Review of the Intelligence on the London Terrorist Attacks on 7 July 2005

Total Page:16

File Type:pdf, Size:1020Kb

Review of the Intelligence on the London Terrorist Attacks on 7 July 2005 Intelligence and Security Committee Could 7/7 Have Been Prevented? Review of the Intelligence on the London Published by TSO (The Stationery Office) and available from: Online Terrorist Attacks on 7 July 2005 www.tsoshop.co.uk Mail,Telephone Fax & E-Mail TSO PO Box 29, Norwich, NR3 1GN Telephone orders/General enquiries 0870 600 5522 Order through the Parliamentary Hotline Lo-Call 0845 7 023474 Fax orders: 0870 600 5533 E-mail: [email protected] Chairman: Textphone: 0870 240 3701 The Rt. Hon. Dr Kim Howells, MP The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX Telephone orders/ General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 Email: [email protected] Internet: http://www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from TSO Ireland 16 Arthur Street, Belfast BT1 4GD 028 9023 8451 Fax 028 9023 5401 Intelligence and Security Committee Could 7/7 Have Been Prevented? Review of the Intelligence on the London Terrorist Attacks on 7 July 2005 Chairman: The Rt. Hon. Dr Kim Howells, MP Presented to Parliament by the Prime Minister by Command of Her Majesty May 2009 Cm 7617 £19.15 © Crown copyright 2009 The text in this document (excluding the Royal Arms and other departmental or agency logos) may be reproduced free of charge in any format or medium providing it is reproduced accurately and not used in a misleading context.The material must be acknowledged as Crown copyright and the title of the document specified. Where we have identified any third party copyright material you will need to obtain permission from the copyright holders concerned. For any other use of this material please write to Office of Public Sector Information, Information Policy Team, Kew, Richmond, Surrey TW9 4DU or e-mail: [email protected] ISBN: 978-0-10-176172-7 From: The Chairman, The Rt. Hon. Margaret M. Beckett, MP INTELLIGENCE AND SECURITY COMMITTEE 70 Whitehall, London SW1A 2AS 8 July 2008 Rt. Hon. Gordon Brown, MP Prime Minister 10 Downing Street London SW1A 2AA I enclose the Intelligence and Security Committee’s Review of the Intelligence on the London Terrorist Attacks on 7 July 2005, commissioned last year by your predecessor. Our investigation, which began in May 2007, has taken a considerable time to conclude due to the very detailed nature of our inquiries and the substantial volume of evidence we have reviewed. The Review addresses the many unanswered questions which arose following the conviction of the 2004 fertiliser bomb (CREVICE) plotters. In making our judgements about whether anything was missed or overlooked, we have focused on the information available at the time. The Review contains some highly sensitive intelligence and an unprecedented level of operational detail. As a result, there are some instances where we have agreed that information must be redacted from the published version of the Review in order that individuals are not put in danger, that current operations are not compromised and that our enemies do not learn of the capabilities of the UK’s intelligence and security Agencies. There are also some instances where the courts have ruled that information cannot be published. These redactions have been agreed with the Agencies, the police, the Crown Prosecution Service and government departments. We wish to note that the iii Security Service, the Metropolitan Police Service and West Yorkshire Police not only co-operated fully with our inquiries, but were helpful in seeking to ensure that we could publish as much material as possible and thereby provide the public with as full an account of these matters as possible. Given the seriousness of this issue and the considerable public interest in this Review, we trust that you will publish the Report as soon as possible (subject to the conclusion of certain legal proceedings), and that debates will be held in both Houses of Parliament shortly thereafter. MARGARET M. BECKETT iv From: The Chairman, The Rt. Hon. Dr Kim Howells, MP INTELLIGENCE AND SECURITY COMMITTEE 35 Great Smith Street, London SW1P 3BQ 6 May 2009 Rt. Hon. Gordon Brown, MP Prime Minister 10 Downing Street London SW1A 2AA Further to my predecessor’s letter of 8 July 2008, covering the Committee’s Review of the Intelligence on the London Terrorist Attacks on 7 July 2005, I am writing to provide you with an update. The Review was a complete and thorough investigation of, and report on, the facts as they were known up until July 2008. However, since the Committee sent you the Review there have been further developments in relation to two specific issues covered in the Review. These developments do not affect the central theme of the Review – the links between the CREVICE fertiliser- bomb plotters and the 7/7 bombers – or our overall conclusions. Despite this, we felt that it was important that when the Review was published it was brought up to date. We have therefore produced an “Update” to the Review – enclosed here – which we trust you will publish with it, as an Annex. v The “Update” also explains why the Review could not be published when it was originally sent to you in July 2008. We are aware of the frustration caused by the delay in publishing the Review and consider that it is important that – now that it is possible to do so – the legal reasons for the delay are made public. KIM HOWELLS vi CONTENTS INTRODUCTION ............................................................................................................ 3 Purpose of this Review................................................................................................. 3 Why the Intelligence and Security Committee?........................................................... 3 How we have conducted this Review ........................................................................... 4 How we have written this Report ................................................................................. 5 PART A: WHAT HAPPENED? ........................................................................................ 7 Operation CREVICE.................................................................................................... 7 What happened next? ................................................................................................. 11 PART B: QUESTIONS RAISED.................................................................................... 15 Who were the 7 July bombers? .................................................................................. 15 Had MI5 and the police previously come across any of the bombers? ...................... 16 So when did they first come across the 7 July bombers?........................................... 16 Mohammed Siddique KHAN................................................................................ 16 Shazad TANWEER................................................................................................ 17 Jermaine LINDSAY............................................................................................... 17 Hasib HUSSAIN ................................................................................................... 18 So when did MI5 first come across them in connection with CREVICE?................ 18 When did MI5 first see Mohammed Siddique KHAN and Shazad TANWEER meeting the CREVICE bomb plotters? ...................................................................... 20 Did MI5 see Mohammed Siddique KHAN and Shazad TANWEER meeting Omar KHYAM after they had discovered the bomb plot? ......................................... 21 What did MI5 do about these unidentified men they saw with KHYAM?................. 23 (i) Did they put the men under surveillance? ........................................................ 23 (ii) Did they follow up on the leads they had?....................................................... 24 (iii) So they did have details on Mohammed Siddique KHAN prior to 7/7? ........ 25 (iv) So why did they say they had not identified Mohammed Siddique KHAN?.. 26 Why was UDM E (Mohammed Siddique KHAN) only “desirable”?........................ 27 (i) “Essential” targets............................................................................................. 29 (ii) “Desirable” targets........................................................................................... 29 If MI5 overheard Mohammed Siddique KHAN with the CREVICE group and Mohammed Momin KHAWAJA when they discussed bomb-making in February 2004, surely that should have made him an “essential” target? ................................. 30 But MI5 did hear Mohammed Siddique KHAN talking about operations in Pakistan – should that not have made him an “essential” target? .............................. 32 Nevertheless, surely someone who had been training in Pakistan or Afghanistan should be a serious target for MI5?............................................................................ 37 (i) Two individuals training in Pakistan in 2003.................................................... 37 (ii) An extremist in Afghanistan in the late 1990s................................................. 38 (iii) If MI5 had identified “IBRAHIM” or “Saddique ***” as Mohammed Siddique KHAN, would that have made a difference?................................... 39 1 PART C: WHAT DOES THIS MEAN? .......................................................................... 40 Introduction ...............................................................................................................
Recommended publications
  • 10 Downing Street
    10 DOWNING STREET 8th June, 1981 "ANYONE FOR DENIS?" - SUNDAY, 12TH JULY 1981 AT 7.30 P.M. Thank you so much for your letter of 29th May. I reply to your numbered questions as follows:- Five (the Prime Minister, Mr. Denis Thatcher, Mr. Mark Thatcher, Jane and me.) In addition, there will be two (or possibly three) Special Branch Officers. None of these will be paying for tickets. No. but of course any Cabinet Minister is at liberty . to buy a ticket that evening, like anyone else, if he wishes to do so. I would not feel inclined to include any Opposition Member on the mailing list. No. The Prime Minister wi.11 be glad to have a photocall at 10 Downing Street at 6.45 p.m., when she would hand over cheques to representatives of the N.S.P.C.C. and of Stoke Mandeville. Who will these representatives be, please? The Prime Minister does not agree that Angela Thorne should wear the same outfit. The Prime Minister will be pleased to give a small reception for say sixty people. Would you please submit a list of names? I do not understand in what role it is suggested that Mr. Paul Raymond should attend the reception after the performance. By all means let us have a word about this on the telephone. Ian Gow Michael Dobbs, Esq, 10 DOWNING STREET Q4 Is, i ki t « , s 71 i 1-F Al 4-) 41e. ASO C a lie 0 A-A SAATCHI & SAATCHI GARLAND-CONIPTON LTD , \\ r MD/sap 29th May 1981 I.
    [Show full text]
  • Photography and Photomontage in Landscape and Visual Impact Assessment
    Photography and Photomontage in Landscape and Visual Impact Assessment Landscape Institute Technical Guidance Note Public ConsuDRAFTltation Draft 2018-06-01 To the recipient of this draft guidance The Landscape Institute is keen to hear the views of LI members and non-members alike. We are happy to receive your comments in any form (eg annotated PDF, email with paragraph references ) via email to [email protected] which will be forwarded to the Chair of the working group. Alternatively, members may make comments on Talking Landscape: Topic “Photography and Photomontage Update”. You may provide any comments you consider would be useful, but may wish to use the following as a guide. 1) Do you expect to be able to use this guidance? If not, why not? 2) Please identify anything you consider to be unclear, or needing further explanation or justification. 3) Please identify anything you disagree with and state why. 4) Could the information be better-organised? If so, how? 5) Are there any important points that should be added? 6) Is there anything in the guidance which is not required? 7) Is there any unnecessary duplication? 8) Any other suggeDRAFTstions? Responses to be returned by 29 June 2018. Incidentally, the ##’s are to aid a final check of cross-references before publication. Contents 1 Introduction Appendices 2 Background Methodology App 01 Site equipment 3 Photography App 02 Camera settings - equipment and approaches needed to capture App 03 Dealing with panoramas suitable images App 04 Technical methodology template
    [Show full text]
  • Hacking Affair Is Not Over – but What Would a Second Leveson Inquiry Achieve?
    7/10/2019 Hacking affair is not over – but what would a second Leveson inquiry achieve? Academic rigour, journalistic flair Hacking affair is not over – but what would a second Leveson inquiry achieve? July 25, 2014 3.57pm BST Author John Jewell Director of Undergraduate Studies, School of Journalism, Media and Cultural Studies, Cardiff University On we go. Ian Nicholson/PA In the latest episode in the long-running saga that is the phone hacking affair, Dan Evans, a former journalist at the News of the World and Sunday Mirror, has received a 10 month suspended sentence after being convicted of two counts of phone hacking, one of making illegal payments to officials, and one of perverting the course of justice. Coming so soon after the conviction of Andy Coulson and the acquittal of Rebekah Brooks and others, one could be forgiven for assuming that the whole phone hacking business is now done and dusted. Not a bit of it. As Julian Petley has written: “Eleven more trials are due to take place involving 20 current or former Sun and News of the World journalists, who are accused variously of making illegal payments to public officials, conspiring to intercept voicemail and accessing data on stolen mobile phones.” We also learned in June that Scotland Yard had officially told Rupert Murdoch of their intention to interview him as part of their inquiry into allegations of crime at his British newspapers. The Guardian revealed that Murdoch was first contacted in 2013, but the police ceded to his lawyers’ request that any interrogation should wait until the Coulson–Brooks trial had finished.
    [Show full text]
  • Unauthorised Tapping Into Or Hacking of Mobile Communications
    House of Commons Home Affairs Committee Unauthorised tapping into or hacking of mobile communications Thirteenth Report of Session 2010–12 1. This report is strictly embargoed and is not for broadcast or publication, in any form, before 05.00hrs, Wednesday 20 July 2011. 2. This report is issued under the condition that it should not be forwarded or copied to anyone else. 3. Under no circumstances should you distribute copies to anyone else or speak to the media before the publication time about the content of this report. 4. The report is subject to parliamentary copyright and you are not permitted to distribute, replicate, or publish further copies either in hard copy or on the internet either before or after publication. 5. If these instructions are unclear in any way please contact Alex Paterson on 020 7219 1589 or email [email protected] HC 907 Unauthorised tapping into or hacking of mobile communications 3 House of Commons Home Affairs Committee Unauthorised tapping into or hacking of mobile communications Thirteenth Report of Session 2010–12 Ordered by the House of Commons to be printed 19 July 2011 HC 907 Published on 20 July 2011 by authority of the House of Commons London: The Stationery Office Limited £0.00 The Home Affairs Committee The Home Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Home Office and its associated public bodies. Current membership Rt Hon Keith Vaz MP (Labour, Leicester East) (Chair) Nicola Blackwood MP (Conservative, Oxford West
    [Show full text]
  • Council Decision (Cfsp)
    L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Between Islamization and Secession: the Contest for Northern Mali
    JULY 2012 . VOL 5 . ISSUE 7 Contents Between Islamization and FEATURE ARTICLE 1 Between Islamization and Secession: Secession: The Contest for The Contest for Northern Mali By Derek Henry Flood Northern Mali REPORTS By Derek Henry Flood 6 A Profile of AQAP’s Upper Echelon By Gregory D. Johnsen 9 Taliban Recruiting and Fundraising in Karachi By Zia Ur Rehman 12 A Biography of Rashid Rauf: Al-Qa`ida’s British Operative By Raffaello Pantucci 16 Mexican DTO Influence Extends Deep into United States By Sylvia Longmire 19 Information Wars: Assessing the Social Media Battlefield in Syria By Chris Zambelis 22 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts An Islamist fighter from the Movement for Unity and Jihad in West Africa in the city of Gao on July 16, 2012. - AFP/Getty Images n january 17, 2012, a rebellion 22, disgruntled Malian soldiers upset began in Mali when ethnic about their lack of support staged a coup Tuareg fighters attacked a d’état, overthrowing the democratically Malian army garrison in the elected government of President Amadou Oeastern town of Menaka near the border Toumani Touré. with Niger.1 In the conflict’s early weeks, the ethno-nationalist rebels of the By April 1, all Malian security forces had National Movement for the Liberation evacuated the three northern regions of of Azawad (MNLA)2 cooperated and Kidal, Gao and Timbuktu. They relocated About the CTC Sentinel sometimes collaborated with Islamist to the garrisons of Sévaré, Ségou, and The Combating Terrorism Center is an fighters of Ansar Eddine for as long as as far south as Bamako.4 In response, independent educational and research the divergent movements had a common Ansar Eddine began to aggressively institution based in the Department of Social enemy in the Malian state.3 On March assert itself and allow jihadists from Sciences at the United States Military Academy, regional Islamist organizations to West Point.
    [Show full text]
  • Appellant Mohammad-Momin-Khawaja.Pdf
    File No.: 34103 IN THE SUPREME COURT OF CANADA (On Appeal from the Court of Appeal for Ontario) BETWEEN: MOHAMMAD MOMIN KHA W AJA Appellant (Appellant/Respondent in the Court of Appeal for Ontario) and HER MAJESTY THE QUEEN Respondent (Respondent/Appellant in the Court of Appeal for Ontario) APPELLANT'S FACTUM (Pursuant to Rule 42 of the Rules of the Supreme Court of Canada) Lawrence Greenspon c/o Greenspon, Brown, & Associates 4 70 Somerset Street Ottawa, ON KlR 5J8 Tel: (613) 288-2890 Fax: (613) 288-2896 [email protected] Counsel for Appellant Mr. Nicholas Devlin Brian Saunders/Fran((ois Lacasse c/o Public Prosecution Service of Canada Director of Public Prosecutions of Canada 130 King Street West 284 Wellington Street Suite 3400, Box 36 #2215 Toronto, ON M5X 1K6 Ottawa, ON KIA OH8 Tel: (416) 952-6213 Tel: (613) 957-4770 Fax: (416) 973-8253 Fax: (613) 941-7865 nick.devlin@ppsc-sppc. gc.ca [email protected] Counsel for the Respondent Ottawa Agent for the Respondent Attorney General of Ontario Robert Houston Crown Law Office Burke Robertson 720 Bay Street 70 Gloucester Street 10'h Floor Ottawa, ON K2P OA2 Toronto, ON M5G 2Kl Tel: (416) 326-4636 Tel: (613) 236-9665 Fax: (416) 326-4656 Fax: (613) 236-4430 Counsel for Intervener Ottawa Agent for Intervener File No.: 34103 IN THE SUPREME COURT OF CANADA (On Appeal from the Court of Appeal for Ontario) BETWEEN: MOHAMMAD MOMIN KHAW AJA Appellant (Appellant/Respondent in the Court of Appeal for Ontario) and HER MAJESTY THE QUEEN Respondent (Respondent/Appellant in the Court of Appeal for Ontario) APPELLANT'S FACTUM (Pursuant to Rule 42 of the Rules of the Supreme Court of Canada) INDEX Tab Page 1.
    [Show full text]
  • 595 an Empirical Study of Terrorism Prosecutions in Canada
    EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA 595 AN EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA: ELUCIDATING THE ELEMENTS OF THE OFFENCES MICHAEL NESBITT* AND DANA HAGG** It has now been over 15 years since Canada enacted the Anti-Terrorism Act, codifying what we think of today as Canada’s anti-terrorism criminal laws. The authors set out to canvass how these provisions have been judicially interpreted since their inception through an empirical analysis of court decisions. After exploring how courts have settled initial concerns about these provisions with respect to religious and expressive freedoms, the authors suggest that courts’ interpretations of Canada’s terrorism offences still leave us with many questions, particularly with respect to the facilitation and financing offences. The authors explore these questions and speculate about future challenges that may or may not be successful with the hopes of providing guidance to prosecutors and defence lawyers working in this area. TABLE OF CONTENTS I. INTRODUCTION ............................................. 595 II. TERRORISM PROSECUTIONS TO DATE ............................ 599 III. JUDICIAL INTERPRETATIONS OF THE ELEMENTS OF TERRORISM OFFENCES .................................... 608 A. DEFINITIONS (SECTION 83.01)............................. 608 B. OFFENCES ............................................ 620 IV. CONCLUSIONS AND FUTURE CONSIDERATIONS ....................... 647 I. INTRODUCTION It has now been over 15 years since Canada expeditiously enacted the Anti-Terrorism
    [Show full text]
  • Mapping the Jihadist Threat: the War on Terror Since 9/11
    Campbell • Darsie Mapping the Jihadist Threat A Report of the Aspen Strategy Group 06-016 imeless ideas and values,imeless ideas contemporary dialogue on and open-minded issues. t per understanding in a nonpartisanper understanding and non-ideological setting. f e o e he mission ofhe mission enlightened leadership, foster is to Institute Aspen the d n T io ciat e r p Through seminars, policy programs, initiatives, development and leadership conferences the Institute and its international partners seek to promote the pursuit of the pursuit partners and its international promote seek to the Institute and ground common the ap Mapping the Jihadist Threat: The War on Terror Since 9/11 A Report of the Aspen Strategy Group Kurt M. Campbell, Editor Willow Darsie, Editor u Co-Chairmen Joseph S. Nye, Jr. Brent Scowcroft To obtain additional copies of this report, please contact: The Aspen Institute Fulfillment Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5338 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Aspen Strategy Group Suite 700 One Dupont Circle, NW Washington, DC 20036 Phone: (202) 736-5800 Fax: (202) 467-0790 Copyright © 2006 The Aspen Institute Published in the United States of America 2006 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-456-4 Inv No.: 06-016 CONTENTS DISCUSSANTS AND GUEST EXPERTS . 1 AGENDA . 5 WORKSHOP SCENE SETTER AND DISCUSSION GUIDE Kurt M. Campbell Aspen Strategy Group Workshop August 5-10, 2005 .
    [Show full text]
  • Coronavirus: a History of English Lockdown Laws
    BRIEFING PAPER Number 9068, 30 April 2021 Coronavirus: A history of By Jennifer Brown English lockdown laws Esme Kirk-Wade Contents: 1. First national lockdown 2. Minimal lockdown restrictions 3. Reintroducing restrictions 4. Second national lockdown 5. Reintroducing the tier system 6. Third national lockdown 7. The steps out of lockdown www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Coronavirus: A history of English lockdown laws Contents Summary 3 1. First national lockdown (March to July 2020) 6 1.1 Allowing outdoor recreation (early May) 6 1.2 The lockdown shifts to gatherings restrictions (late-May to late-June) 7 2. Minimal lockdown restrictions (July to September 2020) 9 2.1 Higher penalties for illegal raves 10 2.2 Early local restrictions 10 3. Reintroducing restrictions (September to October 2020) 12 3.1 The rule of six 12 3.2 Restrictions on opening hours for hospitality businesses 12 3.3 The first-tier system 13 4. Second national lockdown (November 2020) 14 5. Reintroducing the tier system (December 2020) 15 5.1 Restrictions over the Christmas period 15 6. Third national lockdown (January to March 2021) 19 7. The steps out of lockdown (March 2021 to present) 20 7.1 International travel ban 22 7.2 Powers to disapply restrictions 23 Cover page image copyright: Lockdown laws by Hello I’m Nik. Licensed by Unsplash 3 Commons Library Briefing, 30 April 2021 Summary The UK now has hundreds of laws made in response to the coronavirus pandemic.1 Many of these laws could be described as “lockdown laws”.
    [Show full text]
  • Islamic Radicalization in the Uk: Index of Radicalization
    ISLAMIC RADICALIZATION IN THE UK: INDEX OF RADICALIZATION Anna Wojtowicz, (Research Assistant, ICT) Sumer 2012 ABSTRACT The purpose of this paper is to analyze the process of radicalization amongst British Muslims in the United Kingdom. It begins with a review of the Muslim population, demographics and community structure. Further presenting several internal and external indicators that influenced and led to radicalization of Muslim youth in Britain. The paper concludes that there is no one certainty for what causes radicalization amongst Muslims in United Kingdom. However, it is certain that Islamic radicalization and the emergence of a homegrown threat is a growing trend that jeopardizes the countries security, peace and stability. Radicalization in the United Kingdom is an existing concern that needs to be addressed and acted upon immediately. Misunderstanding or underestimating the threat may lead to further and long term consequences. * The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 I. Introduction 4 II. Background 5 History of the Muslim Community in the United Kingdom 5 Population 7 Geographical Concentration of Muslims 8 Ethnic Background 10 Age Estimate 11 Occupation and Socio-Economic Conditions 11 Religious and Cultural Aspects 13 Multiculturalism 17 Islamophobia 20 Converts 21 Case Studies –London, Birmingham, Bradford, Leeds, Leicester 22 III. Organizations 28 Organizations within the United Kingdom 28 Mosques, Koranic Schools and Islamic Centers 34 Student Groups 40 Islamic Websites and TV 43 IV. Radicalization in Britain 43 Theoretical Background and Causes of Radicalization 43 Recruitment and Radicalization: Overlook 47 Radicalization Process 49 Forms of Financing 51 Radical Groups and Movements in the UK 53 Influential Leaders in the UK 60 Inspiration and Influence from Abroad 67 Sunni 67 Shia 70 3 V.
    [Show full text]