Big Data Technology and National Security, Comparative

Total Page:16

File Type:pdf, Size:1020Kb

Big Data Technology and National Security, Comparative AUSTRALIA REPORT Big Data Technology and National Security Comparative International Perspectives on Strategy, Policy and Law Law and Policy Program Data to Decisions Cooperative Research Centre June 2018 Research Team Professor Louis de Koker, Program Leader Professor Janet Chan, Project Leader Professor Danuta Mendelson, Key Researcher Associate Professor Lyria Bennett Moses, Key Researcher Dr Alana Maurushat, Key Researcher Mr David Vaile, Key Researcher Mr Mike Gaffney, Researcher Mr Gregory Sadler, Researcher Mr Patrick Grierson, Researcher Mr Daniel Cater, Research Assistant Other research assistants Ms Alana James Ms Sonam Gordhan Mr Jax Arnold Interns (in alphabetical order) Ms Kendy Ding Mr Ciaran Finnane Ms Monica Ma Mr Kevin Tsu Mr Atul Vidhata Mr Vincent Wan Ms Jacqueline Yip Australia Report ii Australia Report Authors Chapter 1: The Australian Legal Context 1.1-1.4: Louis de Koker 1.5-1.6: Danuta Mendelson Chapter 2: Using Big Data for National Security: Stakeholders’ Perspectives 2.1-2.4: Janet Chan 2.5-2.6: Lyria Bennett Moses Chapter 3: Big Data, Law Enforcement and National Security: The Legal Environment in Australia 3.1. Is access for data mining enabled? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker 3.2. Are legal controls comprehensive and proportional? Danuta Mendelson; 3.2.3 Danuta Mandelson, David Vaile; Table 3.1 David Vaile, Alana James; 3.2.9 David Vaile; Observations Lyria Bennett Moses, Louis de Koker; Concluding Observations Danuta Mendelson 3.3. Are legal rules clear, principle-based, consistent and instructive Louis de Koker; 3.3.1 Louis de Koker, David Vaile; Table 3.2 David Vaile; 3.3.2 Lyria Bennett Moses; Observations Lyria Bennett Moses, Louis de Koker 3.4. Is integrity of data and analysis supported? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker 3.5. Are data and systems protected? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker 3.6. Is accountability maintained? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker 3.7. Are principles and rules regularly reviewed? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker 3.8. Is there a sufficient measure of transparency? Louis de Koker; Observations Lyria Bennett Moses, Louis de Koker, David Vaile Chapter 4: Conclusion 4.1: Lyria Bennett Moses, Janet Chan 4.2: Louis de Koker, Lyria Bennett Moses; 4.2.2 Danuta Mendelson Interviews Lyria Bennett Moses, Alana Maurushat, Janet Chan, Louis de Koker Qualitative analysis Lyria Bennett Moses, Janet Chan Research assistance Mr Daniel Cater Technical editing Mr David Vaile Other Reports from this Project Methodology Report UK Report Canada Report Comparative Report Select Bibliography Technical References [for Australia Report] Australia Report iii Contents List of tables ........................................................................................................................v List of Figures ..................................................................................................................... vi 1. THE AUSTRALIAN LEGAL CONTEXT ........................................................................................ 1 1.1. Intelligence and national security – contours of the policy discussion ................... 1 1.2. National intelligence and law enforcement agencies .............................................. 2 1.3. Selection of agencies and laws for purposes of this study ...................................... 6 1.4. Terminology ............................................................................................................. 8 1.5. Australian constitutional framework and concepts ................................................. 9 1.6. Principle of legality ................................................................................................. 13 2. USING BIG DATA FOR NATIONAL SECURITY: STAKEHOLDERS’ PERSPECTIVES .................... 16 2.1. Current use of data ................................................................................................ 16 2.2. Current concerns regarding access to and sharing of data ................................... 26 2.3. How problems can be overcome ........................................................................... 33 2.4. Big Data: potentials, limits and risks ...................................................................... 36 2.5. Regulation .............................................................................................................. 64 2.6. Values and Big Data ............................................................................................... 99 3. BIG DATA, LAW ENFORCEMENT AND NATIONAL SECURITY: THE LEGAL ENVIRONMENT IN AUSTRALIA ..................................................................................................................... 123 3.1. Is access for data mining enabled? ...................................................................... 123 3.2. Are legal controls comprehensive and proportional? ......................................... 141 3.3. Are legal rules clear, principle-based, consistent and instructive? ..................... 168 3.4. Is integrity of data and analysis supported? ........................................................ 172 3.5. Are data and systems protected? ........................................................................ 177 3.6. Is accountability maintained? .............................................................................. 184 3.7. Are principles and rules regularly reviewed? ...................................................... 206 3.8. Is there a sufficient measure of transparency? ................................................... 209 4. CONCLUSION ..................................................................................................................... 214 4.1. Using Big Data for national security: Stakeholders’ perspectives ....................... 214 4.2. Big Data, law enforcement and national security: The legal environment in Australia ............................................................................................................... 221 Australia Report iv List of tables Table 1-1: Australia’s national security agencies and authorities (as per the government) .................. 5 Table 1-2: Federal national security and law enforcement agencies studied ........................................ 8 Table 2-1: General Attitudes towards Computer Technology by Role in Operational Organisations (n=19) ......................................................................................................... 16 Table 2-2: Type of Data Used by Nature of Organisation (n=19) ........................................................ 17 Table 2-3: Type of Data Generated by Nature of Organisation (n=19) ............................................... 20 Table 2-4: Sharing of Data between Organisations .............................................................................. 22 Table 2-5: Main purpose of Using Data by Role in Organisations (n=19) ............................................ 25 Table 2-6: Current Concerns re Use of Data by Role in Organisations (n=16) ..................................... 27 Table 2-7: Current Concerns by How Problems Can Be Overcome (n=19) .......................................... 33 Table 2-8: Use of Big Data by Role and Type of Organisation (n=38) .................................................. 45 Table 2-9: Current Use of Data Analysis Tools by Role in Organisations (n=19) ................................. 46 Table 2-10: Barriers/Challenges to Use of Big Data by Role and Type of Organisation (n=37) ........... 47 Table 2-11: Risks of Using Big Data by Role of Research Participant (n=38) ........................................ 53 Table 2-12: Who is exposed to risks of Big Data by Role of Participant (n=16) .................................... 59 Table 2-13: How Big Data Risks can be Managed (n=38) ..................................................................... 61 Table 2-14: Legislation and regulatory material identified by research participants according to (1) organisation sector, and (2) type of role and organisation (n=28).......................... 66 Table 2-15: Evaluation of appropriateness and effectiveness of laws, regulation and oversight by research participants (n=28) ........................................................................................ 74 Table 2-16: Mitigation of issues/risks associated with data analytics/storage systems through design ................................................................................................................................ 85 Table 2-17: Policy participants’ attitudes to privacy (n=15) ............................................................... 101 Table 2-18: Responses to general kidnapping scenario and specific prompts ................................... 105 Table 2-19: Views of research participants with policy roles on transparency of data and algorithms ....................................................................................................................... 111 Table 2-20: Sources of views of Policy group ..................................................................................... 121 Table 3-1: Legislation affecting disclosure.......................................................................................... 164 Table 3-2: Examples of agency categories in the current framework ...............................................
Recommended publications
  • If You Have Issues Viewing Or Accessing This File, Please Contact Us at NCJRS.Gov
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. Q L/ LI7 '73 charge of each. There are 34 divisions, spectors. The State has about Police Rescue Squad each headed by an ins:1ector. 1,245,000 people. Several special squads are based at The force's motto is "The Safety of . the Sydney CIB, including the Armed the People is the Highest Law". Its role Hold-Up Squad, Homicide Squad, is laid down as the preservation of life Australi a:::'~sr'1fTK~TI·~hf~o: rces Special Breaking Squad, Consorting and the protection of property, the Squad, Drug Squad, Crime Intelligence prevention and detection of crime and Unit, Fraud Squad, Vice Squad and the maintenance of peace and good Motor Squad. Detectives and order. plainclothes police are also stationed at most police stations in the metropo!itan Western Australian area and at the larger country stations. Police Force This force has a strength of about Victoria Police Force 2,290. They serve about 1,116,000 Under its Chief Commissioner this people. The higher ranks include a senior force has about 6,500 members (some assistant commissioner, and three assis­ 300 of them policewomen). The~' in­ tant commissioners (for administration, clude one deputy commissioner, five crime, traffic) a chief superintendent, 21 assistant commissioners, two com­ superintendents, 20 senior inspectors manders, 24 chief superintendents, 29 and 25 inspectors including one woman superintendents, 87 chief inspectors, police inspector. and 173 inspectors. They serve about To bring about more effective un­ 3,700,000 people. derstanding among the State's Victoria is divided for police purposes Aboriginal population, 18 Aboriginal into 26 geographical districts each com­ police aides are part of the force (since manded by a chief superintendent.
    [Show full text]
  • This Paper Has Been Published in Its Final Form As Mark Finnane, 'Terrorism and Government: Between History and Criminology (
    Terrorism and government: between history and criminology: Sir John Barry Memorial Lecture, University of Melbourne, 2012 Author Finnane, Mark Published 2013 Journal Title Australian and New Zealand Journal of Criminology DOI https://doi.org/10.1177/0004865813483296 Copyright Statement © 2013 SAGE Publications. This is the author-manuscript version of the paper. Reproduced in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version. Downloaded from http://hdl.handle.net/10072/57063 Griffith Research Online https://research-repository.griffith.edu.au Pre-published draft: Finnane, Terrorism and government This paper has been published in its final form as Mark Finnane, ‘Terrorism and government: between history and criminology’ ANZ Journal of Criminology , Vol. 46, No. 2 (August 2013), 159-177 DOI: 10.1177/0004865813483296 Terrorism and government: between history and criminology Mark Finnane* Abstract: Incontestably the decade since 9/11 has been the pre-eminent age of terrorism. Or has it? In this lecture we consider terrorism as an object of government and of academic research. In arguing that law and criminology have been the pre-eminent disciplines attending to governmental responses to terrorism we note that their interventions have been significant in both their critical stance and in their impact in shaping discourse about the tactics and limits of counter-terrorism, particularly legislation and its uses. But what understanding of the broader role of government in responding to terrorism emerges from such a literature? And what histories are available to inform such an understanding? Existing historical accounts of Australian security and intelligence as a response to political violence and terrorism are for the most part dominated by Cold War politics and ideology, especially through their preoccupation with the politics of intelligence organisations.
    [Show full text]
  • Anti-Fascism and Italians in Australia, 1922-1945 Index Bibliography ISBN 0 7081 1158 0 1
    Although Italians had migrated to Australia since the middle of the nineteenth century, it was not until the 1920s that they became aware that they were a community in a foreign land, not just isolated individuals in search of fortune. Their political, cultural, economic and recreational associations became an important factor. Many of them, although settled in Australia, still thought of themselves as an appendage of Italy, a belief strengthened by Fascism’s nationalist propaganda which urged them to reject alien cultures, customs and traditions. The xenophobic hostility shown by some Australians greatly contributed to the success of these propaganda efforts. Moreover, the issue of Fascism in Italy was a contentious one among Italians in Australia, a large minority fighting with courage and determination against Fascism’s representatives in Australia. This broad study of Italian immigrants before and during World War II covers not only the effects of Fascism, but also records the ordeal of Italian settlers in the cities and the outback during the Depression and the difficulties they faced after the outbreak of the war. It deals with a subject that has long been neglected by scholars and is an important contribution to the history of Italian migrants in Australia. Although Italians had migrated to Australia since the middle of the nineteenth century, it was not until the 1920s that they became aware that they were a community in a foreign land, not just isolated individuals in search of fortune. Their political, cultural, economic and recreational associations became an important factor. Many of them, although settled in Australia, still thought of themselves as an appendage of Italy, a belief strengthened by Fascism’s nationalist propaganda which urged them to reject alien cultures, customs and traditions.
    [Show full text]
  • 1St Australian Contingent AFP’S PEACE MEN
    25th Anniversary — 1st Australian Contingent AFP’s PEACE MEN On a hot Mediterranean morning in 1964, 40 Australian police officers stepped onto the island of Cyprus in a history-making event which became part of one of the most successful United Nations operations yet. They were the First Australian Police Contingent of the United Nations Peace-Keeping Force in Cyprus. Their task was to help keep the peace between the island’s two conflicting peoples — the Greek and the Turkish Cypriots. Their dedication, and that of subsequent contingent members, has made the operation a milestone in Australian and international policing history. Thursday, 25 May 1989 marks the 25th Anniversary of their arrival on Cyprus. HEN Sergeant Laurie Con­ nolly and Senior Constable WJohn Vandcnbcrgh, of the Australian Commonwealth Police, landed at Nicosia Airport in mid-May, 1964, they had no idea just what new ground they would be breaking in the name of Australian policing. They were the advance parry for the first Australian contingent to the United Nations Civilian Police (UNC1VPOL) in Cyprus. “It was like walking into a military zone,” said Laurie Connolly last week, recalling the day clearly. “We landed almost unannounced and spent the first couple of hours finding out where we were supposed to be. “Our nearest official Australian contact was the Charges d'Aflairs at The Prime Minister, Mr Hawke, is introduced to members of the 26th Contingent our Athens Embassy. But we finally by Commander Alan Bird, during a visit to Cyprus in January 1987. From left, got settled into temporary lodgings to are: Sergeants Ken Baker and Peter DcBritte, Superintendent Bill Kirk and Sergeant begin our main task of making contact John Davies.
    [Show full text]
  • With the End of the Cold War, the Demise of the Communist Party Of
    A Double Agent Down Under: Australian Security and the Infiltration of the Left This is the Published version of the following publication Deery, Phillip (2007) A Double Agent Down Under: Australian Security and the Infiltration of the Left. Intelligence and National Security, 22 (3). pp. 346-366. ISSN 0268-4527 (Print); 1743-9019 (Online) The publisher’s official version can be found at Note that access to this version may require subscription. Downloaded from VU Research Repository https://vuir.vu.edu.au/15470/ A Double Agent Down Under: Australian Security and the Infiltration of the Left PHILLIP DEERY Because of its clandestine character, the world of the undercover agent has remained murky. This article attempts to illuminate this shadowy feature of intelligence operations. It examines the activities of one double agent, the Czech-born Maximilian Wechsler, who successfully infiltrated two socialist organizations, in the early 1970s. Wechsler was engaged by the Australian Security Intelligence Organisation. However, he was ‘unreliable’: he came in from the cold and went public. The article uses his exposés to recreate his undercover role. It seeks to throw some light on the recruitment methods of ASIO, on the techniques of infiltration, on the relationship between ASIO and the Liberal Party during a period of political volatility in Australia, and on the contradictory position of the Labor Government towards the security services. In the post-Cold War period the role of the Australian Security Intelligence Organisation (ASIO) no longer arouses the visceral hostility it once did from the Left. The collapse of communism found ASIO in search of a new raison d’étre.
    [Show full text]
  • Australian Federal Police Act 1979
    Australian Federal Police Act 1979 Act No. 58 of 1979 as amended This compilation was prepared on 4 December 2012 taking into account amendments up to Act No. 167 of 2012 The text of any of those amendments not in force on that date is appended in the Notes section The operation of amendments that have been incorporated may be affected by application provisions that are set out in the Notes section Prepared by the Office of Parliamentary Counsel, Canberra ComLaw Authoritative Act C2012C00885 ComLaw Authoritative Act C2012C00885 Contents Part I—Preliminary 1 1 Short title [see Note 1] ....................................................................... 1 2 Commencement [see Note 1]............................................................. 1 3 Repeal ................................................................................................ 1 3A Overview of Act ................................................................................ 1 4 Interpretation ..................................................................................... 3 4AA State offences that have a federal aspect .......................................... 10 4A Commissioner may specify prohibited drugs................................... 14 5 References in other laws .................................................................. 14 5A Application and extension of Act and regulations ........................... 15 5B Application of the Criminal Code ................................................... 15 Part II—Constitution, functions and powers
    [Show full text]
  • Mexico Is Not Colombia Alternative Historical Analogies for Responding to the Challenge of Violent Drug-Trafficking Organizations
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Supporting Case Studies Christopher Paul, Colin P. Clarke, Chad C. Serena C O R P O R A T I O N NATIONAL SECURITY RESEARCH DIVISION Mexico Is Not Colombia Alternative Historical Analogies for Responding to the Challenge of Violent Drug-Trafficking Organizations Supporting Case Studies Christopher Paul, Colin P.
    [Show full text]
  • Act 1925 by Superintendent Jason Byrnes, AFP Operations Coordination Centre
    he Body Snatchers – Peace Oicers and the Peace Oicers Act 1925 By Superintendent Jason Byrnes, AFP Operations Coordination Centre Few episodes in the history of and decorated former soldierb to whom interstate trade and transport. Feeling federal policing in Australia are as socialism (and its links to Bolshevism)c threatened by what it regarded as a controversial as the circumstances posed a threat to national security. serious bolshevist threat, the Bruce surrounding the passing of the Peace Indeed, the protection of national security Government acted with “ardent fervour”h Oicers Act 1925. was one of Bruce’s three key priorities by deregistering the union. In 1925 d the Government also amended the he Peace Oicers legislation was created as Prime Minister, the other two being Immigration Act to enable the deportation in haste during an intense political crisis modernising the nation’s economy of foreign-born people who threatened when the NSW Government hindered the and improving Commonwealth / State e the peace, order or good governance of Commonwealth Government’s attempts relations. the Commonwealth. his action targeted to deport radical trade unionists. Due he political and ideological struggles Sydney-based Walsh and Johnson, as to the rushed nature of the legislation of post-war Australia were never more both had been born overseas.i he two however, the Commonwealth found present and intense than at the nation’s were ordered before a specially convened that after the political crisis had ports. he debate over balancing Deportation Tribunal. he Commonwealth passed its newly recruited ‘Peace employees’ and employers’ rights, was initially thwarted by NSW Labor Oicers’ were without a clearly deined couched within the paradigm of the mandate or function.
    [Show full text]
  • Origins of the Royal Commission on Intelligence and Security
    Origins of the Royal Commission on Intelligence and Security CJ Coventry LLB BA A thesis submitted in fulfilment of the requirements for the degree of Master of Arts (Research) School of Humanities and Social Sciences UNSW Canberra at ADFA 2018 i Thesis/Dissertation Sheet Surname/Family Name : COVENTRY Given Name/s : CAMERON JAMES Abbreviation for degree as give in the University calendar : MRes Faculty : UNSW Canberra School : School of Politics and International Studies Thesis Title : Origins of the Royal Commission on Intelligence and Security Abstract 350 words maximum: (PLEASE TYPE) This thesis explores the context in which the Royal Commission on Intelligence and Security, 1974-1977 came to be. The Whitlam Government wanted to reform the Australian Security Intelligence Organisation (ASIO) so as to depoliticise it and make it more effective in combating genuine threats to the state, including global terrorism. In early 1973 the government's reform was stalled as a result of the attorney-general's raid on ASIO offices. The Prime Minister announced in late 1973 that an inquiry into ASIO would arise at some point. The Australian Labor Party took the idea of a judicial inquiry into Australia's intelligence and security apparatus to the 1974 election. Within weeks of returning to office the Whitlam Government decided to launch the Royal Commission. Even by the time of the government's dismissal in 1975 the process of ASIO's reform was advanced. The decision to keep ASIO was made by Labor prior to the 1972 election. This was despite experiencing two decades of ASIO's ideological partisanship, which had consequences for Labor.
    [Show full text]
  • THE TWILIGHT of the BRITISH EMPIRE British Intelligence and Counter- Subversion in the Middle East, 1948−63
    Intelligence, Surveillance and Secret Warfare THE TWILIGHT OF THE BRITISH EMPIRE British Intelligence and Counter- Subversion in the Middle East, 1948−63 Chikara Hashimoto The Twilight of the British Empire Intelligence, Surveillance and Secret Warfare Series editors: Richard J. Aldrich, Rory Cormac, Michael S. Goodman and Hugh Wilford Published and forthcoming titles The Arab World and Western Intelligence: Analysing the Middle East, 1956–1981 Dina Rezk Chile, the CIA and the Cold War: A Transatlantic Perspective James Lockhart The CIA and the Pursuit of Security: History, Documents and Contexts Huw Dylan, David Gioe and Michael S. Goodman www.edinburghuniversitypress.com/series/isasw The Twilight of the British Empire British Intelligence and Counter- Subversion in the Middle East, 1948–63 Chikara Hashimoto Edited by Rory Cormac Edinburgh University Press is one of the leading university presses in the UK. We publish academic books and journals in our selected subject areas across the humanities and social sciences, combining cutting- edge scholarship with high editorial and production values to produce academic works of lasting importance. For more information visit our website: edinburghuniversitypress.com © Chikara Hashimoto, 2017 Edinburgh University Press Ltd The Tun – Holyrood Road 12(2f) Jackson’s Entry Edinburgh EH8 8PJ Typeset in 11/14 Sabon by Servis Filmsetting Ltd, Stockport, Cheshire printed and bound in Great Britain by CPI Group (UK) Ltd, Croydon CR0 4YY A CIP record for this book is available from the British Library ISBN 978 1 4744 1045 8 (hardback) ISBN 978 1 4744 1046 5 (webready PDF) ISBN 978 1 4744 1047 2 (epub) The right of Chikara Hashimoto to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988, and the Copyright and Related Rights Regulations 2003 (SI No.
    [Show full text]
  • Profits Over Patriotism: Black Market Crime in World War II Sydney
    Profits Over Patriotism: Black Market Crime in World War II Sydney Timothy Blum Black Market Dialogue: ‘But I can’t pay for those on my husband’s service pay.’ ‘Then get out for those who will’. Thesis submitted in partial fulfilment of the requirements of the degree of Bachelor of Arts (Honours) in History University of Sydney 2011 i Abstract This thesis examines the multi-faceted phenomenon of black market crime in World War II Sydney. Using previously classified archives, coupled with oral sources and newspaper articles I provide a complete survey of this phenomenon. As a concept the black market was a social construct with a level of stigma attached to offenders that would not exist in peace time. This was moral policing. I begin by discussing the relationship between the geography and morals of the city. Both women and men in Sydney related to the black market differently. I outline and evaluate the official response to the problem. I also examine broader community attitudes in relation to this issue. The research provided here should form the basis for a more comprehensive understanding of white-collar crime and the moral regulation of behaviour. Key words: Sydney, WW II, White-Collar, black market, moral regulation, economy. ii Acknowledgements There are a number of people I need to thank for making this thesis possible. Firstly I would like to thank the archive staff at the Australian War Memorial Research Centre in Canberra, for offering me advice and allowing me access to such fascinating material. I also thank the staff at the National Archives, Canberra, for being patient with my numerous queries, fast tracking my requests for declassification, and showing me how to correctly reference archives.
    [Show full text]
  • View Cyprus: Foundations of Peace
    CyprusFoundations of Peace 1964–2014 Commemorating Australian police peacekeeping in Cyprus Contributors Justine Adamek Greg Corin David King Brett Simpson Caroline Alde Mark Elm Bruce Kinsmore Rick Smeltink Estate of Richard Allatson Roy Farmer Steve Lamborn Paul Speirs Richard Anderson Bob Gillespie Michelle Lomas-Travers Reece Strachan Shane Austin Jennifer Graham Greg Lovell Ray Strong AFP Museum Collection Romi Gyergyak Stuart McDonald Graham Taylor Peter Baldwin Erica Hanisch Patrick Medway Jack Thurgar Alan Barbour Geoff Hazel Gerry Morris Mick Travers Terry Browne Karl Hermanson Paul Morris Rod Walker Kathy Burdett Ian Hill Adrian Norris Ron Weeks Jason Byrnes Mal Holst Steve Polden Paul Whittaker Andrea Coleman Fleur Jennings Mick Richards Melita Zielonko Dale Cooper Ray Johnson Trevor Sharp Contents Commissioner’s Foreword .......................1 A tradition of peacekeeping is born ........2 Cyprus, the UN and Australia ..................4 The Australian way ..................................6 First contingent .......................................8 Life on duty ............................................ 11 This publication is dedicated to the The early years . 11 hundreds of hard-working, compassionate and courageous Australian police who A country split . 12 have served in Cyprus since 1964. Working inside the buffer zone . 13 To view the on-line version and additional material, please visit: Humanitarian work . 18 http://www.afp.gov.au/cyprus50 Life on mission .......................................21 Ceremonies and awards
    [Show full text]