Terrorism in Australia: Myth Or Reality? a Psychometric Study Into the Western Australian Public's Perception of Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism in Australia: Myth Or Reality? a Psychometric Study Into the Western Australian Public's Perception of Terrorism Edith Cowan University Research Online Theses : Honours Theses 2010 Terrorism in Australia: Myth or reality? A psychometric study into the Western Australian public's perception of terrorism Richard Sargent Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses_hons Part of the Quantitative Psychology Commons, and the Social Psychology Commons Recommended Citation Sargent, R. (2010). Terrorism in Australia: Myth or reality? A psychometric study into the Western Australian public's perception of terrorism. https://ro.ecu.edu.au/theses_hons/1240 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses_hons/1240 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. USE OF THESIS The Use of Thesis statement is not included in this version of the thesis. Terrorism in Australia: Myth or Reality? A Psychometric Study into the Western Australian Public's Perception of Terrorism By Richard Sargent. BSc (Security) A Thesis Submitted in Partial Fulfilment of the Requirements for the Award of Bachelor of Science (Security) Honours. School of Computer and Security Science Faculty of Computing, Health & Science Edith Cowan University Principal Supervisor Dr David Jonathan Brooks Submission Date 11 ABSTRACT Terrorism is not a new concept as terrorist individuals and organisations since time immemorial have used the threat of violence or actual violence to generate fear in individuals, organisations and governments alike. Fear is a powerful weapon and it is used in order to gain political, ideological or religious objectives. The attacks on the World Trade Centre and the Pentagon on the 11th September 2001 (9/11) highlighted the dangers of the inadequate intelligence, border security and hmnigration practices that led to this event. The attacks were a security wake up call not only for the United States of America but for the entire world. The 9/11 attacks and other more recent terrorist attacks such as the Bali (lih October 2002 & 1st October 2005), Madrid (11th March 2004) and London (ih July 2005) bombings have sent security shockwaves around the world, as governments scramble to ensure that their own anti-terrorism security strategies are adequate to meet this new threat. The Federal Australian government undertook a range of security reviews and participated in a number of regional forums, bilateral pacts and international counter terrorism aid partnerships. Domestically, Australia also enhanced its capacity to respond to a possible terrorism event through multiple security enhancements across key areas including border security, defence and intelligence based agencies. In partnership with these new security initiatives a national public counter terrorism campaign was implemented in December 2002. Due to the unprecedented nature of these terrorist events, there has been little specific research into how terrorist events have impacted on the Australian public or how the public's social psychometric risk perception of terrorism contrasts with other known. risks. This study's purpose was to address this shmifall in knowledge, by examining key social and security changes in Australian society post 9/11. The study used a number of primary and secondmy data sources, a literature review and a research survey to address the study's research questions. The research survey was based on a Likert scale devised to measure the public's psychometric risk perceptions of terrorism. This research compared terrorism to other similar risks and found it ranked second highest in terms of dread risk and midrange in terms of familiarity risk. The study recommended changes to current first response management practices and reinforced that there was an ongoing need for research into public risk perception and public awareness safety campaigns. It is only through an understanding of the public's reactions to risk that policy and decision-makers can promote and implement effective health, safety and security reforms that will be of benefit to both industry and the general co1m1mnity alike. 111 COPYRIGHT and ACCESS DECLARATION I certify that this thesis does not, to the best of my knowledge and belief: (i) incorporate without acknowledgment any material previously submitted for a degree or diploma in any institution of higher education; (ii) contain any material previously published or written by another person except where due reference is made in the text; or (iii) contain any defamatory material Signed .... Dated.... ., IV ACKNOWLEDGEMENTS I would like to acknowledge and express my gratitude to Doctor David Brooks who provided immeasurable assistance, guidance and support in completing this project. I would also like to express my sincere thanks to the staff of the security science faculty whose guidance and support over many years has helped me to grow and mature to this level of development. An extreme debt of appreciation and gratitude has to go to my rock, my wife and long suffering partner Ruth who has given her time selflessly and has laboured for many hours proof reading, editing and giving her constructive criticism. To all those who took the time to patiicipate in this project, your cooperation and assistance has been invaluable and I thank each of you for taking pati. Thanks also go to my family, Margaret, Lee, Mike, Christine and Keith who have been my foundations of suppoti throughout my 'university career'. Finally special thanks go to my good friends Michael Pajich, Nathan Alday, Jemma Thurston, and Roselyn Dinkgreve who through their humour, patience and understanding have allowed me to retain my sanity while completing this task. ) v LIST OF TABLES Table 1.1 Appendix B Terrorist Attacks Involving Australian Fatalities, Injuries or Damage to Australian Interests .................................................................... 134 Table 1.2 Ten Year Explosive Target Smmnary from 1998 to 2007 .................................... 7 Table 1.3 Ten Year Explosive Target Smmnary ........................................................... 8 Table 2.1 Modern Constructs and Defmitions of Public Risk Perception ................................. 24 Table 4.1 Pilot Study Two: Reliability Analysis- Scale (Cronbach Alpha) .......................... 52 Table 4.2 Pearson Correlation Values ...................................................................... 55 Table 4.3 Pearson's Product Moment Correlation Coefficient Table ................................... 56 Table 5.1 Age Groups by Gender Category ............................................................... 63 Table 5.2 Terrorism Risk Awareness (Anti-Terrorism Campaigns) ....................................... 69 Table 5.3 Main Study Reliability Analysis- Scale (Cronbach Alpha) ................................. 71 Table 5.4 Pearson's Product Moment Correlation Coefficient. ......................................... 72 Table 6.1 Appendix F Principal Australian Security Improvements Post 9111 ..................... 14 7 LIST OF FIGURES Figure 1.1 The Study's Overview ............................................................................ .11 Figure 2.1 Psychometric risk paradigm: Location and Risk Characteristics of 81 Risk Based Hazards ............. : ......................................................... 21 Figure 2.2 The Social Amplification of Risk Framework Model. ....................................... 25 Figure 2.3 Cronbach's Co-efficient Alpha Fonhula ...................................................... 30 Figure 3.1 Likert Scale Exatnple ............................................................................. 36 Figure 4.1 Pilot Study Spatial Factor Representation ...................................................... 50 Figure 4.2 Factor Characteristic Profiles of Each Activity/Teclmology ................................. 51 Figure 4.3 Comparison of Slavic's Psychometric Study with the Pilot Study Results ............... 53 Figure 5.1 Combined Spatial Factor Representation of All Results ....................................... 65 Figure 5.2 Main Study Factor Characteristic Profiling ..................................................... 67 Vl TABLE OF CONTENTS CHAPTER 1 -INTRODUCTION .................................................................................. 1 1.1 Introduction .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. 1 1.2 Terrorism Public
Recommended publications
  • EU and Member States' Policies and Laws on Persons Suspected Of
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS’ RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS EU and Member States’ policies and laws on persons suspected of terrorism- related crimes STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the European Parliament Committee on Civil Liberties, Justice and Home Affairs (LIBE Committee), presents an overview of the legal and policy framework in the EU and 10 select EU Member States on persons suspected of terrorism-related crimes. The study analyses how Member States define suspects of terrorism- related crimes, what measures are available to state authorities to prevent and investigate such crimes and how information on suspects of terrorism-related crimes is exchanged between Member States. The comparative analysis between the 10 Member States subject to this study, in combination with the examination of relevant EU policy and legislation, leads to the development of key conclusions and recommendations. PE 596.832 EN 1 ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Committee on Civil Liberties, Justice and Home Affairs and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation
    [Show full text]
  • Sweden: Extremism and Terrorism
    Sweden: Extremism and Terrorism On July 31, 2021, Roger Haddad, the deputy chair of the education committee in Sweden’s Parliament, announced that the Romosseskolan school, an Islamic school in Gothenburg, should be shut down because of its “connection to extremism.” The students are reportedly subject to gender segregation in lessons and are required to take part in prayer sessions. After public funding was cut for the school in June, the Islamic Association of Sweden (IFiS), which has been described as a hub for Muslim Brotherhood members, continued to pay the teachers. Gothenburg is particularly vulnerable to radicalization and violent extremism as more than a third of Swedish ISIS fighters have come from the city. (Source: The National) Swedish authorities have also been grappling with terrorists who have come into the country to plot terror attacks. In April 2021, Sweden’s security police arrested Salma K. and Fouad M. for conspiracy to commit a criminal terrorist act in Sweden. The suspects, who claimed they were Afghan refugees, entered Sweden in 2015. However, upon investigation, the Swedish Security Service (SAPO) confirmed the two were not Afghani nationals but were more likely of Iranian nationality and possibly traveled to Europe as a terrorism “sleeper cell.” According to media sources, the two began planning to carry out an attack in January 2021 and are possibly connected to the security agencies of the Islamic Republic of Iran. According to SAPO, Iran’s regime conducts intelligence and espionage operations in Sweden. (Sources: Jerusalem Post, Iran Wire) There have also been “lone wolf” terror attacks resulting in casualties in Sweden.
    [Show full text]
  • Swedish Foreign Fighters in Syria and Iraq
    Swedish Foreign Fighters in Syria and Iraq An Analysis of open-source intelligence and statistical data Linus Gustafsson Magnus Ranstorp Swedish Foreign Fighters in Syria and Iraq An analysis of open-source intelligence and statistical data Swedish Foreign Fighters in Syria and Iraq An analysis of open-source intelligence and statistical data Authors: Linus Gustafsson Magnus Ranstorp Swedish Defence University 2017 Swedish Foreign Fighters in Syria and Iraq: An analysis of open-source intelligence and statistical data Linus Gustafsson & Magnus Ranstorp © Swedish Defence University, Linus Gustafsson & Magnus Ranstorp 2017 No reproduction, copy or transmission of this publication may be made without written permission. Swedish material law is applied to this book. The contents of the book has been reviewed and authorized by the Department of Security, Strategy and Leadership. Printed by: Arkitektkopia AB, Bromma 2017 ISBN 978-91-86137-64-9 For information regarding publications published by the Swedish Defence University, call +46 8 553 42 500, or visit our home page www.fhs.se/en/research/internet-bookstore/. Summary Summary The conflict in Syria and Iraq has resulted in an increase in the number of violent Islamist extremists in Sweden, and a significant increase of people from Sweden travelling to join terrorist groups abroad. Since 2012 it is estimated that about 300 people from Sweden have travelled to Syria and Iraq to join terrorist groups such as the Islamic State (IS) and, to a lesser extent, al-Qaeda affiliated groups such as Jabhat al-Nusra. Even though the foreign fighter issue has been on the political agenda for several years and received considerable media attention, very little is known about the Swedish contingent.
    [Show full text]
  • Safeguarding Your Organisation Against Terrorism Financing
    Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN: 978-1-921241-84-0 © Commonwealth of Australia [2009] This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney-General’s Department, 3-5 National Circuit, Barton ACT 2600 or posted at http://www.ag.gov.au/cca Table of Contents SECTION A: Introduction 3 SECTION B: Best Practice Principles 8 SECTION C: Australia’s international obligations 9 SECTION D: Listed individuals and organisations 10 SECTION E: Legal obligations 14 SECTION F: Due diligence 15 SECTION G: Transparency and accountability 17 M F I N A N C I N G S T T E R R O R I S ATION AGAIN S SAFEGUARDING YOUR ORGANI 1 What does this Guidance mean for Non-Profit Organisations (NPOs)? This Guidance is not a legal document. This Guidance is intended to help NPOs understand their obligations under Australian law. Like all Australian legal and natural persons, Australian NPOs must comply with Australian laws. The Australian Government recognises the vital contribution that NPOs make in Australia and overseas. In minimising the risk of misuse of NPOs, the Australian Government is mindful of the need to not disrupt or discourage legitimate NPO activities. This Guidance is intended to support NPOs to continue their important work.
    [Show full text]
  • Preventative Detention and Covert Search Warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002
    Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 Review period 2011 - 2013 September 2014 NSW Ombudsman NSW Ombudsman Level 24, 580 George Street Sydney NSW 2000 Phone 02 9286 1000 Toll free (outside Sydney Metro Area): 1800 451 524 Facsimile: 02 9283 2911 Telephone typewriter: 02 9264 8050 Website: www.ombo.nsw.gov.au Email [email protected] ISBN 978-1-925061-41-3 © Crown Copyright, NSW Ombudsman, September 2014 This work is copyright, however material from this publication may be copied and published by State or Federal Government Agencies without permission of the Ombudsman on the condition that the meaning of the material is not altered and the NSW Ombudsman is acknowledged as the source of the material. Any other persons or bodies wishing to use material must seek permission. Preventative detention and covert search warrants: Review of Parts 2A and 3 of the Terrorism (Police Powers) Act 2002 September 2014 NSW Ombudsman Foreword In 2005 the Terrorism (Police Powers) Act 2002 was amended to give police and the NSW Crime Commission special powers to deal with suspected terrorist acts. Under Part 2A, police may apply to the Supreme Court for a preventative detention order to detain a person without charge for up to two weeks, in order to prevent a suspected imminent terrorist act or to preserve evidence of a terrorist act which has occurred.
    [Show full text]
  • A Decade of Australian Anti-Terror Laws
    A DECADE OF AUSTRALIAN ANTI-TERROR LAWS GEORGE WILLIAMS* [This article takes stock of the making of anti-terror laws in Australia since 11 September 2001. First, it catalogues and describes Australia’s record of enacting anti-terror laws since that time. Second, with the benefit of perspective that a decade brings, it draws conclusions and identifies lessons about this body of law for the Australian legal system and the ongoing task of protecting the community from terrorism.] CONTENTS I Introduction ..........................................................................................................1137 II Australia’s Anti-Terror Laws ................................................................................1139 A Number of Federal Anti-Terror Laws ......................................................1140 1 Defining an Anti-Terror Law ......................................................1141 2 How Many Anti-Terror Laws? ....................................................1144 B Scope of Federal Anti-Terror Laws .........................................................1146 1 The Definition of a ‘Terrorist Act’ ..............................................1146 2 Offence of Committing a ‘Terrorist Act’ and Preparatory Offences ......................................................................................1146 3 Proscription Regime ....................................................................1147 4 Financing Offences and Regulation ............................................1147 (a) Offences ..........................................................................1147
    [Show full text]
  • Restraints and Problems in the Field of Combating Terrorism and Crimes Done by Immigrants in Europe
    342 INTERNAL SECURITY REVIEW 17/17 Krzysztof Izak Restraints and problems in the field of combating terrorism and crimes done by immigrants in Europe For a few decades, since the end of late seventies and early eighties, i.e. the suc- cessful Islamic revolution in Iran and the time Soviet troops entered the territory of Afghanistan, the revolutionary approach has not been fading. It pushes some indi- viduals to act against the real and imaginary enemies of their faith as well as against their fellow believers if they are not prayerful enough, they don’t share “the rightful beliefs” and they do not want to join the fight. In many parts of the globe there is a re- ligious radicalization process going on and the Islam is not an exception here, altho- ugh this case is more spectacular and visible. Nevertheless, religious radicalism does not omit Judaism, Christianity, Hinduism or even Buddhism, religion and philosophy, which seemed to be free from any indications of extremism until very recently. On the other hand there has been observed ongoing secularization in Europe. Though, contra- ry to some opinions, it is not that in societies that abandon their religion, Islam fulfils the spiritual gap1. It depends mostly on the colonial past of the country and “open door” politics, thanks to which immigrants were able to come to the Western countries. The idea is confirmed by the statistics and particularly comparison between Czech Republic and France. According to the Gallup survey from 57 countries, in terms of the number of atheists China is in the first place with 47 %, next Japan with 31%, Czech Republic -30% and France -29%.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Submission by the Australian Federal Police Parliamentary Joint
    Parliamentary Joint Committee on Intelligence and Security Review of the Australian Citizenship renunciation by conduct and cessation provisions August 2019 Submission by the Australian Federal Police UNCLASSIFIED Contents Contents .............................................................................................................................. 2 Introduction .......................................................................................................................... 3 Terms of Reference ............................................................................................................... 3 Threat Environment ............................................................................................................... 3 Benefit to Law Enforcment ...................................................................................................... 4 Effectiveness in Combatting Terrorism................................................................................... 4 Conclusion ........................................................................................................................... 6 2 UNCLASSIFIED UNCLASSIFIED Introduction The AFP welcomes the request by the Parliamentary Joint Committee on Intelligence and Security to make a submission to the Committee as part of its review of the Australian citizenship renunciation by conduct and cessation provisions. The Committee has requested the AFP comment in particular on the extent to which the citizenship loss provisions have been effective
    [Show full text]
  • Style Attacks and the Threat from Lashkar-E-Taiba
    PROTECTING THE HOMELAND AGAINST MUMBAI- STYLE ATTACKS AND THE THREAT FROM LASHKAR-E-TAIBA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JUNE 12, 2013 Serial No. 113–21 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–686 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T.
    [Show full text]
  • Volume XIV, Issue 6 December 2020
    ISSN 2334-3745 Volume XIV, Issue 6 December 2020 Special Issue Restraint in Terrorist Groups and Radical Milieus Guest Editors Joel Busher and Tore Bjørgo PERSPECTIVES ON TERRORISM Volume 14, Issue 6 Table of Contents Welcome from the Editors...............................................................................................................................1 Articles Restraint in Terrorist Groups and Radical Milieus: Towards a Research Agenda.........................................2 by Joel Busher and Tore Bjørgo Non-Involvement in Terrorist Violence: Understanding the Most Common Outcome of Radicalization Processes........................................................................................................................................................14 by Bart Schuurman Learning from the Lack of Political Violence: Conceptual Issues and Research Designs...........................27 by Leena Malkki Why the Nordic Resistance Movement Restrains Its Use of Violence..........................................................37 by Tore Bjørgo and Jacob Aasland Ravndal The Internal Brakes on Violent Escalation within the British Extreme Right in the 1990s........................49 by Graham Macklin On the Permissibility of Homicidal Violence: Perspectives from Former US White Supremacists...........65 by Steven Windisch, Pete Simi, Kathleen M. Blee, and Matthew DeMichele Internal Debates, Doubts and Discussions on the Scope of Jihadi Violence: The Case of the Turnup Terror Squad..................................................................................................................................................77
    [Show full text]
  • 13510/04 EXT 1 Gvdb/Nt DG H II COUNCIL of the EUROPEAN
    COUNCIL OF Brussels, 28 October 2011 THE EUROPEAN UNION 13510/04 EXT 1 ENFOPOL 138 PARTIAL DECLASSIFICATION of document: 13510/04 RESTREINT UE dated: 4 November 2011 new status: Public Subject: Evaluation of National Anti-Terrorist Arrangements Report about Sweden, 24-27 February 2004 Delegations will find attached the partially declassified version of the above-mentioned document. ________________________ 13510/04 EXT 1 GvdB/nt DG H II EN ANNEX COUNCIL OF Brussels, 4 November 2004 THE EUROPEAN UNION 13510/04 EXT 1 (28.10.2011) ENFOPOL 138 NOTE from : General Secretariat to : Working Party on Terrorism Subject : Evaluation of National Anti-Terrorist Arrangements Report about Sweden, 24-27 February 2004 13510/04 EXT 1 GvdB/nt 1 ANNEX DG H II EN Evaluation of Sweden, 24 - 27 February 2004 SUMMARY 1.Terrorism Situation ...............................................................................................................3 1.1. DomesticTerrorism.......................................................................................3 1.2. International Terrorism ................................................................................4 1.2.1 Vulnerability of Modern Societies........................................................4 1.2.2.Counter-Terrorism ...............................................................................5 2. Structure of Authorities..........................................................................................6 2.1. General Situation...........................................................................................6
    [Show full text]