A Review of the Effectiveness of the Intelligence Cycle in UK

Total Page:16

File Type:pdf, Size:1020Kb

A Review of the Effectiveness of the Intelligence Cycle in UK Fit to Fight or Unfit for Purpose? A Review of the Effectiveness of the Intelligence Cycle in UK Counter-Terrorism, 2003-2013. By Paul Burke Submitted in partial fulfilment of the requirements for the award of the degree of Professional Doctorate in Policing, Security and Community Safety at London Metropolitan University. Copyright Copyright © 2014 Paul Burke. All rights reserved. The copyright of this thesis rests with the Author. Copies (by any means) either in full, or of extracts, may not be made without prior written consent from the Author. This is the sole work of Paul Burke. This is not a resubmission. Table of Contents Copyright 2 Table of Contents iii List of Tables viii List of Figures ix Abstract xi Acknowledgements xiii Chapter 1 Introduction ................................................................................... 14 1.1 Rationale for study ..................................................................... 14 1.2 Overview of Research ................................................................ 19 1.3 Thesis Question........................................................................... 21 1.4 Guide to Chapters ...................................................................... 21 1.5 Theoretical Framework .............................................................. 25 1.5.1 The Composition of the UK Intelligence Community. 25 1.5.2 How the UK Intelligence machinery functions 30 1.5.3 Legislation and oversight of the UK Intelligence Community 34 Chapter 2 Methodology ................................................................................. 39 2.1 Theoretical Framework and Argument .................................. 39 iii 2.2 Operationalising the Research Question ................................. 40 2.3 Ethical Issues and Problems Encountered .............................. 41 2.4 Literature Review ....................................................................... 44 2.5 Collecting the Raw Data and Methods of Analysis........................................................................................ 54 2.6 Interview structure and interview questions ......................... 55 Chapter 3 Theoretical Framework: Defining Intelligence and Terrorism 60 3.1 Defining Intelligence .................................................................. 61 3.1.1 Intelligence Failures or Intelligence Gaps? 81 3.2 Defining Terrorism ..................................................................... 84 3.3 Problems with terrorism definitions...................................... 103 3.4 Summary.................................................................................... 107 Chapter 4 CONTEST: The UK Counter-Terrorism Policy .................... 111 4.1 PURSUE ..................................................................................... 114 4.1.1 Covert Detection & Investigation 116 4.1.2 Effective Prosecution 125 4.1.3 Non-prosecution Actions 128 4.1.4 Disruption of Terrorist Activities Overseas 133 4.1.5 Capacity Building 136 iv 4.1.6 Inter-Agency Co-ordination 138 4.1.7 SUMMARY 140 4.2 PREVENT .................................................................................. 141 4.2.1 The Ideological Challenge of Terrorism 141 4.2.2 Prevent the Recruitment of Individuals 143 4.2.3 Addressing Radicalisation 146 4.3 PROTECT................................................................................... 156 4.3.1 Critical National Infrastructure 156 4.3.2 Transportation, Border Security and Crowded Places 157 4.3.3 Operation CREVICE – 2004 164 4.3.4 Operation RHYME - 2006 167 4.4 PREPARE ................................................................................... 171 4.4.1 The CBRN Threat 171 4.4.2 Interoperability 174 4.5 Summary.................................................................................... 186 Chapter 5 The Intelligence Cycle ............................................................... 191 5.1 Direction .................................................................................... 193 5.2 Collection ................................................................................... 198 5.3 Collation ..................................................................................... 206 5.4 Evaluation .................................................................................. 211 5.5 Analysis...................................................................................... 217 v 5.6 Dissemination ........................................................................... 223 5.7 Summary.................................................................................... 229 Chapter 6 Strengths and Weaknesses of the Intelligence Cycle .......... 234 6.1 Weaknesses of the Intelligence Cycle .................................... 234 6.1.1 Challenges and vulnerabilities in Intelligence 256 6.1.2 Pathologies of Intelligence Sharing 264 6.2 Strengths of the Intelligence Cycle ......................................... 274 6.3 Summary.................................................................................... 291 Chapter 7 Conclusions ................................................................................. 293 Annex A - Example of a Priority Intelligence Requirement.......................... 304 Annex B - Participant Consent Form ................................................................ 306 Annex C – UN Conventions .............................................................................. 310 Annex D – Example Intelligence Collection Plan ........................................... 312 Annex E –Financial investigation infographic ................................................ 313 Annex F – Example Tear Line Report ............................................................... 314 Annex G - Community Engagement to Counter-Terrorism (Metropolitan Police Authority 2007, sec.G) ........................ 315 Annex H – Relevant Public Authorities – RIPA 2000 .................................... 316 Annex I – The Eight Attributes of Intelligence Excellence, as considered by the U.S. Joint Chiefs of Staff .......................... 319 vi Index 322 Bibliography 324 VITA 357 vii List of Tables Table 1: Categorisation of Intelligence definitions on a Broad-Narrow continuum, according to Davies (2005). 17 Table 2 List of interviewees and their primary agencies 58 Table 3 O’Connor’s Ten Reasons for Intelligence Failures 83 Table 4 Sample of closed databases 210 Table 5 Breakdown of the evaluation variables in the National Intelligence Report (5x5x5) 215 Table 6 Intelligence Analysis Challenges and Vulnerabilities 259 Table 7 Intelligence challenges and vulnerabilities listed by taxonomy 261 viii List of Figures 1 The earliest known version of a printed Intelligence cycle, 1948 15 2 Harfields’ triptych conceptualisation of Intelligence, based on Ratcliffe (2003). 80 3 The CONTEST Strategy 112 4 The relationship between CONTEST and the policing pillars 114 5 Directed surveillance authorisations for law enforcement agencies over past ten years (Rose, 2014:11) 119 6 Intrusive surveillance authorisations over past ten years (Rose, 2014:10) 120 7 Property interference authorisations over past ten years (Rose, 2014:10) 121 8 Charity Commission Counter-Terrorism Strategy: The Four-Strand Approach (2012:8) 132 9 The CHANNEL process (Peters, 2012:15) 153 10 Graph showing number of individuals referred to CHANNEL from 2006-2014 155 11 The INSTINCT concept 163 12 Three phases of Critical Incident Management (College of Policing, 2013) 179 13 Workstreams of the UK Resilience Capabilities Programme 181 14 British Army Intelligence Cycle, circa 1984 192 15 The 6-stage Intelligence Cycle 192 16 Example of a National Intelligence Report (5x5x5) 212 17 Intelligence cycle with single-stage feedback loops 239 18 Intelligence cycle with hand-drawn, multiple-stage feedback loops 240 19 Treverton’s forms of politicisation 242 20 A systems approach to the Intelligence cycle 250 21 Clark's Hierarchy of Models 252 22 Clark’s target-centred view of the Intelligence Process 252 23 Treverton's "Real Intelligence Cycle" 254 ix 24 Engineering and production functions isolated in their own separate functional silos 272 25 The SARA model 277 26 The Intelligence Triosphere 300 x Abstract The Intelligence process has increasingly found itself in the public eye in modern times. The Al Qa’eda attacks against the USA in September 2001 led to a rapid spread of other international terrorist attacks. The invasion of Afghanistan occurred soon afterwards, followed by the invasion of Iraq in 2003. All of this resulted in the Intelligence community and their processes being pushed into the spotlight of the global media. Central to all Intelligence work is the Intelligence cycle, in whatever form it might take. This thesis investigates the effectiveness of the UK’s 6-stage Intelligence cycle in counter-terrorism work. Definitions of two key terms, Intelligence and terrorism are dissected at length, and the merits and shortcomings are outlined. Accusations of Intelligence failure have been levelled at both the UK government and at the country’s law enforcement, Intelligence and security agencies. Intelligence gaps and Intelligence failures will be described, and the differences between these key terms highlighted. All counter-terrorism work in the UK takes place within the environment of the government’s counter-terror strategy called CONTEST. The six pillars of the strategy are explained, and examples are used to show where Intelligence fits into
Recommended publications
  • House of Lords Official Report
    Vol. 795 Monday No. 239 21 January 2019 PARLIAMENTARYDEBATES (HANSARD) HOUSE OF LORDS OFFICIAL REPORT ORDEROFBUSINESS Questions Television Licences: Over 75s .........................................................................................493 Health: Chief Medical Officer’s Recommendations .......................................................495 Education: English Baccalaureate ..................................................................................498 Brexit: Cross-Channel Transport....................................................................................500 Zimbabwe Private Notice Question ..................................................................................................502 Trade Bill Committee (1st Day)......................................................................................................506 Leaving the European Union Statement........................................................................................................................557 Poverty: Metrics Question for Short Debate...............................................................................................573 Trade Bill Committee (1st Day) (Continued) ................................................................................589 Lords wishing to be supplied with these Daily Reports should give notice to this effect to the Printed Paper Office. No proofs of Daily Reports are provided. Corrections for the bound volume which Lords wish to suggest to the report of their speeches should be clearly
    [Show full text]
  • Introduction
    NOTES Introduction 1. Robert Kagan to George Packer. Cited in Packer’s The Assassin’s Gate: America In Iraq (Faber and Faber, London, 2006): 38. 2. Stefan Halper and Jonathan Clarke, America Alone: The Neoconservatives and the Global Order (Cambridge University Press, Cambridge, 2004): 9. 3. Critiques of the war on terror and its origins include Gary Dorrien, Imperial Designs: Neoconservatism and the New Pax Americana (Routledge, New York and London, 2004); Francis Fukuyama, After the Neocons: America At the Crossroads (Profile Books, London, 2006); Ira Chernus, Monsters to Destroy: The Neoconservative War on Terror and Sin (Paradigm Publishers, Boulder, CO and London, 2006); and Jacob Heilbrunn, They Knew They Were Right: The Rise of the Neocons (Doubleday, New York, 2008). 4. A report of the PNAC, Rebuilding America’s Defenses: Strategy, Forces and Resources for a New Century, September 2000: 76. URL: http:// www.newamericancentury.org/RebuildingAmericasDefenses.pdf (15 January 2009). 5. On the first generation on Cold War neoconservatives, which has been covered far more extensively than the second, see Gary Dorrien, The Neoconservative Mind: Politics, Culture and the War of Ideology (Temple University Press, Philadelphia, 1993); Peter Steinfels, The Neoconservatives: The Men Who Are Changing America’s Politics (Simon and Schuster, New York, 1979); Murray Friedman, The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy (Cambridge University Press, New York, 2005); Murray Friedman ed. Commentary in American Life (Temple University Press, Philadelphia, 2005); Mark Gerson, The Neoconservative Vision: From the Cold War to the Culture Wars (Madison Books, Lanham MD; New York; Oxford, 1997); and Maria Ryan, “Neoconservative Intellectuals and the Limitations of Governing: The Reagan Administration and the Demise of the Cold War,” Comparative American Studies, Vol.
    [Show full text]
  • Warrior, Philosopher, Child: Who Are the Heroes of the Chechen Wars?
    Warrior, Philosopher, Child: Who are the Heroes of the Chechen Wars? Historians distinguish between the two Chechen wars, first in 1994-1995 under Yeltsin’s presidency, and second in 1999-2000, when Vladimir Putin became the Prime Minister of Russia and was mainly responsible for military decision-making. The first one was the result of the Soviet Union dissolution, when Chechnya wanted to assert its independence on the Russian Federation. The second one started with the invasion of Dagestan by Shamil Basaev’s terrorist groups, and bombings in Moscow, Volgodonsk and the Dagestani town Buynaksk. It remains unclear what exactly led to a Russian massive air-campaign over Chechnya in 1999. Putin declared the authority of Chechen President Aslan Maskhadov and his parliament illegitimate, and Russians started a land invasion. In May 2000, Putin established direct rule of Chechnya. However, guerrilla war never stopped. Up to now there has been local ongoing low-level insurgency against Ramzan Kadyrov, the Head of the Chechen Republic. Who was drafted to fight in the Chechen Wars? Mainly, young people from neighbouring regions of Russia, who were poorly trained. Russian troops suffered severe losses, since they were ill-prepared. Because of lack of training and experience, Russian forces often attacked random positions, causing enormous casualties among the Chechen and Russian civilian population. The Russian-Chechen Friendship Society set their estimate of the total death toll in two wars at about 150,000 to 200,000 civilians1. If the first war received extensive international coverage, the second got considerably 1 Wikipedia. Retrieved March 30, 2017 from: https://en.wikipedia.org/wiki/Second_Chechen_War.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • Churchill Activities B1
    Churchill Activities B1 Pre-reading Activities Activity A. 1. Find the odd man out. In each list, circle the name of the person who is different. a. George Washington l Abraham Lincoln l Franklin D. Roosevelt l Jack London l George Bush l Barack Obama b. Benedict Cumberbatch l Emma Watson l Daniel Craig l Daniel Radcliffe l Keira Knightley l Elvis Presley c. Margaret Thatcher l John Lennon l Neville Chamberlain l Tony Blair l Theresa May l David Cameron d. James Dean l Scarlett Johannsson l Denzel Washington l Marilyn Monroe l Beyoncé l Leonardo Di Caprio 2. Choose a title for each list British Kings l American singers l British Prime Ministers l American actors British writers l American Presidents l American poets l British actors. a. ___________________________________________________________________________________ b. ___________________________________________________________________________________ c. ___________________________________________________________________________________ d. ___________________________________________________________________________________ www.speakeasy-news.com - January 2018 B1 Churchill |1| 3. This man is Winston Churchill. Which category from A.2. does he belong to? ___________________________________ 4. Now write a sentence. To choose the tense you have to know if he is dead or alive. To find the information log onto http://www.bbc.co.uk/schools/primaryhistory/famouspeople/winston_churchill a. Which information helped you? ______________________________________________________________ b. So, which
    [Show full text]
  • ISIS: a Product of the United States' Quest for the Neoconservative Identity
    Trinity College Trinity College Digital Repository Senior Theses and Projects Student Scholarship Spring 2016 ISIS: A Product of the United States' Quest for the Neoconservative Identity Christopher White Trinity College, Hartford Connecticut, [email protected] Follow this and additional works at: https://digitalrepository.trincoll.edu/theses Part of the International Relations Commons Recommended Citation White, Christopher, "ISIS: A Product of the United States' Quest for the Neoconservative Identity". Senior Theses, Trinity College, Hartford, CT 2016. Trinity College Digital Repository, https://digitalrepository.trincoll.edu/theses/535 ISIS: A Product of the United States’ Quest for the Neoconservative Identity Christopher White Trinity College—Hartford, CT Class of 2016 1 Table of Contents: Introduction: pg 3 Ch 1: Four Theses on the Role of the United States Within the International Order pg 5 Ch 2: America and the Iran-Iraq War (1982-1988): the Development of the Four Theses of America’s International Position? pg 21 Ch 3: A New International Order: The Gulf War and the Changing Role of the Untied States in the Post Cold War Security Environment pg 45 Interlude: President Clinton—Continuing an American Tradition in Iraq pg 74 Ch 4: The Invasion of Iraq 2003: Resuming the Neoconservative Tradition of American Foreign Policy in the Middle East pg 81 Conclusion: The Threat of ISIS—A Product of the Long Tradition of Neoconservatism and the American Identity in Iraq pg 100 2 Introduction Today the United States is engaged in a war against the Islamic State in Iraq and Syria (ISIS). The Islamic extremist group poses real life threats to people all over the world.
    [Show full text]
  • Theresa May's New Third Way | the Spectator
    Theresa Mayʼs new third way | The Spectator 10/25/18, 1251 PM Theresa May's new third way The Prime Minister is trying to steer a path between globalism and nationalism James Forsyth Forget left and right — the new divide in politics is between nationalists and globalists. Donald Trump’s team believe that he won because he was the America First candidate, defying the old rules of politics. His nationalist rhetoric on everything from trade to global security enabled him to flip traditionally Democratic, blue-collar states and so to defeat that personification of the post-war global order, Hillary Clinton. The presidential election in France is being fought on these lines, too. Marine Le Pen is the nationalist candidate, a hybrid of the hard right and the far left. She talks of quitting https://www.spectator.co.uk/2017/02/theresa-mays-new-third-way/ Page 1 of 7 Theresa Mayʼs new third way | The Spectator 10/25/18, 1251 PM the European single currency and of bringing immigration down to 10,000 a year, while cursing international capitalism with an almost socialist fervour. Her likely second round opponent, the ex-finance minister Emmanuel Macron (profiled on p. 12), is the globalist candidate: a former Rothschild banker who believes in a eurozone budget, the Schengen borderless area and the need for France to deregulate. James Forsyth and Fraser Nelson discuss the new Third Way: Theresa May’s strategy is designed for a nationalist vs globalist era. Her response isn’t to embrace either extreme, but to try to chart a third way between them.
    [Show full text]
  • Nationalism and Ethnic Politics Book Reviews
    This article was downloaded by: [University College London] On: 29 December 2009 Access details: Access Details: [subscription number 772858957] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37- 41 Mortimer Street, London W1T 3JH, UK Nationalism and Ethnic Politics Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713636289 Book reviews To cite this Article (2003) 'Book reviews', Nationalism and Ethnic Politics, 9: 2, 128 — 148 To link to this Article: DOI: 10.1080/13537110412331301445 URL: http://dx.doi.org/10.1080/13537110412331301445 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. 92nep06.qxd 27/10/2003 09:21 Page 128 Book Reviews rank K. Salter (ed.). Risky Transactions: Trust, Kinship and Ethnicity. New York and Oxford: Berghahn Books, 2002.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Fiscal Year 2009 Department of Defense Office of the Inspector
    Department of Defense Office of the Inspector General Financial Statement Audit Fiscal Year 2009 Submitted by ACUITY CONSULTING, INC. 333 North Fairfax Street, Suite 401 Alexandria, VA 22314 Table of Contents Management Discussion and Analysis ............................................................................ 1 I. Background ............................................................................................................. 1 II. Mission Statement ................................................................................................... 1 III. Vision Statement ..................................................................................................... 1 IV. Core Values ............................................................................................................. 1 V. Organization ............................................................................................................ 1 VI. Budgetary and Financial Aspects ........................................................................... 7 VII. Systems, Controls, and Legal Compliance ............................................................. 8 VIII. Performance Goals and Objectives ......................................................................... 9 IX. Results ................................................................................................................... 11 Financial Statements ....................................................................................................... 27 Notes to
    [Show full text]
  • Governmental Responses to the Riots
    placing such funding as remains in the hands of elected Police and Governmental responses Crime Commissioners (PCCs) to do with as they, or their political to the riots constituency, sees fit. But if the voters are not too worried about gangs, Harry Angel discusses the government’s because their violence is confined to a handful of down-at-heel housing main policy strategy to date estates, but want to see ‘travellers’ evicted from a local beauty spot, localism will trump the government’s gang strategy. ovember 2011 saw the clear that: publication of Ending Gang It’s a family affair Nand Youth Violence: A Across the ten forces where the Unsurprisingly, given the ideological Cross-Government Report (HM disorder was most prevalent persuasion of the Conservative-led Government, 2011). This document a total of 417 arrestees during Coalition, the punchline of Ending is based, in part, upon the the period of the disorder were Gang and Youth Violence is ‘the deliberations of a rapidly convened reported to be affiliated to a family’. To oversimplify, but only International Forum on Gangs gang – 13 per cent of the total. slightly, it seems that the problem chaired by Theresa May and Iain For forces outside London, the of violent, drug-dealing, youth Duncan Smith in October 2011. majority recorded fewer than 10 gangs is ultimately reducible to the Clearly, this event was planned when per cent of all arrestees being ‘troubled family’. If, by dint of a David Cameron and his advisers still identified as gang members. concerted, long term effort, we can believed that the August riots were solve this problem, then the problem orchestrated by violent youth gangs.
    [Show full text]
  • Full Text of the Speech by Prime Minister Theresa May
    Full text of the speech by Prime Minister Theresa May "A little over six months ago, the British people voted for change. They voted to shape a brighter future for our country. They voted to leave the European Union and embrace the world. And they did so with their eyes open: accepting that the road ahead will be uncertain at times, but believing that it leads towards a brighter future for their children - and their grandchildren too. And it is the job of this Government to deliver it. That means more than negotiating our new relationship with the EU. It means taking the opportunity of this great moment of national change to step back and ask ourselves what kind of country we want to be. My answer is clear. I want this United Kingdom to emerge from this period of change stronger, fairer, more united and more outward-looking than ever before. I want us to be a secure, prosperous, tolerant country - a magnet for international talent and a home to the pioneers and innovators who will shape the world ahead. I want us to be a truly Global Britain - the best friend and neighbour to our European partners, but a country that reaches beyond the borders of Europe too. A country that goes out into the world to build relationships with old friends and new allies alike. I want Britain to be what we have the potential, talent and ambition to be. A great, global trading nation that is respected around the world and strong, confident and united at home.
    [Show full text]