Review of Australia's Counter-Terrorism Machinery

Total Page:16

File Type:pdf, Size:1020Kb

Review of Australia's Counter-Terrorism Machinery © Commonwealth of Australia 2015 ISBN 978-1-925237-36-8 (Hardcopy) ISBN 978-1-925237-37-5 (PDF) ISBN 978-1-925237-38-2 (DOC) Ownership of intellectual property rights in this publication Unless otherwise noted, copyright (and any other intellectual property rights, if any) in this publication is owned by the Commonwealth of Australia (referred to below as the Commonwealth). Creative Commons licence With the exception of the Coat of Arms, this publication is licensed under a Creative Commons Attribution 3.0 Australia Licence. Creative Commons Attribution 3.0 Australia Licence is a standard form license agreement that allows you to copy, distribute, transmit and adapt this publication provided that you attribute the work. A summary of the licence terms is available from http://creativecommons.org/licenses/by/3.0/au/deed.en. The full licence terms are available from http://creativecommons.org/licenses/by/3.0/au/legalcode. The Commonwealth’s preference is that you attribute this publication (and any material sourced from it) using the following wording: Source: Licensed from the Commonwealth of Australia under a Creative Commons Attribution 3.0 Australia Licence. The Commonwealth of Australia does not necessarily endorse the content of this publication. Use of the Coat of Arms The terms under which the Coat of Arms can be used are set out on the Department of the Prime Minister and Cabinet website (see http://www.dpmc.gov.au/guidelines/). Contents EXECUTIVE SUMMARY iv RECOMMENDATIONS vi PART ONE: THE STATE OF PLAY 1 One: Australia – Our Evolving Approach To Countering Terrorism 2 Two: The Threat Environment 10 Three: Performance Of Australia’s Counter-Terrorism Arrangements 14 PART TWO: OUR RESPONSE 21 Four: Leadership And Coordination 22 Five: Countering Violent Extremism 30 Six: Resourcing Pressures 36 Seven: National Terrorism Advisories 43 ANNEX: ABBREVIATIONS 48 REVIEW OF AUSTRALIA’S COUNTER-TERRORISM MACHINERY Executive Summary • There are an increasing number of Review of the Commonwealth’s Australians joining extremist groups counter-terrorism arrangements overseas. The Commonwealth has strong, well-coordinated • There are an increasing number of potential counter-terrorism (CT) arrangements. Overall, terrorists, supporters and sympathisers in these have been quite successful – although the our community. Martin Place siege and the stabbing of police in • There is a trend to low-tech ‘lone actor’ Melbourne raise questions. attacks which are exponentially harder to disrupt: there may be no visibility of • Many plots – some quite major – have been planning and no time delay between intent disrupted. and action. • There have been 35 prosecutions and 26 • There is now an intergenerational convictions. dimension, with the families of known • There has been no large scale terrorist terrorists increasingly radicalised and attack on Australian soil in the post-2001 involved. period. The three fatalities within this period • The international forces driving terrorist all happened in the Martin Place siege. ideology and capabilities are stronger, and The two terrorist attacks in that period – the extremist narratives have increasing appeal stabbing of two policemen in Melbourne and the in the Australian community. Martin Place siege with its two tragic victims – were • Terrorists are using sophisticated carried out by individuals who planned and acted technologies and methodologies to stay alone. Crimes planned like this are, by nature, under the radar. always extremely difficult for police and security agencies to prevent. • Terrorists are now adept at exploiting social media to distribute polished propaganda In the years since 11 September 2001: products. Reflecting this environment, there is an increasing • many more departments and agencies requirement for early disruption of terrorist plans to have been drawn into the CT effort. best ensure public safety. This comes at the cost of Coordination is better than ever securing sufficient evidence to prosecute. • new legislation has been progressively introduced to provide the legal tools to • This leaves potential terrorists at large. It prosecute terrorists and better disrupt also erodes trust, confidence and support to terrorism relationships with at-risk communities. It may also undermine public confidence in • modest efforts to counter violent extremist national security agencies and the ideology and to promote community Government generally. cohesion are now underway. Winning many battles – but not the war The rising tide of terrorism Despite improvements in CT capability, a terrorist The threat of terrorism in Australia is rising and it is attack is possible. All of the terrorism-related becoming harder to combat. metrics are worsening: known numbers of foreign fighters, sympathisers and supporters, serious investigations. We are not ‘winning’ on any front. iv | DEPARTMENT OF THE PRIME MINISTER AND CABINET REVIEW OF AUSTRALIA’S COUNTER-TERRORISM MACHINERY The Martin Place siege and the Melbourne attack 7. strengthen further cross-agency leadership on police are examples of a global trend: we face and coordination by designating a National CT an increasing number of potential terrorists who are Coordinator as the Government’s leading hard to detect and often willing to attack using advisor on CT quickly implemented, low-tech tactics. 8. develop a COAG strategy to counter violent extremism, increasing Australia’s national Responding to this worsening threat picture, on 4 August 2014 the Government boosted funding to commitment to this work CT activities. National security agencies are 9. better manage increasing resource pressures significantly bolstering their capabilities to detect by tightening priorities and lessening the and disrupt the threats we face. burden of the efficiency dividend on some areas of national security agencies Every dollar must be spent wisely. We face a new paradigm that demands ever more careful 10. improve our communication with the public on prioritisation. National security agencies must come CT threats by introducing a single threat level together seamlessly around shared priorities. system to improve usability and to give the public more meaningful information. A restructure or reshuffle of national security agencies is not the answer. But more must be done to strengthen cross-agency coordination and leadership. Whatever we do, there is no short-term solution to our evolving terrorist challenge. It is almost inevitable that we will have more terrorist attacks on Australian soil. Long term, we must put a greater effort into reducing – rather than managing – the pool of terrorists, their supporters and sympathisers. The community is key. To counter violent extremism we must work with our at-risk communities. We must build resilience to terrorist ideology and assist individuals to disengage and de-radicalise from violent extremist beliefs and influences. Future direction To combat the challenge most effectively, we need to: 5. acknowledge that we have entered a new, long-term paradigm of heightened terrorism threat with a much more significant ‘home grown’ element 6. further improve and broaden the scope of our national CT strategy to provide a clear direction to the national security community and to improve our cooperation with at-risk communities DEPARTMENT OF THE PRIME MINISTER AND CABINET | v REVIEW OF AUSTRALIA’S COUNTER-TERRORISM MACHINERY Recommendations Leadership and coordination 1. The Government, in close consultation with states and territories through the Australia-New Zealand Counter-Terrorism Committee (ANZCTC), develop a new national counter-terrorism (CT) strategy which appropriately coordinates and balances our efforts to counteract the various threats we face, including from home-grown lone actors and radicalisation in our community. 2. The Government implement the following arrangements to provide strong, clear and co-ordinated leadership to ensure agencies respond effectively and appropriately to terrorism: a. designate a senior official as the National CT Coordinator. b. establish a Senior Executive Counter-Terrorism Group (Executive Group), chaired by the National CT Coordinator, to set the strategic direction for the Commonwealth’s CT efforts. c. mandate that the Australian Counter-Terrorism Centre draw together policy and operational agencies, including secondees from the states and territories, to work together closely on operations, policy challenges and capability development. Community cohesion 3. The Government significantly boost Counter Violent Extremism (CVE) activities: a. seek COAG agreement to a new national CVE strategy for endorsement in 2015, increasing Australia’s national commitment to this work b. the Attorney-General bring forward a proposal as part of this effort with options to: i. establish and expand community and public-private partnerships to better reach at-risk or radicalised individuals ii. expand Commonwealth efforts to address the causes of violent extremism in Australia. c. the Attorney-General lead development of a strategy to counter the reach of extremist narratives in Australia. 4. The Attorney-General’s Department coordinate across government to develop a strategy for managing the controlled return of Australian foreign fighters, subject to the Government’s imposition of stringent, individually-tailored terms and conditions on returnees. vi | DEPARTMENT OF THE PRIME MINISTER AND CABINET REVIEW OF AUSTRALIA’S COUNTER-TERRORISM MACHINERY Resourcing pressures 5. The Government adjust
Recommended publications
  • Safeguarding Your Organisation Against Terrorism Financing
    Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN: 978-1-921241-84-0 © Commonwealth of Australia [2009] This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney-General’s Department, 3-5 National Circuit, Barton ACT 2600 or posted at http://www.ag.gov.au/cca Table of Contents SECTION A: Introduction 3 SECTION B: Best Practice Principles 8 SECTION C: Australia’s international obligations 9 SECTION D: Listed individuals and organisations 10 SECTION E: Legal obligations 14 SECTION F: Due diligence 15 SECTION G: Transparency and accountability 17 M F I N A N C I N G S T T E R R O R I S ATION AGAIN S SAFEGUARDING YOUR ORGANI 1 What does this Guidance mean for Non-Profit Organisations (NPOs)? This Guidance is not a legal document. This Guidance is intended to help NPOs understand their obligations under Australian law. Like all Australian legal and natural persons, Australian NPOs must comply with Australian laws. The Australian Government recognises the vital contribution that NPOs make in Australia and overseas. In minimising the risk of misuse of NPOs, the Australian Government is mindful of the need to not disrupt or discourage legitimate NPO activities. This Guidance is intended to support NPOs to continue their important work.
    [Show full text]
  • Preventative Detention and Covert Search Warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002
    Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 NSW Ombudsman NSW Ombudsman Level 24, 580 George Street Sydney NSW 2000 Phone 02 9286 1000 Toll free (outside Sydney Metro Area): 1800 451 524 Facsimile: 02 9283 2911 Telephone typewriter: 02 9264 8050 Website: www.ombo.nsw.gov.au Email [email protected] ISBN 978-1-925061-41-3 © Crown Copyright, NSW Ombudsman, September 2014 This work is copyright, however material from this publication may be copied and published by State or Federal Government Agencies without permission of the Ombudsman on the condition that the meaning of the material is not altered and the NSW Ombudsman is acknowledged as the source of the material. Any other persons or bodies wishing to use material must seek permission. Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 September 2014 NSW Ombudsman Foreword In 2005 the Terrorism (Police Powers) Act 2002 was amended to give police and the NSW Crime Commission special powers to deal with suspected terrorist acts. Under Part 2A, police may apply to the Supreme Court for a preventative detention order to detain a person without charge for up to two weeks, in order to prevent a suspected imminent terrorist act or to preserve evidence of a terrorist act which has occurred.
    [Show full text]
  • Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization
    International Journal of Communication 14(2020), 1849–1867 1932–8036/20200005 Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization BRIAN T. HUGHES American University, USA Examinations into the roots of Islamist terrorism have frequently presented the phenomenon as a result of either perverting political–religious epistemologies into distorted, caricatured fundamentalisms, or, alternatively, as a return to form, whereby a pure, root ideology/metaphysic is rediscovered. The former approach reflects a discourse rooted in print media and characterized by logical argumentation, linear chronology, and deference to the text. The latter approach reflects a discourse rooted in modes of secondary orality, which posit a font of ideal essence that precedes expression. The figure of the digitally engaged lone wolf undermines these discourses. His violent extremism appears only Islamically inflected through an accretion of contradictory mediated encounters linking representations of violence, Islam, and the lone wolf himself. This article argues that a new approach and discourse should therefore emerge, specific to the hypertextual and rhizomatic qualities of multiplicity and contradiction that characterize the digitally engaged lone wolf. Keywords: terrorism, extremism, ISIS, Islamophobia, radicalization, discourse, medium theory, hypermedia, affect Scholars have identified successive waves of terrorist tactics and ideological pretexts in both the contemporary Islamist domain (Esposito, 2003b; Kepel, 2002;
    [Show full text]
  • A Decade of Australian Anti-Terror Laws
    A DECADE OF AUSTRALIAN ANTI-TERROR LAWS GEORGE WILLIAMS* [This article takes stock of the making of anti-terror laws in Australia since 11 September 2001. First, it catalogues and describes Australia’s record of enacting anti-terror laws since that time. Second, with the benefit of perspective that a decade brings, it draws conclusions and identifies lessons about this body of law for the Australian legal system and the ongoing task of protecting the community from terrorism.] CONTENTS I Introduction ..........................................................................................................1137 II Australia’s Anti-Terror Laws ................................................................................1139 A Number of Federal Anti-Terror Laws ......................................................1140 1 Defining an Anti-Terror Law ......................................................1141 2 How Many Anti-Terror Laws? ....................................................1144 B Scope of Federal Anti-Terror Laws .........................................................1146 1 The Definition of a ‘Terrorist Act’ ..............................................1146 2 Offence of Committing a ‘Terrorist Act’ and Preparatory Offences ......................................................................................1146 3 Proscription Regime ....................................................................1147 4 Financing Offences and Regulation ............................................1147 (a) Offences ..........................................................................1147
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Submission by the Australian Federal Police Parliamentary Joint
    Parliamentary Joint Committee on Intelligence and Security Review of the Australian Citizenship renunciation by conduct and cessation provisions August 2019 Submission by the Australian Federal Police UNCLASSIFIED Contents Contents .............................................................................................................................. 2 Introduction .......................................................................................................................... 3 Terms of Reference ............................................................................................................... 3 Threat Environment ............................................................................................................... 3 Benefit to Law Enforcment ...................................................................................................... 4 Effectiveness in Combatting Terrorism................................................................................... 4 Conclusion ........................................................................................................................... 6 2 UNCLASSIFIED UNCLASSIFIED Introduction The AFP welcomes the request by the Parliamentary Joint Committee on Intelligence and Security to make a submission to the Committee as part of its review of the Australian citizenship renunciation by conduct and cessation provisions. The Committee has requested the AFP comment in particular on the extent to which the citizenship loss provisions have been effective
    [Show full text]
  • A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by the Henry Jackson Society
    “WE WILL CONQUER YOUR ROME ” A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “We Will Conquer Your Rome”: A Study of Islamic State Terror Plots in the West By: Robin Simcox ISBN 978-1-909035-22-5 £10.00 where sold All rights reserved Photo credits Islamic State flag: http://www.shutterstock.com/pic-237997351/stock-photo-islamic-state-isis-isil-sunni-jihadist-group-self- proclaimed-as-a-caliphate-it-claims.html?src=csl_recent_image-1 American flag: http://www.istockphoto.com/photo/american-flag-isolated-with-clipping-path-6406148 British flag: https://commons.wikimedia.org/wiki/File:Flag_-_Union_Flag.jpg French flag: http://www.shutterstock.com/dl2_lim.mhtml?id=77864683&size=huge_jpg&src=id “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Robin Simcox www.henryjacksonsociety.org 1 “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Acknowledgments Many thanks to Aram Alaaldin, Michael Ettlinger and Nathaniel Greenwold for their research assistance. About the Author Robin Simcox is a Research Fellow at the Henry Jackson Society, where he works on terrorism and security issues.
    [Show full text]
  • R V Ul-Haque
    ARTICLES AXIOMS OF AGGRESSION Counter-terrorism and counter-productivity in Australia WALEED ALY t did not take Australia long to reach for a legislative that ‘[t]he questioning and detention powers which response to the terrorist attacks of September I I, were passed in 2003 by both Houses of Parliament 2001. Within months, the Federal government was have proved important in progressing a number of proposing new anti-terrorism legislation promoting investigations,’ while simultaneously affirming that ‘ASIO whatI has since become a familiar scheme: new species has not yet had to use the detention powers which were of offences relating to a statutorily-defined terrorism, always intended to be used only in the most exceptional and expanded powers for police and the Australian circumstances.’4 Presently, as the British government Security Intelligence Organisation (ASIO) enabling is facing considerable opposition to its proposal to REFERENCES them to detain and question a person who may have extend the available period of detention of terror 1. This ultimately found its expression in July 2002 in the form of the Security information useful in countering a terrorist attack suspects without charge from 28 days to 42, Home Legislation Amendment (Terrorism) Act 2002 — possibly without access to a lawyer for 48 hours.1 Secretary Jacqui Smith’s description of the new limit as (Cth), and a year later in the Australian a ‘safeguard’ to be used in exceptional circumstances Security Intelligence Organisation Legislation Thus began the most dramatic era in Australia’s counter­ rather than a ‘target’ rings familiarly. All the while Smith Amendment (Terrorism) Act 2003 (Cth).
    [Show full text]
  • Terror in Australia: Investigating the Rhetoric and the Community
    SAGE International Terror in Australia: Investigating the rhetoric and the community By Ms. Kayla Dickeson Intern, SAGE International t is the thirteenth anniversary of the fateful September 11 attacks: Prime Minister Tony Abbott announces that the terror threat-level has been raised to I High. One week later, 800 highly-visible police officers raid homes across Sydney and Brisbane (Jabour, 2014), while on the same day Mr Abbott smiles for the camera as he farewells air force personnel leaving for Iraq (Hurst, 2014). Labelled “terrorism events” by a Counter-Terrorism review, the Melbourne stabbing of two police officers and the Martin Place Sydney Siege join the ranks of the Bali bombings, the London train attacks and the US-Libyan embassy attack in a timeline of the post-9/11 era (Australian Government, 2015, p 4). Mr Abbott emotively notes the tragedy of “politically-motivated” attacks on “Australian values” (Griffiths, 2014) – aptly observing that one-third of “terrorism events” have occurred in the six months after raising the terror level (Grattan, 2015). Monday morning, the 23rd of February, 2015 – while introducing new counter- terrorism strategies to toughen immigration laws, remove citizenship, suspend passports and cancel welfare payments of “persons of interest” – Mr Abbott remarks “I’ve often heard western leaders describe Islam as a ‘religion of peace’. I wish more Muslim leaders would say that more often, and mean it” (Lloyd, 2015). Indeed, he is correct: President Barack Obama tells the world his country is not at war with Islam (AJ, 2015); Chancellor Angela Merkel stands with Muslim leaders at public anti- violence rallies (Huggler, 2015); and Foreign Minister Julie Bishop applauds Australian Muslims who are working with the government, community groups and 1 Terror in Australia: Investigating the rhetoric and the community mosques “to keep our people safe” (Medhora, 2015).
    [Show full text]
  • The Virtual Entrepreneurs of the Islamic State
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | March 2017 • Volume 10, Issue 3 FEATURE ARTICLE FEATURE ANALYSIS The Virtual Entrepreneurs The Islamic of the Islamic State State’s War on How the group’s virtual planners threaten the United States Turkey Seamus Hughes and Alexander Meleagrou-Hitchens Ahmet S. Yayla FEATURE ARTICLE 1 The Threat to the United States from the Islamic State’s Virtual Editor in Chief Entrepreneurs Paul Cruickshank Seamus Hughes and Alexander Meleagrou-Hitchens Managing Editor FEATURE ANALYSIS Kristina Hummel 9 The Reina Nightclub Attack and the Islamic State Threat to Turkey Ahmet S. Yayla EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 17 The German Foreign Fighters in Syria and Iraq: The Updated Data and its Implications Lieutenant Colonel Bryan Price, Ph.D. Daniel H. Heinke Director, CTC 23 Australian Jihadism in the Age of the Islamic State Brian Dodwell Andrew Zammit Deputy Director, CTC 31 The Taliban Stones Commission and the Insurgent Windfall from Illegal Mining Matthew C. DuPée CONTACT Combating Terrorism Center U.S. Military Academy In our feature article, Seamus Hughes and Alexander Meleagrou-Hitchens 607 Cullum Road, Lincoln Hall focus on the threat to the United States from the Islamic State’s “virtual entrepreneurs” who have been using social media and encryption applica- West Point, NY 10996 tions to recruit and correspond with sympathizers in the West, encouraging and directing them to Phone: (845) 938-8495 engage in terrorist activity. They find that since 2014, contact with a virtual entrepreneur has been a Email: [email protected] feature of eight terrorist plots in the United States, involving 13 individuals.
    [Show full text]
  • Isis in the West
    NEW INTERNATIONAL AMERICA SECURITY PETER BERGEN, COURTNEY SCHUSTER, AND DAVID STERMAN ISIS IN THE WEST THE NEW FACES OF EXTREMISM NOVEMBER 2015 About New America About the International Security Program New America is dedicated to the renewal of American The International Security Program aims to provide politics, prosperity, and purpose in the Digital Age. We evidence-based analysis of some of the thorniest carry out our mission as a nonprofit civic enterprise: an questions facing American policymakers and the public. intellectual venture capital fund, think tank, technology The program is largely focused on South Asia and the laboratory, public forum, and media platform. Our Middle East, al-Qaeda and allied groups, the rise of hallmarks are big ideas, impartial analysis, pragmatic political Islam, the proliferation of weapons of mass policy solutions, technological innovation, next destruction (WMD), homeland security, and the activities generation politics, and creative engagement with broad of U.S. Special Forces and the CIA. The program is also audiences. Find out more at newamerica.org/our-story. examining how warfare is changing because of emerging technologies, such as drones, cyber threats, and space- based weaponry, and asking how the nature and global About The Authors spread of these technologies is likely to change the very definition of what war is. Peter Bergen is a print, television and web journalist, documentary producer and the The authors would like to thank Emily Schneider and author or editor of six books, three of which Justin Lynch for their assistance with this research. were New York Times bestsellers and three of which were named among the best non- fiction books of the year by The Washington Post.
    [Show full text]
  • The Psychogenesis of Terrorism
    The Psychogenesis of Terrorism Emily Joy Corner UCL Thesis submitted in fulfilment of the requirements for the Research Degree in Security and Crime Science September, 2016 1 Student Declaration I, Emily Joy Corner confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Signed Name Date 2 Acknowledgements This thesis would never have reached its conclusion without the help of a wide list of people. Not all are mentioned here, as the list is far too long. But there are a few key individuals, who have had a far greater impact, and without them, I would never have managed to tackle the hurdles of the last three years. Firstly, to Paul. I would never have even managed to start this without your support and belief. You have been there every single step of the way, and have given me opportunities I would never have even dreamed of. You kept your word on everything. I am eternally grateful. Oliver, thank you for the inexplicably quick turn-arounds, and for your comments and corrections that only improved the quality of this thesis. Noémie, thank you for the opportunities, discussions, and being the only other person awake even before the sun rose at conferences. To Shane, thank you for the answers to all those ‘quick’ questions. To all the individuals on the projects that I have been exceptionally lucky to work on, I have gained such a wealth of experience working with you. To Paul Hitchen, Paul Betley, and Amy McKee, thank you for the laughs, and the drinks.
    [Show full text]