Effectiveness of the 2010 Beijing Convention And

Total Page:16

File Type:pdf, Size:1020Kb

Effectiveness of the 2010 Beijing Convention And EFFECTIVENESS OF THE 2010 BEIJING CONVENTION AND PROTOCOL IN ADDRESSING AVIATION SECURITY THREATS RAMADHANI ALLY MALETA A THESIS SUBMITTED IN FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF LAWS OF THE OPEN UNIVERSITY OF TANZANIA 2014 ii CERTIFICATION The undersigned do hereby certify that I have read and hereby recommend for acceptance thesis titled: “Effectiveness of the 2010 Beijing Convention and Protocol in Addressing Aviation Security Threats” submitted in fulfillment of the requirements for the Degree of Master of Laws (LL.M.) of the Open University of Tanzania. ………………………………………….. Dr. Paul Faustin Kihwelo (Supervisor) ……………………………….………… Date iii COPYRIGHT No part of this thesis may be reproduced, stored in any retrieval system, or transmitted in any form by any means, electronically, photocopying, recording or otherwise without prior permission of the author or The Open University of Tanzania in that behalf. iv DECLARATION I, Ramadhani Ally Maleta, do hereby declare that, this research work is my own original work, and that it has not been presented to any university for a similar or any other degree award. ………………………………………….. Signature ………………………………………….. Date v DEDICATION Dedicated to my beloved parents, Ally Athumani Maleta and Rukia Mfaume Kawambwa, who brought me up with love and care and; who sacrificed their family’s scarce resources for foundation of my advancement in the academic world. vi ACKNOWLEDGEMENTS My sincere gratitude to my employer, Tanzania Airports Authority whose sponsorship has enabled me pursue this course. I am indeed indebted to my Supervisor, Dr. Paul Faustin Kihwelo (Ph.D.) Senior Lecturer of Law at the Open University of Tanzania for his professional guidance, constructive criticism and brotherly patience which have substantially contributed to modeling this work to the present form. To him I accord the best of his work and whatever deficiencies appearing in this work are mine. I convey my heart-felt thanks to my beloved wife, Salama Ramadhani Uchungu , and beloved children; Faraji, Fatma and Fauziat. By the grace of God they endured the pain of lacking my company, sometimes at critical moments when my company in the family was most needed during the entire period of my study. My extended gratitude is owed to Prof. Dr. Paul Stephen Dempsey, Director of Institute of Air and Space Law at McGill University, Canada, for his learned lectures and reading materials when he taught me an aviation law course on International Air Law: Concept and Applications held at Singapore Aviation Academy (SAA) in May 2010. His teachings had assisted me in having a base on the subject of International Air Law and I used that basic knowledge as a guidance for doing this research. Likewise, I wish to value the contributions from my co-participants of IATA-aviation law course on International Air Law for Lawyers and Legal Professionals, held at Ghana Civil Aviation Academy (GCAA) in November, 2013. The participants are vii aviation lawyers from different countries in Africa hence their comments which based on practical experience were very important for improving this work. Importantly, I appreciate the inputs and wisdom of Mr. Udan P.N. Fulana who was a lecturer of the course in Ghana. Mr. Fulana, being a retired pilot with Royal Air Force in UK and a frequent lecturer on legal issues in air transportation for over 30 years, has agreed to share with me his long practical experience in international air law and hence encouraged me to have this study completed. Finally, I thank all those whose works I have read and referred to in this work and; any other person who in any way contributed to the results of my study. viii ABSTRACT Following the September 11 terrorist attacks in America and the occurrence of other new and emerging threats to civil aviation, the international community has been faced with the harsh reality in the field of aviation security, hence, several legal attempts were made to address such aviation threats. Consequently, the International Civil Aviation Organization (ICAO) in its 37th Diplomatic Conference of 2010 held in Beijing, China, adopted two new international legal instruments namely; Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation (Beijing Convention of 2010) and Protocol Supplementary to the Convention for Suppression of Unlawful Seizure of Aircraft (Beijing Protocol of 2010). This study reviews the historical background to the development of international air law on aviation security and further assesses and analyzes in detail the provisions of the Beijing legal instruments in comparison with the previous treaties. Finally, the key question of whether or not the new Beijing Convention and the Protocol are adequate and effective in combating threats to aviation security is addressed through doctrinal research. In this regard, information was collected from various primary and secondary sources of law including books, articles, conventions, protocols, statutes and internets. Further information was gathered from various aviation stakeholders including aviation experts, security staff, lawyers, passengers, ground handlers, crews, regulators, airline and airport operators. From the information collected, the study comes up with conclusion, observations and recommendations which may be useful in addressing new and emerging threats to aviation security. ix TABLE OF CONTENTS CERTIFICATION ................................................................................................... ii COPYRIGHT.......................................................................................................... iii DECLARATION .................................................................................................... iv DEDICATION ......................................................................................................... v ACKNOWLEDGEMENTS .................................................................................... vi ABSTRACT .......................................................................................................... viii LIST OF CASES ................................................................................................... xiii LIST OF LOCAL STATUTES ............................................................................ xiv LIST OF FOREIGN STATUTES ......................................................................... xv LIST OF INTERNATIONAL INSTRUMENTS ................................................ xvii LIST OF ABREVIATIONS AND ACRONYMS ................................................. xix CHAPTER ONE ...................................................................................................... 1 1.0 GENERAL INTRODUCTION ........................................................................ 1 1.1 Introduction ....................................................................................................... 1 1.2 Background to the Problem ................................................................................ 3 1.3 Statement of the Problem ................................................................................... 5 1.4 Literature Review............................................................................................... 6 1.5 Objective of the Study ...................................................................................... 21 1.6 Research Questions .......................................................................................... 22 1.7 Significance of the Study ................................................................................. 22 1.8 Methodology .................................................................................................... 22 x CHAPTER TWO ................................................................................................... 25 2.0 GENESIS OF AVIATION SECURITY THREATS ....................................... 25 2.1 Introduction .................................................................................................. 25 2.1.1 Aviation Security ........................................................................................... 25 2.1.2 Aviation Threats ............................................................................................ 26 2.1.3 Terrorism and Aviation Security .................................................................... 27 2.2 Background to Aviation Security Threats ..................................................... 30 2.3 Common Types of Aviation Threats ............................................................. 32 2.3.1 Aircraft Hijackings ....................................................................................... 32 2.3.2 Missile Attacks to Aircraft ............................................................................ 36 2.3.3 Man Portable Air Defense System (MANPADS) .......................................... 39 2.3.4 Extortion ...................................................................................................... 41 2.3.5 Improvised Explosive Devices (IEDs) .......................................................... 43 2.3.6 Notable Plots of Threats To Aviation ............................................................ 44 2.3.7 Other New and Emerging Aviation Threats .................................................. 48 2.3.8 Threats Against Airline Facilities ................................................................... 51 2.3.9 Threats Against Airports ...............................................................................
Recommended publications
  • The Assembly Resolution
    PROVISIONAL EDITION NOVEMBER 2010 RESOLUTIONS ADOPTED BY THE ASSEMBLY ASSEMBLY – 37th SESSION Montréal, 28 September—8 October 2010 INTERNATIONAL CIVIL AVIATION ORGANIZATION Suzanne RESOLUTIONS ADOPTED AT THE 37TH SESSION OF THE ASSEMBLY PROVISIONAL EDITION TABLE OF CONTENTS Resolution Page A37-1 Principles for a code of conduct on the sharing and use of safety information ............... 1 A37-2 Non-disclosure of certain accident and incident records ................................................. 2 A37-3 Protecting information from safety data collection and processing systems in order to improve aviation safety .................................................................................. 3 A37-4 ICAO global planning for safety ...................................................................................... 4 A37-5 The Universal Safety Oversight Audit Programme (USOAP) continuous monitoring approach ........................................................................................................ 7 A37-6 Runway safety .................................................................................................................. 9 A37-7 Comprehensive Regional Implementation Plan for Aviation Safety in Africa ............. 10 A37-8 Regional cooperation and assistance to resolve safety-related deficiencies .................. 12 A37-9 Halon replacement ......................................................................................................... 14 A37-10 Proficiency in the English language used for radiotelephony
    [Show full text]
  • Aircraft Hijacking: Some Domestic and International Responses
    Kentucky Law Journal Volume 59 | Issue 2 Article 3 1970 Aircraft iH jacking: Some Domestic and International Responses John A. Volpe Secretary of Transportation John T. Stewart Jr. Federal Aviation Administration Follow this and additional works at: https://uknowledge.uky.edu/klj Part of the Air and Space Law Commons Right click to open a feedback form in a new tab to let us know how this document benefits you. Recommended Citation Volpe, John A. and Stewart, John T. Jr. (1970) "Aircraft iH jacking: Some Domestic and International Responses," Kentucky Law Journal: Vol. 59 : Iss. 2 , Article 3. Available at: https://uknowledge.uky.edu/klj/vol59/iss2/3 This Article is brought to you for free and open access by the Law Journals at UKnowledge. It has been accepted for inclusion in Kentucky Law Journal by an authorized editor of UKnowledge. For more information, please contact [email protected]. Aircraft Hijacking: Some Domestic and International Responses By JoHN A. VoLPE* and JoHN T. STEwART, Jn. * * Air piracy is one of the gravest problems of our time. From the domestic reactions to the first symptoms of the malady-the detours to Havana in the early 1960's-to the strengthened do- mestic and internationalresponse to the epidemic at the turn of the decade, Secretary Volpe and Mr. Stewart here catalogue a definitive statement of what has been done and what yet must be done to combat air piracy and international blackmail: the legal and scientific devices employed by the U.S. and urged for other countries, and international cooperation such as in the Tokyo Convention, the Hague Conventiont of December, 1970, and the draft conventions remaining on the internationalagenda.
    [Show full text]
  • Full Reservoir Level of 630 Feet
    y k y cm SERO TESTS IN CITY SPIKE IN CHILD LABOUR KAMALA ‘NOT COMPETENT’ About 1,200 samples have been collected Survey finds child labour has increased by a Kamala Harris is “not competent” to be by the RMRC in 2nd round of sero sizeable 105 per cent during lockdown president, says US President Donald Trump tests in 2 days DOWNTOWN | P3 period in West Bengal TWO STATES | P7 INTERNATIONAL | P10 VOLUME 10, ISSUE 149 | www.orissapost.com BHUBANESWAR | SUNDAY, AUGUST 30 | 2020 12 PAGES + SUNDAY POST | `4.00 IRREGULAR by MANJUL NO LOCAL LOCKDOWNS UNLOCK 4.0: States can’t impose any local lockdown outside the containment zones without prior consultation with the Centre AGENCIES Social, aca- The Ministry added that there shall demic, sports, en- be no restriction on inter-state and AMIT SHAH RECOVERS Instead of paying us one lakh to New Delhi, August 29: The Union tertainment, cul- intra-state movement of persons and NEW DELHI: Union Mahanadi tribunal asks publish your book, pay us two lakh to Home Ministry Saturday issued the tural, religious, goods, and no separate permission/ e- Home Minister reject it. It will give you better publicity Unlock 4.0 guidelines under which the political functions permit will be re- Amit Shah has state governments shall not impose and other con- quired for recovered and will states to submit data to any local lockdown outside the con- gregations such move- be discharged tainment zones without prior consul- will be per- ments dur- from the All India Black Panther actor tation with the Central government.
    [Show full text]
  • The Challenges of Migration
    The Centre for Enterprise, Markets and Ethics ENTERPRISE AND VALUES SERIES The Challenges of Migration Andrei Rogobete The Centre for Enterprise, Markets and Ethics We are a think tank based in Oxford that seeks to promote an enterprise, market economy built on ethical foundations. Copyright © 2018, Andrei Rogobete We undertake research on the interface of Christian theology, economics Copyright © 2018: this edition, The Centre for Enterprise, Markets and and business. Ethics Our aim is to argue the case for an economy that generates wealth, The moral rights of the author have been asserted. employment, innovation and enterprise within a framework of calling, All rights reserved. This book or any portion thereof may not be integrity, values and ethical behaviour, leading to the transformation of the reproduced or used in any manner whatsoever without the express written business enterprise and contributing to the relief of poverty. permission of the publisher except for the use of brief quotations in a We publish a range of material, hold events and conferences, undertake book review. research projects and speak and teach in the areas with which we are Scripture quotations are from New Revised Standard Version Bible: concerned. Anglicized Edition, copyright © 1989, 1995 National Council of the We are independent and a registered charity entirely dependent on Churches of Christ in the United States of America. Used by permission. donations for our work. All rights reserved. Our website is www.theceme.org. For further information please
    [Show full text]
  • VULCAN HISTORICAL REVIEW Vol
    THE VULCAN HISTORICAL REVIEW Vol. 16 • 2012 The Vulcan Historical Review Volume 16 • 2012 ______________________________ Chi Omicron Chapter Phi Alpha Theta History Honor Society University of Alabama at Birmingham The Vulcan Historical Review Volume 16 • 2012 Published annually by the Chi Omicron Chapter of Phi Alpha Theta at the University of Alabama at Birmingham 2012 Editorial Staff Executive Editors Beth Hunter and Maya Orr Graphic Designer Jacqueline C. Boohaker Editorial Board Chelsea Baldini Charles Brooks Etheredge Brittany Richards Foust Faculty Advisor Dr. George O. Liber Co-Sponsors The Linney Family Endowment for The Vulcan Historical Review Dr. Carol Z. Garrison, President, UAB Dr. Linda Lucas, Provost, UAB Dr. Suzanne Austin, Vice Provost for Student and Faculty Success, UAB Dr. Bryan Noe, Dean of the Graduate School, UAB Dr. Thomas DiLorenzo, Dean, College of Arts and Sciences, UAB Dr. Rebecca Ann Bach, Associate Dean for Research and Creative Activities in the Humanities and Arts, UAB Dr. Carolyn A. Conley, Chair, Department of History, UAB The Department of History, UAB The Vulcan Historical Review is published annually by the Chi Omicron Chapter (UAB) of Phi Alpha Theta History Honor Society. The journal is completely student-written and student-edited by undergraduate and masters level graduate students at the University of Alabama at Birmingham. ©2012 Chi Omicron Chapter of Phi Alpha Theta History Honor Society, the University of Alabama at Birmingham. All rights reserved. No material may be duplicated or quoted without the expressed written permission of the author. The University of Alabama at Birmingham, its departments, and its organizations disclaim any responsibility for statements, either in fact or opinion, made by contributors.
    [Show full text]
  • Air Transport Industry Analysis Report
    Annual Analyses of the EU Air Transport Market 2016 Final Report March 2017 European Commission Annual Analyses related to the EU Air Transport Market 2016 328131 ITD ITA 1 F Annual Analyses of the EU Air Transport Market 2013 Final Report March 2015 Annual Analyses of the EU Air Transport Market 2013 MarchFinal Report 201 7 European Commission European Commission Disclaimer and copyright: This report has been carried out for the Directorate General for Mobility and Transport in the European Commission and expresses the opinion of the organisation undertaking the contract MOVE/E1/5-2010/SI2.579402. These views have not been adopted or in any way approved by the European Commission and should not be relied upon as a statement of the European Commission's or the Mobility and Transport DG's views. The European Commission does not guarantee the accuracy of the information given in the report, nor does it accept responsibility for any use made thereof. Copyright in this report is held by the European Communities. Persons wishing to use the contents of this report (in whole or in part) for purposes other than their personal use are invited to submit a written request to the following address: European Commission - DG MOVE - Library (DM28, 0/36) - B-1049 Brussels e-mail (http://ec.europa.eu/transport/contact/index_en.htm) Mott MacDonald, Mott MacDonald House, 8-10 Sydenham Road, Croydon CR0 2EE, United Kingdom T +44 (0)20 8774 2000 F +44 (0)20 8681 5706 W www.mottmac.com Issue and revision record StandardSta Revision Date Originator Checker Approver Description ndard A 28.03.17 Various K.
    [Show full text]
  • The Urgency of Ratification of the 2010 Beijing Convention Concerning Enforcement of Unlawful Acts Against International Civil Aviation
    E-ISSN 2281-4612 Academic Journal of Interdisciplinary Studies Vol 9 No 2 March 2020 ISSN 2281-3993 www.richtmann.org . Research Article © 2020 Prabandari et.al.. This is an open access article licensed under the Creative Commons Attribution-NonCommercial 4.0 International License (https://creativecommons.org/licenses/by-nc/4.0/) The Urgency of Ratification of the 2010 Beijing Convention Concerning Enforcement of Unlawful Acts against International Civil Aviation Adya Paramita Prabandari Peni Susetyorini Darminto Hartono International Law Department, Faculty of Law, Diponegoro University, Indonesia Doi: 10.36941/ajis-2020-0020 Abstract Aviation is a mass transportation mode that is transnational (across national borders) that has a high level of security and safety. However, the phenomenon of unlawful acts in international civil aviation is a factor that greatly disrupts the security and safety of aviation. As a member of ICAO, Indonesia is responsible for continuing to keep up of developments in international civil aviation arrangements and making them part of national law, which is of course adapted to national interests. However, until now Indonesia has not ratified the 2010 Beijing Convention. The problem that will be discussed in this study is the urgency of the ratification of the 2010 Beijing Convention on the Suppression of Unlawful Acts relating to International Civil Aviation in Indonesia. This research is normative juridical research that uses secondary data as research material. The results show that as an ICAO member state, Indonesia is urged to immediately ratify the 2010 Beijing Convention as a means of providing legal protection, both preventive and repressive. The ratification is also to enforce laws as a manifestation of Indonesia characterization as a state of law.
    [Show full text]
  • APR 2016 Part C.Pdf
    Page | 1 CBRNE-TERRORISM NEWSLETTER – April 2016 www.cbrne-terrorism-newsletter.com Page | 2 CBRNE-TERRORISM NEWSLETTER – April 2016 After Brussels, Europe's intelligence woes revealed Source:http://www.cnbc.com/2016/03/22/brussels-attack-why-europe-must-increase-terror- intelligence.html Mar 23 – Europe must improve the regional Rudd's comments are at the crux of a hot- sharing of intelligence to successfully button discourse about the encroachment on combat the rise of homegrown militants, civil liberties should governments ramp up policy experts told CNBC a day after deadly surveillance and detainment tactics in the explosions hit Brussels. global war on terror. Global terrorist organization ISIS claimed Rudd believes it's a necessary cost to bear. responsibility for Tuesday's attacks that killed "This is not a normal set of circumstances, at least 31 people, the latest episode in the we've got to give our men and women in group's campaign of large-scale violence on uniform and in the intelligence services the the international stage. powers necessary to deal with this. This is no Recent offensives in Paris and Jakarta indicate criticism of the Belgian government but a wake- ISIS is increasingly relying on local up call to all of us who wrestle with this fundamentalists, typically trained in ISIS debate." strongholds within the Middle East, to execute Others agree that European officials must suicide bombings and shootings in busy direct more investment to counter-terrorism, metropolitan areas. despite strained finances for most countries in "The key question here is closing the the region. intelligence gap," said Kevin Rudd, former The fact that the perpetrator of December's Prime Minister of Australia and president of the Paris attacks was caught in Belgium four Asia Society Policy Institute.
    [Show full text]
  • Tracing Terrorists: the EU-Canada Agreement in PNR Matters
    Tracing Terrorists: The EU-Canada Agreement in PNR Matters CEPS Special Report/September 2008 Revised version 17.11.2008 Peter Hobbing Abstract Enhancing border security in support of the global ‘war against terrorism’ is very much in vogue these days, in particular as regards the control of air passengers. Seven years after 9/11, this trend is yet unbroken. While the build-up of defences occurs in most cases at the one-sided expense of civil liberties, the EU-Canada Agreement of 2005 is different: quite justly, it holds the reputation of a well-balanced instrument respecting the interests of citizens. Still, instead of serving as a model for future instruments, the Agreement rather runs the risk of being scrapped at the next possible occasion. A close look at the passenger name record (PNR) ‘mainstream’, as embodied by the EU-US branch of transatlantic relations with four Agreements rapidly succeeding between 2004 and 2008, reveals the opposite tendency away from data protection and towards an unconditional tightening of controls. This report undertakes to examine the doubtful benefits of such an approach by assessing the price to pay inter alia for ‘false positive’ mismatches and other collateral damages, while the actual achievement of a higher degree of public security remains very much in the dark, mostly owing to the impossibility of making all borders 100% secure. As a result, no critical reason emerges for taking leave of the good practices established by the EU-Canada instrument. This work was prepared as part of the EU–Canada project – The Changing Landscape of Justice and Home Affairs Cooperation in the European Union and EU–Canada Relations – funded by the European Commission, Directorate-General for External Relations, Relations with the US and Canada.
    [Show full text]
  • Al-QAEDA and the ARYAN NATIONS
    Al-QAEDA AND THE ARYAN NATIONS A FOUCAULDIAN PERSPECTIVE by HUNTER ROSS DELL Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS IN CRIMINOLOGY AND CRIMINAL JUSTICE THE UNIVERSITY OF TEXAS AT ARLINGTON DECEMBER 2006 ACKNOWLEDGEMENTS For my parents, Charles and Virginia Dell, without whose patience and loving support, I would not be who or where I am today. November 10, 2006 ii ABSTRACT AL-QAEDA AND THE ARYAN NATIONS A FOUCALTIAN PERSPECTIVE Publication No. ______ Hunter Ross Dell, M.A. The University of Texas at Arlington, 2006 Supervising Professor: Alejandro del Carmen Using Foucauldian qualitative research methods, this study will compare al- Qaeda and the Aryan Nations for similarities while attempting to uncover new insights from preexisting information. Little or no research had been conducted comparing these two organizations. The underlying theory is that these two organizations share similar rhetoric, enemies and goals and that these similarities will have implications in the fields of politics, law enforcement, education, research and United States national security. iii TABLE OF CONTENTS ACKNOWLEDGEMENTS......................................................................................... ii ABSTRACT ................................................................................................................ iii Chapter 1. INTRODUCTION......................................................................................
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Islamic Radicalization in the Uk: Index of Radicalization
    ISLAMIC RADICALIZATION IN THE UK: INDEX OF RADICALIZATION Anna Wojtowicz, (Research Assistant, ICT) Sumer 2012 ABSTRACT The purpose of this paper is to analyze the process of radicalization amongst British Muslims in the United Kingdom. It begins with a review of the Muslim population, demographics and community structure. Further presenting several internal and external indicators that influenced and led to radicalization of Muslim youth in Britain. The paper concludes that there is no one certainty for what causes radicalization amongst Muslims in United Kingdom. However, it is certain that Islamic radicalization and the emergence of a homegrown threat is a growing trend that jeopardizes the countries security, peace and stability. Radicalization in the United Kingdom is an existing concern that needs to be addressed and acted upon immediately. Misunderstanding or underestimating the threat may lead to further and long term consequences. * The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 I. Introduction 4 II. Background 5 History of the Muslim Community in the United Kingdom 5 Population 7 Geographical Concentration of Muslims 8 Ethnic Background 10 Age Estimate 11 Occupation and Socio-Economic Conditions 11 Religious and Cultural Aspects 13 Multiculturalism 17 Islamophobia 20 Converts 21 Case Studies –London, Birmingham, Bradford, Leeds, Leicester 22 III. Organizations 28 Organizations within the United Kingdom 28 Mosques, Koranic Schools and Islamic Centers 34 Student Groups 40 Islamic Websites and TV 43 IV. Radicalization in Britain 43 Theoretical Background and Causes of Radicalization 43 Recruitment and Radicalization: Overlook 47 Radicalization Process 49 Forms of Financing 51 Radical Groups and Movements in the UK 53 Influential Leaders in the UK 60 Inspiration and Influence from Abroad 67 Sunni 67 Shia 70 3 V.
    [Show full text]