ORG’s April and May Global Monthly Security Briefings covered the current status of the al-Qaeda movement, and a loosely related development, the growth of the radical Boko Haram Islamist group in northern Nigeria. Since those briefings, there have been further developments. One issue of current concern relates to recent events in the West African state of Mali. Paul Rogers discusses the current security situation in Mali its context and assesses the implications of a possible foreign military intervention.
Source : Oxford Research Group
Nottinghamshire Police recently decided to settle with an out of court payment in the case of Rizwaan Sabir the student who emailed a copy of the “Al-Qaeda Training manual on the internet.
Mr Sabir was held for a week in police custody as a terror threat and released a week without charge.
The Police have maintained his arrest was necessary and the detention reasonable give the spespected offience. Mr Sabir maintaining that his arrest and detention were unlawful, and amounted to a false imprisonment.
Mr Sabir said he’d emailed his a copy of Al-Quada manual to a friend helping him draft his PHD into counter-terrorism at the University of Nottingham and that the manual was not only on the internet but a fuller version available at the University’s own library or bookshops including Waterstones and W H Smith.
Mr Sabir felt the police over zealously in his arrest, however Nottinghamshire police while apologising for a search of his vehicle in November 2010 deny acting disproportionately in his arrest that the out of court settlement acted as a less expensive apology for the search of his vehicle.
The Manchester Manual is available in the Documents file area now for download, this was the terrorist handbook that was recently discovered in by the Greater Manchester Police and gives details on how Al-Qaeda cells in the UK were told to operate.
It’s contents cover : recruitment, forgery & counterfeiting, apartments & hiding places, secure communication & transportation, military training, cell structure, security plans, espionage, open-source and covert information gathering, recruitment of agents, and resisting imprisonment