COMMUNITY and RADICALISATION an Examination of Perceptions, Ideas, Beliefs and Solutions Throughout Australia

Total Page:16

File Type:pdf, Size:1020Kb

COMMUNITY and RADICALISATION an Examination of Perceptions, Ideas, Beliefs and Solutions Throughout Australia COMMUNITY AND RADICALISATION An examination of perceptions, ideas, beliefs and solutions throughout Australia Dr Hussein Tahiri, Victoria Police Professor Michele Grossman, Victoria University Release date: September 2013 The views expressed in this report are those of the authors and do not necessarily reflect those of the project partners: Victoria Police, Victoria University or the Australian Multicultural Foundation. The project partners are not responsible or liable for any inaccurate or incorrect statements contained in this report. The views expressed by government stakeholders in this report do not necessarily reflect those of the Australian Government or State and Territory Governments. © 2013 Victoria Police and Victoria University Published by: Counter-Terrorism Coordination Unit, Victoria Police, 637 Flinders Street, Docklands, Victoria 3008 Australia This publication is copyright. No part of this report may be used or reproduced in any manner whatsoever without written permission. No part of this report may be stored in a retrieval system or transmitted in any form or by any means including electronic, electrostatic, magnetic tape, mechanical, photocopying, recording, or otherwise without the prior permission in writing of the publishers except in accordance with the provisions of the Australian Copyright Act 1968. ACKNOWLEDGEMENTS Community and Radicalisation: an We extend special thanks to the We would also like to thank Victoria examination of perceptions, ideas, AMF’s Executive Director, Dr Hass University for various aspects of beliefs and solutions throughout Dellal, who facilitated the focus technical and administrative support Australia is based on a collaborative groups conducted during the for the project, in particular Ms Jo research project conducted by course of the project. Lynn Cain Agius, Mr Kailesh Gunesh and Victoria Police, Victoria University and Athalia Zwartz from the AMF Ms Niky Poposki. and the Australian Multicultural also provided valuable support in Foundation (AMF). The research organising and preparing the data Finally, we extend our deep program was funded by the from focus group participants. appreciation to the many individuals, Countering Violent Extremism groups and organisations throughout Sub-Committee (CVESC) of the We offer the same special thanks Australia who offered their views Australia-New Zealand Counter- to Kevin Dunn, Professor of Human and opinions and were generous in Terrorism Committee. Geography and Urban Studies and sharing their experiences with the Dean, School of Social Sciences research team. We are very grateful The authors are grateful to all and Psychology at University of for their forthright and passionate project and funding partners for Western Sydney. Professor Dunn responses. This project would not their support. We would also served as external academic have been possible without their like to thank the Commonwealth peer reviewer for this study and commitment and contribution. Attorney-General’s Department provided generous, in-depth and and Australia’s States and constructive expert feedback Hussein Tahiri and Territories for their participation on the report in draft form. Michele Grossman and constructive comments. June 2013 TABLE OF CONTENTS Executive Summary 6 Aims and scope of study . .7 Methodology . .7 Limitations . .8 Summary of key findings . .8 Introduction 16 Methodology 18 Overview . 19 Key assumptions . 19 Scope of the study. 20 Limitations . 20 Data sources . 20 Methods of data collection. 21 Interviews . 21 Focus groups . 21 Written submissions . 23 Data analysis . 23 Chapter 1: The concepts of radicalisation and extremism 24 The role of violence in concepts of radicalisation and extremism . 29 Conclusion. 30 Chapter 2: Causes and drivers of radicalisation and extremism 31 Individual and personal factors . 33 Socio-cultural factors. 39 Religious and community leadership . 45 Political factors . 47 Conclusion. 50 Chapter 3: Violence as a solution or response to grievances and problems 52 The use of violence as a response to grievances or problems . 53 Social exclusion, marginalisation and disenfranchisement . 55 Can violence ever be justified? . 58 Conclusion. 61 Chapter 4: The efficacy of democratic processes to address political grievances 62 Democratic processes are effective in addressing political grievances . 63 The limitations of democracy . 64 Conclusion. 68 Chapter 5: Perceived links between Islam, extremism and terrorism 69 Media drives perceptions of the relationship between Islam and terrorism. 70 Non-media drivers of the perceived link between Islam and terrorism . 71 Does a perceived link between Islam and terrorism affect people’s general view of Muslims? 75 Conclusion. 77 Chapter 6: The role of media within discourses of radicalisation and extremism 79 Part I: Television, radio and print. 80 Part I: Conclusion . 85 Part II: The internet and other social media . 86 Social dynamics of the internet and other social media . 86 Social impacts of the internet and other social media. 90 Social challenges of the internet and other social media . 92 Part II: Conclusion . 95 Chapter 7: Perceptions of Operations Pendennis and Neath 98 Procedural integrity of Operations Pendennis and Neath and their outcomes . 99 Operations Neath and Pendennis were not justified . .101 Perceptions of operational policing during Pendennis and Neath . .101 Conclusion. .105 Chapter 8: Preventing or mitigating the threat of radicalisation and violent extremism 106 Counter-narratives of radicalisation and extremism . .107 Who should be developing and disseminating counter-narratives? . .107 Who should counter-narratives be aimed at? . .108 What kinds of counter-narratives work best? . .109 How can we make violent extremism less appealing? . .110 The role of police in preventing or mitigating violent extremism . .113 The role of government in preventing or mitigating violent extremism. .114 Empower communities to identify how they can best contribute . .114 Education and understanding can best counter violent extremism. .115 Engaging communities in the process of social cohesion . .116 The role of communities in preventing or mitigating violent extremism . .119 All communities . .119 Muslim Australian communities . .120 Challenges for Muslim communities in cooperating with counter-extremism initiatives . .120 The role of ordinary people in preventing or mitigating violent extremism . .122 Conclusion. .124 Chapter 9: Conclusion: Cross-cutting themes and perspectives on community and radicalisation 127 Chapter 10: Considerations for the future 135 Considerations for governments at all levels . .136 Considerations for policing agencies . .137 Considerations for communities. .137 Considerations for government-community partnerships . .137 Improving understanding and acceptance of Muslims in Australia . .137 Equipping young people to become more resilient . .138 About the authors 139 EXECUTIVE SUMMARY EXECUTIVE SUMMARY 7 Aims and scope of study Methodology 4. The ability to hear a range of community and stakeholder Community and Radicalisation: an Four key interrelated assumptions voices across a broad Examination of Perceptions, Ideas, informed the study’s design and purposive national sample Beliefs and Solutions throughout methodology: is a critical component of Australia was a year-long national Australia’s ability to understand study designed and conducted as a 1. Within the last decade, forms and engage with community qualitative research project through of terrorism and terrorism- concerns, and solutions, in a partnership between Victoria related activities conducted developing effective strategies Police, Victoria University and the by organisations and for addressing contemporary Australian Multicultural Foundation. individuals who claim to act forms of radicalisation, The key aims of the study were: in the name of Islam have extremism and terrorism. dominated the domestic and • To identify how communities international discussion on, In addition to these assumptions, the understand the meanings and response to, terrorism. study design also included a focus of and relationship between on exploring public perceptions radicalisation and extremism. 2. Many Muslim and non-Muslim of two recent nationally publicised communities, in Australia as counter-terrorism operations – • To explore community elsewhere, have been disturbed Operation Pendennis (Melbourne perceptions of the underlying by the way in which – especially and Sydney) and Operation Neath drivers for radicalisation following the US terrorist (Melbourne) – and their subsequent and extremism. attacks of 9/11 and the British arrests, trials, convictions and bombings of 7/7 – perceptions • To explore perceptions of sentencing. While Victoria Police of Islam as a religion and a the impact of radicalisation has examined the implications culture have seemingly become and extremism on sense of of Operation Pendennis from an inextricably associated with community and social harmony internal and inter-agency operational terrorism. This perception and cohesion. perspective, considerably less is largely a consequence of effort has been devoted to date the occurrence and nature of • To solicit community views in assessing its social impacts acts of terrorism and violent about effective approaches to for both Muslim and non-Muslim extremism perpetrated by and solutions for eliminating or communities throughout Australia. reducing the threat of violent those who claim to act in the extremism in Australia.
Recommended publications
  • Safeguarding Your Organisation Against Terrorism Financing
    Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN: 978-1-921241-84-0 © Commonwealth of Australia [2009] This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney-General’s Department, 3-5 National Circuit, Barton ACT 2600 or posted at http://www.ag.gov.au/cca Table of Contents SECTION A: Introduction 3 SECTION B: Best Practice Principles 8 SECTION C: Australia’s international obligations 9 SECTION D: Listed individuals and organisations 10 SECTION E: Legal obligations 14 SECTION F: Due diligence 15 SECTION G: Transparency and accountability 17 M F I N A N C I N G S T T E R R O R I S ATION AGAIN S SAFEGUARDING YOUR ORGANI 1 What does this Guidance mean for Non-Profit Organisations (NPOs)? This Guidance is not a legal document. This Guidance is intended to help NPOs understand their obligations under Australian law. Like all Australian legal and natural persons, Australian NPOs must comply with Australian laws. The Australian Government recognises the vital contribution that NPOs make in Australia and overseas. In minimising the risk of misuse of NPOs, the Australian Government is mindful of the need to not disrupt or discourage legitimate NPO activities. This Guidance is intended to support NPOs to continue their important work.
    [Show full text]
  • Preventative Detention and Covert Search Warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002
    Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 NSW Ombudsman NSW Ombudsman Level 24, 580 George Street Sydney NSW 2000 Phone 02 9286 1000 Toll free (outside Sydney Metro Area): 1800 451 524 Facsimile: 02 9283 2911 Telephone typewriter: 02 9264 8050 Website: www.ombo.nsw.gov.au Email [email protected] ISBN 978-1-925061-41-3 © Crown Copyright, NSW Ombudsman, September 2014 This work is copyright, however material from this publication may be copied and published by State or Federal Government Agencies without permission of the Ombudsman on the condition that the meaning of the material is not altered and the NSW Ombudsman is acknowledged as the source of the material. Any other persons or bodies wishing to use material must seek permission. Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 September 2014 NSW Ombudsman Foreword In 2005 the Terrorism (Police Powers) Act 2002 was amended to give police and the NSW Crime Commission special powers to deal with suspected terrorist acts. Under Part 2A, police may apply to the Supreme Court for a preventative detention order to detain a person without charge for up to two weeks, in order to prevent a suspected imminent terrorist act or to preserve evidence of a terrorist act which has occurred.
    [Show full text]
  • A Decade of Australian Anti-Terror Laws
    A DECADE OF AUSTRALIAN ANTI-TERROR LAWS GEORGE WILLIAMS* [This article takes stock of the making of anti-terror laws in Australia since 11 September 2001. First, it catalogues and describes Australia’s record of enacting anti-terror laws since that time. Second, with the benefit of perspective that a decade brings, it draws conclusions and identifies lessons about this body of law for the Australian legal system and the ongoing task of protecting the community from terrorism.] CONTENTS I Introduction ..........................................................................................................1137 II Australia’s Anti-Terror Laws ................................................................................1139 A Number of Federal Anti-Terror Laws ......................................................1140 1 Defining an Anti-Terror Law ......................................................1141 2 How Many Anti-Terror Laws? ....................................................1144 B Scope of Federal Anti-Terror Laws .........................................................1146 1 The Definition of a ‘Terrorist Act’ ..............................................1146 2 Offence of Committing a ‘Terrorist Act’ and Preparatory Offences ......................................................................................1146 3 Proscription Regime ....................................................................1147 4 Financing Offences and Regulation ............................................1147 (a) Offences ..........................................................................1147
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Submission by the Australian Federal Police Parliamentary Joint
    Parliamentary Joint Committee on Intelligence and Security Review of the Australian Citizenship renunciation by conduct and cessation provisions August 2019 Submission by the Australian Federal Police UNCLASSIFIED Contents Contents .............................................................................................................................. 2 Introduction .......................................................................................................................... 3 Terms of Reference ............................................................................................................... 3 Threat Environment ............................................................................................................... 3 Benefit to Law Enforcment ...................................................................................................... 4 Effectiveness in Combatting Terrorism................................................................................... 4 Conclusion ........................................................................................................................... 6 2 UNCLASSIFIED UNCLASSIFIED Introduction The AFP welcomes the request by the Parliamentary Joint Committee on Intelligence and Security to make a submission to the Committee as part of its review of the Australian citizenship renunciation by conduct and cessation provisions. The Committee has requested the AFP comment in particular on the extent to which the citizenship loss provisions have been effective
    [Show full text]
  • Review of Australia's Counter-Terrorism Machinery
    © Commonwealth of Australia 2015 ISBN 978-1-925237-36-8 (Hardcopy) ISBN 978-1-925237-37-5 (PDF) ISBN 978-1-925237-38-2 (DOC) Ownership of intellectual property rights in this publication Unless otherwise noted, copyright (and any other intellectual property rights, if any) in this publication is owned by the Commonwealth of Australia (referred to below as the Commonwealth). Creative Commons licence With the exception of the Coat of Arms, this publication is licensed under a Creative Commons Attribution 3.0 Australia Licence. Creative Commons Attribution 3.0 Australia Licence is a standard form license agreement that allows you to copy, distribute, transmit and adapt this publication provided that you attribute the work. A summary of the licence terms is available from http://creativecommons.org/licenses/by/3.0/au/deed.en. The full licence terms are available from http://creativecommons.org/licenses/by/3.0/au/legalcode. The Commonwealth’s preference is that you attribute this publication (and any material sourced from it) using the following wording: Source: Licensed from the Commonwealth of Australia under a Creative Commons Attribution 3.0 Australia Licence. The Commonwealth of Australia does not necessarily endorse the content of this publication. Use of the Coat of Arms The terms under which the Coat of Arms can be used are set out on the Department of the Prime Minister and Cabinet website (see http://www.dpmc.gov.au/guidelines/). Contents EXECUTIVE SUMMARY iv RECOMMENDATIONS vi PART ONE: THE STATE OF PLAY 1 One: Australia – Our Evolving
    [Show full text]
  • Anti-Terrorism Laws: ASIO, the Police and You
    0 Anti-Terrorism Laws: ASIO, the Police and You -+---------------------------------------------------------- Copyright © 2017, Australian Muslim Civil Rights Advocacy Network (AMCRAN) and the Muslim Legal Network (NSW). Permission to copy this booklet or parts of this booklet, in electronic, mechanical or any other form, is granted without fee, on condition that the document is attributed to AMCRAN and the Muslim Legal Network (NSW). Disclaimer If you find yourself in a difficult situation, you should always seek advice from a lawyer. This booklet is not intended as legal advice and should not be relied on as a substitute for legal advice. AMCRAN, the Muslim Legal Network (NSW) and their partners exclude liability for any loss suffered by any person resulting in any way from the use of, or reliance on, this material or its text. The information in this booklet reflects the law as it stands on 1 February 2017. The laws may have changed since then. You should check with your lawyer for changes to the law. You may also check our website for updates, translations and more information: www.muslimlegalnetworknsw.com Anti-Terrorism Laws: ASIO, the Police and You 1 Author: Australian Muslim Civil Rights Advocacy Network, Muslim Legal Network (NSW). Title: Anti-terrorism laws: ASIO, the Police and You: A plain English guide to anti-terrorism laws in Australia / Australian Muslim Civil Rights Advocacy Network, Muslim Legal Network (NSW). Edition: 4th edition Publisher: Wollongong, N.S.W.: Australian Muslim Civil Rights Advocacy Network, Muslim Legal Network (NSW). ISBN: 9780980436143 (paperback) Subjects: Australian Security Intelligence Organisation. Australian Federal Police. Terrorism--Prevention--Law and legislation.
    [Show full text]
  • Preparedness to Respond to Terrorism Incidents: Essential Services and Critical Infrastructure 1 Executive Summary
    1 Executive summary 1.1 Introduction The terrorist attacks in the United States in 2001 introduced a new and confronting dimension to the international security environment. Later attacks in Bali, Madrid, Jakarta and London confirmed that the terrorism threat is not limited to the United States. While Australia has not been directly attacked by terrorists, in recent times, its citizens and interests have been attacked offshore. Since 2001, Australia’s national counter-terrorism alert has been at the ‘medium’ level, meaning a terrorist attack within Australia could occur. The 11 September 2001 terrorist attacks and the subsequent October 2002 Bali bombings prompted reform and enhancement of the national and Victorian counter-terrorism arrangements, through the introduction of new arrangements and legislation and the improvement of counter-terrorism capabilities. Australia’s counter-terrorism capability operates through a cooperative partnership between national, state and territory jurisdictions, with joint responsibility for developing and maintaining nationwide capability. The Commonwealth has the national coordination responsibility. The formation of the National Counter-Terrorism Committee (NCTC) in 2002 has driven the development of an approach to prepare for, respond to, and recover from potential terrorist attacks. Commonwealth, state and territory representatives make up the NCTC, which, among other things, is responsible for maintaining the national counter-terrorism plan. The plan sets out Australia’s high-level strategy to prevent, and deal with acts of terrorism in Australia and its territories. It addresses capability, prevention, preparedness, response and recovery, and policy development, coordination and strategic arrangements. 1.1.1 Background In November 2002 the Victorian government released its counter-terrorism policy statement Enhancing Victoria’s Domestic Security: New measures for the fight against terrorism.
    [Show full text]
  • Statutory Review of the Terrorism (Extraordinary Temporary Powers)
    2021 THE LEGISLATIVE ASSEMBLY FOR THE AUSTRALIAN CAPITAL TERRITORY REVIEW OF THE TERRORISM (EXTRAORDINARY TEMPORARY POWERS) ACT 2006 Presented by Shane Rattenbury MLA Attorney-General STATUTORY REVIEW Terrorism (Extraordinary Temporary Powers) Act 2006 Attorney-General April 2021 Statutory review: Terrorism (Extraordinary Temporary Powers) Act 2006 1 CONTENTS 1. EXECUTIVE SUMMARY..................................................................3 2. INTRODUCTION .............................................................................4 3. REVIEW..............................................................................................6 Terms of reference ................................................................................. 6 Overarching objections to the Act ............................................................ 6 Overall operation of the Act..................................................................... 6 Preamble............................................................................................... 7 Part 1: Preliminary .................................................................................. 8 Part 2: Preventative detention orders ..................................................... 10 A measure of last resort ............................................................................................................................... 10 Applying for and making PDOs .................................................................................................................... 10
    [Show full text]
  • Insurance Coverage for Cyber Terrorism in Australia
    Insurance Coverage for Cyber Terrorism in Australia 1 Insurance Coverage for Cyber Terrorism in Australia PUBE Please cite this publication as: OECD (2020), Insurance Coverage for Cyber Terrorism in Australia, www.oecd.org/finance/insurance/Insurance-Coverage-for-Cyber-Terrorism-in-Australia.htm This work is published under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD or of the governments of its member countries or those of the European Union. This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. © OECD 2020 3 Foreword The increasing integration of digital technologies into business and infrastructure management and operations has greatly enhanced efficiency but has also led to new vulnerabilities that can be exploited by terrorists and other politically motivated actors to cause harm and economic disruption. In particular, the increasing digitalisation of operational technologies, such as building management systems and industrial control systems, the proliferation of connected devices (“Internet of Things”) and the automation of transport systems will greatly expand the potential for cyber-attacks to lead to serious damage to property, bodily injury and disruptions to critical infrastructure services. A number of real-life examples of cyber-attacks on operational technologies have led to property damage and/or serious economic disruption, including attacks that resulted in blackouts in the Ukraine and a fire at an industrial facility in Germany.
    [Show full text]
  • Preventative Detention in Peace, War, and the Age of Terrorism in Australia and the United States: a Comparative Constitutional Analysis
    PREVENTATIVE DETENTION IN PEACE, WAR, AND THE AGE OF TERRORISM IN AUSTRALIA AND THE UNITED STATES: A COMPARATIVE CONSTITUTIONAL ANALYSIS Katherine J. Nesbitt A thesis submitted in fulfilment of the requirements for the degree of Master of Laws Faculty of Law University of NSW PLEASE TYPE THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dlssertatlon Sheet Surname or Family name: Nesbitt First name: Katherine Other name/s: Jackson Abbreviation for degree as given in the University calendar: LLM School: Faculty: Law Title: Preventative Detention in Peace, War, and the Age of Terrorism in Australia and the United States: A Comparative Constitutional Analysis Abstract 350 words maximum: (PLEASE TYPE) Since the September 11 terrorist attacks, the United States and Australian governments have asserted that the threat o f terrorism requires the adoption o f preventative detention strategies to authorize the arrest and detention o f terrorists before they carry out their horrific acts. In the United States, the Bush Administration has authorized the preventative, and potentially indefinite, detention o f terrorist suspects as “ enemy combatants” or as “ material witnesses.” In Australia, Parliament passed legislation to amend its criminal code to authorize the imposition o f preventative detention and control orders in cases o f terrorism. This thesis examines and compares these preventative detention strategies employed by the US and Australia in the “ war on terrorism,” and analyses their constitutionality in light o f the US Supreme Court and Australian High Court precedent addressing the legality o f administrative detention in both times o f peace and times o f war. While the US Supreme Court, armed with the Bill o f Rights, has been more assertive in setting limits on the authority to detain individuals without charges, the analysis o f preventative detention in both countries has been confused and conflicting.
    [Show full text]
  • Fear of Terrorism: Legislation and Perceived Loss of Civil Liberties
    Edith Cowan University Research Online Theses : Honours Theses 2010 Fear of terrorism: Legislation and perceived loss of civil liberties Finola Richardson Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses_hons Part of the Social Psychology Commons Recommended Citation Richardson, F. (2010). Fear of terrorism: Legislation and perceived loss of civil liberties. https://ro.ecu.edu.au/theses_hons/1343 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses_hons/1343 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.
    [Show full text]