Key Takeaways
- The Australian Security Intelligence Organisation (ASIO) may not have had the resources to maintain active surveillance on the father and son who carried out the terror attack at Bondi Beach, due to the sheer scale of threats to Australia.
- The attack has raised questions about the effectiveness of Australia’s intelligence systems and the need for closer scrutiny of how agencies interact and share information.
- The prime minister has acknowledged that there may have been "real issues" with the way intelligence was gathered and assessed, and has flagged the need for an inquiry into the attack.
- Security analysts warn that the "grim reality" of intelligence gathering is that there are always going to be more persons of interest than can be dealt with, and that suspected terrorists are not always placed on a single "watchlist" for enduring surveillance.
- The attack has also raised questions about the use of data science to generate fresh leads on persons of interest, and the need for better linkages between systems such as the firearms registry and intelligence agencies.
Introduction to the Attack
The recent terror attack at Bondi Beach, which resulted in the deaths of 15 people, has raised serious questions about the effectiveness of Australia’s intelligence systems. The attack was carried out by a father and son duo, who were known to the Australian Security Intelligence Organisation (ASIO) but had not been subject to active surveillance in recent years. The sheer scale of threats to Australia may have meant that the pair were not considered a high enough priority to warrant ongoing surveillance, despite being assessed by ASIO in 2019.
The Challenge of Intelligence Gathering
Security analysts have warned that the "grim reality" of intelligence gathering is that there are always going to be more persons of interest than can be dealt with. Chris Taylor, from the Australian Strategic Policy Institute, notes that suspected terrorists are not always placed on a single "watchlist" for enduring surveillance, but rather are assessed at a point-in-time and then prioritized and triaged. This means that individuals can fall off the radar if they are not considered an immediate threat, only to re-emerge at a later date. Taylor warns that this can create a "black spot" in intelligence gathering, where individuals are not being monitored and can plan and carry out attacks without being detected.
The Need for Closer Scrutiny
The prime minister has acknowledged that there may have been "real issues" with the way intelligence was gathered and assessed, and has flagged the need for an inquiry into the attack. The inquiry will examine whether ASIO and other agencies missed opportunities to detect the threat posed by the father and son duo, and whether there were any failures in the way intelligence was gathered and assessed. The inquiry will also look at the way that Commonwealth and state agencies interact and share information, and whether any adjustments need to be made to the way that intelligence and security agencies operate.
The Role of Data Science
The attack has also raised questions about the use of data science to generate fresh leads on persons of interest. Taylor notes that data science could provide opportunities to generate new leads on individuals who may be at risk of radicalization, and that there will be questions about whether agency data capabilities are sufficient. The use of data science to analyze patterns of behavior and identify potential threats is an area that is still developing, but it has the potential to play a critical role in preventing future attacks.
The Challenge of Family Threats
The attack has also highlighted the challenge posed by family threats, where individuals are radicalized and mobilized quickly and with greater operational secrecy. The Lowy Institute notes that family threats pose different challenges than traditional terror cells or lone wolf threats, and that they can be harder to detect and prevent. The dynamics of attacks involving relatives can differ from those involving unrelated individuals, and intelligence agencies may need to adapt their methods to deal with this new type of threat.
The Importance of International Cooperation
The attack has also highlighted the importance of international cooperation in preventing terrorism. The father and son duo had traveled to the Philippines, where they may have received military-style training, and there will be questions about whether Australian authorities were aware of their travel plans and whether they should have been flagged as a potential threat. The relationship between Australian intelligence agencies and their foreign counterparts will be an important piece of the puzzle in understanding how the attack was able to occur.
Conclusion
The terror attack at Bondi Beach has raised serious questions about the effectiveness of Australia’s intelligence systems and the need for closer scrutiny of how agencies interact and share information. The attack has highlighted the challenge posed by the sheer scale of threats to Australia, and the need for intelligence agencies to adapt their methods to deal with new and emerging threats. The use of data science and international cooperation will be critical in preventing future attacks, and the inquiry into the attack will provide an opportunity to examine these issues in more detail and to identify areas for improvement.

