A Critical Reflection on the Construction of the Cyberterrorist Threat in the United Kingdom of Great Britain and Northern Ireland

Total Page:16

File Type:pdf, Size:1020Kb

A Critical Reflection on the Construction of the Cyberterrorist Threat in the United Kingdom of Great Britain and Northern Ireland i A Critical Reflection on the Construction of the Cyberterrorist Threat in the United Kingdom of Great Britain and Northern Ireland by Gareth Mott Department of Politics and International Relations A thesis submitted in partial fulfilment for the degree of Doctor of Philosophy at Nottingham Trent University April 2018 ii This work is the intellectual property of the author. You may copy up to 5% of this work for private study, or personal, non-commercial research. Any re-use of the information contained within this document should be fully referenced, quoting the author, title, university, degree level and pagination. Queries or requests for any other use, or if a more substantial copy is required, should be directed in the owner(s) of the Intellectual Property Rights. iii iv Acknowledgements This thesis would not have been possible without the scholarship generously provided by the department of Politics and International Relations at Nottingham Trent University. I am extremely grateful to the department, the school, and the university for entrusting me with this funding. Before embarking on this PhD, I devoured several books along the lines of Phillips’s and Pugh’s (1994) How to Get a PhD. This was a bit like typing ailments into a search engine. Some students are lucky with the supervisory teams that they are landed with, others unlucky. I am fortunate to count myself in the very lucky cohort. Thank you, to my supervisory team, Dr Christopher Baker-Beall and Professor Matt Henn. You were instrumental in this project and in providing me a wealth of opportunities and guidance at Nottingham Trent University. I would also like to thank Professor Lee Jarvis, not only for supervising my Master’s dissertation at the University of East Anglia, but additionally for your encouragement in making an application to Nottingham Trent University and guidance in doing so. Had you not advised me of the available scholarship and encouraged me to apply, it is unlikely that I would have embarked on a PhD; I’d probably be selling car insurance! Of course, thanks must be paid to Karen and Richard, my parents, whose patient parenthood I will always be grateful for. Lastly – and I think I can get away with this in a cyber threat thesis! – I would like to thank my ‘88 US IBM Model M keyboard. Your mechanical keys have been irritating housemates and neighbours for years, but the clacks are music to my ears. You have seen me through my A-levels, my Bachelor’s degree, my Master’s degree and, hopefully, my PhD. Someday, I will let you retire. But not quite yet. Let’s write a book together. v A Critical Reflection on the Construction of the Cyberterrorist Threat in the United Kingdom of Great Britain and Northern Ireland Abstract Cyberterrorism has not occurred. Furthermore, the definitional parameters of cyberterrorism have not been conclusively defined by either policymakers or academia. However, in 2010 the threat posed by the terrorist application of cyber weaponry to target British critical national infrastructure became a ‘Tier One’ threat to the UK. This thesis is the first comprehensive mapping and analysis of the official British construction of the threat of cyberterrorism between 12th May 2010 and 24th June 2016. By using interpretive discourse analysis, this thesis identifies ‘strands’ from a comprehensive corpus of policy documents, statements and speeches from Ministers, MPs and Peers. This thesis examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. In addition, this thesis makes novel contributions to the Copenhagen School’s ‘securitisation theory’ framework. Accordingly: this thesis outlines the framework for a ‘tiered’, rather than monolithic audience; refines the ‘temporal’ and ‘spatial’ conditioning of a securitisation with reference to the unique characteristics of cyberterrorism; and lastly, details the way in which popular fiction can be ascribed agency in securitising moves to ‘fill in’ a lack of case studies of threat with gripping vicarious fictional narratives. It is identified that the 2010 British Coalition Government’s classification of cyberterrorism as a ‘Tier One’ threat created a central strand upon which a discursive securitisation was established. Despite the absence of a ‘cyberterrorist’ incident across the period under scrutiny, the securitisation did not recede. The threat posed by cyberterrorism was articulated partially within a ‘New Terrorism’ frame, and it was deemed by Ministers, MPs and Lords to be a threat that was likely to escalate in both severity and possibility over time. A notable finding is the positioning of the securitisation against a particular ‘cyberterrorist’ identity epitomised by social actors using cyberspace, rather than the tangible environments of cyberspace. vi Table of Contents Chapter One: Introduction 1 Introduction 1 Thesis Aims and Research Questions 2 Critical Terrorism Studies 5 Critical Security Studies 9 Defining Cyberterrorism and Cyberspace 13 The Threat of Cyberterrorism 18 Structure of the Thesis 22 Conclusion 26 Chapter Two: Theory 28 Securitisation Theory 28 The Securitisation of Cyberterrorism in Relation 33 To the ‘Traditional’ Framework of Securitisation The ‘Pantomime’ Model of Securitisation 36 Conclusion 47 Chapter Three: Method 49 Interpretive Approaches 49 Discourse and Identity: Some Basics 52 Metaphor and Descriptive Language 59 as Tools of Persuasion in Securitisation Source Acquisition 65 Interpretive Method 69 Conclusion 71 Chapter Four: The Discursive Construction of 73 the Threat of Cyberterrorism to the United Kingdom Cyberterrorism as a ‘Tier One’ Threat to the UK: 74 The National Security Documents vii Beyond the National Security Documents: 77 The Construction of Cyberterrorism as a Tier One Threat Public Perception of the Threat of Cyberterrorism 83 Lessons from the Construction of Cyberterrorism 86 as a Tier One Threat: Anticipatory Security Lessons from the Construction of Cyberterrorism as 90 a Tier One Threat: Legitimising the UK’s Cyber Weaponry Program Conclusion 95 Chapter Five: Cyberterrorism as Temporally 98 Unique Cyberterrorism as a Temporally Unique Threat: 99 ‘New Terrorism’ - Mapping Cyberterrorism as a Temporally Unique Threat: 104 ‘New Terrorism’ - Analysis Cyberterrorism as a Temporally Unique Threat: 108 Escalation of Threat – Mapping Cyberterrorism as a Temporally Unique Threat: 117 Escalation of Threat - Analysis Conclusion 123 Chapter Six: Cyberterrorism as Spatially 125 Unique, and ‘From Fiction to Reality’ Cyberterrorism as a Spatially Unique Threat: 126 ‘Safe Havens’ – Mapping Cyberterrorism as a Spatially Unique Threat: 129 ‘Safe Havens’ – Analysis Cyberterrorism as a Spatially Unique Threat: 134 ‘Physical versus Cyber’ – Mapping Cyberterrorism as a Spatially Unique Threat: 137 ‘Physical versus Cyber’ – Analysis ‘From Fiction to Reality’: The Role of Fantasy, 141 Imagination and Popular Fiction in the Construction of the Cyberterrorist Threat Against the UK viii Conclusion 154 Chapter Seven: Conclusion 156 Findings 157 Pantomime Audience Framework 159 Limitations of the Thesis 161 Future Avenues for Research 164 Final Remarks 168 Reference List 171 1 Chapter One: Introduction Introduction Following the establishment of a functional world-wide-web in 1990, the UK, along with international society at large, has become increasingly interconnected. Worldwide, there are roughly 3.58 billion people who regularly use the services of the world-wide-web (Statista, 2018). In the UK, 89% of adults were been identified as regular users of the internet (ONS, 2017). The number of devices connected to the internet has increased exponentially, and this is a trend set to continue; fuelled by the huge financial and capital investment into IT spending, which totalled $3.7 trillion in 2013 (Whitney, 2013). Consumer demand is also a significant force driving the proliferation of internet access, in part due to innovation that has produced increasing layers of 'killer programs'; computer programs that are highly desirable and perhaps necessary for modern living. Email and browser-based access to the world-wide-web are examples of such 'killer programs', but increasingly these extend beyond computers and mobile phones amidst the expansion of the 'Internet of Things'. Put simply, this ‘Internet of Things’ is the process in which physical objects such as refrigerators, ovens, heating systems and pet feeders can be embedded with electronics and software that permits them to both collect and exchange data, and to be controlled remotely. A study by Cisco has suggested that more than 50 billion 'things' will be connected to the internet by 2020 (Tillman, 2013). The integral value of online services for economic prosperity is clear. Online services are so embedded into the functioning of modern society that any attempt to calculate the true 'value of the internet' would be perfunctory, although tentative figures are offered to contextualise analysis in Chapter Five. However, connectivity does not come without risk. Hacking, a term previously the preserve of students engaging in problem solving or practical jokes – not necessarily in electronic form – globally became increasingly legislated against in the 1980s and 1990s, and some forms of hacking have since constituted a criminal offence, thus integrating 'hacking' into a 'cybercrime' lexicon. As the international economy rapidly became increasingly reliant on internet-mediated connectivity over the course of the 1990s and early 2000s, a
Recommended publications
  • * "What Tech Skills Are Hot for 2006
    Ειδήσεις για την ΑΣΦΑΛΕΙΑ στις ΤΠΕ απ’ όλο τον κόσμο... Δελτίο 91 23 Σεπτέμβρη 2007 UM Software Tools May Key Successful Antiterrorism, Military and Diplomatic Ac- tions, University of Maryland (09/13/07), L. Tune The University of Maryland Institute for Advanced Computer Studies (UMIACS) has deve- loped computer analysis software to provide rapid information on terrorists and the cultural and political climate on the ground in areas of critical interest. The new computer models and databases could help policymakers and military leaders predict the behavior of political, eco- nomic, and social groups. UMIACS director and professor of computer science V. Subrah- manian says US commanders probably knew where Osama bin Laden was, but were unable to capture him because troops on the group did not have enough cultural knowledge to suc- cessfully negotiate with the locals. Subrahmanian says such failures can be avoided if decisi- on makers have access to pertinent data and accurate models of behavior. The software tools developed by Subrahmanian and his colleagues track information on foreign groups in a vari- ety of sources, including news sources, blogs, and online video libraries. The software can al- most instantly search the entire Internet for information and links on a terrorist suspect or ot- her particular person, group, or other topic of interest. Additionally, with help from social scientists at the University of Maryland, UMIACS computer scientists developed methods to obtain rules governing the behaviors of different groups in foreign areas, including about 14,000 rules on Hezbollah alone. Scientists Use the "Dark Web" to Snag Extremists and Terrorists Online National Science Foundation (09/10/07) University of Arizona Artificial Intelligence Lab researchers have created the Dark Web pro- ject with the intention of systematically collecting and analyzing all terrorist-generated con- tent on the Web.
    [Show full text]
  • Xbt.Doc.248.2.Pdf
    MAY 25, 2018 United States District Court Southern District of Florida Miami Division CASE NO. 1:17-CV-60426-UU ALEKSEJ GUBAREV, XBT HOLDING S.A., AND WEBZILLA, INC., PLAINTIFFS, VS BUZZFEED, INC. AND BEN SMITH, DEFENDANTS Expert report of Anthony J. Ferrante FTI Consulting, Inc. 4827-3935-4214v.1 0100812-000009 Table of Contents Table of Contents .............................................................................................................................................. 1 Qualifications ..................................................................................................................................................... 2 Scope of Assignment ......................................................................................................................................... 3 Glossary of Important Terms ............................................................................................................................. 4 Executive Summary ........................................................................................................................................... 7 Methodology ..................................................................................................................................................... 8 Technical Investigation ................................................................................................................................ 8 Investigative Findings .......................................................................................................................................
    [Show full text]
  • Tstable of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ...............................................................................................................................
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Security > Automotive > Blockchain > Virtual and Augmented Reality
    > Security > Automotive > Blockchain > Virtual and Augmented Reality AUGUST 2018 www.computer.org CALL FOR NOMINEES Education Awards Nominations Taylor L. Booth Education Award Computer Science and Engineering Undergraduate Teaching Award A bronze medal and US$5,000 honorarium are awarded for an outstanding record in computer science and engineering A plaque, certificate and a stipend of US$2,000 is education. The individual must meet two or more of the awarded to recognize outstanding contributions to following criteria in the computer science and engineering field: undergraduate education through both teaching and service and for helping to maintain interest, increase the • Achieving recognition as a teacher of renown. visibility of the society, and making a statement about the • Writing an influential text. importance with which we view undergraduate education. • Leading, inspiring or providing significant education content during the creation of a curriculum in the field. The award nomination requires a minimum of three • Inspiring others to a career in computer science and endorsements. engineering education. Two endorsements are required for an award nomination. See the award information at: See the award details at: www.computer.org/web/awards/booth www.computer.org/web/awards/cse-undergrad-teaching Deadline: 1 October 2018 Nomination Site: awards.computer.org r5p77.indd 77 5/9/18 3:30 PM IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Managers, Editorial Content Meghan O’Dell Brian Brannon, Carrie Clark Contributing Staff Publisher Christine Anthony, Lori Cameron, Cathy Martin, Chris Nelson, Robin Baldwin Dennis Taylor, Rebecca Torres, Bonnie Wylie Senior Advertising Coordinator Production & Design Debbie Sims Carmen Flores-Garvey Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society.
    [Show full text]
  • Babushka Egg Concept Book #15 (Amended 1-1-2021)
    Babushka Egg Concept Book #15 (amended 1-1-2021) ***************************************. Babushka Egg Concept Book #15 www.apocalypse2008-2015.com Page 1 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) Basel Dome Window After September 2022 AD - Please read and print before the Web is gone - Pearl # Name Pages 889 Amended Conclusion of the Corona Virus 9 Part 1,2,3,4 Infection 300 The Resurrection Plan 23 Part 1,2,3 of Mankind Why, How & When is the End 270 st 49 of the 21 Century? 242 The Seven Mystery Thunders 62 126 The Population Curve 76 According to the Bible 285 Seven Abomination Changing Christianity 88-92 www.apocalypse2008-2015.com Page 2 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) To my Relatives and Friends Recently many politicized TV stations announced an increase of a deadly Corona-Virus. Perhaps one should study the history of Mankind connected to Prophecy of the Torah-Bible (Rev. 20:12) ending much Life in nature caused by an atheistic hi-tech culture of our civilization. Like the Gospel mentioned five (5) foolish virgins to hear a voice behind a locked door: Truly, I say to you, I do not know you (Matt. 25:1-13), depart from me. (Matt. 25:41) Therefore you might be interested to pass on this information to a friend or pastor since our 21st Century Civilization was predicted to perish. Thus, a few Pearls were amended to reveal the hidden Truth of the Torah- Bible now exposed in Babushka Egg Concept Book #15 with forbidden knowledge forgotten in many Christian churches, synagogues & universities.
    [Show full text]
  • The Elders Call on the World to Wake up to the Threats of Nuclear War and Climate Disaster As They Unveil the 2020 Doomsday Clock
    The Elders call on the world to wake up to the threats of nuclear war and climate disaster as they unveil the 2020 Doomsday Clock WASHINGTON D.C., 23 January 2020 Mary Robinson, Chair of The Elders and former President of Ireland, and Ban Ki-moon, Deputy Chair of The Elders and former United Nations Secretary-General, today joined experts from the Bulletin of Atomic Scientists for the unveiling of the Doomsday Clock in Washington DC, an annual assessment of the existential risks faced by humanity. The Clock’s hands were moved forward to 100 seconds to midnight - the closest to midnight they have been since they were first set in 1947. The decision takes into account the precarious state of nuclear arms controls, the growing threat of climate disaster, and how these can be compounded by disruptive new technologies. “Our planet faces two concurrent existential threats: the climate crisis and nuclear weapons. We are faced by a gathering storm of extinction-level consequences, and time is running out,” Mary Robinson said. The Elders specifically called on President Trump to respond to Russian President Vladimir Putin’s offer to open negotiations on New START, which will expire in February 2021 unless the agreement between Washington and Moscow is extended. Following the termination of the Intermediate-Range Nuclear Forces (INF) Treaty in July 2019, the end of New START would mean there was no remaining arms control treaty in force between the United States and Russia, raising the prospect of a new nuclear arms race. The Elders reiterated their proposals for a “nuclear minimisation”i agenda as the best way of making progress towards complete disarmament by the five Permanent Members of the UN Security Council and all other nuclear powers.
    [Show full text]
  • Hacking for ISIS: the Emergent Cyber Threat Landscape
    Hacking for ISIS: The Emergent Cyber Threat Landscape By Laith Alkhouri, Alex Kassirer, & Allison Nixon April 2016 Hacking For ISIS Contents Click on a title to navigate to the page Introduction ...........................................................................................................................................2 Cyber Caliphate ...................................................................................................................................3 Islamic State Hacking Division .......................................................................................................6 Islamic Cyber Army ............................................................................................................................9 Rabitat Al-Ansar ................................................................................................................................ 12 Sons Caliphate Army ...................................................................................................................... 15 United Cyber Caliphate .................................................................................................................. 17 Techniques, Tactics, & Procedures (TTPs) .............................................................................. 20 The Future of ISIS’s Cyber Capabilities .................................................................................... 24 Conclusion .........................................................................................................................................
    [Show full text]
  • UK Armed Forces Personnel and the Legal Framework for Future Operations
    House of Commons Defence Committee UK Armed Forces Personnel and the Legal Framework for Future Operations Twelfth Report of Session 2013–14 Report, together with formal minutes and written evidence Ordered by the House of Commons to be printed 26 March 2014 HC 931 Published on 2 April 2014 by authority of the House of Commons London: The Stationery Office Limited £17.50 The Defence Committee The Defence Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Ministry of Defence and its associated public bodies. Current membership Rt Hon James Arbuthnot MP (Conservative, North East Hampshire) (Chair) Mr Julian Brazier MP (Conservative, Canterbury) Rt Hon Jeffrey M. Donaldson MP (Democratic Unionist, Lagan Valley) Mr James Gray MP (Conservative, North Wiltshire) Mr Dai Havard MP (Labour, Merthyr Tydfil and Rhymney) Adam Holloway MP (Conservative, Gravesham) Mrs Madeleine Moon MP (Labour, Bridgend) Sir Bob Russell MP (Liberal Democrat, Colchester) Bob Stewart MP (Conservative, Beckenham) Ms Gisela Stuart MP (Labour, Birmingham, Edgbaston) Derek Twigg MP (Labour, Halton) John Woodcock MP (Labour/Co-op, Barrow and Furness) The following Members were also members of the Committee during this inquiry. Thomas Docherty MP (Labour, Dunfermline and West Fife) Penny Mordaunt MP (Conservative, Portsmouth North) Sandra Osborne MP (Labour, Ayr, Carrick and Cumnock) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the internet via www.parliament.uk. Publications The Reports and evidence of the Committee are published by The Stationery Office by Order of the House.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • MINUTES of MEETING of STIRLING COUNCIL Held in the COUNCIL CHAMBERS, OLD VIEWFORTH, STIRLING on THURSDAY 19 JUNE 2008 at 10.00Am
    STIRLING COUNCIL MINUTES of MEETING of STIRLING COUNCIL held in the COUNCIL CHAMBERS, OLD VIEWFORTH, STIRLING on THURSDAY 19 JUNE 2008 at 10.00am. Present: Provost Fergus WOOD (in the Chair) Councillor Neil BENNY Councillor Alasdair MacPHERSON Councillor Alistair BERRILL Councillor Corrie McCHORD Councillor Margaret BRISLEY Councillor Colin O’BRIEN Councillor Ian BROWN Councillor Gerard O’BRIEN (from Councillor Scott FARMER item SC223e) Councillor Tony FFINCH Councillor Paul OWENS Councillor Colin FINLAY Councillor Steven PATERSON Councillor David GOSS Councillor Graham REED Councillor John HENDRY Councillor Andrew SIMPSON Councillor Graham HOUSTON Depute Convenor Jim THOMSON Councillor Graham LAMBIE In Attendance: Jim Boyle, Chief Accountant, Corporate Services Tony Cain, Head of Housing, Environment Services Irene Cavanagh, Chief Social Work Officer & Head of Community Care, Community Services David Cameron, Director of Children’s Services Brian Devlin, Director of Environment Services Claire Dunbar, Committee Officer, Corporate Services Des Friel, Head of Sport, Youth & Support for People Services Janice Hewitt, Director of Community Services Bob Jack, Director of Corporate Services Lyn Kennedy, Community Governance Manager, Corporate Services Fiona Macleod, Head of Governance, Corporate Services (Clerk) Rebecca Maxwell, Assistant Chief Executive Peter Morgan, Services Manager (Planning and Policy), Environment Services Willie Watson, Head of Resources, Corporate Services Keith Yates, Chief Executive Apologies: An apology for absence
    [Show full text]
  • MINUTES of MEETING of STIRLING COUNCIL Held in the COUNCIL CHAMBERS, OLD VIEWFORTH, STIRLING on THURSDAY 19 MAY 2011 at 6.30 Pm
    STIRLING COUNCIL MINUTES of MEETING of STIRLING COUNCIL held in the COUNCIL CHAMBERS, OLD VIEWFORTH, STIRLING on THURSDAY 19 MAY 2011 at 6.30 pm Present: Provost Fergus WOOD (in the Chair) Councillor Neil BENNY Councillor Graham LAMBIE Councillor Alistair BERRILL Councillor Alasdair MacPHERSON Councillor Margaret BRISLEY Councillor Corrie McCHORD Councillor Ian BROWN Councillor Colin O’BRIEN Councillor Callum CAMPBELL Councillor Paul OWENS Councillor Scott FARMER Councillor Steven PATERSON Councillor Tony FFINCH Councillor Graham REED Councillor Colin FINLAY Councillor Andrew SIMPSON Councillor David GOSS Depute Convenor Jim THOMSON Councillor John HENDRY Councillor Violet WEIR Councillor Graham HOUSTON In Attendance: Donald Balsillie, Land Services Team Leader (Countryside), Roads, Transport & Open Space Jim Boyle, Chief Accountant, Finance & Procurement Michael Boyle, Business Support Manager, Education Tony Cain, Head of Housing Claire Dunbar, Committee Officer, Governance Liz Duncan, Acting Solicitor to the Council (Clerk) Lynne Gibbons, Service Manager (Adult Learning & Culture), Communities & Culture Bob Gil, Head of Assets, Property & Facilities Management Les Goodfellow, Head of Roads, Transport & Open Space Janice Hewitt, Assistant Chief Executive (Care, Health & Wellbeing) Bob Jack, Chief Executive Linda Kinney, Assistant Chief Executive (Learning, Empowerment & Citizenship) Rebecca Maxwell, Assistant Chief Executive (Sustainability, Economy & Environment) Katy Oliver, Team Leader (Marketing & Communications), Chief Executive’s
    [Show full text]