Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …


Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok Jan 2015

Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok

Australian Security and Intelligence Conference

The rise of Islamic State has seen a rise in the threat and incidences of domestic terrorism. Sophisticated strategies are being used to target youth and draw them into the ideology of Islamic state and other terrorist groups. Two common strategies used by Islamic State are the use of propaganda tools as well as Neuro linguistic programming strategies. This paper looks at how these strategies were used through a longitudinal online ethnographic study on the social media site Facebook. Data collected revealed that these two strategies were used in a targeted manner and worked together in a symbiotic fashion to …


Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok Jan 2015

Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok

Australian Security and Intelligence Conference

Institutionalised Moral Reframing is a new research model on Islamic radicalisation based on a longitudinal ethnographic research on social media. Prior to introducing the model, an overview of other radicalisation models will be presented with a brief overview of each. Critical to the Institutionalised Moral Reframing model is the concept of socialisation via an online institution of social media where an individual is isolated from competing discourses. The model uses two axis, a moral authority axis and a moral discourses axis. These two axis are mutually reinforcing and enable an individual to progress along stages in a context that includes …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan Jan 2009

Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan

Australian Security and Intelligence Conference

Climate change and energy security are driving a worldwide renaissance in nuclear power. An Australian nuclear power industry has also been seriously investigated by the Australian government and its agencies. This paper provides a broad overview of the nuclear fuel cycle and the nuclear power industry. It identifies aspects that are sensitive to nuclear terrorism and nuclear weapons proliferation to help security professionals identify threats and prepare for a possible Australian nuclear power industry.


Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill Jan 2009

Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill

Australian Security and Intelligence Conference

Intelligence analysis is critical national security and law enforcement function dependant on the intellectual capacity of individual analysts. The practice of intelligence is undertaken in an extremely complex environment often under a veil of secrecy, and where uncertain and deceptive information represents the norm. In order to develop as a profession appropriate constructs with which to explore and explain how analysts process intelligence, make decisions and reach judgements are needed. An improved understanding will offer opportunities to develop appropriate training and professional development for intelligence analysts. This paper introduces the construct of Professional Intelligence Judgement Artistry together with some very …


Terror Attacks: Understanding Social Risk Views Between Singaporean Lay And Security Practitioners, Yam Hong Loo, David J. Brooks Jan 2009

Terror Attacks: Understanding Social Risk Views Between Singaporean Lay And Security Practitioners, Yam Hong Loo, David J. Brooks

Australian Security and Intelligence Conference

This study investigated the psychometric risk perception between lay people and security practitioners towards terrorist attack against Singaporean educational institutions. Being located in Southeast Asia, Singapore is not immune to terrorist attacks from rebels found in the region. To promote fear and chaos, terrorists have begun to attack private and neutral institutions in order to promote their cause. Mosques, hospitals and other such institutions are no longer immune from terrorist attacks. The psychometric risk paradigm offers a basis for examining empirical views towards potential terrorist attack against such institutions. Survey data in comparing terrorist attack against Singapore’s educational institutions with …