Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

Australian Security and Intelligence Conference

Articles 1 - 30 of 56

Full-Text Articles in Entire DC Network

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …


Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks Jan 2015

Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks

Australian Security and Intelligence Conference

Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance …


Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East Jan 2015

Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East

Australian Security and Intelligence Conference

No abstract provided.


Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher Jan 2015

Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher

Australian Security and Intelligence Conference

This article aims to demonstrate how radicalisation, violent-extremism and terrorism are terms often used interchangeably – terms that do not have the same meaning and are generally poorly defined. It will reveal, as with other terminologies pertaining to this area of interest, how violent-extremism has no universally accepted definition, and remains tainted with ambiguity. Arguably, the term is predominantly used as a social label in discussions on terrorism and other forms of extreme violence – particularly applied to those who have a distorted interpretation of religious ideology to justify the use of violence to achieve specific socio-political aimsTo provide a …


Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey Jan 2015

Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey

Australian Security and Intelligence Conference

Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …


Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok Jan 2015

Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok

Australian Security and Intelligence Conference

The rise of Islamic State has seen a rise in the threat and incidences of domestic terrorism. Sophisticated strategies are being used to target youth and draw them into the ideology of Islamic state and other terrorist groups. Two common strategies used by Islamic State are the use of propaganda tools as well as Neuro linguistic programming strategies. This paper looks at how these strategies were used through a longitudinal online ethnographic study on the social media site Facebook. Data collected revealed that these two strategies were used in a targeted manner and worked together in a symbiotic fashion to …


Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson Jan 2015

Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson

Australian Security and Intelligence Conference

Burglary and stealing are crimes that have a significant impact and cost on its victims and society. To mitigate such crimes, property marking is a situational crime prevention strategy that attempts to prevent through dissuasion. There are many forms of property marking, yet there is limited research of its efficacy. Where there have been such studies, there has been some indications of success. Therefore, the study assessed the efficacy of property marking to reduce burglary and stealing crimes. The study undertook a quantitate approach using non-equivalent control groups to assess the geo-spatial impact of property marking when applied at a …


Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok Jan 2015

Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok

Australian Security and Intelligence Conference

Institutionalised Moral Reframing is a new research model on Islamic radicalisation based on a longitudinal ethnographic research on social media. Prior to introducing the model, an overview of other radicalisation models will be presented with a brief overview of each. Critical to the Institutionalised Moral Reframing model is the concept of socialisation via an online institution of social media where an individual is isolated from competing discourses. The model uses two axis, a moral authority axis and a moral discourses axis. These two axis are mutually reinforcing and enable an individual to progress along stages in a context that includes …


Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill Jan 2015

Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill

Australian Security and Intelligence Conference

In the years since the tragedy of 9/11 the term "security" has become a much used and abused term. As the war on terrorism has evolved, politicians of all persuasions played the security card to change law and legislation ostensibly to protect the community. Those whom provide the security assume that freedoms lost by the wider community in the name of security are in fact a fair price to pay for that security. In this environment the security discourse is diminished and this provides an opportunity for security deviance to emerge. This research used a selection of publically reported examples …


A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson Jan 2015

A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson

Australian Security and Intelligence Conference

No abstract provided.


Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake Jan 2014

Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake

Australian Security and Intelligence Conference

The inability to form psychological profiles of individual members across a variety of extremist groups, as well as the recognition in extremism and terrorism research indicates that no adequate personality profile exists. This requires an analysis of other factors that influence the radicalisation process. By drawing on social identity theory, this paper offers a psycho-social explanation for how people define themselves in relation to their social group, as well as how the intra-group relationships can lead to extreme behaviour and resistance to counter efforts. These groups promote a salient social identity that becomes intrinsic to the self to the extent …


The Bad Guys Are Using It, Are You?, Hong-Eng Koh Jan 2014

The Bad Guys Are Using It, Are You?, Hong-Eng Koh

Australian Security and Intelligence Conference

From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


Countering Crime In Hostile Environments: Securing Vulnerable Humanitarian Aid Workers In Papua New Guinea, William J. Bailey Jan 2014

Countering Crime In Hostile Environments: Securing Vulnerable Humanitarian Aid Workers In Papua New Guinea, William J. Bailey

Australian Security and Intelligence Conference

Crime is a core issue for companies and more recently for NGOs working in Papua New Guinea (PNG). The nation is facing major challenges as crime levels rise exponentially across the country. Erstwhile un-affected humanitarian operations were often seen as immune from criminality, but now have become just as likely to be targeted as any other organisation. Consequently, there is a need to adopt security measures, but maybe not necessarily as draconian as those used hitherto by major companies. People-centered, locally-owned is a concept whereby the local population is encouraged to protect the delivery of health services and aid from …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr. Jan 2014

Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.

Australian Security and Intelligence Conference

Property marking, as a situational crime prevention technique, has found to be largely ineffectual in the reduction of property theft, although past studies have not considered the role property marking as an aid to the return of stolen or lost property. However, automotive identification and some studies have found that in some cases property marking is effective. Furthermore, many crime prevention groups focus on property marking as a means to reduce crime and the fear of crime.

Therefore, the study investigated the processes of lost, stolen and seized goods by law enforcement personnel. The study undertook a qualitative analysis of …


An Exploratory Study Of The Lived Experience Of Being An Intelligence Analyst, Sharon Moss, Jeff Corkill, Eyal Gringart Dec 2013

An Exploratory Study Of The Lived Experience Of Being An Intelligence Analyst, Sharon Moss, Jeff Corkill, Eyal Gringart

Australian Security and Intelligence Conference

Since the World Trade Centre terror attacks of 2001 the intelligence domain has grown rapidly. In keeping with this growth has been a significant increase of scholarly interest in the domain. The intelligence literature is dominated by research into the failures of the discipline, organisational structure and the politics of intelligence. The intelligence analyst is a critical component of the intelligence domain yet is remarkably absent from the intelligence literature. This research seeks to address that imbalance by examining the lived experience of the analyst operating in the law enforcement intelligence domain. To this end, interpretive phenomenology was employed to …


Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool, William J. Bailey, David J. Brooks Dec 2013

Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool, William J. Bailey, David J. Brooks

Australian Security and Intelligence Conference

Any viable method of protecting property, dissuading the theft of property or ensuring the swift recovery of stolen property could be considered essential to general society. A number of crime preventive measures have been used in an attempt to achieve this objective. One such measure is property marking, employing various techniques to make property more readily identifiable. The study assesses technology to investigate effectiveness, both for dissuasion and for tracing once stolen. Mechanism for the disposal of stolen property forms an important part of this study, commencing with the mapping of the theft‐supply‐chain. Using a mixed methods approach, the research …


The Contemporary Australian Intelligence Domain - A Multi Dimension Examination, Alan Davies, Jeff Corkill Dec 2013

The Contemporary Australian Intelligence Domain - A Multi Dimension Examination, Alan Davies, Jeff Corkill

Australian Security and Intelligence Conference

In the complex and interconnected post 9/11 world the roles and functions of intelligence have evolved beyond being a secret capability of governments focused on national security needs. Intelligence has become recognised as a critical function necessary to support decision making across the full breadth of government and corporate activity. The concept of an intelligence community being purely national security centric and bounded by secrecy has become limited. Intelligence in support of decision making has become a far broader domain than previously believed. This paper investigates the degree of intelligence embedded‐ness across government agencies and departments at the federal, state …


Physical Security Barrier Selection: A Decision Support Analysis, Agnieszka Kiszelewska, Michael Coole Dec 2013

Physical Security Barrier Selection: A Decision Support Analysis, Agnieszka Kiszelewska, Michael Coole

Australian Security and Intelligence Conference

Physical security controls aim to reduce risk through their ability to systematically deter, or detect, delay and respond against deviant acts within a risk context. Holistically the aim is to increase the difficulty and risks while reducing the rewards associated with an act of deviance as captured in Clarke’s Situational Crime Prevention (SCP) framework. The efficacious implementation of such controls commensurate with the risk context requires a considered undertaking referred as informed decision‐making. Informed decision‐making is effective when a suitable choice is made accordant with base rate data that achieves its defined objectives within costs versus benefits framework. The study …


Is Emergency Management Considered A Component Of Business Continuity Management?, Kenny Frohde, David J. Brooks Dec 2013

Is Emergency Management Considered A Component Of Business Continuity Management?, Kenny Frohde, David J. Brooks

Australian Security and Intelligence Conference

Emergency Management (EM) and Business Continuity Management (BCM) frameworks incorporate measures of strategic and operational aspects. Defined within a number of Australian and international standards as well as guidelines, such concepts may be integrated to provide increased resilience for disruptive events. However, it has been found that there is some degree of misalignment of concept integration amongst security and EM bodies of knowledge. In line with cognitive psychology exemplar‐based concepts, such misalignments may be associated with a lack of precision in communality in the approach to EM and BCM. This article presents stage 1 of a two‐stage study. Stage 1 …


Defence In Depth, Protection In Depth And Security In Depth: A Comparative Analysis Towards A Common Usage Language, Michael Coole, Jeff Corkill, Andrew Woodward Dec 2012

Defence In Depth, Protection In Depth And Security In Depth: A Comparative Analysis Towards A Common Usage Language, Michael Coole, Jeff Corkill, Andrew Woodward

Australian Security and Intelligence Conference

A common language with consistency of meaning is a critical step in the evolution of a profession. Whilst the debate as to whether or not security should be considered a profession is ongoing there is no doubt that the wider community of professionals operating in the security domain are working towards achieving recognition of security as a profession. The concepts of defence in depth, protection in depth and security in depth have been used synonymously by different groups across the domain. These concepts represent the very foundation of effective security architecture are hierarchical in nature and have specific meaning. This …


Representing Variable Source Credibility In Intelligence Analysis With Bayesian Networks, Ken Mcnaught, Peter Sutovsky Dec 2012

Representing Variable Source Credibility In Intelligence Analysis With Bayesian Networks, Ken Mcnaught, Peter Sutovsky

Australian Security and Intelligence Conference

Assessing the credibility of an evidential source is an important part of intelligence analysis, particularly where human intelligence is concerned. Furthermore, it is frequently necessary to combine multiple items of evidence with varying source credibilities. Bayesian networks provide a powerful probabilistic approach to the fusion of information and are increasingly being applied in a wide variety of settings. In this paper we explore their application to intelligence analysis and provide a simple example concerning a potential attack on an infrastructure target. Our main focus is on the representation of source credibility. While we do not advocate the routine use of …


Creating A Counter-Insurgency Plan: Elements Required Based Upon A Comparative Analysis Of Research Findings, William J. Bailey Dec 2012

Creating A Counter-Insurgency Plan: Elements Required Based Upon A Comparative Analysis Of Research Findings, William J. Bailey

Australian Security and Intelligence Conference

The development of a counter-insurgency doctrine is an evolutionary process: no two insurgencies are the same. However, certain fundamental principals remain consistent and these can be applied to meet the required circumstances. The creation of an overarching plan encompassing a combination of military, political and social actions under the strong control of a single authority is central. Therefore, understanding the basics allows for the development of a tactical strategy based upon a structured plan. Compiling the ‘Plan’ should be based upon the lessons learnt from the past. To this end, the methodology used is supported by a literature review and …


Understanding The Vulnerabilities In Wi-Fi And The Impact On Its Use In Cctv Systems, Michael Coole, Andrew Woodward, Craig Valli Dec 2012

Understanding The Vulnerabilities In Wi-Fi And The Impact On Its Use In Cctv Systems, Michael Coole, Andrew Woodward, Craig Valli

Australian Security and Intelligence Conference

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV …


The Intelligence Game: Assessing Delphi Groups And Structured Question Formats, Bonnie Wintle, Steven Mascaro, Fiona Fidler, Marissa Mcbride, Mark Burgman, Louisa Flander, Geoff Saw, Charles Twardy, Aidan Lyon, Brian Manning Dec 2012

The Intelligence Game: Assessing Delphi Groups And Structured Question Formats, Bonnie Wintle, Steven Mascaro, Fiona Fidler, Marissa Mcbride, Mark Burgman, Louisa Flander, Geoff Saw, Charles Twardy, Aidan Lyon, Brian Manning

Australian Security and Intelligence Conference

In 2010, the US Intelligence Advanced Research Projects Activity (IARPA) announced a 4-year forecasting “tournament”. Five collaborative research teams are attempting to outperform a baseline opinion pool in predicting hundreds of geopolitical, economic and military events. We are contributing to one of these teams by eliciting forecasts from Delphi-style groups in the US and Australia. We elicit probabilities of outcomes for 3-5 monthly questions, such as: Will Australia formally transfer uranium to India by 1 June 2012? Participants submit probabilities in a 3-step interval format, view those of others in their group, share, rate and discuss information, and then make …


Intelligent Buildings: An Investigation Into Current And Emerging Security Vulnerabilities In Automated Building Systems Using An Applied Defeat Methodology, David J. Brooks Jan 2011

Intelligent Buildings: An Investigation Into Current And Emerging Security Vulnerabilities In Automated Building Systems Using An Applied Defeat Methodology, David J. Brooks

Australian Security and Intelligence Conference

Intelligent Buildings (IB) have become increasing popular during the past decade, driven through the need to reduce energy, have more reactive and safer buildings, and increase productivity. IB integrate many systems that were in the past isolated from each other, including fire and life safety, HVAC, lighting, security, etc. Facilities contain commercial-in-confidence material and other valued assets; however, IB are integrated through open and common data communication protocols and hardware, leaving facilities exposed to external and internal threats. The study presents an investigation into IB, based on a defeat evaluation methdology. IB vulnerabilities considered two areas, namely physical and software …


Intelligence Analysis And Threat Assessment: Towards A More Comprehensive Model Of Threat, Charles Vandepeer Jan 2011

Intelligence Analysis And Threat Assessment: Towards A More Comprehensive Model Of Threat, Charles Vandepeer

Australian Security and Intelligence Conference

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are almost singularly concerned with understanding an identified enemy’s intentions and capabilities. This ‘enemy-centric’ approach to intelligence analysis has recently come in for criticism. In particular, the shortcomings of the current approach become apparent where the focus of intelligence analysis is on threats from difficult-to-identify sub-state or non-state …


Security Risk Management In The Asia Pacific Region: What Are Security Professional Using?, David J. Brooks, Hamish Cotton Jan 2011

Security Risk Management In The Asia Pacific Region: What Are Security Professional Using?, David J. Brooks, Hamish Cotton

Australian Security and Intelligence Conference

The Asia Pacific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental knowledge domain within security. Nevertheless, there has been limited understanding of what security professionals use when applying security risk management. The study was designed to gain a better understanding of risk management practice in place throughout APAC. Questions were generated to gauge an understanding of current practice and levels of implementation of standards and frameworks. Participants were drawn from many industries, using non-probabilistic sampling methods in a “snowball” …