Report on the Intelligence Relating to the Murder of Fusilier Lee Rigby

Total Page:16

File Type:pdf, Size:1020Kb

Report on the Intelligence Relating to the Murder of Fusilier Lee Rigby Intelligence and Security Committee of Parliament Report on the intelligence relating to the murder of Fusilier Lee Rigby Chair: The Rt. Hon. Sir Malcolm Rifkind, MP Presented to Parliament pursuant to section 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 25 November 2014 HC 795 44599_00_HC 795_ISC_book.indb 1 21/11/2014 18:34 © Crown copyright 2014 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence v.2. To view this licence visit www.nationalarchives.gov.uk/doc/open-government-licence/version/2/ or email [email protected] Where third party material has been identified, permission from the respective copyright holder must be sought. This publication is available at www.gov.uk/government/publications Any enquiries regarding this publication should be sent to us at [email protected] Print ISBN 9781474112499 Web ISBN 9781474112505 Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Office ID: 20111405 11/14 Printed on paper containing 75% recycled fibre content minimum. 44599_00_HC 795_ISC_book.indb 2 21/11/2014 18:34 THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT The Rt. Hon. Sir Malcolm Rifkind, MP (Chair) The Rt. Hon. Hazel Blears, MP Mr Mark Field, MP The Rt. Hon. Lord Butler KG GCB CVO The Rt. Hon. George Howarth, MP The Rt. Hon. Sir Menzies Campbell CH CBE QC, MP Dr Julian Lewis, MP The Rt. Hon. Paul Goggins, MP (until January 2014) The Most Hon. The Marquess of Ms Fiona Mactaggart, MP (from May 2014) Lothian QC PC The Intelligence and Security Committee of Parliament (ISC) is a statutory committee of Parliament that has responsibility for oversight of the UK intelligence community. The Committee was originally established by the Intelligence Services Act 1994, and has recently been reformed, and its powers reinforced, by the Justice and Security Act 2013. The Committee oversees the intelligence and security activities of the UK, including the policies, expenditure, administration and operations1 of the Security Service (MI5), the Secret Intelligence Service (MI6) and the Government Communications Headquarters (GCHQ). The Committee also scrutinises the work of other parts of the UK intelligence community, including the Joint Intelligence Organisation and the National Security Secretariat in the Cabinet Office; Defence Intelligence in the Ministry of Defence; and the Office for Security and Counter-Terrorism in the Home Office. The Committee consists of nine Members drawn from both Houses of Parliament. The Chair is elected by its Members. The Members of the Committee are subject to section 1(1)(b) of the Official Secrets Act 1989 and are routinely given access to highly classified material in carrying out their duties. The Committee sets its own agenda and work programme. It takes evidence from Government Ministers, the Heads of the intelligence and security Agencies, officials from the intelligence community, and other witnesses as required. The Committee is supported in its work by an independent Secretariat and an Investigator. It also has access to legal, technical and financial expertise where necessary. The Committee produces an Annual Report on the discharge of its functions. The Committee may also produce Reports on specific investigations. Prior to the Committee publishing its Reports, sensitive material that would damage national security is blanked out (‘redacted’). This is indicated by *** in the text. The intelligence and security Agencies may request the redaction of material in a Report if its publication would damage their work, for example by revealing their targets, methods, sources or operational capabilities. The Committee considers these requests for redaction carefully. The Agencies have to demonstrate clearly how publication of the material in question would be damaging before the Committee agrees to redact it. The Committee aims to ensure that only the minimum of text is redacted from a Report. The Committee believes that it is important that Parliament and the public should be able to see where information had to be redacted. This means that the published Report is the same as the classified version sent to the Prime Minister (albeit with redactions). The Committee also prepares from time to time wholly confidential reports which it submits to the Prime Minister. 1 Subject to the criteria set out in section 2 of the Justice and Security Act 2013. 44599_00_HC 795_ISC_book.indb 3 21/11/2014 18:34 44599_00_HC 795_ISC_book.indb 4 21/11/2014 18:34 CONTENTS INTRODUCTION ........................................................................................................... 1 COULD IT HAVE BEEN PREVENTED? ................................................................... 4 MICHAEL ADEBOLAJO ............................................................................................. 9 OPERATION ASH: FIRST IDENTIFICATION OF ADEBOLAJO .......................... 13 OPERATION ASH: PROSCRIBED ORGANISATIONS .......................................... 16 OPERATION ASH: CLOSURE ................................................................................. 19 Adebolajo on Programme AMAZON ....................................................................... 19 MANAGING LOW LEVEL SUBJECTS OF INTEREST ......................................... 21 Programme AMAZON (2007–2010) ....................................................................... 21 Programme BELAYA and Programme CONGO (2008–2012) ................................ 23 Programme DANUBE (2013 – present) .................................................................. 24 ADEBOLAJO’S ARREST IN KENYA ...................................................................... 25 SIS INVOLVEMENT: OPERATIONAL LEAD ........................................................ 27 ADEBOLAJO’S RETURN TO THE UK: OPERATION BEECH ............................. 30 MI5 actions after his arrest ..................................................................................... 31 Delays in opening an investigation ......................................................................... 33 Operation BEECH .................................................................................................. 34 OPERATION CEDAR: INTENSIVE INVESTIGATION ......................................... 36 Communications data ............................................................................................. 36 Surveillance ............................................................................................................. 37 Agent tasking ........................................................................................................... 37 Liaison with the police ............................................................................................ 37 Further intrusive coverage ...................................................................................... 38 Intelligence gathering operation ............................................................................. 39 Summary of Operation CEDAR .............................................................................. 39 MOVE TO OPERATION DOGWOOD ...................................................................... 40 Technical operation ................................................................................................. 40 WHAT ELSE COULD MI5 HAVE DONE? .............................................................. 42 Security awareness .................................................................................................. 42 ALLEGATIONS OF RECRUITMENT AND HARASSMENT ................................ 44 Allegations of recruitment ....................................................................................... 44 Allegations of harassment ....................................................................................... 45 Assessments of Adebolajo’s mental health .............................................................. 46 OPERATION ELM: POSSIBLE DISRUPTION AND END OF COVERAGE ......... 48 Reinstatement of intrusive coverage........................................................................ 48 Disruption opportunities: violent confrontation and drug dealing ........................ 48 Violent confrontation ............................................................................................... 49 Drug dealing ........................................................................................................... 50 Reduction of intrusive coverage .............................................................................. 51 DEALING WITH RECURRING SUBJECTS OF INTEREST ................................. 52 44599_00_HC 795_ISC_book.indb 5 21/11/2014 18:34 MICHAEL ADEBOWALE ........................................................................................... 55 INITIAL INTELLIGENCE: EXTREMIST MATERIAL ONLINE ........................... 59 Extremist media and Inspire magazine ................................................................... 59 (i) Interest in extremist media ................................................................................. 60 (ii) Engagement with extremist media ..................................................................... 61 OPERATION FIR: DELAYS AND THE DIGINT TEAM ......................................... 62 (i) Time taken to identify Adebowale ......................................................................
Recommended publications
  • The Accounting Information System Performs a Service Function for An
    Global Disclosure of Economics and Business, Volume 3, No 3/2014 ISSN 2305-9168(p); 2307-9592(e) The Problems of Managing Tourism Business in Bangladesh: Causes and Remedial Measures Ferdouse Ara Tuli Senior Lecturer, Faculty of Business, ASA University Bangladesh, Bangladesh ABSTRACT Tourism Business is one of the fastest growing businesses in Bangladesh. It creates ample job opportunities for the unemployed people in Bangladesh. This business has been contributing remarkable to boost-up the economic development in Bangladesh. But the tourism business in Bangladesh has been suffering from the problems of effective management. Thus, this article aims to explore the causes of management problems facing the tourism business in Bangladesh. This article also attempts to provide the remedial measures to overcoming the existing management problems facing the tourism business in Bangladesh. Keywords: Tourism, Business, Employment, Management, Bangladesh JEL Classification Code: M 10; M 12; M 14 INTRODUCTION Bangladesh is a developing country. It is located in the Indian Sub-Continent. The present population of Bangladesh is approximately 16 crore and unemployment rate is 14.2 percent. The various education institutions of Bangladesh are producing thousand-thousand graduates in every year. But these graduates do not get their jobs from the existing job facilities in Bangladesh. Thus, the government and private authorities can take the initiatives to flourish the tourism industry in this country. Many unemployed people may start their career in this industry when it will be developed. As a result, the unemployment rate of this country will be decreasing gradually. In the modern business world, tourism has been considering as the world’s largest and rapid growing industry.
    [Show full text]
  • An Increasingly Undependable Ally Turkey
    Turkey: An Increasingly Undependable Ally April 2015 Task Force Co-Chairs Ambassador Morton Abramowitz Former U.S. Ambassador to Turkey Ambassador Eric Edelman Former U.S. Ambassador to Turkey Task Force Members Henri Barkey Aaron Lobel Bernard L. and Bertha F. Cohen Professor of Internal Relations, Founder and President, America Abroad Lehigh University Media Svante Cornell Alan Makovsky Research Director, Central Asia-Caucasus Institute and Silk Road Former Senior Professional Staff Member, Studies Program House Foreign Affairs Committee Ambassador Paula Dobriansky Admiral (ret.) Gregory Johnson Former Under Secretary of State for Global Affairs Former Commander of U.S. Naval Forces, Europe; Senior Advisor, Bipartisan Policy John Hannah Center Former Assistant for National Security Affairs to the Vice President General (ret.) Charles Wald Halil Karaveli Former Deputy Commander, U.S. European Senior Fellow, Central Asia-Caucasus Institute and Silk Road Command; Bipartisan Policy Center Board Studies Program Member David Kramer Senior Director for Human Rights and Human Freedoms, McCain Institute for International Leadership 2 Foreign Policy Project Staff Blaise Misztal Project Director Jessica Michek Project Assistant ACKNOWLEDGMENTS This report would not have been possible without the substantive contributions of Gareth Jenkins and Svante Cornell. We also gratefully acknowledge the assistance of BPC interns Seyma Akyol, William Spach, and Chloe Barz for their contributions. DISCLAIMER This report is a product of BPC’s National Security Program. The findings expressed herein are those solely of the National Security Program, though no member may be satisfied with every formulation in the report. The report does not necessarily represent the views or opinions of BPC, its founders, or its board of directors.
    [Show full text]
  • The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events
    The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events November 2018 Kim Sadique, James Tangen Anna Perowne Acknowledgements The authors wish to thank all of the participants in this research who provided real insight into this complex area. Researchers: Kim Sadique, Senior Lecturer in Community & Criminal Justice Dr James Tangen, Senior Lecturer (VC2020) in Criminology Anna Perowne, Research Assistant All correspondence about this report should be directed to: Kim Sadique Head of Division of Community and Criminal Justice (Acting) De Montfort University The Gateway, Leicester, LE1 9BH Email: [email protected] | Tel: +44 (0) 116 2577832 To report a hate crime, please contact Tell MAMA Email: [email protected] | Tel: +44 (0) 800 456 1226 www.tellmamauk.org Twitter: @TellMAMAUK Facebook: www.facebook.com/tellmamauk This work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of the license, visit: https://creativecommons.org/licenses/by/4.0/legalcode 1 Contents Foreword ........................................................................................................... 3 Executive Summary .......................................................................................... 4 Recommendations ............................................................................................ 5 Introduction ....................................................................................................... 6 Aims & Objectives .........................................................................................
    [Show full text]
  • Journal of Terrorism Research, Volume 5, Issue 3 (2014)
    ISSN: 2049-7040 This work is licensed under a Creative Commons Attribution 3.0 License. Contents Articles 3 Drones, The US And The New Wars In Africa 3 by Philip Attuquayefio The Central Intelligence Agency’s Armed Remotely Piloted Vehicle-Supported Counter-Insurgency Campaign in Pakistan – a Mission Undermined by Unintended Consequences? 14 by Simon Bennett Human Bombing - A Religious Act 31 by Mohammed Ilyas Entering the Black Hole: The Taliban, Terrorism, and Organised Crime 39 by Matthew D. Phillips, Ph.D. and Emily A. Kamen The Theatre of Cruelty: Dehumanization, Objectification & Abu Ghraib 49 by Christiana Spens Book Review 70 Andrew Silke, et al., (edited by Andrew Silke). Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalisation and Reform.Routledge: Oxon UK, 2014. pp. 282. £28.99. ISBN: 978-0-415- 81038-8. 70 reviewed by Robert W. Hand About JTR 74 JTR, Volume 5, Issue 3 – September 2014 Articles Drones, The US And The New Wars In Africa by Philip Attuquayefio This work is licensed under a Creative Commons Attribution 3.0 License. Introduction ince the early 20th Century, Africa has witnessed varying degrees of subversion from the Mau Mau nationalist campaigners in Kenya in the 1950s to acts by rebel groups in the infamous intrastate wars Sof Sub-Saharan Africa. While the first movement evolved mainly from political acts geared towards the struggle for independence, the latter was mostly evident in attempts to obtain psychological or strategic advantages by combatants in the brutal civil wars of Liberia, Sierra Leone, the African Great Lakes region and a number of such civil war theatres in Africa.
    [Show full text]
  • Day 72 Grenfell Tower Public Inquiry 13 November 2018 (+44)207
    Day 72 Grenfell Tower Public Inquiry 13 November 2018 1 Tuesday, 13 November 2018 1 an incident, and at that point I was neither in 2 (10.00 am) 2 a position to have good communications, neither had 3 SIR MARTIN MOORE-BICK: Good morning, everyone. Welcome to 3 I been properly briefed as I would be at 04.10 when 4 today's hearing. 4 I came in. And also my location in a vehicle on 5 We are going to begin by hearing the rest of 5 a motorway was difficult as well. 6 Commander Jerome's evidence. 6 Q. You say in paragraph 46: 7 MR MILLETT: Good morning, Mr Chairman. Yes, we are. 7 "He briefed me on the nature of the incident, the 8 Can I please call Commander Jerome back. 8 command structure put in place, the resources being 9 NEIL JEROME (continued) 9 deployed, and the current status of the activations 10 Questions by COUNSEL TO THE INQUIRY (continued) 10 initiated on my earlier call." 11 MR MILLETT: Commander, good morning. 11 During that briefing, did he give you any further 12 A. Good morning. 12 new information about the incident? 13 Q. Thank you very much for coming back to us this morning. 13 A. Would it be okay to refer to my notes? 14 A. Thank you. 14 Q. Yes, of course. 15 Q. I am going to turn now to your involvement on the night, 15 A. Thank you. 16 or, rather, to turn back to it. 16 Q. Just so we know what those are, I think you're referring 17 Can I ask you, please, to go to page 13 of your 17 to the Jerome log, which is at MET00023289.
    [Show full text]
  • Transcript – 29Th July 2021
    Day 28 Open Session Jermaine Baker Inquiry- Main Hearings 29 July 2021 1 Thursday, 29 July 2021 1 Q. In terms of command and control, you are an operational 2 (10.00 am) 2 and tactical firearms commander, and you have performed 3 (The Inquiry began in closed session) 3 the role of firearms tactical adviser at all levels of 4 (11.45 am) 4 competence for in excess of 12 years? 5 THE CHAIRMAN: Good afternoon -- no, good morning. 5 A. That is correct, yes. 6 MS BLACKWELL: We are almost in the afternoon, session, sir. 6 Q. You have also been a firearms instructor for the past 7 THE CHAIRMAN: Yes. 7 11 years, conducting firearms training between 8 MS BLACKWELL: May the witness be sworn, please? 8 operational deployments at various ranks prior to taking 9 THE CHAIRMAN: He may. 9 the role of CFI in November 2019? 10 MR PHILIP TAYLOR (sworn) 10 A. That's correct, yes. 11 Questions from MS BLACKWELL 11 Q. In addition to being the MPS CFI, you are also the CFI 12 MS BLACKWELL: Please sit down. 12 responsible for the national explosive method of entry 13 Thank you, is your full name Philip Taylor? 13 and national counter-terrorism specialist firearms 14 A. That's correct, yes. 14 officer network training being delivered across the UK? 15 Q. You are the chief firearms instructor for the 15 A. That's correct, yes. 16 Metropolitan Police Service? 16 Q. Thank you. 17 A. That's correct, yes. 17 In your capacity as the MPS CFI, you are responsible 18 Q.
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • Terrorist Activities Detection Via Social Media Using Big Data Analytics
    International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET) | e-ISSN: 2319-8753, p-ISSN: 2320-6710| www.ijirset.com | Impact Factor: 7.512| || Volume 9, Issue 6, June 2020 || Terrorist Activities Detection via Social Media Using Big Data Analytics 1 2 Manisha Sager , Milind B. Vaidya P.G. Student, Department of Computer Engineering, Amrutvahini Engineering College, Sagamner, Maharashtra, India1 Professor, Department of Computer Engineering, Amrutvahini Engineering College, Sagamner, Maharashtra, India2 ABSTRACT:Social media are perhaps the richest source of human generated text input. Opinions, feedbacks and criticisms provided by internet users reflect attitudes and feelings towards certain topics and issues. The large volume of such information makes it impossible for any group of people to read it. Thus, social media has become an important tool for spreading their opinions and influencing or attracting people in general to join their terrorist activities. Twitter is the most common and simple way to reach many people in a short time. In this paper, focused on the development of a system that can automatically detect terrorism-supporting tweets by real-time analytics using apache spark machine learning framework. Proposed system is entirely dependent on training data and tries to improve accuracy. This system will help to block the terrorist accounts from twitter so that they can’t promote their views or spread fear among ordinary people. KEYWORDS:terrorist activities, text mining, sentiment analysis, social media, machine learning. I. INTRODUCTION Social media, today, plays arguably a very essential part in a life of not only an individual but also in functioning of a government.
    [Show full text]
  • OBJECTS of SENTIMENT: Muslims Testing Sentiment Analysis of Woolwich Murder on Twitter Mosques
    islamexposed animal savages koran murder london edl palestine hdl myjihad cameron killers tlot uk woolwich jihad kenya guilty infowars nwo muslim islam tcot headdesk video leerigby OBJECTS OF SENTIMENT: muslims Testing sentiment analysis of Woolwich murder on Twitter mosques David Moats, Mads Emil Dalsgaard, Jack Keenan, Simeona Petkova, Catherine Somze, Nadia islamophobiaDresscher culpables islamistas muslimimagines breaking terrorism islamists michaeladebolajo bbcnews islamicextremism britain rigby islamic INTRODUCTION Woolwich on Social Media On May 22nd, 2013 two British Muslim converts killed Lee Rigby in what has been called ‘the Woolwich Murder’. According to the Guardian (date here) this was the first UK murder ever to be transmitted ‘live’ on the Internet. Also, according to the Guardian, the Woolwich murder sparked more muted political response than other previous attacks (date here). http://www.thedrum.com/news/2013/05/24/woolwich-mentioned-449360-times-twitter-24-hours- INTRODUCTION Sentiment Analysis and Digital Methods Sentiment analysis implies researcher coys, woolwich, afc, thfc, bnp, splash, gemma, edl, tcot, leerigby, arsenal, demarcated data set: no ‘noise’ flooding, bankrupt, c4news, islam, ff, news, job, endofanera, criminal, benefitsstreet, muslims, cbb, london, priceless, uk, england, nld, pjnet, ukip, bellend, fuckwits, luton, stopnyposthate, universaljobmatch, Is this compatible with Digital Methods? muslim, twisters, fb, facup, lestweforget, nickgriffin, scum, spurs, indeed, winstonchurchill, savebankruptnick, prayfornick, yids, jihad If we get rid of football, or Nick Griffin we might miss connections. QUESTIONS How does the ‘sentiment’ change over time between the murder and the trial? Can we make sentiment object-based? How does sentiment analysis compare to co-word? What else does sentiment analysis detect (bots, controversy)? METHODS 1.
    [Show full text]
  • THE 422 Mps WHO BACKED the MOTION Conservative 1. Bim
    THE 422 MPs WHO BACKED THE MOTION Conservative 1. Bim Afolami 2. Peter Aldous 3. Edward Argar 4. Victoria Atkins 5. Harriett Baldwin 6. Steve Barclay 7. Henry Bellingham 8. Guto Bebb 9. Richard Benyon 10. Paul Beresford 11. Peter Bottomley 12. Andrew Bowie 13. Karen Bradley 14. Steve Brine 15. James Brokenshire 16. Robert Buckland 17. Alex Burghart 18. Alistair Burt 19. Alun Cairns 20. James Cartlidge 21. Alex Chalk 22. Jo Churchill 23. Greg Clark 24. Colin Clark 25. Ken Clarke 26. James Cleverly 27. Thérèse Coffey 28. Alberto Costa 29. Glyn Davies 30. Jonathan Djanogly 31. Leo Docherty 32. Oliver Dowden 33. David Duguid 34. Alan Duncan 35. Philip Dunne 36. Michael Ellis 37. Tobias Ellwood 38. Mark Field 39. Vicky Ford 40. Kevin Foster 41. Lucy Frazer 42. George Freeman 43. Mike Freer 44. Mark Garnier 45. David Gauke 46. Nick Gibb 47. John Glen 48. Robert Goodwill 49. Michael Gove 50. Luke Graham 51. Richard Graham 52. Bill Grant 53. Helen Grant 54. Damian Green 55. Justine Greening 56. Dominic Grieve 57. Sam Gyimah 58. Kirstene Hair 59. Luke Hall 60. Philip Hammond 61. Stephen Hammond 62. Matt Hancock 63. Richard Harrington 64. Simon Hart 65. Oliver Heald 66. Peter Heaton-Jones 67. Damian Hinds 68. Simon Hoare 69. George Hollingbery 70. Kevin Hollinrake 71. Nigel Huddleston 72. Jeremy Hunt 73. Nick Hurd 74. Alister Jack (Teller) 75. Margot James 76. Sajid Javid 77. Robert Jenrick 78. Jo Johnson 79. Andrew Jones 80. Gillian Keegan 81. Seema Kennedy 82. Stephen Kerr 83. Mark Lancaster 84.
    [Show full text]
  • UN Resolutions: Sri Lanka QSD on 5 February 2019
    UN Resolutions: Sri Lanka QSD on 5 February 2019 This briefing identifies relevant reports and useful documents, including recent parliamentary materials and press articles, which may be of assistance to Members in preparing for the following debate: Lord Naseby to ask Her Majesty’s Government following the resignation of the government of the United States from the United Nations Human Rights Council where they co-sponsored with the United Kingdom the Resolution 30/1 in 2015 and Resolution 34/1 in 2017, and given the progress made towards many aspects highlighted in the resolutions, what assessment they have made of whether to annul or withdraw those resolutions. Copies of the materials are available for collection from the Library. Key Information • United Nations Human Rights Council, Resolution 30/1: Promoting Reconciliation, Accountability and Human Rights in Sri Lanka, 14 October 2015; and Resolution 34/1: Promoting Reconciliation, Accountability and Human Rights in Sri Lanka, 3 April 2017 Resolution adopted by the United Nations Human Rights Council which outlines a process for the promotion of reconciliation, accountability and human rights in Sri Lanka, with a further resolution which reaffirms 30/1 and outlines developments made since. • Foreign and Commonwealth Office, ‘Boris Johnson: US Human Rights Council Withdrawal Regrettable’, 19 June 2018; House of Commons, ‘Written Question: Sri Lanka: Human Rights’, 23 October 2018, 179260; and House of Commons, ‘Written Question: Sri Lanka: Human Rights’, 14 January 2019, 205365 Comments by former Foreign Secretary, Boris Johnson, on the US’ withdrawal from the Human Rights Council. Additionally, questions focusing on what actions the Government is taking to assist the implementation of resolutions 30/1 and 34/1 are included, with responses from Mark Field, Minister of State for Asia and the Pacific at the Foreign and Commonwealth Office.
    [Show full text]
  • Download (9MB)
    A University of Sussex PhD thesis Available online via Sussex Research Online: http://sro.sussex.ac.uk/ This thesis is protected by copyright which belongs to the author. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Please visit Sussex Research Online for more information and further details 2018 Behavioural Models for Identifying Authenticity in the Twitter Feeds of UK Members of Parliament A CONTENT ANALYSIS OF UK MPS’ TWEETS BETWEEN 2011 AND 2012; A LONGITUDINAL STUDY MARK MARGARETTEN Mark Stuart Margaretten Submitted for the degree of Doctor of PhilosoPhy at the University of Sussex June 2018 1 Table of Contents TABLE OF CONTENTS ........................................................................................................................ 1 DECLARATION .................................................................................................................................. 4 ACKNOWLEDGMENTS ...................................................................................................................... 5 FIGURES ........................................................................................................................................... 6 TABLES ............................................................................................................................................
    [Show full text]