440
Views
1
CrossRef citations to date
0
Altmetric
ARTICLES

Australia's Intelligence and Passenger Assessment Programs

Pages 218-236 | Published online: 21 Aug 2006

REFERENCES

  • See Peter St. John , Air Piracy, Airport Security and International Terrorism: Winning the War Against Hijackers (New York: Quorom Books/Greenwood publishing, 1991); and Paul Wilkinson and Brain M. Jenkins , editors, Aviation Terrorism and Security ( London : Frank Cass , 1999 ).
  • United States Transportation Security Administration, “TSA to Test New Passenger Pre-Screening System: “Secure Flight” to be Tested Before Year's End,” Press Release, 26 August 2004 . [CSA]
  • Harvey Simon , “ Learing from the lsraeli Security Experience .” Homeland Security , No. 5, December 2004 , pp. 16 – 17 . [CSA]
  • Australia, Department of Immigration and Multicultural and Indigenous Affairs (DIMIA), “Advanced Passenger Processing,” Letter to the Editor, 24 February 2004 . [CSA]
  • Michael Herman , Intelligence Power in Peace and War ( Cambridge : Cambridge University Press , 1996 ), pp. 39 – 40 ; Jack Davis, “Strategic Warning: If Surprise Is Inevitable, What Role for Analysis?” Sherman Kent Center for Intelligence Analysis, Occasional Papers, Vol. 2, No. 1, 2003, p. 6.
  • DIMIA, Submission to the Joint Committee of Public Accounts and Audit Review of Aviation Security in Australia (hereafter Submission), p. 2. http://www.aph.gov.au/house/committee/jpaa/aviation_security/submissions/sub30.pdf (accessed 15 January 2005) .
  • Ibid. , p. 4 . [CSA]
  • DIMIA, Managing the Border: Immigration Compliance, 2004, Chapter 1, p. 3; Australia, Parliament, Joint Committee of Public Accounts and Audit (hereafter JPAA), Review of Aviation Security in Australia, 2004, Chapter 3 . [CSA]
  • DIMIA, Submission , pp. 4, 7 . [CSA]
  • Section 2 discusses in greater detail the Movement Alert List. [CSA]
  • Harvey Simon , “ Learning from the lsraeli Security Experience ,” p. 17 . [CSA]
  • William Maley , “The Open Front Door: Tourism, Border Control and National Security,” Issue Analysis , No. 42 ( Sydney : Centre for Independent Studies , 2004 ), p. 4 .
  • DIMIA, Submission , p. 5 . [CSA]
  • Intelligent Border Solutions, APP Now Mandatory in Australia, January 2004. http://www.cps-us.com/htmlBorder/b_news_January_2004.htm (accessed January 15, 2005) .
  • DIMIA, Annual Report 2002–03, Section 1.3.1. [CSA]
  • DIMIA, Managing the Border, Chapter 1, p. 4; Annual Report 2003–04 , 2004 , p. 74 . [CSA]
  • Intelligent Border Solutions. APP now Mandatory in Australia . [CSA]
  • DIMIA, Annual Report 2003–04 , p. 74 . [CSA]
  • New Zealand Government, Funding Passenger Clearance Services at New Zealand's International Airports in Today's Security Environment, May 2004 , pp. 9, 22 . [CSA]
  • Michael Herman , “Counter-terrorism, Information Technology and Intelligence Change,” Intelligence and National Security , Vol. 18 , No. 4 , Winter 2003 , p. 45 . [CSA]
  • Australia, Australian National Audit Office (ANAO), Electronic Travel Authority: Department of Immigration and Multicultural Affairs, Audit Report No. 3, 1999–2000, Section 3.2. http://www.anao.gov.au/WebSite.nsf/Publications/4A256AE90015F69B4A2568FF001F3F29 .
  • DIMIA, Managing the Border, Chapter 1, p. 3. The DAL is further explained in Section 4. [CSA]
  • ANAO, Electronic Travel Authority, Sections 3.30–3.34. [CSA]
  • Ibid., Sections 3.9–3.11. [CSA]
  • Ibid., Section 3.15. [CSA]
  • Ibid., Section 3.16. [CSA]
  • Ibid., Section 3.14. [CSA]
  • DIMIA, Managing the Border, Chapter 1, p. 3 . [CSA]
  • Rod Lyon , “ Australia's Security and the Threat of Islamic Extremism in Southeast Asia ,” Cambridge Review of International Affairs , Vol. 16 , No. 3 , October 2003 , p. 452 . [CSA]
  • ANAO, Electronic Travel Authority, Section 3.15. [CSA]
  • William Maley , “The Open Front Door: Tourism, Border Control and National Security,” pp. 1 – 2 . [CSA]
  • Sydney Morning Herald, “Brigitte Could Face Trial in Australia,” 19 July 2004 . [CSA]
  • Sydney Morning Herald, “Brigitte Planned Australian Terror Attack, Associate Claims,” 22 November 2003 . [INFOTRIEVE] [CSA]
  • Rod Lyon , “Australia's Security and the Threat of Islamic Extremism in Southeast Asia,” pp. 452 – 453 . [CSA]
  • Stéphane Lefebvre , “ The Difficulties and Dilemmas of International Intelligence Cooperation ,” International Journal of Intelligence and CounterIntelligence , Vol. 16 , No. 3 , Fall 2003 , pp. 527 – 533 . [CSA]
  • Chris Clough , “Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation,” International Journal of Intelligence and CounterIntelligence , Vol. 17 , No. 3 , Fall 2004 , p. 603 . [CSA]
  • Ste´phane Lefebvre , “The Difficulties and Dilemmas of International Intelligence Cooperation,” pp. 529, 532–533. [CSA]
  • Associated Press, “New Zealand Defends Australia's Planned Counterterrorism Security Zone,” 18 December 2004 . [CSA]
  • Nationwide News, “Border Security Pact Signed,” 20 December 2004 . [CSA]
  • New Zealand Immigration Service, “Advance Passenger Screening: New Zealand's Experience in Implementing API in a ‘Visa Free’ Environment,” Presentation to the APEC Business Mobility Group, August 14–15 , 2003 . [INFOTRIEVE] [CSA]
  • Associated Press, “New Zealand Defends Australia's Planned Counterterrorism Security Zone.” [CSA]
  • DIMIA, Submission, p. 3. [CSA]
  • New Zealand Immigration Service, “Advance Passenger Screening.” [CSA]
  • AAP Information Services, “Aust, NZ agree to share passenger information,” 19 December 2004. [CSA]
  • U.S. Department of State, “APEC Economies to Develop a Regional Movement Alert List System,” Press Release, 19 November 2004. [CSA]
  • Scoops, “PM's Address at CEO APEC Summit in Chile,” 22 November 2004 , http://www.scoop.co.nz/stories/PA0411/S00447.htm
  • Australia, Department of Foreign Affairs and Trade, APEC Media Brief , 2004 , pp. 33 . [CSA]
  • Norman Willox and Gary Gordon, Identity Fraud: A Critical National and Global Threat, Economic Crime Institute and Lexis-Nexis, 2003, p. 4. www.lexisnexis.com/presscenter/hottopics/ECIReportFinal.pdf ( accessed 1 March, 2005 ).
  • U.S. Department of State, “How Passport and Visa Fraud Relate to Identity Fraud,” 31 March 2003 . http://www.state.gov/m/ds/investigat/c10680.htm (accessed March 1, 2005) .
  • Norman Willox and Thomas Regan , Identity Fraud: Providing a Solution , Lexis-Nexis , 2002 , p. 4 . http://www.lexisnexis.com/risksolutions/zIdentityFraudWhitePaper.pdf (accessed March 1, 2005). [CSA]
  • U.S. News & World Report, “Terror's Best Friend.” 6 December 2004 . [CSA]
  • DIMIA, Submission, p. 4. [CSA]
  • U.S. News & World Report, “Terror's Best Friend.” [CSA]
  • DIMIA, Submission, p. 9; Managing the Border, Chapter 1, p. 6. [CSA]
  • DIMIA, Submission, p. 9. [CSA]
  • DIMIA, Managing the Border, Chapter 1, p. 6. [CSA]
  • The Age, “Afghans With False Visas Found,” 6 January 2005. [CSA]
  • DIMIA, Managing the Border, Chapter 3, p. 19. [CSA]
  • DIMIA, Annual Report 2003–04, p. 74. [CSA]
  • DIMIA, Managing the Border, Chapter 1, p. 3. [CSA]
  • DIMIA, Managing the Border, Chapter 1, p. 6. [CSA]
  • DIMIA, Managing the Border, Chapter 12, p. 86. [CSA]
  • John Woodward , “Biometrics: Privacy's Foe or Privacy's Friend?,” Proceedings of the IEEE, Vol. 85, No. 9, September 1997, p. 1481; Salil Prabhakar, Sharath Pankanti, Anil K. Jain, “Biometric Recognition: Security and Privacy Concerns,” IEEE Security and Privacy , Vol. 1, No. 2, March–April 2003, p. 33. [CSA]
  • DIMIA, “Border Control,” Fact Sheet 70, 2004. http://www.immi.gov.au/facts/70border.htm (accessed 15 January 2005); Department of the Prime Minister and Cabinet, Protecting Australia against Terrorism. Australia's National Counter-Terrorism Policy and Arrangements , 2004 , pp. 37 – 39 . [CSA]
  • DIMIA, “Biometric Initiatives,” Fact Sheet 84, 2005. http://www.immi.gov.au/facts/84biometric.htm (accessed 1 March 2005); Agence France Presse, “Hi-tech Database to Help Secure Australia's Borders,” 29 June 2004. [CSA]
  • JPAA, Review of Aviation Security in Australia , p. 42 . [CSA]
  • The Australian, “Biometric Test Lab to Improve Security,” 27 July 2004. [CSA]
  • Agence France Presse, “Hi-tech Database to Help Secure Australia's Borders.” [CSA]
  • John Woodward , “Biometrics: Privacy's Foe or Privacy's Friend?,” p. 1482 . [CSA]
  • Ibid.; Salil Prabhakar et al., “Biometric Recognition: Security and Privacy Concerns,” pp. 33 – 34 . [CSA]
  • et al. ., “Biometric Recognition: Security and Privacy Concerns,” p. 35 . [CSA]
  • Ibid. [CSA]
  • Ibid., p. 40. [CSA]
  • Ibid. [CSA]
  • The Australian, “Researcher Faced with Identity Crisis,” 17 March 2004. [CSA]
  • See R. Kemp , N. Towell , and G. Pike , “When Seeing Should not be Believing: Photographs, Credit Cards and Fraud,” Applied Cognitive Psychology , Vol. 11 , 1997 , pp. 211 – 222 ; R. Kemp, G. Pike, and N. Brace, “The Psychology of Human Face Recognition,” IEE Electronics and Communications: Visual Biometrics, Vol. 00/018, 2000, pp. 12/1–12/6. [CSA] [CROSSREF]
  • Mary Ann Turney , James C. Bishop , and Patricia C. Fitzgerald , “Measuring the Importance of Recent Airport Security Interventions,” Journal of Air Transportation , Vol. 9 , No. 3 , 2004 , p. 65 . [CSA]
  • Chris Clough , “Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation,” p. 612 . [CSA]
  • Ste´phane Lefebvre, “The Difficulties and Dilemmas of International Intelligence Cooperation,” p. 535 . [CSA]
  • et al. ., “Biometric Recognition: Security and Privacy Concerns,” p. 41 . [CSA]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.