By Tim Tufuga, 6th Sept. 2013.
Prepare a security briefing on possible threats to the security of the
upcoming G20 Summit in Brisbane in 2014. By Tim Tufuga sn 43311792
Submitted: 6th September, 2013.
The security synopsis for the G20 summit meeting in Brisbane in 2014
will test the security integrity and organisational mettle of the
Australian national security community. This event would easily be
considered as the most critically concentrated security effective zone
more so than the Baghdad Green Zone. The security community will be
likened to an iceberg metaphor of coordination, monitoring,
surveillance, and information sharing that will view at the prominent
face of Australia’s national security being the Queensland Police
service,on behalf of the Queensland government, to provide the G20
security. Submerged from the surface is the complex web and intricate
networks of the Australian National Security community at the hub of
which lies the Australian Intelligence Community. The Brisbane G20
summit meeting will be considered as a near to a ‘Titanic’ Australian
National Security integrity challenge for not only the Queensland
government, but, for Australia’s global reputation.
Legislative and executive powers pertaining to the G20 summit meeting.
The G20 (Safety and Security Bill) 2013.
The Queensland police, and affected law enforcement agencies, both
within Australia and New Zealand, as well as, the G20 respective member
nation’s security detail, will be specifically given relevant
privileges, and or special powers, during the G20 summit event in
Brisbane under law.
Special discretionary police powers will be legislated under the Police
Powers and Responsibilities Act 2000 (PPRA), which will allow for the
police to discretionary direct, order, search, and or detain, any
person, property, or vehicle, without warrant. More specifically, such
powers will include the exclusion, and, or the prohibition, of certain
persons from being within the designated exclusion and security zones
during the G20 event in Brisbane in November 2014. Therefore,
blacklisting of persons of interest, as Excluded and Prohibited persons,
during the G20 summit meeting, as legislated under the G20 (Safety and
Security Bill) 2013, will be a peculiar feature of this temporary law.
Overall, the objective of the legislation is:
1. To protect the safety or security of persons attending any part of the G20 meeting.
2. Ensure the safety of the public from acts of civil disobedience in relation to the G20 meeting
3. Prevent acts of terrorism, and finally,
4. Regulate traffic and pedestrian movement.
G20 Security Detail:
Prima facie, the G20 security detail within Brisbane will be the
specific responsibility of the Queensland government. Jurisdictionally
speaking, the Queensland Police Service will be the primary source for
the overall G20 Security. The Assistant Commissioner Katarina Carroll
has been appointed as the head of the Brisbane G20 security detail. The
G20 taskforce will articulate security matters from the Prime Minister
and Cabinet Department, the respective security agencies within the
Australian Intelligence Community, the Australian Federal Police,
Australia Crime Commission, the Australian Defence Force, the respective
state police services, including the New Zealand Police service.
Externally from the immediate security detail is the adjunct
coordination and cooperation with other local, State, and Federal
government, and non-government, emergency service providers, who will
all be part of the security contingency with their specific respective
responsibilities before, during, and after, the 2014 G20 Summit meeting
Externally, the coordination of security matters to other G20 member
nations will be the through the advisement from the Australian Sherpa.
The respective government’s will be duly advised and will work with the
Australian domestic law enforcement, and intelligence community.
Geo-Spatial security zones for G20 Summit in Brisbane November 14th-17th, 2014.
The primary focus of this security brief will focus on the geo-spatial
vulnerabilities of the Brisbane Convention and Exhibition Centre (BCEC)
and the proximity approaches to and from the centre by the motorcades of
the respective political leaders. The schematic of the BCEC will
demonstrate the transparency vulnerabilities for holding a G20
conference in such a public accessible and transparent institute.
(Brisbane Courier Mail)
Potential sources of disruptive behaviour:
As the Saint Petersburg’s example has revealed the Russian G20 Summit
had been disrupted only slightly by demonstrators protesting Russian
anti-Gay Discrimination laws. In Brisbane, however, the most likely
regional concern may emanate from the Anti-whaling lobby who may try to
put a word in edgewise. The likely source of these potential disruptions
are from the usual suspects of the disgruntled politically disaffected,
the disenfranchised, and the specific political agenda setting lobby
groups as sourced from the Indigenous people lobby groups; the
Nationalist Anarchists; or, from the left wing neo-Marxist elements; as
well as, current expected anti-war protestations, and other usual
thematic political demonstrations, most protestors will likely be
university and other tertiary institute students and unemployed
politically charged people; and, finally, at the lowest ebb, the odd
miscreant rabble rouser; all of which will aggregate, and converge, into
Brisbane come November 14th through till the 17th, 2014.
Therefore, Brisbane, will undoubtedly, entice many and varied numbers of
potential security threats. Once again to reiterate the theme that at
the highest level of the critical threat matrix is a critical
infrastructural terrorist event, and at the lowest level and the most
probable expectation would be the street protest marches, all of which
will expose many security vulnerabilities for Brisbane, and Australia’s
national security strategy.
Modus operandi for anti-G20 protestation, and the Queensland Police Service’s Police Public Safety Response Team (PPSRT).
The primary threat to the G20 Summit meeting in Brisbane will most
likely be in the form of protest marches. If the protest become
potentially virulently violent, similar to the Toronto riots in the G20
Summit Meeting, in 2010, then the modus operandi for the protest
organisers will be particularly noted. The Black Bloc tactics was
initiated by the protest organisers and this form of organisation is
considered as the most likely tactic to be initiated by professional
The QPS PPRST, in response, will be trained accordingly in order to
initiate the tried and tested method of kettling tactics. Conversely,
the Black Bloc tactics methods will be spontaneously adopted by the
Protestors. The strategy is not dissimilar to the Chinese strategic game
The objective of the strategic game seems straight forwardly simple in
that the process of encircling an opponent, or in escaping an
entrapment, will be initiated by protestors, and the kettling tactics,
as the response by the police. In actuality, the police will encircle
and corral the protest marches whereas the marches will endeavour to
break the mustering cordon.
The challenge gauntlet has been given for the Australian National
security integrity and the Queensland and Australian people will respond
as effectively as well.
Tim Tufuga SN. 43311792
6th September, 2013.
Queensland Government, G20 (Safety and Security) Bill, 2013,
Queensland Government, Police Powers and Responsibilities Act, 2000,
Queensland Government, Op.cit.
Queensland Government, Queensland Police Media release, July, 23, 2013.
Occupy Brisbane, Facebook.com, https://www.facebook.com/OccupyG20Brisbane?fref=ts
Brisbane Convention and Exhibition Centre (BCEC), http://www.bcec.com.au/
Associated Press, ABCNews, September 5th, 2013.
Occupy Brisbane, Op.cit.
Queensland Government Op.cit.
Wikipedia, Black Bloc Tactics, http://en.wikipedia.org/wiki/Black_bloc
Wikipedia, Kettling Tactics, http://en.wikipedia.org/wiki/Kettling
YouTube.com, Kettling tactics in Glasgow Student protests, December 10, 2010, http://www.youtube.com/watch?v=YvyfxghZLK0
Wibble, Kettling, http://media.pyweek.org/dl/8/Wibble/5.jpg