A Decade of Australian Anti-Terror Laws
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Safeguarding Your Organisation Against Terrorism Financing
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN: 978-1-921241-84-0 © Commonwealth of Australia [2009] This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney-General’s Department, 3-5 National Circuit, Barton ACT 2600 or posted at http://www.ag.gov.au/cca Table of Contents SECTION A: Introduction 3 SECTION B: Best Practice Principles 8 SECTION C: Australia’s international obligations 9 SECTION D: Listed individuals and organisations 10 SECTION E: Legal obligations 14 SECTION F: Due diligence 15 SECTION G: Transparency and accountability 17 M F I N A N C I N G S T T E R R O R I S ATION AGAIN S SAFEGUARDING YOUR ORGANI 1 What does this Guidance mean for Non-Profit Organisations (NPOs)? This Guidance is not a legal document. This Guidance is intended to help NPOs understand their obligations under Australian law. Like all Australian legal and natural persons, Australian NPOs must comply with Australian laws. The Australian Government recognises the vital contribution that NPOs make in Australia and overseas. In minimising the risk of misuse of NPOs, the Australian Government is mindful of the need to not disrupt or discourage legitimate NPO activities. This Guidance is intended to support NPOs to continue their important work. -
Williams V Commonwealth: Commonwealth Executive Power
CASE NOTE WILLIAMS v COMMONWEALTH* COMMONWEALTH EXECUTIVE POWER AND AUSTRALIAN FEDERALISM SHIPRA CHORDIA, ** ANDREW LYNCH† AND GEORGE WILLIAMS‡ A majority of the High Court in Williams v Commonwealth held that the Common- wealth executive does not have a general power to enter into contracts and spend public money absent statutory authority or some other recognised source of power. This article surveys the Court’s reasoning in reaching this surprising conclusion. It also considers the wider implications of the case for federalism in Australia. In particular, it examines: (1) the potential use of s 96 grants to deliver programs that have in the past been directly funded by Commonwealth executive contracts; and (2) the question of whether statutory authority may be required for the Commonwealth executive to participate in inter- governmental agreements. CONTENTS I Introduction .............................................................................................................. 190 II Background ............................................................................................................... 191 III Preliminary Issues .................................................................................................... 194 A Standing ........................................................................................................ 194 B Section 116 ................................................................................................... 196 C Validity of Appropriation .......................................................................... -
THE CASE for CHANGE a Review of Pakistan’S Anti-Terrorism Act of 1997
THE CASE FOR CHANGE A Review of Pakistan’s Anti-Terrorism Act of 1997 October 2013 A Report by the Research Society of International Law, Pakistan i PROJECT RESEARCHERS ISLAMABAD DIVISION Jamal Aziz Muhammad Oves Anwar LL.B (London), LL.M (UCL) LL.B (London), LL.M (SOAS), LL.M (Vienna), D.U. (Montpellier) Saad-ur-Rehman Khan Abid Rizvi LL.B (London), LL.M (Manchester) BA-LL.B (LUMS), LL.M (U.Penn) Aleena Zainab Alavi Zainab Mustafa LL.B (London), LL.M (Warwick) LL.B (London) LAHORE DIVISION Ali Sultan Amna Warsi J.D. (Virginia) LL.M (Punjab) Ayasha Warsi Moghees Khan LL.M (Punjab) LL.B (London), LL.M (Warwick) Mishael Qureshi LL.B (Lond.), LL.M (Sussex) INTERNS Muhammad Bin Majid Muhammad Abdul Ghani Awais Ahmad Khan Ghauri This material may not be copied, reproduced or transmitted in whole or in part without attribution to the Research Society of International Law (RSIL). Unless noted otherwise, all material is property of RSIL. Copyright © Research Society of International Law 2013. ii CONTENTS SUMMARY OF RECOMMENDATIONS .......................................................................................... IX CHAPTER ONE ....................................................................................................................................... 7 TERRORISM IN THE PAKISTANI CONTEXT .................................................................................. 7 1.1 TRENDS IN TERRORISM ........................................................................................................... 7 1.2 THE ANATOMY OF TERRORISM -
Preventative Detention and Covert Search Warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002
Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 NSW Ombudsman NSW Ombudsman Level 24, 580 George Street Sydney NSW 2000 Phone 02 9286 1000 Toll free (outside Sydney Metro Area): 1800 451 524 Facsimile: 02 9283 2911 Telephone typewriter: 02 9264 8050 Website: www.ombo.nsw.gov.au Email [email protected] ISBN 978-1-925061-41-3 © Crown Copyright, NSW Ombudsman, September 2014 This work is copyright, however material from this publication may be copied and published by State or Federal Government Agencies without permission of the Ombudsman on the condition that the meaning of the material is not altered and the NSW Ombudsman is acknowledged as the source of the material. Any other persons or bodies wishing to use material must seek permission. Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 September 2014 NSW Ombudsman Foreword In 2005 the Terrorism (Police Powers) Act 2002 was amended to give police and the NSW Crime Commission special powers to deal with suspected terrorist acts. Under Part 2A, police may apply to the Supreme Court for a preventative detention order to detain a person without charge for up to two weeks, in order to prevent a suspected imminent terrorist act or to preserve evidence of a terrorist act which has occurred. -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. -
Submission by the Australian Federal Police Parliamentary Joint
Parliamentary Joint Committee on Intelligence and Security Review of the Australian Citizenship renunciation by conduct and cessation provisions August 2019 Submission by the Australian Federal Police UNCLASSIFIED Contents Contents .............................................................................................................................. 2 Introduction .......................................................................................................................... 3 Terms of Reference ............................................................................................................... 3 Threat Environment ............................................................................................................... 3 Benefit to Law Enforcment ...................................................................................................... 4 Effectiveness in Combatting Terrorism................................................................................... 4 Conclusion ........................................................................................................................... 6 2 UNCLASSIFIED UNCLASSIFIED Introduction The AFP welcomes the request by the Parliamentary Joint Committee on Intelligence and Security to make a submission to the Committee as part of its review of the Australian citizenship renunciation by conduct and cessation provisions. The Committee has requested the AFP comment in particular on the extent to which the citizenship loss provisions have been effective -
Counter-Terrorism Bill
Counter-Terrorism Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 65—EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following statement under section 19(1)(a) of the Human Rights Act 1998: In my view the provisions of the Counter-Terrorism Bill are compatible with the Convention rights. HL Bill 65 54/3 Counter-Terrorism Bill CONTENTS PART 1 POWERS TO GATHER AND SHARE INFORMATION Power to remove documents for examination 1 Power to remove documents for examination 2 Offence of obstruction 3 Items subject to legal privilege 4 Record of removal 5 Retention of documents 6 Access to documents 7 Photographing and copying of documents 8 Return of documents 9 Power to remove documents: supplementary provisions Power to take fingerprints and samples from person subject to control order 10 Power to take fingerprints and samples: England and Wales 11 Power to take fingerprints and samples: Scotland 12 Power to take fingerprints and samples: Northern Ireland 13 Power to take fingerprints and samples: transitional provision Retention and use of fingerprints and samples 14 Material subject to the Police and Criminal Evidence Act 1984 15 Material subject to the Police and Criminal Evidence (Northern Ireland) Order 1989 16 Material subject to the Terrorism Act 2000: England and Wales and Northern Ireland 17 Material subject to the Terrorism Act 2000: Scotland 18 Material not subject to existing statutory restrictions Disclosure of information and the -
Terrorism Act 2000
Status: This version of this Act contains provisions that are prospective. Changes to legislation: There are outstanding changes not yet made by the legislation.gov.uk editorial team to Terrorism Act 2000. Any changes that have already been made by the team appear in the content and are referenced with annotations. (See end of Document for details) Terrorism Act 2000 2000 CHAPTER 11 An Act to make provision about terrorism; and to make temporary provision for Northern Ireland about the prosecution and punishment of certain offences, the preservation of peace and the maintenance of order. [20th July 2000] Be it enacted by the Queen’s most Excellent Majesty, by and with the advice and consent of the Lords Spiritual and Temporal, and Commons, in this present Parliament assembled, and by the authority of the same, as follows:— Annotations: Modifications etc. (not altering text) C1 Act modified (21.2.2009) by The Banking Act 2009 (Parts 2 and 3 Consequential Amendments) Order 2009 (S.I. 2009/317), art. 3, Sch. C2 Act modified (1.12.1997) by S.I. 1994/1405, art. 7; London Gazette reissue number 55144 (as amended (26.10.2006) by S.I. 2006/2627, art. 2 and (2.1.2008) by S.I. 2007/3579, art. 3) PART I INTRODUCTORY 1 Terrorism: interpretation. (1) In this Act “terrorism” means the use or threat of action where— (a) the action falls within subsection (2), (b) the use or threat is designed to influence the government [F1or an international governmental organisation] or to intimidate the public or a section of the public, and (c) the use or threat is made for the purpose of advancing a political, religious [F2, racial] or ideological cause. -
Al Muhajiroun and Islam4uk: the Group Behind the Ban
Developments in Radicalisation and Political Violence Al Muhajiroun and Islam4UK: The group behind the ban Catherine Zara Raymond May 2010 Developments in Radicalisation and Political Violence Developments in Radicalisation and Political Violence is a series of papers published by the International Centre for the Study of Radicalisation and Political Violence (ICSR). It features papers by leading experts, providing reviews of existing knowledge and sources and/or novel arguments and insights which are likely to advance our understanding of radicalisation and political violence. The papers are written in plain English. Authors are encouraged to spell out policy implications where appropriate. Editor Prof. Harvey Rubin University of Pennsylvania Dr John Bew ICSR, King’s College London Editorial Assistant Katie Rothman International Centre for the Study of Radicalisation and Political Violence (ICSR) Editorial Board Prof. Sir Lawrence Freedman King’s College London Dr. Boaz Ganor Interdisciplinary Center Herzliya Dr. Peter Neumann King’s College London Dr Hasan Al Momani Jordan Institute of Diplomacy Contact All papers can be downloaded free of charge at www.icsr.info. To order hardcopies, please write to mail@icsr. info. For all matters related to the paper series, please write to: ICSR King’s College London, 138-142 Strand London WC2R 1HH United Kingdom © ICSR 2010 1 Summary On 2nd January 2010, Islam4UK, an off-shoot of the extremist Islamist group Al Muhajiroun, announced their intention to stage a procession through Wootton Bassett, a town which is now synonymous in the eyes of the British public with the funerals of UK soldiers killed in Iraq and Afghanistan. Less than two weeks later the group was proscribed by the British government under the Terrorism Act 2000. -
The Use of the Internet for Terrorist Purposes
The use of the Internet for terrorist purposes In collaboration with the UNITED NATIONS COUNTER-TERRORISM IMPLEMENTATION TASK FORCE UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED NATIONS New York, 2012 © United Nations, September 2012. All rights reserved. The designations employed and the presentation of material in the present publica- tion do not imply the expression of any opinion whatsoever on the part of the Sec- retariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are cor- rect at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban Ki-moon Secretary-General of the United Nations Foreword Executive Director United Nations Office on Drugs and Crime The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role inproviding assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the international legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards. -
American Exceptionalism and Government Shutdowns: a Comparative Constitutional Reflection on the 2013 Lapse in Appropriations
AMERICAN EXCEPTIONALISM AND GOVERNMENT SHUTDOWNS: A COMPARATIVE CONSTITUTIONAL REFLECTION ON THE 2013 LAPSE IN APPROPRIATIONS KATHARINE G. YOUNG∗ INTRODUCTION ............................................................................................... 991 I. THE U.S. SHUTDOWN AND POLITICAL DYSFUNCTION ......................... 993 II. COMPARATIVE PERSPECTIVES ON LEGISLATIVE FINANCIAL IMPASSE ............................................................................................... 998 III. BEHIND CONSTITUTIONAL DESIGN: AUSTRALIA’S FINANCIAL IMPASSE ............................................................................................. 1007 IV. CONSTITUTIONAL RESPONSE TO FINANCIAL IMPASSE: THREE FRAMES ............................................................................................. 1018 CONCLUSION ................................................................................................. 1024 INTRODUCTION The shutdown of the United States government for sixteen days in October 2013 symbolized a distinctively American version of political failure. Failure is, of course, not uncommon in the lifecycles of modern constitutional government. Between 2010 and 2011, Belgium spent more than 530 days without an elected government, due to a political gridlock between politicians from the Flemish-speaking North and the French-speaking South.1 And between 2006 and 2013, Canada’s Parliament was suspended four times at the Prime Minister’s request, amounting to a stoppage of 181 days.2 The United States, Belgium, and -
Decennium 7/7 the United Kingdom Terrorist Attacks on July 7, 2005, and the Evolution of Anti-Terrorism Policies, Laws, and Practices
Decennium 7/7 The United Kingdom terrorist attacks on July 7, 2005, and the evolution of anti-terrorism policies, laws, and practices By Prof. Dr. Dr. Clive Walker , Leeds I. Introduction might be termed ‘neighbour terrorism’ 5 has taken centre- 6 The tenth anniversary (the Decennium) of the 7 July 2005, stage rather than terrorism from alien sources. London transport bombings provides a poignant but appro- The human and material wreckage of 7/7 was also the priate juncture at which to reflect upon the lessons learned catalyst for signalling major changes in the long history of from those coordinated and severe terrorist attacks. 1 The United Kingdom counter-terrorism policy and laws. A com- killing of 52 civilians by four ‘home-grown’ extremists, who prehensive strategy, entitled CONTEST, which had been prepared in secret by 2003, 7 was finally unveiled to the public had been inspired by the violent ideology of Al Qa’ida, 8 marked the worst terrorist atrocity in the United Kingdom in 2006. The strategy includes the traditional approaches of since the Lockerbie air disaster of 1988. 2 The seminal im- ‘Pursuit’ (policing and criminal justice tactics). Protective portance of 7/7 resides in both the nature of the attack and the security (dubbed ‘Prepare’ and ‘Protect’) is also highlighted, official response, both marking a transition to a new, but not and this element builds on the Promethean and expensive duties of planning and resilience established in the Civil wholly distinct, stage of United Kingdom terrorism and coun- 9 ter-terrorism. Contingencies Act 2004. However, CONTEST also address- As for the nature of the terrorism, the characteristics of ji- es the more pioneering and problematic agenda of ‘Prevent’ – hadi terrorism, 3 with its vaulting ambitions, strident ideology ‘tackling disadvantage and supporting reform […] deterring those who facilitate terrorism and those who encourage oth- and disregard for civilian casualties signified new challenges 10 for the state authorities and public alike.