Cooperation and Integration Among Australia's National Security

Total Page:16

File Type:pdf, Size:1020Kb

Cooperation and Integration Among Australia's National Security Security Community Integration in Australia Cooperation and Integration among Australia’s National Security Community Aaron Phillip Waddell Introduction siege at Martin Place in Sydney on 15 December 2014—amidst many The Australian National Security warning signs that the gunman, Man Community (NSC) encompasses Haron Monis, had previously been Australia’s intelligence, diplomatic, identified by law enforcement and “...the Australian gov- defence, law enforcement, infra- intelligence agencies as a potential ernment implemented structure development, and border domestic threat—proved the difficul- several institutional protection agencies. These agencies ty implicit in such coordination and play a vital role in keeping Australian integration. transformations to society secure and free from attack ensure effective coordi- or the threat of attack1—often in the Historically, Australian national nation and integration background—in an effort to maintain security organisations were structured the Australian lifestyle.2 around the four pillars of diploma- within the National Se- cy, defence, domestic security, and curity Community.” Australia’s 21st century national intelligence. As circumstances have security challenges were once fairly changed, the Australian government predictable but are now broader, more implemented several institutional dynamic, and more complex.3 Con- transformations to ensure effective sequently, Australia has to exercise a coordination and integration within comprehensive whole-of-government the NSC. and -society approach to national security in a period of extreme fiscal The end of the Cold War heralded constraint that requires agencies to changes in the general nature of intel- conduct business in a more pru- ligence work and refocused intelli- dent and smarter manner than ever gence organisations’ roles, but more before.4 Thus, the Australian NSC aggressive changes commenced after has now generally interconnected the September 11th attacks on Amer- across government, non-government, ica, refocusing efforts on the grow- and private industry in pursuit of a ing terrorism threat. The election of well-rounded, fully-enabled Austra- the Labor Government in 2008 saw lian security platform. regional security concerns gain fur- ther momentum with Kevin Rudd’s Subsequently, it has been argued seeking a more exacting approach to that coordination and integration with Australian security. These changes in agencies and businesses that have approach can be grouped into three distinct cultures, embedded preju- domains: centralising decisionmaking dices, and highly compartmentalised authority, increasing policy coordina- business practices is not easy.5 The tion, and increasing funding.6 All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be construed as asserting or implying US government endorsement of its factual statements and interpretations. © Aaron Phillip Waddell. Studies in Intelligence Vol 59, No. 3 (Extracts, September 2015) 25 Security Community Integration in Australia The Australian security concept now encompasses both internal and external threats, with a very strong focus on terrorism. The success of such changes in the current environment of fiscal constraint depends heavily on the development and implementation of consistent and connected approaches, with effective legislation, that com- plement existing individual agency arrangements.7 This article focuses on the coordi- nation and cohesion of the Australian National Security Community with an aim of reviewing whether the roles, responsibilities, and cultures of each agency were sufficiently artic- ulated as overarching improvements to the community were implement- ed. The article commences with an overview of the NSC structure and the whole-of-government approach within the present environment. It then seeks to analyse decision cen- tralisation, policy coordination, and funding in the NSC before highlight- ing achievements as well as remain- ing challenges in the quest for a seamless and interconnected national security structure. Finally, the article will offer some suggestions to better connect the NSC. Cabinet (a position formally known include the asymmetric threat posed as the PM&C Associate Secretary) by non-state and rogue state actors and by the release in 2008 of The such as al-Qa‘ida and ISIS and issues Australia’s National Se- First National Security Statement, such as international crime networks, curity Community Australia’s then-newly articulat- climate change, health pandemics, ed national security policy, which and natural disasters.8 The Australian In 2008, the Rudd government described for the first time “the scope security concept now encompasses adopted a new national security of national security; [Australia’s] both internal and external threats, concept designed to move toward national security interests, principles with a very strong focus on terrorism. a whole-of-government approach, and priorities; and . the govern- Additionally, complicating factors which would replace the longstand- ment’s vision for a reformed national such as regional economic power and ing Department of Defence-centric security structure.” The Australian influence shifts and advancements system. This shift was marked by perception of threat has also sig- in communications and technology the creation of the role of national nificantly changed from traditional, have opened up new pathways for security advisor within the Depart- conventional state-based threats to transnational crimes, making Austra- ment of the Prime Minister and 26 Studies in Intelligence Vol 59, No. 3 (Extracts, September 2015) Security Community Integration in Australia . the distinguishing feature of the whole-of-government lia’s national security environment approach is the incorporation of a much broader policy increasingly fluid and fraught with agenda whilst maximising existing resources. a complex and dynamic mix of con- tinuing and emerging challenges and 9,10,11,12 and the Department of Infrastructure multiple agencies and, as such, whilst opportunities. This new range and Transport (DIT) operate in all 13 our broad national security interests of international risks and pressures areas.15 remain unchanged, the institutional means that one agency or single tier framework of the NSC is evolving to of government acting unilaterally Although interconnected at manage the complexity of threats.17 cannot address all the issues: creating the strategic level, individual NIC a whole-of-government approach was agencies are also expected to perform This whole-of-government therefore vital.13,14 specific roles to minimise duplica- approach has forced NIC agencies tion and operational costs; therefore, to take new steps to create effective Facing a host of new security within the larger NIC, all six Austra- policy and intelligence outcomes and challenges, both external and “home- lian Intelligence Community (AIC) encompassed a much wider range grown,” Australia’s implementa- agencies—i.e., Australian Secret In- of traditional and non-traditional tion of a coherent national security telligence Service (ASIS), Australian security concerns. Concurrent with framework was designed to establish Security Intelligence Organization the implementation of a more con- a comprehensive approach to respond (ASIO), Australian Geospatial-Intel- nected government effort, Australia to those challenges. The NSC was re- ligence Organisation (AGO), Aus- has seen an increase in public sector structured to ensure collaboration and tralian Signals Directorate (ASD), involvement in security policy, which interoperability among the agencies Office of National Assessments has complicated the broad national responsible for national and domestic (ONA), and the Defence Intelligence security agenda, making a holistic ap- security. The diagram below details Organisation (DIO) perform a specif- proach to management more convo- the organisations that comprise the ic intelligence function and conduct luted and complex.18 Such complex- present Australian NSC and the intelligence assessments.16 ity is evidenced by the large number national security concerns they are of policy reviews and commissions resourced to address. Mindfulness of NIC and AIC of inquiry into various aspects of agencies’ capabilities at the highest As illustrated by the diagram on national security written or convened levels of government leadership level since 2008. the facing page, the distinguishing is important in order to avoid dupli- feature of the whole-of-government cation of roles and to ensure effective approach is the incorporation of a cooperation across the broader NSC. much broader policy agenda whilst Additionally, there must be consider- An Analysis of Decision Cen- maximising existing resources. In ation of agencies’ cultures to ensure tralisation, Policy Coordina- this schema, individual National flexibility and adaptability in the tion, and Funding in the Na- Intelligence Community (NIC) agen- whole-of-government and -society tional Security Community cies perform overlapping and com- capability approach. plementary functions; for instance, The National Security Community the Australian Security Intelligence The networked and multifaceted since 2008 has strengthened its coor- Organisation (ASIO) operates in threat environment has challenged dination and integration using deci- eight of the 13 national security ar- government departments such that sion centralisation,
Recommended publications
  • Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization
    International Journal of Communication 14(2020), 1849–1867 1932–8036/20200005 Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization BRIAN T. HUGHES American University, USA Examinations into the roots of Islamist terrorism have frequently presented the phenomenon as a result of either perverting political–religious epistemologies into distorted, caricatured fundamentalisms, or, alternatively, as a return to form, whereby a pure, root ideology/metaphysic is rediscovered. The former approach reflects a discourse rooted in print media and characterized by logical argumentation, linear chronology, and deference to the text. The latter approach reflects a discourse rooted in modes of secondary orality, which posit a font of ideal essence that precedes expression. The figure of the digitally engaged lone wolf undermines these discourses. His violent extremism appears only Islamically inflected through an accretion of contradictory mediated encounters linking representations of violence, Islam, and the lone wolf himself. This article argues that a new approach and discourse should therefore emerge, specific to the hypertextual and rhizomatic qualities of multiplicity and contradiction that characterize the digitally engaged lone wolf. Keywords: terrorism, extremism, ISIS, Islamophobia, radicalization, discourse, medium theory, hypermedia, affect Scholars have identified successive waves of terrorist tactics and ideological pretexts in both the contemporary Islamist domain (Esposito, 2003b; Kepel, 2002;
    [Show full text]
  • A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by the Henry Jackson Society
    “WE WILL CONQUER YOUR ROME ” A Study of Islamic State Terror Plots in the West Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “We Will Conquer Your Rome”: A Study of Islamic State Terror Plots in the West By: Robin Simcox ISBN 978-1-909035-22-5 £10.00 where sold All rights reserved Photo credits Islamic State flag: http://www.shutterstock.com/pic-237997351/stock-photo-islamic-state-isis-isil-sunni-jihadist-group-self- proclaimed-as-a-caliphate-it-claims.html?src=csl_recent_image-1 American flag: http://www.istockphoto.com/photo/american-flag-isolated-with-clipping-path-6406148 British flag: https://commons.wikimedia.org/wiki/File:Flag_-_Union_Flag.jpg French flag: http://www.shutterstock.com/dl2_lim.mhtml?id=77864683&size=huge_jpg&src=id “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Robin Simcox www.henryjacksonsociety.org 1 “WE WILL CONQUER YOUR ROME” A Study of Islamic State Terror Plots in the West Acknowledgments Many thanks to Aram Alaaldin, Michael Ettlinger and Nathaniel Greenwold for their research assistance. About the Author Robin Simcox is a Research Fellow at the Henry Jackson Society, where he works on terrorism and security issues.
    [Show full text]
  • Terror in Australia: Investigating the Rhetoric and the Community
    SAGE International Terror in Australia: Investigating the rhetoric and the community By Ms. Kayla Dickeson Intern, SAGE International t is the thirteenth anniversary of the fateful September 11 attacks: Prime Minister Tony Abbott announces that the terror threat-level has been raised to I High. One week later, 800 highly-visible police officers raid homes across Sydney and Brisbane (Jabour, 2014), while on the same day Mr Abbott smiles for the camera as he farewells air force personnel leaving for Iraq (Hurst, 2014). Labelled “terrorism events” by a Counter-Terrorism review, the Melbourne stabbing of two police officers and the Martin Place Sydney Siege join the ranks of the Bali bombings, the London train attacks and the US-Libyan embassy attack in a timeline of the post-9/11 era (Australian Government, 2015, p 4). Mr Abbott emotively notes the tragedy of “politically-motivated” attacks on “Australian values” (Griffiths, 2014) – aptly observing that one-third of “terrorism events” have occurred in the six months after raising the terror level (Grattan, 2015). Monday morning, the 23rd of February, 2015 – while introducing new counter- terrorism strategies to toughen immigration laws, remove citizenship, suspend passports and cancel welfare payments of “persons of interest” – Mr Abbott remarks “I’ve often heard western leaders describe Islam as a ‘religion of peace’. I wish more Muslim leaders would say that more often, and mean it” (Lloyd, 2015). Indeed, he is correct: President Barack Obama tells the world his country is not at war with Islam (AJ, 2015); Chancellor Angela Merkel stands with Muslim leaders at public anti- violence rallies (Huggler, 2015); and Foreign Minister Julie Bishop applauds Australian Muslims who are working with the government, community groups and 1 Terror in Australia: Investigating the rhetoric and the community mosques “to keep our people safe” (Medhora, 2015).
    [Show full text]
  • Review of Australia's Counter-Terrorism Machinery
    © Commonwealth of Australia 2015 ISBN 978-1-925237-36-8 (Hardcopy) ISBN 978-1-925237-37-5 (PDF) ISBN 978-1-925237-38-2 (DOC) Ownership of intellectual property rights in this publication Unless otherwise noted, copyright (and any other intellectual property rights, if any) in this publication is owned by the Commonwealth of Australia (referred to below as the Commonwealth). Creative Commons licence With the exception of the Coat of Arms, this publication is licensed under a Creative Commons Attribution 3.0 Australia Licence. Creative Commons Attribution 3.0 Australia Licence is a standard form license agreement that allows you to copy, distribute, transmit and adapt this publication provided that you attribute the work. A summary of the licence terms is available from http://creativecommons.org/licenses/by/3.0/au/deed.en. The full licence terms are available from http://creativecommons.org/licenses/by/3.0/au/legalcode. The Commonwealth’s preference is that you attribute this publication (and any material sourced from it) using the following wording: Source: Licensed from the Commonwealth of Australia under a Creative Commons Attribution 3.0 Australia Licence. The Commonwealth of Australia does not necessarily endorse the content of this publication. Use of the Coat of Arms The terms under which the Coat of Arms can be used are set out on the Department of the Prime Minister and Cabinet website (see http://www.dpmc.gov.au/guidelines/). Contents EXECUTIVE SUMMARY iv RECOMMENDATIONS vi PART ONE: THE STATE OF PLAY 1 One: Australia – Our Evolving
    [Show full text]
  • Isis in the West
    NEW INTERNATIONAL AMERICA SECURITY PETER BERGEN, COURTNEY SCHUSTER, AND DAVID STERMAN ISIS IN THE WEST THE NEW FACES OF EXTREMISM NOVEMBER 2015 About New America About the International Security Program New America is dedicated to the renewal of American The International Security Program aims to provide politics, prosperity, and purpose in the Digital Age. We evidence-based analysis of some of the thorniest carry out our mission as a nonprofit civic enterprise: an questions facing American policymakers and the public. intellectual venture capital fund, think tank, technology The program is largely focused on South Asia and the laboratory, public forum, and media platform. Our Middle East, al-Qaeda and allied groups, the rise of hallmarks are big ideas, impartial analysis, pragmatic political Islam, the proliferation of weapons of mass policy solutions, technological innovation, next destruction (WMD), homeland security, and the activities generation politics, and creative engagement with broad of U.S. Special Forces and the CIA. The program is also audiences. Find out more at newamerica.org/our-story. examining how warfare is changing because of emerging technologies, such as drones, cyber threats, and space- based weaponry, and asking how the nature and global About The Authors spread of these technologies is likely to change the very definition of what war is. Peter Bergen is a print, television and web journalist, documentary producer and the The authors would like to thank Emily Schneider and author or editor of six books, three of which Justin Lynch for their assistance with this research. were New York Times bestsellers and three of which were named among the best non- fiction books of the year by The Washington Post.
    [Show full text]
  • The Psychogenesis of Terrorism
    The Psychogenesis of Terrorism Emily Joy Corner UCL Thesis submitted in fulfilment of the requirements for the Research Degree in Security and Crime Science September, 2016 1 Student Declaration I, Emily Joy Corner confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Signed Name Date 2 Acknowledgements This thesis would never have reached its conclusion without the help of a wide list of people. Not all are mentioned here, as the list is far too long. But there are a few key individuals, who have had a far greater impact, and without them, I would never have managed to tackle the hurdles of the last three years. Firstly, to Paul. I would never have even managed to start this without your support and belief. You have been there every single step of the way, and have given me opportunities I would never have even dreamed of. You kept your word on everything. I am eternally grateful. Oliver, thank you for the inexplicably quick turn-arounds, and for your comments and corrections that only improved the quality of this thesis. Noémie, thank you for the opportunities, discussions, and being the only other person awake even before the sun rose at conferences. To Shane, thank you for the answers to all those ‘quick’ questions. To all the individuals on the projects that I have been exceptionally lucky to work on, I have gained such a wealth of experience working with you. To Paul Hitchen, Paul Betley, and Amy McKee, thank you for the laughs, and the drinks.
    [Show full text]
  • Can the Implied Freedom of Political Discourse Apply to Speech by Or About Religious Leaders?
    Mitchell Landrigan* CAN THE IMPLIED FREEDOM OF POLITICAL DISCOURSE APPLY TO SPEECH BY OR ABOUT RELIGIOUS LEADERS? ABSTRACT Religious leaders in Australia sometimes contribute to public debate. Can the implied freedom protect speech by and about religious leaders from a burden (legislative, common law, executive) either current (eg, religious vilification laws) or proposed? In part, the answer to this question depends on whether such expression is recognised as ‘political speech’ under constitutional law. Mason, Toohey and Gaudron JJ’s joint judgment in Theophanous v Herald & Weekly Times Ltd (1994) 182 CLR 104 suggests that political speech includes discourse about the political views and public conduct of all persons involved in activities that have become the subject of political debate, a description that could possibly apply to speech by and about religious leaders. By contrast, the High Court’s later unanimous judgment in Lange v Australian Broadcasting Corporation (1997) 189 CLR 520 arguably suggests a narrower view of the scope of the implied freedom. It indicates that the implied freedom only protects speech that is relevant to representative government, respon- sible government or referenda. Is it possible to reconcile Theophanous and Lange? What do the terms ‘representative government’ and ‘respon- sible government’ mean? Is it possible to discern a clear view from the High Court judgments about whether speech by or about religious leaders can be political speech? * Visiting Fellow, Faculty of Law, University of Technology Sydney; PhD Candidate, Law School, University of New South Wales; Solicitor, Supreme Court of New South Wales and High Court of Australia. The author thanks Professor George Williams for his guidance on this area of research as my PhD supervisor, Alison Gurr for her helpful suggestions on an earlier draft, and two anonymous referees for their construc- tive comments on an earlier draft.
    [Show full text]
  • Eight Oic Observatory Report on Islamophobia
    Original: English EIGHT OIC OBSERVATORY REPORT ON ISLAMOPHOBIA May 2014 – April 2015 PRESENTED TO THE 42nd Council of foreign ministers Kuwait City, State of Kuwait 27-28 May 2015 i OIC-CS-8thOBS-REP-Final-May-2015 TABLE OF CONTENTS FOREWORD by the OIC Secretary General EXECUTIVE SUMMARY INTRODUCTION 1. ISLAMOPHOBIA, INTOLERANCE AND DISCRIMINATION AGAINST MUSLIMS 7 2. MANIFESTATIONS OF ISLAMOPHOBIA 9 2.1. Islamophobia in the USA and Canada 12 2.1.1. Polls and Reports on Islamophobia in the United States and Canada 12 2.1.2. Islamophobic Discourses and Campaigns in the United States 15 2.1.2. Surveillance against Islam and Muslims 18 2.2. Islamophobia in Europe 20 2.2.1. Polls and Reports on Islamophobia in Europe 20 2.2.2. Islamophobic Discourses and Campaigns in Europe 21 2.2.3. PEGIDA Movements 23 2.2.4. The Aftermath of Charlie Hebdo Incident 24 2.2.5. The Rise of Far Rights 26 2.3. Islamophobia in the Rest of the World 29 2.3.1. Rohingya Muslims in Myanmar 29 2.3.2. The Rise of Islamophobia in Australia 29 2.3.3. The situation of Tatar Muslims in Crimea 30 2.4. Other Islamophobic Trends 31 2.4.1. Islamophobic Gestures and Policies against Veil, Hijab, and Burqa 31 2.4.2. Discrimination against Muslims in Employment 34 3. SOME POSITIVE DEVELOPMENTS 36 3.1. Court Decisions against Islamophobes 36 3.2. Politicians Positive Views on Islam 38 3.3. Counter-balances on Far-Rights 40 3.4. Anti-PEGIDA Trends 42 3.5.
    [Show full text]
  • Center on Terrorism, Extremism, and Counterterrorism
    Center on Terrorism, Extremism, and Counterterrorism www.middlebury.edu/institute/academics/centers-initiatives/ctec The Center on Terrorism, Extremism, and Counterterrorism (CTEC) conducts in- depth research on terrorism and other forms of extremism. Formerly known as the Monterey Terrorism Research and Education Program, CTEC collaborates with world-renowned faculty and their graduate students in the Middlebury Institute’s Nonproliferation and Terrorism Studies degree program. CTEC’s research informs private, government, and multilateral institutional understanding of and responses to terrorism threats. Middlebury Institute for International Studies at Monterey www.miis.edu The Middlebury Institute for International Studies at Monterey provides international professional education in areas of critical importance to a rapidly changing global community, including international policy and management, translation and interpretation, language teaching, sustainable development, and nonproliferation. We prepare students from all over the world to make a meaningful impact in their chosen fields through degree programs characterized by immersive and collaborative learning, and opportunities to acquire and apply practical professional skills. Our students are emerging leaders capable of bridging cultural, organizational, and language divides to produce sustainable, equitable solutions to a variety of global challenges. Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies 460 Pierce Street Monterey, CA 93940, USA Tel: +1 (831) 647-4634 The views, judgments, and conclusions in this report are the sole representations of the authors and do not necessarily represent either the official position or policy or bear the endorsement of CTEC or the Middlebury Institute of International Studies at Monterey. © The President and Trustees of Middlebury College, 2019 ASSESSING THE RISK OF ISLAMIST TERRORISTS USING HUMAN VECTORS TO DEPLOY CONTAGIOUS PATHOGENS Jeffrey M.
    [Show full text]
  • Iranian Elderly in Sydney, Australia: a Reflection on Life
    Journal of Economics, Management and Trade 24(5): 1-11, 2019; Article no.JEMT.51072 ISSN: 2456-9216 (Past name: British Journal of Economics, Management & Trade, Past ISSN: 2278-098X) Iranian Elderly in Sydney, Australia: A Reflection on Life Freidoon A. Khavarpour1*, Atena Hafshajani2 and Kathleen Clapham1 1Australian Health Service Research Institute, Building 234 iC Enterprise 1 Innovation Campus, University of Wollongong, New South Wales, 2522, Australia. 2North Rocks Medical Services, North Rocks, New South Wales, Australia. Authors’ contributions This work was carried out in collaboration among all authors. Author FAK designed the study, managed the literature search, performed the statistical analysis, wrote the protocol and wrote the first draft of the manuscript. Authors AH and KC managed the analyses of the study. All authors read and approved the final manuscript. Article Information DOI: 10.9734/JEMT/2019/v24i530177 Editor(s): (1) Dr. Mustapha Saidi Atanda, Senior Lecturer, Department of Economics, Faculty of Social Sciences and Current Chairman, Committee on Small and Medium Scale Research, Lead City University, Nigeria. Reviewers: (1) Alan Garfield, University of Dubuque, USA. (2) Liamunga Mwiya Imasiku, University of Zambia, Zambia. Complete Peer review History: http://www.sdiarticle3.com/review-history/51072 Received 10 June 2019 Original Research Article Accepted 25 August 2019 Published 31 August 2019 ABSTRACT The growth in the number and proportion of older adults is unprecedented in the history of Australia. Two factors, longer life spans and ageing baby boomers, have combined to increase this portion of population of Australian aged in recent decades. Using qualitative approach, 20 Iranian migrants, aged 65 and over, were selected and interviewed through a 10 months period, in 2016 and 2017.
    [Show full text]
  • Man Haron Monis and the Sydney Lindt Caf'e Siege – Not a Terrorist Attack
    Psychiatry, Psychology and Law ISSN: 1321-8719 (Print) 1934-1687 (Online) Journal homepage: http://www.tandfonline.com/loi/tppl20 Man Haron Monis and the Sydney Lindt Caf'e Siege – Not a Terrorist Attack Russ Scott & Rodger Shanahan To cite this article: Russ Scott & Rodger Shanahan (2018): Man Haron Monis and the Sydney Lindt Caf'e Siege – Not a Terrorist Attack, Psychiatry, Psychology and Law, DOI: 10.1080/13218719.2018.1479941 To link to this article: https://doi.org/10.1080/13218719.2018.1479941 Published online: 05 Sep 2018. Submit your article to this journal Article views: 67 View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=tppl20 Psychiatry, Psychology and Law, 2018 Vol. 0, No. 0, 1–63, http://dx.doi.org/10.1080/13218719.2018.1479941 Man Haron Monis and the Sydney Lindt Caf'e Siege – Not a Terrorist Attack Russ Scotta and Rodger Shanahanb aForensic Psychiatrist, The Park – Centre for Mental Health, Wacol, Brisbane, Australia; bResearch Fellow, Lowy Institute, Sydney, Australia On 15 December 2014, nearly 20 years after he arrived in Australia from Iran, Man Haron Monis took 18 people hostage in the Lindt Caf'e in Sydney and announced that Australia was ‘under attack by the Islamic State’. After a 16-hour siege, during which negotiators had no direct communication with him, Monis shot dead one of his hostages, precipitating the police ‘emergency action’ which broke the siege. Although Monis had been a prolific user of the Internet and social media, the subsequent Coroner’s inquest found that Monis made little sophisticated preparation for the siege and did not announce his intention nor did he leave any clear terrorist-inspired message or martyrdom video.
    [Show full text]
  • 1 Cultural & Social Affairs Department Oic
    Cultural & social affairs Department OIC islamophobia Observatory Monthly Bulletin – December 2014 I. MANIFESTATIONS OF ISLAMOPHOBIA: I.I. In the United States and Canada: 1. US: FBI investigates man for hate crime after teen killed outside mosque–A sophomore at Staley High School was killed on 4 December after police said he was purposely hit by an SUV. The Federal Bureau of Investigation said they were working in conjunction with the Kansas City and Police Department to investigate any possible Federal Civil Rights violations and the potential of a hate crime. Police said 15-year-old Abdisamad Sheikh- Hussein had just walked out of the Somali Center of Kansas City at Admiral Boulevard and Lydia Avenue on that day at 5:23 p.m. He was standing outside a Toyota about to get in when a driver in an SUV appeared to have intentionally swerved towards the teen. Community members said they recognized the SUV as the one covered in anti-Quran graffiti, driven by a man who had since been banned from Somali markets and restaurants for his rants against Muslims. They showed KCTV5 a photo they took two months before. The writing on the back window read, “Quran is a virus disease woreste than Ebola.” One community member said people did confront the man in that SUV back then and it turned violent. In: http://fox2now.com/2014/12/07/fbi-investigates-man-for-hate-crime-after-teen-killed-outside-mosque/, retrieved on 08.12.2014 2. US: St. Cloud mosque vandalized for 4th time in a month– Leaders of the Central Minnesota Islamic Center in St.
    [Show full text]