Annual Reports https://www.inslm.gov.au/ en Independent National Security Legislation Monitor Annual Report 2017-2018 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-0 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2017-2018</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">2 April 2019</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Dr James Renwick SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--x-office-document"> <a href="/sites/default/files/inslm-annual-report-17-18.docx">Independent National Security Legislation Monitor Annual Report 2017-2018</a> </article> </div> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-17-18.pdf">Independent National Security Legislation Monitor Annual Report 2017-2018</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"></div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 15 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2017 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2017 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2017</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">4 December 2017</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Dr James Renwick SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2016-2017.pdf">Independent National Security Legislation Monitor Annual Report 2017</a> </article> </div> <div class="field__item"> <article class="file file--x-office-document"> <a href="/sites/default/files/inslm-annual-report-2016-2017.docx">Independent National Security Legislation Monitor Annual Report 2017</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"></div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 16 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2016 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2016 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2016</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">13 October 2016</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">The Hon Roger Gyles AO QC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/2016-inslm-annual-report.pdf">Independent National Security Legislation Monitor Annual Report 2016</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><strong><a href="#intro">Introduction</a> | <a href="#security">Security landscape</a> | <a href="#legislative%20dev">Legislative Developments</a> | <a href="#significant%20developments">Other Significant Developments</a> | <a href="#jurisprudence">Developments in Jurisprudence</a> | <a href="#activities">Activities during the Reporting Period</a> | <a href="#non-reporting">Non-Reporting Activities</a> | <a href="#office">Office Management</a> | <a href="#appA">Appendix A</a> | <a href="#appB">Appendix B</a> | <a href="#appC">Appendix C</a> | <a href="#appD">Appendix D</a> | <a href="#footnotes">Footnotes</a></strong></p> <p>5 October 2016 </p> <p><strong>The Hon Malcolm Turnbull MP</strong></p> <p>Prime Minister</p> <p>Parliament House</p> <p>CANBERRA ACT 2600 </p> <p>Dear Prime Minister, </p> <p>INSLM Annual Report for 2015–16 </p> <p>I am pleased to attach my annual report for the period 1 July 2015 to 30 June 2016. </p> <p>This report is unclassified and is suitable to be presented to each House of Parliament in accordance with s 29 of the <em>Independent National Security Legislation Monitor Act 2010</em> (Cth).</p> <p>Yours sincerely,</p> <p>&lt;SIGNED&gt;</p> <p>Roger Gyles AO QC</p> <p>Independent National Security Legislation Monitor</p> <h2>Introduction</h2> <p>This is my second annual report to the Prime Minister as the Independent National Security Legislation Monitor (INSLM). </p> <p>This annual report relates to the period between 1 July 2015 and 30 June 2016 (Reporting Period). A detailed description of the requirements for annual reports can be found at Appendix A.</p> <h2>Security Landscape</h2> <h3>Domestic</h3> <p>The current National Terrorism Threat Advisory System was introduced on 26 November 2015. The System includes a scale of levels (‘certain’, ‘expected’, ‘probable’, ‘possible’, and ‘not expected’). At the time of writing this annual report, the threat level was set at ‘probable’, consistent with the threat level of ‘high’ that was set under the previous National Terrorism Threat System on 12 September 2014. This threat level means there is credible intelligence indicating individuals or groups have both the intention and capability of conducting an attack in Australia. </p> <p>Whilst the threat level was not raised during the Reporting Period, security agencies have reported that the nature of the threat faced by Australia is evolving, with an increased risk of low-level attacks conducted entirely by individuals or by small groups of people on ‘soft targets’ such as shopping centres and sporting events. These attacks can be carried out with minimal planning and within short timeframes. The perpetrators, who are younger, can now be radicalised online without any face-to-face contact.<a href="#ftn%201"><sup>1</sup></a> Perpetrators are also becoming more careful with communications, utilising encryption methods to make detection more difficult. These factors have led law enforcement bodies to increasingly rely upon sensitive intelligence sources to identify persons of interest.<a href="#ftn2"><sup>2</sup></a> </p> <p>The Australian Federal Police (AFP) advises that during the Reporting Period, 23 individuals were charged for a range of counter-terrorism and non-counter-terrorism offences as a result of 10 counter-terrorism operations. Charges were subsequently dropped against one individual. Of the 10 operations, one was in Brisbane, three were in Melbourne, and six were in Sydney. The majority of AFP investigations related to imminent onshore attack planning. However, several investigations related to suspected breaches of foreign incursions legislation.<a href="#ftn2"><sup>3</sup></a></p> <p>As at 1 September 2015, ASIO were undertaking over 400 active, high-priority investigations. These investigations included 120 Australians overseas either fighting with, or supporting, Islamist extremist groups in Iraq and Syria, and approximately 170 people in Australia supporting Syrian and Iraqi extremist groups. At least 32 Australian foreign fighters have been killed in Iraq and Syria since the conflicts began as a result of their involvement in those conflicts.<a href="#ftn2"><sup>4</sup></a></p> <p>The flow of both foreign fighters and finance to overseas conflicts, and the return of foreign fighters to Australia, remain priority concerns of the AFP and the intelligence agencies.</p> <h3>External </h3> <p>The external terrorist landscape also remains challenging, and the environment continues to evolve. Islamist terrorism experienced a resurgence as a result of instability following the Arab Uprisings, commonly referred to as the ‘Arab Springs’. The rise of Islamic State of Iraq and the Levant (ISIL), in particular, has transformed the terrorism threat to Australia and Australian interests globally. The terrorism threat is now more diverse than it has ever been, with a growing cast of organisations, networks, and individuals, intent on directing and inspiring violence against Australia’s interests. </p> <p>The narratives underpinning terrorism threats to Australia are also evolving, but retain a focus on violence and violent confrontation. In part, the extremist narrative told by jihadists and Islamist terrorists hinges on the claim that Islam has been under attack and that the Muslim world has been subjugated by the West, with the help of corrupt governments and regimes in Muslim countries. The remedy, they propose, is violent confrontation. They argue that local governments are traditionally too strong to topple, or have been backed by the West. To them, terrorism is therefore a justified approach, especially against the West, to stop it from supporting these governments. Al Qaeda’s (AQ’s) attacks on the United States (US) in September 2001 were framed in such a narrative. </p> <p>A more recent thread to this narrative has been developed by ISIL. Its story leapfrogs AQ’s; in its view, it has already established an idyllic caliphate which is destined to reign over the world by force. Any questioning of ISIL’s narrative attracts accusations of apostasy, and for ISIL’s supporters, warrants engaging in indiscriminate murder. </p> <p>For over a decade, the threat sources were organisations under pressure, such as AQ, trying to conduct terrorism from afar. But the landscape of terrorism has changed markedly over the last five years, resulting in a paradigm shift. A real threat continues to be posed by organisations intent on conducting attacks against Australia and other Western targets from a distance. Some aim for spectacular or mass casualty attacks. However, ISIL and its supporters can reach into Western societies with minimal effort, to encourage, inspire, and even order attacks. It is content with low level or ‘retail’ terrorism. Sporadic flurries of attacks by pro-ISIL operatives, at times acting alone, have become a new norm and more are to be expected. </p> <p>Much of the threat picture is associated with the foreign fighter phenomenon. The influx of foreign extremists to the Syrian conflict has been unprecedented in scale over duration. Various figures suggest over 20,000 foreign fighters have joined the fight in under four years. Most have gravitated to extremist groups there, with ISIL taking the lion’s share. Many of these foreign fighters maintain contacts in their respective homelands, often using encrypted online tools. They openly encourage and call for attacks by sympathisers in their home countries. </p> <p>In addition to foreign fighters, there has been a rise in propaganda glorifying indiscriminate violence. Australia figures periodically in such propaganda, either directly or indirectly, as a desirable target. Here, online platforms have revolutionised radicalisation. ‘Broadcast’ media such as online magazines, videos, and postings to social media, amplify the threat by romanticising violence and goading others to conduct it. Narrower casting is also in evidence: small online communities of extremists have burgeoned on encrypted social media platforms with similar effect, often preying on young sympathisers to engage in violence.<br />Throughout the Reporting Period, these trends were apparent. There were over 25 attacks in the West or against Western interests, resulting in over 300 deaths. One of these attacks took place in Australia, with the shooting of Curtis Cheng, discussed further below. Disruptions of planned attacks in Australia continued apace. Since 2014, nine plots were disrupted, but four attacks succeeded. These figures eclipse those for the preceding 20 years, when no attacks succeeded and four plots were disrupted. </p> <p>Attacks during the Reporting Period had symbolic, as well as concrete effects. The attack in Orlando in June 2016 was the largest Islamist terrorism attack in the US since the attacks of September 2001, killing 49 people. The November 2015 attacks in Paris killed over 130; the largest terrorism toll in decades. The Brussels bombings in March 2016 were the most significant terror attacks in Belgium’s history. The Jakarta attack in January 2016 aimed at both local and foreign targets, raising fears of a return to anti-Western attacks of the early 2000s.</p> <p>During the Reporting Period, ISIL came under more pressure than ever before, with a consequent degradation in its territorial control in Syria, Iraq, and Libya. Its provision of services has suffered, as has its income. As news of foreign fighters going to join ISIL waned, news of deaths in foreign fighter ranks began to rise. However, the frequency of attacks in ISIL’s name across the globe has drawn attention away from ISIL’s setbacks. </p> <p>The scale of the foreign fighter cohort and ISIL’s successful propaganda are enduring problems. Many foreign fighters could return to their countries of origin, and some will retain violent extremist ideas. ISIL’s narrative, as well as the broader anti-Western narrative it is nestled in, will inspire and legitimise acts of terrorism by sympathisers for years to come. </p> <p>Counter-terrorism measures globally will continue to evolve to respond to the evolving threat picture. Plot disruptions throughout the West are now at an unprecedented rate, yet attacks continue to occur. These attacks are mostly by sympathisers who operate in relative isolation from established cells, and who attempt to avoid detection by intelligence and law enforcement agencies through various means. Even so, attacks occurred in Europe despite the fact some perpetrators were known to authorities, including for their extremism.<sup><a href="#ftn2">5</a></sup></p> <h2>Legislative Developments </h2> <p>During the Reporting Period, the following significant bills and acts dealing with national security issues were either introduced to, or enacted by, the Parliament: </p> <ul><li>The Australian Citizenship Amendment (Allegiance to Australia) Bill 2015 was introduced into the House of Representatives on 24 June 2015 and referred to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) for inquiry and report. The PJCIS reported on the Bill on 4 September 2015.6 The Bill was also reviewed by the Parliamentary Joint Committee on Human Rights (PJCHR), which reported on it on 11 August 2015,7 and the Senate Standing Committee for the Scrutiny of Bills (SSCSB), which reported on the Bill on 16 March 2016.<a href="#ftn2"><sup>8 </sup></a></li> </ul><p>The Bill, which became the Australian Citizenship Amendment (Allegiance to Australia) Act 2015 (Cth), was passed on 3 December 2015. The Act provides for the renunciation or revocation of the Australian citizenship of those who hold one or more foreign citizenships alongside their Australian citizenship, and engage in terrorism or foreign-fighting-related conduct. </p> <p>When giving consideration to the Bill prior to its passing, the PJCIS made recommendations pertaining to the scope and application of the Bill (ie, to what forms of offences and conduct it applies), the administrative application of the Bill, and the Bill’s application to children. The Committee recommended that subject to its other recommendations, the Bill be passed.<a href="#ftn2"><sup>9</sup></a> </p> <p>When considering the Bill, the PJCHR suggested that several of the measures under the Bill were incompatible with human rights law, and that the revised statement of compatibility did not provide sufficient evidence to demonstrate that the proposed measures were compatible with human rights requirements. Some of the committee members also took the view that the deprivation of citizenship from those who endanger the security of Australia is desirable and will help keep Australians safe from terrorism.<sup><a href="#ftn10">10</a></sup></p> <ul><li>The Counter-Terrorism Legislation Amendment Bill (No 1) 2015 was introduced into the Parliament on 12 November 2015 and referred to the PJCIS for inquiry and report. The PJCIS reported on the Bill on 15 February 2016.<sup><a href="#ftn10">11</a></sup> The Bill was also considered by the SSCSB,<sup><a href="#ftn10">12</a></sup> and partly considered by the PJCHR, although it did not end up commenting on the Bill.<sup><a href="#ftn10">13</a></sup> The Bill lapsed on 17 April 2016 with the proroguing of Parliament. However, the Government has reintroduced the Bill to the current Parliament in the form of the Counter-Terrorism Legislation Amendment Bill (No 1) 2016. </li> </ul><p>The Bill seeks to make a number of amendments to acts and legislative provisions relating to counter-terrorism, including the control order regime under the Commonwealth Criminal Code (including by reducing the age at which control orders may be imposed on individuals, from 16 to 14 years), monitoring and warrant powers under the Crimes Act 1914 (Cth), and the use of information with security implications under the National Security Information (Criminal and Civil Proceedings) Act 2004 (Cth). </p> <p>When considering the Bill, the PJCIS made a number of recommendations, including recommendations pertaining to applying for control orders, monitoring controlees, and altering the thresholds for other orders and offences. The Committee recommended that, subject to its other recommendations being implemented, the Bill be passed.<a href="#ftn10"><sup>14</sup></a> While the Bill was also considered by the SSCSB, it ultimately left most matters for determination by the Senate as a whole.15 Consideration was given to the Bill as part of the context for my reports on the control order regime to be dealt with later.</p> <ul><li>The Australian Crime Commission Amendment (National Policing Information) Bill 2015 was introduced to the Parliament on 3 December 2015. The Bill was reviewed and reported on by the Senate Standing Committee on Legal and Constitutional Affairs (SSCLA) on 10 March 2016,<sup><a href="#ftn10">16</a></sup> and by the SSCSB on 2 March 2016,<sup><a href="#ftn10">17</a></sup> and became the Australian Crime Commission Amendment (National Policing Information) Act 2016 (Cth), with the Bill passed by both Houses of Parliament on 4 May 2016. </li> </ul><p>This Act merged the Australian Crime Commission, which performed a specialist investigative role within the Commonwealth, with CrimTrac, which delivered and maintained national information sharing solutions for Australian law enforcement bodies. The new agency, known as the Australian Criminal Intelligence Commission (ACIC) and headed by the former Chief Executive Officer of the Australian Crime Commission, Mr Chris Dawson APM, commenced operations on 1 July 2016.</p> <ul><li>The Crimes Legislation Amendment (Proceeds of Crime and Other Measures) Bill 2015 was introduced to the Parliament on 26 November 2015. The Bill was reviewed by the SSCLA, with their report being released on 3 February 2016.<sup><a href="#ftn18">18</a></sup> It was also considered by the PJCHR in their report of 2 February 2016,<sup><a href="#ftn18">19</a></sup> as well as the SSCSB in their reports of 3 February 2016, 24 February 2016, and 2 March 2016.<sup><a href="#ftn18">20</a></sup> The Bill passed both houses of Parliament on 23 February 2016 and became the Crimes Legislation Amendment (Proceeds of Crime and Other Measures) Act 2016 (Cth). </li> </ul><p>Prior to its passing, the SSCLA recommended that the Bill be passed,<sup><a href="#ftn18">21</a></sup> while the SSCSB recommended that additional safeguards be included relating to the use and disclosure of personal information.<sup><a href="#ftn18">22</a></sup></p> <p>Of particular relevance to the INSLM is that the Act amended the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) to expand information sharing among law enforcement and intelligence organisations both domestically and internationally.<sup><a href="#ftn18">23</a></sup></p> <p>The following further bills, acts, and instruments, that relate to security and are within the purview of the Independent National Security Legislation Monitor Act 2010 (Cth) (INSLM Act) were introduced to, enacted by, or otherwise considered by, Parliament during the Reporting Period: </p> <ul><li>The Criminal Code Amendment (Harming Australians) Bill 2013 was introduced to Parliament in December 2013, to make amendments to the Criminal Code to make it an offence to harm Australians overseas from 1 October 2002. It also sought to make harming of Australians prior to 1 October 2002 an offence, where other criteria are met also. During the Reporting Period, this bill was considered by the SSCLA, which expressed concerns regarding the Bill’s retrospective application, the breadth of offences it sought to create, and the practical difficulties incumbent in enforcing it. The Committee ultimately recommended that further consultation take place before the Bill undergo consideration by the Senate.<sup><a href="#ftn18">24</a></sup> However, the Bill lapsed with the proroguing of Parliament.</li> <li>A number of instruments making declarations and expanding the scope of sanctions pursuant to the Autonomous Sanctions Act 2011 (Cth) and the Charter of the United Nations Act 1945 (Cth) were considered by the PJCHR after they came into force.<a href="#ftn18"><sup>25</sup></a> The instruments sought to designate and declare individuals subject to legislative sanctions and powers, expand the basis upon which the Minister for Foreign Affairs can designate individuals, and expand the basis upon which individuals’ conduct may be prohibited or deemed criminal. The PJCHR did not provide a conclusive view on the instruments, recommending that further information be provided to verify that the process of designation is proportionate to the stated objectives.<sup><a href="#ftn18">26</a></sup></li> </ul><h2>Other Significant Developments </h2> <p>In July 2015, the then Prime Minister launched the Council of Australian Governments’ (COAG) counter-terrorism strategy.<sup><a href="#ftn27">27</a></sup> The strategy established co-operative arrangements for agencies at all levels of government to combat terrorism. The strategy includes five limbs: </p> <ol><li>challenging violent extremist ideologies; </li> <li>stopping people from becoming terrorists; </li> <li>shaping the global environment; </li> <li>disrupting terrorist activity within Australia; and </li> <li>effective response and recovery. </li> </ol><p>Most relevant for the INSLM are limbs 4 and 5. The strategy makes clear that protecting lives is the first priority of governments and that government agencies will act to disrupt an attack over the gathering of evidence for a successful prosecution where both objectives cannot be achieved. </p> <p>Arrangements relevant to the strategy include the National Disruption Group, which is an AFP-led body consisting of a number of government agencies working together to develop and execute plans to divert and disrupt terrorist activities, to ensure national security is maintained where prosecutions may not be an option. </p> <p>Also key to disruption arrangements and measures in Australia are the Joint Counter-Terrorism Teams (JCTTs), located in each Australian capital city and comprising Commonwealth and jurisdictional law enforcement and intelligence bodies (eg, the AFP, State and Territory law enforcement bodies, and ASIO) working together to investigate and disrupt prospective terrorism through conventional arrest and prosecution methods, together with available preventative remedies. Each JCTT is overseen by two management bodies: the Operations Co-ordination Group, which is responsible for the administrative and operational management of counter-terrorism operations undertaken by JCTTs; and Joint Management Committees, which provide the strategic direction and management for JCTTs.</p> <p>These teams are also assisted by the Terror Financing Investigations Unit (TFIU), and the Returning Terrorism Suspects Team (RTST). The TFIU is another multi-agency unit with objectives pertaining to the means by which terrorists seek out and obtain financial resources, while the RTST is an AFP body whose role is to develop reception plans for the return of suspected foreign fighters from overseas conflict zones.<br />The individual participants in these bodies, in particular ASIO and the various police forces, still retain their powers and roles independent of the bodies. </p> <p>On 10 August 2015, the Minister for Justice, the Hon Michael Keenan MP, launched the Australian Intervention Support Hub. The Hub is facilitated by the Australian National University and Deakin University, and will undertake research in relation to countering violent extremism by identifying international best practice in countering such extremism, and working with community organisations to develop effective, community-oriented programs to support individuals at risk of radicalisation. The Hub is part of a broader initiative undertaken by the Government as part of its 2016–17 Budget to counter violent extremism. Additional funding to the AFP to establish a Community Diversion and Monitoring Team to prevent Australians from travelling overseas to engage in conflict, as well as other revisions and expansions to the Government’s program for countering violent extremism, were also included in the 2016–17 Budget.<sup><a href="#ftn27">28</a></sup></p> <p>On 2 October 2015, Curtis Cheng, a civilian employee of the New South Wales (NSW) Police force, was shot and killed by Farhad Halil Mohammad Jabar at Parramatta Police Station. Jabar, a 15 year old boy with no previously known links to terrorism, was himself shot and killed by police officers at the police station. This event is an example of the aforementioned threat posed by low-level attacks reported by Australia’s security agencies. </p> <p>On 17 and 18 November 2015, Australia co-chaired the first Counter-Terrorism Financing Summit in the Asia-Pacific region in Sydney. The summit brought together more than 150 leaders and experts in counter-terrorism financing and financial intelligence to support efforts to combat terrorism financing and other serious financial crime.<sup><a href="#ftn27">29</a></sup> Australia also co-hosted the second Summit in Bali, Indonesia, in August 2016.<sup><a href="#ftn27">30</a></sup><br />At its meeting of 1 April 2016, COAG agreed to the development of a nationally consistent post-sentence preventative detention scheme for high risk terrorist offenders.<sup><a href="#ftn27">31</a></sup> In part motivated by the nearing conclusion of custodial sentences for several individuals convicted of terrorism offences 10 years ago, the scheme will enable convicted terrorists to be kept in prison after their conviction-based sentence of imprisonment ends. The rationale of the scheme is to protect the community from individuals who pose a high risk of re-offending, or have a need for continued rehabilitation.<sup><a href="#ftn27">32</a></sup> The Commonwealth has drafted and introduced legislation to establish this scheme, following consultation with the States and Territories.<sup><a href="#ftn27">33</a></sup> This is likely to be controversial and will require careful scrutiny.</p> <p>On 21 April 2016, the Prime Minister released Australia’s cyber security strategy.<sup><a href="#ftn27">34</a></sup> That strategy is relevant to counter-terrorism but no new legislation is foreshadowed in it.</p> <p>On 29 April 2016, the Government tabled the Report on the Statutory Review of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 and Associated Rules and Regulations in Parliament. This report made a number of recommendations which the Government has indicated it will implement, including: </p> <ul><li>overhauling secrecy and access provisions of relevant legislation to enable the Australian Transaction Reports and Analysis Centre and its partner agencies to share financial intelligence information in real-time;</li> <li>expanding police and border officials’ powers to search and seize cash on suspicion of money laundering, terror financing, or other serious crimes, where there has been a breach of reporting requirements under relevant legislation; and</li> <li>establishing a working group to consider international developments in combatting terrorism financing, and considering the appropriateness of these developments for Australia.<sup><a href="#ftn35">35</a></sup></li> </ul><p>The implementation of these measures will require consideration. </p> <p>In May 2016, the NSW Parliament passed the Crimes (Serious Crime Prevention Orders) Act 2016 (NSW). This Act enables the NSW Supreme Court or District Court, upon application from the Commissioner of the NSW Police, the NSW Office of Public Prosecutions, or the NSW Crime Commission, to issue a ‘serious crime prevention order’. </p> <p>The primary grounds for issuance of such an order is found in s 5 of the Act, with the key elements being in s 5(1)(b)(ii) and (c) (ie, the person has been involved in serious crime-related activity for which they have not been convicted, or the court is satisfied there are reasonable grounds to believe that the making of the order would protect the public). There does not appear to be any significant guidance or restriction in the Act for what requirements or restrictions may be imposed by a court issuing such an order, save for some basic limitations in s 6(2) protecting rights such as that against self-incrimination and legal professional privilege. </p> <p>Whilst the Act does not appear to have an explicit focus on counter-terrorism, with most of the associated materials such as the Minister’s second reading speech giving more attention to other areas of crime such as organised crime,<a href="#ftn35"><sup>36</sup></a> the expansive range of crimes these orders could cover clearly include terrorism-related activities.</p> <p>Also in May 2016, the NSW Parliament passed the Terrorism (Police Powers) Amendment (Investigative Detention) Act 2016 (NSW), which amended the Terrorism (Police Powers) Act 2002 (NSW). The amendment establishes a new hybrid regime, combining elements of preventative detention with investigation processes (similar to that present in the United Kingdom), which sits alongside the preventative detention regime that was already in existence in NSW. Of particular note, the amendment establishes a new power for police in NSW to arrest, without a warrant, individuals as young as 14, if there are reasonable grounds for suspecting that: </p> <ul><li>the person has committed a terrorist act;</li> <li>the person will commit a terrorist act;</li> <li>the person is or has been involved in preparing or planning for a terrorist act; or</li> <li>the person possesses a thing connected with the commission of, preparation for, or planning for, a terrorist act.<sub><a href="#ftn35">37</a></sub></li> </ul><p>For all four of the criteria listed above, the relevant terrorist act must either have occurred within the 28 days preceding the arrest, or the arresting officer must have reasonable grounds to suspect that the terrorist act could occur at some time in the next 14 days, and the arresting officer must be satisfied that the detention resulting from the arrest will substantially assist in responding to, or preventing, the relevant terrorist act.<a href="#ftn35"><sup>38</sup></a> A person arrested under this power may be held for up to four days initially, or 14 days upon the issuance of a warrant by a judge acting pursuant to a specific appointment by the NSW Attorney–General, during which time the person may be subjected to questioning and normal investigation procedures.<sup><a href="#ftn35">39</a></sup></p> <p>These two NSW initiatives have provoked considerable controversy. There were no proposals for similar Commonwealth legislation at the time of writing this annual report.</p> <h2>Developments in Jurisprudence </h2> <p>Appendix C contains a discussion of some relevant cases decided and journal articles published during the Reporting Period.</p> <h2>Activities during the Reporting Period: </h2> <h3>Reports </h3> <p>During the Reporting Period, reports were completed on three matters referred by Prime Minister Tony Abbott: </p> <ul><li>A report concerning the impacts on journalists of s 35P of the Australian Security and Intelligence organisation Act 1979 (Cth)(ASIO Act) was given to the Prime Minister on 21 October 2015 and tabled on 2 February 2016.<a href="#ftn35"><sup>40</sup></a> Section 35P is a secrecy provision relating to Australian Security Intelligence Organisation (ASIO) special intelligence operations. The report concluded that a secrecy provision is justified but identified problems with the section as drafted. Recommendations for amendments to cure the problems were made. The Government accepted and agreed to implement all of the recommendations in the report.</li> <li>The 2013 COAG Review of Counter-Terrorism Legislation had recommended additional safeguards be introduced to the Commonwealth Criminal Code control order regime. Some had not been introduced. I was to report as to whether those should be introduced. The report into additional safeguards in relation to the control order regime was delivered in two parts. The first part dealt with the advisability of introducing a system of ‘special advocates’ into the regime and was timed to assist the PJCIS complete its report on the Counter-Terrorism Legislation Amendment Bill (No 1) 2015.<sup><a href="#ftn35">41</a></sup> The report considered that bill and concluded that if one aspect of it were passed, then a system of special advocates should be introduced. The report was given to the Prime Minister on 29 January 2016 and tabled on 5 February 2016. Part 2 of the report dealing with the remaining COAG recommendations was given to the Prime Minister on 13 April 2016 and tabled in Parliament on 5 May 2016.<a href="#ftn35"><sup>42</sup></a> Some COAG recommendations were supported, and some were not. </li> </ul><p>At the time of writing this annual report, no response had been received from the Government in relation to my recommendations. However, the PJCIS adopted my recommendations concerning the creation of a system of special advocates.<a href="#ftn35"><sup>43</sup></a></p> <ul><li>I completed a report into certain matters regarding the impact of amendments to the Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill 2014 on 2 May 2016. Due to the proroguing of Parliament on 17 April 2016, the report had not been tabled at the time of writing this annual report. However, I understand that the Prime Minister intends to table the report by 13 October 2016.</li> </ul><p>In May 2016, I commenced a review of certain questioning and detention powers in relation to terrorism, focusing on those powers contained in div 3 of pt III of the ASIO Act, pt IC of the Crimes Act 1914 (Cth), and the coercive questioning powers of the Australian Crime Commission (now the ACIC) under the Australian Crime Commission Act 2002 (Cth). </p> <p>In June 2016, I commenced a review of certain pieces of legislation and powers enacted to address perceived terrorist threats within, at, and beyond, Australia’s borders. This will include a review of the changes made to legislation in connection with the terrorist threat posed by Australians who may travel to participate in conflicts abroad, with a focus on Australians proposing to travel to, or returning from, conflict zones in Iraq and Syria. Legislative features within the scope of this review will include: </p> <ol><li>offences relating to entering and remaining in ‘declared areas’ under div 119 of the Commonwealth Criminal Code;</li> <li>the power of the Minister for Foreign Affairs to suspend travel documents of Australian nationals, and require the surrender of travel documents from foreign nationals in Australia, under s 22A of the Passports Act 2005 (Cth), and s 15A of the Foreign Passports (Law Enforcement and Security) Act 2005 (Cth), respectively;</li> <li>the power of the Minister for Immigration to cancel visas under s 134B of the Migration Act 1958 (Cth);</li> <li>the requirements for people seeking to enter or exit Australia to provide evidence of their identity pursuant to ss 166, 170, and 175, of the Migration Act 1958 (Cth);</li> <li>the requirements for aircraft and ship operators to report details of passengers and crew under ss 245L, and 245LA, of the Migration Act 1958 (Cth);</li> <li>the powers of the Australian Border Force to detain persons for suspicion of committing certain offences, or for reasons related to national security or security of a foreign country, pursuant to ss 219ZJB and 219ZJCA of the Customs Act 1901 (Cth);</li> <li>the regimes for seizing bogus documents under pt 9 of the Migration Act 1958 (Cth) and pt 3 div 1 of the Australian Citizenship Act 2007 (Cth); and</li> <li>the revocation of citizenship pursuant to ss 33AA, 35, and 35A, of the Australian Citizenship Act 2007 (Cth).</li> </ol><h2>Non-Reporting Activities: </h2> <p>In addition to the reporting activities discussed above, the following activities were undertaken by the Monitor and advisers during the Reporting Period: </p> <ul><li>monitored proposals for changes to the counter-terrorism and national security legislation;</li> <li>monitored events that impinge upon the counter-terrorism and national security legislation;</li> <li>maintained the administrative and legal support arrangements for the office of the INSLM in consultation with relevant officers from the Department of the Prime Minister and Cabinet;</li> <li>met, liaised with, and received briefings from, interested people and groups inside and outside government, separately from any particular inquiry (particularly the responsible agencies and those having oversight of them: see, Appendix D); </li> <li>attended briefings from a number of government agencies in relation to various points affecting national security relevant to the INSLM role;</li> <li>attended a number of court hearings applying and testing the limits and application of security legislation;</li> <li>prepared for, and attended, Senate Estimates hearings on 19 October 2015 and 8 February 2016;</li> <li>attended a private hearing of the PJCIS for its inquiry into the Counter-Terrorism Legislation Amendment Bill (No 1) 2015 on 1 February 2016;</li> <li>prepared briefing materials apart from any current review for matters within jurisdiction;</li> <li>arranged the restructuring and improvement of the INSLM website, from a page within the Department of the Prime Minister and Cabinet’s website, to a larger, independent website containing relevant information about the office, its functions, and documentation and reports related to INSLM reviews; and </li> <li>settled an indicative work plan for the future which, in summary, consists of: <ul><li>completing the reviews commenced in May and June 2016 referred to above; </li> <li>conducting a review of warrants available for use by the AFP and ASIO, and ASIO special intelligence operations;</li> <li>conducting a review of pre and post-criminal processes, including disruption and prevention powers, preventative detention orders, stop and search powers, control orders, and potentially post-conviction detention orders;</li> <li>conducting a review of ch 5 of the Commonwealth Criminal Code;</li> <li>conducting a review of provisions of the Crimes Act 1914 (Cth) relating to bail and non-parole periods;</li> <li>conducting a review of pt 4 of the Charter of the United Nations Act 1945 (Cth), and in particular, the legislation relating to the financing of terrorism;</li> <li>conducting a review of matters related to cyber security, including access to metadata;</li> <li>conducting a review of provisions related to the suspension and cessation of welfare payments of those connected, or suspected of being connected, with terrorism;</li> <li>conducting a review of the provisions of the National Security Information (Criminal and Civil Proceedings) Act 2004 (Cth);</li> <li>conducting a review of the Defence Force call out powers;</li> <li>keeping a watching brief on the activities of law enforcement and security agencies as defined in s 6 of the INSLM Act in relation to terrorism and terrorism-related activity;</li> <li>keeping a watching brief on the domestic and international security landscape; and </li> <li>keeping a watching brief on relevant legislative and administrative proposals relevant to counter-terrorism.</li> </ul></li> </ul><p>This is a formidable body of work, particularly for a part-time Monitor. The process of review of legislation may vary in detail from topic to topic, and from Monitor to Monitor, but there are certain fundamentals flowing from an evidence-based approach.</p> <p>The administration of the relevant legislation by the responsible agency or agencies needs to be closely examined, including the experience of those affected by the legislation. A public announcement of the review with a call for submissions will normally be made; briefings by and the production and examination of information by the agencies will be received; consideration will be given to submissions received, often from a range of interested parties and bodies; evidence and argument will be taken in private and public hearings. Knowledge of the current terrorist threat is necessary. The history of the legislation under consideration and the commentary upon it must be understood. Actual or foreshadowed cognate State and Territory legislation needs to be considered together with relevant international instruments and experience. </p> <p>Reviews of some topics are subject to a statutory time limit of 7 September 2017.<a href="#ftn35"><sup>44</sup></a> </p> <p>None of the topics of review are trivial and all require the balancing of security against individual and community rights and freedoms.</p> <p>Completion of such a program in an acceptable timeframe will require more support than is presently available.</p> <h2>Office Management: </h2> <p>In November 2015, a Senior Adviser was at last appointed and commenced duty. He joined the seconded officer from the Australian Government Solicitor referred to in my last annual report. In December 2015 and March 2016 respectively, two advisers joined the staff (the latter of the two on secondment from another Commonwealth agency). In May 2016, the secondment of the officer of the Australian Government Solicitor concluded. In July 2016, the first of the aforementioned two advisers left my staff, and the secondment of the second of the two advisers will end on 31 October 2016. </p> <p>The assistance of these additional advisers has increased the capacity to carry out the functions of the office. In particular, their assistance has increased the capacity to engage with relevant parties and remain abreast of developments related to Australia’s counter-terrorism legislation generally. More work is needed in conjunction with the Attorney–General and the Department of the Prime Minister and Cabinet to develop the office of the INSLM to the point where it has the capacity to satisfactorily support the Monitor in carrying out the statutory duties and functions of the Monitor. An effective ongoing office is also necessary to ensure the seamless departure of one Monitor, and replacement with another so as to avoid the administrative problems that I encountered after my appointment that were outlined in my last annual report.</p> <h2>Appendix A </h2> <h3>Detailed Annual Report Requirements </h3> <p>Section 29 of the INSLM Act sets out the requirements for INSLM annual reports. </p> <p>It provides that the INSLM must prepare and give to the Prime Minister a report (an annual report): </p> <ul><li>relating to the performance of the functions set out in s 6(1)(a) and (b) of the INSLM Act; and </li> <li>containing such details relating to the performance of the function set out in s 6(1)(c) of the INSLM Act as the INSLM considers appropriate.</li> </ul><p>Section 6(1)(a)–(c) of the INSLM Act (the subject of the required annual report) provides as follows: </p> <h4>6 Functions of the Independent National Security Legislation Monitor </h4> <p>(1) The Independent National Security Legislation Monitor has the following functions: </p> <p>(a) to review, on his or her own initiative, the operation, effectiveness and implications of: </p> <p>(i) Australia’s counter-terrorism and national security legislation; and</p> <p>(ii) any other law of the Commonwealth to the extent that it relates to Australia’s counter-terrorism and national security legislation; </p> <p>(b) to consider, on his or her own initiative, whether any legislation mentioned in paragraph (a): </p> <p>(i) contains appropriate safeguards for protecting the rights of individuals; and </p> <p>(ii) remains proportionate to any threat of terrorism or threat to national security, or both; and </p> <p>(iii) remains necessary; </p> <p>(c) if a matter relating to counter-terrorism or national security is referred to the Monitor by the Prime Minister—to report on the reference;</p> <p>Section 4 of the INSLM Act defines as follows the term ‘counter-terrorism and national security legislation’:</p> <p>counter-terrorism and national security legislation means the following provisions of Commonwealth law: </p> <p>(a) Division 3 of Part III of the Australian Security Intelligence Organisation Act 1979 and any other provision of that Act as far as it relates to that Division;<br />(b) Part 4 of the Charter of the United Nations Act 1945 and any other provision of that Act as far as it relates to that Part;<br />(c) the following provisions of the Crimes Act 1914: </p> <p>(i) Division 3A of Part IAA and any other provision of that Act as far as it relates to that Division; </p> <p>(ii) sections 15AA and 19AG and any other provision of that Act as far as it relates to those sections;</p> <p>(iii) Part IC, to the extent that the provisions of that Part relate to the investigation of terrorism offences (within the meaning of that Act), and any other provision of that Act as far as it relates to that Part;</p> <p>(d) Chapter 5 of the Criminal Code and any other provision of that Act as far as it relates to that Chapter;</p> <p>(e) Part IIIAAA of the Defence Act 1903 and any other provision of that Act as far as it relates to that Part;</p> <p>(f) the National Security Information (Criminal and Civil Proceedings) Act 2004.</p> <p>Section 6(1)(a) and (b) sets out what have been referred to as the ‘standing’ functions of the INSLM, which in summary involve considering the effectiveness, appropriateness (including compliance with international obligations) and necessity of the ‘counter-terrorism and national security laws’; a term defined in s 4 of the INSLM Act and set out above. Section 6(1)(c) refers to the INSLM’s function of reporting on any reference from the Prime Minister. </p> <p>The annual report must be given to the Prime Minister as soon as practicable after 30 June in each financial year and, in any event, by the following 31 December. By implication, the relevant reporting period for each annual report is the relevant financial year (ending on 30 June).</p> <p>A declassified annual report must also be given to the Prime Minister, where appropriate. The Prime Minister must cause a copy of each annual report (or of the declassified annual report, where there is one) to be presented to each House of the Parliament within 15 sitting days of that House after the day on which the Prime Minister receives the report. This is the mechanism by which annual reports are required to be made public.</p> <p>The standing functions of the INSLM, under s 6(1)(a) and (b) of the INSLM Act, are to review the counter-terrorism and national security legislation and any other law of the Commonwealth to the extent that it ‘relates to’ that legislation. Such other laws might, for example, encompass laws (such as migration and passport laws) governing border control action taken for security reasons, and telecommunications interception laws. Those functions need to be viewed in the context of the INSLM Act as a whole — for example, ss 3 and 7–10 all affect how these functions should be performed, according to the circumstances. The emphasis of the review function is on the practical operation of legislation (see, in particular s 9 of the INSLM Act). The INSLM Act also expressly envisages that an annual report may contain details relating to any matter referred by the Prime Minister to the INSLM.</p> <h2>Appendix B </h2> <h3>Instruments Considered by the PJCHR </h3> <p>Below is a list of the instruments made under the Autonomous Sanctions Act 2011 (Cth) and the Charter of the United Nations Act 1945 (Cth) considered by the PJCHR during the Reporting Period. Each of these instruments did one of the following: </p> <ul><li>designated and declared individuals subject to the autonomous sanctions regime under the Autonomous Sanctions Act 2011 (Cth) and the Autonomous Sanctions Regulations 2011 (Cth); </li> <li>designated individuals subject to the powers under the Charter of the United Nations Act 1945 (Cth) by reference to a United Nations Security Council resolution or decision;</li> <li>expanded the basis on which the Minister for Foreign Affairs can designate an individual under the Autonomous Sanctions Regulations 2011 (Cth);</li> <li>amended the basis on which a person is prohibited from making assets available to designated persons or expanded the basis on which a person will commit an offence if they make an asset available to a designated person; or </li> <li>expanded the definition of 'controlled asset' to enable the assets of a person acting on behalf of a designated person to be frozen.</li> </ul><h3>Instruments:</h3> <ul><li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Zimbabwe) Amendment List 2013 [F2013L00477];</li> <li>Charter of the United Nations Legislation Amendment Regulation 2013 (No. 1) [F2013L00791];</li> <li>Charter of the United Nations (UN Sanction Enforcement Law) Amendment Declaration 2013 (No. 1) [F2013L00789];</li> <li>Charter of the United Nations (Sanctions – the Taliban) Regulation 2013 [F2013L00787];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Zimbabwe) Amendment List 2013 (No. 2) [F2013L00857];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Syria) Amendment List 2013 [F2013L00884];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Iran) Amendment List 2013 (No. 1) [F2013L01312];</li> <li>Autonomous Sanctions Amendment Regulation 2013 (No. 1) [F2013L01447];</li> <li>Charter of the United Nations (Sanctions – Democratic People's Republic of Korea) Amendment Regulation 2013 (No. 1) [F2013L01384];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Democratic People's Republic of Korea) Amendment List 2013 [F2013L02049];</li> <li>Autonomous Sanctions (Designated and Declared Persons – Former Federal Republic of Yugoslavia) Amendment List 2014 (No.2) [F2014L00970];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Ukraine) Amendment List 2014 [F2014L01184];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Zimbabwe 2014 [F2014L00411];</li> <li>Autonomous Sanctions (Designated and Declared Persons Former Federal Republic of Yugoslavia) Amendment List 2014 [F2014L00694];</li> <li>Autonomous Sanctions Amendment (Ukraine) Regulation 2014 [F2014L00720];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Ukraine) List 2014 [F2014L00745];</li> <li>Charter of the United Nations Legislation Amendment (Central African Republic and Yemen) Regulation 2014 [F2014L00539];</li> <li>Charter of the United Nations (Sanctions – Yemen) Regulation 2014 [F2014L00551];</li> <li>Charter of the United Nations (UN Sanction Enforcement Law) Amendment Declaration 2014 (No. 2) [F2014L00568];</li> <li>Charter of the United Nations Legislation Amendment (Sanctions 2014 Measures No. 1) Regulations 2014 [F2014L01131];</li> <li>Charter of the United Nations Legislation Amendment (Sanctions 2014 – Measures No. 2) Regulation 2014 [F2014L01701];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Democratic People's Republic of Korea) Amendment List 2015 [F2015L00061];</li> <li>Autonomous Sanctions (Designated and Declared Persons – Former Federal Republic of Yugoslavia) Amendment List 2015 (No. 1) [F2015L00224];</li> <li>Autonomous Sanctions (Designated Persons and Entities – Democratic People's Republic of Korea) Amendment List 2015 (No. 2) [F2015L00216];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Iran) Amendment List 2015 (No. 1) [F2015L00227];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Libya) Amendment List 2015 (No. 1) [F2015L00215];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Syria) Amendment List 2015 (No. 1) [F2015L00217];</li> <li>Autonomous Sanctions (Designated Persons and Entities and Declared Persons – Zimbabwe) Amendment List 2015 (No. 1) [F2015L00218];</li> <li>Charter of the United Nations (Sanctions – South Sudan) Regulation 2015 [F2015L01299]; and </li> <li>Charter of the United Nations (Dealing with Assets) Amendment (South Sudan) Regulation 2015 [F2015L01300].</li> </ul><h2>Appendix C </h2> <h3>Developments in Jurisprudence </h3> <h4>Cases </h4> <p>During the Reporting Period, a number of court cases took place which engaged counter-terrorism legislation, and contributed to the jurisprudence in the field. </p> <p>Mr Alqudsi was the subject of a number of cases throughout the Reporting Period. Mr Alqudsi was committed for trial for several offences against s 7(1)(e) of the Crimes (Foreign Incursions and Recruitment) Act 1978 (Cth) (Foreign Incursions Act), for allegedly providing services to several individuals to assist them to travel to Syria and engage in foreign hostilities. </p> <p>In Alqudsi v the Commonwealth [2015] NSWSC 1222, Mr Alqudsi challenged the constitutional validity of s 7(1)(e) of the Foreign Incursions Act, notably arguing that s 7(1)(e) did not sufficiently pertain to the external affairs of the Commonwealth, and that s 7(1)(e) was not proportionate to the objects it sought to achieve. He accordingly claimed that the section’s reliance upon the External Affairs Power (EAP)<sup><a href="#ftn45">45</a></sup> for constitutional validity was flawed. </p> <p>Justice Adamson rejected Mr Alqudsi’s arguments, finding that s 7(1)(e), in prohibiting individuals from engaging in foreign hostilities and thus upholding the principles of sovereignty, equality of States, and non-intervention, sufficiently pertained to the Commonwealth’s external affairs for the provision to rely upon the EAP for constitutional validity.<a href="#ftn45"><sup>46</sup></a> Her Honour further held that the issue of proportionality was not relevant to a finding of constitutional validity for this form of reliance upon the EAP.<a href="#ftn45"><sup>47 </sup></a></p> <p>Mr Alqudsi subsequently appealed from Adamson J’s decision to the NSW Court of Appeal, in Alqudsi v Commonwealth of Australia [2015] NSWCA 351. The Court of Appeal upheld Adamson J’s ruling as being correct, albeit pursuant to some disagreement with parts of Adamson J’s reasoning.</p> <p>While the Foreign Incursions Act was repealed in December 2014, there are provisions in the Commonwealth Criminal Code which prohibits the same forms of conduct in similar terms to s 7(1)(e).<sup><a href="#ftn45">48</a></sup> Accordingly, it is likely that the findings of Adamson J and the Court of Appeal will be influential in the understanding and application of those Criminal Code provisions. </p> <p>In R v Alqudsi [2015] NSWSC 1615, Mr Alqudsi challenged the validity of his indictment, on the basis that the Attorney–General’s consent, provided to enable Mr Alqudsi’s committal, referred to ‘committal proceedings’ (a phrase used by the Criminal Procedure Act 1986 (NSW)), as opposed to ‘commitment’ (the term used in the Foreign Incursions Act under which the permission was required). Justice Adamson rejected this challenge on the basis that s 68 of the Judiciary Act 1903 (Cth) makes applicable State laws (including those relevant for commitment for trial) to prosecutions for Commonwealth offences,<a href="#ftn45"><sup>49</sup></a> and so found that use of the term contained in the NSW legislation did not render the permission invalid.</p> <p>In that case, Mr Alqudsi also challenged the validity of three search warrants issued in relation to his case, on the basis that: </p> <ol><li>the first page of each warrant issued under div 4 of the Telecommunications (Interception and Access) Act 1979 (Cth) was not signed;</li> <li>each of the aforementioned warrants effectively described the offences of which Mr Alqudsi was charged in the singular, rather than the plural (noting Mr Alqudsi was then charged with eight offences, rather than one); and </li> <li>there were deficiencies in the signing of three warrants issued under s 3E of the Crimes Act 1914 (Cth).</li> </ol><p>Justice Adamson rejected the first two challenges, noting that the legislation did not explicitly require the warrants to be signed, or for detailed descriptions of the offences to be provided in the warrant. Her Honour accordingly upheld the validity of the warrants on the basis that the Court was loathe to impose additional, unnecessary administrative requirements on warrants. In respect of the description of the offences, her Honour noted that the requirement is that the offence be identified in a conceptual sense, sufficient to determine if the offence is a ‘serious offence’; it is not necessary for the ‘factual ingredients’ of the offence to be stated.<a href="#ftn45"><sup>50 </sup></a></p> <p>Justice Adamson found that the deficiencies in the signing of the warrants issued under s 3E of the Crimes Act 1914 (Cth) did not invalidate two of the three warrants, but invalidated the third. Of relevance to the third warrant for present purposes, her Honour found that due to the absence of a saving provision similar to those found in other regimes for search warrants (which provide that errors of form do not invalidate warrants), and the impositions on personal rights warrants permit, the search warrant should not be treated as being akin to other documents such as wills or deeds, where the error (which did not go to the substance of the document) could be treated as having no effect on validity.<sup><a href="#ftn45">51</a></sup></p> <p>In November 2015, Mr Alqudsi sought an order from the NSW Supreme Court that his trial be heard by a judge alone, without a jury. This application eventually became the subject of Alqudsi v the Queen [2016] HCA 24, essentially questioning whether an order for a judge-only trial could be made pursuant to State legislation (in this case, s 132 of the Criminal Procedure Act 1986 (NSW)), under s 68 of the Judiciary Act 1903 (Cth) (which confers federal jurisdiction on State and Territory courts to try offences against laws of the Commonwealth using State and Territory procedures), consistently with s 80 of the Constitution (which provides that, inter alia, ‘[t]he trial on indictment of any offence against any law of the Commonwealth shall be by jury’). </p> <p>The majority of the Full Court of the High Court (French CJ dissenting), consistently with previous case authority, held that pursuant to s 80 of the Constitution, all indictable offences against Commonwealth laws must be tried by a jury, and that State and Territory legislation enabling judge-only trials could not be applied to remove the requirement for a jury. This decision of the High Court is relevant in the counter-terrorism context, noting that most offences relating to terrorism (at least within the INSLM’s remit) are indictable offences against laws of the Commonwealth.</p> <p>Following these various challenges and rulings, the trial of Mr Alqudsi finally commenced on 22 June 2016 in the NSW Supreme Court. While the jury’s verdict was not handed down until after the Reporting Period ended (ie, 12 July 2016), it is noted that he was found guilty of all seven of the charges he was indicted on, and on 1 September 2016, Mr Alqudsi was sentenced to serve eight years in prison, with a non-parole period of six years.</p> <p>Throughout the Reporting Period, a number of minors were arrested and charged with terrorism offences against Commonwealth laws. For one, the initiating processes for a trial commenced during the Reporting Period, while at the time of writing this annual report, the others were awaiting trial. Some of those awaiting trial made bail applications during the Reporting Period. </p> <p>On 1 June 2015, the Children’s Court of Victoria, hearing the first ever instance of a minor being charged with offences against ss 101.4 and 101.6 of the Commonwealth Criminal Code in Victoria, held that ‘exceptional circumstances’ existed so as to refuse to hear the matter summarily, and instead raised the matter to a committal hearing pursuant to s 356 of the Children, Youth and Families Act 2005 (Vic).<sup><a href="#ftn45">52</a></sup> This was predominantly on the basis that the Children’s Court lacked adequate sentencing jurisdiction to deal justly with the accused minor, K. </p> <p>K subsequently sought judicial review of the Children’s Court’s decision before the Victorian Supreme Court, submitting that the Children’s Court erred in making this decision, particularly as K’s alleged conduct represented relatively minor forms of the offences charged. Justice Forrest of the Supreme Court, noting the established principles that ‘exceptional circumstances’ must be assessed on a case by case basis, and that the inadequacy of the Children’s Court’s sentencing jurisdiction itself constitutes an exceptional circumstance sufficient to justify the uplifting of a matter, held that it was ‘not only open to [the Children’s Court] to conclude that the relevant exceptional circumstances existed, the circumstances… demanded that conclusion’.<a href="#ftn45"><sup>53</sup></a></p> <p>In December 2015, K entered a plea of guilty to the offences charged, and K was subsequently arraigned in the Victorian County Court. At the time of writing this report, K was awaiting the result of a plea hearing which took place in September 2016. </p> <p>Four other minors were charged with terrorism offences during the Reporting Period. Of those four, three sought, and two eventually obtained, bail.</p> <p>For individuals charged with terrorism offences, there is a presumption against bail, and an onus on the accused to establish that there are exceptional circumstances warranting the granting of bail before bail may be granted.<a href="#ftn45"><sup>54</sup></a> The number of adults charged with terrorism offences that have been refused bail (including Ahmad Naizmand, discussed further below) demonstrates that this is a difficult onus to discharge. Yet a comparatively high proportion of minors have recently been granted bail (admittedly, only on appeal).</p> <p>One minor who obtained bail was NK. NK was initially refused bail by the NSW Children’s Court after it found that exceptional circumstances did not exist. NK then made a further application for bail to the NSW Supreme Court, which found that exceptional circumstances did exist. In making this finding, the Court held that an accused’s youth in this context is one of many factors ‘to which a court must give consideration’.<sup><a href="#ftn55">55</a></sup> In this connection, Hall J also noted that ‘depending on the evidence, in some cases the possible vulnerability of youth to adult persuasion or influence may be a relevant consideration in a determination as to whether exceptional circumstances… exist’,<sup><a href="#ftn55">56</a></sup> and that in this case, the vulnerability arising from the youth of NK independently provided the basis for a finding of exceptional circumstances, despite other supportive evidence (including the ‘deleterious effects of detention’ posed by remand) being provided.<sup><a href="#ftn55">57</a></sup></p> <p>Similar reasoning was employed by the NSW Supreme Court in another bail application by a minor heard in January 2016. In this case,<sup><a href="#ftn55">58</a></sup> one of the reasons for finding that exceptional circumstances existed was the effect of influential adults upon the applicant in view of his youth and impressionability. </p> <p>Another case was heard in May 2016 by the NSW Children’s Court.<sup><a href="#ftn55">59</a></sup> Bail was denied on the basis that exceptional circumstances were not demonstrated, despite the applicant’s youth. The presiding magistrate distinguished this case from those discussed above. In this case, the applicant was alleged to have acted alone in respect of the claimed offence, rather than being subject to the influence of adults. </p> <p>Ahmad Naizmand (who was not a minor) was charged with an offence against s 104.27 of the Commonwealth Criminal Code for breaching a condition of the control order that he was subject to, by accessing certain forms of prohibited videos on the internet. He subsequently made an application for bail in June 2016. </p> <p>The judgment of Harrison J, in finding that exceptional circumstances did not exist, measured the applicant’s circumstances, at least in part, by reference to others accused of terrorism offences, and not the population or individuals accused of criminal offences generally. Justice Harrison found that Mr Naizmand’s custodial conditions, harsh as they were, were not exceptional, as many individuals charged with terrorism offences were subject to similarly harsh treatment.<sup><a href="#ftn55">60</a></sup></p> <p>In Gaughan v Causevic (No 2) [2016] FCCA 1693, the AFP sought to confirm (subject to some variation) an interim control order previously imposed on Harun Causevic. After considering the relevant evidence, over opposition, Judge Hartnett confirmed the order, finding on the balance of probabilities that confirming the interim control order would substantially assist in preventing a terrorist act.<sup><a href="#ftn55">61</a></sup></p> <p>This was the first time the confirmation of an interim control order had been comprehensively challenged. A point at issue arose because the rules of evidence governing an application for an interim control order differ from those governing an application for confirmation. The upshot, at least in this case, was that significant portions of the evidence was ruled inadmissible. Judge Hartnett also examined the substantive provisions governing the basis for, and the content of, a control order. This case will be considered when the control order regime is further examined in due course pursuant to the INSLM Act. </p> <p>On 10 March 2016, the High Court of Australia again revisited the issue of compulsory questioning of persons arguably involved in the criminal process.<sup><a href="#ftn55">62</a></sup> In this case, persons to be questioned were suspected of being involved in the commission of criminal offences, but not charged. The challenge to the questioning depended upon the construction of the Victorian Independent Broad-Based Anti-Corruption Commission Act 2011, rather than any constitutional question. The decisions in X7 v Australian Crime Commission (2013) 248 CLR 92, Lee v the Queen (2014) 253 CLR 455, and Construction, Forestry, Mining and Energy Union v Boral Resources (Vic) Pty Ltd (2015) 320 ALR 448, were discussed and the challenge rejected as the principles discussed in these cases did not apply pre-charge.</p> <h3>Journals </h3> <p>Three journal articles relating to counter-terrorism and national security were published during the Reporting Period. Firstly, following the Government’s announcement of its intention to introduce a post-sentence preventative detention regime, some of the implications of such a scheme were considered.<sup><a href="#ftn55">63</a></sup> Secondly, the Commonwealth control order regime was critically analysed.<sup><a href="#ftn45">64</a></sup> Thirdly, the scope and application of s 80.2C of the Commonwealth Criminal Code was examined.<a href="#ftn55"><sup>65</sup></a></p> <h2>Appendix D </h2> <h3>People and groups with whom the INSLM met during the Reporting Period </h3> <p>The INSLM met with following people and groups (in no particular order): </p> <ul><li>representatives of the Law Council of Australia;</li> <li>representatives of the Attorney–General’s Department;</li> <li>representatives of the Commonwealth Director of Public Prosecutions;</li> <li>representatives of the Australian Security Intelligence Organisation;</li> <li>representatives of the Australian Federal Police;</li> <li>representatives of the Department of the Prime Minister and Cabinet;</li> <li>the Hon James Allsop AO QC, Chief Justice of the Federal Court of Australia;</li> <li>the Parliamentary Joint Committee on Intelligence and Security;</li> <li>representatives of the Department of Immigration and Border Protection;</li> <li>the Hon Margaret Stone, Inspector General of Intelligence and Security.</li> </ul><h2>Footnotes</h2> <p>1 Transcript of Proceedings, Review into Terrorism Questioning and Detention Powers Public Hearing, 19 August 2016, 26.</p> <p>2 Written confidential submission from the AFP to the INSLM, August 2016 (this information from the confidential submission was released with the AFP’s consent).</p> <p>3 Ibid.</p> <p>4 Transcript of Proceedings, above n 1, 25–26; Duncan Lewis, ‘Australia’s Current Security and Intelligence Operating Environment’ (speech delivered at the Security in Government Conference 2015, Canberra, 1 September 2015).</p> <p>5 The foregoing analysis is based upon information received from intelligence sources.</p> <p>6 See, PJCIS, Parliament of Australia, Advisory Report on the Australian Citizenship Amendment (Allegiance to Australia) Bill 2015 (2015). </p> <p>7 See, PJCHR, Parliament of Australia, Twenty-Fifth Report of the 44th Parliament: Human Rights Scrutiny Report (2015). </p> <p>8 See, SSCSB, Parliament of Australia, Fourth Report of 2016 (2016). </p> <p>9 See, PJCIS, above n 6. </p> <p>10 See, PJCHR, above n 7; Parliament of Australia, Human Rights Scrutiny Report: Thirty-Sixth Report of the 44th Parliament (2016).</p> <p>11 See, PJCIS, Parliament of Australia, Advisory Report on the Counter-Terrorism Legislation Amendment Bill (No 1) 2015 (2016). </p> <p>12 See, SSCSB, Parliament of Australia, Third Report of 2016 (2016). </p> <p>13 See, PJCHR, Parliament of Australia, Thirty–Second Report of the 44th Parliament: Human Rights Scrutiny Report (2015). </p> <p>14 See, PJCIS, above n 11.</p> <p>15 See, SSCSB, above n 12.</p> <p>16 See, SSCLA, Parliament of Australia, Australian Crime Commission Amendment (National Policing Information) Bill 2015 and the Australian Crime Commission (National Policing Information Charges) Bill 2015 (2016).</p> <p>17 See, SSCSB, above n 12.</p> <p>18 See, SSCLA, Parliament of Australia, Crimes Legislation Amendment (Proceeds of Crime and Other Measures) Bill 2015 (2016).</p> <p>19 See, PJCHR, Parliament of Australia, Thirty-Third Report of the 44th Parliament (2016).</p> <p>20 See, SSCSB, Parliament of Australia, above n 12; First Report of 2016 (2016); Second Report of 2016 (2016).</p> <p>21 See, SSCLA, above n 18.</p> <p>22 See, SSCSB, Parliament of Australia, First Report of 2016 (2016); Second Report of 2016 (2016).</p> <p>23 Crimes Legislation Amendment (Proceeds of Crime and Other Measures) Act 2015 (Cth) sch 4.</p> <p>24 See, SSCLA, Parliament of Australia, Criminal Code Amendment (Harming Australians) Bill 2013 (2016), 5–9.</p> <p>25 The relevant instruments are listed in Appendix B.</p> <p>26 See, PJCHR, above n 19, 24–25.</p> <p>27 See, COAG, Australia’s Counter–Terrorism Strategy: Strengthening Our Resilience (2015).</p> <p>28 See, Department of Parliamentary Services, Briefing Book: Key Issues for the 45th Parliament (Commonwealth of Australia, 2016) 174.</p> <p>29 Michael Keenan, ‘Australia’s CVE Approach and Experience on Deradicalisation and Rehabilitation of Extremist Individuals’ (paper presented at Malaysia International Conference on Deradicalisation and Countering Violent Extremism, Kuala Lumper, Malaysia, 25 January 2016).</p> <p>30 See, Australian Transaction Reports and Analysis Centre, Counter-Terrorism Financing Summit 2016, Australian Transaction Reports and Analysis Centre &lt;<a href="http://www.austrac.gov.au/about-us/international-engagement/counter-terrorism-financing-summit-2016">http://www.austrac.gov.au/about-us/international-engagement/counter-terrorism-financing-summit-2016</a>&gt;.</p> <p>31 See, COAG, ‘COAG Communique’ (1 April 2016).</p> <p>32 The approach of this scheme is however to be contrasted against the scheme used by the United Kingdom, where to ensure public safety after a convicted individual’s imprisonment ends, the individual is required to comply with substantial notification and reporting requirements. The individual commits an offence if they fail to comply with the notification and reporting requirements imposed: see, Counter-Terrorism Act 2008 (UK) pt 4.</p> <p>33 See, Criminal Code Amendment (High Risk Terrorist Offenders) Bill 2016 (Cth).</p> <p>34 See, Department of the Prime Minister and Cabinet, Australia’s Cyber Security Strategy (Commonwealth of Australia, 2016).</p> <p>35 See, Michael Keenan, ‘Strengthening AML/CTF Capability to Tackle New Threats’ (Media Release, 29 April 2016).</p> <p>36 New South Wales, Parliamentary Debates, Legislative Assembly, 22 March 2016, 60 (Troy Grant).</p> <p>37 Terrorism (Police Powers) Act 2002 (NSW) s 25B(1).</p> <p>38 Terrorism (Police Powers) Act 2002 (NSW) s 25E(1).</p> <p>39 Terrorism (Police Powers) Act 2002 (NSW) ss 25G, 25H, 25I.</p> <p>40 See, Roger Gyles, Report on the Impact on Journalists of Section 35P of the ASIO Act (Commonwealth of Australia, 2015).</p> <p>41 See, Roger Gyles, Control Order Safeguards — (INSLM Report) Special Advocates and the Counter Terrorism Legislation Amendment Bill (No 1) 2015 (Commonwealth of Australia, 2016).</p> <p>42 See, Roger Gyles, Control Order Safeguards: Part 2 (Commonwealth of Australia, 2016).</p> <p>43 See, PJCIS, above n 11, 19–86.</p> <p>44 See, INSLM Act s 6(1B).</p> <p>45 See, Australian Constitution s 51(xxix).</p> <p>46 See, [139].</p> <p>47 See, [130]–[132].</p> <p>48 See, Criminal Code ss 119.4, 119.5, 119.6, 119.7.</p> <p>49 See, [18]–[19]. </p> <p>50 [27].</p> <p>51 [54]–[62].</p> <p>52 See, K v Children’s Court of Victoria [2015] VSC 645.</p> <p>53 [35].</p> <p>54 Crimes Act 1914 (Cth) s 15AA.</p> <p>55 R v NK [2016] NSWSC 498, [34] (Hall J).</p> <p>56 [41].</p> <p>57 [48]–[49].</p> <p>58 This case cannot be discussed in depth for legal reasons.</p> <p>59 This case also cannot be discussed in depth for legal reasons.</p> <p>60 R v Naizmand [2016] NSWSC 836, [39]–[44] (Harrison J).</p> <p>61 [175].</p> <p>62 See, R v Independent Broad-Based Anti-Corruption Commissioner [2016] HCA 8.</p> <p>63 See, Charisse Smith and Mark Nolan, ‘Post-Sentence Continued Detention of High-Risk Terrorist Offenders in Australia’ (2016) 40 Criminal Law Journal 163.</p> <p>64 See, Laura Bourke, ‘Preventing Justice? A Principled Approach to the Commonwealth Control Order Regime’ (2015) 40 University of Western Australia Law Review 306, 316, 319.</p> <p>65 See, Benjamin Brooks, ‘Treason, Terrorism and Imprecision: Locating s 80.2C of the Criminal Code (Cth) in the Taxonomy of Crimes Against the State’ (2016) 38 Sydney Law Review 121.</p> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 17 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2015 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2015 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2015</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">7 December 2015</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">The Hon Roger Gyles AO QC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--x-office-document"> <a href="/sites/default/files/inslm-annual-report-2015.docx">Independent National Security Legislation Monitor Annual Report 2015</a> </article> </div> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2015.pdf">Independent National Security Legislation Monitor Annual Report 2015</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>THE HON ROGER GYLES AO QC<br />ONE NATIONAL CIRCUIT<br />BARTON ACT</p> <p>7 December 2015</p> <p>The Hon Malcolm Turnbull MP<br />Prime Minister<br />Parliament House<br />CANBERRA ACT 2600</p> <p>Dear Prime Minister</p> <p>Please find attached my annual report for the period 1 July 2014 to 30 June 2015 (in particular, the period from my appointment as acting Independent National Security Legislation Monitor on 11 December 2014 to 30 June 2015). I respectfully draw your attention to the Recommendation on page 7.</p> <p>This report is unclassified and is suitable to be presented to each House of the Parliament in accordance with section 29 of the <em>Independent National Security Legislation Monitor Act 2010</em>.</p> <p>Yours sincerely</p> <p>&lt;SIGNED&gt;</p> <p>Roger Gyles AO QC<br />Independent National Security Legislation Monitor</p> <h2>Introduction</h2> <p>This is my first annual report to the Prime Minister as the Independent National Security Legislation Monitor (INSLM).</p> <p>On 11 December 2014 the then Prime Minister appointed me as the acting INSLM, under section 20 of the <em>Independent National Security Legislation Monitor Act 2010</em> (INSLM Act) (see also section 33A of the <em>Acts Interpretation Act 1901</em>). There was a vacancy in the office of the INSLM. The first INSLM, Bret Walker SC, held the office from his appointment on 21 April 2011 for a period of 3 years. I acknowledge the significant contribution made by my predecessor, Bret Walker SC, as INSLM to the counter-terrorism and national security aspect of public policy in Australia.</p> <p>There was no person performing the functions of the INSLM following the expiration of the term of appointment of Bret Walker SC in April 2014 until my appointment as the acting INSLM. On 19 March 2014, the Government introduced into the Parliament (the House of Representatives) the Independent National Security Legislation Monitor Repeal Bill 2014, which was designed to repeal the INSLM Act and abolish the office of INSLM. The Government ultimately decided against pursuing that Bill. On 17 July 2014 the Independent National Security Legislation Monitor Repeal Bill 2014 was withdrawn from the House of Representatives Notice Paper. The Bill had been referred to the Senate Legal and Constitutional Affairs Legislation Committee for inquiry and report, but that became unnecessary when the Bill was withdrawn (although the Committee did receive publicly-available submissions on the subject).</p> <p>My initial appointment was on an acting basis due to the requirement for security clearance prior to a substantive appointment. Security clearance was obtained on 24 April 2015. On 20 August 2015 I was appointed to be the part-time INSLM for a period of two years by the Governor-General, acting on the advice of the Federal Executive Council, under section 11(1) of the INSLM Act. That period is less than the three-year term of the first INSLM and expires prior to the time limit imposed by section 6(1B) of the INSLM Act (discussed further below). I was not consulted about the term of the appointment before it took place.</p> <p>This annual report relates to the period of acting appointment between 11 December 2014 and 30 June 2015.</p> <h2>Annual report requirements</h2> <p>Section 29 of the INSLM Act provides that the INSLM must prepare and give to the Prime Minister a report (an annual report)</p> <ul><li>relating to the performance of the functions set out in sections 6(1)(a) and (b) of the INSLM Act and</li> <li>containing such details relating to the performance of the function set out in section 6(1)(c) of the INSLM Act as the INSLM considers appropriate.</li> </ul><p>Sections 6(1)(a)-(c) of the INSLM Act provide as follows.</p> <p>(1) The Independent National Security Legislation Monitor has the following functions:</p> <p> (a) to review, on his or her own initiative, the operation, effectiveness and implications of:</p> <p>(i) Australia’s counter‑terrorism and national security legislation; and</p> <p>(ii) any other law of the Commonwealth to the extent that it relates to Australia’s counter‑terrorism and national security legislation;</p> <p>(b) to consider, on his or her own initiative, whether any legislation mentioned in paragraph (a):</p> <p> (i) contains appropriate safeguards for protecting the rights of individuals; and</p> <p>(ii) remains proportionate to any threat of terrorism or threat to national security, or both; and</p> <p>(iii) remains necessary;</p> <p>(c) if a matter relating to counter‑terrorism or national security is referred to the Monitor by the Prime Minister—to report on the reference;</p> <p>Section 4 of the INSLM Act defines the term ‘counter-terrorism and national security legislation’ as follows.</p> <p><strong><em>counter‑terrorism and national security legislation</em></strong> means the following provisions of Commonwealth law:</p> <p>(aa) sections 33AA, 35 and 35A of the <em>Australian Citizenship Act 2007</em> and any other provision of that Act as far as it relates to those sections;</p> <p>(a) Division 3 of Part III of the <em>Australian Security Intelligence Organisation Act 1979</em> and any other provision of that Act as far as it relates to that Division;</p> <p>(b) Part 4 of the <em>Charter of the United Nations Act 1945</em> and any other provision of that Act as far as it relates to that Part;</p> <p>(c) the following provisions of the <em>Crimes Act 1914</em>:</p> <p>(i) Division 3A of Part IAA and any other provision of that Act as far as it relates to that Division;</p> <p>(ii) sections 15AA and 19AG and any other provision of that Act as far as it relates to those sections;</p> <p>(iii) Part IC, to the extent that the provisions of that Part relate to the investigation of terrorism offences (within the meaning of that Act), and any other provision of that Act as far as it relates to that Part;</p> <p>(d) Chapter 5 of the <em>Criminal Code</em> and any other provision of that Act as far as it relates to that Chapter;</p> <p>(e) Part IIIAAA of the <em>Defence Act 1903</em> and any other provision of that Act as far as it relates to that Part;</p> <p>(f) the <em>National Security Information (Criminal and Civil Proceedings) Act 2004</em>.</p> <p>The annual report must be given to the Prime Minister as soon as practicable after 30 June in each financial year and, in any event, by the following 31 December. By implication, the relevant reporting period for each annual report is the relevant financial year (ending on 30 June).</p> <p>A declassified annual report must also be given to the Prime Minister, where appropriate. The Prime Minister must cause a copy of each annual report (or of the declassified annual report, where there is one) to be presented to each House of the Parliament within 15 sitting days of that House after the day on which the Prime Minister receives the report. This is the mechanism by which annual reports are required to be made public.</p> <h2>Significant developments</h2> <p>Significant developments relating to national security that occurred during the period from April 2014 to 30 June 2015 included</p> <ul><li>the National Terrorism Public Alert System terrorism threat level was raised from ‘medium’ to ‘high’ (12 September 2014)</li> <li>large-scale counter-terrorism raids by Australian authorities (18 September 2014 and 19 April 2015)</li> <li>a politically-motivated attack against police in Melbourne, in which police were injured and the attacker was killed (23 September 2014) and</li> <li>the Martin Place siege (15-16 December 2014).</li> </ul><p>The Director-General of Security said on 1 September 2015 that</p> <p>Since the Australian Government increased the Terrorism Public Alert Level from Medium to High on September 12 last year, we have seen two terrorist attacks in Australia and six terrorist plots disrupted.</p> <p>…</p> <p>The heightened level of threat we face today is clearly demonstrated by the fact that two thirds of the counter terrorism incidents and plots in Australia since 9/11 (11 September 2001) have occurred in the last year.</p> <p>At present, ASIO is conducting over 400 high priority counter-terrorism investigations, a 100% increase in cases since last year. The increase is related to the conflict in Syria/Iraq – specifically, Australians fighting with or supporting Islamic extremist groups – be it recruiting, fundraising or seeking to join these groups. We know there will be others, at home and abroad, whose activities, despite our best efforts, have not yet been detected.</p> <p>To give you an idea of the scale of the threat, ASIO is currently investigating:</p> <ul><li>120 Australians offshore fighting with or supporting Islamic extremist groups in Iraq or Syria.</li> <li>Around 170 people here in Australia who are supporting Syria and Iraq extremist groups.</li> <li>At least 32 Australians have been killed in Iraq/Syria as a result of their involvement in the conflict.</li> </ul><p>In addition:</p> <ul><li>Since 2012 ASIO has recommended the cancellation of 135 passports of individuals linked to Syria/Iraq extremists. <sup><a href="#_ftn1" name="_ftnref1" id="_ftnref1">[1]</a></sup></li> </ul><p>The Director-General went on to note the concerns of ASIO in relation to</p> <ul><li>returning fighters (based on prior experience of the activities of such persons following their return to Australia)</li> <li>frustrated individuals prevented by passport cancellation or other measures from travelling to the conflict and</li> <li>the trend involving the young age of individuals involved with or interested in joining terrorist groups.</li> </ul><p>More recently, the Prime Minister said in his National Security Statement in Parliament on 24 November 2015</p> <p>In September last year, the alert level was raised to HIGH, and it has remained there ever since. We have subsequently seen the terror attacks against police officers in Melbourne, the Sydney siege and the murder of a police worker in Parramatta by a radicalised young man.</p> <p>The tempo of our domestic counter terrorism efforts has increased and our capabilities have been tested. Since September 2014, 26 people have been charged as a result of 10 counter terrorism operations around Australia. That’s more than one-third of all terrorism related charges since 2001. Counter Terrorism Units at our airports are also stopping people leaving for, and returning from, the conflict zone.<sup><a href="#_ftn2" name="_ftnref2" id="_ftnref2">[2]</a></sup></p> <p>Some significant Bills dealing with national security issues and affecting legislation required to be reviewed by the INSLM were dealt with as follows</p> <ul><li>the National Security Legislation Amendment Bill (No 1) 2014 was on 16 July 2014 introduced into the Senate and referred to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), which reported on 17 September 2014 <ul><li>the Bill, which became the <em>National Security Legislation Amendment Act (No 1) 2014</em> (No 108 of 2014), was passed on 1 October 2014</li> </ul></li> <li>the Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill 2014 was on 24 September 2014 introduced into the Senate and referred to the PJCIS, which reported on 17 October 2014 and on 25 September 2014 was referred also to the Senate Legal and Constitutional Affairs Legislation Committee, which reported on 17 October 2014 <ul><li>the Bill, which became the <em>Counter-Terrorism Legislation Amendment (Foreign Fighters) Act 2014</em> (No 116 of 2014), was passed on 30 October 2014</li> </ul></li> <li>the Counter-Terrorism Legislation Amendment Bill (No 1) 2014 was on 29 October 2014 introduced into the Senate and on 30 October 2014 referred to the PJCIS, which reported on 20 November 2014 <ul><li>the Bill, which became the <em>Counter-Terrorism Legislation Amendment Act (No 1) 2014</em> (No 134 of 2014), was passed on 2 December 2014</li> </ul></li> <li>the Telecommunications (Interception and Access) Legislation Amendment (Data Retention) Bill 2015 was on 30 October 2014 introduced into the House of Representatives and on 21 November 2014 referred to the PJCIS, which reported on 27 February 2015 <ul><li>the Bill, which became the <em>Telecommunications (Interception and Access) Legislation Amendment (Data Retention) Act 2015</em> (No 39 of 2015), was passed on 26 March 2015</li> <li>the Act, among other things <ul><li>provides for mandatory retention for two years by telecommunications service providers of certain data associated with the use of relevant services, including for national security purposes, and</li> <li>makes special provision in this context for access to data relating to journalists’ sources</li> <li>these provisions of the Act recently came into operation</li> </ul></li> </ul></li> <li>the Australian Citizenship Amendment (Allegiance to Australia) Bill 2015 was on 24 June 2015 introduced into the House of Representatives and referred to the PJCIS, which reported on 4 September 2015 <ul><li>the Bill, which became the <em>Australian Citizenship Amendment (Allegiance to Australia) Act 2015</em>, was passed on 3 December 2015</li> <li>this Act enables the revocation of the Australian citizenship, in some circumstances, of persons involved in conflicts abroad.<sup><a href="#_ftn3" name="_ftnref3" id="_ftnref3">[3]</a></sup></li> </ul></li> </ul><h2>Review and reporting priorities</h2> <p>The then Prime Minister referred to me, in conjunction with my appointment as acting INSLM and in accordance with section 7 of the INSLM Act, the following three matters, in order of priority, for inquiry and report</p> <ul><li>any impact on journalists in the operation of section 35P of the <em>Australian Security Intelligence Organisation Act 1979</em> concerning offences for the disclosure of information relating to a ‘special intelligence operation’, as inserted by the <em>National Security legislation Amendment Act (No 1) 2014</em></li> <li>whether the additional safeguards recommended in the 2013 Council of Australian Governments Review of Counter-Terrorism Legislation in relation to the control order regime should be introduced, with particular consideration given to the advisability of introducing a system of ‘Special Advocates’ into the regime, as recommended in the advisory report on the Counter-Terrorism Legislation Amendment Bill (No 1) 2014 by the Parliamentary Joint Committee on Intelligence and Security (PJCIS) – (tabled on 20 November 2014) and</li> <li>matters raised in a letter by the Minister for Immigration and Border Protection, regarding the expected impact on his agencies of amendments to the Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill 2014 made as a result of the PJCIS report on that Bill.</li> </ul><p>Under section 30 of the INSLM Act, the INSLM is required to report to the Prime Minister on a reference made under section 7 (section 30 also provides for reports to be made public in a similar manner as for annual reports, described above). It is worth noting here that such a reference need only relate to ‘counter-terrorism or national security’, not to Australia’s ‘counter-terrorism and national security <em>legislation</em>’ (emphasis added).</p> <p>The emphasis of the review function is on the practical operation of legislation (see in particular section 9 of the INSLM Act).</p> <p>The INSLM Act was amended by the <em>Counter-Terrorism Legislation Amendment (Foreign Fighters) Act 2014 </em>to add the function set out in section 6(1B), namely (1B) The Independent National Security Legislation Monitor must complete the review under paragraph (1)(a) of the following counter‑terrorism and national security legislation by 7 September 2017:</p> <p>(a) Division 3 of Part III of the <em>Australian Security Intelligence Organisation Act 1979</em> and any other provision of that Act as far as it relates to that Division;</p> <p>(b) Division 3A of Part IAA of the <em>Crimes Act 1914</em> and any other provision of that Act as far as it relates to that Division;</p> <p>(c) Divisions 104 and 105 of the <em>Criminal Code </em>and any other provision of the <em>Criminal Code Act 1995 </em>as far as it relates to those Divisions;</p> <p>(d) sections 119.2 and 119.3 of the <em>Criminal Code </em>and any other provision of the <em>Criminal Code Act 1995 </em>as far as it relates to those sections.</p> <p>That function relates to provisions of Australia’s counter-terrorism and national security legislation which are due to expire on 7 September 2018. Those provisions comprise a substantial part of the counter-terrorism and national security legislation.</p> <p>I note that the PJCIS is required, under section 29 of the <em>Intelligence Services Act 2001</em>, to review by 7 March 2018 the same legislation (that is, the legislation, set out above, which is due to expire on 7 September 2018).</p> <p>Presumably, the review required to be conducted by the INSLM is intended to inform the review required to be conducted by the PJCIS and the consideration by the Parliament of the question whether the provisions should cease or continue. On that basis, it may be presumed further that I should report on my review in a manner designed to assist the Parliament. As previously noted, my term of appointment is for a period of two years from 20 August 2015. It is apparent that, as a practical matter, I will have to aim to complete the review required by section 6(1B) of the INSLM Act well before 20 August 2017 (ahead of the statutory deadline of 7 September 2017), so that reporting to assist the Parliament can be completed whilst I am still in office.<sup><a href="#_ftn4" name="_ftnref4" id="_ftnref4">[4]</a></sup> An annual report is hardly the only place for timely reporting on the review contemplated by section 6(1B).</p> <p>The power of the PJCIS to refer a relevant matter to the INSLM in accordance with section 7A of the INSLM Act arguably envisages that the INSLM be able to report on the matter referred otherwise than through an annual report. The same may be said of the ordinary reviews to be undertaken on the initiative of the INSLM. A subject of review may well be chosen for reasons that demand an urgent report if the review is to be fully effective. The field of anti-terrorism and national security is dynamic.</p> <p>The INSLM Act makes express provision for reporting in section 29 (annual report) and section 30 (report on a reference by the Prime Minister). The INSLM Act does not prohibit other reporting by the INSLM but neither does it make provision for how such reporting would be done and to whom it would be provided. It is arguable that the INSLM Act impliedly limits the INSLM to reporting through the means for which express provision is made. That appears to have been the view of the first INSLM, who recommended that the INSLM Act be amended to allow for other reports to be made.</p> <p>I am not convinced that ad hoc reports are prohibited. The effect of sections 6(1B) and 7A of the INSLM Act and what I have said about ordinary reviews point in the opposite direction. An ad hoc report should be able to be provided to the Parliament by an appropriate mechanism.</p> <p>Nonetheless, I agree with the following comment made by Bret Walker SC in the 2014 Annual Report (page 2) and <strong>recommend accordingly</strong></p> <p>… there should be an express power for the INSLM to report on a matter or matters within the statutory mandate but more urgently or particularly than by the annual report.</p> <h2>The reporting period (11 December 2014-30 June 2015)</h2> <p>Activities during the reporting year, in summary, were as follows.</p> <h3>Establishment and general activities</h3> <p>Establishing and maintaining the administrative and legal support arrangements for the office, in consultation with relevant officers from the Department of the Prime Minister and Cabinet was my first task. Commencing in the middle of December was not ideal for getting things done promptly.</p> <p>The first issue was arranging office accommodation and administrative support. It was decided to continue the Canberra arrangements of the previous INSLM, who also resided in Sydney, by accepting accommodation provided by the Department of the Prime Minister and Cabinet in the Canberra offices for myself and the adviser and having administrative support from officers of the Department. A separate establishment for such a small part-time office is not viable. A secure office in Sydney was located for use when required. Non-secure communication with the adviser can be maintained by computer and telephone at all times.</p> <p>The second issue was recruiting an adviser. It was not an easy task to locate someone with availability, knowledge of anti-terrorism and security laws, an appropriate level of security clearance and necessary experience and aptitude without being too close to an agency to be monitored or too involved in the drafting of relevant legislation. Such a person was ultimately identified and commenced duties on 16 March 2015.</p> <p>Other general activities which occupied me during the reporting period included</p> <ul><li>learning about the role of the INSLM and the subject of national security and counter-terrorism generally, including the contents of the counter-terrorism and national security legislation and the reports of the first INSLM</li> <li>monitoring proposals for changes to the counter-terrorism and national security legislation</li> <li>monitoring events that impinge upon the counter-terrorism and national security legislation</li> <li>meeting, liaising with and receiving briefings from interested people and groups inside and outside government, separately from any particular inquiry (particularly the responsible agencies and those having oversight of them) (see <strong>Appendix A</strong>)</li> <li>preparing for and attending Senate Estimates hearings, on 23 February 2015 and 25 May 2015.<sup><a href="#_ftn5" name="_ftnref5" id="_ftnref5">[5]</a></sup></li> </ul><h3>Section 35P inquiry</h3> <p>My first inquiry involved the reference from the Prime Minister concerning the impact on journalists of section 35P of the <em>Australian Security and Intelligence Organisation Act 1979</em> (ASIO Act). There had been significant controversy over this provision in the course of parliamentary consideration of the Bill. It was a hot potato. It was unlikely that any report would please all and possible that it would not please any.</p> <p>Submissions were invited by communication to potentially-interested parties sent on 27 March 2015, by public advertisement on 10 April 2015 and by a notice on the INSLM webpage. Submissions were received from 41 persons or organisations.</p> <p>Public hearings were conducted in Canberra on 27 and 28 April 2015. Private hearings and consultations were conducted in Canberra, the last occurring on 22 June 2015. A record was made of all hearings and consultations.</p> <p>My adviser departed on 25 May 2015. The only practical solution that presented itself to fill the gap in a timely fashion was the secondment of a solicitor from the Australian Government Solicitor with the necessary qualifications and experience to act as adviser to assist with the preparation of the report on the inquiry. That person commenced on 12 June 2015. He then had to read his way into the issues, the submissions and the record of hearings and consultations. He was so engaged when the reporting period ended.<sup><a href="#_ftn6" name="_ftnref6" id="_ftnref6">[6]</a></sup></p> <h2>The task ahead</h2> <p>The mandatory requirements for review of legislation in force at the time of my appointment and actual and potential references by the Prime Minister and the PJCIS would have been a challenge with the available resources. The appointment is on a part time basis and the remuneration is based on a notional commitment of 60 days per annum. There is a full time adviser, now at the Executive Level 2 level, with part-time administrative support from officers of the Department of the Prime Minister and Cabinet. A legally-qualified graduate assistant commenced duties in December 2015.</p> <p>The task which lies ahead has been made more challenging recently by events which have occurred and by legislation and legislative instruments which have come into force or are proposed.</p> <p>On 2 October 2015 at Parramatta in New South Wales a civilian police employee was shot and killed by a young Muslim extremist who was himself killed in the incident. On 31 October 2015 a Russian airliner crashed in the Middle East with large loss of life. ‘Islamic State’ (a terrorist organisation specified as such under the <em>Criminal Code</em>, also known as ‘IS’, ‘ISIL’, or ‘Daesh’) claimed responsibility and published reports indicate that this is likely to be correct. On 12 November 2015, two suicide bombers detonated explosives in Beirut, Lebanon, causing mass casualties. On 13 November 2015 the disastrous co-ordinated attacks in Paris took place, with Islamic State again claiming responsibility. On 20 November 2015, Islamist gunmen stormed the Radisson Bly Hotel, in Bamako, Mali, seizing many hostages and leaving a number dead. An African jihadist group affiliated with al‑Qaeda claimed responsibility for the attack. A further attack occurred on 2 December 2015 in San Bernardino, California. Fourteen people were killed and twenty-one injured. The FBI is treating the attack as an act of terrorism. Then on 5 December 2015, a man stabbed three people in London. Authorities are again, treating this as a terrorist incident. </p> <p>The anti-terrorist and security stakes have been raised considerably here and abroad in recent times. There is bound to be a backlash against terrorism, which may lead to more zealous enforcement of existing powers and pressure for extended powers for intelligence and law enforcement purposes.</p> <p>There has been significant recent action on the legislative front that was in the pipeline before these current events.</p> <ul><li>The Government proposed substantial amendments to the Australian Citizenship Amendment (Allegiance to Australia) Bill 2015 following a report by the PJCIS and legal advice, after which, as noted above, the Bill was passed by the Parliament. The <em>Australian Citizenship Amendment (Allegiance to Australia) Act 2015</em> will remain controversial.</li> <li>The <em>Telecommunications (Interception and Access)(Obligation to Keep Records) Instrument 2015</em> came into force on 9 October 2015. This brings into operation part of the contentious new legislation governing data retention (also known as the metadata laws).</li> <li>Another substantial range of measures was introduced into Parliament on 12 November, as the Counter-Terrorism Legislation Amendment Bill (No 1) 2015.<sup><a href="#_ftn7" name="_ftnref7" id="_ftnref7">[7]</a></sup> The Bill has been referred to the PJCIS for report by 15 February 2016. The Parliamentary Joint Committee on Human Rights (PJCHR) has also sought a response from the Government in relation to aspects of the compatibility of the Bill with human rights.<sup><a href="#_ftn8" name="_ftnref8" id="_ftnref8">[8]</a></sup></li> </ul><p>I am developing a work plan to complete what will need to be done by way of review and report during the remainder of my term.</p> <h2>Appendix A</h2> <p><em>People and groups with whom the INSLM met during the reporting year</em></p> <p>The INSLM met with the following people and groups after being appointed acting INSLM, in approximate chronological order (and some on more than one occasion)</p> <ul><li>Bret Walker SC, the previous INSLM</li> <li>Simeon Gilding, Adviser, Prime Minister’s Office</li> <li>Justin Bassi, National Security Adviser, Attorney-General’s Office</li> <li>Dr Margot McCarthy, Associate Secretary National Security and International Policy Group, Department of the Prime Minister and Cabinet</li> <li>Teneille Elliott, Adviser to Bret Walker SC</li> <li>Colin Neave, Commonwealth Ombudsman</li> <li>Dr Vivienne Thom, Inspector-General of Intelligence and Security</li> <li>Katherine Jones, Deputy Secretary, National Security and Criminal Justice Group, Attorney-General’s Department</li> <li>Michael Pezzullo, Secretary, Department of Immigration and Border Protection</li> <li>Amanda Gorely, Acting Senior Legal Adviser, Department of Foreign Affairs and Trade</li> <li>Richard Sadleir, First Assistant Secretary, National Security Division, Department of the Prime Minister and Cabinet</li> <li>Australian Federal Police <ul><li>Commissioner Andrew Colvin</li> <li>Deputy Commissioner Michael Phelan</li> <li>Acting Deputy Commissioner Neil Gaughan</li> </ul></li> <li>Annette Willing, National Security Legal Adviser, Attorney-General’s Department</li> <li>Scott Bruckard, Director, Organised Crime and Counter-Terrorism, Commonwealth Director of Public Prosecutions</li> <li>Nick Warner, Director-General, Australian Secret Intelligence Service</li> <li>Dr Paul Taloni, Director, Australian Signals Directorate</li> <li>Australian Security Intelligence Organisation <ul><li>Duncan Lewis AO, Director-General of Security</li> <li>Deputy Directors-General</li> <li>First Assistant Director-General, Legal</li> <li>First Assistant Directors-General and other staff</li> </ul></li> <li>Michael Griffin, Integrity Commissioner, Australian Commission for Law Enforcement Integrity</li> <li>Chris Dawson, CEO, Australian Crime Commission</li> <li>Paul Baxter, Deputy Secretary, Strategy, Department of Defence</li> <li>Professor Clive Walker (by correspondence)</li> <li>Department of Communications <ul><li>Drew Clarke, Secretary</li> <li>Ian Robinson, Deputy Secretary, Infrastructure</li> </ul></li> <li>Australian Privacy Commission <ul><li>Tim Pilgrim, Australian Privacy Commissioner</li> <li>Angelene Faulk, Assistant Privacy Commissioner</li> </ul></li> <li>Paul O’Sullivan, Chief of Staff, Attorney-General’s Office</li> <li>David Anderson QC, Independent Reviewer of Terrorism Legislation (UK)</li> <li>Tim Wilson, Human Rights Commissioner</li> </ul><h3>Footnotes</h3> <p><a href="#_ftnref1" name="_ftn1" id="_ftn1">[1]</a> Director-General’s speech: <em>Australia’s current security and intelligence operating environment</em>, address to the Security in Government Conference 2015. Since this speech was given, there has been a third terrorist attack in Australia in the period described by the Director-General, the murder of a police worker at Parramatta on 2 October 2015.</p> <p><a href="#_ftnref2" name="_ftn2" id="_ftn2">[2]</a> The Prime Minister foreshadowed the adoption within the week of a new National Terrorism Threat Advisory System. The current threat level in Australia according to the new system is ‘probable’, in the middle of a spectrum of threat levels ranging from ‘not expected’ through ‘possible’, ‘probable’ and ‘expected’ to ‘certain’.</p> <p><a href="#_ftnref3" name="_ftn3" id="_ftn3">[3]</a> In addition to the specific referrals mentioned, parliamentary committees which review and report on aspects of the counter-terrorism and national security legislation as part of their standing functions include the Parliamentary Joint Committee on Human Rights and the Senate Standing Committee for the Scrutiny of Bills.</p> <p><a href="#_ftnref4" name="_ftn4" id="_ftn4">[4]</a> Further, the <em>Australian Citizenship Amendment (Allegiance to Australia) Act 2015 </em>has amended the INSLM Act to include provisions of this new law within the INSLM’s remit. It is understood that the Prime Minister may refer to the INSLM the matter of reviewing the revocation of citizenship provisions by 1 December 2018, as recommended by the PJCIS.</p> <p><a href="#_ftnref5" name="_ftn5" id="_ftn5">[5]</a> I also attended a Senate Estimates hearing on 19 October 2015, outside the reporting period.</p> <p><a href="#_ftnref6" name="_ftn6" id="_ftn6">[6]</a> This report was given to the Prime Minister on 21 October 2015. The report must be presented to each House of the Parliament within 15 sitting days of that House from receipt, in accordance with section 30 of the INSLM Act.</p> <p><a href="#_ftnref7" name="_ftn7" id="_ftn7">[7]</a> These measures in part affect the second matter referred to me by the Prime Minister, relating to control orders.</p> <p><a href="#_ftnref8" name="_ftn8" id="_ftn8">[8]</a> PJCHR, <em>Thirty-second report of the 44<sup>th</sup> Parliament</em> (1 December 2015), pages 3-37.</p> <p>© Commonwealth of Australia 2015</p> <p>978-1-925238-39-6 INSLM Annual Report 2014 - 2015 (Hardcopy)<br />978-1-925238-38-9 INSLM Annual Report 2014 - 2015 (PDF)<br />978-1-925238-37-2 INSLM Annual Report 2014 - 2015 (DOXC)</p> <p><strong>Copyright notice</strong></p> <p>With the exception of the Commonwealth Coat of Arms, this work is licensed under a <a href="http://creativecommons.org/licenses/by/3.0/au/deed.en">Creative Commons Attribution 3.0 Australia licence (CC BY 3.0)</a>.</p> <p>This work must be attributed as: ‘Commonwealth of Australia, Department of the Prime Minister and Cabinet, INSLM Annual Report 2014 - 2015’</p> <p><strong>Use of the Coat of Arms</strong></p> <p>The terms under which the <a href="https://www.dpmc.gov.au/government/commonwealth-coat-arms">Coat of Arms</a> can be used are available on the Department of the Prime Minister and Cabinet website.</p> <p>Enquiries regarding the licence and any use of this work are welcome at:</p> <p>The Independent National Security Legislation Monitor via the Department of the Prime Minister and Cabinet<br />PO Box 6500 Canberra ACT 2600<br />+61 2 6271 5111</p> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 18 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2014 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2014 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2014</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">28 March 2014</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Bret Walker SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2014.pdf">Independent National Security Legislation Monitor Annual Report 2014</a> </article> </div> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 19 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2013 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2013 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2013</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">7 November 2013</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Bret Walker SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2013.pdf">Independent National Security Legislation Monitor Annual Report 2013</a> </article> </div> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 20 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2012 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2012 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2012</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">20 December 2012</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Bret Walker SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2012.pdf">Independent National Security Legislation Monitor Annual Report 2012</a> </article> </div> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 21 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2011 https://www.inslm.gov.au/reviews-reports/annual-reports/independent-national-security-legislation-monitor-annual-report-2011 <h1 class="au-header-heading">Independent National Security Legislation Monitor Annual Report 2011</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">16 December 2011</div> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-10-15T15:14:09+11:00" title="Tuesday, October 15, 2019 - 15:14">Tue, 2019-10-15 15:14</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Bret Walker SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/inslm-annual-report-2011.pdf">Independent National Security Legislation Monitor Annual Report 2011</a> </article> </div> </div> Tue, 15 Oct 2019 04:14:09 +0000 Anonymous 22 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2018-2019 https://www.inslm.gov.au/node/182 <h1 class="au-header-heading"> Independent National Security Legislation Monitor Annual Report 2018-2019</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">26 February 2020</div> <span><span>sarah.marassovich</span></span> <span><time datetime="2020-02-26T16:07:20+11:00" title="Wednesday, February 26, 2020 - 16:07">Wed, 2020-02-26 16:07</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Dr James Renwick CSC SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--x-office-document"> <a href="/sites/default/files/2020-02/INSLM%20Annual%20Report%20-%202018-2019.docx">INSLM Annual Report - 2018-2019</a> </article> </div> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/2020-02/INSLM%20Annual%20Report%20-%202018-2019.pdf">INSLM Annual Report - 2018-2019</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"></div> Wed, 26 Feb 2020 05:07:20 +0000 sarah.marassovich 182 at https://www.inslm.gov.au Independent National Security Legislation Monitor Annual Report 2019-2020 https://www.inslm.gov.au/node/190 <h1 class="au-header-heading"> Independent National Security Legislation Monitor Annual Report 2019-2020</h1> <div class="field field--name-field-document-release-date field--type-datetime field--label-hidden field__item">11 February 2021</div> <span><span>douglas.catling</span></span> <span><time datetime="2021-02-11T15:21:54+11:00" title="Thursday, February 11, 2021 - 15:21">Thu, 2021-02-11 15:21</time> </span> <div class="field field--name-field-document-authors field--type-string field--label-above"> <div class="field__label">Publication author(s)</div> <div class="field__item">Mr Grant Donaldson SC</div> </div> <div class="field field--name-field-attachments field--type-entity-reference field--label-hidden field__items"> <div class="field__item"> <article class="file file--x-office-document"> <a href="/sites/default/files/2021-02/inslm-annual-report-2019-2020.docx">INSLM Annual Report 2019-2020</a> </article> </div> <div class="field__item"> <article class="file file--application-pdf"> <a href="/sites/default/files/2021-02/inslm-annual-report-2019-2020.pdf">INSLM Annual Report 2019-2020</a> </article> </div> </div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"></div> Thu, 11 Feb 2021 04:21:54 +0000 douglas.catling 190 at https://www.inslm.gov.au