The search found 6 results in 0.074 seconds.
The menace presented by Islamic State’s (IS) self-proclaimed ‘caliphate’ is uniquely challenging on a number of levels. Tactically, its military operations demand lateral thinking, since the group exists as a nebulous, swarming network constantly seeking to expand its reach. Strategically, too, it...
This paper dismantles the self-described Islamic State's brand into its constituent narratives and the various target audiences into their composite parts.
The following report sheds light on the strategic motivations of, and implications to, Islamic State’s media operation. By analysing...
Introduction: Over the last decade there has emerged in Australia a small but fertile and occasionally influential group of blogs devoted to international security and foreign policy. This is not the romantic grass-roots story that beguiled US media watchers in the mid-2000s, in which...
This paper discusses the Islamic State's success in using social media and other communications technologies to recruit fighters from Southeast Asia and Australia.
Southeast Asia has direct experience of returning extremists. Indonesian veterans of the Soviet invasion of Afghanistan laid the...
This report recommends the Federal Government introduce a data retention scheme, but also recommends several changes to the proposed legislation.
The Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 was tabled in the Australian Parliament on 30 October 2014. The Bill immediately engendered criticism and controversy that continued through its passage through Parliamentary Committees and debates. Notwithstanding those criticisms and a number of critical...