Review of Australia's Counter-Terrorism Machinery
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Safeguarding Your Organisation Against Terrorism Financing
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN: 978-1-921241-84-0 © Commonwealth of Australia [2009] This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney-General’s Department, 3-5 National Circuit, Barton ACT 2600 or posted at http://www.ag.gov.au/cca Table of Contents SECTION A: Introduction 3 SECTION B: Best Practice Principles 8 SECTION C: Australia’s international obligations 9 SECTION D: Listed individuals and organisations 10 SECTION E: Legal obligations 14 SECTION F: Due diligence 15 SECTION G: Transparency and accountability 17 M F I N A N C I N G S T T E R R O R I S ATION AGAIN S SAFEGUARDING YOUR ORGANI 1 What does this Guidance mean for Non-Profit Organisations (NPOs)? This Guidance is not a legal document. This Guidance is intended to help NPOs understand their obligations under Australian law. Like all Australian legal and natural persons, Australian NPOs must comply with Australian laws. The Australian Government recognises the vital contribution that NPOs make in Australia and overseas. In minimising the risk of misuse of NPOs, the Australian Government is mindful of the need to not disrupt or discourage legitimate NPO activities. This Guidance is intended to support NPOs to continue their important work. -
Preventative Detention and Covert Search Warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002
Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 NSW Ombudsman NSW Ombudsman Level 24, 580 George Street Sydney NSW 2000 Phone 02 9286 1000 Toll free (outside Sydney Metro Area): 1800 451 524 Facsimile: 02 9283 2911 Telephone typewriter: 02 9264 8050 Website: www.ombo.nsw.gov.au Email [email protected] ISBN 978-1-925061-41-3 © Crown Copyright, NSW Ombudsman, September 2014 This work is copyright, however material from this publication may be copied and published by State or Federal Government Agencies without permission of the Ombudsman on the condition that the meaning of the material is not altered and the NSW Ombudsman is acknowledged as the source of the material. Any other persons or bodies wishing to use material must seek permission. Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 September 2014 NSW Ombudsman Foreword In 2005 the Terrorism (Police Powers) Act 2002 was amended to give police and the NSW Crime Commission special powers to deal with suspected terrorist acts. Under Part 2A, police may apply to the Supreme Court for a preventative detention order to detain a person without charge for up to two weeks, in order to prevent a suspected imminent terrorist act or to preserve evidence of a terrorist act which has occurred. -
Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization
International Journal of Communication 14(2020), 1849–1867 1932–8036/20200005 Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization BRIAN T. HUGHES American University, USA Examinations into the roots of Islamist terrorism have frequently presented the phenomenon as a result of either perverting political–religious epistemologies into distorted, caricatured fundamentalisms, or, alternatively, as a return to form, whereby a pure, root ideology/metaphysic is rediscovered. The former approach reflects a discourse rooted in print media and characterized by logical argumentation, linear chronology, and deference to the text. The latter approach reflects a discourse rooted in modes of secondary orality, which posit a font of ideal essence that precedes expression. The figure of the digitally engaged lone wolf undermines these discourses. His violent extremism appears only Islamically inflected through an accretion of contradictory mediated encounters linking representations of violence, Islam, and the lone wolf himself. This article argues that a new approach and discourse should therefore emerge, specific to the hypertextual and rhizomatic qualities of multiplicity and contradiction that characterize the digitally engaged lone wolf. Keywords: terrorism, extremism, ISIS, Islamophobia, radicalization, discourse, medium theory, hypermedia, affect Scholars have identified successive waves of terrorist tactics and ideological pretexts in both the contemporary Islamist domain (Esposito, 2003b; Kepel, 2002; -
A Decade of Australian Anti-Terror Laws
A DECADE OF AUSTRALIAN ANTI-TERROR LAWS GEORGE WILLIAMS* [This article takes stock of the making of anti-terror laws in Australia since 11 September 2001. First, it catalogues and describes Australia’s record of enacting anti-terror laws since that time. Second, with the benefit of perspective that a decade brings, it draws conclusions and identifies lessons about this body of law for the Australian legal system and the ongoing task of protecting the community from terrorism.] CONTENTS I Introduction ..........................................................................................................1137 II Australia’s Anti-Terror Laws ................................................................................1139 A Number of Federal Anti-Terror Laws ......................................................1140 1 Defining an Anti-Terror Law ......................................................1141 2 How Many Anti-Terror Laws? ....................................................1144 B Scope of Federal Anti-Terror Laws .........................................................1146 1 The Definition of a ‘Terrorist Act’ ..............................................1146 2 Offence of Committing a ‘Terrorist Act’ and Preparatory Offences ......................................................................................1146 3 Proscription Regime ....................................................................1147 4 Financing Offences and Regulation ............................................1147 (a) Offences ..........................................................................1147 -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. -
Submission by the Australian Federal Police Parliamentary Joint
Parliamentary Joint Committee on Intelligence and Security Review of the Australian Citizenship renunciation by conduct and cessation provisions August 2019 Submission by the Australian Federal Police UNCLASSIFIED Contents Contents .............................................................................................................................. 2 Introduction .......................................................................................................................... 3 Terms of Reference ............................................................................................................... 3 Threat Environment ............................................................................................................... 3 Benefit to Law Enforcment ...................................................................................................... 4 Effectiveness in Combatting Terrorism................................................................................... 4 Conclusion ........................................................................................................................... 6 2 UNCLASSIFIED UNCLASSIFIED Introduction The AFP welcomes the request by the Parliamentary Joint Committee on Intelligence and Security to make a submission to the Committee as part of its review of the Australian citizenship renunciation by conduct and cessation provisions. The Committee has requested the AFP comment in particular on the extent to which the citizenship loss provisions have been effective -
A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by the Henry Jackson Society
“WE WILL CONQUER YOUR ROME ” A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “We Will Conquer Your Rome”: A Study of Islamic State Terror Plots in the West By: Robin Simcox ISBN 978-1-909035-22-5 £10.00 where sold All rights reserved Photo credits Islamic State flag: http://www.shutterstock.com/pic-237997351/stock-photo-islamic-state-isis-isil-sunni-jihadist-group-self- proclaimed-as-a-caliphate-it-claims.html?src=csl_recent_image-1 American flag: http://www.istockphoto.com/photo/american-flag-isolated-with-clipping-path-6406148 British flag: https://commons.wikimedia.org/wiki/File:Flag_-_Union_Flag.jpg French flag: http://www.shutterstock.com/dl2_lim.mhtml?id=77864683&size=huge_jpg&src=id “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Robin Simcox www.henryjacksonsociety.org 1 “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Acknowledgments Many thanks to Aram Alaaldin, Michael Ettlinger and Nathaniel Greenwold for their research assistance. About the Author Robin Simcox is a Research Fellow at the Henry Jackson Society, where he works on terrorism and security issues. -
R V Ul-Haque
ARTICLES AXIOMS OF AGGRESSION Counter-terrorism and counter-productivity in Australia WALEED ALY t did not take Australia long to reach for a legislative that ‘[t]he questioning and detention powers which response to the terrorist attacks of September I I, were passed in 2003 by both Houses of Parliament 2001. Within months, the Federal government was have proved important in progressing a number of proposing new anti-terrorism legislation promoting investigations,’ while simultaneously affirming that ‘ASIO whatI has since become a familiar scheme: new species has not yet had to use the detention powers which were of offences relating to a statutorily-defined terrorism, always intended to be used only in the most exceptional and expanded powers for police and the Australian circumstances.’4 Presently, as the British government Security Intelligence Organisation (ASIO) enabling is facing considerable opposition to its proposal to REFERENCES them to detain and question a person who may have extend the available period of detention of terror 1. This ultimately found its expression in July 2002 in the form of the Security information useful in countering a terrorist attack suspects without charge from 28 days to 42, Home Legislation Amendment (Terrorism) Act 2002 — possibly without access to a lawyer for 48 hours.1 Secretary Jacqui Smith’s description of the new limit as (Cth), and a year later in the Australian a ‘safeguard’ to be used in exceptional circumstances Security Intelligence Organisation Legislation Thus began the most dramatic era in Australia’s counter rather than a ‘target’ rings familiarly. All the while Smith Amendment (Terrorism) Act 2003 (Cth). -
Terror in Australia: Investigating the Rhetoric and the Community
SAGE International Terror in Australia: Investigating the rhetoric and the community By Ms. Kayla Dickeson Intern, SAGE International t is the thirteenth anniversary of the fateful September 11 attacks: Prime Minister Tony Abbott announces that the terror threat-level has been raised to I High. One week later, 800 highly-visible police officers raid homes across Sydney and Brisbane (Jabour, 2014), while on the same day Mr Abbott smiles for the camera as he farewells air force personnel leaving for Iraq (Hurst, 2014). Labelled “terrorism events” by a Counter-Terrorism review, the Melbourne stabbing of two police officers and the Martin Place Sydney Siege join the ranks of the Bali bombings, the London train attacks and the US-Libyan embassy attack in a timeline of the post-9/11 era (Australian Government, 2015, p 4). Mr Abbott emotively notes the tragedy of “politically-motivated” attacks on “Australian values” (Griffiths, 2014) – aptly observing that one-third of “terrorism events” have occurred in the six months after raising the terror level (Grattan, 2015). Monday morning, the 23rd of February, 2015 – while introducing new counter- terrorism strategies to toughen immigration laws, remove citizenship, suspend passports and cancel welfare payments of “persons of interest” – Mr Abbott remarks “I’ve often heard western leaders describe Islam as a ‘religion of peace’. I wish more Muslim leaders would say that more often, and mean it” (Lloyd, 2015). Indeed, he is correct: President Barack Obama tells the world his country is not at war with Islam (AJ, 2015); Chancellor Angela Merkel stands with Muslim leaders at public anti- violence rallies (Huggler, 2015); and Foreign Minister Julie Bishop applauds Australian Muslims who are working with the government, community groups and 1 Terror in Australia: Investigating the rhetoric and the community mosques “to keep our people safe” (Medhora, 2015). -
The Virtual Entrepreneurs of the Islamic State
Combating Terrorism Center at West Point Objective • Relevant • Rigorous | March 2017 • Volume 10, Issue 3 FEATURE ARTICLE FEATURE ANALYSIS The Virtual Entrepreneurs The Islamic of the Islamic State State’s War on How the group’s virtual planners threaten the United States Turkey Seamus Hughes and Alexander Meleagrou-Hitchens Ahmet S. Yayla FEATURE ARTICLE 1 The Threat to the United States from the Islamic State’s Virtual Editor in Chief Entrepreneurs Paul Cruickshank Seamus Hughes and Alexander Meleagrou-Hitchens Managing Editor FEATURE ANALYSIS Kristina Hummel 9 The Reina Nightclub Attack and the Islamic State Threat to Turkey Ahmet S. Yayla EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 17 The German Foreign Fighters in Syria and Iraq: The Updated Data and its Implications Lieutenant Colonel Bryan Price, Ph.D. Daniel H. Heinke Director, CTC 23 Australian Jihadism in the Age of the Islamic State Brian Dodwell Andrew Zammit Deputy Director, CTC 31 The Taliban Stones Commission and the Insurgent Windfall from Illegal Mining Matthew C. DuPée CONTACT Combating Terrorism Center U.S. Military Academy In our feature article, Seamus Hughes and Alexander Meleagrou-Hitchens 607 Cullum Road, Lincoln Hall focus on the threat to the United States from the Islamic State’s “virtual entrepreneurs” who have been using social media and encryption applica- West Point, NY 10996 tions to recruit and correspond with sympathizers in the West, encouraging and directing them to Phone: (845) 938-8495 engage in terrorist activity. They find that since 2014, contact with a virtual entrepreneur has been a Email: [email protected] feature of eight terrorist plots in the United States, involving 13 individuals. -
Isis in the West
NEW INTERNATIONAL AMERICA SECURITY PETER BERGEN, COURTNEY SCHUSTER, AND DAVID STERMAN ISIS IN THE WEST THE NEW FACES OF EXTREMISM NOVEMBER 2015 About New America About the International Security Program New America is dedicated to the renewal of American The International Security Program aims to provide politics, prosperity, and purpose in the Digital Age. We evidence-based analysis of some of the thorniest carry out our mission as a nonprofit civic enterprise: an questions facing American policymakers and the public. intellectual venture capital fund, think tank, technology The program is largely focused on South Asia and the laboratory, public forum, and media platform. Our Middle East, al-Qaeda and allied groups, the rise of hallmarks are big ideas, impartial analysis, pragmatic political Islam, the proliferation of weapons of mass policy solutions, technological innovation, next destruction (WMD), homeland security, and the activities generation politics, and creative engagement with broad of U.S. Special Forces and the CIA. The program is also audiences. Find out more at newamerica.org/our-story. examining how warfare is changing because of emerging technologies, such as drones, cyber threats, and space- based weaponry, and asking how the nature and global About The Authors spread of these technologies is likely to change the very definition of what war is. Peter Bergen is a print, television and web journalist, documentary producer and the The authors would like to thank Emily Schneider and author or editor of six books, three of which Justin Lynch for their assistance with this research. were New York Times bestsellers and three of which were named among the best non- fiction books of the year by The Washington Post. -
The Psychogenesis of Terrorism
The Psychogenesis of Terrorism Emily Joy Corner UCL Thesis submitted in fulfilment of the requirements for the Research Degree in Security and Crime Science September, 2016 1 Student Declaration I, Emily Joy Corner confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Signed Name Date 2 Acknowledgements This thesis would never have reached its conclusion without the help of a wide list of people. Not all are mentioned here, as the list is far too long. But there are a few key individuals, who have had a far greater impact, and without them, I would never have managed to tackle the hurdles of the last three years. Firstly, to Paul. I would never have even managed to start this without your support and belief. You have been there every single step of the way, and have given me opportunities I would never have even dreamed of. You kept your word on everything. I am eternally grateful. Oliver, thank you for the inexplicably quick turn-arounds, and for your comments and corrections that only improved the quality of this thesis. Noémie, thank you for the opportunities, discussions, and being the only other person awake even before the sun rose at conferences. To Shane, thank you for the answers to all those ‘quick’ questions. To all the individuals on the projects that I have been exceptionally lucky to work on, I have gained such a wealth of experience working with you. To Paul Hitchen, Paul Betley, and Amy McKee, thank you for the laughs, and the drinks.