Skip to main content

Intelligence and National Security: Australian Dilemmas Post-9/11

  • Chapter
  • First Online:
National Security, Surveillance and Terror

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 935 Accesses

Abstract

From the foundation of a security service in 1949 under Cold War auspices of MI5 to the expansion of the concept of security after 2001 and promulgation of over 50 new counter-terror laws, the practice of national security has troubled the Australian political conscience. The maintenance of national security and evolution of an Australian Intelligence Community has raised questions about its necessity and accountability. The pursuit of national security has exposed a paradox at the core of Australian democracy, namely, that political freedom might entail proscribing those dedicated to subverting it by violent means. This chapter explores this paradox, heightened since 2013 by revelations of WikiLeaks and Edward Snowden about the extent of Australian surveillance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Beginning with the Willie Brigitte Faheem Lhodi plot in 2003 to attack infrastructure targets through the Benbrika plot in 2005, and the Holdsworthy Barracks plot in 2009, to the arrests in Brisbane and Sydney in October 2014 and the lone wolf attack in Martin’s Place in 2014, what is now termed the Global Jihadist Movement (GJM) has posed difficulties both internationally and nationally for Australian security.

  2. 2.

    Lone actor attacks in Montreal on 20 October 2014 and on the war memorial in Ottawa on 22 October 2014 were responsible for the death of three Canadian servicemen. See http://edition.cnn.com/2014/10/22/world/americas/canada-ottawa-shooting/.

References

  • ASIO. 2005. Report to Parliament 2004–2005. Canberra: Commonwealth of Australia.

    Google Scholar 

  • ———. 2007. Report to Parliament 2006–2007. Canberra: Commonwealth of Australia.

    Google Scholar 

  • ———. 2008. Report to Parliament 2007–2008. Canberra: Commonwealth of Australia.

    Google Scholar 

  • Ball, Desmond, and David M. Horner. 1998. Breaking the Codes Australia’s KGB Network 1944–1950. Sydney: Allen and Unwin.

    Google Scholar 

  • Blackbourn, Jessie. 2013. Independent Review of Australian Anti-Terrorism Laws: An Effective Oversight Mechanism? Oxford Human Rights Hub, July.

    Google Scholar 

  • Brew, N. 2003. The New National Threat Assessment Centre (Research Note No. 23). Canberra: Australian Parliamentary Library, December 1. http://www.aph.gov.au/Library/pubs/RN/2003-04/04rn23.htm.

  • Burke, Jason, and Monica Mark. 2015. Al-Qaida in Yemen Uses Video to Claim Responsibility for Charlie Hebdo Attack. Guardian, January 14. http://www.theguardian.com/world/2015/jan/14/al-qaida-claims-responsibility-charlie-hebdo-attack-paris.

  • Clarke, Sir John. 2008. Report of the Inquiry into the Case of Dr Mohamed Hanee, vol 1. Canberra: Attorney General’s Department.

    Google Scholar 

  • Department of Foreign Affairs and Trade (DFAT). 2004. Transnational Terrorism: The Threat to Australia. Canberra: Australian Government Printing Service.

    Google Scholar 

  • Department of Prime Minister and Cabinet. 2015. Review of Review of Australia’s Counter-Terrorism Machinery. Canberra: Commonwealth of Australia.

    Google Scholar 

  • Dupont, A. 2002. Quoted in Far Eastern Economic Review, October 2.

    Google Scholar 

  • Ergas, Henry, Scott Hook, Carl J. Ungerer, and Mark Stewart. 2008. The Intelligence Reform Agenda. Australian Strategic Policy Institute, November.

    Google Scholar 

  • Flood, Philip. 2004. Report of the Inquiry into the Australian Intelligence Agencies. Canberra: Australian Government Printing Service, July.

    Google Scholar 

  • Gyngell, Allan, and Michael Wesley. 2004. Making Australian Foreign Policy. Oxford: Oxford University Press.

    Google Scholar 

  • Hegghammer, Thomas. 2010. The Case for Chasing Awlaki. Foreign Policy, November 24. http://foreignpolicy.com/2010/11/24/the-case-for-chasing-al-awlaki/.

  • Hocking, Jenny. 2003. Counter-Terrorism and the Criminalisation of Politics: Australia’s new Security Powers of Detention, Proscription and Control. Australian Journal of Politics and History 49(3): 355–371.

    Article  Google Scholar 

  • ———. 2004. Terror Laws: ASIO, Counter-Terrorism and the Threat to Democracy. Sydney: UNSW Press.

    Google Scholar 

  • Hope, Robert M. 1976. Report of the Royal Commission on Intelligence and Security (3rd Report). Canberra: Australian Government Printing Service.

    Google Scholar 

  • Inspector General of Intelligence and Security (IGIS). 2008. Report of the Inquiry into the Actions Taken by ASIO in 2003 in Respect of Mr Izhar Ul-Haque and Other Related Matters. Canberra: IGIS.

    Google Scholar 

  • Lynch, Andrew, Nicola McGarrity, and George Williams. 2015. Inside Australia’s Anti-Terrorism Laws and Trials. Sydney: New South Publishing.

    Google Scholar 

  • Maher, S. 2015. A Genealogy of Salafi Jihadism: The History of an Idea. Unpublished PhD thesis, King’s College, University of London, London.

    Google Scholar 

  • Martin Jones, David, and Michael L.R. Smith. 2012. Ideology, Networks and Political Religion: Structure and Agency in Jemaah Islamiyah’s Small World. Politics, Religion and Ideology 13(4): 473–493.

    Article  Google Scholar 

  • McLennan, A.D. 1995. National Intelligence Assessment: Australia’s Experience. Intelligence and National Security 10(4): 71–91.

    Article  Google Scholar 

  • Meleagrou-Hitchens, A. 2015. The Global Jihad Movement in the West: A Study of Anwar Al-Awlaki and His Followers in the Context of Homegrown Radicalisation and the Global Jihadist Western Recruitment Strategy. Unpublished PhD thesis, Kings College, University of London, London.

    Google Scholar 

  • Neighbour, Sally. 2014. Hidden Agendas. The Monthly.

    Google Scholar 

  • Parliamentary Joint Committee on Intelligence and Security. 2011. Review of Administration and Expenditure. Canberra: Commonwealth of Australia.

    Google Scholar 

  • Rudd, Kevin. 2008. The First National Security Statement to the Parliament, December 4. www.pm.gov.au/media/speech_0659cfm.

  • Snowden, Edward. 2014. Interview Transcript. Norddeutscher Rudfunk, January 26.

    Google Scholar 

  • Street, Sir Laurence. 2008. The Street Review: A Review of Interoperability Between the AFP and its National Security Partners. Canberra: Attorney General’s Department.

    Google Scholar 

  • Templeton, Jacqueline. 1977. Report of the Royal Commission on Intelligence and Security Australian Intelligence and Security Services 1900–1950 (7th Report). Canberra: Australian Government Printing Service.

    Google Scholar 

  • The Australian. 2003a. January 25–26.

    Google Scholar 

  • ———. 2003b. February 15–16.

    Google Scholar 

  • Thom, Vivienne. 2011. IGIS Annual Report 2010–11. Canberra: Commonwealth of Australia.

    Google Scholar 

  • ———. 2014. IGIS Annual Report 2013–14. Canberra: Commonwealth of Australia.

    Google Scholar 

  • Wilkie, Andrew. 2004. Axis of Deceit. Sydney: Black Ink.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Jones, D.M. (2016). Intelligence and National Security: Australian Dilemmas Post-9/11. In: Lippert, R., Walby, K., Warren, I., Palmer, D. (eds) National Security, Surveillance and Terror. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-43243-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43243-4_12

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-43242-7

  • Online ISBN: 978-3-319-43243-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics