security Project Report, 2008), p.11; available at www.americansecurityproject.org/files/ASP_
AWW2008.pdf
92. tephen Kull, Muslim Public Opinion on US Policy, Attacks on Civilians and al Qaeda (University of Maryland:
S
World Public Opinion.org, 2007) pp.5–6; available at www.worldpublicopinion.org/pipa/pdf/apr07/START_
Apr07_rpt.pdf
93. J ohn Esposito and Dalia Mogahed, Who Speaks for Islam? What a Billion Muslims Really Think (New York:
Gallup Press, 2007), p.91
94. Ibid pp.73–98; and Studies in Terrorism and Responses to Terrorism (START), University of Maryland.
95. tephen Weber, Perceptions of the US and Support for Violence against America (University of Maryland START,
S
2006), p.2; available at www.start.umd.edu/start/publications/research_briefs/20061120_pipa.pdf
96. aveed Ahmad Shinwari, Understanding FATA, Attitudes towards Governance, Religion And Society in Pakistan’s
N
Federally Administered Tribal Areas (Pakistan: Community Appraisal And Motivation Programme, 2008), p.43
available at www.understandingfata.org/files/CHAPTER%203.pdf
97. F or example in Egypt, Algeria and Palestine; see Gilles Kepel, Jihad: On the Trail of Political Islam (London: I.B.
Tauris & Co, 2002), pp.154–1555, 159, 166–167 and 289.
98. T ufyal Choudhury, The Role of Muslim Identity and Politics in Radicalisation (a study in progress) (London:
Department for Communities and Local Government, 2007), p.6; available at www.communities.gov.uk/
documents/communities/pdf/452628.pdf; and on recent classified UK Government research.
99. uintan Wiktorowicz, Radical Islam Rising, Muslim Extremism in the West (New York: Rowman & Littlefield,
Q
2005), p.91; the reference is to Muhajiroun.
100. dwin Bakker, Jihadi terrorists in Europe: their characteristics and the circumstances in which they joined the
E
jihad: an exploratory study (Clingendael Security Paper, The Hague: Clingendael Institute, 2006), p.40; available
at www.clingendael.nl/publications/?id=6480&&type=summary
101. T ufyal Choudhury, The Role of Muslim Identity and Politics in Radicalisation (a study in progress) (London:
Department for Communities and Local Government, 2007), p.6 and 29; available at www.communities.gov.uk/
documents/communities/pdf/452628.pdf Quintan Wiktorowicz, Radical Islam Rising, Muslim Extremism in the
West (New York: Rowman & Littlefield, 2005), p.99
102. ew Global Attitudes Project, Unfavourable views of Jews and Muslims on the increase in Europe (2008), p.4
P
available at http://pewglobal.org/reports/pdf/262.pdf
103. orldPublicOpinion.Org Program on International Policy Attitudes, Muslim Public Opinion on US Policy, Attacks
W
on Civilians and al Qaeda (University of Maryland, 2007), p.14; available at www.worldpublicopinion.org/pipa/
pdf/apr07/START_Apr07_rpt.pdf
104. J ohn Esposito and Dalia Mogahed, Who Speaks For Islam? What A Billion Muslims Really Think (New York:
Gallup Press, 2007), p. 69. This polling was conducted between 2001 and 2007.
105. orldPublicOpinion.Org Program on International Policy Attitudes, Muslim Public Opinion on US Policy, Attacks
W
on Civilians and al Qaeda (University of Maryland, 2007), pp.7 and 21–22; available at www.worldpublicopinion.
org/pipa/pdf/apr07/START_Apr07_rpt.pdf
107. The Interim Report of the IPPR Commission on National Security in 21st Century, Shared Destinies, Security In
A Globalised World (London: IPPR, 2008), p.57; available at www.ippr.org.uk/publicationsandreports/
publication.asp?id=636
The United Kingdom’s Strategy for Countering International Terrorism Page 170
108. F or example: BBC World Service Poll, US ‘War on Terror’ Has Not Weakened al Qaeda (2008), p. 16; available at
www.worldpublicopinion.org/pipa/pdf/sep08/BBCAlQaeda_Sep08_rpt.pdf and Pew Global Attitudes Project,
The Great Divide: how Westerners and Muslims view each other (2006), pp.23–26; available at http://www.
pewglobal.org/reports/pdf/253.pdf; and ICM poll for the Sunday Telegraph (2006)); available at http://www.
icmresearch.co.uk/pdfs/2006_february_sunday_telegraph_muslims_poll.pdf#search=”telegraph 2006”
109. ee Gilles Kepel, Beyond Terror and Martyrdom (Cambridge, Mass. and London: Harvard University Press,
S
2008), pp.160-171.
110. For further background see Lawrence Wright, ‘The Rebellion Within’, The New Yorker, 2 June 2008 available at
www.newyorker.com/reporting/2008/06/02/080602fa_fact_wright.
112. The National Security Strategy of the United Kingdom: Security in an interdependent world Cm7291 (London:
The Stationery Office, 2008); available at www.official-documents.gov.uk/document/cm72/7291/7291.pdf
Section 8 – Pursue
115. CPOS CTIU is supported by the Strathclyde Police Major Crime and Terrorism Investigation Unit, formed in
A
2008 to investigate proactively counter-terrorism matters in the force area.
116. European Court of Human Rights; Plenary Court judgment (Strasbourg, Jul 1989): Soering v. The United
Kingdom [1989] (Application no. 14038/88) 11 EHRR 439
117. uropean Court of Human Rights; Grand Chamber judgment (Strasbourg, Nov 1996): Chahal v. The United
E
Kingdom [1996] (Application no. 22414/93) 23 EHRR 413
118. European Court of Human Rights; Grand Chamber judgment (Strasbourg, Jul 2006 and Jan 2008 ): Saadi v. The
United Kingdom [2006/2008] (Application no. 13229/03)
119. House of Lords Judgment (House of Lords, Feb 2009): RB (Algeria) and another v. Secretary of State for the
Home Department; OO (Jordan) v Secretary of State for the Home Department [2009] UKHL 10
120. L ord Carlile of Berriew QC, Fourth Report of the Independent Reviewer Pursuant to Section 14(3) of the
Prevention of Terrorism Act 2005 (London: Home Office Publications, Feb 2009) available at http://security.
homeoffice.gov.uk/news-publications/publication-search/prevention-terrorism-act-2005/lord-carlile-fourth-
report.pdf?view=Binary
121. s at 10 December 2008, 23 individuals had been at some point, but were no longer, subject to a control
A
order. Of these: six have been deported, three were held in custody or granted bail having been served notices
of intention to deport; four individuals had their control orders revoked and two individuals did not have their
orders renewed as our assessment of the necessity of those orders changed; one individual absconded after
the Court of Appeal confirmed the quashing of his order but before a new order could be served; two individuals
had their control orders quashed by the High Court; the control orders of five individuals expired but those five
individuals had absconded.
122. T he Act does not cover acquisition, retention and use of forensic data for devolved purposes in Scotland;
Scottish Ministers do not favour the permanent retention of forensic samples for non-convicted persons.
123. overt surveillance is investigative conduct likely to result in the obtaining of private information about a
C
person, such as their movements, conversations and other activities.
124. rivy Council Review, Privy Council Review of Intercept as Evidence; Report to the Prime Minister and the Home
P
Secretary (London: The Stationery Office, 2008), available at www.official-documents.gov.uk/document/
cm73/7324/7324.asp
125. M Treasury, Home Office, and Serious and Organised Crime Agency and Foreign and Commonwealth Office,
H
The financial challenge to crime and terrorism (February 2007), available at www.hm-treasury.gov.uk/fin_
challengecrime_terrorism.htm
128. Intelligence and Security Committee, Handling of Detainees by UK Intelligence Personnel in Afghanistan,
Guantanamo Bay and Iraq Cm6469 (London: The Stationery Office, 2005) available at www.cabinetoffice.gov.
uk/intelligence/special_reports.aspx
129. Intelligence and Security Committee, Report into Rendition Cm7171 (London: The Stationery Office, 2007)
available at www.cabinetoffice.gov.uk/intelligence/special_reports.aspx
130. Ibid
131. Intelligence and Security Committee, Annual Report 2007-2008 Cm7542 (London: The Stationery Office, 2009)
available at www.cabinetoffice.gov.uk/intelligence/special_reports.aspx
Section 9 – Prevent
134. www.communities.gov.uk/archived/general-content/communities/preventingextremismtogether/ 216937/
135. In order to build the resilience of communities where it is most needed, the distribution of funding to local
authorities has been is based on the size of local Muslim communities.
136. T he National Community Safety Plan (NCSP), 2006-2009, set out the Government’s three-year community
safety priorities, and explained the Home Secretary’s priorities for the police service. A revised National
Community Safety Plan, 2008-11, has now been published and is available at www.crimereduction.homeoffice.
gov.uk/activecommunities/activecommunities088.pdf
137. Scotland Ministers have also identified funding to progress the ACPOS Prevent Delivery plans.
138. www.communities.gov.uk/communities/communityempowerment/communitiesincontrol/
140. HM Government, The Prevent strategy: A guide for Local Partners in England (2008); available at http://security.
homeoffice.gov.uk/news-publications/publication-search/prevent-strategy/
141. eighbourhood Policing Teams work in partnership with other local agencies and with members of the
N
community to address local priorities in respect of crime and anti-social behaviour. Further information is
available at www.neighbourhoodpolicing.co.uk/
142. imilar indicators and associated guidance has been developed in Scotland and work is under way to integrate
S
these into Single Outcome Agreements.
143. www.hm-treasury.gov.uk/d/pbr_csr07_psa26.pdf
144. In Scotland the Scottish Preventing Violent Extremism Unit is taking forward delivery of equivalent objectives
against the Prevent strategy.
145. J ointly owned by the Home Office, FCO and CLG, the Research, Information and Communications Unit (RICU)
forms part of OSCT; its role is explained further at Section 15.
148. In order to build the resilience where it is most needed, priority establishments are determined by the size of
local Muslim communities.
149. www.everychildmatters.gov.uk/
150. T he Channel Project is a multi-agency approach to support vulnerable individuals. It is a local and community-
based initiative, which utilises existing partnership working between the police, local authority and the local
community. The project takes referrals from a number of sources on individuals that may be vulnerable to
becoming involved in violent extremism. A joint risk assessment of each individual case is then made by project
members and any issues of concern are identified. A programme of intervention tailored to the needs of the
The United Kingdom’s Strategy for Countering International Terrorism Page 172
individual is then developed and implemented. Involvement of community partners is key. They will have
expertise and insight into the process of assessment, referral and intervention.
152. International Centre for the Study of Radicalisation and Political Violence, Recruitment and Mobilisation for the
Islamist Militant Movement in Europe (London: ICSR, King’s College London, 2008), p.52 available at http://
icsr.info/publications/papers/1234516791ICSREUResearchReport_Proof1.pdf
154. http://www.un.org/terrorism/pdfs/wg6-internet_rev1.pdf
155. The National Security Strategy of the United Kingdom: Security in an interdependent world, Cm 7291 (London:
The Stationery Office, 2008) pp.14- and p.15 available at www.official-documents.gov.uk/document/
cm72/7291/7291.pdf
Section 10 – Protect
156. www.cpni.gov.uk
157. www.nactso.gov.uk
158. www.imo.org/Newsroom/mainframe.asp?topic_id=897#what
159. rime Minister’s National Security Statement (14 November 2007) available at www.number10.gov.uk/
P
Page13757
160. www.ukba.homeoffice.gov.uk/sitecontent/documents/managingourborders/Policeandukbaengagement/
161. www.dft.gov.uk/pgr/security/crc/transportreviewsummary
162. www.fco.gov.uk/en/travelling-and-living-overseas/staying-safe/terrorism-abroad
163. ater is a devolved matter in Scotland and Northern Ireland. CPNI is working with the Devolved Administrations
W
of both Scotland and Northern Ireland on all aspects of water security.
164. http://files.homeoffice.gov.uk/police/policing_green_paper.pdf
165. National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report, (Washington
DC: US Government Printing Office 2004), p.389 available at http://govinfo.library.unt.edu/911/
report/911Report.pdf
Section 11 – Prepare
166. ww.skillsforjustice.com/template01.asp?pageid=594 and www.bsi-global.com/en/Assessment-and-
w
certification-services/management-systems/Standards-and-Schemes/BS-25999/
167. www.ukresilience.gov.uk/response/ukgovernment/cgert.aspx
168. www.ukresilience.gov.uk/preparedness/ccact/errpdfs.aspx
169. www.dh.gov.uk/en/Publicationsandstatistics/Publications/PublicationsPolicyAndGuidance/DH_073395
170. The National Security Strategy of the United Kingdom: Security in an interdependent world Cm 7291 (London:
The Stationery Office, 2008) p.42, paragraph 4.59 available at www.official-documents.gov.uk/document/
cm72/7291/7291.pdf
171. www.ukresilience.gov.uk/media/ukresilience/assets/defenceconrtibution1.pdf
172. www.nactso.gov.uk/hotelsandrestaurants.php
173. T he National Security Strategy of the United Kingdom: Security in an interdependent world Cm 7291 (London:
The Stationery Office, 2008), p.43, paragraph 4.61; available at http://www.official-documents.gov.uk/
document/cm72/7291/7291.pdf
174. http://archive.cabinetoffice.gov.uk/pittreview/thepittreview.html
177. Prime Minister’s Speech on the threat of global terrorism (5 March 2004) www.number10.gov.uk/Page5461
180. T he Middle East Media Research Institute (MEMRI), Special Dispatch 1309 (2006) available at www.memri.
org/bin/articles.cgi?Page=subjects&Area=iwmp&ID=SP130906
182. Report of a Committee of Privy Counsellors, Review of Intelligence on Weapons of Mass Destruction (London:
The Stationery Office, 2004), p.29-36 available at www.archive2.official-documents.co.uk/document/deps/hc/
hc898/898.pdf
183. www-ns.iaea.org/security/itdb.htm
184. eport of a Committee of Privy Counsellors, Review of Intelligence on Weapons of Mass Destruction (London:
R
The Stationery Office, 2004), p.17-19 available at www.archive2.official-documents.co.uk/document/deps/hc/
hc898/898.pdf
185. www.berr.gov.uk/whatwedo/energy/non-proliferation/global-threat-reduction/index.html
187. www.defra.gov.uk/gds
189. www.hm-treasury.gov.uk/d/pbr_csr07_psa26.pdf
191. art 1 of the Act applies to Scotland, with the powers it sets out residing with Scottish Ministers in line with the
P
devolution settlement. While civil protection in Scotland is largely a devolved matter and therefore the
responsibility of the Scottish MinistersExecutive, certain responders in Scotland are subject to Part 1 of the
Act. Civil protection in Northern Ireland is largely a devolved matter, with functions being exercised by the
Northern Ireland departments. Some functions are not devolved and are delivered in Northern Ireland by bodies
that fall within the remit of the UK Government.
192. http://security.homeoffice.gov.uk/news-publications/publication-search/general/science-innovation-strategy1
193. www.hmgcc.gov.uk/default.aspx
Printed in the UK for The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office
ID 6072968 03/09 Printed on Paper containing 75% recycled fibre content minimum.
The United Kingdom’s Strategy for Countering International Terrorism Page 174
End notes Page 175
Published by TSO (The Stationery Office) and available from:
Online
www.tsoshop.co.uk
Mail, Telephone Fax & E-Mail
TSO
PO Box 29, Norwich, NR3 1GN
Telephone orders/General enquiries 0870 600 5522
Order through the Parliamentary Hotline Lo-Call 0845 7 023474
Fax orders: 0870 600 5533
E-mail: customer.services@tso.co.uk
Textphone: 0870 240 3701
The Parliamentary Bookshop
12 Bridge Street, Parliament Square,
London SW1A 2JX
Telephone orders/ General enquiries: 020 7219 3890
Fax orders: 020 7219 3866
Email: bookshop@parliament.uk
Internet: http://www.bookshop.parliament.uk
TSO@Blackwell and other Accredited Agents
Customers can also order publications from
TSO Ireland
16 Arthur Street, Belfast BT1 4GD
028 9023 8451 Fax 028 9023 5401
The United Kingdom’s Strategy for Countering International Terrorism Page 176