Articles by: "John Coyne"
Fault lines in Cambodia

It’s almost 20 years since Cambodia’s last military coup, but the country’s domestic security situation remains fragile. Over the last two years a number of events hint that the political and security situation in this Mekong …

National security leaking and the Farrell case

The other week, ASPI’s Cesar Alvarez and Simon Norton published a cogent argument for the greater protection of Australia’s private and public sector whistle-blowers. With startling statistics, Cesar and Simon highlight that: ‘…of the 80% …

Europe’s unprecedented border management challenge

According to Frontex, the EU’s border management agency, last year there were over 1.8 million illegal border crossings detected along Europe’s external Schengen borders—six times the detections reported in 2014. Europe’s external border security measures …

Australia’s securitised border

Since its formation in 2015, the Department of Immigration and Border Protection, and their operational arm the Australian Border Force have been the subject of significant criticism. A key accusation is that the ABF has …

You say you want a revolution (in border security strategy)

Reductionism abounds in public policy debates on border security. So discussions of innovation are often limited to debates on new walls or biometric advances, not strategy. Unsurprisingly, industry representatives in this reflexive paradigm present arguments …

The devil is in the details

Douglas Fry’s recent Strategist contribution, ‘Australian police require proactive approach to shooter threat’, illustrates the challenge of covering complex issues in 800 words. I applaud Douglas for strongly supporting the introduction of active shooting training …

Schengen’s lessons for ASEAN

Several weeks ago, at a border security conference in London, I thought I was going to see something akin to the recent Ukrainian parliament brawl. A British MP and a Migration Watch representative separately declared …

‘We Can’t Stop’: Life with encryption

In his recent Strategist contribution, David Lang nailed a critical, but sadly missing, dimension of the counter terrorism intelligence debate regarding encryption. David put it perfectly when he argued that encryption is a ‘central contributor …