Chapter 40 Oversight and the National Intelligence Community

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 40 Oversight and the National Intelligence Community Comprehensive Review of the Legal Framework of the National Intelligence Community Volume 3 of 4: Information, Technology, Powers and Oversight December 2019 Volume 3 Copyright Statement © Commonwealth of Australia 2020 ISBN: 978-1-921091-55-1 (Print) ISBN: 978-1-921091-56-8 (Online) With the exception of the Commonwealth Coat of Arms, this work is licensed under a Creative Commons Attribution 4.0 International licence (CC BY 4.0) (https://creativecommons.org/licenses/by/4.0/). Attribution This publication should be attributed as follows: Comprehensive Review of the Legal Framework of the National Intelligence Community by Mr Dennis Richardson AC Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the following website: https://pmc.gov.au/cca Other uses Enquiries regarding this document are welcome at: Attorney-General’s Department 3–5 National Circuit BARTON ACT 2600 Telephone: 02 6141 6666 Page 2 Volume 3 Table of contents—Volume 3 Table of contents—Volume 3 Table of contents—all volumes ........................................................................................ 6 Table of recommendations—Volume 3 ............................................................................ 8 Acronyms and abbreviations .......................................................................................... 15 Chapter 33 Information sharing ...................................................................................... 21 Current information sharing frameworks ........................................................................ 21 The complexity of information sharing frameworks ........................................................ 30 Alternative legal frameworks for information sharing ...................................................... 45 Specific information sharing issues ................................................................................ 49 Chapter 34 Reference information ................................................................................. 57 Introduction .................................................................................................................... 57 What is ‘reference information’? ..................................................................................... 57 Why agencies require reference information .................................................................. 61 Regulating access to reference data for intelligence purposes ...................................... 64 Do National Intelligence Community agencies have the legal authority to collect, retain and use reference information, where necessary? ......................................................... 69 Are existing limits, controls and safeguards adequate? ................................................. 71 Chapter 35 Secrecy.......................................................................................................... 88 What is a secrecy provision? .......................................................................................... 88 Key principles ................................................................................................................. 89 Legislative frameworks ................................................................................................... 92 Overview of stakeholder views ....................................................................................... 97 Secrecy offences for the protection of identities ........................................................... 101 Consolidating secrecy offences in the Intelligence Services Act .................................. 112 Public interest disclosure exceptions to secrecy offences ............................................ 117 Inspector-General of Intelligence and Security exceptions to secrecy offences ........... 132 Page 3 Table of contents—Volume 3 Volume 3 Chapter 36 Cyber security ............................................................................................ 136 The current cyber security environment ....................................................................... 140 Australia’s current cyber security arrangements .......................................................... 145 Offensive cyber capabilities to disrupt cyber security incidents inside Australia ........... 161 Power to direct industry in relation to cyber security incidents ..................................... 166 Chapter 37 Artificial intelligence .................................................................................. 169 Definitions and overview of the current state of the technology ................................... 172 Australia’s current legal framework .............................................................................. 175 International approaches .............................................................................................. 178 The potential intelligence benefits of artificial intelligence ............................................ 181 Managing the risks inherent to the use of artificial intelligence, in an intelligence context .......................................................................................................................... 187 Chapter 38 Threat reduction and disruption ............................................................... 207 Principles ...................................................................................................................... 207 The threat environment ................................................................................................ 208 Definitional issues ........................................................................................................ 210 What can agencies already do? ................................................................................... 211 International comparisons ............................................................................................ 214 Legislated threat reduction functions ............................................................................ 215 Responding to online criminal activity .......................................................................... 216 Chapter 39 Australian Criminal Intelligence Commission—specific issues ............ 222 A covert or delayed notification search power .............................................................. 222 Coercive examinations offshore ................................................................................... 228 Power to request information from the private sector ................................................... 232 Extended notice to produce .......................................................................................... 234 Chapter 40 Oversight and the National Intelligence Community .............................. 236 Defining ‘oversight’ ....................................................................................................... 237 History of oversight arrangements in Australia ............................................................. 238 Page 4 Volume 3 Table of contents—Volume 3 Oversight agencies ....................................................................................................... 240 Parliamentary committee oversight .............................................................................. 245 International comparisons ............................................................................................ 247 Principles of effective oversight .................................................................................... 254 Is Australia’s oversight system effective? ..................................................................... 256 Jurisdiction of oversight bodies .................................................................................... 258 Oversight by design ...................................................................................................... 264 Chapter 41 Oversight: Independent oversight bodies................................................ 272 The Inspector-General of Intelligence and Security ..................................................... 272 The Independent National Security Legislation Monitor ............................................... 290 The Independent Reviewer of Adverse Security Assessments .................................... 294 Chapter 42 Oversight: Parliamentary committees ...................................................... 297 Parliamentary Joint Committee on Intelligence and Security operational oversight ..... 299 Committee membership ............................................................................................... 315 The Inspector-General of Intelligence and Security’s reporting requirements .............. 317 Review of privacy rules ................................................................................................ 318 Page 5 Table of contents—all volumes Volume 3 Table of contents—all volumes Volume 1: Recommendations and Executive Summary; Foundations and Principles; Control, Coordination and Cooperation Chapter 1 Foreword Chapter 2 Methodology Chapter 3 Executive summary Chapter 4 List of recommendations Chapter 5 Why a Review? Chapter 6 Intelligence legislation in Australia Chapter 7 Foundational principles Chapter 8 Foreign and security intelligence Chapter 9 Onshore and offshore operations Chapter 10 Australian and non-Australian Chapter 11 Collection, assessment and open source Chapter 12 Security
Recommended publications
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • Pol.9100.0001.0616 0001
    POL.9100.0001.0616_0001 Dear Commissioner, WHEREAS Australia has one of the strongest and most stable banking, superannuation and financial services industries in the world, which performs critical roles in pinning under the Australian economy, yielding profit for the Money Power, shareholders and their acolytes and burdening the citizens of Australia who have little choice but to use this industry. A banking industry serving the prophesied "Banana Republic" with its demolished productive sector AND a superannuation industry from which said acolytes may siphon AND a financial services industry boasting speculation which dwarfs that of the "Pokie Nation", non-banking speculative sector. AND Australia's banking system is systemically strong and applies this strength in concealing its speculative activities and squashing what is left of the productive sector under internationally recognised and world's best prudential regulation and oversight on behalf of the Money Power. AND most Australians are consumers of banking, superannuation and other financial services. The superannuation system alone has created more than a $2 trillion retirement savings pool. AND this superannuation continues to grow rapidly and compels all working Australians to defer income today for their retirement, which most may never see because of siphoning mentioned earlier. AND to fulfil the prophesied end of "the age of entitlement" all banking entities are being protected by Too-Big-To-Fail status, able to be propped up at all cost regardless of detriment to individual citizens (through 100% bail-in of 100% of financial instruments by APRA) and the collective Australian public (through bailout by the Australian Government) so that further the prophesy may be fulfilled that "the poorest people either don't have cars or actually don't drive very far in many cases".
    [Show full text]
  • 24 April 2018 Mr Grant Hehir Auditor-General Australian National
    PARLIAMENT OF AUSTRALIA 24 April 2018 Mr Grant Hehir Auditor-General Australian National Audit Office 19 National Circuit Barton ACT 2600 By email: [email protected] Dear Auditor-General Allegations concerning the Murray-Darling Basin Plan We refer to the allegations raised in analysis by The Australia Institute (enclosed) and various media reports relating to the purchases of water for environmental flows in the Murray-Darling Basin. The analysis and reports allege that the Department of Agriculture and Resources, which manages the purchase of water, significantly overpaid vendors for water in the Warrego catchment, Tandou and the Condamine-Balonne Valley. If true, this would mean that the Federal Government has not achieved value-for-money for the taxpayer in executing the Murray-Darling Basin Plan. Accordingly, we ask you to investigate these allegations and any other matter you consider relevant arising out of the analysis conducted by The Australia Institute including, but not limited to, all purchases of water by the Commonwealth to ensure they have met the requirements of the Commonwealth Procurement Rules. Yours sincerely, Rex Patrick Stirling Griff Rebekha Sharkie MP Senator for South Australia Senator for South Australia Member for Mayo Sarah Hanson-Young The Hon. Tony Burke Cory Bernardi Senator for South Australia Member for Watson Senator for South Australia PO Box 6100, Parliament House Canberra ACT 2600 That’s not how you haggle…. Commonwealth water purchasing in the Condamine Balonne The Australian Government bought 29 gigalitres of water for $80m in the Condamine-Balonne valley. The vendors originally insisted on $2,200 per megalitre.
    [Show full text]
  • The Future of Weapons of Mass Destruction an Update
    A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr.
    [Show full text]
  • Geographic Board Games
    GSR_3 Geospatial Science Research 3. School of Mathematical and Geospatial Science, RMIT University December 2014 Geographic Board Games Brian Quinn and William Cartwright School of Mathematical and Geospatial Sciences RMIT University, Australia Email: [email protected] Abstract Geographic Board Games feature maps. As board games developed during the Early Modern Period, 1450 to 1750/1850, the maps that were utilised reflected the contemporary knowledge of the Earth and the cartography and surveying technologies at their time of manufacture and sale. As ephemera of family life, many board games have not survived, but those that do reveal an entertaining way of learning about the geography, exploration and politics of the world. This paper provides an introduction to four Early Modern Period geographical board games and analyses how changes through time reflect the ebb and flow of national and imperial ambitions. The portrayal of Australia in three of the games is examined. Keywords: maps, board games, Early Modern Period, Australia Introduction In this selection of geographic board games, maps are paramount. The games themselves tend to feature a throw of the dice and moves on a set path. Obstacles and hazards often affect how quickly a player gets to the finish and in a competitive situation whether one wins, or not. The board games examined in this paper were made and played in the Early Modern Period which according to Stearns (2012) dates from 1450 to 1750/18501. In this period printing gradually improved and books and journals became more available, at least to the well-off. Science developed using experimental techniques and real world observation; relying less on classical authority.
    [Show full text]
  • Australian Criminal Intelligence Management (ACIM) Strategy 2017
    Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 AUSTRALIAN CRIMINAL INTELLIGENCE MANAGEMENT STRATEGY 2017–20 INTELLIGENCE PARTNERSHIPS FOR A SAFER AUSTRALIA Attorney-General’s Department Australia New Zealand Policing Advisory Agency Australian Criminal Intelligence Commission Australian Federal Police ACT Policing Australian Securities and Investments Commission Australian Security Intelligence Organisation Australian Taxation Office Australian Transaction Reports and Analysis Centre Department of Immigration and Border Protection/Australian Border Force New South Wales Police Force New Zealand Police Northern Territory Police Queensland Police Service South Australia Police Tasmania Police Victoria Police Western Australia Police 1 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 CONTENTS FOREWORD 1 AUSTRALIAN CRIMINAL INTELLIGENCE LANDSCAPE 2 AUSTRALIAN CRIMINAL INTELLIGENCE MODEL 3 DEFINITION OF INTELLIGENCE 4 OVERSIGHT AND IMPLEMENTATION 5 WHAT WILL SUCCESS LOOK LIKE? 6 HOW WILL WE ACHIEVE SUCCESS? 7 CRITICAL SUCCESS FACTORS 10 HOW WILL WE MEASURE SUCCESS? 10 EVALUATION MODEL 11 MATURITY MODEL 12 CONCLUSION 14 REFERENCES 14 2 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 FOREWORD The United Nations Office on Drugs and Crime (UNODC) describes criminal intelligence as “... the lifeblood of the fight against transnational organized crime. It is the foundation for
    [Show full text]
  • Vertical Motions of Australia During the Cretaceous
    Basin Research (1994) 6,63-76 The planform of epeirogeny: vertical motions of Australia during the Cretaceous Mark Russell and Michael Gurnis* Department of Geological Sciences, The University of Michigan, Ann Arbor, MI 48109-1063,USA ABSTRACT Estimates of dynamic motion of Australia since the end of the Jurassic have been made by modelling marine flooding and comparing it with palaeogeographical reconstructions of marine inundation. First, sediment isopachs were backstripped from present-day topography. Dynamic motion was determined by the displacement needed to approximate observed flooding when allowance is made for changes in eustatic sea-level. The reconstructed inundation patterns suggest that during the Cretaceous, Australia remained a relatively stable platform, and flooding in the eastern interior during the Early Cretaceous was primarily the result of the regional tectonic motion. Vertical motion during the Cretaceous was much smaller than the movement since the end of the Cretaceous. Subsidence and marine flooding in the Eromanga and Surat Basins, and the subsequent 500 m of uplift of the eastern portion of the basin, may have been driven by changes in plate dynamics during the Mesozoic. Convergence along the north-east edge of Australia between 200 and 100 Ma coincides with platform sedimentation and subsidence within the Eromanga and Surat Basins. A major shift in the position of subduction at 140Ma was coeval with the marine incursion into the Eromanga. When subduction ended at 95 Ma, marine inundation of the Eromanga also ended. Subsidence and uplift of the eastern interior is consistent with dynamic models of subduction in which subsidence is generated when the dip angle of the slab decreases and uplift is generated when subduction terminates (i.e.
    [Show full text]
  • What Are the Key Characteristics of Organised Crime? 7 How Does Organised Crime Affect Us? 8 How Are We Responding? 9
    Correspondence should be addressed to: Chief Executive Officer Australian Crime Commission PO Box 1936 Canberra City ACT 2601 Telephone: 02 6243 6666 (from within Australia) 61 2 6243 6666 (international) Facsimile: 02 6243 6687 (from within Australia) 61 2 6243 6687 (international) Published May 2015 © Commonwealth of Australia 2015. This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission from the Chief Executive Officer, Australian Crime Commission. ISSN 2202-3925 1 ORGANISED CRIME IN AUSTRALIA 2015 AUSTRALIAN CRIME COMMISSION CEO FOREWORD MR CHRIS DAWSON APM Organised Crime in Australia 2015 is the Australian Crime Commission’s biennial public report that delivers a current picture of the serious and organised crime environment in Australia. It outlines the existing and emerging organised crime threats impacting the Australian community and national interests. 2 Serious and organised crime is growing in sophistication and constantly adopting new and advanced technologies to undertake illegal activities. It exploits the internet and other technologies to target the community through activities such as online scams, cybercrime and the theft of personal identity information stored electronically. It is expanding its reach globally and injecting itself into new markets—both legitimate and illegitimate—in order to increase its opportunities to generate illicit wealth. It works to conceal unlawfully derived profits, seeking to intermingle those funds with legitimately earned money. These activities significantly affect the wellbeing of families and communities across Australia. Serious and organised crime diverts funds out of the legitimate economy and undermines the profitability of lawful businesses.
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • If You Have Issues Viewing Or Accessing This File, Please Contact Us at NCJRS.Gov
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. Q L/ LI7 '73 charge of each. There are 34 divisions, spectors. The State has about Police Rescue Squad each headed by an ins:1ector. 1,245,000 people. Several special squads are based at The force's motto is "The Safety of . the Sydney CIB, including the Armed the People is the Highest Law". Its role Hold-Up Squad, Homicide Squad, is laid down as the preservation of life Australi a:::'~sr'1fTK~TI·~hf~o: rces Special Breaking Squad, Consorting and the protection of property, the Squad, Drug Squad, Crime Intelligence prevention and detection of crime and Unit, Fraud Squad, Vice Squad and the maintenance of peace and good Motor Squad. Detectives and order. plainclothes police are also stationed at most police stations in the metropo!itan Western Australian area and at the larger country stations. Police Force This force has a strength of about Victoria Police Force 2,290. They serve about 1,116,000 Under its Chief Commissioner this people. The higher ranks include a senior force has about 6,500 members (some assistant commissioner, and three assis­ 300 of them policewomen). The~' in­ tant commissioners (for administration, clude one deputy commissioner, five crime, traffic) a chief superintendent, 21 assistant commissioners, two com­ superintendents, 20 senior inspectors manders, 24 chief superintendents, 29 and 25 inspectors including one woman superintendents, 87 chief inspectors, police inspector. and 173 inspectors. They serve about To bring about more effective un­ 3,700,000 people. derstanding among the State's Victoria is divided for police purposes Aboriginal population, 18 Aboriginal into 26 geographical districts each com­ police aides are part of the force (since manded by a chief superintendent.
    [Show full text]
  • Technology Innovation and the Future of Air Force Intelligence Analysis
    C O R P O R A T I O N LANCE MENTHE, DAHLIA ANNE GOLDFELD, ABBIE TINGSTAD, SHERRILL LINGEL, EDWARD GEIST, DONALD BRUNK, AMANDA WICKER, SARAH SOLIMAN, BALYS GINTAUTAS, ANNE STICKELLS, AMADO CORDOVA Technology Innovation and the Future of Air Force Intelligence Analysis Volume 2, Technical Analysis and Supporting Material RR-A341-2_cover.indd All Pages 2/8/21 12:20 PM For more information on this publication, visit www.rand.org/t/RRA341-2 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0633-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover: U.S. Marine Corps photo by Cpl. William Chockey; faraktinov, Adobe Stock. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Review of the Corporate Governance of Statutory Authorities and Office Holders Review of the Corporate Governance of Statutory Authorities and Office Holders
    REVIEW OF THE CORPORATE GOVERNANCE OF STATUTORY AUTHORITIES AND OFFICE HOLDERS REVIEW OF THE CORPORATE GOVERNANCE OF STATUTORY AUTHORITIES AND OFFICE HOLDERS June 2003 © Commonwealth of Australia 2003 ISBN 0-9580419-8-9 This work is copyright. Apart from any used as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth available from the Department of Communications, Information Technology and the Arts. Requests and inquiries concerning reproduction and rights should be addressed to: Commonwealth Copyright Administration Intellectual Property Branch Department of Communications, Information Technology and the Arts GPO Box 2154 Canberra ACT 2601 or posted at http://www.dcita.gov.au/cca Design and layout by Whizzbang Art, Canberra Printed by Canprint Communications iii iv TABLE OF CONTENTS Letter of transmittal . .iii Executive summary . .1 Background to the review . .1 Terms of reference . .1 The review process . .1 Governance . .2 Developing good governance for the public sector . .3 What the review found . .5 Good governance going forward . .7 The principles . .10 The templates . .10 Summary of recommendations . .11 Summary of better practice guidance for boards . .13 Chapter 1 – Introduction . .15 Background to the review . .15 Terms of reference . .15 What are statutory authorities and who are office holders? . .16 What is corporate governance? . .17 The review process . .18 Chapter 2 – Governance . .21 What is meant by the term ‘governance’? . .21 Why we should look to see what the private sector has to offer . .26 Governance of statutory authorities . .30 The appropriate structures for statutory authorities . .34 Chapter 3 – What the review found .
    [Show full text]