Terrorism and the Law

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and the Law Terrorism and the Law By Justice Peter McClellan I gratefully acknowledge the considerable research of Garth Riddell and the assistance of Penny Grist in the preparation of this paper. Contents CHAPTER 1: DEFINING KEY CONCEPTS .............................................................. 6 1.1 Introduction........................................................................................................................6 1.2 What is a “Terrorist Act”?................................................................................................7 1.2.1 Definition of “terrorist act” under NSW and Commonwealth Legislation...................7 1.2.2 Interpretation.................................................................................................................9 1.2.3 Geographical Scope of ”Terrorist Acts”.......................................................................9 1.3 What is a “Terrorist Organisation”? .............................................................................11 1.3.1 Historical Background ................................................................................................11 1.3.2 Definition of “terrorist organisation”..........................................................................12 1.3.3 Listing Terrorist Organisations...................................................................................12 CHAPTER 2: CONVENTIONAL CRIMINAL LAWS THAT MAY APPLY TO TERRORIST ACTS OR ORGANISATIONS ............................................................ 15 2.1 Introduction......................................................................................................................15 2.2 Treason..............................................................................................................................15 2.3 Treachery and related offences.......................................................................................16 2.4 Murder..............................................................................................................................19 2.4.1 Definition and interpretation.......................................................................................19 2.4.2 Geographical scope.....................................................................................................19 2.4.3 Conspiracy ..................................................................................................................20 2.4.4 Attempt .......................................................................................................................20 2.5 Protected Persons.............................................................................................................21 2.5.1 UN Personnel..............................................................................................................22 2.5.2 Commonwealth Public Officials.................................................................................22 2.5.3 Internationally protected persons................................................................................22 2.6 Unlawful Associations......................................................................................................24 2.6.1 Definition of “Unlawful Association” ........................................................................24 2.6.2 Listing Unlawful Associations....................................................................................25 2.7 Kidnapping And Threats ...............................................................................................26 2.7.1 Kidnapping and Hostage Taking ................................................................................26 2.7.2 Threats.........................................................................................................................28 2.8 Suicide ...............................................................................................................................29 2.9 Weapons and Explosives .................................................................................................30 2.10 Other Offences ...............................................................................................................31 2.10.1 Computer Offences ...................................................................................................32 2.10.2 Genocide and Crimes Against Humanity .................................................................32 2 2.10.3 Hostile activities in a foreign state............................................................................32 2.10.4 To train or drill another person in the use of arms....................................................33 2.11 Conclusion ......................................................................................................................33 CHAPTER 3: NEW TERRORIST OFFENCES ........................................................ 35 3.1 Introduction and summary .............................................................................................35 TABLE 1: NEW TERRORIST OFFENCES.............................................................. 36 3.2 Terrorist Acts ...................................................................................................................38 3.2.1 Offences ......................................................................................................................38 3.2.2 Scope of Application and Relevance of Intention ......................................................39 3.2.3 Case study of preparatory offences: R v Faheem Khalid Lodhi (unreported, NSWSC, 23 December 2005)..............................................................................................................40 3.3 Terrorist Organisations...................................................................................................41 3.3.1 Offences Relating to Involvement with the Activities of a Terrorist Organisation....41 3.3.2 Intentionally associating with terrorist organisation members ...................................43 3.3.3 Potential Problems with the Terrorist Organisation Provisions..................................44 3.3.4 Extraterritorial operation of the terrorist organisation provisions ..............................45 3.4 Harming Australians .......................................................................................................46 3.5 Hoaxes and Other Offences Using Postal or Carriage Services ..................................47 3.6 International Terrorism ..................................................................................................48 3.7 Financing Terrorism: Freezable Assets.........................................................................48 3.8 Espionage and Related Activities ...................................................................................49 3.9 Offences Relating to Foreign Travel Documents ..........................................................50 3.10 Aviation Offences...........................................................................................................51 3.11 Sedition............................................................................................................................52 CHAPTER 4: TERRORIST OFFENCES AND THE CRIMINAL CHARGE AND TRIAL PROCESS .................................................................................................... 54 4.1 Detention after Arrest......................................................................................................54 4.1.1 Detention Warrants in respect of Terrorist Offences – Commonwealth ....................55 4.1.2 Calculation of the Detention Period – Commonwealth Detention Warrants..............55 4.1.3 Issuing Commonwealth Detention Warrants..............................................................56 4.2 Bail and Non-parole Periods...........................................................................................56 4.3 Disclosure of National Security Information.................................................................57 4.3.1 Enactment and Objectives...........................................................................................57 3 4.3.2 Definitions...................................................................................................................57 4.3.3 Alteration to Criminal Procedure................................................................................58 4.3.4 Disclosure certificates.................................................................................................59 4.3.5 Closed hearings...........................................................................................................60 4.3.6 Breach of a non-disclosure order or certificate, or a failure to notify the Attorney- General.................................................................................................................................61 4.3.7 Criticism and interpretation of the national security information provisions.............62 4.3.8 Special Advocates.......................................................................................................63 4.4 Video Link Evidence in Terrorism Related Proceedings.............................................64 CHAPTER 5: WARRANTS AND ORDERS: CONVENTIONAL POWERS ............. 67 5.1 Introduction......................................................................................................................67 5.2. Search Warrants .............................................................................................................67
Recommended publications
  • Style Attacks and the Threat from Lashkar-E-Taiba
    PROTECTING THE HOMELAND AGAINST MUMBAI- STYLE ATTACKS AND THE THREAT FROM LASHKAR-E-TAIBA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JUNE 12, 2013 Serial No. 113–21 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–686 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T.
    [Show full text]
  • The Kurdistan Workers Party
    EXPLANATORY STATEMENT Issued by the authority of the Minister for Home Affairs Criminal Code Act 1995 Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulations 2018 The purpose of the Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulations 2018 (the Regulations) is to specify Lashkar-e-Tayyiba for the purposes of paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1) of the Criminal Code.1 Lashkar-e-Tayyiba is currently specified for this purpose by the Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulation 2015, which is repealed by the Regulations. Details of the Regulations are set out in Attachment A. Section 5 of the Criminal Code Act 1995 (the Act) provides that the Governor-General may make regulations prescribing matters required or permitted by the Act to be prescribed, or necessary or convenient to be prescribed for carrying out or giving effect to the Act. The Schedule to the Act sets out the Criminal Code. Paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1) of the Criminal Code provides that regulations can specify organisations for the purposes of the definition of ‘terrorist organisation’. Subsection 102.1(2) of the Criminal Code provides that before the Governor-General makes regulations specifying an organisation for the purposes of paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1), the Minister must be satisfied on reasonable grounds that the organisation is directly or indirectly engaged in, preparing, planning, assisting in or fostering the doing of a terrorist act or advocates the doing of a terrorist act.
    [Show full text]
  • The Internal Dynamics of Terrorist Cells: a Social Network
    THE INTERNAL DYNAMICS OF TERRORIST CELLS: A SOCIAL NETWORK ANALYSIS OF TERRORIST CELLS IN AN AUSTRALIAN CONTEXT STUART KOSCHADE Bachelor of Arts (First Class Honours) Centre for Social Change Research Queensland University of Technology Thesis submitted for the Doctor of Philosophy qualification 2007 i KEYWORDS: terrorism, terrorist cells, terrorism studies, social network analysis, Croatian Revolutionary Brotherhood, Ustashi, Ustasha, Aum Shinrikyo, Lashkar-e- Taiba, Jemaah Islamiyah, history of terrorism, Australia, destabilisation techniques, betweenness, critical node, counter-terrorism, Willie Brigitte, Faheem Khalid Lodhi, Shoko Asahara, Imam Samudra, Muklas, Bali bombing, Islamic extremism. ABSTRACT: The rise of the 21st Century Islamic extremist movement, which was mobilised by the al-Qaeda attacks of and responses to September 11, 2001, heralds a new period in the history of terrorism. The increased frequency and intensity of this type of terrorism affects every nation in the world, not least Australia. Rising to meet the challenges posed by terrorism is the field of terrorism studies, the field which aims at understanding, explaining, and countering terrorism. Despite the importance of the field, it has been beleaguered with criticisms since its inception as a response to the rise of international terrorism. These criticisms specifically aim at the field’s lack of objectivity, abstraction, levels of research, and levels of analysis. These criticisms were the impetus behind the adoption of the methodology of this thesis, which offers the distinct ability to understand, explain, and forecast the way in which terrorists interact within covert cells. Through social network analysis, this thesis examines four terrorist cells that have operated in or against Australia.
    [Show full text]
  • Report to Parliament 2004-05
    Australian Security Intelligence Organisation REPORT TO PARLIAMENT 20042005 ISSN 0815-4562 ISBN 0-9751485-2-4 ¤ Commonwealth of Australia This document is the property of the Commonwealth of Australia. Its contents must not be copied or disseminated. This is an exempt document under subsection 7(1) of the Freedom of Information Act 1982. Produced and printed by the Australian Security Intelligence Organisation. Page ii DRAFT ONLY 19 Page iii ASIO Report to Parliament 2004–2005 Page iv ASIO Report to Parliament 2004–2005 CONTENTS ASIO and its Annual Report......................................................................................vii Part 1: Overview ........................................................................................................1 The Year in Review ..................................................................................................3 Agency Overview .....................................................................................................7 Outcome and Output Structure ................................................................................9 ASIO's Funding and Performance ..........................................................................11 Part 2: Output Performance .....................................................................................13 Output 1: Security Intelligence Analysis and Advice..............................................15 Output 2: Protective Security Advice .....................................................................29 Output
    [Show full text]
  • Hacktivism Or Cyber- Terrorism?
    474 UNSW Law Journal Volume 33(2) OPERATION TITSTORM: HACKTIVISM OR CYBER- TERRORISM? KEIRAN HARDY * Re: Operation Titstorm post #17 Hey the cult is already trying to label us as terrorists and as you put it once you mess with the gover[n]ment things start getting messy. If we don’t do damage control then they really will be capable of truthfully calling us terrorists for attacking a government. 1 I INTRODUCTION On 10 February 2010, an internet based group of protesters calling themselves ‘Anonymous’ launched a cyber-attack on the Australian Parliament House website. Aptly named ‘Operation Titstorm’, the attack was launched by the group to protest against the Rudd government’s plans to introduce a mandatory internet filter banning pornographic images of animated characters, small breasted women and female ejaculation. It brought down the website for three days by flooding it with network traffic – up to 7.5 million requests per second – and it bombarded parliamentary email addresses with pornographic material (ironically, of the very kind the government intends to ban). It also * LLB Candidate, University of New South Wales; Research Assistant, Australian Research Council Laureate Fellowship on Anti-Terrorism Law, Gilbert + Tobin Centre of Public Law, University of New South Wales. I would like to thank the anonymous reviewers for their comments on an earlier version of this paper. Any remaining errors are my own. 1 urbanhawk, ‘Re: Operation Titstorm’ on Anonymous Activism Forum, Why We Protest (6 May 2010) <http://forums.whyweprotest.net/292-freedom-expression/operation-titstorm-61002/>. 2010 Forum: Operation Titstorm: Hacktivisim or Cyber-Terrorism? 475 plastered a selection of this questionable material across the Prime Minister’s homepage.
    [Show full text]
  • Professor Clive Williams Visiting Fellow, Strategic and Defence Studies Centre, ANU the Evolution of Terrorism in the 21St Centu
    Professor Clive Williams Visiting Fellow, Strategic and Defence Studies Centre, ANU The Evolution of Terrorism in the 21st Century – and its Implications for Australia Australian Institute of International Affairs – ACT Branch 4 October, 2011 The focus of what I will be talking about is Australia; there is a lot of material produced around 9/11 which relates to international issues. I will put more of a focus on things that have happened here. I am going to run through various terrorism-related events in chronological order and talk briefly about them. You might remember Jack Roach. He came back to Australia from Indonesia in 2000 and he was planning to do terrorist attacks here. He had been sponsored by JI in Indonesia and when he got back to Australia was supposed to make contact with JI and get some assistance to do attacks. He looked at various target options. One was Joseph Gutnick; the other was the Israeli Embassy in Canberra. But when he did not get any support he decided it wasn’t such a good idea after all. He tried to contact ASIO; he was later interviewed by Sally Neighbour and said he had tried to contact ASIO three times and they hadn’t responded. So it just shows you how things have changed between 2000 and today. He would have security agents all over him today, He was tried based on admissions he had made to The Australian newspaper and served some jail time and was released in 2007. In 2001 George Bush became the 43rd President of the United States.
    [Show full text]
  • Effects of the Australian Jihadists Training on Conducting Successful Terrorists Offensive
    International Journal of Humanities and Social Science Vol. 5, No. 8(1); August 2015 Effects of the Australian Jihadists Training on Conducting Successful Terrorists Offensive Lit.Col Emad Al-hammadin Macquarie University-Australia Royal Hashemite Court, Royal Guards Amman, Jordan Abstract The Australian jihadist is becoming obvious among the western terrorists in conflict zones. Training of terrorist is considered as the most important phase in the radicalizing process and in preparing to future operations. In pursuing this mission, most of terrorists have been caught or arrested as it needs more than idea and thoughts to conduct terror offensive. This study examines the training process of the Australian jihadists through distinguishing between two generations. The first generation is the terrorists who train with foreign organization (FTO) and acquire skills and knowledge. The second is the so called home-grown terrorists who never travel to terrorists camps or trained with (FTO). The latter is mostly radicalized and trained through internet and social media. The importance of studying such topic is came from the need to determine the lethality of any terrorists attack depending on the training of its perpetrators. It argues that terrorists who trained with FTO have the capability to stage a big scale attack than self -trained terrorists. The findings of this study suggests that law enforcements should track the training of terrorists and build database of trained terrorists as possible future attacks perpetrators. Keywords: training, terrorists, Australian, camps, generation Introduction Since its participation in the invasion of Afghanistan and Iraq with the coalition troops, Australia has been considered as possible target for the Islamist jihadist organizations.
    [Show full text]
  • Faheem Khalid Lodhi V Regina [2007] NSWCCA 360 NICHOLAS J BROADBENT*
    Faheem Khalid Lodhi v Regina [2007] NSWCCA 360 NICHOLAS J BROADBENT* Introduction Faheem Khalid Lodhi was charged with four discrete terrorism-related offences under three sections of the Commonwealth Criminal Code1 (‘the Code’): s 101.4, s 101.5 and s 101.6, all of which relate to the procurement and possession of articles in preparation for a ‘terrorist act’. Born into a ‘well-established family’2 in the Punjab region of Pakistan, Mr Lodhi graduated from Lahore University with a degree in architecture. In 1998, he emigrated to Australia and enrolled at the University of Sydney, completing additional subjects that allowed him to graduate with a Bachelor of Architecture from that institution in 2000. At the time of his arrest in April 2004, he was in his mid-thirties and working at an architecture firm in Alexandria, Sydney. After a lengthy trial that was characterised by high security, substantial in camera argument, closed court proceedings, and procedural adjournments, the jury deliberated for a period of several days, and eventually found the defendant guilty of three of the four charges. Whealy J, at first instance, sentenced Lodhi to a term of 20 years imprisonment with a non-parole period of 15 years. The Court of Appeal upheld the convictions and the sentence. This case note will consider the legislative framework for the charges, the nature of the offences, and some of the arguments put forward at Lodhi’s appeal. The case exposes a number of disquieting legal developments in the field of anti-terror law in Australia, particularly in relation to the presentation of evidence, identification procedures, and the rapid rise of a class of crimes related to ‘preparation’ for a terrorist act.
    [Show full text]
  • The Post 9/11 Evolution of an Australian National Security Community
    Intelligence and National Security ISSN: 0268-4527 (Print) 1743-9019 (Online) Journal homepage: http://www.tandfonline.com/loi/fint20 Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community David Martin Jones To cite this article: David Martin Jones (2018) Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community, Intelligence and National Security, 33:1, 1-20, DOI: 10.1080/02684527.2016.1259796 To link to this article: http://dx.doi.org/10.1080/02684527.2016.1259796 Published online: 17 Nov 2016. Submit your article to this journal Article views: 440 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=fint20 Download by: [David Jones] Date: 14 November 2017, At: 20:22 INTELLIGENCE AND NATIONAL SECURITY, 2018 VOL. 33, NO. 1, 120 https://doi.org/10.1080/02684527.2016.1259796 ARTICLE Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community David Martin Jones ABSTRACT Since 2001 expenditure on the security services has increased exponentially in Western democracies and particularly amongst the Five Eyes community of the UK, the US, Canada, Australia and New Zealand. This has occurred in conjunction with the expansion of counter-terror laws. Yet somewhat problematically the phenomenon of Islamist inspired violence became more threatening to the internal security of western democracies in the frst decade of the twenty-frst century. This study examines the Western managerial approach to security using Australia as a case study.
    [Show full text]
  • The Effect of September 11, 2001 and Subsequent Terrorist Events Upon Australian Public Libraries' Policies, and Collections and Services to Muslim Clients
    School of Media, Culture and Creative Arts The Effect of September 11, 2001 and Subsequent Terrorist Events Upon Australian Public Libraries' Policies, and Collections and Services to Muslim Clients Nadine Elizabeth Gibbons A thesis presented for the Degree of Doctor of Philosophy of Curtin University November 2016 Declaration To the best of my knowledge and belief this thesis contains no material previously published by any other person except where due acknowledgment has been made. This thesis contains no material which has been accepted for the award of any other degree or diploma in any university. The research presented and reported in this thesis was conducted in accordance with the National Health and Medical Research Council National Statement on Ethical Conduct in Human Research (2007a) updated March 2014. The proposed research study received human research ethics approval from Curtin University Human Research Ethics Committee (EC00262), and Sheikh Khalifa Medical City, Institutional Review Board and Research Ethics Committee approval (#REC-15.01.2015[RS-332]). Nadine Elizabeth Gibbons November 2016 ii Statement of Contributors I acknowledge the important contribution to this thesis by the following people: Laurance Miyashiro for the modified maps Eleanor Gibbons for the drawing showing the difference between Equality and Equity Lorena Neal of Evanston Library, Evanston Il, for use of FaceBook entry Michael Done, Formatting specialist from Format My Thesis, www.formatmythesis.com. iii Abstract This research investigates responses by the Australian library profession to the national and international terrorism events that commenced with the attacks on the United States on September 11th 2001. It specifically investigates the response of the Australian Library and Information Association to changes in Commonwealth Government policies and legislation, and the subsequent impacts on the policy environment in which Australian public libraries operate, and their delivery of collections and services to Muslims.
    [Show full text]
  • Terrorism in Australia: Myth Or Reality? a Psychometric Study Into the Western Australian Public's Perception of Terrorism
    Edith Cowan University Research Online Theses : Honours Theses 2010 Terrorism in Australia: Myth or reality? A psychometric study into the Western Australian public's perception of terrorism Richard Sargent Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses_hons Part of the Quantitative Psychology Commons, and the Social Psychology Commons Recommended Citation Sargent, R. (2010). Terrorism in Australia: Myth or reality? A psychometric study into the Western Australian public's perception of terrorism. https://ro.ecu.edu.au/theses_hons/1240 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses_hons/1240 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth).
    [Show full text]
  • Report to Parliament 2003-04
    Unclass Annual Report 2003-04.qxd 30/10/2004 10:44 Page i Australian Security Intelligence Organisation Report to Parliament 2003–2004 Unclass Annual Report 2003-04.qxd 30/10/2004 10:44 Page ii ii Australian Security Intelligence Organisation Report to Parliament 2003–2004 © Commonwealth of Australia ISSN 0815-4562 ISBN 0-9751485-1-6 This document is the property of the Commonwealth of Australia. Its contents must not be copied or disseminated. This is an exempt document under subsection 7(1) of the Freedom of Information Act 1982. Produced and printed by the Australian Security Intelligence Organisation. Unclass Annual Report 2003-04.qxd 30/10/2004 10:45 Page iii iii Unclass Annual Report 2003-04.qxd 30/10/2004 10:45 Page iv iv Australian Security Intelligence Organisation Report to Parliament 2003–2004 Unclass Annual Report 2003-04.qxd 30/10/2004 10:45 Page v v Contents ASIO and its Annual Report . ix PART 1: OVERVIEW . 1 The Year in Review . 3 Agency Overview . 8 PART 2: OUTPUT PERFORMANCE . 11 Output 1: Security Intelligence Analysis and Advice . 14 Output 2: Protective Security Advice . 29 Output 3: Security Intelligence Investigation and Capability . 36 Output 4: Foreign Intelligence . 45 PART 3: MANAGEMENT AND ACCOUNTABILITY . 47 Corporate governance . 49 Accountability . 50 Interaction with the public . 53 Our people . 54 Information management . 59 Security of ASIO . 60 Building management . 61 Purchasing . 62 Consultants . 62 Competitive tendering and contracting . 62 PART 4: FINANCIAL STATEMENTS . 65 PART 5: APPENDICES . 101 A. Membership of the Parliamentary Joint Committee on ASIO, ASIS & DSD . 103 B.
    [Show full text]